@push.rocks/smartproxy 13.1.2 → 15.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +3 -3
- package/dist_ts/proxies/smart-proxy/index.d.ts +5 -3
- package/dist_ts/proxies/smart-proxy/index.js +9 -5
- package/dist_ts/proxies/smart-proxy/models/index.d.ts +2 -0
- package/dist_ts/proxies/smart-proxy/models/index.js +2 -1
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +82 -15
- package/dist_ts/proxies/smart-proxy/models/interfaces.js +10 -1
- package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +133 -0
- package/dist_ts/proxies/smart-proxy/models/route-types.js +2 -0
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +55 -0
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +804 -0
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +127 -0
- package/dist_ts/proxies/smart-proxy/route-helpers.js +196 -0
- package/dist_ts/proxies/smart-proxy/route-manager.d.ts +103 -0
- package/dist_ts/proxies/smart-proxy/route-manager.js +483 -0
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +19 -8
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +239 -46
- package/package.json +2 -2
- package/readme.md +863 -423
- package/readme.plan.md +311 -250
- package/ts/00_commitinfo_data.ts +2 -2
- package/ts/proxies/smart-proxy/index.ts +20 -4
- package/ts/proxies/smart-proxy/models/index.ts +4 -0
- package/ts/proxies/smart-proxy/models/interfaces.ts +91 -13
- package/ts/proxies/smart-proxy/models/route-types.ts +184 -0
- package/ts/proxies/smart-proxy/route-connection-handler.ts +1117 -0
- package/ts/proxies/smart-proxy/route-helpers.ts +344 -0
- package/ts/proxies/smart-proxy/route-manager.ts +587 -0
- package/ts/proxies/smart-proxy/smart-proxy.ts +300 -69
|
@@ -0,0 +1,804 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import { isRoutedOptions, isLegacyOptions } from './models/interfaces.js';
|
|
3
|
+
import { ConnectionManager } from './connection-manager.js';
|
|
4
|
+
import { SecurityManager } from './security-manager.js';
|
|
5
|
+
import { DomainConfigManager } from './domain-config-manager.js';
|
|
6
|
+
import { TlsManager } from './tls-manager.js';
|
|
7
|
+
import { NetworkProxyBridge } from './network-proxy-bridge.js';
|
|
8
|
+
import { TimeoutManager } from './timeout-manager.js';
|
|
9
|
+
import { RouteManager } from './route-manager.js';
|
|
10
|
+
/**
|
|
11
|
+
* Handles new connection processing and setup logic with support for route-based configuration
|
|
12
|
+
*/
|
|
13
|
+
export class RouteConnectionHandler {
|
|
14
|
+
constructor(settings, connectionManager, securityManager, domainConfigManager, tlsManager, networkProxyBridge, timeoutManager, routeManager) {
|
|
15
|
+
this.connectionManager = connectionManager;
|
|
16
|
+
this.securityManager = securityManager;
|
|
17
|
+
this.domainConfigManager = domainConfigManager;
|
|
18
|
+
this.tlsManager = tlsManager;
|
|
19
|
+
this.networkProxyBridge = networkProxyBridge;
|
|
20
|
+
this.timeoutManager = timeoutManager;
|
|
21
|
+
this.routeManager = routeManager;
|
|
22
|
+
this.settings = settings;
|
|
23
|
+
}
|
|
24
|
+
/**
|
|
25
|
+
* Handle a new incoming connection
|
|
26
|
+
*/
|
|
27
|
+
handleConnection(socket) {
|
|
28
|
+
const remoteIP = socket.remoteAddress || '';
|
|
29
|
+
const localPort = socket.localPort || 0;
|
|
30
|
+
// Validate IP against rate limits and connection limits
|
|
31
|
+
const ipValidation = this.securityManager.validateIP(remoteIP);
|
|
32
|
+
if (!ipValidation.allowed) {
|
|
33
|
+
console.log(`Connection rejected from ${remoteIP}: ${ipValidation.reason}`);
|
|
34
|
+
socket.end();
|
|
35
|
+
socket.destroy();
|
|
36
|
+
return;
|
|
37
|
+
}
|
|
38
|
+
// Create a new connection record
|
|
39
|
+
const record = this.connectionManager.createConnection(socket);
|
|
40
|
+
const connectionId = record.id;
|
|
41
|
+
// Apply socket optimizations
|
|
42
|
+
socket.setNoDelay(this.settings.noDelay);
|
|
43
|
+
// Apply keep-alive settings if enabled
|
|
44
|
+
if (this.settings.keepAlive) {
|
|
45
|
+
socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
|
46
|
+
record.hasKeepAlive = true;
|
|
47
|
+
// Apply enhanced TCP keep-alive options if enabled
|
|
48
|
+
if (this.settings.enableKeepAliveProbes) {
|
|
49
|
+
try {
|
|
50
|
+
// These are platform-specific and may not be available
|
|
51
|
+
if ('setKeepAliveProbes' in socket) {
|
|
52
|
+
socket.setKeepAliveProbes(10);
|
|
53
|
+
}
|
|
54
|
+
if ('setKeepAliveInterval' in socket) {
|
|
55
|
+
socket.setKeepAliveInterval(1000);
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
catch (err) {
|
|
59
|
+
// Ignore errors - these are optional enhancements
|
|
60
|
+
if (this.settings.enableDetailedLogging) {
|
|
61
|
+
console.log(`[${connectionId}] Enhanced TCP keep-alive settings not supported: ${err}`);
|
|
62
|
+
}
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
if (this.settings.enableDetailedLogging) {
|
|
67
|
+
console.log(`[${connectionId}] New connection from ${remoteIP} on port ${localPort}. ` +
|
|
68
|
+
`Keep-Alive: ${record.hasKeepAlive ? 'Enabled' : 'Disabled'}. ` +
|
|
69
|
+
`Active connections: ${this.connectionManager.getConnectionCount()}`);
|
|
70
|
+
}
|
|
71
|
+
else {
|
|
72
|
+
console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionManager.getConnectionCount()}`);
|
|
73
|
+
}
|
|
74
|
+
// Start TLS SNI handling
|
|
75
|
+
this.handleTlsConnection(socket, record);
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* Handle a connection and wait for TLS handshake for SNI extraction if needed
|
|
79
|
+
*/
|
|
80
|
+
handleTlsConnection(socket, record) {
|
|
81
|
+
const connectionId = record.id;
|
|
82
|
+
const localPort = record.localPort;
|
|
83
|
+
let initialDataReceived = false;
|
|
84
|
+
// Set an initial timeout for handshake data
|
|
85
|
+
let initialTimeout = setTimeout(() => {
|
|
86
|
+
if (!initialDataReceived) {
|
|
87
|
+
console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${record.remoteIP}`);
|
|
88
|
+
// Add a grace period
|
|
89
|
+
setTimeout(() => {
|
|
90
|
+
if (!initialDataReceived) {
|
|
91
|
+
console.log(`[${connectionId}] Final initial data timeout after grace period`);
|
|
92
|
+
if (record.incomingTerminationReason === null) {
|
|
93
|
+
record.incomingTerminationReason = 'initial_timeout';
|
|
94
|
+
this.connectionManager.incrementTerminationStat('incoming', 'initial_timeout');
|
|
95
|
+
}
|
|
96
|
+
socket.end();
|
|
97
|
+
this.connectionManager.cleanupConnection(record, 'initial_timeout');
|
|
98
|
+
}
|
|
99
|
+
}, 30000);
|
|
100
|
+
}
|
|
101
|
+
}, this.settings.initialDataTimeout);
|
|
102
|
+
// Make sure timeout doesn't keep the process alive
|
|
103
|
+
if (initialTimeout.unref) {
|
|
104
|
+
initialTimeout.unref();
|
|
105
|
+
}
|
|
106
|
+
// Set up error handler
|
|
107
|
+
socket.on('error', this.connectionManager.handleError('incoming', record));
|
|
108
|
+
// First data handler to capture initial TLS handshake
|
|
109
|
+
socket.once('data', (chunk) => {
|
|
110
|
+
// Clear the initial timeout since we've received data
|
|
111
|
+
if (initialTimeout) {
|
|
112
|
+
clearTimeout(initialTimeout);
|
|
113
|
+
initialTimeout = null;
|
|
114
|
+
}
|
|
115
|
+
initialDataReceived = true;
|
|
116
|
+
record.hasReceivedInitialData = true;
|
|
117
|
+
// Block non-TLS connections on port 443
|
|
118
|
+
if (!this.tlsManager.isTlsHandshake(chunk) && localPort === 443) {
|
|
119
|
+
console.log(`[${connectionId}] Non-TLS connection detected on port 443. ` +
|
|
120
|
+
`Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
|
|
121
|
+
if (record.incomingTerminationReason === null) {
|
|
122
|
+
record.incomingTerminationReason = 'non_tls_blocked';
|
|
123
|
+
this.connectionManager.incrementTerminationStat('incoming', 'non_tls_blocked');
|
|
124
|
+
}
|
|
125
|
+
socket.end();
|
|
126
|
+
this.connectionManager.cleanupConnection(record, 'non_tls_blocked');
|
|
127
|
+
return;
|
|
128
|
+
}
|
|
129
|
+
// Check if this looks like a TLS handshake
|
|
130
|
+
let serverName = '';
|
|
131
|
+
if (this.tlsManager.isTlsHandshake(chunk)) {
|
|
132
|
+
record.isTLS = true;
|
|
133
|
+
// Check for ClientHello to extract SNI
|
|
134
|
+
if (this.tlsManager.isClientHello(chunk)) {
|
|
135
|
+
// Create connection info for SNI extraction
|
|
136
|
+
const connInfo = {
|
|
137
|
+
sourceIp: record.remoteIP,
|
|
138
|
+
sourcePort: socket.remotePort || 0,
|
|
139
|
+
destIp: socket.localAddress || '',
|
|
140
|
+
destPort: socket.localPort || 0,
|
|
141
|
+
};
|
|
142
|
+
// Extract SNI
|
|
143
|
+
serverName = this.tlsManager.extractSNI(chunk, connInfo) || '';
|
|
144
|
+
// Lock the connection to the negotiated SNI
|
|
145
|
+
record.lockedDomain = serverName;
|
|
146
|
+
// Check if we should reject connections without SNI
|
|
147
|
+
if (!serverName && this.settings.allowSessionTicket === false) {
|
|
148
|
+
console.log(`[${connectionId}] No SNI detected in TLS ClientHello; sending TLS alert.`);
|
|
149
|
+
if (record.incomingTerminationReason === null) {
|
|
150
|
+
record.incomingTerminationReason = 'session_ticket_blocked_no_sni';
|
|
151
|
+
this.connectionManager.incrementTerminationStat('incoming', 'session_ticket_blocked_no_sni');
|
|
152
|
+
}
|
|
153
|
+
const alert = Buffer.from([0x15, 0x03, 0x03, 0x00, 0x02, 0x01, 0x70]);
|
|
154
|
+
try {
|
|
155
|
+
socket.cork();
|
|
156
|
+
socket.write(alert);
|
|
157
|
+
socket.uncork();
|
|
158
|
+
socket.end();
|
|
159
|
+
}
|
|
160
|
+
catch {
|
|
161
|
+
socket.end();
|
|
162
|
+
}
|
|
163
|
+
this.connectionManager.cleanupConnection(record, 'session_ticket_blocked_no_sni');
|
|
164
|
+
return;
|
|
165
|
+
}
|
|
166
|
+
if (this.settings.enableDetailedLogging) {
|
|
167
|
+
console.log(`[${connectionId}] TLS connection with SNI: ${serverName || '(empty)'}`);
|
|
168
|
+
}
|
|
169
|
+
}
|
|
170
|
+
}
|
|
171
|
+
// Find the appropriate route for this connection
|
|
172
|
+
this.routeConnection(socket, record, serverName, chunk);
|
|
173
|
+
});
|
|
174
|
+
}
|
|
175
|
+
/**
|
|
176
|
+
* Route the connection based on match criteria
|
|
177
|
+
*/
|
|
178
|
+
routeConnection(socket, record, serverName, initialChunk) {
|
|
179
|
+
const connectionId = record.id;
|
|
180
|
+
const localPort = record.localPort;
|
|
181
|
+
const remoteIP = record.remoteIP;
|
|
182
|
+
// Find matching route
|
|
183
|
+
const routeMatch = this.routeManager.findMatchingRoute({
|
|
184
|
+
port: localPort,
|
|
185
|
+
domain: serverName,
|
|
186
|
+
clientIp: remoteIP,
|
|
187
|
+
path: undefined, // We don't have path info at this point
|
|
188
|
+
tlsVersion: undefined // We don't extract TLS version yet
|
|
189
|
+
});
|
|
190
|
+
if (!routeMatch) {
|
|
191
|
+
console.log(`[${connectionId}] No route found for ${serverName || 'connection'} on port ${localPort}`);
|
|
192
|
+
// Fall back to legacy matching if we're using a hybrid configuration
|
|
193
|
+
const domainConfig = serverName
|
|
194
|
+
? this.domainConfigManager.findDomainConfig(serverName)
|
|
195
|
+
: this.domainConfigManager.findDomainConfigForPort(localPort);
|
|
196
|
+
if (domainConfig) {
|
|
197
|
+
if (this.settings.enableDetailedLogging) {
|
|
198
|
+
console.log(`[${connectionId}] Using legacy domain configuration for ${serverName || 'port ' + localPort}`);
|
|
199
|
+
}
|
|
200
|
+
// Associate this domain config with the connection
|
|
201
|
+
record.domainConfig = domainConfig;
|
|
202
|
+
// Handle the connection using the legacy setup
|
|
203
|
+
return this.handleLegacyConnection(socket, record, serverName, domainConfig, initialChunk);
|
|
204
|
+
}
|
|
205
|
+
// No matching route or domain config, use default/fallback handling
|
|
206
|
+
console.log(`[${connectionId}] Using default route handling for connection`);
|
|
207
|
+
// Check default security settings
|
|
208
|
+
const defaultSecuritySettings = this.settings.defaults?.security;
|
|
209
|
+
if (defaultSecuritySettings) {
|
|
210
|
+
if (defaultSecuritySettings.allowedIPs && defaultSecuritySettings.allowedIPs.length > 0) {
|
|
211
|
+
const isAllowed = this.securityManager.isIPAuthorized(remoteIP, defaultSecuritySettings.allowedIPs, defaultSecuritySettings.blockedIPs || []);
|
|
212
|
+
if (!isAllowed) {
|
|
213
|
+
console.log(`[${connectionId}] IP ${remoteIP} not in default allowed list`);
|
|
214
|
+
socket.end();
|
|
215
|
+
this.connectionManager.cleanupConnection(record, 'ip_blocked');
|
|
216
|
+
return;
|
|
217
|
+
}
|
|
218
|
+
}
|
|
219
|
+
}
|
|
220
|
+
else if (this.settings.defaultAllowedIPs && this.settings.defaultAllowedIPs.length > 0) {
|
|
221
|
+
// Legacy default IP restrictions
|
|
222
|
+
const isAllowed = this.securityManager.isIPAuthorized(remoteIP, this.settings.defaultAllowedIPs, this.settings.defaultBlockedIPs || []);
|
|
223
|
+
if (!isAllowed) {
|
|
224
|
+
console.log(`[${connectionId}] IP ${remoteIP} not in default allowed list`);
|
|
225
|
+
socket.end();
|
|
226
|
+
this.connectionManager.cleanupConnection(record, 'ip_blocked');
|
|
227
|
+
return;
|
|
228
|
+
}
|
|
229
|
+
}
|
|
230
|
+
// Setup direct connection with default settings
|
|
231
|
+
let targetHost;
|
|
232
|
+
let targetPort;
|
|
233
|
+
if (isRoutedOptions(this.settings) && this.settings.defaults?.target) {
|
|
234
|
+
// Use defaults from routed configuration
|
|
235
|
+
targetHost = this.settings.defaults.target.host;
|
|
236
|
+
targetPort = this.settings.defaults.target.port;
|
|
237
|
+
}
|
|
238
|
+
else {
|
|
239
|
+
// Fall back to legacy settings
|
|
240
|
+
targetHost = this.settings.targetIP || 'localhost';
|
|
241
|
+
targetPort = this.settings.toPort;
|
|
242
|
+
}
|
|
243
|
+
return this.setupDirectConnection(socket, record, undefined, serverName, initialChunk, undefined, targetHost, targetPort);
|
|
244
|
+
}
|
|
245
|
+
// A matching route was found
|
|
246
|
+
const route = routeMatch.route;
|
|
247
|
+
if (this.settings.enableDetailedLogging) {
|
|
248
|
+
console.log(`[${connectionId}] Route matched: "${route.name || 'unnamed'}" for ${serverName || 'connection'} on port ${localPort}`);
|
|
249
|
+
}
|
|
250
|
+
// Handle the route based on its action type
|
|
251
|
+
switch (route.action.type) {
|
|
252
|
+
case 'forward':
|
|
253
|
+
return this.handleForwardAction(socket, record, route, initialChunk);
|
|
254
|
+
case 'redirect':
|
|
255
|
+
return this.handleRedirectAction(socket, record, route);
|
|
256
|
+
case 'block':
|
|
257
|
+
return this.handleBlockAction(socket, record, route);
|
|
258
|
+
default:
|
|
259
|
+
console.log(`[${connectionId}] Unknown action type: ${route.action.type}`);
|
|
260
|
+
socket.end();
|
|
261
|
+
this.connectionManager.cleanupConnection(record, 'unknown_action');
|
|
262
|
+
}
|
|
263
|
+
}
|
|
264
|
+
/**
|
|
265
|
+
* Handle a forward action for a route
|
|
266
|
+
*/
|
|
267
|
+
handleForwardAction(socket, record, route, initialChunk) {
|
|
268
|
+
const connectionId = record.id;
|
|
269
|
+
const action = route.action;
|
|
270
|
+
// We should have a target configuration for forwarding
|
|
271
|
+
if (!action.target) {
|
|
272
|
+
console.log(`[${connectionId}] Forward action missing target configuration`);
|
|
273
|
+
socket.end();
|
|
274
|
+
this.connectionManager.cleanupConnection(record, 'missing_target');
|
|
275
|
+
return;
|
|
276
|
+
}
|
|
277
|
+
// Determine if this needs TLS handling
|
|
278
|
+
if (action.tls) {
|
|
279
|
+
switch (action.tls.mode) {
|
|
280
|
+
case 'passthrough':
|
|
281
|
+
// For TLS passthrough, just forward directly
|
|
282
|
+
if (this.settings.enableDetailedLogging) {
|
|
283
|
+
console.log(`[${connectionId}] Using TLS passthrough to ${action.target.host}`);
|
|
284
|
+
}
|
|
285
|
+
// Allow for array of hosts
|
|
286
|
+
const targetHost = Array.isArray(action.target.host)
|
|
287
|
+
? action.target.host[Math.floor(Math.random() * action.target.host.length)]
|
|
288
|
+
: action.target.host;
|
|
289
|
+
// Determine target port - either target port or preserve incoming port
|
|
290
|
+
const targetPort = action.target.preservePort ? record.localPort : action.target.port;
|
|
291
|
+
return this.setupDirectConnection(socket, record, undefined, record.lockedDomain, initialChunk, undefined, targetHost, targetPort);
|
|
292
|
+
case 'terminate':
|
|
293
|
+
case 'terminate-and-reencrypt':
|
|
294
|
+
// For TLS termination, use NetworkProxy
|
|
295
|
+
if (this.networkProxyBridge.getNetworkProxy()) {
|
|
296
|
+
if (this.settings.enableDetailedLogging) {
|
|
297
|
+
console.log(`[${connectionId}] Using NetworkProxy for TLS termination to ${action.target.host}`);
|
|
298
|
+
}
|
|
299
|
+
// If we have an initial chunk with TLS data, start processing it
|
|
300
|
+
if (initialChunk && record.isTLS) {
|
|
301
|
+
return this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, initialChunk, this.settings.networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
|
|
302
|
+
}
|
|
303
|
+
// This shouldn't normally happen - we should have TLS data at this point
|
|
304
|
+
console.log(`[${connectionId}] TLS termination route without TLS data`);
|
|
305
|
+
socket.end();
|
|
306
|
+
this.connectionManager.cleanupConnection(record, 'tls_error');
|
|
307
|
+
return;
|
|
308
|
+
}
|
|
309
|
+
else {
|
|
310
|
+
console.log(`[${connectionId}] NetworkProxy not available for TLS termination`);
|
|
311
|
+
socket.end();
|
|
312
|
+
this.connectionManager.cleanupConnection(record, 'no_network_proxy');
|
|
313
|
+
return;
|
|
314
|
+
}
|
|
315
|
+
}
|
|
316
|
+
}
|
|
317
|
+
else {
|
|
318
|
+
// No TLS settings - basic forwarding
|
|
319
|
+
if (this.settings.enableDetailedLogging) {
|
|
320
|
+
console.log(`[${connectionId}] Using basic forwarding to ${action.target.host}:${action.target.port}`);
|
|
321
|
+
}
|
|
322
|
+
// Allow for array of hosts
|
|
323
|
+
const targetHost = Array.isArray(action.target.host)
|
|
324
|
+
? action.target.host[Math.floor(Math.random() * action.target.host.length)]
|
|
325
|
+
: action.target.host;
|
|
326
|
+
// Determine target port - either target port or preserve incoming port
|
|
327
|
+
const targetPort = action.target.preservePort ? record.localPort : action.target.port;
|
|
328
|
+
return this.setupDirectConnection(socket, record, undefined, record.lockedDomain, initialChunk, undefined, targetHost, targetPort);
|
|
329
|
+
}
|
|
330
|
+
}
|
|
331
|
+
/**
|
|
332
|
+
* Handle a redirect action for a route
|
|
333
|
+
*/
|
|
334
|
+
handleRedirectAction(socket, record, route) {
|
|
335
|
+
const connectionId = record.id;
|
|
336
|
+
const action = route.action;
|
|
337
|
+
// We should have a redirect configuration
|
|
338
|
+
if (!action.redirect) {
|
|
339
|
+
console.log(`[${connectionId}] Redirect action missing redirect configuration`);
|
|
340
|
+
socket.end();
|
|
341
|
+
this.connectionManager.cleanupConnection(record, 'missing_redirect');
|
|
342
|
+
return;
|
|
343
|
+
}
|
|
344
|
+
// For TLS connections, we can't do redirects at the TCP level
|
|
345
|
+
if (record.isTLS) {
|
|
346
|
+
console.log(`[${connectionId}] Cannot redirect TLS connection at TCP level`);
|
|
347
|
+
socket.end();
|
|
348
|
+
this.connectionManager.cleanupConnection(record, 'tls_redirect_error');
|
|
349
|
+
return;
|
|
350
|
+
}
|
|
351
|
+
// Wait for the first HTTP request to perform the redirect
|
|
352
|
+
const dataListeners = [];
|
|
353
|
+
const httpDataHandler = (chunk) => {
|
|
354
|
+
// Remove all data listeners to avoid duplicated processing
|
|
355
|
+
for (const listener of dataListeners) {
|
|
356
|
+
socket.removeListener('data', listener);
|
|
357
|
+
}
|
|
358
|
+
// Parse HTTP request to get path
|
|
359
|
+
try {
|
|
360
|
+
const headersEnd = chunk.indexOf('\r\n\r\n');
|
|
361
|
+
if (headersEnd === -1) {
|
|
362
|
+
// Not a complete HTTP request, need more data
|
|
363
|
+
socket.once('data', httpDataHandler);
|
|
364
|
+
dataListeners.push(httpDataHandler);
|
|
365
|
+
return;
|
|
366
|
+
}
|
|
367
|
+
const httpHeaders = chunk.slice(0, headersEnd).toString();
|
|
368
|
+
const requestLine = httpHeaders.split('\r\n')[0];
|
|
369
|
+
const [method, path] = requestLine.split(' ');
|
|
370
|
+
// Extract Host header
|
|
371
|
+
const hostMatch = httpHeaders.match(/Host: (.+?)(\r\n|\r|\n|$)/i);
|
|
372
|
+
const host = hostMatch ? hostMatch[1].trim() : record.lockedDomain || '';
|
|
373
|
+
// Process the redirect URL with template variables
|
|
374
|
+
let redirectUrl = action.redirect.to;
|
|
375
|
+
redirectUrl = redirectUrl.replace(/\{domain\}/g, host);
|
|
376
|
+
redirectUrl = redirectUrl.replace(/\{path\}/g, path || '');
|
|
377
|
+
redirectUrl = redirectUrl.replace(/\{port\}/g, record.localPort.toString());
|
|
378
|
+
// Prepare the HTTP redirect response
|
|
379
|
+
const redirectResponse = [
|
|
380
|
+
`HTTP/1.1 ${action.redirect.status} Moved`,
|
|
381
|
+
`Location: ${redirectUrl}`,
|
|
382
|
+
'Connection: close',
|
|
383
|
+
'Content-Length: 0',
|
|
384
|
+
'',
|
|
385
|
+
''
|
|
386
|
+
].join('\r\n');
|
|
387
|
+
if (this.settings.enableDetailedLogging) {
|
|
388
|
+
console.log(`[${connectionId}] Redirecting to ${redirectUrl} with status ${action.redirect.status}`);
|
|
389
|
+
}
|
|
390
|
+
// Send the redirect response
|
|
391
|
+
socket.end(redirectResponse);
|
|
392
|
+
this.connectionManager.initiateCleanupOnce(record, 'redirect_complete');
|
|
393
|
+
}
|
|
394
|
+
catch (err) {
|
|
395
|
+
console.log(`[${connectionId}] Error processing HTTP redirect: ${err}`);
|
|
396
|
+
socket.end();
|
|
397
|
+
this.connectionManager.initiateCleanupOnce(record, 'redirect_error');
|
|
398
|
+
}
|
|
399
|
+
};
|
|
400
|
+
// Setup the HTTP data handler
|
|
401
|
+
socket.once('data', httpDataHandler);
|
|
402
|
+
dataListeners.push(httpDataHandler);
|
|
403
|
+
}
|
|
404
|
+
/**
|
|
405
|
+
* Handle a block action for a route
|
|
406
|
+
*/
|
|
407
|
+
handleBlockAction(socket, record, route) {
|
|
408
|
+
const connectionId = record.id;
|
|
409
|
+
if (this.settings.enableDetailedLogging) {
|
|
410
|
+
console.log(`[${connectionId}] Blocking connection based on route "${route.name || 'unnamed'}"`);
|
|
411
|
+
}
|
|
412
|
+
// Simply close the connection
|
|
413
|
+
socket.end();
|
|
414
|
+
this.connectionManager.initiateCleanupOnce(record, 'route_blocked');
|
|
415
|
+
}
|
|
416
|
+
/**
|
|
417
|
+
* Handle a connection using legacy domain configuration
|
|
418
|
+
*/
|
|
419
|
+
handleLegacyConnection(socket, record, serverName, domainConfig, initialChunk) {
|
|
420
|
+
const connectionId = record.id;
|
|
421
|
+
// Get the forwarding type for this domain
|
|
422
|
+
const forwardingType = this.domainConfigManager.getForwardingType(domainConfig);
|
|
423
|
+
// IP validation
|
|
424
|
+
const ipRules = this.domainConfigManager.getEffectiveIPRules(domainConfig);
|
|
425
|
+
if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
|
|
426
|
+
console.log(`[${connectionId}] Connection rejected: IP ${record.remoteIP} not allowed for domain ${domainConfig.domains.join(', ')}`);
|
|
427
|
+
socket.end();
|
|
428
|
+
this.connectionManager.initiateCleanupOnce(record, 'ip_blocked');
|
|
429
|
+
return;
|
|
430
|
+
}
|
|
431
|
+
// Handle based on forwarding type
|
|
432
|
+
switch (forwardingType) {
|
|
433
|
+
case 'http-only':
|
|
434
|
+
// For HTTP-only configs with TLS traffic
|
|
435
|
+
if (record.isTLS) {
|
|
436
|
+
console.log(`[${connectionId}] Received TLS connection for HTTP-only domain ${serverName}`);
|
|
437
|
+
socket.end();
|
|
438
|
+
this.connectionManager.initiateCleanupOnce(record, 'wrong_protocol');
|
|
439
|
+
return;
|
|
440
|
+
}
|
|
441
|
+
break;
|
|
442
|
+
case 'https-passthrough':
|
|
443
|
+
// For TLS passthrough with TLS traffic
|
|
444
|
+
if (record.isTLS) {
|
|
445
|
+
try {
|
|
446
|
+
const handler = this.domainConfigManager.getForwardingHandler(domainConfig);
|
|
447
|
+
if (this.settings.enableDetailedLogging) {
|
|
448
|
+
console.log(`[${connectionId}] Using forwarding handler for SNI passthrough to ${serverName}`);
|
|
449
|
+
}
|
|
450
|
+
// Handle the connection using the handler
|
|
451
|
+
return handler.handleConnection(socket);
|
|
452
|
+
}
|
|
453
|
+
catch (err) {
|
|
454
|
+
console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
|
|
455
|
+
}
|
|
456
|
+
}
|
|
457
|
+
break;
|
|
458
|
+
case 'https-terminate-to-http':
|
|
459
|
+
case 'https-terminate-to-https':
|
|
460
|
+
// For TLS termination with TLS traffic
|
|
461
|
+
if (record.isTLS) {
|
|
462
|
+
const networkProxyPort = this.domainConfigManager.getNetworkProxyPort(domainConfig);
|
|
463
|
+
if (this.settings.enableDetailedLogging) {
|
|
464
|
+
console.log(`[${connectionId}] Using TLS termination (${forwardingType}) for ${serverName} on port ${networkProxyPort}`);
|
|
465
|
+
}
|
|
466
|
+
// Forward to NetworkProxy with domain-specific port
|
|
467
|
+
return this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, initialChunk, networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
|
|
468
|
+
}
|
|
469
|
+
break;
|
|
470
|
+
}
|
|
471
|
+
// If we're still here, use the forwarding handler if available
|
|
472
|
+
try {
|
|
473
|
+
const handler = this.domainConfigManager.getForwardingHandler(domainConfig);
|
|
474
|
+
if (this.settings.enableDetailedLogging) {
|
|
475
|
+
console.log(`[${connectionId}] Using general forwarding handler for domain ${serverName || 'unknown'}`);
|
|
476
|
+
}
|
|
477
|
+
// Handle the connection using the handler
|
|
478
|
+
return handler.handleConnection(socket);
|
|
479
|
+
}
|
|
480
|
+
catch (err) {
|
|
481
|
+
console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
|
|
482
|
+
}
|
|
483
|
+
// Fallback: set up direct connection
|
|
484
|
+
const targetIp = this.domainConfigManager.getTargetIP(domainConfig);
|
|
485
|
+
const targetPort = this.domainConfigManager.getTargetPort(domainConfig, this.settings.toPort);
|
|
486
|
+
return this.setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, undefined, targetIp, targetPort);
|
|
487
|
+
}
|
|
488
|
+
/**
|
|
489
|
+
* Sets up a direct connection to the target
|
|
490
|
+
*/
|
|
491
|
+
setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, overridePort, targetHost, targetPort) {
|
|
492
|
+
const connectionId = record.id;
|
|
493
|
+
// Determine target host and port if not provided
|
|
494
|
+
const finalTargetHost = targetHost || (domainConfig
|
|
495
|
+
? this.domainConfigManager.getTargetIP(domainConfig)
|
|
496
|
+
: this.settings.defaults?.target?.host
|
|
497
|
+
? this.settings.defaults.target.host
|
|
498
|
+
: this.settings.targetIP);
|
|
499
|
+
// Determine target port - first try explicit port, then forwarding config, then fallback
|
|
500
|
+
const finalTargetPort = targetPort || (overridePort !== undefined
|
|
501
|
+
? overridePort
|
|
502
|
+
: domainConfig
|
|
503
|
+
? this.domainConfigManager.getTargetPort(domainConfig, this.settings.toPort)
|
|
504
|
+
: this.settings.defaults?.target?.port
|
|
505
|
+
? this.settings.defaults.target.port
|
|
506
|
+
: this.settings.toPort);
|
|
507
|
+
// Setup connection options
|
|
508
|
+
const connectionOptions = {
|
|
509
|
+
host: finalTargetHost,
|
|
510
|
+
port: finalTargetPort,
|
|
511
|
+
};
|
|
512
|
+
// Preserve source IP if configured
|
|
513
|
+
if (this.settings.defaults?.preserveSourceIP || this.settings.preserveSourceIP) {
|
|
514
|
+
connectionOptions.localAddress = record.remoteIP.replace('::ffff:', '');
|
|
515
|
+
}
|
|
516
|
+
// Create a safe queue for incoming data
|
|
517
|
+
const dataQueue = [];
|
|
518
|
+
let queueSize = 0;
|
|
519
|
+
let processingQueue = false;
|
|
520
|
+
let drainPending = false;
|
|
521
|
+
let pipingEstablished = false;
|
|
522
|
+
// Pause the incoming socket to prevent buffer overflows
|
|
523
|
+
socket.pause();
|
|
524
|
+
// Function to safely process the data queue without losing events
|
|
525
|
+
const processDataQueue = () => {
|
|
526
|
+
if (processingQueue || dataQueue.length === 0 || pipingEstablished)
|
|
527
|
+
return;
|
|
528
|
+
processingQueue = true;
|
|
529
|
+
try {
|
|
530
|
+
// Process all queued chunks with the current active handler
|
|
531
|
+
while (dataQueue.length > 0) {
|
|
532
|
+
const chunk = dataQueue.shift();
|
|
533
|
+
queueSize -= chunk.length;
|
|
534
|
+
// Once piping is established, we shouldn't get here,
|
|
535
|
+
// but just in case, pass to the outgoing socket directly
|
|
536
|
+
if (pipingEstablished && record.outgoing) {
|
|
537
|
+
record.outgoing.write(chunk);
|
|
538
|
+
continue;
|
|
539
|
+
}
|
|
540
|
+
// Track bytes received
|
|
541
|
+
record.bytesReceived += chunk.length;
|
|
542
|
+
// Check for TLS handshake
|
|
543
|
+
if (!record.isTLS && this.tlsManager.isTlsHandshake(chunk)) {
|
|
544
|
+
record.isTLS = true;
|
|
545
|
+
if (this.settings.enableTlsDebugLogging) {
|
|
546
|
+
console.log(`[${connectionId}] TLS handshake detected in tempDataHandler, ${chunk.length} bytes`);
|
|
547
|
+
}
|
|
548
|
+
}
|
|
549
|
+
// Check if adding this chunk would exceed the buffer limit
|
|
550
|
+
const newSize = record.pendingDataSize + chunk.length;
|
|
551
|
+
if (this.settings.maxPendingDataSize && newSize > this.settings.maxPendingDataSize) {
|
|
552
|
+
console.log(`[${connectionId}] Buffer limit exceeded for connection from ${record.remoteIP}: ${newSize} bytes > ${this.settings.maxPendingDataSize} bytes`);
|
|
553
|
+
socket.end(); // Gracefully close the socket
|
|
554
|
+
this.connectionManager.initiateCleanupOnce(record, 'buffer_limit_exceeded');
|
|
555
|
+
return;
|
|
556
|
+
}
|
|
557
|
+
// Buffer the chunk and update the size counter
|
|
558
|
+
record.pendingData.push(Buffer.from(chunk));
|
|
559
|
+
record.pendingDataSize = newSize;
|
|
560
|
+
this.timeoutManager.updateActivity(record);
|
|
561
|
+
}
|
|
562
|
+
}
|
|
563
|
+
finally {
|
|
564
|
+
processingQueue = false;
|
|
565
|
+
// If there's a pending drain and we've processed everything,
|
|
566
|
+
// signal we're ready for more data if we haven't established piping yet
|
|
567
|
+
if (drainPending && dataQueue.length === 0 && !pipingEstablished) {
|
|
568
|
+
drainPending = false;
|
|
569
|
+
socket.resume();
|
|
570
|
+
}
|
|
571
|
+
}
|
|
572
|
+
};
|
|
573
|
+
// Unified data handler that safely queues incoming data
|
|
574
|
+
const safeDataHandler = (chunk) => {
|
|
575
|
+
// If piping is already established, just let the pipe handle it
|
|
576
|
+
if (pipingEstablished)
|
|
577
|
+
return;
|
|
578
|
+
// Add to our queue for orderly processing
|
|
579
|
+
dataQueue.push(Buffer.from(chunk)); // Make a copy to be safe
|
|
580
|
+
queueSize += chunk.length;
|
|
581
|
+
// If queue is getting large, pause socket until we catch up
|
|
582
|
+
if (this.settings.maxPendingDataSize && queueSize > this.settings.maxPendingDataSize * 0.8) {
|
|
583
|
+
socket.pause();
|
|
584
|
+
drainPending = true;
|
|
585
|
+
}
|
|
586
|
+
// Process the queue
|
|
587
|
+
processDataQueue();
|
|
588
|
+
};
|
|
589
|
+
// Add our safe data handler
|
|
590
|
+
socket.on('data', safeDataHandler);
|
|
591
|
+
// Add initial chunk to pending data if present
|
|
592
|
+
if (initialChunk) {
|
|
593
|
+
record.bytesReceived += initialChunk.length;
|
|
594
|
+
record.pendingData.push(Buffer.from(initialChunk));
|
|
595
|
+
record.pendingDataSize = initialChunk.length;
|
|
596
|
+
}
|
|
597
|
+
// Create the target socket but don't set up piping immediately
|
|
598
|
+
const targetSocket = plugins.net.connect(connectionOptions);
|
|
599
|
+
record.outgoing = targetSocket;
|
|
600
|
+
record.outgoingStartTime = Date.now();
|
|
601
|
+
// Apply socket optimizations
|
|
602
|
+
targetSocket.setNoDelay(this.settings.noDelay);
|
|
603
|
+
// Apply keep-alive settings to the outgoing connection as well
|
|
604
|
+
if (this.settings.keepAlive) {
|
|
605
|
+
targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
|
606
|
+
// Apply enhanced TCP keep-alive options if enabled
|
|
607
|
+
if (this.settings.enableKeepAliveProbes) {
|
|
608
|
+
try {
|
|
609
|
+
if ('setKeepAliveProbes' in targetSocket) {
|
|
610
|
+
targetSocket.setKeepAliveProbes(10);
|
|
611
|
+
}
|
|
612
|
+
if ('setKeepAliveInterval' in targetSocket) {
|
|
613
|
+
targetSocket.setKeepAliveInterval(1000);
|
|
614
|
+
}
|
|
615
|
+
}
|
|
616
|
+
catch (err) {
|
|
617
|
+
// Ignore errors - these are optional enhancements
|
|
618
|
+
if (this.settings.enableDetailedLogging) {
|
|
619
|
+
console.log(`[${connectionId}] Enhanced TCP keep-alive not supported for outgoing socket: ${err}`);
|
|
620
|
+
}
|
|
621
|
+
}
|
|
622
|
+
}
|
|
623
|
+
}
|
|
624
|
+
// Setup specific error handler for connection phase
|
|
625
|
+
targetSocket.once('error', (err) => {
|
|
626
|
+
// This handler runs only once during the initial connection phase
|
|
627
|
+
const code = err.code;
|
|
628
|
+
console.log(`[${connectionId}] Connection setup error to ${finalTargetHost}:${connectionOptions.port}: ${err.message} (${code})`);
|
|
629
|
+
// Resume the incoming socket to prevent it from hanging
|
|
630
|
+
socket.resume();
|
|
631
|
+
if (code === 'ECONNREFUSED') {
|
|
632
|
+
console.log(`[${connectionId}] Target ${finalTargetHost}:${connectionOptions.port} refused connection`);
|
|
633
|
+
}
|
|
634
|
+
else if (code === 'ETIMEDOUT') {
|
|
635
|
+
console.log(`[${connectionId}] Connection to ${finalTargetHost}:${connectionOptions.port} timed out`);
|
|
636
|
+
}
|
|
637
|
+
else if (code === 'ECONNRESET') {
|
|
638
|
+
console.log(`[${connectionId}] Connection to ${finalTargetHost}:${connectionOptions.port} was reset`);
|
|
639
|
+
}
|
|
640
|
+
else if (code === 'EHOSTUNREACH') {
|
|
641
|
+
console.log(`[${connectionId}] Host ${finalTargetHost} is unreachable`);
|
|
642
|
+
}
|
|
643
|
+
// Clear any existing error handler after connection phase
|
|
644
|
+
targetSocket.removeAllListeners('error');
|
|
645
|
+
// Re-add the normal error handler for established connections
|
|
646
|
+
targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
|
|
647
|
+
if (record.outgoingTerminationReason === null) {
|
|
648
|
+
record.outgoingTerminationReason = 'connection_failed';
|
|
649
|
+
this.connectionManager.incrementTerminationStat('outgoing', 'connection_failed');
|
|
650
|
+
}
|
|
651
|
+
// If we have a forwarding handler for this domain, let it handle the error
|
|
652
|
+
if (domainConfig) {
|
|
653
|
+
try {
|
|
654
|
+
const forwardingHandler = this.domainConfigManager.getForwardingHandler(domainConfig);
|
|
655
|
+
forwardingHandler.emit('connection_error', {
|
|
656
|
+
socket,
|
|
657
|
+
error: err,
|
|
658
|
+
connectionId
|
|
659
|
+
});
|
|
660
|
+
}
|
|
661
|
+
catch (handlerErr) {
|
|
662
|
+
// If getting the handler fails, just log and continue with normal cleanup
|
|
663
|
+
console.log(`Error getting forwarding handler for error handling: ${handlerErr}`);
|
|
664
|
+
}
|
|
665
|
+
}
|
|
666
|
+
// Clean up the connection
|
|
667
|
+
this.connectionManager.initiateCleanupOnce(record, `connection_failed_${code}`);
|
|
668
|
+
});
|
|
669
|
+
// Setup close handler
|
|
670
|
+
targetSocket.on('close', this.connectionManager.handleClose('outgoing', record));
|
|
671
|
+
socket.on('close', this.connectionManager.handleClose('incoming', record));
|
|
672
|
+
// Handle timeouts with keep-alive awareness
|
|
673
|
+
socket.on('timeout', () => {
|
|
674
|
+
// For keep-alive connections, just log a warning instead of closing
|
|
675
|
+
if (record.hasKeepAlive) {
|
|
676
|
+
console.log(`[${connectionId}] Timeout event on incoming keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
|
|
677
|
+
return;
|
|
678
|
+
}
|
|
679
|
+
// For non-keep-alive connections, proceed with normal cleanup
|
|
680
|
+
console.log(`[${connectionId}] Timeout on incoming side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
|
681
|
+
if (record.incomingTerminationReason === null) {
|
|
682
|
+
record.incomingTerminationReason = 'timeout';
|
|
683
|
+
this.connectionManager.incrementTerminationStat('incoming', 'timeout');
|
|
684
|
+
}
|
|
685
|
+
this.connectionManager.initiateCleanupOnce(record, 'timeout_incoming');
|
|
686
|
+
});
|
|
687
|
+
targetSocket.on('timeout', () => {
|
|
688
|
+
// For keep-alive connections, just log a warning instead of closing
|
|
689
|
+
if (record.hasKeepAlive) {
|
|
690
|
+
console.log(`[${connectionId}] Timeout event on outgoing keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
|
|
691
|
+
return;
|
|
692
|
+
}
|
|
693
|
+
// For non-keep-alive connections, proceed with normal cleanup
|
|
694
|
+
console.log(`[${connectionId}] Timeout on outgoing side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
|
695
|
+
if (record.outgoingTerminationReason === null) {
|
|
696
|
+
record.outgoingTerminationReason = 'timeout';
|
|
697
|
+
this.connectionManager.incrementTerminationStat('outgoing', 'timeout');
|
|
698
|
+
}
|
|
699
|
+
this.connectionManager.initiateCleanupOnce(record, 'timeout_outgoing');
|
|
700
|
+
});
|
|
701
|
+
// Apply socket timeouts
|
|
702
|
+
this.timeoutManager.applySocketTimeouts(record);
|
|
703
|
+
// Track outgoing data for bytes counting
|
|
704
|
+
targetSocket.on('data', (chunk) => {
|
|
705
|
+
record.bytesSent += chunk.length;
|
|
706
|
+
this.timeoutManager.updateActivity(record);
|
|
707
|
+
});
|
|
708
|
+
// Wait for the outgoing connection to be ready before setting up piping
|
|
709
|
+
targetSocket.once('connect', () => {
|
|
710
|
+
// Clear the initial connection error handler
|
|
711
|
+
targetSocket.removeAllListeners('error');
|
|
712
|
+
// Add the normal error handler for established connections
|
|
713
|
+
targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
|
|
714
|
+
// Process any remaining data in the queue before switching to piping
|
|
715
|
+
processDataQueue();
|
|
716
|
+
// Set up piping immediately
|
|
717
|
+
pipingEstablished = true;
|
|
718
|
+
// Flush all pending data to target
|
|
719
|
+
if (record.pendingData.length > 0) {
|
|
720
|
+
const combinedData = Buffer.concat(record.pendingData);
|
|
721
|
+
if (this.settings.enableDetailedLogging) {
|
|
722
|
+
console.log(`[${connectionId}] Forwarding ${combinedData.length} bytes of initial data to target`);
|
|
723
|
+
}
|
|
724
|
+
// Write pending data immediately
|
|
725
|
+
targetSocket.write(combinedData, (err) => {
|
|
726
|
+
if (err) {
|
|
727
|
+
console.log(`[${connectionId}] Error writing pending data to target: ${err.message}`);
|
|
728
|
+
return this.connectionManager.initiateCleanupOnce(record, 'write_error');
|
|
729
|
+
}
|
|
730
|
+
});
|
|
731
|
+
// Clear the buffer now that we've processed it
|
|
732
|
+
record.pendingData = [];
|
|
733
|
+
record.pendingDataSize = 0;
|
|
734
|
+
}
|
|
735
|
+
// Setup piping in both directions without any delays
|
|
736
|
+
socket.pipe(targetSocket);
|
|
737
|
+
targetSocket.pipe(socket);
|
|
738
|
+
// Resume the socket to ensure data flows
|
|
739
|
+
socket.resume();
|
|
740
|
+
// Process any data that might be queued in the interim
|
|
741
|
+
if (dataQueue.length > 0) {
|
|
742
|
+
// Write any remaining queued data directly to the target socket
|
|
743
|
+
for (const chunk of dataQueue) {
|
|
744
|
+
targetSocket.write(chunk);
|
|
745
|
+
}
|
|
746
|
+
// Clear the queue
|
|
747
|
+
dataQueue.length = 0;
|
|
748
|
+
queueSize = 0;
|
|
749
|
+
}
|
|
750
|
+
if (this.settings.enableDetailedLogging) {
|
|
751
|
+
console.log(`[${connectionId}] Connection established: ${record.remoteIP} -> ${finalTargetHost}:${connectionOptions.port}` +
|
|
752
|
+
`${serverName
|
|
753
|
+
? ` (SNI: ${serverName})`
|
|
754
|
+
: domainConfig
|
|
755
|
+
? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
|
|
756
|
+
: ''}` +
|
|
757
|
+
` TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}`);
|
|
758
|
+
}
|
|
759
|
+
else {
|
|
760
|
+
console.log(`Connection established: ${record.remoteIP} -> ${finalTargetHost}:${connectionOptions.port}` +
|
|
761
|
+
`${serverName
|
|
762
|
+
? ` (SNI: ${serverName})`
|
|
763
|
+
: domainConfig
|
|
764
|
+
? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
|
|
765
|
+
: ''}`);
|
|
766
|
+
}
|
|
767
|
+
// Add the renegotiation handler for SNI validation
|
|
768
|
+
if (serverName) {
|
|
769
|
+
// Create connection info object for the existing connection
|
|
770
|
+
const connInfo = {
|
|
771
|
+
sourceIp: record.remoteIP,
|
|
772
|
+
sourcePort: record.incoming.remotePort || 0,
|
|
773
|
+
destIp: record.incoming.localAddress || '',
|
|
774
|
+
destPort: record.incoming.localPort || 0,
|
|
775
|
+
};
|
|
776
|
+
// Create a renegotiation handler function
|
|
777
|
+
const renegotiationHandler = this.tlsManager.createRenegotiationHandler(connectionId, serverName, connInfo, (connectionId, reason) => this.connectionManager.initiateCleanupOnce(record, reason));
|
|
778
|
+
// Store the handler in the connection record so we can remove it during cleanup
|
|
779
|
+
record.renegotiationHandler = renegotiationHandler;
|
|
780
|
+
// Add the handler to the socket
|
|
781
|
+
socket.on('data', renegotiationHandler);
|
|
782
|
+
if (this.settings.enableDetailedLogging) {
|
|
783
|
+
console.log(`[${connectionId}] TLS renegotiation handler installed for SNI domain: ${serverName}`);
|
|
784
|
+
if (this.settings.allowSessionTicket === false) {
|
|
785
|
+
console.log(`[${connectionId}] Session ticket usage is disabled. Connection will be reset on reconnection attempts.`);
|
|
786
|
+
}
|
|
787
|
+
}
|
|
788
|
+
}
|
|
789
|
+
// Set connection timeout
|
|
790
|
+
record.cleanupTimer = this.timeoutManager.setupConnectionTimeout(record, (record, reason) => {
|
|
791
|
+
console.log(`[${connectionId}] Connection from ${record.remoteIP} exceeded max lifetime, forcing cleanup.`);
|
|
792
|
+
this.connectionManager.initiateCleanupOnce(record, reason);
|
|
793
|
+
});
|
|
794
|
+
// Mark TLS handshake as complete for TLS connections
|
|
795
|
+
if (record.isTLS) {
|
|
796
|
+
record.tlsHandshakeComplete = true;
|
|
797
|
+
if (this.settings.enableTlsDebugLogging) {
|
|
798
|
+
console.log(`[${connectionId}] TLS handshake complete for connection from ${record.remoteIP}`);
|
|
799
|
+
}
|
|
800
|
+
}
|
|
801
|
+
});
|
|
802
|
+
}
|
|
803
|
+
}
|
|
804
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"route-connection-handler.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/route-connection-handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAM5C,OAAO,EACL,eAAe,EACf,eAAe,EAChB,MAAM,wBAAwB,CAAC;AAKhC,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACjE,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAIlD;;GAEG;AACH,MAAM,OAAO,sBAAsB;IAGjC,YACE,QAA4B,EACpB,iBAAoC,EACpC,eAAgC,EAChC,mBAAwC,EACxC,UAAsB,EACtB,kBAAsC,EACtC,cAA8B,EAC9B,YAA0B;QAN1B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;QAChC,wBAAmB,GAAnB,mBAAmB,CAAqB;QACxC,eAAU,GAAV,UAAU,CAAY;QACtB,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,mBAAc,GAAd,cAAc,CAAgB;QAC9B,iBAAY,GAAZ,YAAY,CAAc;QAElC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,gBAAgB,CAAC,MAA0B;QAChD,MAAM,QAAQ,GAAG,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,IAAI,CAAC,CAAC;QAExC,wDAAwD;QACxD,MAAM,YAAY,GAAG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QAC/D,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,OAAO,CAAC,GAAG,CAAC,4BAA4B,QAAQ,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC;YAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,OAAO,EAAE,CAAC;YACjB,OAAO;QACT,CAAC;QAED,iCAAiC;QACjC,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC/D,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,6BAA6B;QAC7B,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAEzC,uCAAuC;QACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAC/D,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;YAE3B,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,uDAAuD;oBACvD,IAAI,oBAAoB,IAAI,MAAM,EAAE,CAAC;wBAClC,MAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBACzC,CAAC;oBACD,IAAI,sBAAsB,IAAI,MAAM,EAAE,CAAC;wBACpC,MAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBAC7C,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,GAAG,EAAE,CAAC,CAAC;oBAC1F,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yBAAyB,QAAQ,YAAY,SAAS,IAAI;gBACxE,eAAe,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,IAAI;gBAC/D,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CACvE,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CACT,uBAAuB,QAAQ,YAAY,SAAS,yBAAyB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CAC3H,CAAC;QACJ,CAAC;QAED,yBAAyB;QACzB,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IAC3C,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,MAA0B,EAAE,MAAyB;QAC/E,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QACnC,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAEhC,4CAA4C;QAC5C,IAAI,cAAc,GAA0B,UAAU,CAAC,GAAG,EAAE;YAC1D,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,MAAM,CAAC,QAAQ,EAAE,CACxH,CAAC;gBAEF,qBAAqB;gBACrB,UAAU,CAAC,GAAG,EAAE;oBACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;wBACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;wBAC/E,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;4BACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;wBACjF,CAAC;wBACD,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBACtE,CAAC;gBACH,CAAC,EAAE,KAAK,CAAC,CAAC;YACZ,CAAC;QACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;QAEtC,mDAAmD;QACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;YACzB,cAAc,CAAC,KAAK,EAAE,CAAC;QACzB,CAAC;QAED,uBAAuB;QACvB,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,sDAAsD;QACtD,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACpC,sDAAsD;YACtD,IAAI,cAAc,EAAE,CAAC;gBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;gBAC7B,cAAc,GAAG,IAAI,CAAC;YACxB,CAAC;YAED,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,wCAAwC;YACxC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;gBAChE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C;oBAC3D,8EAA8E,CACjF,CAAC;gBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oBAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;oBACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;gBACjF,CAAC;gBACD,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;gBACpE,OAAO;YACT,CAAC;YAED,2CAA2C;YAC3C,IAAI,UAAU,GAAG,EAAE,CAAC;YACpB,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC1C,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,uCAAuC;gBACvC,IAAI,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;oBACzC,4CAA4C;oBAC5C,MAAM,QAAQ,GAAG;wBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;wBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;wBACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;qBAChC,CAAC;oBAEF,cAAc;oBACd,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,QAAQ,CAAC,IAAI,EAAE,CAAC;oBAE/D,4CAA4C;oBAC5C,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;oBAEjC,oDAAoD;oBACpD,IAAI,CAAC,UAAU,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC9D,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,0DAA0D,CAAC,CAAC;wBACxF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,+BAA+B,CAAC;4BACnE,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,+BAA+B,CAAC,CAAC;wBAC/F,CAAC;wBACD,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;wBACtE,IAAI,CAAC;4BACH,MAAM,CAAC,IAAI,EAAE,CAAC;4BACd,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;4BACpB,MAAM,CAAC,MAAM,EAAE,CAAC;4BAChB,MAAM,CAAC,GAAG,EAAE,CAAC;wBACf,CAAC;wBAAC,MAAM,CAAC;4BACP,MAAM,CAAC,GAAG,EAAE,CAAC;wBACf,CAAC;wBACD,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;wBAClF,OAAO;oBACT,CAAC;oBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,8BAA8B,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;oBACvF,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,KAAK,CAAC,CAAC;QAC1D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,eAAe,CACrB,MAA0B,EAC1B,MAAyB,EACzB,UAAkB,EAClB,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QACnC,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC;QAEjC,sBAAsB;QACtB,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC;YACrD,IAAI,EAAE,SAAS;YACf,MAAM,EAAE,UAAU;YAClB,QAAQ,EAAE,QAAQ;YAClB,IAAI,EAAE,SAAS,EAAE,wCAAwC;YACzD,UAAU,EAAE,SAAS,CAAC,mCAAmC;SAC1D,CAAC,CAAC;QAEH,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,wBAAwB,UAAU,IAAI,YAAY,YAAY,SAAS,EAAE,CAAC,CAAC;YAEvG,qEAAqE;YACrE,MAAM,YAAY,GAAG,UAAU;gBAC7B,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,UAAU,CAAC;gBACvD,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,CAAC,SAAS,CAAC,CAAC;YAEhE,IAAI,YAAY,EAAE,CAAC;gBACjB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,UAAU,IAAI,OAAO,GAAG,SAAS,EAAE,CAAC,CAAC;gBAC9G,CAAC;gBAED,mDAAmD;gBACnD,MAAM,CAAC,YAAY,GAAG,YAAY,CAAC;gBAEnC,+CAA+C;gBAC/C,OAAO,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,YAAY,EAAE,YAAY,CAAC,CAAC;YAC7F,CAAC;YAED,oEAAoE;YACpE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+CAA+C,CAAC,CAAC;YAE7E,kCAAkC;YAClC,MAAM,uBAAuB,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC;YACjE,IAAI,uBAAuB,EAAE,CAAC;gBAC5B,IAAI,uBAAuB,CAAC,UAAU,IAAI,uBAAuB,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACxF,MAAM,SAAS,GAAG,IAAI,CAAC,eAAe,CAAC,cAAc,CACnD,QAAQ,EACR,uBAAuB,CAAC,UAAU,EAClC,uBAAuB,CAAC,UAAU,IAAI,EAAE,CACzC,CAAC;oBAEF,IAAI,CAAC,SAAS,EAAE,CAAC;wBACf,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,QAAQ,QAAQ,8BAA8B,CAAC,CAAC;wBAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;wBAC/D,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzF,iCAAiC;gBACjC,MAAM,SAAS,GAAG,IAAI,CAAC,eAAe,CAAC,cAAc,CACnD,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,iBAAiB,EAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CACtC,CAAC;gBAEF,IAAI,CAAC,SAAS,EAAE,CAAC;oBACf,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,QAAQ,QAAQ,8BAA8B,CAAC,CAAC;oBAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;oBAC/D,OAAO;gBACT,CAAC;YACH,CAAC;YAED,gDAAgD;YAChD,IAAI,UAAkB,CAAC;YACvB,IAAI,UAAkB,CAAC;YAEvB,IAAI,eAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;gBACrE,yCAAyC;gBACzC,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC;gBAChD,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC;YAClD,CAAC;iBAAM,CAAC;gBACN,+BAA+B;gBAC/B,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,IAAI,WAAW,CAAC;gBACnD,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC;YACpC,CAAC;YAED,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,SAAS,EACT,UAAU,EACV,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;QACJ,CAAC;QAED,6BAA6B;QAC7B,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;QAE/B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,KAAK,CAAC,IAAI,IAAI,SAAS,SAAS,UAAU,IAAI,YAAY,YAAY,SAAS,EAAE,CACvH,CAAC;QACJ,CAAC;QAED,4CAA4C;QAC5C,QAAQ,KAAK,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;YAC1B,KAAK,SAAS;gBACZ,OAAO,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,YAAY,CAAC,CAAC;YAEvE,KAAK,UAAU;gBACb,OAAO,IAAI,CAAC,oBAAoB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;YAE1D,KAAK,OAAO;gBACV,OAAO,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;YAEvD;gBACE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,0BAA2B,KAAK,CAAC,MAAc,CAAC,IAAI,EAAE,CAAC,CAAC;gBACpF,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;QACvE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,mBAAmB,CACzB,MAA0B,EAC1B,MAAyB,EACzB,KAAmB,EACnB,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC;QAE5B,uDAAuD;QACvD,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YACnB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+CAA+C,CAAC,CAAC;YAC7E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;YACnE,OAAO;QACT,CAAC;QAED,uCAAuC;QACvC,IAAI,MAAM,CAAC,GAAG,EAAE,CAAC;YACf,QAAQ,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC;gBACxB,KAAK,aAAa;oBAChB,6CAA6C;oBAC7C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,8BAA8B,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;oBAClF,CAAC;oBAED,2BAA2B;oBAC3B,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;wBAClD,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;wBAC3E,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAEvB,uEAAuE;oBACvE,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAEtF,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,SAAS,EACT,MAAM,CAAC,YAAY,EACnB,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;gBAEJ,KAAK,WAAW,CAAC;gBACjB,KAAK,yBAAyB;oBAC5B,wCAAwC;oBACxC,IAAI,IAAI,CAAC,kBAAkB,CAAC,eAAe,EAAE,EAAE,CAAC;wBAC9C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CACpF,CAAC;wBACJ,CAAC;wBAED,iEAAiE;wBACjE,IAAI,YAAY,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;4BACjC,OAAO,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAClD,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAY,EACZ,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAC9B,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;wBACJ,CAAC;wBAED,yEAAyE;wBACzE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,0CAA0C,CAAC,CAAC;wBACxE,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;wBAC9D,OAAO;oBACT,CAAC;yBAAM,CAAC;wBACN,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,CAAC,CAAC;wBAChF,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;wBACrE,OAAO;oBACT,CAAC;YACL,CAAC;QACH,CAAC;aAAM,CAAC;YACN,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+BAA+B,MAAM,CAAC,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;YACzG,CAAC;YAED,2BAA2B;YAC3B,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;gBAClD,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;gBAC3E,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;YAEvB,uEAAuE;YACvE,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;YAEtF,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,SAAS,EACT,MAAM,CAAC,YAAY,EACnB,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;OAEG;IACK,oBAAoB,CAC1B,MAA0B,EAC1B,MAAyB,EACzB,KAAmB;QAEnB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC;QAE5B,0CAA0C;QAC1C,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC;YACrB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,CAAC,CAAC;YAChF,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;YACrE,OAAO;QACT,CAAC;QAED,8DAA8D;QAC9D,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;YACjB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+CAA+C,CAAC,CAAC;YAC7E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;YACvE,OAAO;QACT,CAAC;QAED,0DAA0D;QAC1D,MAAM,aAAa,GAAgC,EAAE,CAAC;QAEtD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,2DAA2D;YAC3D,KAAK,MAAM,QAAQ,IAAI,aAAa,EAAE,CAAC;gBACrC,MAAM,CAAC,cAAc,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YAC1C,CAAC;YAED,iCAAiC;YACjC,IAAI,CAAC;gBACH,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC7C,IAAI,UAAU,KAAK,CAAC,CAAC,EAAE,CAAC;oBACtB,8CAA8C;oBAC9C,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;oBACrC,aAAa,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;oBACpC,OAAO;gBACT,CAAC;gBAED,MAAM,WAAW,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC1D,MAAM,WAAW,GAAG,WAAW,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACjD,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,WAAW,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBAE9C,sBAAsB;gBACtB,MAAM,SAAS,GAAG,WAAW,CAAC,KAAK,CAAC,4BAA4B,CAAC,CAAC;gBAClE,MAAM,IAAI,GAAG,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,YAAY,IAAI,EAAE,CAAC;gBAEzE,mDAAmD;gBACnD,IAAI,WAAW,GAAG,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACrC,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;gBACvD,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,WAAW,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;gBAC3D,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,WAAW,EAAE,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;gBAE5E,qCAAqC;gBACrC,MAAM,gBAAgB,GAAG;oBACvB,YAAY,MAAM,CAAC,QAAQ,CAAC,MAAM,QAAQ;oBAC1C,aAAa,WAAW,EAAE;oBAC1B,mBAAmB;oBACnB,mBAAmB;oBACnB,EAAE;oBACF,EAAE;iBACH,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;gBAEf,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,oBAAoB,WAAW,gBAAgB,MAAM,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;gBACvG,CAAC;gBAED,6BAA6B;gBAC7B,MAAM,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;gBAC7B,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,mBAAmB,CAAC,CAAC;YAC1E,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;gBACxE,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;YACvE,CAAC;QACH,CAAC,CAAC;QAEF,8BAA8B;QAC9B,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QACrC,aAAa,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;IACtC,CAAC;IAED;;OAEG;IACK,iBAAiB,CACvB,MAA0B,EAC1B,MAAyB,EACzB,KAAmB;QAEnB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yCAAyC,KAAK,CAAC,IAAI,IAAI,SAAS,GAAG,CAAC,CAAC;QACnG,CAAC;QAED,8BAA8B;QAC9B,MAAM,CAAC,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;IACtE,CAAC;IAED;;OAEG;IACK,sBAAsB,CAC5B,MAA0B,EAC1B,MAAyB,EACzB,UAAkB,EAClB,YAA2B,EAC3B,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,0CAA0C;QAC1C,MAAM,cAAc,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;QAEhF,gBAAgB;QAChB,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;QAE3E,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,MAAM,CAAC,QAAQ,EAAE,OAAO,CAAC,UAAU,EAAE,OAAO,CAAC,UAAU,CAAC,EAAE,CAAC;YAClG,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,2BAA2B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CACzH,CAAC;YACF,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;YACjE,OAAO;QACT,CAAC;QAED,kCAAkC;QAClC,QAAQ,cAAc,EAAE,CAAC;YACvB,KAAK,WAAW;gBACd,yCAAyC;gBACzC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,UAAU,EAAE,CAAC,CAAC;oBAC5F,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;oBACrE,OAAO;gBACT,CAAC;gBACD,MAAM;YAER,KAAK,mBAAmB;gBACtB,uCAAuC;gBACvC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,IAAI,CAAC;wBACH,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;wBAE5E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,UAAU,EAAE,CAAC,CAAC;wBACjG,CAAC;wBAED,0CAA0C;wBAC1C,OAAO,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;oBAC1C,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;oBAC1E,CAAC;gBACH,CAAC;gBACD,MAAM;YAER,KAAK,yBAAyB,CAAC;YAC/B,KAAK,0BAA0B;gBAC7B,uCAAuC;gBACvC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;oBAEpF,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,4BAA4B,cAAc,SAAS,UAAU,YAAY,gBAAgB,EAAE,CAAC,CAAC;oBAC3H,CAAC;oBAED,oDAAoD;oBACpD,OAAO,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAClD,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAa,EACb,gBAAgB,EAChB,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;gBACJ,CAAC;gBACD,MAAM;QACV,CAAC;QAED,+DAA+D;QAC/D,IAAI,CAAC;YACH,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;YAE5E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1G,CAAC;YAED,0CAA0C;YAC1C,OAAO,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC1C,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,qCAAqC;QACrC,MAAM,QAAQ,GAAG,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,YAAY,CAAC,CAAC;QACpE,MAAM,UAAU,GAAG,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE9F,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,YAAY,EACZ,UAAU,EACV,YAAY,EACZ,SAAS,EACT,QAAQ,EACR,UAAU,CACX,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,qBAAqB,CAC3B,MAA0B,EAC1B,MAAyB,EACzB,YAA4B,EAC5B,UAAmB,EACnB,YAAqB,EACrB,YAAqB,EACrB,UAAmB,EACnB,UAAmB;QAEnB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,iDAAiD;QACjD,MAAM,eAAe,GAAG,UAAU,IAAI,CAAC,YAAY;YACjD,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,YAAY,CAAC;YACpD,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI;gBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI;gBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC,CAAC;QAE/B,yFAAyF;QACzF,MAAM,eAAe,GAAG,UAAU,IAAI,CAAC,YAAY,KAAK,SAAS;YAC/D,CAAC,CAAC,YAAY;YACd,CAAC,CAAC,YAAY;gBACZ,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC;gBAC5E,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI;oBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI;oBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE9B,2BAA2B;QAC3B,MAAM,iBAAiB,GAA+B;YACpD,IAAI,EAAE,eAAe;YACrB,IAAI,EAAE,eAAe;SACtB,CAAC;QAEF,mCAAmC;QACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YAC/E,iBAAiB,CAAC,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,wCAAwC;QACxC,MAAM,SAAS,GAAa,EAAE,CAAC;QAC/B,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,IAAI,eAAe,GAAG,KAAK,CAAC;QAC5B,IAAI,YAAY,GAAG,KAAK,CAAC;QACzB,IAAI,iBAAiB,GAAG,KAAK,CAAC;QAE9B,wDAAwD;QACxD,MAAM,CAAC,KAAK,EAAE,CAAC;QAEf,kEAAkE;QAClE,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,IAAI,eAAe,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,iBAAiB;gBAAE,OAAO;YAE3E,eAAe,GAAG,IAAI,CAAC;YAEvB,IAAI,CAAC;gBACH,4DAA4D;gBAC5D,OAAO,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,EAAG,CAAC;oBACjC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;oBAE1B,qDAAqD;oBACrD,yDAAyD;oBACzD,IAAI,iBAAiB,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACzC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBAC7B,SAAS;oBACX,CAAC;oBAED,uBAAuB;oBACvB,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAErC,0BAA0B;oBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBAC3D,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;wBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,KAAK,CAAC,MAAM,QAAQ,CACrF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,2DAA2D;oBAC3D,MAAM,OAAO,GAAG,MAAM,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC;oBAEtD,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACnF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,QAAQ,KAAK,OAAO,YAAY,IAAI,CAAC,QAAQ,CAAC,kBAAkB,QAAQ,CAC/I,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,8BAA8B;wBAC5C,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;wBAC5E,OAAO;oBACT,CAAC;oBAED,+CAA+C;oBAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;oBAC5C,MAAM,CAAC,eAAe,GAAG,OAAO,CAAC;oBACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBAC7C,CAAC;YACH,CAAC;oBAAS,CAAC;gBACT,eAAe,GAAG,KAAK,CAAC;gBAExB,6DAA6D;gBAC7D,wEAAwE;gBACxE,IAAI,YAAY,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;oBACjE,YAAY,GAAG,KAAK,CAAC;oBACrB,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,wDAAwD;QACxD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,gEAAgE;YAChE,IAAI,iBAAiB;gBAAE,OAAO;YAE9B,0CAA0C;YAC1C,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,yBAAyB;YAC7D,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YAE1B,4DAA4D;YAC5D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,GAAG,GAAG,EAAE,CAAC;gBAC3F,MAAM,CAAC,KAAK,EAAE,CAAC;gBACf,YAAY,GAAG,IAAI,CAAC;YACtB,CAAC;YAED,oBAAoB;YACpB,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC;QAEF,4BAA4B;QAC5B,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAEnC,+CAA+C;QAC/C,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;YACnD,MAAM,CAAC,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC;QAC/C,CAAC;QAED,+DAA+D;QAC/D,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;QAC5D,MAAM,CAAC,QAAQ,GAAG,YAAY,CAAC;QAC/B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEtC,6BAA6B;QAC7B,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE/C,+DAA+D;QAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,YAAY,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAErE,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,IAAI,oBAAoB,IAAI,YAAY,EAAE,CAAC;wBACxC,YAAoB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBAC/C,CAAC;oBACD,IAAI,sBAAsB,IAAI,YAAY,EAAE,CAAC;wBAC1C,YAAoB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACnD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gEAAgE,GAAG,EAAE,CACtF,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,YAAY,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YACjC,kEAAkE;YAClE,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+BAA+B,eAAe,IAAI,iBAAiB,CAAC,IAAI,KAAK,GAAG,CAAC,OAAO,KAAK,IAAI,GAAG,CACrH,CAAC;YAEF,wDAAwD;YACxD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC5B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,eAAe,IAAI,iBAAiB,CAAC,IAAI,qBAAqB,CAC3F,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,eAAe,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACzF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,eAAe,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACzF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,UAAU,eAAe,iBAAiB,CAAC,CAAC;YAC1E,CAAC;YAED,0DAA0D;YAC1D,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,8DAA8D;YAC9D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,mBAAmB,CAAC;gBACvD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,mBAAmB,CAAC,CAAC;YACnF,CAAC;YAED,2EAA2E;YAC3E,IAAI,YAAY,EAAE,CAAC;gBACjB,IAAI,CAAC;oBACH,MAAM,iBAAiB,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;oBACtF,iBAAiB,CAAC,IAAI,CAAC,kBAAkB,EAAE;wBACzC,MAAM;wBACN,KAAK,EAAE,GAAG;wBACV,YAAY;qBACb,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,0EAA0E;oBAC1E,OAAO,CAAC,GAAG,CAAC,wDAAwD,UAAU,EAAE,CAAC,CAAC;gBACpF,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,qBAAqB,IAAI,EAAE,CAAC,CAAC;QAClF,CAAC,CAAC,CAAC;QAEH,sBAAsB;QACtB,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QACjF,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,4CAA4C;QAC5C,MAAM,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YACxB,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,YAAY,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC9B,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,wBAAwB;QACxB,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QAEhD,yCAAyC;QACzC,YAAY,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACxC,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QAEH,wEAAwE;QACxE,YAAY,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;YAChC,6CAA6C;YAC7C,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,2DAA2D;YAC3D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,qEAAqE;YACrE,gBAAgB,EAAE,CAAC;YAEnB,4BAA4B;YAC5B,iBAAiB,GAAG,IAAI,CAAC;YAEzB,mCAAmC;YACnC,IAAI,MAAM,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClC,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;gBAEvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gBAAgB,YAAY,CAAC,MAAM,kCAAkC,CACtF,CAAC;gBACJ,CAAC;gBAED,iCAAiC;gBACjC,YAAY,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC,GAAG,EAAE,EAAE;oBACvC,IAAI,GAAG,EAAE,CAAC;wBACR,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;wBACtF,OAAO,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;oBAC3E,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,+CAA+C;gBAC/C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;gBACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAC7B,CAAC;YAED,qDAAqD;YACrD,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YAC1B,YAAY,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAE1B,yCAAyC;YACzC,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,uDAAuD;YACvD,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzB,gEAAgE;gBAChE,KAAK,MAAM,KAAK,IAAI,SAAS,EAAE,CAAC;oBAC9B,YAAY,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;gBAC5B,CAAC;gBACD,kBAAkB;gBAClB,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;gBACrB,SAAS,GAAG,CAAC,CAAC;YAChB,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,OAAO,eAAe,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBAC5G,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE;oBACF,SAAS,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBAClC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE,CACL,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,2BAA2B,MAAM,CAAC,QAAQ,OAAO,eAAe,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBAC1F,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE,CACL,CAAC;YACJ,CAAC;YAED,mDAAmD;YACnD,IAAI,UAAU,EAAE,CAAC;gBACf,4DAA4D;gBAC5D,MAAM,QAAQ,GAAG;oBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC;oBAC3C,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,YAAY,IAAI,EAAE;oBAC1C,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,SAAS,IAAI,CAAC;iBACzC,CAAC;gBAEF,0CAA0C;gBAC1C,MAAM,oBAAoB,GAAG,IAAI,CAAC,UAAU,CAAC,0BAA0B,CACrE,YAAY,EACZ,UAAU,EACV,QAAQ,EACR,CAAC,YAAY,EAAE,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACrF,CAAC;gBAEF,gFAAgF;gBAChF,MAAM,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;gBAEnD,gCAAgC;gBAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAExC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD,UAAU,EAAE,CACtF,CAAC;oBACF,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wFAAwF,CACzG,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;YAED,yBAAyB;YACzB,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC,cAAc,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE;gBAC1F,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,MAAM,CAAC,QAAQ,0CAA0C,CAC/F,CAAC;gBACF,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAC7D,CAAC,CAAC,CAAC;YAEH,qDAAqD;YACrD,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC;gBAEnC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;CACF"}
|