@push.rocks/smartmta 5.1.3 → 5.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/changelog.md +15 -0
  2. package/dist_ts/00_commitinfo_data.d.ts +8 -0
  3. package/dist_ts/00_commitinfo_data.js +9 -0
  4. package/dist_ts/index.d.ts +3 -0
  5. package/dist_ts/index.js +4 -0
  6. package/dist_ts/logger.d.ts +17 -0
  7. package/dist_ts/logger.js +76 -0
  8. package/dist_ts/mail/core/classes.bouncemanager.d.ts +185 -0
  9. package/dist_ts/mail/core/classes.bouncemanager.js +569 -0
  10. package/dist_ts/mail/core/classes.email.d.ts +291 -0
  11. package/dist_ts/mail/core/classes.email.js +802 -0
  12. package/dist_ts/mail/core/classes.emailvalidator.d.ts +61 -0
  13. package/dist_ts/mail/core/classes.emailvalidator.js +184 -0
  14. package/dist_ts/mail/core/classes.templatemanager.d.ts +95 -0
  15. package/dist_ts/mail/core/classes.templatemanager.js +240 -0
  16. package/dist_ts/mail/core/index.d.ts +4 -0
  17. package/dist_ts/mail/core/index.js +6 -0
  18. package/dist_ts/mail/delivery/classes.delivery.queue.d.ts +163 -0
  19. package/dist_ts/mail/delivery/classes.delivery.queue.js +488 -0
  20. package/dist_ts/mail/delivery/classes.delivery.system.d.ts +160 -0
  21. package/dist_ts/mail/delivery/classes.delivery.system.js +630 -0
  22. package/dist_ts/mail/delivery/classes.unified.rate.limiter.d.ts +200 -0
  23. package/dist_ts/mail/delivery/classes.unified.rate.limiter.js +820 -0
  24. package/dist_ts/mail/delivery/index.d.ts +4 -0
  25. package/dist_ts/mail/delivery/index.js +6 -0
  26. package/dist_ts/mail/delivery/interfaces.d.ts +140 -0
  27. package/dist_ts/mail/delivery/interfaces.js +17 -0
  28. package/dist_ts/mail/index.d.ts +7 -0
  29. package/dist_ts/mail/index.js +12 -0
  30. package/dist_ts/mail/routing/classes.dkim.manager.d.ts +25 -0
  31. package/dist_ts/mail/routing/classes.dkim.manager.js +127 -0
  32. package/dist_ts/mail/routing/classes.dns.manager.d.ts +79 -0
  33. package/dist_ts/mail/routing/classes.dns.manager.js +415 -0
  34. package/dist_ts/mail/routing/classes.domain.registry.d.ts +54 -0
  35. package/dist_ts/mail/routing/classes.domain.registry.js +119 -0
  36. package/dist_ts/mail/routing/classes.email.action.executor.d.ts +33 -0
  37. package/dist_ts/mail/routing/classes.email.action.executor.js +137 -0
  38. package/dist_ts/mail/routing/classes.email.router.d.ts +171 -0
  39. package/dist_ts/mail/routing/classes.email.router.js +494 -0
  40. package/dist_ts/mail/routing/classes.unified.email.server.d.ts +241 -0
  41. package/dist_ts/mail/routing/classes.unified.email.server.js +935 -0
  42. package/dist_ts/mail/routing/index.d.ts +7 -0
  43. package/dist_ts/mail/routing/index.js +9 -0
  44. package/dist_ts/mail/routing/interfaces.d.ts +187 -0
  45. package/dist_ts/mail/routing/interfaces.js +2 -0
  46. package/dist_ts/mail/security/classes.dkimcreator.d.ts +72 -0
  47. package/dist_ts/mail/security/classes.dkimcreator.js +360 -0
  48. package/dist_ts/mail/security/classes.spfverifier.d.ts +62 -0
  49. package/dist_ts/mail/security/classes.spfverifier.js +87 -0
  50. package/dist_ts/mail/security/index.d.ts +2 -0
  51. package/dist_ts/mail/security/index.js +4 -0
  52. package/dist_ts/paths.d.ts +14 -0
  53. package/dist_ts/paths.js +39 -0
  54. package/dist_ts/plugins.d.ts +24 -0
  55. package/dist_ts/plugins.js +28 -0
  56. package/dist_ts/security/classes.contentscanner.d.ts +130 -0
  57. package/dist_ts/security/classes.contentscanner.js +338 -0
  58. package/dist_ts/security/classes.ipreputationchecker.d.ts +73 -0
  59. package/dist_ts/security/classes.ipreputationchecker.js +263 -0
  60. package/dist_ts/security/classes.rustsecuritybridge.d.ts +403 -0
  61. package/dist_ts/security/classes.rustsecuritybridge.js +502 -0
  62. package/dist_ts/security/classes.securitylogger.d.ts +140 -0
  63. package/dist_ts/security/classes.securitylogger.js +235 -0
  64. package/dist_ts/security/index.d.ts +4 -0
  65. package/dist_ts/security/index.js +5 -0
  66. package/package.json +6 -1
  67. package/ts/00_commitinfo_data.ts +8 -0
  68. package/ts/index.ts +3 -0
  69. package/ts/logger.ts +91 -0
  70. package/ts/mail/core/classes.bouncemanager.ts +731 -0
  71. package/ts/mail/core/classes.email.ts +942 -0
  72. package/ts/mail/core/classes.emailvalidator.ts +239 -0
  73. package/ts/mail/core/classes.templatemanager.ts +320 -0
  74. package/ts/mail/core/index.ts +5 -0
  75. package/ts/mail/delivery/classes.delivery.queue.ts +645 -0
  76. package/ts/mail/delivery/classes.delivery.system.ts +816 -0
  77. package/ts/mail/delivery/classes.unified.rate.limiter.ts +1053 -0
  78. package/ts/mail/delivery/index.ts +5 -0
  79. package/ts/mail/delivery/interfaces.ts +167 -0
  80. package/ts/mail/index.ts +17 -0
  81. package/ts/mail/routing/classes.dkim.manager.ts +157 -0
  82. package/ts/mail/routing/classes.dns.manager.ts +573 -0
  83. package/ts/mail/routing/classes.domain.registry.ts +139 -0
  84. package/ts/mail/routing/classes.email.action.executor.ts +175 -0
  85. package/ts/mail/routing/classes.email.router.ts +575 -0
  86. package/ts/mail/routing/classes.unified.email.server.ts +1207 -0
  87. package/ts/mail/routing/index.ts +9 -0
  88. package/ts/mail/routing/interfaces.ts +202 -0
  89. package/ts/mail/security/classes.dkimcreator.ts +447 -0
  90. package/ts/mail/security/classes.spfverifier.ts +126 -0
  91. package/ts/mail/security/index.ts +3 -0
  92. package/ts/paths.ts +48 -0
  93. package/ts/plugins.ts +53 -0
  94. package/ts/security/classes.contentscanner.ts +400 -0
  95. package/ts/security/classes.ipreputationchecker.ts +315 -0
  96. package/ts/security/classes.rustsecuritybridge.ts +964 -0
  97. package/ts/security/classes.securitylogger.ts +299 -0
  98. package/ts/security/index.ts +40 -0
@@ -0,0 +1,935 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import * as paths from '../../paths.js';
3
+ import { EventEmitter } from 'events';
4
+ import { logger } from '../../logger.js';
5
+ import { SecurityLogger, SecurityLogLevel, SecurityEventType } from '../../security/index.js';
6
+ import { DKIMCreator } from '../security/classes.dkimcreator.js';
7
+ import { RustSecurityBridge } from '../../security/classes.rustsecuritybridge.js';
8
+ import { EmailRouter } from './classes.email.router.js';
9
+ import { Email } from '../core/classes.email.js';
10
+ import { DomainRegistry } from './classes.domain.registry.js';
11
+ import { DnsManager } from './classes.dns.manager.js';
12
+ import { BounceManager, BounceType, BounceCategory } from '../core/classes.bouncemanager.js';
13
+ import { MultiModeDeliverySystem } from '../delivery/classes.delivery.system.js';
14
+ import { UnifiedDeliveryQueue } from '../delivery/classes.delivery.queue.js';
15
+ import { UnifiedRateLimiter } from '../delivery/classes.unified.rate.limiter.js';
16
+ import { SmtpState } from '../delivery/interfaces.js';
17
+ import { EmailActionExecutor } from './classes.email.action.executor.js';
18
+ import { DkimManager } from './classes.dkim.manager.js';
19
+ /**
20
+ * Unified email server that handles all email traffic with pattern-based routing
21
+ */
22
+ export class UnifiedEmailServer extends EventEmitter {
23
+ dcRouter;
24
+ options;
25
+ emailRouter;
26
+ domainRegistry;
27
+ servers = [];
28
+ stats;
29
+ // Add components needed for sending and securing emails
30
+ dkimCreator;
31
+ rustBridge;
32
+ bounceManager;
33
+ deliveryQueue;
34
+ deliverySystem;
35
+ rateLimiter; // TODO: Implement rate limiting in SMTP server handlers
36
+ // Extracted subsystems
37
+ actionExecutor;
38
+ dkimManager;
39
+ constructor(dcRouter, options) {
40
+ super();
41
+ this.dcRouter = dcRouter;
42
+ // Set default options
43
+ this.options = {
44
+ ...options,
45
+ banner: options.banner || `${options.hostname} ESMTP UnifiedEmailServer`,
46
+ maxMessageSize: options.maxMessageSize || 10 * 1024 * 1024, // 10MB
47
+ maxClients: options.maxClients || 100,
48
+ maxConnections: options.maxConnections || 1000,
49
+ connectionTimeout: options.connectionTimeout || 60000, // 1 minute
50
+ socketTimeout: options.socketTimeout || 60000 // 1 minute
51
+ };
52
+ // Initialize Rust security bridge (singleton)
53
+ this.rustBridge = RustSecurityBridge.getInstance();
54
+ // Initialize DKIM creator with storage manager
55
+ this.dkimCreator = new DKIMCreator(paths.keysDir, dcRouter.storageManager);
56
+ // Initialize bounce manager with storage manager
57
+ this.bounceManager = new BounceManager({
58
+ maxCacheSize: 10000,
59
+ cacheTTL: 30 * 24 * 60 * 60 * 1000, // 30 days
60
+ storageManager: dcRouter.storageManager
61
+ });
62
+ // Initialize domain registry
63
+ this.domainRegistry = new DomainRegistry(options.domains, options.defaults);
64
+ // Initialize email router with routes and storage manager
65
+ this.emailRouter = new EmailRouter(options.routes || [], {
66
+ storageManager: dcRouter.storageManager,
67
+ persistChanges: true
68
+ });
69
+ // Initialize rate limiter
70
+ this.rateLimiter = new UnifiedRateLimiter(options.rateLimits || {
71
+ global: {
72
+ maxConnectionsPerIP: 10,
73
+ maxMessagesPerMinute: 100,
74
+ maxRecipientsPerMessage: 50,
75
+ maxErrorsPerIP: 10,
76
+ maxAuthFailuresPerIP: 5,
77
+ blockDuration: 300000 // 5 minutes
78
+ }
79
+ });
80
+ // Initialize delivery components
81
+ const queueOptions = {
82
+ storageType: 'memory', // Default to memory storage
83
+ maxRetries: 3,
84
+ baseRetryDelay: 300000, // 5 minutes
85
+ maxRetryDelay: 3600000 // 1 hour
86
+ };
87
+ this.deliveryQueue = new UnifiedDeliveryQueue(queueOptions);
88
+ const deliveryOptions = {
89
+ globalRateLimit: 100, // Default to 100 emails per minute
90
+ concurrentDeliveries: 10,
91
+ processBounces: true,
92
+ bounceHandler: {
93
+ processSmtpFailure: this.processSmtpFailure.bind(this)
94
+ },
95
+ onDeliverySuccess: async (_item, _result) => {
96
+ // Delivery success recorded via delivery system
97
+ }
98
+ };
99
+ this.deliverySystem = new MultiModeDeliverySystem(this.deliveryQueue, deliveryOptions, this);
100
+ // Initialize action executor
101
+ this.actionExecutor = new EmailActionExecutor({
102
+ sendOutboundEmail: this.sendOutboundEmail.bind(this),
103
+ bounceManager: this.bounceManager,
104
+ deliveryQueue: this.deliveryQueue,
105
+ });
106
+ // Initialize DKIM manager
107
+ this.dkimManager = new DkimManager(this.dkimCreator, this.domainRegistry, dcRouter, this.rustBridge);
108
+ // Initialize statistics
109
+ this.stats = {
110
+ startTime: new Date(),
111
+ connections: {
112
+ current: 0,
113
+ total: 0
114
+ },
115
+ messages: {
116
+ processed: 0,
117
+ delivered: 0,
118
+ failed: 0
119
+ },
120
+ processingTime: {
121
+ avg: 0,
122
+ max: 0,
123
+ min: 0
124
+ }
125
+ };
126
+ // We'll create the SMTP servers during the start() method
127
+ }
128
+ /**
129
+ * Send an outbound email via the Rust SMTP client.
130
+ * Uses connection pooling in the Rust binary for efficiency.
131
+ */
132
+ async sendOutboundEmail(host, port, email, options) {
133
+ // Build DKIM config if domain has keys
134
+ let dkim;
135
+ if (options?.dkimDomain) {
136
+ try {
137
+ const { privateKey } = await this.dkimCreator.readDKIMKeys(options.dkimDomain);
138
+ dkim = { domain: options.dkimDomain, selector: options.dkimSelector || 'default', privateKey };
139
+ }
140
+ catch (err) {
141
+ logger.log('warn', `Failed to read DKIM keys for ${options.dkimDomain}: ${err.message}`);
142
+ }
143
+ }
144
+ // Serialize the Email to the outbound format
145
+ const outboundEmail = {
146
+ from: email.from,
147
+ to: email.to,
148
+ cc: email.cc || [],
149
+ bcc: email.bcc || [],
150
+ subject: email.subject || '',
151
+ text: email.text || '',
152
+ html: email.html || undefined,
153
+ headers: email.headers || {},
154
+ };
155
+ return this.rustBridge.sendOutboundEmail({
156
+ host,
157
+ port,
158
+ secure: port === 465,
159
+ domain: this.options.hostname,
160
+ auth: options?.auth,
161
+ email: outboundEmail,
162
+ dkim,
163
+ connectionTimeoutSecs: Math.floor((this.options.outbound?.connectionTimeout || 30000) / 1000),
164
+ socketTimeoutSecs: Math.floor((this.options.outbound?.socketTimeout || 120000) / 1000),
165
+ poolKey: `${host}:${port}`,
166
+ maxPoolConnections: this.options.outbound?.maxConnections || 10,
167
+ tlsOpportunistic: options?.tlsOpportunistic ?? (port === 25),
168
+ });
169
+ }
170
+ /**
171
+ * Start the unified email server
172
+ */
173
+ async start() {
174
+ logger.log('info', `Starting UnifiedEmailServer on ports: ${this.options.ports.join(', ')}`);
175
+ try {
176
+ await this.startDeliveryPipeline();
177
+ await this.startRustBridge();
178
+ await this.initializeDkimAndDns();
179
+ this.registerBridgeEventHandlers();
180
+ await this.startSmtpServer();
181
+ logger.log('info', 'UnifiedEmailServer started successfully');
182
+ this.emit('started');
183
+ }
184
+ catch (error) {
185
+ logger.log('error', `Failed to start UnifiedEmailServer: ${error.message}`);
186
+ throw error;
187
+ }
188
+ }
189
+ async startDeliveryPipeline() {
190
+ await this.deliveryQueue.initialize();
191
+ logger.log('info', 'Email delivery queue initialized');
192
+ await this.deliverySystem.start();
193
+ logger.log('info', 'Email delivery system started');
194
+ }
195
+ async startRustBridge() {
196
+ const bridgeOk = await this.rustBridge.start();
197
+ if (!bridgeOk) {
198
+ throw new Error('Rust security bridge failed to start. The mailer-bin binary is required. Run "pnpm build" to compile it.');
199
+ }
200
+ logger.log('info', 'Rust security bridge started — Rust is the primary security backend');
201
+ this.rustBridge.on('stateChange', ({ oldState, newState }) => {
202
+ if (newState === 'failed')
203
+ this.emit('bridgeFailed');
204
+ else if (newState === 'restarting')
205
+ this.emit('bridgeRestarting');
206
+ else if (newState === 'running' && oldState === 'restarting')
207
+ this.emit('bridgeRecovered');
208
+ });
209
+ }
210
+ async initializeDkimAndDns() {
211
+ await this.dkimManager.setupDkimForDomains();
212
+ logger.log('info', 'DKIM configuration completed for all domains');
213
+ const dnsManager = new DnsManager(this.dcRouter);
214
+ await dnsManager.ensureDnsRecords(this.domainRegistry.getAllConfigs(), this.dkimCreator);
215
+ logger.log('info', 'DNS records ensured for all configured domains');
216
+ this.applyDomainRateLimits();
217
+ logger.log('info', 'Per-domain rate limits configured');
218
+ await this.dkimManager.checkAndRotateDkimKeys();
219
+ logger.log('info', 'DKIM key rotation check completed');
220
+ }
221
+ registerBridgeEventHandlers() {
222
+ this.rustBridge.onEmailReceived(async (data) => {
223
+ try {
224
+ await this.handleRustEmailReceived(data);
225
+ }
226
+ catch (err) {
227
+ logger.log('error', `Error handling email from Rust SMTP: ${err.message}`);
228
+ try {
229
+ await this.rustBridge.sendEmailProcessingResult({
230
+ correlationId: data.correlationId,
231
+ accepted: false,
232
+ smtpCode: 451,
233
+ smtpMessage: 'Internal processing error',
234
+ });
235
+ }
236
+ catch (sendErr) {
237
+ logger.log('warn', `Could not send rejection back to Rust: ${sendErr.message}`);
238
+ }
239
+ }
240
+ });
241
+ this.rustBridge.onAuthRequest(async (data) => {
242
+ try {
243
+ await this.handleRustAuthRequest(data);
244
+ }
245
+ catch (err) {
246
+ logger.log('error', `Error handling auth from Rust SMTP: ${err.message}`);
247
+ try {
248
+ await this.rustBridge.sendAuthResult({
249
+ correlationId: data.correlationId,
250
+ success: false,
251
+ message: 'Internal auth error',
252
+ });
253
+ }
254
+ catch (sendErr) {
255
+ logger.log('warn', `Could not send auth rejection back to Rust: ${sendErr.message}`);
256
+ }
257
+ }
258
+ });
259
+ this.rustBridge.onScramCredentialRequest(async (data) => {
260
+ try {
261
+ await this.handleScramCredentialRequest(data);
262
+ }
263
+ catch (err) {
264
+ logger.log('error', `Error handling SCRAM credential request: ${err.message}`);
265
+ try {
266
+ await this.rustBridge.sendScramCredentialResult({
267
+ correlationId: data.correlationId,
268
+ found: false,
269
+ });
270
+ }
271
+ catch (sendErr) {
272
+ logger.log('warn', `Could not send SCRAM credential rejection: ${sendErr.message}`);
273
+ }
274
+ }
275
+ });
276
+ }
277
+ async startSmtpServer() {
278
+ const hasTlsConfig = this.options.tls?.keyPath && this.options.tls?.certPath;
279
+ let tlsCertPem;
280
+ let tlsKeyPem;
281
+ if (hasTlsConfig) {
282
+ try {
283
+ tlsKeyPem = plugins.fs.readFileSync(this.options.tls.keyPath, 'utf8');
284
+ tlsCertPem = plugins.fs.readFileSync(this.options.tls.certPath, 'utf8');
285
+ logger.log('info', 'TLS certificates loaded successfully');
286
+ }
287
+ catch (error) {
288
+ logger.log('warn', `Failed to load TLS certificates: ${error.message}`);
289
+ }
290
+ }
291
+ const smtpPorts = this.options.ports.filter(p => p !== 465);
292
+ const securePort = this.options.ports.find(p => p === 465);
293
+ const started = await this.rustBridge.startSmtpServer({
294
+ hostname: this.options.hostname,
295
+ ports: smtpPorts,
296
+ securePort: securePort,
297
+ tlsCertPem,
298
+ tlsKeyPem,
299
+ maxMessageSize: this.options.maxMessageSize || 10 * 1024 * 1024,
300
+ maxConnections: this.options.maxConnections || this.options.maxClients || 100,
301
+ maxRecipients: 100,
302
+ connectionTimeoutSecs: this.options.connectionTimeout ? Math.floor(this.options.connectionTimeout / 1000) : 30,
303
+ dataTimeoutSecs: 60,
304
+ authEnabled: !!this.options.auth?.required || !!(this.options.auth?.users?.length),
305
+ maxAuthFailures: 3,
306
+ socketTimeoutSecs: this.options.socketTimeout ? Math.floor(this.options.socketTimeout / 1000) : 300,
307
+ processingTimeoutSecs: 30,
308
+ rateLimits: this.options.rateLimits ? {
309
+ maxConnectionsPerIp: this.options.rateLimits.global?.maxConnectionsPerIP || 50,
310
+ maxMessagesPerSender: this.options.rateLimits.global?.maxMessagesPerMinute || 100,
311
+ maxAuthFailuresPerIp: this.options.rateLimits.global?.maxAuthFailuresPerIP || 5,
312
+ windowSecs: 60,
313
+ } : undefined,
314
+ });
315
+ if (!started) {
316
+ throw new Error('Failed to start Rust SMTP server');
317
+ }
318
+ logger.log('info', `Rust SMTP server listening on ports: ${smtpPorts.join(', ')}${securePort ? ` + ${securePort} (TLS)` : ''}`);
319
+ }
320
+ /**
321
+ * Stop the unified email server
322
+ */
323
+ async stop() {
324
+ logger.log('info', 'Stopping UnifiedEmailServer');
325
+ try {
326
+ // Stop the Rust SMTP server first
327
+ try {
328
+ await this.rustBridge.stopSmtpServer();
329
+ logger.log('info', 'Rust SMTP server stopped');
330
+ }
331
+ catch (err) {
332
+ logger.log('warn', `Error stopping Rust SMTP server: ${err.message}`);
333
+ }
334
+ // Clear the servers array - servers will be garbage collected
335
+ this.servers = [];
336
+ // Remove bridge state change listener and stop bridge
337
+ this.rustBridge.removeAllListeners('stateChange');
338
+ await this.rustBridge.stop();
339
+ // Stop the delivery system
340
+ if (this.deliverySystem) {
341
+ await this.deliverySystem.stop();
342
+ logger.log('info', 'Email delivery system stopped');
343
+ }
344
+ // Shut down the delivery queue
345
+ if (this.deliveryQueue) {
346
+ await this.deliveryQueue.shutdown();
347
+ logger.log('info', 'Email delivery queue shut down');
348
+ }
349
+ // Close all Rust SMTP client connection pools
350
+ try {
351
+ await this.rustBridge.closeSmtpPool();
352
+ }
353
+ catch {
354
+ // Bridge may already be stopped
355
+ }
356
+ logger.log('info', 'UnifiedEmailServer stopped successfully');
357
+ this.emit('stopped');
358
+ }
359
+ catch (error) {
360
+ logger.log('error', `Error stopping UnifiedEmailServer: ${error.message}`);
361
+ throw error;
362
+ }
363
+ }
364
+ // -----------------------------------------------------------------------
365
+ // Rust SMTP server event handlers
366
+ // -----------------------------------------------------------------------
367
+ /**
368
+ * Handle an emailReceived event from the Rust SMTP server.
369
+ */
370
+ async handleRustEmailReceived(data) {
371
+ const { correlationId, mailFrom, rcptTo, remoteAddr, clientHostname, secure, authenticatedUser } = data;
372
+ logger.log('info', `Rust SMTP received email from=${mailFrom} to=${rcptTo.join(',')} remote=${remoteAddr}`);
373
+ try {
374
+ // Decode the email data
375
+ let rawMessageBuffer;
376
+ if (data.data.type === 'inline' && data.data.base64) {
377
+ rawMessageBuffer = Buffer.from(data.data.base64, 'base64');
378
+ }
379
+ else if (data.data.type === 'file' && data.data.path) {
380
+ rawMessageBuffer = plugins.fs.readFileSync(data.data.path);
381
+ // Clean up temp file
382
+ try {
383
+ plugins.fs.unlinkSync(data.data.path);
384
+ }
385
+ catch {
386
+ // Ignore cleanup errors
387
+ }
388
+ }
389
+ else {
390
+ throw new Error('Invalid email data transport');
391
+ }
392
+ // Build a session-like object for processEmailByMode
393
+ const session = {
394
+ id: data.sessionId || 'rust-' + Math.random().toString(36).substring(2),
395
+ state: SmtpState.FINISHED,
396
+ mailFrom: mailFrom,
397
+ rcptTo: rcptTo,
398
+ emailData: rawMessageBuffer.toString('utf8'),
399
+ useTLS: secure,
400
+ connectionEnded: false,
401
+ remoteAddress: remoteAddr,
402
+ clientHostname: clientHostname || '',
403
+ secure: secure,
404
+ authenticated: !!authenticatedUser,
405
+ envelope: {
406
+ mailFrom: { address: mailFrom, args: {} },
407
+ rcptTo: rcptTo.map(addr => ({ address: addr, args: {} })),
408
+ },
409
+ };
410
+ if (authenticatedUser) {
411
+ session.user = { username: authenticatedUser };
412
+ }
413
+ // Attach pre-computed security results from Rust in-process pipeline
414
+ if (data.securityResults) {
415
+ session._precomputedSecurityResults = data.securityResults;
416
+ }
417
+ // Process the email through the routing system
418
+ await this.processEmailByMode(rawMessageBuffer, session);
419
+ // Send acceptance back to Rust
420
+ await this.rustBridge.sendEmailProcessingResult({
421
+ correlationId,
422
+ accepted: true,
423
+ smtpCode: 250,
424
+ smtpMessage: '2.0.0 Message accepted for delivery',
425
+ });
426
+ }
427
+ catch (err) {
428
+ logger.log('error', `Failed to process email from Rust SMTP: ${err.message}`);
429
+ await this.rustBridge.sendEmailProcessingResult({
430
+ correlationId,
431
+ accepted: false,
432
+ smtpCode: 550,
433
+ smtpMessage: `5.0.0 Processing failed: ${err.message}`,
434
+ });
435
+ }
436
+ }
437
+ /**
438
+ * Handle an authRequest event from the Rust SMTP server.
439
+ */
440
+ async handleRustAuthRequest(data) {
441
+ const { correlationId, username, password, remoteAddr } = data;
442
+ logger.log('info', `Rust SMTP auth request for user=${username} from=${remoteAddr}`);
443
+ // Check against configured users
444
+ const users = this.options.auth?.users || [];
445
+ const matched = users.find(u => u.username === username && u.password === password);
446
+ if (matched) {
447
+ await this.rustBridge.sendAuthResult({
448
+ correlationId,
449
+ success: true,
450
+ });
451
+ }
452
+ else {
453
+ logger.log('warn', `Auth failed for user=${username} from=${remoteAddr}`);
454
+ await this.rustBridge.sendAuthResult({
455
+ correlationId,
456
+ success: false,
457
+ message: 'Invalid credentials',
458
+ });
459
+ }
460
+ }
461
+ /**
462
+ * Handle a SCRAM credential request from the Rust SMTP server.
463
+ * Computes SCRAM-SHA-256 credentials from the stored password for the given user.
464
+ */
465
+ async handleScramCredentialRequest(data) {
466
+ const { correlationId, username, remoteAddr } = data;
467
+ const crypto = await import('crypto');
468
+ logger.log('info', `SCRAM credential request for user=${username} from=${remoteAddr}`);
469
+ const users = this.options.auth?.users || [];
470
+ const matched = users.find(u => u.username === username);
471
+ if (!matched) {
472
+ await this.rustBridge.sendScramCredentialResult({
473
+ correlationId,
474
+ found: false,
475
+ });
476
+ return;
477
+ }
478
+ // Compute SCRAM-SHA-256 credentials from plaintext password
479
+ const salt = crypto.randomBytes(16);
480
+ const iterations = 4096;
481
+ // SaltedPassword = PBKDF2-HMAC-SHA256(password, salt, iterations, 32)
482
+ const saltedPassword = crypto.pbkdf2Sync(matched.password, salt, iterations, 32, 'sha256');
483
+ // ClientKey = HMAC-SHA256(SaltedPassword, "Client Key")
484
+ const clientKey = crypto.createHmac('sha256', saltedPassword).update('Client Key').digest();
485
+ // StoredKey = SHA256(ClientKey)
486
+ const storedKey = crypto.createHash('sha256').update(clientKey).digest();
487
+ // ServerKey = HMAC-SHA256(SaltedPassword, "Server Key")
488
+ const serverKey = crypto.createHmac('sha256', saltedPassword).update('Server Key').digest();
489
+ await this.rustBridge.sendScramCredentialResult({
490
+ correlationId,
491
+ found: true,
492
+ salt: salt.toString('base64'),
493
+ iterations,
494
+ storedKey: storedKey.toString('base64'),
495
+ serverKey: serverKey.toString('base64'),
496
+ });
497
+ }
498
+ /**
499
+ * Verify inbound email security (DKIM/SPF/DMARC) using pre-computed Rust results
500
+ * or falling back to IPC call if no pre-computed results are available.
501
+ */
502
+ async verifyInboundSecurity(email, session) {
503
+ try {
504
+ // Check for pre-computed results from Rust in-process security pipeline
505
+ const precomputed = session._precomputedSecurityResults;
506
+ let result;
507
+ if (precomputed) {
508
+ logger.log('info', 'Using pre-computed security results from Rust in-process pipeline');
509
+ result = precomputed;
510
+ }
511
+ else {
512
+ // Fallback: IPC round-trip to Rust (for backward compat)
513
+ const rawMessage = session.emailData || email.toRFC822String();
514
+ result = await this.rustBridge.verifyEmail({
515
+ rawMessage,
516
+ ip: session.remoteAddress,
517
+ heloDomain: session.clientHostname || '',
518
+ hostname: this.options.hostname,
519
+ mailFrom: session.envelope?.mailFrom?.address || session.mailFrom || '',
520
+ });
521
+ }
522
+ // Apply DKIM result headers
523
+ if (result.dkim && result.dkim.length > 0) {
524
+ const dkimSummary = result.dkim
525
+ .map((d) => `${d.status}${d.domain ? ` (${d.domain})` : ''}`)
526
+ .join(', ');
527
+ email.addHeader('X-DKIM-Result', dkimSummary);
528
+ }
529
+ // Apply SPF result header
530
+ if (result.spf) {
531
+ email.addHeader('Received-SPF', `${result.spf.result} (domain: ${result.spf.domain}, ip: ${result.spf.ip})`);
532
+ // Mark as spam on SPF hard fail
533
+ if (result.spf.result === 'fail') {
534
+ email.mightBeSpam = true;
535
+ logger.log('warn', `SPF fail for ${session.remoteAddress} — marking as potential spam`);
536
+ }
537
+ }
538
+ // Apply DMARC result header and policy
539
+ if (result.dmarc) {
540
+ email.addHeader('X-DMARC-Result', `${result.dmarc.action} (policy=${result.dmarc.policy}, dkim=${result.dmarc.dkim_result}, spf=${result.dmarc.spf_result})`);
541
+ if (result.dmarc.action === 'reject') {
542
+ email.mightBeSpam = true;
543
+ logger.log('warn', `DMARC reject for domain ${result.dmarc.domain} — marking as spam`);
544
+ }
545
+ else if (result.dmarc.action === 'quarantine') {
546
+ email.mightBeSpam = true;
547
+ logger.log('info', `DMARC quarantine for domain ${result.dmarc.domain} — marking as potential spam`);
548
+ }
549
+ }
550
+ // Apply content scan results (from pre-computed pipeline)
551
+ if (result.contentScan) {
552
+ const scan = result.contentScan;
553
+ if (scan.threatScore > 0) {
554
+ email.addHeader('X-Spam-Score', String(scan.threatScore));
555
+ if (scan.threatType) {
556
+ email.addHeader('X-Spam-Type', scan.threatType);
557
+ }
558
+ if (scan.threatScore >= 50) {
559
+ email.mightBeSpam = true;
560
+ logger.log('warn', `Content scan threat score ${scan.threatScore} (${scan.threatType}) — marking as potential spam`);
561
+ }
562
+ }
563
+ }
564
+ // Apply IP reputation results (from pre-computed pipeline)
565
+ if (result.ipReputation) {
566
+ const rep = result.ipReputation;
567
+ email.addHeader('X-IP-Reputation-Score', String(rep.score));
568
+ if (rep.is_spam) {
569
+ email.mightBeSpam = true;
570
+ logger.log('warn', `IP ${rep.ip} flagged by reputation check (score=${rep.score}) — marking as potential spam`);
571
+ }
572
+ }
573
+ logger.log('info', `Inbound security verified for email from ${session.remoteAddress}: DKIM=${result.dkim?.[0]?.status ?? 'none'}, SPF=${result.spf?.result ?? 'none'}, DMARC=${result.dmarc?.action ?? 'none'}`);
574
+ }
575
+ catch (err) {
576
+ logger.log('warn', `Inbound security verification failed: ${err.message} — accepting email`);
577
+ }
578
+ }
579
+ /**
580
+ * Process email based on routing rules
581
+ */
582
+ async processEmailByMode(emailData, session) {
583
+ // Convert Buffer to Email if needed
584
+ let email;
585
+ if (Buffer.isBuffer(emailData)) {
586
+ // Parse the email data buffer into an Email object
587
+ try {
588
+ const parsed = await plugins.mailparser.simpleParser(emailData);
589
+ email = new Email({
590
+ from: parsed.from?.value[0]?.address || session.envelope.mailFrom.address,
591
+ to: session.envelope.rcptTo[0]?.address || '',
592
+ subject: parsed.subject || '',
593
+ text: parsed.text || '',
594
+ html: parsed.html || undefined,
595
+ attachments: parsed.attachments?.map(att => ({
596
+ filename: att.filename || '',
597
+ content: att.content,
598
+ contentType: att.contentType
599
+ })) || []
600
+ });
601
+ }
602
+ catch (error) {
603
+ logger.log('error', `Error parsing email data: ${error.message}`);
604
+ throw new Error(`Error parsing email data: ${error.message}`);
605
+ }
606
+ }
607
+ else {
608
+ email = emailData;
609
+ }
610
+ // Run inbound security verification (DKIM/SPF/DMARC) via Rust bridge
611
+ if (session.remoteAddress && session.remoteAddress !== '127.0.0.1') {
612
+ await this.verifyInboundSecurity(email, session);
613
+ }
614
+ // First check if this is a bounce notification email
615
+ const subject = email.subject || '';
616
+ const isBounceLike = /mail delivery|delivery (failed|status|notification)|failure notice|returned mail|undeliverable|delivery problem/i.test(subject);
617
+ if (isBounceLike) {
618
+ logger.log('info', `Email subject matches bounce notification pattern: "${subject}"`);
619
+ const isBounce = await this.processBounceNotification(email);
620
+ if (isBounce) {
621
+ logger.log('info', 'Successfully processed as bounce notification, skipping regular processing');
622
+ return email;
623
+ }
624
+ logger.log('info', 'Not a valid bounce notification, continuing with regular processing');
625
+ }
626
+ // Find matching route
627
+ const context = { email, session };
628
+ const route = await this.emailRouter.evaluateRoutes(context);
629
+ if (!route) {
630
+ throw new Error('No matching route for email');
631
+ }
632
+ // Store matched route in session
633
+ session.matchedRoute = route;
634
+ // Execute action based on route
635
+ await this.actionExecutor.executeAction(route.action, email, context);
636
+ // Return the processed email
637
+ return email;
638
+ }
639
+ /**
640
+ * Apply per-domain rate limits from domain configurations
641
+ */
642
+ applyDomainRateLimits() {
643
+ const domainConfigs = this.domainRegistry.getAllConfigs();
644
+ for (const domainConfig of domainConfigs) {
645
+ if (domainConfig.rateLimits) {
646
+ const domain = domainConfig.domain;
647
+ const rateLimitConfig = {};
648
+ if (domainConfig.rateLimits.outbound) {
649
+ if (domainConfig.rateLimits.outbound.messagesPerMinute) {
650
+ rateLimitConfig.maxMessagesPerMinute = domainConfig.rateLimits.outbound.messagesPerMinute;
651
+ }
652
+ }
653
+ if (domainConfig.rateLimits.inbound) {
654
+ if (domainConfig.rateLimits.inbound.messagesPerMinute) {
655
+ rateLimitConfig.maxMessagesPerMinute = domainConfig.rateLimits.inbound.messagesPerMinute;
656
+ }
657
+ if (domainConfig.rateLimits.inbound.connectionsPerIp) {
658
+ rateLimitConfig.maxConnectionsPerIP = domainConfig.rateLimits.inbound.connectionsPerIp;
659
+ }
660
+ if (domainConfig.rateLimits.inbound.recipientsPerMessage) {
661
+ rateLimitConfig.maxRecipientsPerMessage = domainConfig.rateLimits.inbound.recipientsPerMessage;
662
+ }
663
+ }
664
+ if (Object.keys(rateLimitConfig).length > 0) {
665
+ this.rateLimiter.applyDomainLimits(domain, rateLimitConfig);
666
+ logger.log('info', `Applied rate limits for domain ${domain}:`, rateLimitConfig);
667
+ }
668
+ }
669
+ }
670
+ }
671
+ /**
672
+ * Generate SmartProxy routes for email ports
673
+ */
674
+ generateProxyRoutes(portMapping) {
675
+ const routes = [];
676
+ const defaultPortMapping = {
677
+ 25: 10025,
678
+ 587: 10587,
679
+ 465: 10465
680
+ };
681
+ const actualPortMapping = portMapping || defaultPortMapping;
682
+ for (const externalPort of this.options.ports) {
683
+ const internalPort = actualPortMapping[externalPort] || externalPort + 10000;
684
+ let routeName = 'email-route';
685
+ let tlsMode = 'passthrough';
686
+ switch (externalPort) {
687
+ case 25:
688
+ routeName = 'smtp-route';
689
+ tlsMode = 'passthrough';
690
+ break;
691
+ case 587:
692
+ routeName = 'submission-route';
693
+ tlsMode = 'passthrough';
694
+ break;
695
+ case 465:
696
+ routeName = 'smtps-route';
697
+ tlsMode = 'terminate';
698
+ break;
699
+ default:
700
+ routeName = `email-port-${externalPort}-route`;
701
+ }
702
+ routes.push({
703
+ name: routeName,
704
+ match: {
705
+ ports: [externalPort]
706
+ },
707
+ action: {
708
+ type: 'forward',
709
+ target: {
710
+ host: 'localhost',
711
+ port: internalPort
712
+ },
713
+ tls: {
714
+ mode: tlsMode
715
+ }
716
+ }
717
+ });
718
+ }
719
+ return routes;
720
+ }
721
+ /**
722
+ * Update server configuration
723
+ */
724
+ updateOptions(options) {
725
+ const portsChanged = options.ports &&
726
+ (!this.options.ports ||
727
+ JSON.stringify(options.ports) !== JSON.stringify(this.options.ports));
728
+ if (portsChanged) {
729
+ this.stop().then(() => {
730
+ this.options = { ...this.options, ...options };
731
+ this.start();
732
+ });
733
+ }
734
+ else {
735
+ this.options = { ...this.options, ...options };
736
+ if (options.domains) {
737
+ this.domainRegistry = new DomainRegistry(options.domains, options.defaults || this.options.defaults);
738
+ }
739
+ if (options.routes) {
740
+ this.emailRouter.updateRoutes(options.routes);
741
+ }
742
+ }
743
+ }
744
+ /**
745
+ * Update email routes
746
+ */
747
+ updateEmailRoutes(routes) {
748
+ this.options.routes = routes;
749
+ this.emailRouter.updateRoutes(routes);
750
+ }
751
+ /**
752
+ * Get server statistics
753
+ */
754
+ getStats() {
755
+ return { ...this.stats };
756
+ }
757
+ /**
758
+ * Get domain registry
759
+ */
760
+ getDomainRegistry() {
761
+ return this.domainRegistry;
762
+ }
763
+ /**
764
+ * Send an email through the delivery system
765
+ */
766
+ async sendEmail(email, mode = 'mta', route, options) {
767
+ logger.log('info', `Sending email: ${email.subject} to ${email.to.join(', ')}`);
768
+ try {
769
+ if (!email.from) {
770
+ throw new Error('Email must have a sender address');
771
+ }
772
+ if (!email.to || email.to.length === 0) {
773
+ throw new Error('Email must have at least one recipient');
774
+ }
775
+ // Check if any recipients are on the suppression list
776
+ if (!options?.skipSuppressionCheck) {
777
+ const suppressedRecipients = email.to.filter(recipient => this.isEmailSuppressed(recipient));
778
+ if (suppressedRecipients.length > 0) {
779
+ const originalCount = email.to.length;
780
+ const suppressed = suppressedRecipients.map(recipient => {
781
+ const info = this.getSuppressionInfo(recipient);
782
+ return {
783
+ email: recipient,
784
+ reason: info?.reason || 'Unknown',
785
+ until: info?.expiresAt ? new Date(info.expiresAt).toISOString() : 'permanent'
786
+ };
787
+ });
788
+ logger.log('warn', `Filtering out ${suppressedRecipients.length} suppressed recipient(s)`, { suppressed });
789
+ if (suppressedRecipients.length === originalCount) {
790
+ throw new Error('All recipients are on the suppression list');
791
+ }
792
+ email.to = email.to.filter(recipient => !this.isEmailSuppressed(recipient));
793
+ }
794
+ }
795
+ // Sign with DKIM if configured
796
+ if (mode === 'mta' && route?.action.options?.mtaOptions?.dkimSign) {
797
+ const domain = email.from.split('@')[1];
798
+ await this.dkimManager.handleDkimSigning(email, domain, route.action.options.mtaOptions.dkimOptions?.keySelector || 'mta');
799
+ }
800
+ const id = plugins.uuid.v4();
801
+ await this.deliveryQueue.enqueue(email, mode, route);
802
+ logger.log('info', `Email queued with ID: ${id}`);
803
+ return id;
804
+ }
805
+ catch (error) {
806
+ logger.log('error', `Failed to send email: ${error.message}`);
807
+ throw error;
808
+ }
809
+ }
810
+ // -----------------------------------------------------------------------
811
+ // Bounce/suppression methods
812
+ // -----------------------------------------------------------------------
813
+ async processBounceNotification(bounceEmail) {
814
+ logger.log('info', 'Processing potential bounce notification email');
815
+ try {
816
+ const bounceRecord = await this.bounceManager.processBounceEmail(bounceEmail);
817
+ if (bounceRecord) {
818
+ logger.log('info', `Successfully processed bounce notification for ${bounceRecord.recipient}`, {
819
+ bounceType: bounceRecord.bounceType,
820
+ bounceCategory: bounceRecord.bounceCategory
821
+ });
822
+ this.emit('bounceProcessed', bounceRecord);
823
+ SecurityLogger.getInstance().logEvent({
824
+ level: SecurityLogLevel.INFO,
825
+ type: SecurityEventType.EMAIL_VALIDATION,
826
+ message: `Bounce notification processed for recipient`,
827
+ domain: bounceRecord.domain,
828
+ details: {
829
+ recipient: bounceRecord.recipient,
830
+ bounceType: bounceRecord.bounceType,
831
+ bounceCategory: bounceRecord.bounceCategory
832
+ },
833
+ success: true
834
+ });
835
+ return true;
836
+ }
837
+ else {
838
+ logger.log('info', 'Email not recognized as a bounce notification');
839
+ return false;
840
+ }
841
+ }
842
+ catch (error) {
843
+ logger.log('error', `Error processing bounce notification: ${error.message}`);
844
+ SecurityLogger.getInstance().logEvent({
845
+ level: SecurityLogLevel.ERROR,
846
+ type: SecurityEventType.EMAIL_VALIDATION,
847
+ message: 'Failed to process bounce notification',
848
+ details: { error: error.message, subject: bounceEmail.subject },
849
+ success: false
850
+ });
851
+ return false;
852
+ }
853
+ }
854
+ async processSmtpFailure(recipient, smtpResponse, options = {}) {
855
+ logger.log('info', `Processing SMTP failure for ${recipient}: ${smtpResponse}`);
856
+ try {
857
+ const bounceRecord = await this.bounceManager.processSmtpFailure(recipient, smtpResponse, options);
858
+ logger.log('info', `Successfully processed SMTP failure for ${recipient} as ${bounceRecord.bounceCategory} bounce`, {
859
+ bounceType: bounceRecord.bounceType
860
+ });
861
+ this.emit('bounceProcessed', bounceRecord);
862
+ SecurityLogger.getInstance().logEvent({
863
+ level: SecurityLogLevel.INFO,
864
+ type: SecurityEventType.EMAIL_VALIDATION,
865
+ message: `SMTP failure processed for recipient`,
866
+ domain: bounceRecord.domain,
867
+ details: {
868
+ recipient: bounceRecord.recipient,
869
+ bounceType: bounceRecord.bounceType,
870
+ bounceCategory: bounceRecord.bounceCategory,
871
+ smtpResponse
872
+ },
873
+ success: true
874
+ });
875
+ return true;
876
+ }
877
+ catch (error) {
878
+ logger.log('error', `Error processing SMTP failure: ${error.message}`);
879
+ SecurityLogger.getInstance().logEvent({
880
+ level: SecurityLogLevel.ERROR,
881
+ type: SecurityEventType.EMAIL_VALIDATION,
882
+ message: 'Failed to process SMTP failure',
883
+ details: { recipient, smtpResponse, error: error.message },
884
+ success: false
885
+ });
886
+ return false;
887
+ }
888
+ }
889
+ isEmailSuppressed(email) {
890
+ return this.bounceManager.isEmailSuppressed(email);
891
+ }
892
+ getSuppressionInfo(email) {
893
+ return this.bounceManager.getSuppressionInfo(email);
894
+ }
895
+ getBounceHistory(email) {
896
+ return this.bounceManager.getBounceInfo(email);
897
+ }
898
+ getSuppressionList() {
899
+ return this.bounceManager.getSuppressionList();
900
+ }
901
+ getHardBouncedAddresses() {
902
+ return this.bounceManager.getHardBouncedAddresses();
903
+ }
904
+ addToSuppressionList(email, reason, expiresAt) {
905
+ this.bounceManager.addToSuppressionList(email, reason, expiresAt);
906
+ logger.log('info', `Added ${email} to suppression list: ${reason}`);
907
+ }
908
+ removeFromSuppressionList(email) {
909
+ this.bounceManager.removeFromSuppressionList(email);
910
+ logger.log('info', `Removed ${email} from suppression list`);
911
+ }
912
+ recordBounce(domain, receivingDomain, bounceType, reason) {
913
+ const bounceRecord = {
914
+ id: `bounce_${Date.now()}_${Math.random().toString(36).substring(2, 9)}`,
915
+ recipient: `user@${receivingDomain}`,
916
+ sender: `user@${domain}`,
917
+ domain: domain,
918
+ bounceType: bounceType === 'hard' ? BounceType.INVALID_RECIPIENT : BounceType.TEMPORARY_FAILURE,
919
+ bounceCategory: bounceType === 'hard' ? BounceCategory.HARD : BounceCategory.SOFT,
920
+ timestamp: Date.now(),
921
+ smtpResponse: reason,
922
+ diagnosticCode: reason,
923
+ statusCode: bounceType === 'hard' ? '550' : '450',
924
+ processed: false
925
+ };
926
+ this.bounceManager.processBounce(bounceRecord);
927
+ }
928
+ /**
929
+ * Get the rate limiter instance
930
+ */
931
+ getRateLimiter() {
932
+ return this.rateLimiter;
933
+ }
934
+ }
935
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.unified.email.server.js","sourceRoot":"","sources":["../../../ts/mail/routing/classes.unified.email.server.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,KAAK,KAAK,MAAM,gBAAgB,CAAC;AACxC,OAAO,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;AACtC,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AACzC,OAAO,EACL,cAAc,EACd,gBAAgB,EAChB,iBAAiB,EAClB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,WAAW,EAAE,MAAM,oCAAoC,CAAC;AACjE,OAAO,EAAE,kBAAkB,EAAE,MAAM,8CAA8C,CAAC;AAElF,OAAO,EAAE,WAAW,EAAE,MAAM,2BAA2B,CAAC;AAExD,OAAO,EAAE,KAAK,EAAE,MAAM,0BAA0B,CAAC;AACjD,OAAO,EAAE,cAAc,EAAE,MAAM,8BAA8B,CAAC;AAC9D,OAAO,EAAE,UAAU,EAAE,MAAM,0BAA0B,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,UAAU,EAAE,cAAc,EAAE,MAAM,kCAAkC,CAAC;AAE7F,OAAO,EAAE,uBAAuB,EAAkC,MAAM,wCAAwC,CAAC;AACjH,OAAO,EAAE,oBAAoB,EAAsB,MAAM,uCAAuC,CAAC;AACjG,OAAO,EAAE,kBAAkB,EAAgC,MAAM,6CAA6C,CAAC;AAC/G,OAAO,EAAE,SAAS,EAAE,MAAM,2BAA2B,CAAC;AAEtD,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AACzE,OAAO,EAAE,WAAW,EAAE,MAAM,2BAA2B,CAAC;AA8HxD;;GAEG;AACH,MAAM,OAAO,kBAAmB,SAAQ,YAAY;IAC1C,QAAQ,CAAW;IACnB,OAAO,CAA6B;IACpC,WAAW,CAAc;IAC1B,cAAc,CAAiB;IAC9B,OAAO,GAAU,EAAE,CAAC;IACpB,KAAK,CAAe;IAE5B,wDAAwD;IACjD,WAAW,CAAc;IACxB,UAAU,CAAqB;IAC/B,aAAa,CAAgB;IAC9B,aAAa,CAAuB;IACpC,cAAc,CAA0B;IACvC,WAAW,CAAqB,CAAC,wDAAwD;IAEjG,uBAAuB;IACf,cAAc,CAAsB;IACpC,WAAW,CAAc;IAEjC,YAAY,QAAkB,EAAE,OAAmC;QACjE,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QAEzB,sBAAsB;QACtB,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,OAAO;YACV,MAAM,EAAE,OAAO,CAAC,MAAM,IAAI,GAAG,OAAO,CAAC,QAAQ,2BAA2B;YACxE,cAAc,EAAE,OAAO,CAAC,cAAc,IAAI,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;YACnE,UAAU,EAAE,OAAO,CAAC,UAAU,IAAI,GAAG;YACrC,cAAc,EAAE,OAAO,CAAC,cAAc,IAAI,IAAI;YAC9C,iBAAiB,EAAE,OAAO,CAAC,iBAAiB,IAAI,KAAK,EAAE,WAAW;YAClE,aAAa,EAAE,OAAO,CAAC,aAAa,IAAI,KAAK,CAAC,WAAW;SAC1D,CAAC;QAEF,8CAA8C;QAC9C,IAAI,CAAC,UAAU,GAAG,kBAAkB,CAAC,WAAW,EAAE,CAAC;QAEnD,+CAA+C;QAC/C,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAAC,KAAK,CAAC,OAAO,EAAE,QAAQ,CAAC,cAAc,CAAC,CAAC;QAE3E,iDAAiD;QACjD,IAAI,CAAC,aAAa,GAAG,IAAI,aAAa,CAAC;YACrC,YAAY,EAAE,KAAK;YACnB,QAAQ,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,UAAU;YAC9C,cAAc,EAAE,QAAQ,CAAC,cAAc;SACxC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,IAAI,CAAC,cAAc,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;QAE5E,0DAA0D;QAC1D,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,EAAE;YACvD,cAAc,EAAE,QAAQ,CAAC,cAAc;YACvC,cAAc,EAAE,IAAI;SACrB,CAAC,CAAC;QAEH,0BAA0B;QAC1B,IAAI,CAAC,WAAW,GAAG,IAAI,kBAAkB,CAAC,OAAO,CAAC,UAAU,IAAI;YAC9D,MAAM,EAAE;gBACN,mBAAmB,EAAE,EAAE;gBACvB,oBAAoB,EAAE,GAAG;gBACzB,uBAAuB,EAAE,EAAE;gBAC3B,cAAc,EAAE,EAAE;gBAClB,oBAAoB,EAAE,CAAC;gBACvB,aAAa,EAAE,MAAM,CAAC,YAAY;aACnC;SACF,CAAC,CAAC;QAEH,iCAAiC;QACjC,MAAM,YAAY,GAAkB;YAClC,WAAW,EAAE,QAAQ,EAAE,4BAA4B;YACnD,UAAU,EAAE,CAAC;YACb,cAAc,EAAE,MAAM,EAAE,YAAY;YACpC,aAAa,EAAE,OAAO,CAAC,SAAS;SACjC,CAAC;QAEF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAoB,CAAC,YAAY,CAAC,CAAC;QAE5D,MAAM,eAAe,GAA8B;YACjD,eAAe,EAAE,GAAG,EAAE,mCAAmC;YACzD,oBAAoB,EAAE,EAAE;YACxB,cAAc,EAAE,IAAI;YACpB,aAAa,EAAE;gBACb,kBAAkB,EAAE,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,IAAI,CAAC;aACvD;YACD,iBAAiB,EAAE,KAAK,EAAE,KAAK,EAAE,OAAO,EAAE,EAAE;gBAC1C,gDAAgD;YAClD,CAAC;SACF,CAAC;QAEF,IAAI,CAAC,cAAc,GAAG,IAAI,uBAAuB,CAAC,IAAI,CAAC,aAAa,EAAE,eAAe,EAAE,IAAI,CAAC,CAAC;QAE7F,6BAA6B;QAC7B,IAAI,CAAC,cAAc,GAAG,IAAI,mBAAmB,CAAC;YAC5C,iBAAiB,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC;YACpD,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,aAAa,EAAE,IAAI,CAAC,aAAa;SAClC,CAAC,CAAC;QAEH,0BAA0B;QAC1B,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAAC,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,cAAc,EAAE,QAAQ,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;QAErG,wBAAwB;QACxB,IAAI,CAAC,KAAK,GAAG;YACX,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,WAAW,EAAE;gBACX,OAAO,EAAE,CAAC;gBACV,KAAK,EAAE,CAAC;aACT;YACD,QAAQ,EAAE;gBACR,SAAS,EAAE,CAAC;gBACZ,SAAS,EAAE,CAAC;gBACZ,MAAM,EAAE,CAAC;aACV;YACD,cAAc,EAAE;gBACd,GAAG,EAAE,CAAC;gBACN,GAAG,EAAE,CAAC;gBACN,GAAG,EAAE,CAAC;aACP;SACF,CAAC;QAEF,0DAA0D;IAC5D,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,iBAAiB,CAAC,IAAY,EAAE,IAAY,EAAE,KAAY,EAAE,OAKxE;QACC,uCAAuC;QACvC,IAAI,IAA0E,CAAC;QAC/E,IAAI,OAAO,EAAE,UAAU,EAAE,CAAC;YACxB,IAAI,CAAC;gBACH,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC/E,IAAI,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,UAAU,EAAE,QAAQ,EAAE,OAAO,CAAC,YAAY,IAAI,SAAS,EAAE,UAAU,EAAE,CAAC;YACjG,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,OAAO,CAAC,UAAU,KAAM,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;YACtG,CAAC;QACH,CAAC;QAED,6CAA6C;QAC7C,MAAM,aAAa,GAAmB;YACpC,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,EAAE,EAAE,KAAK,CAAC,EAAE;YACZ,EAAE,EAAE,KAAK,CAAC,EAAE,IAAI,EAAE;YAClB,GAAG,EAAE,KAAK,CAAC,GAAG,IAAI,EAAE;YACpB,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,EAAE;YAC5B,IAAI,EAAE,KAAK,CAAC,IAAI,IAAI,EAAE;YACtB,IAAI,EAAE,KAAK,CAAC,IAAI,IAAI,SAAS;YAC7B,OAAO,EAAE,KAAK,CAAC,OAAiC,IAAI,EAAE;SACvD,CAAC;QAEF,OAAO,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC;YACvC,IAAI;YACJ,IAAI;YACJ,MAAM,EAAE,IAAI,KAAK,GAAG;YACpB,MAAM,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;YAC7B,IAAI,EAAE,OAAO,EAAE,IAAI;YACnB,KAAK,EAAE,aAAa;YACpB,IAAI;YACJ,qBAAqB,EAAE,IAAI,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,iBAAiB,IAAI,KAAK,CAAC,GAAG,IAAI,CAAC;YAC7F,iBAAiB,EAAE,IAAI,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,aAAa,IAAI,MAAM,CAAC,GAAG,IAAI,CAAC;YACtF,OAAO,EAAE,GAAG,IAAI,IAAI,IAAI,EAAE;YAC1B,kBAAkB,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,cAAc,IAAI,EAAE;YAC/D,gBAAgB,EAAE,OAAO,EAAE,gBAAgB,IAAI,CAAC,IAAI,KAAK,EAAE,CAAC;SAC7D,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yCAA0C,IAAI,CAAC,OAAO,CAAC,KAAkB,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QAE3G,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACnC,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAClC,IAAI,CAAC,2BAA2B,EAAE,CAAC;YACnC,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yCAAyC,CAAC,CAAC;YAC9D,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC5E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,qBAAqB;QACjC,MAAM,IAAI,CAAC,aAAa,CAAC,UAAU,EAAE,CAAC;QACtC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,CAAC,CAAC;QAEvD,MAAM,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;QAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;IACtD,CAAC;IAEO,KAAK,CAAC,eAAe;QAC3B,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;QAC/C,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,MAAM,IAAI,KAAK,CAAC,0GAA0G,CAAC,CAAC;QAC9H,CAAC;QACD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qEAAqE,CAAC,CAAC;QAE1F,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC,aAAa,EAAE,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAA0C,EAAE,EAAE;YACnG,IAAI,QAAQ,KAAK,QAAQ;gBAAE,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;iBAChD,IAAI,QAAQ,KAAK,YAAY;gBAAE,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;iBAC7D,IAAI,QAAQ,KAAK,SAAS,IAAI,QAAQ,KAAK,YAAY;gBAAE,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC;QAC7F,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,KAAK,CAAC,oBAAoB;QAChC,MAAM,IAAI,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC;QAC7C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8CAA8C,CAAC,CAAC;QAEnE,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACjD,MAAM,UAAU,CAAC,gBAAgB,CAAC,IAAI,CAAC,cAAc,CAAC,aAAa,EAAE,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;QACzF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gDAAgD,CAAC,CAAC;QAErE,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,CAAC,CAAC;QAExD,MAAM,IAAI,CAAC,WAAW,CAAC,sBAAsB,EAAE,CAAC;QAChD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,CAAC,CAAC;IAC1D,CAAC;IAEO,2BAA2B;QACjC,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,KAAK,EAAE,IAAI,EAAE,EAAE;YAC7C,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,CAAC;YAC3C,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAyC,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;gBACtF,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,UAAU,CAAC,yBAAyB,CAAC;wBAC9C,aAAa,EAAE,IAAI,CAAC,aAAa;wBACjC,QAAQ,EAAE,KAAK;wBACf,QAAQ,EAAE,GAAG;wBACb,WAAW,EAAE,2BAA2B;qBACzC,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,OAAO,EAAE,CAAC;oBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA2C,OAAiB,CAAC,OAAO,EAAE,CAAC,CAAC;gBAC7F,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,IAAI,EAAE,EAAE;YAC3C,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAwC,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;gBACrF,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC;wBACnC,aAAa,EAAE,IAAI,CAAC,aAAa;wBACjC,OAAO,EAAE,KAAK;wBACd,OAAO,EAAE,qBAAqB;qBAC/B,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,OAAO,EAAE,CAAC;oBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+CAAgD,OAAiB,CAAC,OAAO,EAAE,CAAC,CAAC;gBAClG,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,UAAU,CAAC,wBAAwB,CAAC,KAAK,EAAE,IAAI,EAAE,EAAE;YACtD,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,4BAA4B,CAAC,IAAI,CAAC,CAAC;YAChD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,4CAA6C,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;gBAC1F,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,UAAU,CAAC,yBAAyB,CAAC;wBAC9C,aAAa,EAAE,IAAI,CAAC,aAAa;wBACjC,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,OAAO,EAAE,CAAC;oBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8CAA+C,OAAiB,CAAC,OAAO,EAAE,CAAC,CAAC;gBACjG,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,KAAK,CAAC,eAAe;QAC3B,MAAM,YAAY,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,QAAQ,CAAC;QAC7E,IAAI,UAA8B,CAAC;QACnC,IAAI,SAA6B,CAAC;QAElC,IAAI,YAAY,EAAE,CAAC;YACjB,IAAI,CAAC;gBACH,SAAS,GAAG,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,OAAQ,EAAE,MAAM,CAAC,CAAC;gBACvE,UAAU,GAAG,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,QAAS,EAAE,MAAM,CAAC,CAAC;gBACzE,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,CAAC,CAAC;YAC7D,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC;QAED,MAAM,SAAS,GAAI,IAAI,CAAC,OAAO,CAAC,KAAkB,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC;QAC1E,MAAM,UAAU,GAAI,IAAI,CAAC,OAAO,CAAC,KAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC;QAEzE,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC;YACpD,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;YAC/B,KAAK,EAAE,SAAS;YAChB,UAAU,EAAE,UAAU;YACtB,UAAU;YACV,SAAS;YACT,cAAc,EAAE,IAAI,CAAC,OAAO,CAAC,cAAc,IAAI,EAAE,GAAG,IAAI,GAAG,IAAI;YAC/D,cAAc,EAAE,IAAI,CAAC,OAAO,CAAC,cAAc,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,IAAI,GAAG;YAC7E,aAAa,EAAE,GAAG;YAClB,qBAAqB,EAAE,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,iBAAiB,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC,EAAE;YAC9G,eAAe,EAAE,EAAE;YACnB,WAAW,EAAE,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,KAAK,EAAE,MAAM,CAAC;YAClF,eAAe,EAAE,CAAC;YAClB,iBAAiB,EAAE,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,aAAa,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG;YACnG,qBAAqB,EAAE,EAAE;YACzB,UAAU,EAAE,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;gBACpC,mBAAmB,EAAE,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,MAAM,EAAE,mBAAmB,IAAI,EAAE;gBAC9E,oBAAoB,EAAE,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,MAAM,EAAE,oBAAoB,IAAI,GAAG;gBACjF,oBAAoB,EAAE,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,MAAM,EAAE,oBAAoB,IAAI,CAAC;gBAC/E,UAAU,EAAE,EAAE;aACf,CAAC,CAAC,CAAC,SAAS;SACd,CAAC,CAAC;QAEH,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,wCAAwC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,UAAU,CAAC,CAAC,CAAC,MAAM,UAAU,QAAQ,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAClI,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,CAAC,CAAC;QAElD,IAAI,CAAC;YACH,kCAAkC;YAClC,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,EAAE,CAAC;gBACvC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,CAAC,CAAC;YACjD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAqC,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;YACnF,CAAC;YAED,8DAA8D;YAC9D,IAAI,CAAC,OAAO,GAAG,EAAE,CAAC;YAElB,sDAAsD;YACtD,IAAI,CAAC,UAAU,CAAC,kBAAkB,CAAC,aAAa,CAAC,CAAC;YAClD,MAAM,IAAI,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC;YAE7B,2BAA2B;YAC3B,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;gBACxB,MAAM,IAAI,CAAC,cAAc,CAAC,IAAI,EAAE,CAAC;gBACjC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;YACtD,CAAC;YAED,+BAA+B;YAC/B,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;gBACvB,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC;gBACpC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,CAAC,CAAC;YACvD,CAAC;YAED,8CAA8C;YAC9C,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,EAAE,CAAC;YACxC,CAAC;YAAC,MAAM,CAAC;gBACP,gCAAgC;YAClC,CAAC;YAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yCAAyC,CAAC,CAAC;YAC9D,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,sCAAsC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC3E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED,0EAA0E;IAC1E,kCAAkC;IAClC,0EAA0E;IAE1E;;OAEG;IACK,KAAK,CAAC,uBAAuB,CAAC,IAAyB;QAC7D,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,MAAM,EAAE,UAAU,EAAE,cAAc,EAAE,MAAM,EAAE,iBAAiB,EAAE,GAAG,IAAI,CAAC;QAExG,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iCAAiC,QAAQ,OAAO,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,UAAU,EAAE,CAAC,CAAC;QAE5G,IAAI,CAAC;YACH,wBAAwB;YACxB,IAAI,gBAAwB,CAAC;YAC7B,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,QAAQ,IAAI,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;gBACpD,gBAAgB,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YAC7D,CAAC;iBAAM,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,MAAM,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC;gBACvD,gBAAgB,GAAG,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAC3D,qBAAqB;gBACrB,IAAI,CAAC;oBACH,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBACxC,CAAC;gBAAC,MAAM,CAAC;oBACP,wBAAwB;gBAC1B,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;YAClD,CAAC;YAED,qDAAqD;YACrD,MAAM,OAAO,GAAyB;gBACpC,EAAE,EAAE,IAAI,CAAC,SAAS,IAAI,OAAO,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC;gBACvE,KAAK,EAAE,SAAS,CAAC,QAAQ;gBACzB,QAAQ,EAAE,QAAQ;gBAClB,MAAM,EAAE,MAAM;gBACd,SAAS,EAAE,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC;gBAC5C,MAAM,EAAE,MAAM;gBACd,eAAe,EAAE,KAAK;gBACtB,aAAa,EAAE,UAAU;gBACzB,cAAc,EAAE,cAAc,IAAI,EAAE;gBACpC,MAAM,EAAE,MAAM;gBACd,aAAa,EAAE,CAAC,CAAC,iBAAiB;gBAClC,QAAQ,EAAE;oBACR,QAAQ,EAAE,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,EAAE,EAAE,EAAE;oBACzC,MAAM,EAAE,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;iBAC1D;aACF,CAAC;YAEF,IAAI,iBAAiB,EAAE,CAAC;gBACtB,OAAO,CAAC,IAAI,GAAG,EAAE,QAAQ,EAAE,iBAAiB,EAAE,CAAC;YACjD,CAAC;YAED,qEAAqE;YACrE,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;gBACxB,OAAe,CAAC,2BAA2B,GAAG,IAAI,CAAC,eAAe,CAAC;YACtE,CAAC;YAED,+CAA+C;YAC/C,MAAM,IAAI,CAAC,kBAAkB,CAAC,gBAAgB,EAAE,OAAO,CAAC,CAAC;YAEzD,+BAA+B;YAC/B,MAAM,IAAI,CAAC,UAAU,CAAC,yBAAyB,CAAC;gBAC9C,aAAa;gBACb,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,GAAG;gBACb,WAAW,EAAE,qCAAqC;aACnD,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2CAA4C,GAAa,CAAC,OAAO,EAAE,CAAC,CAAC;YACzF,MAAM,IAAI,CAAC,UAAU,CAAC,yBAAyB,CAAC;gBAC9C,aAAa;gBACb,QAAQ,EAAE,KAAK;gBACf,QAAQ,EAAE,GAAG;gBACb,WAAW,EAAE,4BAA6B,GAAa,CAAC,OAAO,EAAE;aAClE,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB,CAAC,IAAuB;QACzD,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,QAAQ,EAAE,UAAU,EAAE,GAAG,IAAI,CAAC;QAE/D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,QAAQ,SAAS,UAAU,EAAE,CAAC,CAAC;QAErF,iCAAiC;QACjC,MAAM,KAAK,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC;QAC7C,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,CACxB,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,IAAI,CAAC,CAAC,QAAQ,KAAK,QAAQ,CACxD,CAAC;QAEF,IAAI,OAAO,EAAE,CAAC;YACZ,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC;gBACnC,aAAa;gBACb,OAAO,EAAE,IAAI;aACd,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,wBAAwB,QAAQ,SAAS,UAAU,EAAE,CAAC,CAAC;YAC1E,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC;gBACnC,aAAa;gBACb,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,qBAAqB;aAC/B,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,4BAA4B,CAAC,IAAqE;QAC9G,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,UAAU,EAAE,GAAG,IAAI,CAAC;QACrD,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,QAAQ,CAAC,CAAC;QAEtC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qCAAqC,QAAQ,SAAS,UAAU,EAAE,CAAC,CAAC;QAEvF,MAAM,KAAK,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC;QAC7C,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,CAAC,CAAC;QAEzD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,CAAC,UAAU,CAAC,yBAAyB,CAAC;gBAC9C,aAAa;gBACb,KAAK,EAAE,KAAK;aACb,CAAC,CAAC;YACH,OAAO;QACT,CAAC;QAED,4DAA4D;QAC5D,MAAM,IAAI,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC;QACpC,MAAM,UAAU,GAAG,IAAI,CAAC;QAExB,sEAAsE;QACtE,MAAM,cAAc,GAAG,MAAM,CAAC,UAAU,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,CAAC,CAAC;QAE3F,wDAAwD;QACxD,MAAM,SAAS,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,cAAc,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,MAAM,EAAE,CAAC;QAE5F,gCAAgC;QAChC,MAAM,SAAS,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,MAAM,EAAE,CAAC;QAEzE,wDAAwD;QACxD,MAAM,SAAS,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,cAAc,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,MAAM,EAAE,CAAC;QAE5F,MAAM,IAAI,CAAC,UAAU,CAAC,yBAAyB,CAAC;YAC9C,aAAa;YACb,KAAK,EAAE,IAAI;YACX,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC;YAC7B,UAAU;YACV,SAAS,EAAE,SAAS,CAAC,QAAQ,CAAC,QAAQ,CAAC;YACvC,SAAS,EAAE,SAAS,CAAC,QAAQ,CAAC,QAAQ,CAAC;SACxC,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,qBAAqB,CAAC,KAAY,EAAE,OAA6B;QAC7E,IAAI,CAAC;YACH,wEAAwE;YACxE,MAAM,WAAW,GAAI,OAAe,CAAC,2BAA2B,CAAC;YACjE,IAAI,MAAW,CAAC;YAEhB,IAAI,WAAW,EAAE,CAAC;gBAChB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mEAAmE,CAAC,CAAC;gBACxF,MAAM,GAAG,WAAW,CAAC;YACvB,CAAC;iBAAM,CAAC;gBACN,yDAAyD;gBACzD,MAAM,UAAU,GAAG,OAAO,CAAC,SAAS,IAAI,KAAK,CAAC,cAAc,EAAE,CAAC;gBAC/D,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;oBACzC,UAAU;oBACV,EAAE,EAAE,OAAO,CAAC,aAAa;oBACzB,UAAU,EAAE,OAAO,CAAC,cAAc,IAAI,EAAE;oBACxC,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;oBAC/B,QAAQ,EAAE,OAAO,CAAC,QAAQ,EAAE,QAAQ,EAAE,OAAO,IAAI,OAAO,CAAC,QAAQ,IAAI,EAAE;iBACxE,CAAC,CAAC;YACL,CAAC;YAED,4BAA4B;YAC5B,IAAI,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC1C,MAAM,WAAW,GAAG,MAAM,CAAC,IAAI;qBAC5B,GAAG,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC;qBACjE,IAAI,CAAC,IAAI,CAAC,CAAC;gBACd,KAAK,CAAC,SAAS,CAAC,eAAe,EAAE,WAAW,CAAC,CAAC;YAChD,CAAC;YAED,0BAA0B;YAC1B,IAAI,MAAM,CAAC,GAAG,EAAE,CAAC;gBACf,KAAK,CAAC,SAAS,CAAC,cAAc,EAAE,GAAG,MAAM,CAAC,GAAG,CAAC,MAAM,aAAa,MAAM,CAAC,GAAG,CAAC,MAAM,SAAS,MAAM,CAAC,GAAG,CAAC,EAAE,GAAG,CAAC,CAAC;gBAE7G,gCAAgC;gBAChC,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM,KAAK,MAAM,EAAE,CAAC;oBACjC,KAAK,CAAC,WAAW,GAAG,IAAI,CAAC;oBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gBAAgB,OAAO,CAAC,aAAa,8BAA8B,CAAC,CAAC;gBAC1F,CAAC;YACH,CAAC;YAED,uCAAuC;YACvC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,KAAK,CAAC,SAAS,CAAC,gBAAgB,EAAE,GAAG,MAAM,CAAC,KAAK,CAAC,MAAM,YAAY,MAAM,CAAC,KAAK,CAAC,MAAM,UAAU,MAAM,CAAC,KAAK,CAAC,WAAW,SAAS,MAAM,CAAC,KAAK,CAAC,UAAU,GAAG,CAAC,CAAC;gBAE9J,IAAI,MAAM,CAAC,KAAK,CAAC,MAAM,KAAK,QAAQ,EAAE,CAAC;oBACrC,KAAK,CAAC,WAAW,GAAG,IAAI,CAAC;oBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2BAA2B,MAAM,CAAC,KAAK,CAAC,MAAM,oBAAoB,CAAC,CAAC;gBACzF,CAAC;qBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,MAAM,KAAK,YAAY,EAAE,CAAC;oBAChD,KAAK,CAAC,WAAW,GAAG,IAAI,CAAC;oBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,MAAM,CAAC,KAAK,CAAC,MAAM,8BAA8B,CAAC,CAAC;gBACvG,CAAC;YACH,CAAC;YAED,0DAA0D;YAC1D,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;gBACvB,MAAM,IAAI,GAAG,MAAM,CAAC,WAAW,CAAC;gBAChC,IAAI,IAAI,CAAC,WAAW,GAAG,CAAC,EAAE,CAAC;oBACzB,KAAK,CAAC,SAAS,CAAC,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;oBAC1D,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;wBACpB,KAAK,CAAC,SAAS,CAAC,aAAa,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;oBAClD,CAAC;oBACD,IAAI,IAAI,CAAC,WAAW,IAAI,EAAE,EAAE,CAAC;wBAC3B,KAAK,CAAC,WAAW,GAAG,IAAI,CAAC;wBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,IAAI,CAAC,WAAW,KAAK,IAAI,CAAC,UAAU,+BAA+B,CAAC,CAAC;oBACvH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,2DAA2D;YAC3D,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,MAAM,GAAG,GAAG,MAAM,CAAC,YAAY,CAAC;gBAChC,KAAK,CAAC,SAAS,CAAC,uBAAuB,EAAE,MAAM,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC;gBAC5D,IAAI,GAAG,CAAC,OAAO,EAAE,CAAC;oBAChB,KAAK,CAAC,WAAW,GAAG,IAAI,CAAC;oBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,GAAG,CAAC,EAAE,uCAAuC,GAAG,CAAC,KAAK,+BAA+B,CAAC,CAAC;gBAClH,CAAC;YACH,CAAC;YAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4CAA4C,OAAO,CAAC,aAAa,UAAU,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,EAAE,MAAM,IAAI,MAAM,SAAS,MAAM,CAAC,GAAG,EAAE,MAAM,IAAI,MAAM,WAAW,MAAM,CAAC,KAAK,EAAE,MAAM,IAAI,MAAM,EAAE,CAAC,CAAC;QACpN,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yCAA0C,GAAa,CAAC,OAAO,oBAAoB,CAAC,CAAC;QAC1G,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,SAAyB,EAAE,OAA6B;QACtF,oCAAoC;QACpC,IAAI,KAAY,CAAC;QACjB,IAAI,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;YAC/B,mDAAmD;YACnD,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,UAAU,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;gBAChE,KAAK,GAAG,IAAI,KAAK,CAAC;oBAChB,IAAI,EAAE,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,EAAE,OAAO,IAAI,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,OAAO;oBACzE,EAAE,EAAE,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,OAAO,IAAI,EAAE;oBAC7C,OAAO,EAAE,MAAM,CAAC,OAAO,IAAI,EAAE;oBAC7B,IAAI,EAAE,MAAM,CAAC,IAAI,IAAI,EAAE;oBACvB,IAAI,EAAE,MAAM,CAAC,IAAI,IAAI,SAAS;oBAC9B,WAAW,EAAE,MAAM,CAAC,WAAW,EAAE,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;wBAC3C,QAAQ,EAAE,GAAG,CAAC,QAAQ,IAAI,EAAE;wBAC5B,OAAO,EAAE,GAAG,CAAC,OAAO;wBACpB,WAAW,EAAE,GAAG,CAAC,WAAW;qBAC7B,CAAC,CAAC,IAAI,EAAE;iBACV,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;gBAClE,MAAM,IAAI,KAAK,CAAC,6BAA6B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;aAAM,CAAC;YACN,KAAK,GAAG,SAAS,CAAC;QACpB,CAAC;QAED,qEAAqE;QACrE,IAAI,OAAO,CAAC,aAAa,IAAI,OAAO,CAAC,aAAa,KAAK,WAAW,EAAE,CAAC;YACnE,MAAM,IAAI,CAAC,qBAAqB,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACnD,CAAC;QAED,qDAAqD;QACrD,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,IAAI,EAAE,CAAC;QACpC,MAAM,YAAY,GAAG,kHAAkH,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAEtJ,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uDAAuD,OAAO,GAAG,CAAC,CAAC;YAEtF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,KAAK,CAAC,CAAC;YAE7D,IAAI,QAAQ,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4EAA4E,CAAC,CAAC;gBACjG,OAAO,KAAK,CAAC;YACf,CAAC;YAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qEAAqE,CAAC,CAAC;QAC5F,CAAC;QAED,sBAAsB;QACtB,MAAM,OAAO,GAAkB,EAAE,KAAK,EAAE,OAAO,EAAE,CAAC;QAClD,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAE7D,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QAED,iCAAiC;QACjC,OAAO,CAAC,YAAY,GAAG,KAAK,CAAC;QAE7B,gCAAgC;QAChC,MAAM,IAAI,CAAC,cAAc,CAAC,aAAa,CAAC,KAAK,CAAC,MAAM,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;QAEtE,6BAA6B;QAC7B,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACK,qBAAqB;QAC3B,MAAM,aAAa,GAAG,IAAI,CAAC,cAAc,CAAC,aAAa,EAAE,CAAC;QAE1D,KAAK,MAAM,YAAY,IAAI,aAAa,EAAE,CAAC;YACzC,IAAI,YAAY,CAAC,UAAU,EAAE,CAAC;gBAC5B,MAAM,MAAM,GAAG,YAAY,CAAC,MAAM,CAAC;gBACnC,MAAM,eAAe,GAAQ,EAAE,CAAC;gBAEhC,IAAI,YAAY,CAAC,UAAU,CAAC,QAAQ,EAAE,CAAC;oBACrC,IAAI,YAAY,CAAC,UAAU,CAAC,QAAQ,CAAC,iBAAiB,EAAE,CAAC;wBACvD,eAAe,CAAC,oBAAoB,GAAG,YAAY,CAAC,UAAU,CAAC,QAAQ,CAAC,iBAAiB,CAAC;oBAC5F,CAAC;gBACH,CAAC;gBAED,IAAI,YAAY,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC;oBACpC,IAAI,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,iBAAiB,EAAE,CAAC;wBACtD,eAAe,CAAC,oBAAoB,GAAG,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,iBAAiB,CAAC;oBAC3F,CAAC;oBACD,IAAI,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;wBACrD,eAAe,CAAC,mBAAmB,GAAG,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC;oBACzF,CAAC;oBACD,IAAI,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,oBAAoB,EAAE,CAAC;wBACzD,eAAe,CAAC,uBAAuB,GAAG,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,oBAAoB,CAAC;oBACjG,CAAC;gBACH,CAAC;gBAED,IAAI,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5C,IAAI,CAAC,WAAW,CAAC,iBAAiB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;oBAC5D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,MAAM,GAAG,EAAE,eAAe,CAAC,CAAC;gBACnF,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,mBAAmB,CAAC,WAAoC;QAC7D,MAAM,MAAM,GAAU,EAAE,CAAC;QACzB,MAAM,kBAAkB,GAAG;YACzB,EAAE,EAAE,KAAK;YACT,GAAG,EAAE,KAAK;YACV,GAAG,EAAE,KAAK;SACX,CAAC;QAEF,MAAM,iBAAiB,GAAG,WAAW,IAAI,kBAAkB,CAAC;QAE5D,KAAK,MAAM,YAAY,IAAI,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC;YAC9C,MAAM,YAAY,GAAG,iBAAiB,CAAC,YAAY,CAAC,IAAI,YAAY,GAAG,KAAK,CAAC;YAE7E,IAAI,SAAS,GAAG,aAAa,CAAC;YAC9B,IAAI,OAAO,GAAG,aAAa,CAAC;YAE5B,QAAQ,YAAY,EAAE,CAAC;gBACrB,KAAK,EAAE;oBACL,SAAS,GAAG,YAAY,CAAC;oBACzB,OAAO,GAAG,aAAa,CAAC;oBACxB,MAAM;gBACR,KAAK,GAAG;oBACN,SAAS,GAAG,kBAAkB,CAAC;oBAC/B,OAAO,GAAG,aAAa,CAAC;oBACxB,MAAM;gBACR,KAAK,GAAG;oBACN,SAAS,GAAG,aAAa,CAAC;oBAC1B,OAAO,GAAG,WAAW,CAAC;oBACtB,MAAM;gBACR;oBACE,SAAS,GAAG,cAAc,YAAY,QAAQ,CAAC;YACnD,CAAC;YAED,MAAM,CAAC,IAAI,CAAC;gBACV,IAAI,EAAE,SAAS;gBACf,KAAK,EAAE;oBACL,KAAK,EAAE,CAAC,YAAY,CAAC;iBACtB;gBACD,MAAM,EAAE;oBACN,IAAI,EAAE,SAAS;oBACf,MAAM,EAAE;wBACN,IAAI,EAAE,WAAW;wBACjB,IAAI,EAAE,YAAY;qBACnB;oBACD,GAAG,EAAE;wBACH,IAAI,EAAE,OAAO;qBACd;iBACF;aACF,CAAC,CAAC;QACL,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACI,aAAa,CAAC,OAA4C;QAC/D,MAAM,YAAY,GAAG,OAAO,CAAC,KAAK;YAChC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK;gBACnB,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC;QAEzE,IAAI,YAAY,EAAE,CAAC;YACjB,IAAI,CAAC,IAAI,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpB,IAAI,CAAC,OAAO,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,EAAE,GAAG,OAAO,EAAE,CAAC;gBAC/C,IAAI,CAAC,KAAK,EAAE,CAAC;YACf,CAAC,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,OAAO,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,EAAE,GAAG,OAAO,EAAE,CAAC;YAE/C,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;gBACpB,IAAI,CAAC,cAAc,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,OAAO,EAAE,OAAO,CAAC,QAAQ,IAAI,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;YACvG,CAAC;YAED,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;gBACnB,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;YAChD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,iBAAiB,CAAC,MAAqB;QAC5C,IAAI,CAAC,OAAO,CAAC,MAAM,GAAG,MAAM,CAAC;QAC7B,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;IACxC,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,OAAO,EAAE,GAAG,IAAI,CAAC,KAAK,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,iBAAiB;QACtB,OAAO,IAAI,CAAC,cAAc,CAAC;IAC7B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,SAAS,CACpB,KAAY,EACZ,OAA4B,KAAK,EACjC,KAAmB,EACnB,OAIC;QAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,KAAK,CAAC,OAAO,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QAEhF,IAAI,CAAC;YACH,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC;gBAChB,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;YACtD,CAAC;YAED,IAAI,CAAC,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,EAAE,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvC,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;YAC5D,CAAC;YAED,sDAAsD;YACtD,IAAI,CAAC,OAAO,EAAE,oBAAoB,EAAE,CAAC;gBACnC,MAAM,oBAAoB,GAAG,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC,CAAC;gBAE7F,IAAI,oBAAoB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACpC,MAAM,aAAa,GAAG,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC;oBACtC,MAAM,UAAU,GAAG,oBAAoB,CAAC,GAAG,CAAC,SAAS,CAAC,EAAE;wBACtD,MAAM,IAAI,GAAG,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;wBAChD,OAAO;4BACL,KAAK,EAAE,SAAS;4BAChB,MAAM,EAAE,IAAI,EAAE,MAAM,IAAI,SAAS;4BACjC,KAAK,EAAE,IAAI,EAAE,SAAS,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC,WAAW;yBAC9E,CAAC;oBACJ,CAAC,CAAC,CAAC;oBAEH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,oBAAoB,CAAC,MAAM,0BAA0B,EAAE,EAAE,UAAU,EAAE,CAAC,CAAC;oBAE3G,IAAI,oBAAoB,CAAC,MAAM,KAAK,aAAa,EAAE,CAAC;wBAClD,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;oBAChE,CAAC;oBAED,KAAK,CAAC,EAAE,GAAG,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC,CAAC;gBAC9E,CAAC;YACH,CAAC;YAED,+BAA+B;YAC/B,IAAI,IAAI,KAAK,KAAK,IAAI,KAAK,EAAE,MAAM,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,CAAC;gBAClE,MAAM,MAAM,GAAG,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,WAAW,CAAC,iBAAiB,CAAC,KAAK,EAAE,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,WAAW,IAAI,KAAK,CAAC,CAAC;YAC7H,CAAC;YAED,MAAM,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,EAAE,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC;YAErD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,EAAE,EAAE,CAAC,CAAC;YAClD,OAAO,EAAE,CAAC;QACZ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC9D,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED,0EAA0E;IAC1E,6BAA6B;IAC7B,0EAA0E;IAEnE,KAAK,CAAC,yBAAyB,CAAC,WAAkB;QACvD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gDAAgD,CAAC,CAAC;QAErE,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAC;YAE9E,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kDAAkD,YAAY,CAAC,SAAS,EAAE,EAAE;oBAC7F,UAAU,EAAE,YAAY,CAAC,UAAU;oBACnC,cAAc,EAAE,YAAY,CAAC,cAAc;iBAC5C,CAAC,CAAC;gBAEH,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,YAAY,CAAC,CAAC;gBAE3C,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;oBACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;oBAC5B,IAAI,EAAE,iBAAiB,CAAC,gBAAgB;oBACxC,OAAO,EAAE,6CAA6C;oBACtD,MAAM,EAAE,YAAY,CAAC,MAAM;oBAC3B,OAAO,EAAE;wBACP,SAAS,EAAE,YAAY,CAAC,SAAS;wBACjC,UAAU,EAAE,YAAY,CAAC,UAAU;wBACnC,cAAc,EAAE,YAAY,CAAC,cAAc;qBAC5C;oBACD,OAAO,EAAE,IAAI;iBACd,CAAC,CAAC;gBAEH,OAAO,IAAI,CAAC;YACd,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+CAA+C,CAAC,CAAC;gBACpE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAE9E,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;gBACpC,KAAK,EAAE,gBAAgB,CAAC,KAAK;gBAC7B,IAAI,EAAE,iBAAiB,CAAC,gBAAgB;gBACxC,OAAO,EAAE,uCAAuC;gBAChD,OAAO,EAAE,EAAE,KAAK,EAAE,KAAK,CAAC,OAAO,EAAE,OAAO,EAAE,WAAW,CAAC,OAAO,EAAE;gBAC/D,OAAO,EAAE,KAAK;aACf,CAAC,CAAC;YAEH,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,kBAAkB,CAC7B,SAAiB,EACjB,YAAoB,EACpB,UAAgH,EAAE;QAElH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,SAAS,KAAK,YAAY,EAAE,CAAC,CAAC;QAEhF,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,kBAAkB,CAAC,SAAS,EAAE,YAAY,EAAE,OAAO,CAAC,CAAC;YAEnG,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,SAAS,OAAO,YAAY,CAAC,cAAc,SAAS,EAAE;gBAClH,UAAU,EAAE,YAAY,CAAC,UAAU;aACpC,CAAC,CAAC;YAEH,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,YAAY,CAAC,CAAC;YAE3C,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;gBACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;gBAC5B,IAAI,EAAE,iBAAiB,CAAC,gBAAgB;gBACxC,OAAO,EAAE,sCAAsC;gBAC/C,MAAM,EAAE,YAAY,CAAC,MAAM;gBAC3B,OAAO,EAAE;oBACP,SAAS,EAAE,YAAY,CAAC,SAAS;oBACjC,UAAU,EAAE,YAAY,CAAC,UAAU;oBACnC,cAAc,EAAE,YAAY,CAAC,cAAc;oBAC3C,YAAY;iBACb;gBACD,OAAO,EAAE,IAAI;aACd,CAAC,CAAC;YAEH,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAEvE,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;gBACpC,KAAK,EAAE,gBAAgB,CAAC,KAAK;gBAC7B,IAAI,EAAE,iBAAiB,CAAC,gBAAgB;gBACxC,OAAO,EAAE,gCAAgC;gBACzC,OAAO,EAAE,EAAE,SAAS,EAAE,YAAY,EAAE,KAAK,EAAE,KAAK,CAAC,OAAO,EAAE;gBAC1D,OAAO,EAAE,KAAK;aACf,CAAC,CAAC;YAEH,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAEM,iBAAiB,CAAC,KAAa;QACpC,OAAO,IAAI,CAAC,aAAa,CAAC,iBAAiB,CAAC,KAAK,CAAC,CAAC;IACrD,CAAC;IAEM,kBAAkB,CAAC,KAAa;QACrC,OAAO,IAAI,CAAC,aAAa,CAAC,kBAAkB,CAAC,KAAK,CAAC,CAAC;IACtD,CAAC;IAEM,gBAAgB,CAAC,KAAa;QACnC,OAAO,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;IACjD,CAAC;IAEM,kBAAkB;QACvB,OAAO,IAAI,CAAC,aAAa,CAAC,kBAAkB,EAAE,CAAC;IACjD,CAAC;IAEM,uBAAuB;QAC5B,OAAO,IAAI,CAAC,aAAa,CAAC,uBAAuB,EAAE,CAAC;IACtD,CAAC;IAEM,oBAAoB,CAAC,KAAa,EAAE,MAAc,EAAE,SAAkB;QAC3E,IAAI,CAAC,aAAa,CAAC,oBAAoB,CAAC,KAAK,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QAClE,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,SAAS,KAAK,yBAAyB,MAAM,EAAE,CAAC,CAAC;IACtE,CAAC;IAEM,yBAAyB,CAAC,KAAa;QAC5C,IAAI,CAAC,aAAa,CAAC,yBAAyB,CAAC,KAAK,CAAC,CAAC;QACpD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,WAAW,KAAK,wBAAwB,CAAC,CAAC;IAC/D,CAAC;IAEM,YAAY,CAAC,MAAc,EAAE,eAAuB,EAAE,UAA2B,EAAE,MAAc;QACtG,MAAM,YAAY,GAAG;YACnB,EAAE,EAAE,UAAU,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE;YACxE,SAAS,EAAE,QAAQ,eAAe,EAAE;YACpC,MAAM,EAAE,QAAQ,MAAM,EAAE;YACxB,MAAM,EAAE,MAAM;YACd,UAAU,EAAE,UAAU,KAAK,MAAM,CAAC,CAAC,CAAC,UAAU,CAAC,iBAAiB,CAAC,CAAC,CAAC,UAAU,CAAC,iBAAiB;YAC/F,cAAc,EAAE,UAAU,KAAK,MAAM,CAAC,CAAC,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,cAAc,CAAC,IAAI;YACjF,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,YAAY,EAAE,MAAM;YACpB,cAAc,EAAE,MAAM;YACtB,UAAU,EAAE,UAAU,KAAK,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK;YACjD,SAAS,EAAE,KAAK;SACjB,CAAC;QAEF,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,YAAY,CAAC,CAAC;IACjD,CAAC;IAED;;OAEG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;CACF"}