@push.rocks/smartmta 5.1.3 → 5.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/changelog.md +15 -0
  2. package/dist_ts/00_commitinfo_data.d.ts +8 -0
  3. package/dist_ts/00_commitinfo_data.js +9 -0
  4. package/dist_ts/index.d.ts +3 -0
  5. package/dist_ts/index.js +4 -0
  6. package/dist_ts/logger.d.ts +17 -0
  7. package/dist_ts/logger.js +76 -0
  8. package/dist_ts/mail/core/classes.bouncemanager.d.ts +185 -0
  9. package/dist_ts/mail/core/classes.bouncemanager.js +569 -0
  10. package/dist_ts/mail/core/classes.email.d.ts +291 -0
  11. package/dist_ts/mail/core/classes.email.js +802 -0
  12. package/dist_ts/mail/core/classes.emailvalidator.d.ts +61 -0
  13. package/dist_ts/mail/core/classes.emailvalidator.js +184 -0
  14. package/dist_ts/mail/core/classes.templatemanager.d.ts +95 -0
  15. package/dist_ts/mail/core/classes.templatemanager.js +240 -0
  16. package/dist_ts/mail/core/index.d.ts +4 -0
  17. package/dist_ts/mail/core/index.js +6 -0
  18. package/dist_ts/mail/delivery/classes.delivery.queue.d.ts +163 -0
  19. package/dist_ts/mail/delivery/classes.delivery.queue.js +488 -0
  20. package/dist_ts/mail/delivery/classes.delivery.system.d.ts +160 -0
  21. package/dist_ts/mail/delivery/classes.delivery.system.js +630 -0
  22. package/dist_ts/mail/delivery/classes.unified.rate.limiter.d.ts +200 -0
  23. package/dist_ts/mail/delivery/classes.unified.rate.limiter.js +820 -0
  24. package/dist_ts/mail/delivery/index.d.ts +4 -0
  25. package/dist_ts/mail/delivery/index.js +6 -0
  26. package/dist_ts/mail/delivery/interfaces.d.ts +140 -0
  27. package/dist_ts/mail/delivery/interfaces.js +17 -0
  28. package/dist_ts/mail/index.d.ts +7 -0
  29. package/dist_ts/mail/index.js +12 -0
  30. package/dist_ts/mail/routing/classes.dkim.manager.d.ts +25 -0
  31. package/dist_ts/mail/routing/classes.dkim.manager.js +127 -0
  32. package/dist_ts/mail/routing/classes.dns.manager.d.ts +79 -0
  33. package/dist_ts/mail/routing/classes.dns.manager.js +415 -0
  34. package/dist_ts/mail/routing/classes.domain.registry.d.ts +54 -0
  35. package/dist_ts/mail/routing/classes.domain.registry.js +119 -0
  36. package/dist_ts/mail/routing/classes.email.action.executor.d.ts +33 -0
  37. package/dist_ts/mail/routing/classes.email.action.executor.js +137 -0
  38. package/dist_ts/mail/routing/classes.email.router.d.ts +171 -0
  39. package/dist_ts/mail/routing/classes.email.router.js +494 -0
  40. package/dist_ts/mail/routing/classes.unified.email.server.d.ts +241 -0
  41. package/dist_ts/mail/routing/classes.unified.email.server.js +935 -0
  42. package/dist_ts/mail/routing/index.d.ts +7 -0
  43. package/dist_ts/mail/routing/index.js +9 -0
  44. package/dist_ts/mail/routing/interfaces.d.ts +187 -0
  45. package/dist_ts/mail/routing/interfaces.js +2 -0
  46. package/dist_ts/mail/security/classes.dkimcreator.d.ts +72 -0
  47. package/dist_ts/mail/security/classes.dkimcreator.js +360 -0
  48. package/dist_ts/mail/security/classes.spfverifier.d.ts +62 -0
  49. package/dist_ts/mail/security/classes.spfverifier.js +87 -0
  50. package/dist_ts/mail/security/index.d.ts +2 -0
  51. package/dist_ts/mail/security/index.js +4 -0
  52. package/dist_ts/paths.d.ts +14 -0
  53. package/dist_ts/paths.js +39 -0
  54. package/dist_ts/plugins.d.ts +24 -0
  55. package/dist_ts/plugins.js +28 -0
  56. package/dist_ts/security/classes.contentscanner.d.ts +130 -0
  57. package/dist_ts/security/classes.contentscanner.js +338 -0
  58. package/dist_ts/security/classes.ipreputationchecker.d.ts +73 -0
  59. package/dist_ts/security/classes.ipreputationchecker.js +263 -0
  60. package/dist_ts/security/classes.rustsecuritybridge.d.ts +403 -0
  61. package/dist_ts/security/classes.rustsecuritybridge.js +502 -0
  62. package/dist_ts/security/classes.securitylogger.d.ts +140 -0
  63. package/dist_ts/security/classes.securitylogger.js +235 -0
  64. package/dist_ts/security/index.d.ts +4 -0
  65. package/dist_ts/security/index.js +5 -0
  66. package/package.json +6 -1
  67. package/ts/00_commitinfo_data.ts +8 -0
  68. package/ts/index.ts +3 -0
  69. package/ts/logger.ts +91 -0
  70. package/ts/mail/core/classes.bouncemanager.ts +731 -0
  71. package/ts/mail/core/classes.email.ts +942 -0
  72. package/ts/mail/core/classes.emailvalidator.ts +239 -0
  73. package/ts/mail/core/classes.templatemanager.ts +320 -0
  74. package/ts/mail/core/index.ts +5 -0
  75. package/ts/mail/delivery/classes.delivery.queue.ts +645 -0
  76. package/ts/mail/delivery/classes.delivery.system.ts +816 -0
  77. package/ts/mail/delivery/classes.unified.rate.limiter.ts +1053 -0
  78. package/ts/mail/delivery/index.ts +5 -0
  79. package/ts/mail/delivery/interfaces.ts +167 -0
  80. package/ts/mail/index.ts +17 -0
  81. package/ts/mail/routing/classes.dkim.manager.ts +157 -0
  82. package/ts/mail/routing/classes.dns.manager.ts +573 -0
  83. package/ts/mail/routing/classes.domain.registry.ts +139 -0
  84. package/ts/mail/routing/classes.email.action.executor.ts +175 -0
  85. package/ts/mail/routing/classes.email.router.ts +575 -0
  86. package/ts/mail/routing/classes.unified.email.server.ts +1207 -0
  87. package/ts/mail/routing/index.ts +9 -0
  88. package/ts/mail/routing/interfaces.ts +202 -0
  89. package/ts/mail/security/classes.dkimcreator.ts +447 -0
  90. package/ts/mail/security/classes.spfverifier.ts +126 -0
  91. package/ts/mail/security/index.ts +3 -0
  92. package/ts/paths.ts +48 -0
  93. package/ts/plugins.ts +53 -0
  94. package/ts/security/classes.contentscanner.ts +400 -0
  95. package/ts/security/classes.ipreputationchecker.ts +315 -0
  96. package/ts/security/classes.rustsecuritybridge.ts +964 -0
  97. package/ts/security/classes.securitylogger.ts +299 -0
  98. package/ts/security/index.ts +40 -0
@@ -0,0 +1,820 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { EventEmitter } from 'node:events';
3
+ import { logger } from '../../logger.js';
4
+ import { SecurityLogger, SecurityLogLevel, SecurityEventType } from '../../security/index.js';
5
+ /**
6
+ * Unified rate limiter for all email processing modes
7
+ */
8
+ export class UnifiedRateLimiter extends EventEmitter {
9
+ config;
10
+ counters = new Map();
11
+ patternCounters = new Map();
12
+ ipCounters = new Map();
13
+ domainCounters = new Map();
14
+ cleanupInterval;
15
+ stats;
16
+ /**
17
+ * Create a new unified rate limiter
18
+ * @param config Rate limit configuration
19
+ */
20
+ constructor(config) {
21
+ super();
22
+ // Set default configuration
23
+ this.config = {
24
+ global: {
25
+ maxMessagesPerMinute: config.global.maxMessagesPerMinute || 100,
26
+ maxRecipientsPerMessage: config.global.maxRecipientsPerMessage || 100,
27
+ maxConnectionsPerIP: config.global.maxConnectionsPerIP || 20,
28
+ maxErrorsPerIP: config.global.maxErrorsPerIP || 10,
29
+ maxAuthFailuresPerIP: config.global.maxAuthFailuresPerIP || 5,
30
+ blockDuration: config.global.blockDuration || 3600000 // 1 hour
31
+ },
32
+ patterns: config.patterns || {},
33
+ ips: config.ips || {},
34
+ blocks: config.blocks || {}
35
+ };
36
+ // Initialize statistics
37
+ this.stats = {
38
+ activeCounters: 0,
39
+ totalBlocked: 0,
40
+ currentlyBlocked: 0,
41
+ byPattern: {},
42
+ byIp: {}
43
+ };
44
+ // Start cleanup interval
45
+ this.startCleanupInterval();
46
+ }
47
+ /**
48
+ * Start the cleanup interval
49
+ */
50
+ startCleanupInterval() {
51
+ if (this.cleanupInterval) {
52
+ clearInterval(this.cleanupInterval);
53
+ }
54
+ // Run cleanup every minute
55
+ this.cleanupInterval = setInterval(() => this.cleanup(), 60000);
56
+ }
57
+ /**
58
+ * Stop the cleanup interval
59
+ */
60
+ stop() {
61
+ if (this.cleanupInterval) {
62
+ clearInterval(this.cleanupInterval);
63
+ this.cleanupInterval = undefined;
64
+ }
65
+ }
66
+ /**
67
+ * Destroy the rate limiter and clean up all resources
68
+ */
69
+ destroy() {
70
+ // Stop the cleanup interval
71
+ this.stop();
72
+ // Clear all maps to free memory
73
+ this.counters.clear();
74
+ this.ipCounters.clear();
75
+ this.patternCounters.clear();
76
+ // Clear blocks
77
+ if (this.config.blocks) {
78
+ this.config.blocks = {};
79
+ }
80
+ // Clear statistics
81
+ this.stats = {
82
+ activeCounters: 0,
83
+ totalBlocked: 0,
84
+ currentlyBlocked: 0,
85
+ byPattern: {},
86
+ byIp: {}
87
+ };
88
+ logger.log('info', 'UnifiedRateLimiter destroyed');
89
+ }
90
+ /**
91
+ * Clean up expired counters and blocks
92
+ */
93
+ cleanup() {
94
+ const now = Date.now();
95
+ // Clean up expired blocks
96
+ if (this.config.blocks) {
97
+ for (const [ip, expiry] of Object.entries(this.config.blocks)) {
98
+ if (expiry <= now) {
99
+ delete this.config.blocks[ip];
100
+ logger.log('info', `Rate limit block expired for IP ${ip}`);
101
+ // Update statistics
102
+ if (this.stats.byIp[ip]) {
103
+ this.stats.byIp[ip].blocked = false;
104
+ }
105
+ this.stats.currentlyBlocked--;
106
+ }
107
+ }
108
+ }
109
+ // Clean up old counters (older than 10 minutes)
110
+ const cutoff = now - 600000;
111
+ // Clean global counters
112
+ for (const [key, counter] of this.counters.entries()) {
113
+ if (counter.lastReset < cutoff) {
114
+ this.counters.delete(key);
115
+ }
116
+ }
117
+ // Clean pattern counters
118
+ for (const [key, counter] of this.patternCounters.entries()) {
119
+ if (counter.lastReset < cutoff) {
120
+ this.patternCounters.delete(key);
121
+ }
122
+ }
123
+ // Clean IP counters
124
+ for (const [key, counter] of this.ipCounters.entries()) {
125
+ if (counter.lastReset < cutoff) {
126
+ this.ipCounters.delete(key);
127
+ }
128
+ }
129
+ // Clean domain counters
130
+ for (const [key, counter] of this.domainCounters.entries()) {
131
+ if (counter.lastReset < cutoff) {
132
+ this.domainCounters.delete(key);
133
+ }
134
+ }
135
+ // Update statistics
136
+ this.updateStats();
137
+ }
138
+ /**
139
+ * Check if a message is allowed by rate limits
140
+ * @param email Email address
141
+ * @param ip IP address
142
+ * @param recipients Number of recipients
143
+ * @param pattern Matched pattern
144
+ * @param domain Domain name for domain-specific limits
145
+ * @returns Result of rate limit check
146
+ */
147
+ checkMessageLimit(email, ip, recipients, pattern, domain) {
148
+ // Check if IP is blocked
149
+ if (this.isIpBlocked(ip)) {
150
+ return {
151
+ allowed: false,
152
+ reason: 'IP is blocked',
153
+ resetIn: this.getBlockReleaseTime(ip)
154
+ };
155
+ }
156
+ // Check global message rate limit
157
+ const globalResult = this.checkGlobalMessageLimit(email);
158
+ if (!globalResult.allowed) {
159
+ return globalResult;
160
+ }
161
+ // Check pattern-specific limit if pattern is provided
162
+ if (pattern) {
163
+ const patternResult = this.checkPatternMessageLimit(pattern);
164
+ if (!patternResult.allowed) {
165
+ return patternResult;
166
+ }
167
+ }
168
+ // Check domain-specific limit if domain is provided
169
+ if (domain) {
170
+ const domainResult = this.checkDomainMessageLimit(domain);
171
+ if (!domainResult.allowed) {
172
+ return domainResult;
173
+ }
174
+ }
175
+ // Check IP-specific limit
176
+ const ipResult = this.checkIpMessageLimit(ip);
177
+ if (!ipResult.allowed) {
178
+ return ipResult;
179
+ }
180
+ // Check recipient limit
181
+ const recipientResult = this.checkRecipientLimit(email, recipients, pattern, domain);
182
+ if (!recipientResult.allowed) {
183
+ return recipientResult;
184
+ }
185
+ // All checks passed
186
+ return { allowed: true };
187
+ }
188
+ /**
189
+ * Check global message rate limit
190
+ * @param email Email address
191
+ */
192
+ checkGlobalMessageLimit(email) {
193
+ const now = Date.now();
194
+ const limit = this.config.global.maxMessagesPerMinute;
195
+ if (!limit) {
196
+ return { allowed: true };
197
+ }
198
+ // Get or create counter
199
+ const key = 'global';
200
+ let counter = this.counters.get(key);
201
+ if (!counter) {
202
+ counter = {
203
+ count: 0,
204
+ lastReset: now,
205
+ recipients: 0,
206
+ errors: 0,
207
+ authFailures: 0,
208
+ connections: 0
209
+ };
210
+ this.counters.set(key, counter);
211
+ }
212
+ // Check if counter needs to be reset
213
+ if (now - counter.lastReset >= 60000) {
214
+ counter.count = 0;
215
+ counter.lastReset = now;
216
+ }
217
+ // Check if limit is exceeded
218
+ if (counter.count >= limit) {
219
+ // Calculate reset time
220
+ const resetIn = 60000 - (now - counter.lastReset);
221
+ return {
222
+ allowed: false,
223
+ reason: 'Global message rate limit exceeded',
224
+ limit,
225
+ current: counter.count,
226
+ resetIn
227
+ };
228
+ }
229
+ // Increment counter
230
+ counter.count++;
231
+ // Update statistics
232
+ this.updateStats();
233
+ return { allowed: true };
234
+ }
235
+ /**
236
+ * Check pattern-specific message rate limit
237
+ * @param pattern Pattern to check
238
+ */
239
+ checkPatternMessageLimit(pattern) {
240
+ const now = Date.now();
241
+ // Get pattern-specific limit or use global
242
+ const patternConfig = this.config.patterns?.[pattern];
243
+ const limit = patternConfig?.maxMessagesPerMinute || this.config.global.maxMessagesPerMinute;
244
+ if (!limit) {
245
+ return { allowed: true };
246
+ }
247
+ // Get or create counter
248
+ let counter = this.patternCounters.get(pattern);
249
+ if (!counter) {
250
+ counter = {
251
+ count: 0,
252
+ lastReset: now,
253
+ recipients: 0,
254
+ errors: 0,
255
+ authFailures: 0,
256
+ connections: 0
257
+ };
258
+ this.patternCounters.set(pattern, counter);
259
+ // Initialize pattern stats if needed
260
+ if (!this.stats.byPattern[pattern]) {
261
+ this.stats.byPattern[pattern] = {
262
+ messagesPerMinute: 0,
263
+ totalMessages: 0,
264
+ totalBlocked: 0
265
+ };
266
+ }
267
+ }
268
+ // Check if counter needs to be reset
269
+ if (now - counter.lastReset >= 60000) {
270
+ counter.count = 0;
271
+ counter.lastReset = now;
272
+ }
273
+ // Check if limit is exceeded
274
+ if (counter.count >= limit) {
275
+ // Calculate reset time
276
+ const resetIn = 60000 - (now - counter.lastReset);
277
+ // Update statistics
278
+ this.stats.byPattern[pattern].totalBlocked++;
279
+ this.stats.totalBlocked++;
280
+ return {
281
+ allowed: false,
282
+ reason: `Pattern "${pattern}" message rate limit exceeded`,
283
+ limit,
284
+ current: counter.count,
285
+ resetIn
286
+ };
287
+ }
288
+ // Increment counter
289
+ counter.count++;
290
+ // Update statistics
291
+ this.stats.byPattern[pattern].messagesPerMinute = counter.count;
292
+ this.stats.byPattern[pattern].totalMessages++;
293
+ return { allowed: true };
294
+ }
295
+ /**
296
+ * Check domain-specific message rate limit
297
+ * @param domain Domain to check
298
+ */
299
+ checkDomainMessageLimit(domain) {
300
+ const now = Date.now();
301
+ // Get domain-specific limit or use global
302
+ const domainConfig = this.config.domains?.[domain];
303
+ const limit = domainConfig?.maxMessagesPerMinute || this.config.global.maxMessagesPerMinute;
304
+ if (!limit) {
305
+ return { allowed: true };
306
+ }
307
+ // Get or create counter
308
+ let counter = this.domainCounters.get(domain);
309
+ if (!counter) {
310
+ counter = {
311
+ count: 0,
312
+ lastReset: now,
313
+ recipients: 0,
314
+ errors: 0,
315
+ authFailures: 0,
316
+ connections: 0
317
+ };
318
+ this.domainCounters.set(domain, counter);
319
+ }
320
+ // Check if counter needs to be reset
321
+ if (now - counter.lastReset >= 60000) {
322
+ counter.count = 0;
323
+ counter.lastReset = now;
324
+ }
325
+ // Check if limit is exceeded
326
+ if (counter.count >= limit) {
327
+ // Calculate reset time
328
+ const resetIn = 60000 - (now - counter.lastReset);
329
+ logger.log('warn', `Domain ${domain} rate limit exceeded: ${counter.count}/${limit} messages per minute`);
330
+ return {
331
+ allowed: false,
332
+ reason: `Domain "${domain}" message rate limit exceeded`,
333
+ limit,
334
+ current: counter.count,
335
+ resetIn
336
+ };
337
+ }
338
+ // Increment counter
339
+ counter.count++;
340
+ return { allowed: true };
341
+ }
342
+ /**
343
+ * Check IP-specific message rate limit
344
+ * @param ip IP address
345
+ */
346
+ checkIpMessageLimit(ip) {
347
+ const now = Date.now();
348
+ // Get IP-specific limit or use global
349
+ const ipConfig = this.config.ips?.[ip];
350
+ const limit = ipConfig?.maxMessagesPerMinute || this.config.global.maxMessagesPerMinute;
351
+ if (!limit) {
352
+ return { allowed: true };
353
+ }
354
+ // Get or create counter
355
+ let counter = this.ipCounters.get(ip);
356
+ if (!counter) {
357
+ counter = {
358
+ count: 0,
359
+ lastReset: now,
360
+ recipients: 0,
361
+ errors: 0,
362
+ authFailures: 0,
363
+ connections: 0
364
+ };
365
+ this.ipCounters.set(ip, counter);
366
+ // Initialize IP stats if needed
367
+ if (!this.stats.byIp[ip]) {
368
+ this.stats.byIp[ip] = {
369
+ messagesPerMinute: 0,
370
+ totalMessages: 0,
371
+ totalBlocked: 0,
372
+ connections: 0,
373
+ errors: 0,
374
+ authFailures: 0,
375
+ blocked: false
376
+ };
377
+ }
378
+ }
379
+ // Check if counter needs to be reset
380
+ if (now - counter.lastReset >= 60000) {
381
+ counter.count = 0;
382
+ counter.lastReset = now;
383
+ }
384
+ // Check if limit is exceeded
385
+ if (counter.count >= limit) {
386
+ // Calculate reset time
387
+ const resetIn = 60000 - (now - counter.lastReset);
388
+ // Update statistics
389
+ this.stats.byIp[ip].totalBlocked++;
390
+ this.stats.totalBlocked++;
391
+ return {
392
+ allowed: false,
393
+ reason: `IP ${ip} message rate limit exceeded`,
394
+ limit,
395
+ current: counter.count,
396
+ resetIn
397
+ };
398
+ }
399
+ // Increment counter
400
+ counter.count++;
401
+ // Update statistics
402
+ this.stats.byIp[ip].messagesPerMinute = counter.count;
403
+ this.stats.byIp[ip].totalMessages++;
404
+ return { allowed: true };
405
+ }
406
+ /**
407
+ * Check recipient limit
408
+ * @param email Email address
409
+ * @param recipients Number of recipients
410
+ * @param pattern Matched pattern
411
+ * @param domain Domain name
412
+ */
413
+ checkRecipientLimit(email, recipients, pattern, domain) {
414
+ // Get the most specific limit available
415
+ let limit = this.config.global.maxRecipientsPerMessage;
416
+ // Check pattern-specific limit
417
+ if (pattern && this.config.patterns?.[pattern]?.maxRecipientsPerMessage) {
418
+ limit = this.config.patterns[pattern].maxRecipientsPerMessage;
419
+ }
420
+ // Check domain-specific limit (overrides pattern if present)
421
+ if (domain && this.config.domains?.[domain]?.maxRecipientsPerMessage) {
422
+ limit = this.config.domains[domain].maxRecipientsPerMessage;
423
+ }
424
+ if (!limit) {
425
+ return { allowed: true };
426
+ }
427
+ // Check if limit is exceeded
428
+ if (recipients > limit) {
429
+ return {
430
+ allowed: false,
431
+ reason: 'Recipient limit exceeded',
432
+ limit,
433
+ current: recipients
434
+ };
435
+ }
436
+ return { allowed: true };
437
+ }
438
+ /**
439
+ * Record a connection from an IP
440
+ * @param ip IP address
441
+ * @returns Result of rate limit check
442
+ */
443
+ recordConnection(ip) {
444
+ const now = Date.now();
445
+ // Check if IP is blocked
446
+ if (this.isIpBlocked(ip)) {
447
+ return {
448
+ allowed: false,
449
+ reason: 'IP is blocked',
450
+ resetIn: this.getBlockReleaseTime(ip)
451
+ };
452
+ }
453
+ // Get IP-specific limit or use global
454
+ const ipConfig = this.config.ips?.[ip];
455
+ const limit = ipConfig?.maxConnectionsPerIP || this.config.global.maxConnectionsPerIP;
456
+ if (!limit) {
457
+ return { allowed: true };
458
+ }
459
+ // Get or create counter
460
+ let counter = this.ipCounters.get(ip);
461
+ if (!counter) {
462
+ counter = {
463
+ count: 0,
464
+ lastReset: now,
465
+ recipients: 0,
466
+ errors: 0,
467
+ authFailures: 0,
468
+ connections: 0
469
+ };
470
+ this.ipCounters.set(ip, counter);
471
+ // Initialize IP stats if needed
472
+ if (!this.stats.byIp[ip]) {
473
+ this.stats.byIp[ip] = {
474
+ messagesPerMinute: 0,
475
+ totalMessages: 0,
476
+ totalBlocked: 0,
477
+ connections: 0,
478
+ errors: 0,
479
+ authFailures: 0,
480
+ blocked: false
481
+ };
482
+ }
483
+ }
484
+ // Check if counter needs to be reset
485
+ if (now - counter.lastReset >= 60000) {
486
+ counter.connections = 0;
487
+ counter.lastReset = now;
488
+ }
489
+ // Check if limit is exceeded
490
+ if (counter.connections >= limit) {
491
+ // Calculate reset time
492
+ const resetIn = 60000 - (now - counter.lastReset);
493
+ // Update statistics
494
+ this.stats.byIp[ip].totalBlocked++;
495
+ this.stats.totalBlocked++;
496
+ return {
497
+ allowed: false,
498
+ reason: `IP ${ip} connection rate limit exceeded`,
499
+ limit,
500
+ current: counter.connections,
501
+ resetIn
502
+ };
503
+ }
504
+ // Increment counter
505
+ counter.connections++;
506
+ // Update statistics
507
+ this.stats.byIp[ip].connections = counter.connections;
508
+ return { allowed: true };
509
+ }
510
+ /**
511
+ * Record an error from an IP
512
+ * @param ip IP address
513
+ * @returns True if IP should be blocked
514
+ */
515
+ recordError(ip) {
516
+ const now = Date.now();
517
+ // Get IP-specific limit or use global
518
+ const ipConfig = this.config.ips?.[ip];
519
+ const limit = ipConfig?.maxErrorsPerIP || this.config.global.maxErrorsPerIP;
520
+ if (!limit) {
521
+ return false;
522
+ }
523
+ // Get or create counter
524
+ let counter = this.ipCounters.get(ip);
525
+ if (!counter) {
526
+ counter = {
527
+ count: 0,
528
+ lastReset: now,
529
+ recipients: 0,
530
+ errors: 0,
531
+ authFailures: 0,
532
+ connections: 0
533
+ };
534
+ this.ipCounters.set(ip, counter);
535
+ // Initialize IP stats if needed
536
+ if (!this.stats.byIp[ip]) {
537
+ this.stats.byIp[ip] = {
538
+ messagesPerMinute: 0,
539
+ totalMessages: 0,
540
+ totalBlocked: 0,
541
+ connections: 0,
542
+ errors: 0,
543
+ authFailures: 0,
544
+ blocked: false
545
+ };
546
+ }
547
+ }
548
+ // Check if counter needs to be reset
549
+ if (now - counter.lastReset >= 60000) {
550
+ counter.errors = 0;
551
+ counter.lastReset = now;
552
+ }
553
+ // Increment counter
554
+ counter.errors++;
555
+ // Update statistics
556
+ this.stats.byIp[ip].errors = counter.errors;
557
+ // Check if limit is exceeded
558
+ if (counter.errors >= limit) {
559
+ // Block the IP
560
+ this.blockIp(ip);
561
+ logger.log('warn', `IP ${ip} blocked due to excessive errors (${counter.errors}/${limit})`);
562
+ SecurityLogger.getInstance().logEvent({
563
+ level: SecurityLogLevel.WARN,
564
+ type: SecurityEventType.RATE_LIMITING,
565
+ message: 'IP blocked due to excessive errors',
566
+ ipAddress: ip,
567
+ details: {
568
+ errors: counter.errors,
569
+ limit
570
+ },
571
+ success: false
572
+ });
573
+ return true;
574
+ }
575
+ return false;
576
+ }
577
+ /**
578
+ * Record an authentication failure from an IP
579
+ * @param ip IP address
580
+ * @returns True if IP should be blocked
581
+ */
582
+ recordAuthFailure(ip) {
583
+ const now = Date.now();
584
+ // Get IP-specific limit or use global
585
+ const ipConfig = this.config.ips?.[ip];
586
+ const limit = ipConfig?.maxAuthFailuresPerIP || this.config.global.maxAuthFailuresPerIP;
587
+ if (!limit) {
588
+ return false;
589
+ }
590
+ // Get or create counter
591
+ let counter = this.ipCounters.get(ip);
592
+ if (!counter) {
593
+ counter = {
594
+ count: 0,
595
+ lastReset: now,
596
+ recipients: 0,
597
+ errors: 0,
598
+ authFailures: 0,
599
+ connections: 0
600
+ };
601
+ this.ipCounters.set(ip, counter);
602
+ // Initialize IP stats if needed
603
+ if (!this.stats.byIp[ip]) {
604
+ this.stats.byIp[ip] = {
605
+ messagesPerMinute: 0,
606
+ totalMessages: 0,
607
+ totalBlocked: 0,
608
+ connections: 0,
609
+ errors: 0,
610
+ authFailures: 0,
611
+ blocked: false
612
+ };
613
+ }
614
+ }
615
+ // Check if counter needs to be reset
616
+ if (now - counter.lastReset >= 60000) {
617
+ counter.authFailures = 0;
618
+ counter.lastReset = now;
619
+ }
620
+ // Increment counter
621
+ counter.authFailures++;
622
+ // Update statistics
623
+ this.stats.byIp[ip].authFailures = counter.authFailures;
624
+ // Check if limit is exceeded
625
+ if (counter.authFailures >= limit) {
626
+ // Block the IP
627
+ this.blockIp(ip);
628
+ logger.log('warn', `IP ${ip} blocked due to excessive authentication failures (${counter.authFailures}/${limit})`);
629
+ SecurityLogger.getInstance().logEvent({
630
+ level: SecurityLogLevel.WARN,
631
+ type: SecurityEventType.AUTHENTICATION,
632
+ message: 'IP blocked due to excessive authentication failures',
633
+ ipAddress: ip,
634
+ details: {
635
+ authFailures: counter.authFailures,
636
+ limit
637
+ },
638
+ success: false
639
+ });
640
+ return true;
641
+ }
642
+ return false;
643
+ }
644
+ /**
645
+ * Block an IP address
646
+ * @param ip IP address to block
647
+ * @param duration Override the default block duration (milliseconds)
648
+ */
649
+ blockIp(ip, duration) {
650
+ if (!this.config.blocks) {
651
+ this.config.blocks = {};
652
+ }
653
+ // Set block expiry time
654
+ const expiry = Date.now() + (duration || this.config.global.blockDuration || 3600000);
655
+ this.config.blocks[ip] = expiry;
656
+ // Update statistics
657
+ if (!this.stats.byIp[ip]) {
658
+ this.stats.byIp[ip] = {
659
+ messagesPerMinute: 0,
660
+ totalMessages: 0,
661
+ totalBlocked: 0,
662
+ connections: 0,
663
+ errors: 0,
664
+ authFailures: 0,
665
+ blocked: false
666
+ };
667
+ }
668
+ this.stats.byIp[ip].blocked = true;
669
+ this.stats.currentlyBlocked++;
670
+ // Emit event
671
+ this.emit('ipBlocked', {
672
+ ip,
673
+ expiry,
674
+ duration: duration || this.config.global.blockDuration
675
+ });
676
+ logger.log('warn', `IP ${ip} blocked until ${new Date(expiry).toISOString()}`);
677
+ }
678
+ /**
679
+ * Unblock an IP address
680
+ * @param ip IP address to unblock
681
+ */
682
+ unblockIp(ip) {
683
+ if (!this.config.blocks) {
684
+ return;
685
+ }
686
+ // Remove block
687
+ delete this.config.blocks[ip];
688
+ // Update statistics
689
+ if (this.stats.byIp[ip]) {
690
+ this.stats.byIp[ip].blocked = false;
691
+ this.stats.currentlyBlocked--;
692
+ }
693
+ // Emit event
694
+ this.emit('ipUnblocked', { ip });
695
+ logger.log('info', `IP ${ip} unblocked`);
696
+ }
697
+ /**
698
+ * Check if an IP is blocked
699
+ * @param ip IP address to check
700
+ */
701
+ isIpBlocked(ip) {
702
+ if (!this.config.blocks) {
703
+ return false;
704
+ }
705
+ // Check if IP is in blocks
706
+ if (!(ip in this.config.blocks)) {
707
+ return false;
708
+ }
709
+ // Check if block has expired
710
+ const expiry = this.config.blocks[ip];
711
+ if (expiry <= Date.now()) {
712
+ // Remove expired block
713
+ delete this.config.blocks[ip];
714
+ // Update statistics
715
+ if (this.stats.byIp[ip]) {
716
+ this.stats.byIp[ip].blocked = false;
717
+ this.stats.currentlyBlocked--;
718
+ }
719
+ return false;
720
+ }
721
+ return true;
722
+ }
723
+ /**
724
+ * Get the time until a block is released
725
+ * @param ip IP address
726
+ * @returns Milliseconds until release or 0 if not blocked
727
+ */
728
+ getBlockReleaseTime(ip) {
729
+ if (!this.config.blocks || !(ip in this.config.blocks)) {
730
+ return 0;
731
+ }
732
+ const expiry = this.config.blocks[ip];
733
+ const now = Date.now();
734
+ return expiry > now ? expiry - now : 0;
735
+ }
736
+ /**
737
+ * Update rate limiter statistics
738
+ */
739
+ updateStats() {
740
+ // Update active counters count
741
+ this.stats.activeCounters = this.counters.size + this.patternCounters.size + this.ipCounters.size;
742
+ // Emit statistics update
743
+ this.emit('statsUpdated', this.stats);
744
+ }
745
+ /**
746
+ * Get rate limiter statistics
747
+ */
748
+ getStats() {
749
+ return { ...this.stats };
750
+ }
751
+ /**
752
+ * Update rate limiter configuration
753
+ * @param config New configuration
754
+ */
755
+ updateConfig(config) {
756
+ if (config.global) {
757
+ this.config.global = {
758
+ ...this.config.global,
759
+ ...config.global
760
+ };
761
+ }
762
+ if (config.patterns) {
763
+ this.config.patterns = {
764
+ ...this.config.patterns,
765
+ ...config.patterns
766
+ };
767
+ }
768
+ if (config.ips) {
769
+ this.config.ips = {
770
+ ...this.config.ips,
771
+ ...config.ips
772
+ };
773
+ }
774
+ logger.log('info', 'Rate limiter configuration updated');
775
+ }
776
+ /**
777
+ * Get configuration for debugging
778
+ */
779
+ getConfig() {
780
+ return { ...this.config };
781
+ }
782
+ /**
783
+ * Apply domain-specific rate limits
784
+ * Merges domain limits with existing configuration
785
+ * @param domain Domain name
786
+ * @param limits Rate limit configuration for the domain
787
+ */
788
+ applyDomainLimits(domain, limits) {
789
+ if (!this.config.domains) {
790
+ this.config.domains = {};
791
+ }
792
+ // Merge the limits with any existing domain config
793
+ this.config.domains[domain] = {
794
+ ...this.config.domains[domain],
795
+ ...limits
796
+ };
797
+ logger.log('info', `Applied rate limits for domain ${domain}:`, limits);
798
+ }
799
+ /**
800
+ * Remove domain-specific rate limits
801
+ * @param domain Domain name
802
+ */
803
+ removeDomainLimits(domain) {
804
+ if (this.config.domains && this.config.domains[domain]) {
805
+ delete this.config.domains[domain];
806
+ // Also remove the counter
807
+ this.domainCounters.delete(domain);
808
+ logger.log('info', `Removed rate limits for domain ${domain}`);
809
+ }
810
+ }
811
+ /**
812
+ * Get domain-specific rate limits
813
+ * @param domain Domain name
814
+ * @returns Domain rate limit config or undefined
815
+ */
816
+ getDomainLimits(domain) {
817
+ return this.config.domains?.[domain];
818
+ }
819
+ }
820
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.unified.rate.limiter.js","sourceRoot":"","sources":["../../../ts/mail/delivery/classes.unified.rate.limiter.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAC3C,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AACzC,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAgF9F;;GAEG;AACH,MAAM,OAAO,kBAAmB,SAAQ,YAAY;IAC1C,MAAM,CAA0B;IAChC,QAAQ,GAA+B,IAAI,GAAG,EAAE,CAAC;IACjD,eAAe,GAA+B,IAAI,GAAG,EAAE,CAAC;IACxD,UAAU,GAA+B,IAAI,GAAG,EAAE,CAAC;IACnD,cAAc,GAA+B,IAAI,GAAG,EAAE,CAAC;IACvD,eAAe,CAAkB;IACjC,KAAK,CAAoB;IAEjC;;;OAGG;IACH,YAAY,MAA+B;QACzC,KAAK,EAAE,CAAC;QAER,4BAA4B;QAC5B,IAAI,CAAC,MAAM,GAAG;YACZ,MAAM,EAAE;gBACN,oBAAoB,EAAE,MAAM,CAAC,MAAM,CAAC,oBAAoB,IAAI,GAAG;gBAC/D,uBAAuB,EAAE,MAAM,CAAC,MAAM,CAAC,uBAAuB,IAAI,GAAG;gBACrE,mBAAmB,EAAE,MAAM,CAAC,MAAM,CAAC,mBAAmB,IAAI,EAAE;gBAC5D,cAAc,EAAE,MAAM,CAAC,MAAM,CAAC,cAAc,IAAI,EAAE;gBAClD,oBAAoB,EAAE,MAAM,CAAC,MAAM,CAAC,oBAAoB,IAAI,CAAC;gBAC7D,aAAa,EAAE,MAAM,CAAC,MAAM,CAAC,aAAa,IAAI,OAAO,CAAC,SAAS;aAChE;YACD,QAAQ,EAAE,MAAM,CAAC,QAAQ,IAAI,EAAE;YAC/B,GAAG,EAAE,MAAM,CAAC,GAAG,IAAI,EAAE;YACrB,MAAM,EAAE,MAAM,CAAC,MAAM,IAAI,EAAE;SAC5B,CAAC;QAEF,wBAAwB;QACxB,IAAI,CAAC,KAAK,GAAG;YACX,cAAc,EAAE,CAAC;YACjB,YAAY,EAAE,CAAC;YACf,gBAAgB,EAAE,CAAC;YACnB,SAAS,EAAE,EAAE;YACb,IAAI,EAAE,EAAE;SACT,CAAC;QAEF,yBAAyB;QACzB,IAAI,CAAC,oBAAoB,EAAE,CAAC;IAC9B,CAAC;IAED;;OAEG;IACK,oBAAoB;QAC1B,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;YACzB,aAAa,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QACtC,CAAC;QAED,2BAA2B;QAC3B,IAAI,CAAC,eAAe,GAAG,WAAW,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,CAAC;IAClE,CAAC;IAED;;OAEG;IACI,IAAI;QACT,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;YACzB,aAAa,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;YACpC,IAAI,CAAC,eAAe,GAAG,SAAS,CAAC;QACnC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,OAAO;QACZ,4BAA4B;QAC5B,IAAI,CAAC,IAAI,EAAE,CAAC;QAEZ,gCAAgC;QAChC,IAAI,CAAC,QAAQ,CAAC,KAAK,EAAE,CAAC;QACtB,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;QACxB,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;QAE7B,eAAe;QACf,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YACvB,IAAI,CAAC,MAAM,CAAC,MAAM,GAAG,EAAE,CAAC;QAC1B,CAAC;QAED,mBAAmB;QACnB,IAAI,CAAC,KAAK,GAAG;YACX,cAAc,EAAE,CAAC;YACjB,YAAY,EAAE,CAAC;YACf,gBAAgB,EAAE,CAAC;YACnB,SAAS,EAAE,EAAE;YACb,IAAI,EAAE,EAAE;SACT,CAAC;QAEF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,CAAC,CAAC;IACrD,CAAC;IAED;;OAEG;IACK,OAAO;QACb,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,0BAA0B;QAC1B,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YACvB,KAAK,MAAM,CAAC,EAAE,EAAE,MAAM,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC9D,IAAI,MAAM,IAAI,GAAG,EAAE,CAAC;oBAClB,OAAO,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;oBAC9B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,EAAE,EAAE,CAAC,CAAC;oBAE5D,oBAAoB;oBACpB,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;wBACxB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,OAAO,GAAG,KAAK,CAAC;oBACtC,CAAC;oBACD,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC;gBAChC,CAAC;YACH,CAAC;QACH,CAAC;QAED,gDAAgD;QAChD,MAAM,MAAM,GAAG,GAAG,GAAG,MAAM,CAAC;QAE5B,wBAAwB;QACxB,KAAK,MAAM,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,EAAE,CAAC;YACrD,IAAI,OAAO,CAAC,SAAS,GAAG,MAAM,EAAE,CAAC;gBAC/B,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YAC5B,CAAC;QACH,CAAC;QAED,yBAAyB;QACzB,KAAK,MAAM,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE,EAAE,CAAC;YAC5D,IAAI,OAAO,CAAC,SAAS,GAAG,MAAM,EAAE,CAAC;gBAC/B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YACnC,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,KAAK,MAAM,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;YACvD,IAAI,OAAO,CAAC,SAAS,GAAG,MAAM,EAAE,CAAC;gBAC/B,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YAC9B,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,KAAK,MAAM,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,EAAE,CAAC;YAC3D,IAAI,OAAO,CAAC,SAAS,GAAG,MAAM,EAAE,CAAC;gBAC/B,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YAClC,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,IAAI,CAAC,WAAW,EAAE,CAAC;IACrB,CAAC;IAED;;;;;;;;OAQG;IACI,iBAAiB,CAAC,KAAa,EAAE,EAAU,EAAE,UAAkB,EAAE,OAAgB,EAAE,MAAe;QACvG,yBAAyB;QACzB,IAAI,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,EAAE,CAAC;YACzB,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,eAAe;gBACvB,OAAO,EAAE,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC;aACtC,CAAC;QACJ,CAAC;QAED,kCAAkC;QAClC,MAAM,YAAY,GAAG,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC;QACzD,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,OAAO,YAAY,CAAC;QACtB,CAAC;QAED,sDAAsD;QACtD,IAAI,OAAO,EAAE,CAAC;YACZ,MAAM,aAAa,GAAG,IAAI,CAAC,wBAAwB,CAAC,OAAO,CAAC,CAAC;YAC7D,IAAI,CAAC,aAAa,CAAC,OAAO,EAAE,CAAC;gBAC3B,OAAO,aAAa,CAAC;YACvB,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,YAAY,GAAG,IAAI,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;YAC1D,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;gBAC1B,OAAO,YAAY,CAAC;YACtB,CAAC;QACH,CAAC;QAED,0BAA0B;QAC1B,MAAM,QAAQ,GAAG,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC,CAAC;QAC9C,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;YACtB,OAAO,QAAQ,CAAC;QAClB,CAAC;QAED,wBAAwB;QACxB,MAAM,eAAe,GAAG,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,UAAU,EAAE,OAAO,EAAE,MAAM,CAAC,CAAC;QACrF,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE,CAAC;YAC7B,OAAO,eAAe,CAAC;QACzB,CAAC;QAED,oBAAoB;QACpB,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACK,uBAAuB,CAAC,KAAa;QAC3C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,oBAAqB,CAAC;QAEvD,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3B,CAAC;QAED,wBAAwB;QACxB,MAAM,GAAG,GAAG,QAAQ,CAAC;QACrB,IAAI,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAErC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG;gBACR,KAAK,EAAE,CAAC;gBACR,SAAS,EAAE,GAAG;gBACd,UAAU,EAAE,CAAC;gBACb,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;aACf,CAAC;YACF,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAClC,CAAC;QAED,qCAAqC;QACrC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,KAAK,GAAG,CAAC,CAAC;YAClB,OAAO,CAAC,SAAS,GAAG,GAAG,CAAC;QAC1B,CAAC;QAED,6BAA6B;QAC7B,IAAI,OAAO,CAAC,KAAK,IAAI,KAAK,EAAE,CAAC;YAC3B,uBAAuB;YACvB,MAAM,OAAO,GAAG,KAAK,GAAG,CAAC,GAAG,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC;YAElD,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,oCAAoC;gBAC5C,KAAK;gBACL,OAAO,EAAE,OAAO,CAAC,KAAK;gBACtB,OAAO;aACR,CAAC;QACJ,CAAC;QAED,oBAAoB;QACpB,OAAO,CAAC,KAAK,EAAE,CAAC;QAEhB,oBAAoB;QACpB,IAAI,CAAC,WAAW,EAAE,CAAC;QAEnB,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAAC,OAAe;QAC9C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,2CAA2C;QAC3C,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,OAAO,CAAC,CAAC;QACtD,MAAM,KAAK,GAAG,aAAa,EAAE,oBAAoB,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,oBAAqB,CAAC;QAE9F,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3B,CAAC;QAED,wBAAwB;QACxB,IAAI,OAAO,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;QAEhD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG;gBACR,KAAK,EAAE,CAAC;gBACR,SAAS,EAAE,GAAG;gBACd,UAAU,EAAE,CAAC;gBACb,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;aACf,CAAC;YACF,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC;YAE3C,qCAAqC;YACrC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,CAAC,EAAE,CAAC;gBACnC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,CAAC,GAAG;oBAC9B,iBAAiB,EAAE,CAAC;oBACpB,aAAa,EAAE,CAAC;oBAChB,YAAY,EAAE,CAAC;iBAChB,CAAC;YACJ,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,KAAK,GAAG,CAAC,CAAC;YAClB,OAAO,CAAC,SAAS,GAAG,GAAG,CAAC;QAC1B,CAAC;QAED,6BAA6B;QAC7B,IAAI,OAAO,CAAC,KAAK,IAAI,KAAK,EAAE,CAAC;YAC3B,uBAAuB;YACvB,MAAM,OAAO,GAAG,KAAK,GAAG,CAAC,GAAG,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC;YAElD,oBAAoB;YACpB,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,YAAY,EAAE,CAAC;YAC7C,IAAI,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC;YAE1B,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,YAAY,OAAO,+BAA+B;gBAC1D,KAAK;gBACL,OAAO,EAAE,OAAO,CAAC,KAAK;gBACtB,OAAO;aACR,CAAC;QACJ,CAAC;QAED,oBAAoB;QACpB,OAAO,CAAC,KAAK,EAAE,CAAC;QAEhB,oBAAoB;QACpB,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,iBAAiB,GAAG,OAAO,CAAC,KAAK,CAAC;QAChE,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,aAAa,EAAE,CAAC;QAE9C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACK,uBAAuB,CAAC,MAAc;QAC5C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,0CAA0C;QAC1C,MAAM,YAAY,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,KAAK,GAAG,YAAY,EAAE,oBAAoB,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,oBAAqB,CAAC;QAE7F,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3B,CAAC;QAED,wBAAwB;QACxB,IAAI,OAAO,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QAE9C,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG;gBACR,KAAK,EAAE,CAAC;gBACR,SAAS,EAAE,GAAG;gBACd,UAAU,EAAE,CAAC;gBACb,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;aACf,CAAC;YACF,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC3C,CAAC;QAED,qCAAqC;QACrC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,KAAK,GAAG,CAAC,CAAC;YAClB,OAAO,CAAC,SAAS,GAAG,GAAG,CAAC;QAC1B,CAAC;QAED,6BAA6B;QAC7B,IAAI,OAAO,CAAC,KAAK,IAAI,KAAK,EAAE,CAAC;YAC3B,uBAAuB;YACvB,MAAM,OAAO,GAAG,KAAK,GAAG,CAAC,GAAG,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC;YAElD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,MAAM,yBAAyB,OAAO,CAAC,KAAK,IAAI,KAAK,sBAAsB,CAAC,CAAC;YAE1G,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,WAAW,MAAM,+BAA+B;gBACxD,KAAK;gBACL,OAAO,EAAE,OAAO,CAAC,KAAK;gBACtB,OAAO;aACR,CAAC;QACJ,CAAC;QAED,oBAAoB;QACpB,OAAO,CAAC,KAAK,EAAE,CAAC;QAEhB,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACK,mBAAmB,CAAC,EAAU;QACpC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,sCAAsC;QACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,CAAC;QACvC,MAAM,KAAK,GAAG,QAAQ,EAAE,oBAAoB,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,oBAAqB,CAAC;QAEzF,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3B,CAAC;QAED,wBAAwB;QACxB,IAAI,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAEtC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG;gBACR,KAAK,EAAE,CAAC;gBACR,SAAS,EAAE,GAAG;gBACd,UAAU,EAAE,CAAC;gBACb,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;aACf,CAAC;YACF,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC;YAEjC,gCAAgC;YAChC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;gBACzB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,GAAG;oBACpB,iBAAiB,EAAE,CAAC;oBACpB,aAAa,EAAE,CAAC;oBAChB,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,CAAC;oBACd,MAAM,EAAE,CAAC;oBACT,YAAY,EAAE,CAAC;oBACf,OAAO,EAAE,KAAK;iBACf,CAAC;YACJ,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,KAAK,GAAG,CAAC,CAAC;YAClB,OAAO,CAAC,SAAS,GAAG,GAAG,CAAC;QAC1B,CAAC;QAED,6BAA6B;QAC7B,IAAI,OAAO,CAAC,KAAK,IAAI,KAAK,EAAE,CAAC;YAC3B,uBAAuB;YACvB,MAAM,OAAO,GAAG,KAAK,GAAG,CAAC,GAAG,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC;YAElD,oBAAoB;YACpB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,YAAY,EAAE,CAAC;YACnC,IAAI,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC;YAE1B,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,MAAM,EAAE,8BAA8B;gBAC9C,KAAK;gBACL,OAAO,EAAE,OAAO,CAAC,KAAK;gBACtB,OAAO;aACR,CAAC;QACJ,CAAC;QAED,oBAAoB;QACpB,OAAO,CAAC,KAAK,EAAE,CAAC;QAEhB,oBAAoB;QACpB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,iBAAiB,GAAG,OAAO,CAAC,KAAK,CAAC;QACtD,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,aAAa,EAAE,CAAC;QAEpC,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;;;;;OAMG;IACK,mBAAmB,CAAC,KAAa,EAAE,UAAkB,EAAE,OAAgB,EAAE,MAAe;QAC9F,wCAAwC;QACxC,IAAI,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,uBAAwB,CAAC;QAExD,+BAA+B;QAC/B,IAAI,OAAO,IAAI,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,OAAO,CAAC,EAAE,uBAAuB,EAAE,CAAC;YACxE,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,uBAAwB,CAAC;QACjE,CAAC;QAED,6DAA6D;QAC7D,IAAI,MAAM,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC,MAAM,CAAC,EAAE,uBAAuB,EAAE,CAAC;YACrE,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,uBAAwB,CAAC;QAC/D,CAAC;QAED,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3B,CAAC;QAED,6BAA6B;QAC7B,IAAI,UAAU,GAAG,KAAK,EAAE,CAAC;YACvB,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,0BAA0B;gBAClC,KAAK;gBACL,OAAO,EAAE,UAAU;aACpB,CAAC;QACJ,CAAC;QAED,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,EAAU;QAChC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,yBAAyB;QACzB,IAAI,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,EAAE,CAAC;YACzB,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,eAAe;gBACvB,OAAO,EAAE,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC;aACtC,CAAC;QACJ,CAAC;QAED,sCAAsC;QACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,CAAC;QACvC,MAAM,KAAK,GAAG,QAAQ,EAAE,mBAAmB,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,mBAAoB,CAAC;QAEvF,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;QAC3B,CAAC;QAED,wBAAwB;QACxB,IAAI,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAEtC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG;gBACR,KAAK,EAAE,CAAC;gBACR,SAAS,EAAE,GAAG;gBACd,UAAU,EAAE,CAAC;gBACb,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;aACf,CAAC;YACF,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC;YAEjC,gCAAgC;YAChC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;gBACzB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,GAAG;oBACpB,iBAAiB,EAAE,CAAC;oBACpB,aAAa,EAAE,CAAC;oBAChB,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,CAAC;oBACd,MAAM,EAAE,CAAC;oBACT,YAAY,EAAE,CAAC;oBACf,OAAO,EAAE,KAAK;iBACf,CAAC;YACJ,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,WAAW,GAAG,CAAC,CAAC;YACxB,OAAO,CAAC,SAAS,GAAG,GAAG,CAAC;QAC1B,CAAC;QAED,6BAA6B;QAC7B,IAAI,OAAO,CAAC,WAAW,IAAI,KAAK,EAAE,CAAC;YACjC,uBAAuB;YACvB,MAAM,OAAO,GAAG,KAAK,GAAG,CAAC,GAAG,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC;YAElD,oBAAoB;YACpB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,YAAY,EAAE,CAAC;YACnC,IAAI,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC;YAE1B,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,MAAM,EAAE,iCAAiC;gBACjD,KAAK;gBACL,OAAO,EAAE,OAAO,CAAC,WAAW;gBAC5B,OAAO;aACR,CAAC;QACJ,CAAC;QAED,oBAAoB;QACpB,OAAO,CAAC,WAAW,EAAE,CAAC;QAEtB,oBAAoB;QACpB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,WAAW,GAAG,OAAO,CAAC,WAAW,CAAC;QAEtD,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;;;OAIG;IACI,WAAW,CAAC,EAAU;QAC3B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,sCAAsC;QACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,CAAC;QACvC,MAAM,KAAK,GAAG,QAAQ,EAAE,cAAc,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,cAAe,CAAC;QAE7E,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,IAAI,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAEtC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG;gBACR,KAAK,EAAE,CAAC;gBACR,SAAS,EAAE,GAAG;gBACd,UAAU,EAAE,CAAC;gBACb,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;aACf,CAAC;YACF,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC;YAEjC,gCAAgC;YAChC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;gBACzB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,GAAG;oBACpB,iBAAiB,EAAE,CAAC;oBACpB,aAAa,EAAE,CAAC;oBAChB,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,CAAC;oBACd,MAAM,EAAE,CAAC;oBACT,YAAY,EAAE,CAAC;oBACf,OAAO,EAAE,KAAK;iBACf,CAAC;YACJ,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,MAAM,GAAG,CAAC,CAAC;YACnB,OAAO,CAAC,SAAS,GAAG,GAAG,CAAC;QAC1B,CAAC;QAED,oBAAoB;QACpB,OAAO,CAAC,MAAM,EAAE,CAAC;QAEjB,oBAAoB;QACpB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;QAE5C,6BAA6B;QAC7B,IAAI,OAAO,CAAC,MAAM,IAAI,KAAK,EAAE,CAAC;YAC5B,eAAe;YACf,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC;YAEjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,EAAE,qCAAqC,OAAO,CAAC,MAAM,IAAI,KAAK,GAAG,CAAC,CAAC;YAE5F,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;gBACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;gBAC5B,IAAI,EAAE,iBAAiB,CAAC,aAAa;gBACrC,OAAO,EAAE,oCAAoC;gBAC7C,SAAS,EAAE,EAAE;gBACb,OAAO,EAAE;oBACP,MAAM,EAAE,OAAO,CAAC,MAAM;oBACtB,KAAK;iBACN;gBACD,OAAO,EAAE,KAAK;aACf,CAAC,CAAC;YAEH,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,EAAU;QACjC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,sCAAsC;QACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,CAAC;QACvC,MAAM,KAAK,GAAG,QAAQ,EAAE,oBAAoB,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,oBAAqB,CAAC;QAEzF,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,IAAI,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAEtC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG;gBACR,KAAK,EAAE,CAAC;gBACR,SAAS,EAAE,GAAG;gBACd,UAAU,EAAE,CAAC;gBACb,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;aACf,CAAC;YACF,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC;YAEjC,gCAAgC;YAChC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;gBACzB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,GAAG;oBACpB,iBAAiB,EAAE,CAAC;oBACpB,aAAa,EAAE,CAAC;oBAChB,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,CAAC;oBACd,MAAM,EAAE,CAAC;oBACT,YAAY,EAAE,CAAC;oBACf,OAAO,EAAE,KAAK;iBACf,CAAC;YACJ,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,YAAY,GAAG,CAAC,CAAC;YACzB,OAAO,CAAC,SAAS,GAAG,GAAG,CAAC;QAC1B,CAAC;QAED,oBAAoB;QACpB,OAAO,CAAC,YAAY,EAAE,CAAC;QAEvB,oBAAoB;QACpB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,YAAY,GAAG,OAAO,CAAC,YAAY,CAAC;QAExD,6BAA6B;QAC7B,IAAI,OAAO,CAAC,YAAY,IAAI,KAAK,EAAE,CAAC;YAClC,eAAe;YACf,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC;YAEjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,EAAE,sDAAsD,OAAO,CAAC,YAAY,IAAI,KAAK,GAAG,CAAC,CAAC;YAEnH,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;gBACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;gBAC5B,IAAI,EAAE,iBAAiB,CAAC,cAAc;gBACtC,OAAO,EAAE,qDAAqD;gBAC9D,SAAS,EAAE,EAAE;gBACb,OAAO,EAAE;oBACP,YAAY,EAAE,OAAO,CAAC,YAAY;oBAClC,KAAK;iBACN;gBACD,OAAO,EAAE,KAAK;aACf,CAAC,CAAC;YAEH,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACI,OAAO,CAAC,EAAU,EAAE,QAAiB;QAC1C,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YACxB,IAAI,CAAC,MAAM,CAAC,MAAM,GAAG,EAAE,CAAC;QAC1B,CAAC;QAED,wBAAwB;QACxB,MAAM,MAAM,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,CAAC,QAAQ,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa,IAAI,OAAO,CAAC,CAAC;QACtF,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,GAAG,MAAM,CAAC;QAEhC,oBAAoB;QACpB,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;YACzB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,GAAG;gBACpB,iBAAiB,EAAE,CAAC;gBACpB,aAAa,EAAE,CAAC;gBAChB,YAAY,EAAE,CAAC;gBACf,WAAW,EAAE,CAAC;gBACd,MAAM,EAAE,CAAC;gBACT,YAAY,EAAE,CAAC;gBACf,OAAO,EAAE,KAAK;aACf,CAAC;QACJ,CAAC;QACD,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,OAAO,GAAG,IAAI,CAAC;QACnC,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC;QAE9B,aAAa;QACb,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE;YACrB,EAAE;YACF,MAAM;YACN,QAAQ,EAAE,QAAQ,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa;SACvD,CAAC,CAAC;QAEH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,EAAE,kBAAkB,IAAI,IAAI,CAAC,MAAM,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;IACjF,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,EAAU;QACzB,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YACxB,OAAO;QACT,CAAC;QAED,eAAe;QACf,OAAO,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAE9B,oBAAoB;QACpB,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;YACxB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,OAAO,GAAG,KAAK,CAAC;YACpC,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC;QAChC,CAAC;QAED,aAAa;QACb,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;QAEjC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,EAAE,YAAY,CAAC,CAAC;IAC3C,CAAC;IAED;;;OAGG;IACI,WAAW,CAAC,EAAU;QAC3B,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YACxB,OAAO,KAAK,CAAC;QACf,CAAC;QAED,2BAA2B;QAC3B,IAAI,CAAC,CAAC,EAAE,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;YAChC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,6BAA6B;QAC7B,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACtC,IAAI,MAAM,IAAI,IAAI,CAAC,GAAG,EAAE,EAAE,CAAC;YACzB,uBAAuB;YACvB,OAAO,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAE9B,oBAAoB;YACpB,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;gBACxB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,OAAO,GAAG,KAAK,CAAC;gBACpC,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC;YAChC,CAAC;YAED,OAAO,KAAK,CAAC;QACf,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;OAIG;IACI,mBAAmB,CAAC,EAAU;QACnC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,IAAI,CAAC,CAAC,EAAE,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;YACvD,OAAO,CAAC,CAAC;QACX,CAAC;QAED,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACtC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,OAAO,MAAM,GAAG,GAAG,CAAC,CAAC,CAAC,MAAM,GAAG,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACK,WAAW;QACjB,+BAA+B;QAC/B,IAAI,CAAC,KAAK,CAAC,cAAc,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG,IAAI,CAAC,eAAe,CAAC,IAAI,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC;QAElG,yBAAyB;QACzB,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,CAAC;IACxC,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,OAAO,EAAE,GAAG,IAAI,CAAC,KAAK,EAAE,CAAC;IAC3B,CAAC;IAED;;;OAGG;IACI,YAAY,CAAC,MAAwC;QAC1D,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;YAClB,IAAI,CAAC,MAAM,CAAC,MAAM,GAAG;gBACnB,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM;gBACrB,GAAG,MAAM,CAAC,MAAM;aACjB,CAAC;QACJ,CAAC;QAED,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;YACpB,IAAI,CAAC,MAAM,CAAC,QAAQ,GAAG;gBACrB,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ;gBACvB,GAAG,MAAM,CAAC,QAAQ;aACnB,CAAC;QACJ,CAAC;QAED,IAAI,MAAM,CAAC,GAAG,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,GAAG,GAAG;gBAChB,GAAG,IAAI,CAAC,MAAM,CAAC,GAAG;gBAClB,GAAG,MAAM,CAAC,GAAG;aACd,CAAC;QACJ,CAAC;QAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;IAC3D,CAAC;IAED;;OAEG;IACI,SAAS;QACd,OAAO,EAAE,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;IAC5B,CAAC;IAED;;;;;OAKG;IACI,iBAAiB,CAAC,MAAc,EAAE,MAAwB;QAC/D,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YACzB,IAAI,CAAC,MAAM,CAAC,OAAO,GAAG,EAAE,CAAC;QAC3B,CAAC;QAED,mDAAmD;QACnD,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG;YAC5B,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC;YAC9B,GAAG,MAAM;SACV,CAAC;QAEF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,MAAM,GAAG,EAAE,MAAM,CAAC,CAAC;IAC1E,CAAC;IAED;;;OAGG;IACI,kBAAkB,CAAC,MAAc;QACtC,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC;YACvD,OAAO,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;YACnC,0BAA0B;YAC1B,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACnC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,MAAM,EAAE,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,eAAe,CAAC,MAAc;QACnC,OAAO,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC,MAAM,CAAC,CAAC;IACvC,CAAC;CACF"}