@push.rocks/smartproxy 13.1.2 → 15.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (29) hide show
  1. package/dist_ts/00_commitinfo_data.js +3 -3
  2. package/dist_ts/proxies/smart-proxy/index.d.ts +5 -3
  3. package/dist_ts/proxies/smart-proxy/index.js +9 -5
  4. package/dist_ts/proxies/smart-proxy/models/index.d.ts +2 -0
  5. package/dist_ts/proxies/smart-proxy/models/index.js +2 -1
  6. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +82 -15
  7. package/dist_ts/proxies/smart-proxy/models/interfaces.js +10 -1
  8. package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +133 -0
  9. package/dist_ts/proxies/smart-proxy/models/route-types.js +2 -0
  10. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +55 -0
  11. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +804 -0
  12. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +127 -0
  13. package/dist_ts/proxies/smart-proxy/route-helpers.js +196 -0
  14. package/dist_ts/proxies/smart-proxy/route-manager.d.ts +103 -0
  15. package/dist_ts/proxies/smart-proxy/route-manager.js +483 -0
  16. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +19 -8
  17. package/dist_ts/proxies/smart-proxy/smart-proxy.js +239 -46
  18. package/package.json +2 -2
  19. package/readme.md +863 -423
  20. package/readme.plan.md +311 -250
  21. package/ts/00_commitinfo_data.ts +2 -2
  22. package/ts/proxies/smart-proxy/index.ts +20 -4
  23. package/ts/proxies/smart-proxy/models/index.ts +4 -0
  24. package/ts/proxies/smart-proxy/models/interfaces.ts +91 -13
  25. package/ts/proxies/smart-proxy/models/route-types.ts +184 -0
  26. package/ts/proxies/smart-proxy/route-connection-handler.ts +1117 -0
  27. package/ts/proxies/smart-proxy/route-helpers.ts +344 -0
  28. package/ts/proxies/smart-proxy/route-manager.ts +587 -0
  29. package/ts/proxies/smart-proxy/smart-proxy.ts +300 -69
@@ -0,0 +1,804 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { isRoutedOptions, isLegacyOptions } from './models/interfaces.js';
3
+ import { ConnectionManager } from './connection-manager.js';
4
+ import { SecurityManager } from './security-manager.js';
5
+ import { DomainConfigManager } from './domain-config-manager.js';
6
+ import { TlsManager } from './tls-manager.js';
7
+ import { NetworkProxyBridge } from './network-proxy-bridge.js';
8
+ import { TimeoutManager } from './timeout-manager.js';
9
+ import { RouteManager } from './route-manager.js';
10
+ /**
11
+ * Handles new connection processing and setup logic with support for route-based configuration
12
+ */
13
+ export class RouteConnectionHandler {
14
+ constructor(settings, connectionManager, securityManager, domainConfigManager, tlsManager, networkProxyBridge, timeoutManager, routeManager) {
15
+ this.connectionManager = connectionManager;
16
+ this.securityManager = securityManager;
17
+ this.domainConfigManager = domainConfigManager;
18
+ this.tlsManager = tlsManager;
19
+ this.networkProxyBridge = networkProxyBridge;
20
+ this.timeoutManager = timeoutManager;
21
+ this.routeManager = routeManager;
22
+ this.settings = settings;
23
+ }
24
+ /**
25
+ * Handle a new incoming connection
26
+ */
27
+ handleConnection(socket) {
28
+ const remoteIP = socket.remoteAddress || '';
29
+ const localPort = socket.localPort || 0;
30
+ // Validate IP against rate limits and connection limits
31
+ const ipValidation = this.securityManager.validateIP(remoteIP);
32
+ if (!ipValidation.allowed) {
33
+ console.log(`Connection rejected from ${remoteIP}: ${ipValidation.reason}`);
34
+ socket.end();
35
+ socket.destroy();
36
+ return;
37
+ }
38
+ // Create a new connection record
39
+ const record = this.connectionManager.createConnection(socket);
40
+ const connectionId = record.id;
41
+ // Apply socket optimizations
42
+ socket.setNoDelay(this.settings.noDelay);
43
+ // Apply keep-alive settings if enabled
44
+ if (this.settings.keepAlive) {
45
+ socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
46
+ record.hasKeepAlive = true;
47
+ // Apply enhanced TCP keep-alive options if enabled
48
+ if (this.settings.enableKeepAliveProbes) {
49
+ try {
50
+ // These are platform-specific and may not be available
51
+ if ('setKeepAliveProbes' in socket) {
52
+ socket.setKeepAliveProbes(10);
53
+ }
54
+ if ('setKeepAliveInterval' in socket) {
55
+ socket.setKeepAliveInterval(1000);
56
+ }
57
+ }
58
+ catch (err) {
59
+ // Ignore errors - these are optional enhancements
60
+ if (this.settings.enableDetailedLogging) {
61
+ console.log(`[${connectionId}] Enhanced TCP keep-alive settings not supported: ${err}`);
62
+ }
63
+ }
64
+ }
65
+ }
66
+ if (this.settings.enableDetailedLogging) {
67
+ console.log(`[${connectionId}] New connection from ${remoteIP} on port ${localPort}. ` +
68
+ `Keep-Alive: ${record.hasKeepAlive ? 'Enabled' : 'Disabled'}. ` +
69
+ `Active connections: ${this.connectionManager.getConnectionCount()}`);
70
+ }
71
+ else {
72
+ console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionManager.getConnectionCount()}`);
73
+ }
74
+ // Start TLS SNI handling
75
+ this.handleTlsConnection(socket, record);
76
+ }
77
+ /**
78
+ * Handle a connection and wait for TLS handshake for SNI extraction if needed
79
+ */
80
+ handleTlsConnection(socket, record) {
81
+ const connectionId = record.id;
82
+ const localPort = record.localPort;
83
+ let initialDataReceived = false;
84
+ // Set an initial timeout for handshake data
85
+ let initialTimeout = setTimeout(() => {
86
+ if (!initialDataReceived) {
87
+ console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${record.remoteIP}`);
88
+ // Add a grace period
89
+ setTimeout(() => {
90
+ if (!initialDataReceived) {
91
+ console.log(`[${connectionId}] Final initial data timeout after grace period`);
92
+ if (record.incomingTerminationReason === null) {
93
+ record.incomingTerminationReason = 'initial_timeout';
94
+ this.connectionManager.incrementTerminationStat('incoming', 'initial_timeout');
95
+ }
96
+ socket.end();
97
+ this.connectionManager.cleanupConnection(record, 'initial_timeout');
98
+ }
99
+ }, 30000);
100
+ }
101
+ }, this.settings.initialDataTimeout);
102
+ // Make sure timeout doesn't keep the process alive
103
+ if (initialTimeout.unref) {
104
+ initialTimeout.unref();
105
+ }
106
+ // Set up error handler
107
+ socket.on('error', this.connectionManager.handleError('incoming', record));
108
+ // First data handler to capture initial TLS handshake
109
+ socket.once('data', (chunk) => {
110
+ // Clear the initial timeout since we've received data
111
+ if (initialTimeout) {
112
+ clearTimeout(initialTimeout);
113
+ initialTimeout = null;
114
+ }
115
+ initialDataReceived = true;
116
+ record.hasReceivedInitialData = true;
117
+ // Block non-TLS connections on port 443
118
+ if (!this.tlsManager.isTlsHandshake(chunk) && localPort === 443) {
119
+ console.log(`[${connectionId}] Non-TLS connection detected on port 443. ` +
120
+ `Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
121
+ if (record.incomingTerminationReason === null) {
122
+ record.incomingTerminationReason = 'non_tls_blocked';
123
+ this.connectionManager.incrementTerminationStat('incoming', 'non_tls_blocked');
124
+ }
125
+ socket.end();
126
+ this.connectionManager.cleanupConnection(record, 'non_tls_blocked');
127
+ return;
128
+ }
129
+ // Check if this looks like a TLS handshake
130
+ let serverName = '';
131
+ if (this.tlsManager.isTlsHandshake(chunk)) {
132
+ record.isTLS = true;
133
+ // Check for ClientHello to extract SNI
134
+ if (this.tlsManager.isClientHello(chunk)) {
135
+ // Create connection info for SNI extraction
136
+ const connInfo = {
137
+ sourceIp: record.remoteIP,
138
+ sourcePort: socket.remotePort || 0,
139
+ destIp: socket.localAddress || '',
140
+ destPort: socket.localPort || 0,
141
+ };
142
+ // Extract SNI
143
+ serverName = this.tlsManager.extractSNI(chunk, connInfo) || '';
144
+ // Lock the connection to the negotiated SNI
145
+ record.lockedDomain = serverName;
146
+ // Check if we should reject connections without SNI
147
+ if (!serverName && this.settings.allowSessionTicket === false) {
148
+ console.log(`[${connectionId}] No SNI detected in TLS ClientHello; sending TLS alert.`);
149
+ if (record.incomingTerminationReason === null) {
150
+ record.incomingTerminationReason = 'session_ticket_blocked_no_sni';
151
+ this.connectionManager.incrementTerminationStat('incoming', 'session_ticket_blocked_no_sni');
152
+ }
153
+ const alert = Buffer.from([0x15, 0x03, 0x03, 0x00, 0x02, 0x01, 0x70]);
154
+ try {
155
+ socket.cork();
156
+ socket.write(alert);
157
+ socket.uncork();
158
+ socket.end();
159
+ }
160
+ catch {
161
+ socket.end();
162
+ }
163
+ this.connectionManager.cleanupConnection(record, 'session_ticket_blocked_no_sni');
164
+ return;
165
+ }
166
+ if (this.settings.enableDetailedLogging) {
167
+ console.log(`[${connectionId}] TLS connection with SNI: ${serverName || '(empty)'}`);
168
+ }
169
+ }
170
+ }
171
+ // Find the appropriate route for this connection
172
+ this.routeConnection(socket, record, serverName, chunk);
173
+ });
174
+ }
175
+ /**
176
+ * Route the connection based on match criteria
177
+ */
178
+ routeConnection(socket, record, serverName, initialChunk) {
179
+ const connectionId = record.id;
180
+ const localPort = record.localPort;
181
+ const remoteIP = record.remoteIP;
182
+ // Find matching route
183
+ const routeMatch = this.routeManager.findMatchingRoute({
184
+ port: localPort,
185
+ domain: serverName,
186
+ clientIp: remoteIP,
187
+ path: undefined, // We don't have path info at this point
188
+ tlsVersion: undefined // We don't extract TLS version yet
189
+ });
190
+ if (!routeMatch) {
191
+ console.log(`[${connectionId}] No route found for ${serverName || 'connection'} on port ${localPort}`);
192
+ // Fall back to legacy matching if we're using a hybrid configuration
193
+ const domainConfig = serverName
194
+ ? this.domainConfigManager.findDomainConfig(serverName)
195
+ : this.domainConfigManager.findDomainConfigForPort(localPort);
196
+ if (domainConfig) {
197
+ if (this.settings.enableDetailedLogging) {
198
+ console.log(`[${connectionId}] Using legacy domain configuration for ${serverName || 'port ' + localPort}`);
199
+ }
200
+ // Associate this domain config with the connection
201
+ record.domainConfig = domainConfig;
202
+ // Handle the connection using the legacy setup
203
+ return this.handleLegacyConnection(socket, record, serverName, domainConfig, initialChunk);
204
+ }
205
+ // No matching route or domain config, use default/fallback handling
206
+ console.log(`[${connectionId}] Using default route handling for connection`);
207
+ // Check default security settings
208
+ const defaultSecuritySettings = this.settings.defaults?.security;
209
+ if (defaultSecuritySettings) {
210
+ if (defaultSecuritySettings.allowedIPs && defaultSecuritySettings.allowedIPs.length > 0) {
211
+ const isAllowed = this.securityManager.isIPAuthorized(remoteIP, defaultSecuritySettings.allowedIPs, defaultSecuritySettings.blockedIPs || []);
212
+ if (!isAllowed) {
213
+ console.log(`[${connectionId}] IP ${remoteIP} not in default allowed list`);
214
+ socket.end();
215
+ this.connectionManager.cleanupConnection(record, 'ip_blocked');
216
+ return;
217
+ }
218
+ }
219
+ }
220
+ else if (this.settings.defaultAllowedIPs && this.settings.defaultAllowedIPs.length > 0) {
221
+ // Legacy default IP restrictions
222
+ const isAllowed = this.securityManager.isIPAuthorized(remoteIP, this.settings.defaultAllowedIPs, this.settings.defaultBlockedIPs || []);
223
+ if (!isAllowed) {
224
+ console.log(`[${connectionId}] IP ${remoteIP} not in default allowed list`);
225
+ socket.end();
226
+ this.connectionManager.cleanupConnection(record, 'ip_blocked');
227
+ return;
228
+ }
229
+ }
230
+ // Setup direct connection with default settings
231
+ let targetHost;
232
+ let targetPort;
233
+ if (isRoutedOptions(this.settings) && this.settings.defaults?.target) {
234
+ // Use defaults from routed configuration
235
+ targetHost = this.settings.defaults.target.host;
236
+ targetPort = this.settings.defaults.target.port;
237
+ }
238
+ else {
239
+ // Fall back to legacy settings
240
+ targetHost = this.settings.targetIP || 'localhost';
241
+ targetPort = this.settings.toPort;
242
+ }
243
+ return this.setupDirectConnection(socket, record, undefined, serverName, initialChunk, undefined, targetHost, targetPort);
244
+ }
245
+ // A matching route was found
246
+ const route = routeMatch.route;
247
+ if (this.settings.enableDetailedLogging) {
248
+ console.log(`[${connectionId}] Route matched: "${route.name || 'unnamed'}" for ${serverName || 'connection'} on port ${localPort}`);
249
+ }
250
+ // Handle the route based on its action type
251
+ switch (route.action.type) {
252
+ case 'forward':
253
+ return this.handleForwardAction(socket, record, route, initialChunk);
254
+ case 'redirect':
255
+ return this.handleRedirectAction(socket, record, route);
256
+ case 'block':
257
+ return this.handleBlockAction(socket, record, route);
258
+ default:
259
+ console.log(`[${connectionId}] Unknown action type: ${route.action.type}`);
260
+ socket.end();
261
+ this.connectionManager.cleanupConnection(record, 'unknown_action');
262
+ }
263
+ }
264
+ /**
265
+ * Handle a forward action for a route
266
+ */
267
+ handleForwardAction(socket, record, route, initialChunk) {
268
+ const connectionId = record.id;
269
+ const action = route.action;
270
+ // We should have a target configuration for forwarding
271
+ if (!action.target) {
272
+ console.log(`[${connectionId}] Forward action missing target configuration`);
273
+ socket.end();
274
+ this.connectionManager.cleanupConnection(record, 'missing_target');
275
+ return;
276
+ }
277
+ // Determine if this needs TLS handling
278
+ if (action.tls) {
279
+ switch (action.tls.mode) {
280
+ case 'passthrough':
281
+ // For TLS passthrough, just forward directly
282
+ if (this.settings.enableDetailedLogging) {
283
+ console.log(`[${connectionId}] Using TLS passthrough to ${action.target.host}`);
284
+ }
285
+ // Allow for array of hosts
286
+ const targetHost = Array.isArray(action.target.host)
287
+ ? action.target.host[Math.floor(Math.random() * action.target.host.length)]
288
+ : action.target.host;
289
+ // Determine target port - either target port or preserve incoming port
290
+ const targetPort = action.target.preservePort ? record.localPort : action.target.port;
291
+ return this.setupDirectConnection(socket, record, undefined, record.lockedDomain, initialChunk, undefined, targetHost, targetPort);
292
+ case 'terminate':
293
+ case 'terminate-and-reencrypt':
294
+ // For TLS termination, use NetworkProxy
295
+ if (this.networkProxyBridge.getNetworkProxy()) {
296
+ if (this.settings.enableDetailedLogging) {
297
+ console.log(`[${connectionId}] Using NetworkProxy for TLS termination to ${action.target.host}`);
298
+ }
299
+ // If we have an initial chunk with TLS data, start processing it
300
+ if (initialChunk && record.isTLS) {
301
+ return this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, initialChunk, this.settings.networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
302
+ }
303
+ // This shouldn't normally happen - we should have TLS data at this point
304
+ console.log(`[${connectionId}] TLS termination route without TLS data`);
305
+ socket.end();
306
+ this.connectionManager.cleanupConnection(record, 'tls_error');
307
+ return;
308
+ }
309
+ else {
310
+ console.log(`[${connectionId}] NetworkProxy not available for TLS termination`);
311
+ socket.end();
312
+ this.connectionManager.cleanupConnection(record, 'no_network_proxy');
313
+ return;
314
+ }
315
+ }
316
+ }
317
+ else {
318
+ // No TLS settings - basic forwarding
319
+ if (this.settings.enableDetailedLogging) {
320
+ console.log(`[${connectionId}] Using basic forwarding to ${action.target.host}:${action.target.port}`);
321
+ }
322
+ // Allow for array of hosts
323
+ const targetHost = Array.isArray(action.target.host)
324
+ ? action.target.host[Math.floor(Math.random() * action.target.host.length)]
325
+ : action.target.host;
326
+ // Determine target port - either target port or preserve incoming port
327
+ const targetPort = action.target.preservePort ? record.localPort : action.target.port;
328
+ return this.setupDirectConnection(socket, record, undefined, record.lockedDomain, initialChunk, undefined, targetHost, targetPort);
329
+ }
330
+ }
331
+ /**
332
+ * Handle a redirect action for a route
333
+ */
334
+ handleRedirectAction(socket, record, route) {
335
+ const connectionId = record.id;
336
+ const action = route.action;
337
+ // We should have a redirect configuration
338
+ if (!action.redirect) {
339
+ console.log(`[${connectionId}] Redirect action missing redirect configuration`);
340
+ socket.end();
341
+ this.connectionManager.cleanupConnection(record, 'missing_redirect');
342
+ return;
343
+ }
344
+ // For TLS connections, we can't do redirects at the TCP level
345
+ if (record.isTLS) {
346
+ console.log(`[${connectionId}] Cannot redirect TLS connection at TCP level`);
347
+ socket.end();
348
+ this.connectionManager.cleanupConnection(record, 'tls_redirect_error');
349
+ return;
350
+ }
351
+ // Wait for the first HTTP request to perform the redirect
352
+ const dataListeners = [];
353
+ const httpDataHandler = (chunk) => {
354
+ // Remove all data listeners to avoid duplicated processing
355
+ for (const listener of dataListeners) {
356
+ socket.removeListener('data', listener);
357
+ }
358
+ // Parse HTTP request to get path
359
+ try {
360
+ const headersEnd = chunk.indexOf('\r\n\r\n');
361
+ if (headersEnd === -1) {
362
+ // Not a complete HTTP request, need more data
363
+ socket.once('data', httpDataHandler);
364
+ dataListeners.push(httpDataHandler);
365
+ return;
366
+ }
367
+ const httpHeaders = chunk.slice(0, headersEnd).toString();
368
+ const requestLine = httpHeaders.split('\r\n')[0];
369
+ const [method, path] = requestLine.split(' ');
370
+ // Extract Host header
371
+ const hostMatch = httpHeaders.match(/Host: (.+?)(\r\n|\r|\n|$)/i);
372
+ const host = hostMatch ? hostMatch[1].trim() : record.lockedDomain || '';
373
+ // Process the redirect URL with template variables
374
+ let redirectUrl = action.redirect.to;
375
+ redirectUrl = redirectUrl.replace(/\{domain\}/g, host);
376
+ redirectUrl = redirectUrl.replace(/\{path\}/g, path || '');
377
+ redirectUrl = redirectUrl.replace(/\{port\}/g, record.localPort.toString());
378
+ // Prepare the HTTP redirect response
379
+ const redirectResponse = [
380
+ `HTTP/1.1 ${action.redirect.status} Moved`,
381
+ `Location: ${redirectUrl}`,
382
+ 'Connection: close',
383
+ 'Content-Length: 0',
384
+ '',
385
+ ''
386
+ ].join('\r\n');
387
+ if (this.settings.enableDetailedLogging) {
388
+ console.log(`[${connectionId}] Redirecting to ${redirectUrl} with status ${action.redirect.status}`);
389
+ }
390
+ // Send the redirect response
391
+ socket.end(redirectResponse);
392
+ this.connectionManager.initiateCleanupOnce(record, 'redirect_complete');
393
+ }
394
+ catch (err) {
395
+ console.log(`[${connectionId}] Error processing HTTP redirect: ${err}`);
396
+ socket.end();
397
+ this.connectionManager.initiateCleanupOnce(record, 'redirect_error');
398
+ }
399
+ };
400
+ // Setup the HTTP data handler
401
+ socket.once('data', httpDataHandler);
402
+ dataListeners.push(httpDataHandler);
403
+ }
404
+ /**
405
+ * Handle a block action for a route
406
+ */
407
+ handleBlockAction(socket, record, route) {
408
+ const connectionId = record.id;
409
+ if (this.settings.enableDetailedLogging) {
410
+ console.log(`[${connectionId}] Blocking connection based on route "${route.name || 'unnamed'}"`);
411
+ }
412
+ // Simply close the connection
413
+ socket.end();
414
+ this.connectionManager.initiateCleanupOnce(record, 'route_blocked');
415
+ }
416
+ /**
417
+ * Handle a connection using legacy domain configuration
418
+ */
419
+ handleLegacyConnection(socket, record, serverName, domainConfig, initialChunk) {
420
+ const connectionId = record.id;
421
+ // Get the forwarding type for this domain
422
+ const forwardingType = this.domainConfigManager.getForwardingType(domainConfig);
423
+ // IP validation
424
+ const ipRules = this.domainConfigManager.getEffectiveIPRules(domainConfig);
425
+ if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
426
+ console.log(`[${connectionId}] Connection rejected: IP ${record.remoteIP} not allowed for domain ${domainConfig.domains.join(', ')}`);
427
+ socket.end();
428
+ this.connectionManager.initiateCleanupOnce(record, 'ip_blocked');
429
+ return;
430
+ }
431
+ // Handle based on forwarding type
432
+ switch (forwardingType) {
433
+ case 'http-only':
434
+ // For HTTP-only configs with TLS traffic
435
+ if (record.isTLS) {
436
+ console.log(`[${connectionId}] Received TLS connection for HTTP-only domain ${serverName}`);
437
+ socket.end();
438
+ this.connectionManager.initiateCleanupOnce(record, 'wrong_protocol');
439
+ return;
440
+ }
441
+ break;
442
+ case 'https-passthrough':
443
+ // For TLS passthrough with TLS traffic
444
+ if (record.isTLS) {
445
+ try {
446
+ const handler = this.domainConfigManager.getForwardingHandler(domainConfig);
447
+ if (this.settings.enableDetailedLogging) {
448
+ console.log(`[${connectionId}] Using forwarding handler for SNI passthrough to ${serverName}`);
449
+ }
450
+ // Handle the connection using the handler
451
+ return handler.handleConnection(socket);
452
+ }
453
+ catch (err) {
454
+ console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
455
+ }
456
+ }
457
+ break;
458
+ case 'https-terminate-to-http':
459
+ case 'https-terminate-to-https':
460
+ // For TLS termination with TLS traffic
461
+ if (record.isTLS) {
462
+ const networkProxyPort = this.domainConfigManager.getNetworkProxyPort(domainConfig);
463
+ if (this.settings.enableDetailedLogging) {
464
+ console.log(`[${connectionId}] Using TLS termination (${forwardingType}) for ${serverName} on port ${networkProxyPort}`);
465
+ }
466
+ // Forward to NetworkProxy with domain-specific port
467
+ return this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, initialChunk, networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
468
+ }
469
+ break;
470
+ }
471
+ // If we're still here, use the forwarding handler if available
472
+ try {
473
+ const handler = this.domainConfigManager.getForwardingHandler(domainConfig);
474
+ if (this.settings.enableDetailedLogging) {
475
+ console.log(`[${connectionId}] Using general forwarding handler for domain ${serverName || 'unknown'}`);
476
+ }
477
+ // Handle the connection using the handler
478
+ return handler.handleConnection(socket);
479
+ }
480
+ catch (err) {
481
+ console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
482
+ }
483
+ // Fallback: set up direct connection
484
+ const targetIp = this.domainConfigManager.getTargetIP(domainConfig);
485
+ const targetPort = this.domainConfigManager.getTargetPort(domainConfig, this.settings.toPort);
486
+ return this.setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, undefined, targetIp, targetPort);
487
+ }
488
+ /**
489
+ * Sets up a direct connection to the target
490
+ */
491
+ setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, overridePort, targetHost, targetPort) {
492
+ const connectionId = record.id;
493
+ // Determine target host and port if not provided
494
+ const finalTargetHost = targetHost || (domainConfig
495
+ ? this.domainConfigManager.getTargetIP(domainConfig)
496
+ : this.settings.defaults?.target?.host
497
+ ? this.settings.defaults.target.host
498
+ : this.settings.targetIP);
499
+ // Determine target port - first try explicit port, then forwarding config, then fallback
500
+ const finalTargetPort = targetPort || (overridePort !== undefined
501
+ ? overridePort
502
+ : domainConfig
503
+ ? this.domainConfigManager.getTargetPort(domainConfig, this.settings.toPort)
504
+ : this.settings.defaults?.target?.port
505
+ ? this.settings.defaults.target.port
506
+ : this.settings.toPort);
507
+ // Setup connection options
508
+ const connectionOptions = {
509
+ host: finalTargetHost,
510
+ port: finalTargetPort,
511
+ };
512
+ // Preserve source IP if configured
513
+ if (this.settings.defaults?.preserveSourceIP || this.settings.preserveSourceIP) {
514
+ connectionOptions.localAddress = record.remoteIP.replace('::ffff:', '');
515
+ }
516
+ // Create a safe queue for incoming data
517
+ const dataQueue = [];
518
+ let queueSize = 0;
519
+ let processingQueue = false;
520
+ let drainPending = false;
521
+ let pipingEstablished = false;
522
+ // Pause the incoming socket to prevent buffer overflows
523
+ socket.pause();
524
+ // Function to safely process the data queue without losing events
525
+ const processDataQueue = () => {
526
+ if (processingQueue || dataQueue.length === 0 || pipingEstablished)
527
+ return;
528
+ processingQueue = true;
529
+ try {
530
+ // Process all queued chunks with the current active handler
531
+ while (dataQueue.length > 0) {
532
+ const chunk = dataQueue.shift();
533
+ queueSize -= chunk.length;
534
+ // Once piping is established, we shouldn't get here,
535
+ // but just in case, pass to the outgoing socket directly
536
+ if (pipingEstablished && record.outgoing) {
537
+ record.outgoing.write(chunk);
538
+ continue;
539
+ }
540
+ // Track bytes received
541
+ record.bytesReceived += chunk.length;
542
+ // Check for TLS handshake
543
+ if (!record.isTLS && this.tlsManager.isTlsHandshake(chunk)) {
544
+ record.isTLS = true;
545
+ if (this.settings.enableTlsDebugLogging) {
546
+ console.log(`[${connectionId}] TLS handshake detected in tempDataHandler, ${chunk.length} bytes`);
547
+ }
548
+ }
549
+ // Check if adding this chunk would exceed the buffer limit
550
+ const newSize = record.pendingDataSize + chunk.length;
551
+ if (this.settings.maxPendingDataSize && newSize > this.settings.maxPendingDataSize) {
552
+ console.log(`[${connectionId}] Buffer limit exceeded for connection from ${record.remoteIP}: ${newSize} bytes > ${this.settings.maxPendingDataSize} bytes`);
553
+ socket.end(); // Gracefully close the socket
554
+ this.connectionManager.initiateCleanupOnce(record, 'buffer_limit_exceeded');
555
+ return;
556
+ }
557
+ // Buffer the chunk and update the size counter
558
+ record.pendingData.push(Buffer.from(chunk));
559
+ record.pendingDataSize = newSize;
560
+ this.timeoutManager.updateActivity(record);
561
+ }
562
+ }
563
+ finally {
564
+ processingQueue = false;
565
+ // If there's a pending drain and we've processed everything,
566
+ // signal we're ready for more data if we haven't established piping yet
567
+ if (drainPending && dataQueue.length === 0 && !pipingEstablished) {
568
+ drainPending = false;
569
+ socket.resume();
570
+ }
571
+ }
572
+ };
573
+ // Unified data handler that safely queues incoming data
574
+ const safeDataHandler = (chunk) => {
575
+ // If piping is already established, just let the pipe handle it
576
+ if (pipingEstablished)
577
+ return;
578
+ // Add to our queue for orderly processing
579
+ dataQueue.push(Buffer.from(chunk)); // Make a copy to be safe
580
+ queueSize += chunk.length;
581
+ // If queue is getting large, pause socket until we catch up
582
+ if (this.settings.maxPendingDataSize && queueSize > this.settings.maxPendingDataSize * 0.8) {
583
+ socket.pause();
584
+ drainPending = true;
585
+ }
586
+ // Process the queue
587
+ processDataQueue();
588
+ };
589
+ // Add our safe data handler
590
+ socket.on('data', safeDataHandler);
591
+ // Add initial chunk to pending data if present
592
+ if (initialChunk) {
593
+ record.bytesReceived += initialChunk.length;
594
+ record.pendingData.push(Buffer.from(initialChunk));
595
+ record.pendingDataSize = initialChunk.length;
596
+ }
597
+ // Create the target socket but don't set up piping immediately
598
+ const targetSocket = plugins.net.connect(connectionOptions);
599
+ record.outgoing = targetSocket;
600
+ record.outgoingStartTime = Date.now();
601
+ // Apply socket optimizations
602
+ targetSocket.setNoDelay(this.settings.noDelay);
603
+ // Apply keep-alive settings to the outgoing connection as well
604
+ if (this.settings.keepAlive) {
605
+ targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
606
+ // Apply enhanced TCP keep-alive options if enabled
607
+ if (this.settings.enableKeepAliveProbes) {
608
+ try {
609
+ if ('setKeepAliveProbes' in targetSocket) {
610
+ targetSocket.setKeepAliveProbes(10);
611
+ }
612
+ if ('setKeepAliveInterval' in targetSocket) {
613
+ targetSocket.setKeepAliveInterval(1000);
614
+ }
615
+ }
616
+ catch (err) {
617
+ // Ignore errors - these are optional enhancements
618
+ if (this.settings.enableDetailedLogging) {
619
+ console.log(`[${connectionId}] Enhanced TCP keep-alive not supported for outgoing socket: ${err}`);
620
+ }
621
+ }
622
+ }
623
+ }
624
+ // Setup specific error handler for connection phase
625
+ targetSocket.once('error', (err) => {
626
+ // This handler runs only once during the initial connection phase
627
+ const code = err.code;
628
+ console.log(`[${connectionId}] Connection setup error to ${finalTargetHost}:${connectionOptions.port}: ${err.message} (${code})`);
629
+ // Resume the incoming socket to prevent it from hanging
630
+ socket.resume();
631
+ if (code === 'ECONNREFUSED') {
632
+ console.log(`[${connectionId}] Target ${finalTargetHost}:${connectionOptions.port} refused connection`);
633
+ }
634
+ else if (code === 'ETIMEDOUT') {
635
+ console.log(`[${connectionId}] Connection to ${finalTargetHost}:${connectionOptions.port} timed out`);
636
+ }
637
+ else if (code === 'ECONNRESET') {
638
+ console.log(`[${connectionId}] Connection to ${finalTargetHost}:${connectionOptions.port} was reset`);
639
+ }
640
+ else if (code === 'EHOSTUNREACH') {
641
+ console.log(`[${connectionId}] Host ${finalTargetHost} is unreachable`);
642
+ }
643
+ // Clear any existing error handler after connection phase
644
+ targetSocket.removeAllListeners('error');
645
+ // Re-add the normal error handler for established connections
646
+ targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
647
+ if (record.outgoingTerminationReason === null) {
648
+ record.outgoingTerminationReason = 'connection_failed';
649
+ this.connectionManager.incrementTerminationStat('outgoing', 'connection_failed');
650
+ }
651
+ // If we have a forwarding handler for this domain, let it handle the error
652
+ if (domainConfig) {
653
+ try {
654
+ const forwardingHandler = this.domainConfigManager.getForwardingHandler(domainConfig);
655
+ forwardingHandler.emit('connection_error', {
656
+ socket,
657
+ error: err,
658
+ connectionId
659
+ });
660
+ }
661
+ catch (handlerErr) {
662
+ // If getting the handler fails, just log and continue with normal cleanup
663
+ console.log(`Error getting forwarding handler for error handling: ${handlerErr}`);
664
+ }
665
+ }
666
+ // Clean up the connection
667
+ this.connectionManager.initiateCleanupOnce(record, `connection_failed_${code}`);
668
+ });
669
+ // Setup close handler
670
+ targetSocket.on('close', this.connectionManager.handleClose('outgoing', record));
671
+ socket.on('close', this.connectionManager.handleClose('incoming', record));
672
+ // Handle timeouts with keep-alive awareness
673
+ socket.on('timeout', () => {
674
+ // For keep-alive connections, just log a warning instead of closing
675
+ if (record.hasKeepAlive) {
676
+ console.log(`[${connectionId}] Timeout event on incoming keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
677
+ return;
678
+ }
679
+ // For non-keep-alive connections, proceed with normal cleanup
680
+ console.log(`[${connectionId}] Timeout on incoming side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
681
+ if (record.incomingTerminationReason === null) {
682
+ record.incomingTerminationReason = 'timeout';
683
+ this.connectionManager.incrementTerminationStat('incoming', 'timeout');
684
+ }
685
+ this.connectionManager.initiateCleanupOnce(record, 'timeout_incoming');
686
+ });
687
+ targetSocket.on('timeout', () => {
688
+ // For keep-alive connections, just log a warning instead of closing
689
+ if (record.hasKeepAlive) {
690
+ console.log(`[${connectionId}] Timeout event on outgoing keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
691
+ return;
692
+ }
693
+ // For non-keep-alive connections, proceed with normal cleanup
694
+ console.log(`[${connectionId}] Timeout on outgoing side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
695
+ if (record.outgoingTerminationReason === null) {
696
+ record.outgoingTerminationReason = 'timeout';
697
+ this.connectionManager.incrementTerminationStat('outgoing', 'timeout');
698
+ }
699
+ this.connectionManager.initiateCleanupOnce(record, 'timeout_outgoing');
700
+ });
701
+ // Apply socket timeouts
702
+ this.timeoutManager.applySocketTimeouts(record);
703
+ // Track outgoing data for bytes counting
704
+ targetSocket.on('data', (chunk) => {
705
+ record.bytesSent += chunk.length;
706
+ this.timeoutManager.updateActivity(record);
707
+ });
708
+ // Wait for the outgoing connection to be ready before setting up piping
709
+ targetSocket.once('connect', () => {
710
+ // Clear the initial connection error handler
711
+ targetSocket.removeAllListeners('error');
712
+ // Add the normal error handler for established connections
713
+ targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
714
+ // Process any remaining data in the queue before switching to piping
715
+ processDataQueue();
716
+ // Set up piping immediately
717
+ pipingEstablished = true;
718
+ // Flush all pending data to target
719
+ if (record.pendingData.length > 0) {
720
+ const combinedData = Buffer.concat(record.pendingData);
721
+ if (this.settings.enableDetailedLogging) {
722
+ console.log(`[${connectionId}] Forwarding ${combinedData.length} bytes of initial data to target`);
723
+ }
724
+ // Write pending data immediately
725
+ targetSocket.write(combinedData, (err) => {
726
+ if (err) {
727
+ console.log(`[${connectionId}] Error writing pending data to target: ${err.message}`);
728
+ return this.connectionManager.initiateCleanupOnce(record, 'write_error');
729
+ }
730
+ });
731
+ // Clear the buffer now that we've processed it
732
+ record.pendingData = [];
733
+ record.pendingDataSize = 0;
734
+ }
735
+ // Setup piping in both directions without any delays
736
+ socket.pipe(targetSocket);
737
+ targetSocket.pipe(socket);
738
+ // Resume the socket to ensure data flows
739
+ socket.resume();
740
+ // Process any data that might be queued in the interim
741
+ if (dataQueue.length > 0) {
742
+ // Write any remaining queued data directly to the target socket
743
+ for (const chunk of dataQueue) {
744
+ targetSocket.write(chunk);
745
+ }
746
+ // Clear the queue
747
+ dataQueue.length = 0;
748
+ queueSize = 0;
749
+ }
750
+ if (this.settings.enableDetailedLogging) {
751
+ console.log(`[${connectionId}] Connection established: ${record.remoteIP} -> ${finalTargetHost}:${connectionOptions.port}` +
752
+ `${serverName
753
+ ? ` (SNI: ${serverName})`
754
+ : domainConfig
755
+ ? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
756
+ : ''}` +
757
+ ` TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}`);
758
+ }
759
+ else {
760
+ console.log(`Connection established: ${record.remoteIP} -> ${finalTargetHost}:${connectionOptions.port}` +
761
+ `${serverName
762
+ ? ` (SNI: ${serverName})`
763
+ : domainConfig
764
+ ? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
765
+ : ''}`);
766
+ }
767
+ // Add the renegotiation handler for SNI validation
768
+ if (serverName) {
769
+ // Create connection info object for the existing connection
770
+ const connInfo = {
771
+ sourceIp: record.remoteIP,
772
+ sourcePort: record.incoming.remotePort || 0,
773
+ destIp: record.incoming.localAddress || '',
774
+ destPort: record.incoming.localPort || 0,
775
+ };
776
+ // Create a renegotiation handler function
777
+ const renegotiationHandler = this.tlsManager.createRenegotiationHandler(connectionId, serverName, connInfo, (connectionId, reason) => this.connectionManager.initiateCleanupOnce(record, reason));
778
+ // Store the handler in the connection record so we can remove it during cleanup
779
+ record.renegotiationHandler = renegotiationHandler;
780
+ // Add the handler to the socket
781
+ socket.on('data', renegotiationHandler);
782
+ if (this.settings.enableDetailedLogging) {
783
+ console.log(`[${connectionId}] TLS renegotiation handler installed for SNI domain: ${serverName}`);
784
+ if (this.settings.allowSessionTicket === false) {
785
+ console.log(`[${connectionId}] Session ticket usage is disabled. Connection will be reset on reconnection attempts.`);
786
+ }
787
+ }
788
+ }
789
+ // Set connection timeout
790
+ record.cleanupTimer = this.timeoutManager.setupConnectionTimeout(record, (record, reason) => {
791
+ console.log(`[${connectionId}] Connection from ${record.remoteIP} exceeded max lifetime, forcing cleanup.`);
792
+ this.connectionManager.initiateCleanupOnce(record, reason);
793
+ });
794
+ // Mark TLS handshake as complete for TLS connections
795
+ if (record.isTLS) {
796
+ record.tlsHandshakeComplete = true;
797
+ if (this.settings.enableTlsDebugLogging) {
798
+ console.log(`[${connectionId}] TLS handshake complete for connection from ${record.remoteIP}`);
799
+ }
800
+ }
801
+ });
802
+ }
803
+ }
804
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"route-connection-handler.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/route-connection-handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAM5C,OAAO,EACL,eAAe,EACf,eAAe,EAChB,MAAM,wBAAwB,CAAC;AAKhC,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACjE,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAIlD;;GAEG;AACH,MAAM,OAAO,sBAAsB;IAGjC,YACE,QAA4B,EACpB,iBAAoC,EACpC,eAAgC,EAChC,mBAAwC,EACxC,UAAsB,EACtB,kBAAsC,EACtC,cAA8B,EAC9B,YAA0B;QAN1B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;QAChC,wBAAmB,GAAnB,mBAAmB,CAAqB;QACxC,eAAU,GAAV,UAAU,CAAY;QACtB,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,mBAAc,GAAd,cAAc,CAAgB;QAC9B,iBAAY,GAAZ,YAAY,CAAc;QAElC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,gBAAgB,CAAC,MAA0B;QAChD,MAAM,QAAQ,GAAG,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,IAAI,CAAC,CAAC;QAExC,wDAAwD;QACxD,MAAM,YAAY,GAAG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QAC/D,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,OAAO,CAAC,GAAG,CAAC,4BAA4B,QAAQ,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC;YAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,OAAO,EAAE,CAAC;YACjB,OAAO;QACT,CAAC;QAED,iCAAiC;QACjC,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC/D,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,6BAA6B;QAC7B,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAEzC,uCAAuC;QACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAC/D,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;YAE3B,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,uDAAuD;oBACvD,IAAI,oBAAoB,IAAI,MAAM,EAAE,CAAC;wBAClC,MAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBACzC,CAAC;oBACD,IAAI,sBAAsB,IAAI,MAAM,EAAE,CAAC;wBACpC,MAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBAC7C,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,GAAG,EAAE,CAAC,CAAC;oBAC1F,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yBAAyB,QAAQ,YAAY,SAAS,IAAI;gBACxE,eAAe,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,IAAI;gBAC/D,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CACvE,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CACT,uBAAuB,QAAQ,YAAY,SAAS,yBAAyB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CAC3H,CAAC;QACJ,CAAC;QAED,yBAAyB;QACzB,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IAC3C,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,MAA0B,EAAE,MAAyB;QAC/E,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QACnC,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAEhC,4CAA4C;QAC5C,IAAI,cAAc,GAA0B,UAAU,CAAC,GAAG,EAAE;YAC1D,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,MAAM,CAAC,QAAQ,EAAE,CACxH,CAAC;gBAEF,qBAAqB;gBACrB,UAAU,CAAC,GAAG,EAAE;oBACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;wBACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;wBAC/E,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;4BACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;wBACjF,CAAC;wBACD,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBACtE,CAAC;gBACH,CAAC,EAAE,KAAK,CAAC,CAAC;YACZ,CAAC;QACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;QAEtC,mDAAmD;QACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;YACzB,cAAc,CAAC,KAAK,EAAE,CAAC;QACzB,CAAC;QAED,uBAAuB;QACvB,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,sDAAsD;QACtD,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACpC,sDAAsD;YACtD,IAAI,cAAc,EAAE,CAAC;gBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;gBAC7B,cAAc,GAAG,IAAI,CAAC;YACxB,CAAC;YAED,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,wCAAwC;YACxC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;gBAChE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C;oBAC3D,8EAA8E,CACjF,CAAC;gBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oBAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;oBACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;gBACjF,CAAC;gBACD,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;gBACpE,OAAO;YACT,CAAC;YAED,2CAA2C;YAC3C,IAAI,UAAU,GAAG,EAAE,CAAC;YACpB,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC1C,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,uCAAuC;gBACvC,IAAI,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;oBACzC,4CAA4C;oBAC5C,MAAM,QAAQ,GAAG;wBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;wBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;wBACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;qBAChC,CAAC;oBAEF,cAAc;oBACd,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,QAAQ,CAAC,IAAI,EAAE,CAAC;oBAE/D,4CAA4C;oBAC5C,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;oBAEjC,oDAAoD;oBACpD,IAAI,CAAC,UAAU,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC9D,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,0DAA0D,CAAC,CAAC;wBACxF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,+BAA+B,CAAC;4BACnE,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,+BAA+B,CAAC,CAAC;wBAC/F,CAAC;wBACD,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;wBACtE,IAAI,CAAC;4BACH,MAAM,CAAC,IAAI,EAAE,CAAC;4BACd,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;4BACpB,MAAM,CAAC,MAAM,EAAE,CAAC;4BAChB,MAAM,CAAC,GAAG,EAAE,CAAC;wBACf,CAAC;wBAAC,MAAM,CAAC;4BACP,MAAM,CAAC,GAAG,EAAE,CAAC;wBACf,CAAC;wBACD,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;wBAClF,OAAO;oBACT,CAAC;oBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,8BAA8B,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;oBACvF,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,KAAK,CAAC,CAAC;QAC1D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,eAAe,CACrB,MAA0B,EAC1B,MAAyB,EACzB,UAAkB,EAClB,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QACnC,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC;QAEjC,sBAAsB;QACtB,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC;YACrD,IAAI,EAAE,SAAS;YACf,MAAM,EAAE,UAAU;YAClB,QAAQ,EAAE,QAAQ;YAClB,IAAI,EAAE,SAAS,EAAE,wCAAwC;YACzD,UAAU,EAAE,SAAS,CAAC,mCAAmC;SAC1D,CAAC,CAAC;QAEH,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,wBAAwB,UAAU,IAAI,YAAY,YAAY,SAAS,EAAE,CAAC,CAAC;YAEvG,qEAAqE;YACrE,MAAM,YAAY,GAAG,UAAU;gBAC7B,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,UAAU,CAAC;gBACvD,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,CAAC,SAAS,CAAC,CAAC;YAEhE,IAAI,YAAY,EAAE,CAAC;gBACjB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,UAAU,IAAI,OAAO,GAAG,SAAS,EAAE,CAAC,CAAC;gBAC9G,CAAC;gBAED,mDAAmD;gBACnD,MAAM,CAAC,YAAY,GAAG,YAAY,CAAC;gBAEnC,+CAA+C;gBAC/C,OAAO,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,YAAY,EAAE,YAAY,CAAC,CAAC;YAC7F,CAAC;YAED,oEAAoE;YACpE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+CAA+C,CAAC,CAAC;YAE7E,kCAAkC;YAClC,MAAM,uBAAuB,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC;YACjE,IAAI,uBAAuB,EAAE,CAAC;gBAC5B,IAAI,uBAAuB,CAAC,UAAU,IAAI,uBAAuB,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACxF,MAAM,SAAS,GAAG,IAAI,CAAC,eAAe,CAAC,cAAc,CACnD,QAAQ,EACR,uBAAuB,CAAC,UAAU,EAClC,uBAAuB,CAAC,UAAU,IAAI,EAAE,CACzC,CAAC;oBAEF,IAAI,CAAC,SAAS,EAAE,CAAC;wBACf,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,QAAQ,QAAQ,8BAA8B,CAAC,CAAC;wBAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;wBAC/D,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzF,iCAAiC;gBACjC,MAAM,SAAS,GAAG,IAAI,CAAC,eAAe,CAAC,cAAc,CACnD,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,iBAAiB,EAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CACtC,CAAC;gBAEF,IAAI,CAAC,SAAS,EAAE,CAAC;oBACf,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,QAAQ,QAAQ,8BAA8B,CAAC,CAAC;oBAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;oBAC/D,OAAO;gBACT,CAAC;YACH,CAAC;YAED,gDAAgD;YAChD,IAAI,UAAkB,CAAC;YACvB,IAAI,UAAkB,CAAC;YAEvB,IAAI,eAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;gBACrE,yCAAyC;gBACzC,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC;gBAChD,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC;YAClD,CAAC;iBAAM,CAAC;gBACN,+BAA+B;gBAC/B,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,QAAQ,IAAI,WAAW,CAAC;gBACnD,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC;YACpC,CAAC;YAED,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,SAAS,EACT,UAAU,EACV,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;QACJ,CAAC;QAED,6BAA6B;QAC7B,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;QAE/B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,KAAK,CAAC,IAAI,IAAI,SAAS,SAAS,UAAU,IAAI,YAAY,YAAY,SAAS,EAAE,CACvH,CAAC;QACJ,CAAC;QAED,4CAA4C;QAC5C,QAAQ,KAAK,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;YAC1B,KAAK,SAAS;gBACZ,OAAO,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,YAAY,CAAC,CAAC;YAEvE,KAAK,UAAU;gBACb,OAAO,IAAI,CAAC,oBAAoB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;YAE1D,KAAK,OAAO;gBACV,OAAO,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;YAEvD;gBACE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,0BAA2B,KAAK,CAAC,MAAc,CAAC,IAAI,EAAE,CAAC,CAAC;gBACpF,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;QACvE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,mBAAmB,CACzB,MAA0B,EAC1B,MAAyB,EACzB,KAAmB,EACnB,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC;QAE5B,uDAAuD;QACvD,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YACnB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+CAA+C,CAAC,CAAC;YAC7E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;YACnE,OAAO;QACT,CAAC;QAED,uCAAuC;QACvC,IAAI,MAAM,CAAC,GAAG,EAAE,CAAC;YACf,QAAQ,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC;gBACxB,KAAK,aAAa;oBAChB,6CAA6C;oBAC7C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,8BAA8B,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;oBAClF,CAAC;oBAED,2BAA2B;oBAC3B,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;wBAClD,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;wBAC3E,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAEvB,uEAAuE;oBACvE,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAEtF,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,SAAS,EACT,MAAM,CAAC,YAAY,EACnB,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;gBAEJ,KAAK,WAAW,CAAC;gBACjB,KAAK,yBAAyB;oBAC5B,wCAAwC;oBACxC,IAAI,IAAI,CAAC,kBAAkB,CAAC,eAAe,EAAE,EAAE,CAAC;wBAC9C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CACpF,CAAC;wBACJ,CAAC;wBAED,iEAAiE;wBACjE,IAAI,YAAY,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;4BACjC,OAAO,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAClD,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAY,EACZ,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAC9B,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;wBACJ,CAAC;wBAED,yEAAyE;wBACzE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,0CAA0C,CAAC,CAAC;wBACxE,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;wBAC9D,OAAO;oBACT,CAAC;yBAAM,CAAC;wBACN,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,CAAC,CAAC;wBAChF,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;wBACrE,OAAO;oBACT,CAAC;YACL,CAAC;QACH,CAAC;aAAM,CAAC;YACN,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+BAA+B,MAAM,CAAC,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;YACzG,CAAC;YAED,2BAA2B;YAC3B,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;gBAClD,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;gBAC3E,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;YAEvB,uEAAuE;YACvE,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;YAEtF,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,SAAS,EACT,MAAM,CAAC,YAAY,EACnB,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;OAEG;IACK,oBAAoB,CAC1B,MAA0B,EAC1B,MAAyB,EACzB,KAAmB;QAEnB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC;QAE5B,0CAA0C;QAC1C,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC;YACrB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,CAAC,CAAC;YAChF,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;YACrE,OAAO;QACT,CAAC;QAED,8DAA8D;QAC9D,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;YACjB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,+CAA+C,CAAC,CAAC;YAC7E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;YACvE,OAAO;QACT,CAAC;QAED,0DAA0D;QAC1D,MAAM,aAAa,GAAgC,EAAE,CAAC;QAEtD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,2DAA2D;YAC3D,KAAK,MAAM,QAAQ,IAAI,aAAa,EAAE,CAAC;gBACrC,MAAM,CAAC,cAAc,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YAC1C,CAAC;YAED,iCAAiC;YACjC,IAAI,CAAC;gBACH,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC7C,IAAI,UAAU,KAAK,CAAC,CAAC,EAAE,CAAC;oBACtB,8CAA8C;oBAC9C,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;oBACrC,aAAa,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;oBACpC,OAAO;gBACT,CAAC;gBAED,MAAM,WAAW,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC,QAAQ,EAAE,CAAC;gBAC1D,MAAM,WAAW,GAAG,WAAW,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACjD,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,WAAW,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBAE9C,sBAAsB;gBACtB,MAAM,SAAS,GAAG,WAAW,CAAC,KAAK,CAAC,4BAA4B,CAAC,CAAC;gBAClE,MAAM,IAAI,GAAG,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,YAAY,IAAI,EAAE,CAAC;gBAEzE,mDAAmD;gBACnD,IAAI,WAAW,GAAG,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACrC,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;gBACvD,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,WAAW,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;gBAC3D,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,WAAW,EAAE,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;gBAE5E,qCAAqC;gBACrC,MAAM,gBAAgB,GAAG;oBACvB,YAAY,MAAM,CAAC,QAAQ,CAAC,MAAM,QAAQ;oBAC1C,aAAa,WAAW,EAAE;oBAC1B,mBAAmB;oBACnB,mBAAmB;oBACnB,EAAE;oBACF,EAAE;iBACH,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;gBAEf,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,oBAAoB,WAAW,gBAAgB,MAAM,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;gBACvG,CAAC;gBAED,6BAA6B;gBAC7B,MAAM,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;gBAC7B,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,mBAAmB,CAAC,CAAC;YAC1E,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;gBACxE,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;YACvE,CAAC;QACH,CAAC,CAAC;QAEF,8BAA8B;QAC9B,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QACrC,aAAa,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;IACtC,CAAC;IAED;;OAEG;IACK,iBAAiB,CACvB,MAA0B,EAC1B,MAAyB,EACzB,KAAmB;QAEnB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yCAAyC,KAAK,CAAC,IAAI,IAAI,SAAS,GAAG,CAAC,CAAC;QACnG,CAAC;QAED,8BAA8B;QAC9B,MAAM,CAAC,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;IACtE,CAAC;IAED;;OAEG;IACK,sBAAsB,CAC5B,MAA0B,EAC1B,MAAyB,EACzB,UAAkB,EAClB,YAA2B,EAC3B,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,0CAA0C;QAC1C,MAAM,cAAc,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;QAEhF,gBAAgB;QAChB,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;QAE3E,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,MAAM,CAAC,QAAQ,EAAE,OAAO,CAAC,UAAU,EAAE,OAAO,CAAC,UAAU,CAAC,EAAE,CAAC;YAClG,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,2BAA2B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CACzH,CAAC;YACF,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;YACjE,OAAO;QACT,CAAC;QAED,kCAAkC;QAClC,QAAQ,cAAc,EAAE,CAAC;YACvB,KAAK,WAAW;gBACd,yCAAyC;gBACzC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,UAAU,EAAE,CAAC,CAAC;oBAC5F,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;oBACrE,OAAO;gBACT,CAAC;gBACD,MAAM;YAER,KAAK,mBAAmB;gBACtB,uCAAuC;gBACvC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,IAAI,CAAC;wBACH,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;wBAE5E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,UAAU,EAAE,CAAC,CAAC;wBACjG,CAAC;wBAED,0CAA0C;wBAC1C,OAAO,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;oBAC1C,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;oBAC1E,CAAC;gBACH,CAAC;gBACD,MAAM;YAER,KAAK,yBAAyB,CAAC;YAC/B,KAAK,0BAA0B;gBAC7B,uCAAuC;gBACvC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;oBAEpF,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,4BAA4B,cAAc,SAAS,UAAU,YAAY,gBAAgB,EAAE,CAAC,CAAC;oBAC3H,CAAC;oBAED,oDAAoD;oBACpD,OAAO,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAClD,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAa,EACb,gBAAgB,EAChB,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;gBACJ,CAAC;gBACD,MAAM;QACV,CAAC;QAED,+DAA+D;QAC/D,IAAI,CAAC;YACH,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;YAE5E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1G,CAAC;YAED,0CAA0C;YAC1C,OAAO,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC1C,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,qCAAqC;QACrC,MAAM,QAAQ,GAAG,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,YAAY,CAAC,CAAC;QACpE,MAAM,UAAU,GAAG,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE9F,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,YAAY,EACZ,UAAU,EACV,YAAY,EACZ,SAAS,EACT,QAAQ,EACR,UAAU,CACX,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,qBAAqB,CAC3B,MAA0B,EAC1B,MAAyB,EACzB,YAA4B,EAC5B,UAAmB,EACnB,YAAqB,EACrB,YAAqB,EACrB,UAAmB,EACnB,UAAmB;QAEnB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,iDAAiD;QACjD,MAAM,eAAe,GAAG,UAAU,IAAI,CAAC,YAAY;YACjD,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,YAAY,CAAC;YACpD,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI;gBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI;gBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC,CAAC;QAE/B,yFAAyF;QACzF,MAAM,eAAe,GAAG,UAAU,IAAI,CAAC,YAAY,KAAK,SAAS;YAC/D,CAAC,CAAC,YAAY;YACd,CAAC,CAAC,YAAY;gBACZ,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC;gBAC5E,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI;oBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI;oBACpC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE9B,2BAA2B;QAC3B,MAAM,iBAAiB,GAA+B;YACpD,IAAI,EAAE,eAAe;YACrB,IAAI,EAAE,eAAe;SACtB,CAAC;QAEF,mCAAmC;QACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YAC/E,iBAAiB,CAAC,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,wCAAwC;QACxC,MAAM,SAAS,GAAa,EAAE,CAAC;QAC/B,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,IAAI,eAAe,GAAG,KAAK,CAAC;QAC5B,IAAI,YAAY,GAAG,KAAK,CAAC;QACzB,IAAI,iBAAiB,GAAG,KAAK,CAAC;QAE9B,wDAAwD;QACxD,MAAM,CAAC,KAAK,EAAE,CAAC;QAEf,kEAAkE;QAClE,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,IAAI,eAAe,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,iBAAiB;gBAAE,OAAO;YAE3E,eAAe,GAAG,IAAI,CAAC;YAEvB,IAAI,CAAC;gBACH,4DAA4D;gBAC5D,OAAO,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,EAAG,CAAC;oBACjC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;oBAE1B,qDAAqD;oBACrD,yDAAyD;oBACzD,IAAI,iBAAiB,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACzC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBAC7B,SAAS;oBACX,CAAC;oBAED,uBAAuB;oBACvB,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAErC,0BAA0B;oBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBAC3D,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;wBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,KAAK,CAAC,MAAM,QAAQ,CACrF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,2DAA2D;oBAC3D,MAAM,OAAO,GAAG,MAAM,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC;oBAEtD,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACnF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,QAAQ,KAAK,OAAO,YAAY,IAAI,CAAC,QAAQ,CAAC,kBAAkB,QAAQ,CAC/I,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,8BAA8B;wBAC5C,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;wBAC5E,OAAO;oBACT,CAAC;oBAED,+CAA+C;oBAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;oBAC5C,MAAM,CAAC,eAAe,GAAG,OAAO,CAAC;oBACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBAC7C,CAAC;YACH,CAAC;oBAAS,CAAC;gBACT,eAAe,GAAG,KAAK,CAAC;gBAExB,6DAA6D;gBAC7D,wEAAwE;gBACxE,IAAI,YAAY,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;oBACjE,YAAY,GAAG,KAAK,CAAC;oBACrB,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,wDAAwD;QACxD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,gEAAgE;YAChE,IAAI,iBAAiB;gBAAE,OAAO;YAE9B,0CAA0C;YAC1C,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,yBAAyB;YAC7D,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YAE1B,4DAA4D;YAC5D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,GAAG,GAAG,EAAE,CAAC;gBAC3F,MAAM,CAAC,KAAK,EAAE,CAAC;gBACf,YAAY,GAAG,IAAI,CAAC;YACtB,CAAC;YAED,oBAAoB;YACpB,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC;QAEF,4BAA4B;QAC5B,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAEnC,+CAA+C;QAC/C,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;YACnD,MAAM,CAAC,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC;QAC/C,CAAC;QAED,+DAA+D;QAC/D,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;QAC5D,MAAM,CAAC,QAAQ,GAAG,YAAY,CAAC;QAC/B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEtC,6BAA6B;QAC7B,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE/C,+DAA+D;QAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,YAAY,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAErE,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,IAAI,oBAAoB,IAAI,YAAY,EAAE,CAAC;wBACxC,YAAoB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBAC/C,CAAC;oBACD,IAAI,sBAAsB,IAAI,YAAY,EAAE,CAAC;wBAC1C,YAAoB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACnD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gEAAgE,GAAG,EAAE,CACtF,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,YAAY,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YACjC,kEAAkE;YAClE,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+BAA+B,eAAe,IAAI,iBAAiB,CAAC,IAAI,KAAK,GAAG,CAAC,OAAO,KAAK,IAAI,GAAG,CACrH,CAAC;YAEF,wDAAwD;YACxD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC5B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,eAAe,IAAI,iBAAiB,CAAC,IAAI,qBAAqB,CAC3F,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,eAAe,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACzF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,eAAe,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACzF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,UAAU,eAAe,iBAAiB,CAAC,CAAC;YAC1E,CAAC;YAED,0DAA0D;YAC1D,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,8DAA8D;YAC9D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,mBAAmB,CAAC;gBACvD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,mBAAmB,CAAC,CAAC;YACnF,CAAC;YAED,2EAA2E;YAC3E,IAAI,YAAY,EAAE,CAAC;gBACjB,IAAI,CAAC;oBACH,MAAM,iBAAiB,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;oBACtF,iBAAiB,CAAC,IAAI,CAAC,kBAAkB,EAAE;wBACzC,MAAM;wBACN,KAAK,EAAE,GAAG;wBACV,YAAY;qBACb,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,0EAA0E;oBAC1E,OAAO,CAAC,GAAG,CAAC,wDAAwD,UAAU,EAAE,CAAC,CAAC;gBACpF,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,qBAAqB,IAAI,EAAE,CAAC,CAAC;QAClF,CAAC,CAAC,CAAC;QAEH,sBAAsB;QACtB,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QACjF,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,4CAA4C;QAC5C,MAAM,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YACxB,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,YAAY,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC9B,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,wBAAwB;QACxB,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QAEhD,yCAAyC;QACzC,YAAY,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACxC,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QAEH,wEAAwE;QACxE,YAAY,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;YAChC,6CAA6C;YAC7C,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,2DAA2D;YAC3D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,qEAAqE;YACrE,gBAAgB,EAAE,CAAC;YAEnB,4BAA4B;YAC5B,iBAAiB,GAAG,IAAI,CAAC;YAEzB,mCAAmC;YACnC,IAAI,MAAM,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClC,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;gBAEvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gBAAgB,YAAY,CAAC,MAAM,kCAAkC,CACtF,CAAC;gBACJ,CAAC;gBAED,iCAAiC;gBACjC,YAAY,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC,GAAG,EAAE,EAAE;oBACvC,IAAI,GAAG,EAAE,CAAC;wBACR,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;wBACtF,OAAO,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;oBAC3E,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,+CAA+C;gBAC/C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;gBACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAC7B,CAAC;YAED,qDAAqD;YACrD,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YAC1B,YAAY,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAE1B,yCAAyC;YACzC,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,uDAAuD;YACvD,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzB,gEAAgE;gBAChE,KAAK,MAAM,KAAK,IAAI,SAAS,EAAE,CAAC;oBAC9B,YAAY,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;gBAC5B,CAAC;gBACD,kBAAkB;gBAClB,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;gBACrB,SAAS,GAAG,CAAC,CAAC;YAChB,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,OAAO,eAAe,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBAC5G,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE;oBACF,SAAS,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBAClC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE,CACL,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,2BAA2B,MAAM,CAAC,QAAQ,OAAO,eAAe,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBAC1F,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE,CACL,CAAC;YACJ,CAAC;YAED,mDAAmD;YACnD,IAAI,UAAU,EAAE,CAAC;gBACf,4DAA4D;gBAC5D,MAAM,QAAQ,GAAG;oBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC;oBAC3C,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,YAAY,IAAI,EAAE;oBAC1C,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,SAAS,IAAI,CAAC;iBACzC,CAAC;gBAEF,0CAA0C;gBAC1C,MAAM,oBAAoB,GAAG,IAAI,CAAC,UAAU,CAAC,0BAA0B,CACrE,YAAY,EACZ,UAAU,EACV,QAAQ,EACR,CAAC,YAAY,EAAE,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACrF,CAAC;gBAEF,gFAAgF;gBAChF,MAAM,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;gBAEnD,gCAAgC;gBAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAExC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD,UAAU,EAAE,CACtF,CAAC;oBACF,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wFAAwF,CACzG,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;YAED,yBAAyB;YACzB,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC,cAAc,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE;gBAC1F,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,MAAM,CAAC,QAAQ,0CAA0C,CAC/F,CAAC;gBACF,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAC7D,CAAC,CAAC,CAAC;YAEH,qDAAqD;YACrD,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC;gBAEnC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;CACF"}