@push.rocks/smartproxy 18.0.2 → 18.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/certificate/certificate-manager.d.ts +150 -0
  3. package/dist_ts/certificate/certificate-manager.js +505 -0
  4. package/dist_ts/certificate/events/simplified-events.d.ts +56 -0
  5. package/dist_ts/certificate/events/simplified-events.js +13 -0
  6. package/dist_ts/certificate/models/certificate-errors.d.ts +69 -0
  7. package/dist_ts/certificate/models/certificate-errors.js +141 -0
  8. package/dist_ts/certificate/models/certificate-strategy.d.ts +60 -0
  9. package/dist_ts/certificate/models/certificate-strategy.js +73 -0
  10. package/dist_ts/certificate/simplified-certificate-manager.d.ts +150 -0
  11. package/dist_ts/certificate/simplified-certificate-manager.js +501 -0
  12. package/dist_ts/http/index.d.ts +1 -9
  13. package/dist_ts/http/index.js +5 -11
  14. package/dist_ts/plugins.d.ts +3 -1
  15. package/dist_ts/plugins.js +4 -2
  16. package/dist_ts/proxies/network-proxy/network-proxy.js +3 -1
  17. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +48 -0
  18. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +76 -0
  19. package/dist_ts/proxies/network-proxy/websocket-handler.js +41 -4
  20. package/dist_ts/proxies/smart-proxy/cert-store.d.ts +10 -0
  21. package/dist_ts/proxies/smart-proxy/cert-store.js +70 -0
  22. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +116 -0
  23. package/dist_ts/proxies/smart-proxy/certificate-manager.js +401 -0
  24. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +168 -0
  25. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +642 -0
  26. package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +26 -0
  27. package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
  28. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +65 -0
  29. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +31 -0
  30. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +102 -0
  31. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +73 -0
  32. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +10 -44
  33. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +66 -202
  34. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +4 -0
  35. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +62 -2
  36. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +41 -0
  37. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +132 -0
  38. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +18 -13
  39. package/dist_ts/proxies/smart-proxy/smart-proxy.js +79 -196
  40. package/package.json +7 -5
  41. package/readme.md +224 -10
  42. package/readme.plan.md +1405 -617
  43. package/ts/00_commitinfo_data.ts +1 -1
  44. package/ts/http/index.ts +5 -12
  45. package/ts/plugins.ts +4 -1
  46. package/ts/proxies/network-proxy/network-proxy.ts +3 -0
  47. package/ts/proxies/network-proxy/websocket-handler.ts +38 -3
  48. package/ts/proxies/smart-proxy/cert-store.ts +86 -0
  49. package/ts/proxies/smart-proxy/certificate-manager.ts +506 -0
  50. package/ts/proxies/smart-proxy/models/route-types.ts +33 -3
  51. package/ts/proxies/smart-proxy/network-proxy-bridge.ts +86 -239
  52. package/ts/proxies/smart-proxy/route-connection-handler.ts +74 -1
  53. package/ts/proxies/smart-proxy/smart-proxy.ts +105 -222
@@ -0,0 +1,505 @@
1
+ /**
2
+ * Unified certificate manager for SmartProxy
3
+ */
4
+ import * as plugins from '../plugins.js';
5
+ import * as path from 'path';
6
+ import * as fs from 'fs/promises';
7
+ import { CertificateError, CertificateErrors } from './models/certificate-errors.js';
8
+ import { CertificateEvent } from './events/certificate-events.js';
9
+ /**
10
+ * Unified certificate manager
11
+ */
12
+ export class CertificateManager extends plugins.EventEmitter {
13
+ constructor(config) {
14
+ super();
15
+ this.certificateCache = new Map();
16
+ this.pendingRequests = new Map();
17
+ // Validate configuration
18
+ if (!config.certProvider) {
19
+ throw CertificateErrors.noCertProvider();
20
+ }
21
+ if (!config.acmeEmail) {
22
+ throw CertificateErrors.missingAcmeEmail();
23
+ }
24
+ // Set defaults
25
+ this.config = {
26
+ ...config,
27
+ storageDir: config.storageDir || './certs',
28
+ renewBeforeDays: config.renewBeforeDays || 30,
29
+ defaultCertPath: config.defaultCertPath || path.join(process.cwd(), 'assets/certs/cert.pem'),
30
+ defaultKeyPath: config.defaultKeyPath || path.join(process.cwd(), 'assets/certs/key.pem')
31
+ };
32
+ // Ensure storage directory exists
33
+ this.ensureStorageDir();
34
+ }
35
+ /**
36
+ * Initialize the certificate manager
37
+ */
38
+ async start() {
39
+ // Initialize ACME client
40
+ await this.initializeAcmeClient();
41
+ // Load stored certificates
42
+ await this.loadStoredCertificates();
43
+ // Start renewal timer
44
+ this.startRenewalTimer();
45
+ }
46
+ /**
47
+ * Stop the certificate manager
48
+ */
49
+ async stop() {
50
+ if (this.renewalTimer) {
51
+ clearInterval(this.renewalTimer);
52
+ this.renewalTimer = undefined;
53
+ }
54
+ }
55
+ /**
56
+ * Get a certificate for a domain (main entry point)
57
+ */
58
+ async getCertificate(domain) {
59
+ // Check cache first
60
+ const cached = this.certificateCache.get(domain);
61
+ if (cached && this.isCertificateValid(cached)) {
62
+ return cached;
63
+ }
64
+ // Check for pending request to avoid duplicates
65
+ const pending = this.pendingRequests.get(domain);
66
+ if (pending) {
67
+ return pending;
68
+ }
69
+ // Start new certificate request
70
+ const request = this.requestCertificate(domain);
71
+ this.pendingRequests.set(domain, request);
72
+ try {
73
+ const cert = await request;
74
+ this.pendingRequests.delete(domain);
75
+ return cert;
76
+ }
77
+ catch (error) {
78
+ this.pendingRequests.delete(domain);
79
+ throw error;
80
+ }
81
+ }
82
+ /**
83
+ * Request a new certificate
84
+ */
85
+ async requestCertificate(domain) {
86
+ let strategyType = 'static';
87
+ try {
88
+ // Get strategy from provider
89
+ let strategy;
90
+ try {
91
+ strategy = await this.config.certProvider(domain);
92
+ }
93
+ catch (providerError) {
94
+ throw CertificateErrors.invalidCertProvider(providerError);
95
+ }
96
+ // Track strategy type for error reporting
97
+ strategyType = strategy.type === 'skip' ? 'static' : strategy.type;
98
+ let certificate;
99
+ switch (strategy.type) {
100
+ case 'acme-http':
101
+ certificate = await this.requestAcmeHttpCertificate(domain);
102
+ break;
103
+ case 'acme-dns':
104
+ certificate = await this.requestAcmeDnsCertificate(domain);
105
+ break;
106
+ case 'static':
107
+ certificate = {
108
+ domain,
109
+ certificate: strategy.cert,
110
+ privateKey: strategy.key,
111
+ expiresAt: strategy.expiresAt || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000),
112
+ source: 'static'
113
+ };
114
+ break;
115
+ case 'skip':
116
+ throw CertificateErrors.certificateNotFound(domain);
117
+ default:
118
+ throw CertificateErrors.invalidCertProvider(new Error('Unknown strategy type'));
119
+ }
120
+ // Cache and store
121
+ this.certificateCache.set(domain, certificate);
122
+ await this.storeCertificate(certificate);
123
+ // Emit success event
124
+ this.emit(CertificateEvent.OBTAINED, {
125
+ domain,
126
+ type: 'new',
127
+ expiresAt: certificate.expiresAt,
128
+ source: certificate.source,
129
+ certificate: certificate.certificate,
130
+ privateKey: certificate.privateKey
131
+ });
132
+ return certificate;
133
+ }
134
+ catch (error) {
135
+ const certError = error instanceof CertificateError
136
+ ? error
137
+ : new CertificateError({
138
+ code: 'UNKNOWN_ERROR',
139
+ message: error.message || 'Unknown error',
140
+ domain,
141
+ cause: error
142
+ });
143
+ this.emit(CertificateEvent.FAILED, {
144
+ domain,
145
+ error: certError,
146
+ strategy: strategyType
147
+ });
148
+ throw certError;
149
+ }
150
+ }
151
+ /**
152
+ * Request certificate via ACME HTTP-01
153
+ */
154
+ async requestAcmeHttpCertificate(domain) {
155
+ if (domain.includes('*')) {
156
+ throw CertificateErrors.wildcardNotSupported(domain);
157
+ }
158
+ try {
159
+ // Create ACME order
160
+ const order = await this.acmeClient.createOrder({
161
+ identifiers: [{ type: 'dns', value: domain }]
162
+ });
163
+ // Get authorization
164
+ const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
165
+ const challenge = authorization.challenges.find(c => c.type === 'http-01');
166
+ if (!challenge) {
167
+ throw new Error('No HTTP-01 challenge available');
168
+ }
169
+ // Prepare challenge response
170
+ const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
171
+ // Set up HTTP responder (this would integrate with Port80Handler)
172
+ await this.setupHttpChallenge(challenge.token, keyAuthorization);
173
+ // Notify ACME server
174
+ await this.acmeClient.completeChallenge(challenge);
175
+ await this.acmeClient.waitForValidation(challenge);
176
+ // Generate CSR
177
+ const keypair = await this.generateKeypair();
178
+ const csr = await this.generateCsr(domain, keypair);
179
+ // Finalize order
180
+ await this.acmeClient.finalizeOrder(order, csr);
181
+ const cert = await this.acmeClient.getCertificate(order);
182
+ // Clean up challenge
183
+ await this.cleanupHttpChallenge(challenge.token);
184
+ return {
185
+ domain,
186
+ certificate: cert,
187
+ privateKey: keypair.privateKey,
188
+ expiresAt: this.extractExpiryDate(cert),
189
+ source: 'acme-http'
190
+ };
191
+ }
192
+ catch (error) {
193
+ throw CertificateErrors.acmeHttpChallengeFailed(domain, error);
194
+ }
195
+ }
196
+ /**
197
+ * Request certificate via ACME DNS-01
198
+ */
199
+ async requestAcmeDnsCertificate(domain) {
200
+ try {
201
+ // Create ACME order
202
+ const order = await this.acmeClient.createOrder({
203
+ identifiers: [{ type: 'dns', value: domain }]
204
+ });
205
+ // Get authorization
206
+ const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
207
+ const challenge = authorization.challenges.find(c => c.type === 'dns-01');
208
+ if (!challenge) {
209
+ throw new Error('No DNS-01 challenge available');
210
+ }
211
+ // Get DNS record value
212
+ const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
213
+ const dnsRecord = this.acmeClient.keyAuthorizationToDns01(keyAuthorization);
214
+ // Note: Actual DNS record creation would be handled externally
215
+ console.log(`Please create DNS TXT record: _acme-challenge.${domain} = ${dnsRecord}`);
216
+ // In a real implementation, we'd wait for DNS propagation
217
+ // For now, this is a placeholder
218
+ await new Promise(resolve => setTimeout(resolve, 60000)); // Wait 60 seconds
219
+ // Notify ACME server
220
+ await this.acmeClient.completeChallenge(challenge);
221
+ await this.acmeClient.waitForValidation(challenge);
222
+ // Generate CSR
223
+ const keypair = await this.generateKeypair();
224
+ const csr = await this.generateCsr(domain, keypair);
225
+ // Finalize order
226
+ await this.acmeClient.finalizeOrder(order, csr);
227
+ const cert = await this.acmeClient.getCertificate(order);
228
+ return {
229
+ domain,
230
+ certificate: cert,
231
+ privateKey: keypair.privateKey,
232
+ expiresAt: this.extractExpiryDate(cert),
233
+ source: 'acme-dns'
234
+ };
235
+ }
236
+ catch (error) {
237
+ throw CertificateErrors.acmeDnsChallengeFailed(domain, error);
238
+ }
239
+ }
240
+ /**
241
+ * Renew a certificate
242
+ */
243
+ async renewCertificate(domain) {
244
+ const existing = this.certificateCache.get(domain);
245
+ if (!existing) {
246
+ throw CertificateErrors.certificateNotFound(domain);
247
+ }
248
+ try {
249
+ // Request new certificate
250
+ const renewed = await this.requestCertificate(domain);
251
+ // Emit renewal event
252
+ this.emit(CertificateEvent.OBTAINED, {
253
+ domain,
254
+ type: 'renewed',
255
+ expiresAt: renewed.expiresAt,
256
+ source: renewed.source,
257
+ certificate: renewed.certificate,
258
+ privateKey: renewed.privateKey
259
+ });
260
+ return renewed;
261
+ }
262
+ catch (error) {
263
+ throw error;
264
+ }
265
+ }
266
+ /**
267
+ * Check certificates for renewal
268
+ */
269
+ async checkForRenewals() {
270
+ for (const [domain, cert] of this.certificateCache.entries()) {
271
+ if (this.shouldRenew(cert)) {
272
+ try {
273
+ await this.renewCertificate(domain);
274
+ }
275
+ catch (error) {
276
+ console.error(`Failed to renew certificate for ${domain}:`, error);
277
+ }
278
+ }
279
+ else if (this.isExpiringSoon(cert)) {
280
+ this.emit(CertificateEvent.EXPIRING, {
281
+ domain,
282
+ expiresAt: cert.expiresAt,
283
+ daysRemaining: this.getDaysRemaining(cert)
284
+ });
285
+ }
286
+ }
287
+ }
288
+ /**
289
+ * Initialize ACME client
290
+ */
291
+ async initializeAcmeClient() {
292
+ // ACME client initialization placeholder
293
+ // In a real implementation, this would use an ACME library
294
+ console.log(`Initializing ACME client for ${this.config.acmeServer} environment`);
295
+ }
296
+ /**
297
+ * Load stored certificates from disk
298
+ */
299
+ async loadStoredCertificates() {
300
+ try {
301
+ const files = await fs.readdir(this.config.storageDir);
302
+ const certFiles = files.filter(f => f.endsWith('.json'));
303
+ for (const file of certFiles) {
304
+ try {
305
+ const content = await fs.readFile(path.join(this.config.storageDir, file), 'utf-8');
306
+ const cert = JSON.parse(content);
307
+ cert.expiresAt = new Date(cert.expiresAt);
308
+ if (this.isCertificateValid(cert)) {
309
+ this.certificateCache.set(cert.domain, cert);
310
+ }
311
+ }
312
+ catch (error) {
313
+ console.error(`Failed to load certificate ${file}:`, error);
314
+ }
315
+ }
316
+ }
317
+ catch (error) {
318
+ console.error('Failed to load certificates:', error);
319
+ }
320
+ }
321
+ /**
322
+ * Store certificate to disk
323
+ */
324
+ async storeCertificate(cert) {
325
+ const filename = `${cert.domain}.json`;
326
+ const filepath = path.join(this.config.storageDir, filename);
327
+ try {
328
+ await fs.writeFile(filepath, JSON.stringify(cert, null, 2));
329
+ // Also save individual cert and key files
330
+ await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.crt`), cert.certificate);
331
+ await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.key`), cert.privateKey);
332
+ // Set proper permissions on key file
333
+ await fs.chmod(path.join(this.config.storageDir, `${cert.domain}.key`), 0o600);
334
+ }
335
+ catch (error) {
336
+ throw CertificateErrors.storageError('write', filepath, error);
337
+ }
338
+ }
339
+ /**
340
+ * Ensure storage directory exists
341
+ */
342
+ async ensureStorageDir() {
343
+ try {
344
+ await fs.mkdir(this.config.storageDir, { recursive: true });
345
+ }
346
+ catch (error) {
347
+ console.error('Failed to create storage directory:', error);
348
+ }
349
+ }
350
+ /**
351
+ * Get or create ACME account key
352
+ */
353
+ async getOrCreateAccountKey() {
354
+ const keyPath = path.join(this.config.storageDir, 'account.key');
355
+ try {
356
+ return await fs.readFile(keyPath, 'utf-8');
357
+ }
358
+ catch {
359
+ // Generate new key - placeholder
360
+ const dummyKey = '-----BEGIN PRIVATE KEY-----\nDUMMY_KEY_FOR_TESTING\n-----END PRIVATE KEY-----';
361
+ await fs.writeFile(keyPath, dummyKey);
362
+ await fs.chmod(keyPath, 0o600);
363
+ return dummyKey;
364
+ }
365
+ }
366
+ /**
367
+ * Generate keypair for certificate
368
+ */
369
+ async generateKeypair() {
370
+ // Keypair generation placeholder
371
+ return {
372
+ privateKey: '-----BEGIN PRIVATE KEY-----\nDUMMY_PRIVATE_KEY\n-----END PRIVATE KEY-----',
373
+ publicKey: '-----BEGIN PUBLIC KEY-----\nDUMMY_PUBLIC_KEY\n-----END PUBLIC KEY-----'
374
+ };
375
+ }
376
+ /**
377
+ * Generate CSR for domain
378
+ */
379
+ async generateCsr(domain, keypair) {
380
+ // CSR generation placeholder
381
+ return `-----BEGIN CERTIFICATE REQUEST-----\nDUMMY_CSR_FOR_${domain}\n-----END CERTIFICATE REQUEST-----`;
382
+ }
383
+ /**
384
+ * Extract expiry date from certificate
385
+ */
386
+ extractExpiryDate(certPem) {
387
+ // Certificate expiry extraction placeholder
388
+ // In a real implementation, this would parse the certificate
389
+ return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days from now
390
+ }
391
+ /**
392
+ * Check if certificate is valid
393
+ */
394
+ isCertificateValid(cert) {
395
+ return cert.expiresAt > new Date();
396
+ }
397
+ /**
398
+ * Check if certificate should be renewed
399
+ */
400
+ shouldRenew(cert) {
401
+ const daysRemaining = this.getDaysRemaining(cert);
402
+ return daysRemaining <= this.config.renewBeforeDays;
403
+ }
404
+ /**
405
+ * Check if certificate is expiring soon
406
+ */
407
+ isExpiringSoon(cert) {
408
+ const daysRemaining = this.getDaysRemaining(cert);
409
+ return daysRemaining <= this.config.renewBeforeDays + 7; // Warn 7 days before renewal
410
+ }
411
+ /**
412
+ * Get days remaining until expiry
413
+ */
414
+ getDaysRemaining(cert) {
415
+ const now = new Date();
416
+ const diff = cert.expiresAt.getTime() - now.getTime();
417
+ return Math.floor(diff / (1000 * 60 * 60 * 24));
418
+ }
419
+ /**
420
+ * Start renewal timer
421
+ */
422
+ startRenewalTimer() {
423
+ // Check every 6 hours
424
+ this.renewalTimer = setInterval(() => {
425
+ this.checkForRenewals().catch(error => {
426
+ console.error('Renewal check failed:', error);
427
+ });
428
+ }, 6 * 60 * 60 * 1000);
429
+ // Also check immediately
430
+ this.checkForRenewals().catch(error => {
431
+ console.error('Initial renewal check failed:', error);
432
+ });
433
+ }
434
+ /**
435
+ * Get default certificate for SNI fallback
436
+ */
437
+ async getDefaultCertificate() {
438
+ try {
439
+ const [cert, key] = await Promise.all([
440
+ fs.readFile(this.config.defaultCertPath, 'utf-8'),
441
+ fs.readFile(this.config.defaultKeyPath, 'utf-8')
442
+ ]);
443
+ return { cert, key };
444
+ }
445
+ catch (error) {
446
+ throw new CertificateError({
447
+ code: 'DEFAULT_CERT_ERROR',
448
+ message: 'Failed to load default certificate',
449
+ solution: 'Ensure default certificate files exist at configured paths',
450
+ cause: error
451
+ });
452
+ }
453
+ }
454
+ /**
455
+ * Set up HTTP challenge responder
456
+ */
457
+ async setupHttpChallenge(token, keyAuthorization) {
458
+ // This would integrate with Port80Handler
459
+ // For now, it's a placeholder
460
+ console.log(`HTTP Challenge: /.well-known/acme-challenge/${token} = ${keyAuthorization}`);
461
+ }
462
+ /**
463
+ * Clean up HTTP challenge
464
+ */
465
+ async cleanupHttpChallenge(token) {
466
+ // This would integrate with Port80Handler
467
+ // For now, it's a placeholder
468
+ console.log(`Cleanup HTTP Challenge: ${token}`);
469
+ }
470
+ /**
471
+ * Type assertion for event emitter
472
+ */
473
+ on(event, listener) {
474
+ return super.on(event, listener);
475
+ }
476
+ off(event, listener) {
477
+ return super.off(event, listener);
478
+ }
479
+ emit(event, data) {
480
+ return super.emit(event, data);
481
+ }
482
+ /**
483
+ * Update routes (placeholder for future implementation)
484
+ */
485
+ async updateRoutes(routes) {
486
+ // Process routes to extract certificate requirements
487
+ for (const route of routes) {
488
+ if (route.action.type === 'forward' &&
489
+ route.action.tls?.mode === 'terminate' &&
490
+ route.action.tls?.certificate === 'auto' &&
491
+ route.match.domains) {
492
+ const domains = Array.isArray(route.match.domains)
493
+ ? route.match.domains
494
+ : [route.match.domains];
495
+ for (const domain of domains) {
496
+ // Trigger certificate retrieval for auto domains
497
+ this.getCertificate(domain).catch(err => {
498
+ console.error(`Failed to get certificate for ${domain}:`, err);
499
+ });
500
+ }
501
+ }
502
+ }
503
+ }
504
+ }
505
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate-manager.js","sourceRoot":"","sources":["../../ts/certificate/certificate-manager.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAElC,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACrF,OAAO,EAAE,gBAAgB,EAAE,MAAM,gCAAgC,CAAC;AA+BlE;;GAEG;AACH,MAAM,OAAO,kBAAmB,SAAQ,OAAO,CAAC,YAAY;IAO1D,YAAY,MAAgC;QAC1C,KAAK,EAAE,CAAC;QANF,qBAAgB,GAAG,IAAI,GAAG,EAA6B,CAAC;QAGxD,oBAAe,GAAG,IAAI,GAAG,EAAsC,CAAC;QAKtE,yBAAyB;QACzB,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,cAAc,EAAE,CAAC;QAC3C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;YACtB,MAAM,iBAAiB,CAAC,gBAAgB,EAAE,CAAC;QAC7C,CAAC;QAED,eAAe;QACf,IAAI,CAAC,MAAM,GAAG;YACZ,GAAG,MAAM;YACT,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,SAAS;YAC1C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,EAAE;YAC7C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,uBAAuB,CAAC;YAC5F,cAAc,EAAE,MAAM,CAAC,cAAc,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,sBAAsB,CAAC;SAC1F,CAAC;QAEF,kCAAkC;QAClC,IAAI,CAAC,gBAAgB,EAAE,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,yBAAyB;QACzB,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QAElC,2BAA2B;QAC3B,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAEpC,sBAAsB;QACtB,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,cAAc,CAAC,MAAc;QACxC,oBAAoB;QACpB,MAAM,MAAM,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,MAAM,IAAI,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC9C,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,gDAAgD;QAChD,MAAM,OAAO,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,OAAO,EAAE,CAAC;YACZ,OAAO,OAAO,CAAC;QACjB,CAAC;QAED,gCAAgC;QAChC,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAChD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAE1C,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC;YAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC7C,IAAI,YAAY,GAAwC,QAAQ,CAAC;QAEjE,IAAI,CAAC;YACH,6BAA6B;YAC7B,IAAI,QAA6B,CAAC;YAClC,IAAI,CAAC;gBACH,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;YACpD,CAAC;YAAC,OAAO,aAAa,EAAE,CAAC;gBACvB,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,aAAa,CAAC,CAAC;YAC7D,CAAC;YAED,0CAA0C;YAC1C,YAAY,GAAG,QAAQ,CAAC,IAAI,KAAK,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC;YAEnE,IAAI,WAA8B,CAAC;YAEnC,QAAQ,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACtB,KAAK,WAAW;oBACd,WAAW,GAAG,MAAM,IAAI,CAAC,0BAA0B,CAAC,MAAM,CAAC,CAAC;oBAC5D,MAAM;gBAER,KAAK,UAAU;oBACb,WAAW,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,CAAC,CAAC;oBAC3D,MAAM;gBAER,KAAK,QAAQ;oBACX,WAAW,GAAG;wBACZ,MAAM;wBACN,WAAW,EAAE,QAAQ,CAAC,IAAI;wBAC1B,UAAU,EAAE,QAAQ,CAAC,GAAG;wBACxB,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;wBAChF,MAAM,EAAE,QAAQ;qBACjB,CAAC;oBACF,MAAM;gBAER,KAAK,MAAM;oBACT,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEtD;oBACE,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC;YACpF,CAAC;YAED,kBAAkB;YAClB,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;YAC/C,MAAM,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;YAEzC,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,KAAK;gBACX,SAAS,EAAE,WAAW,CAAC,SAAS;gBAChC,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,WAAW,EAAE,WAAW,CAAC,WAAW;gBACpC,UAAU,EAAE,WAAW,CAAC,UAAU;aACnC,CAAC,CAAC;YAEH,OAAO,WAAW,CAAC;QAErB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,SAAS,GAAG,KAAK,YAAY,gBAAgB;gBACjD,CAAC,CAAC,KAAK;gBACP,CAAC,CAAC,IAAI,gBAAgB,CAAC;oBACnB,IAAI,EAAE,eAAe;oBACrB,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,eAAe;oBACzC,MAAM;oBACN,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YAEP,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE;gBACjC,MAAM;gBACN,KAAK,EAAE,SAAS;gBAChB,QAAQ,EAAE,YAAY;aACvB,CAAC,CAAC;YAEH,MAAM,SAAS,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,0BAA0B,CAAC,MAAc;QACrD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;QAED,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;YAE3E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACpD,CAAC;YAED,6BAA6B;YAC7B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YAEvF,kEAAkE;YAClE,MAAM,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,KAAK,EAAE,gBAAgB,CAAC,CAAC;YAEjE,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,qBAAqB;YACrB,MAAM,IAAI,CAAC,oBAAoB,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YAEjD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,WAAW;aACpB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,uBAAuB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB,CAAC,MAAc;QACpD,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC;YAE1E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,uBAAuB;YACvB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YACvF,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,uBAAuB,CAAC,gBAAgB,CAAC,CAAC;YAE5E,+DAA+D;YAC/D,OAAO,CAAC,GAAG,CAAC,iDAAiD,MAAM,MAAM,SAAS,EAAE,CAAC,CAAC;YAEtF,0DAA0D;YAC1D,iCAAiC;YACjC,MAAM,IAAI,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,kBAAkB;YAE5E,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,UAAU;aACnB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,sBAAsB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACnD,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QACtD,CAAC;QAED,IAAI,CAAC;YACH,0BAA0B;YAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAEtD,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,SAAS;gBACf,SAAS,EAAE,OAAO,CAAC,SAAS;gBAC5B,MAAM,EAAE,OAAO,CAAC,MAAM;gBACtB,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,UAAU,EAAE,OAAO,CAAC,UAAU;aAC/B,CAAC,CAAC;YAEH,OAAO,OAAO,CAAC;QAEjB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,gBAAgB,CAAC,OAAO,EAAE,EAAE,CAAC;YAC7D,IAAI,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;gBACtC,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,mCAAmC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;gBACrE,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;oBACnC,MAAM;oBACN,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,aAAa,EAAE,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC;iBAC3C,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB;QAChC,yCAAyC;QACzC,2DAA2D;QAC3D,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,MAAM,CAAC,UAAU,cAAc,CAAC,CAAC;IACpF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB;QAClC,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACvD,MAAM,SAAS,GAAG,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAEzD,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,IAAI,CAAC;oBACH,MAAM,OAAO,GAAG,MAAM,EAAE,CAAC,QAAQ,CAC/B,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,IAAI,CAAC,EACvC,OAAO,CACR,CAAC;oBACF,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAsB,CAAC;oBACtD,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBAE1C,IAAI,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;wBAClC,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;oBAC/C,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,IAAI,GAAG,EAAE,KAAK,CAAC,CAAC;gBAC9D,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,EAAE,KAAK,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,IAAuB;QACpD,MAAM,QAAQ,GAAG,GAAG,IAAI,CAAC,MAAM,OAAO,CAAC;QACvC,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;QAE7D,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;YAE5D,0CAA0C;YAC1C,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,WAAW,CACjB,CAAC;YACF,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,UAAU,CAChB,CAAC;YAEF,qCAAqC;YACrC,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QAEjF,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAC9D,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,qCAAqC,EAAE,KAAK,CAAC,CAAC;QAC9D,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB;QACjC,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;QAEjE,IAAI,CAAC;YACH,OAAO,MAAM,EAAE,CAAC,QAAQ,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC;QAC7C,CAAC;QAAC,MAAM,CAAC;YACP,iCAAiC;YACjC,MAAM,QAAQ,GAAG,+EAA+E,CAAC;YAEjG,MAAM,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;YACtC,MAAM,EAAE,CAAC,KAAK,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAE/B,OAAO,QAAQ,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,iCAAiC;QACjC,OAAO;YACL,UAAU,EAAE,2EAA2E;YACvF,SAAS,EAAE,wEAAwE;SACpF,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,OAA+B;QACvE,6BAA6B;QAC7B,OAAO,sDAAsD,MAAM,qCAAqC,CAAC;IAC3G,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,OAAe;QACvC,4CAA4C;QAC5C,6DAA6D;QAC7D,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;IAC7E,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,IAAuB;QAChD,OAAO,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAAuB;QACzC,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC;IACtD,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,IAAuB;QAC5C,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC,CAAC,6BAA6B;IACxF,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,IAAuB;QAC9C,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;QACtD,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,GAAG,CAAC,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,sBAAsB;QACtB,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE;YACnC,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;gBACpC,OAAO,CAAC,KAAK,CAAC,uBAAuB,EAAE,KAAK,CAAC,CAAC;YAChD,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAEvB,yBAAyB;QACzB,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;YACpC,OAAO,CAAC,KAAK,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,qBAAqB;QAChC,IAAI,CAAC;YACH,MAAM,CAAC,IAAI,EAAE,GAAG,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;gBACpC,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,EAAE,OAAO,CAAC;gBACjD,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,cAAc,EAAE,OAAO,CAAC;aACjD,CAAC,CAAC;YAEH,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,gBAAgB,CAAC;gBACzB,IAAI,EAAE,oBAAoB;gBAC1B,OAAO,EAAE,oCAAoC;gBAC7C,QAAQ,EAAE,4DAA4D;gBACtE,KAAK,EAAE,KAAK;aACb,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,KAAa,EAAE,gBAAwB;QACtE,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,+CAA+C,KAAK,MAAM,gBAAgB,EAAE,CAAC,CAAC;IAC5F,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,KAAa;QAC9C,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,2BAA2B,KAAK,EAAE,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACI,EAAE,CACP,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,EAAE,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACnC,CAAC;IAEM,GAAG,CACR,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACpC,CAAC;IAEM,IAAI,CACT,KAAQ,EACR,IAA4B;QAE5B,OAAO,KAAK,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,MAAsB;QAC9C,qDAAqD;QACrD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;gBACtC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM;gBACxC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;gBAExB,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;oBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBAE1B,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;oBAC7B,iDAAiD;oBACjD,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;wBACtC,OAAO,CAAC,KAAK,CAAC,iCAAiC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;oBACjE,CAAC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
@@ -0,0 +1,56 @@
1
+ /**
2
+ * Simplified certificate event system
3
+ */
4
+ import type { CertificateError } from '../models/certificate-errors.js';
5
+ /**
6
+ * Certificate event types - only the essentials
7
+ */
8
+ export declare enum CertificateEvent {
9
+ OBTAINED = "certificate:obtained",
10
+ FAILED = "certificate:failed",
11
+ EXPIRING = "certificate:expiring"
12
+ }
13
+ /**
14
+ * Certificate obtained event data
15
+ */
16
+ export interface CertificateObtainedEvent {
17
+ domain: string;
18
+ type: 'new' | 'renewed';
19
+ expiresAt: Date;
20
+ source: 'acme-http' | 'acme-dns' | 'static';
21
+ certificate: string;
22
+ privateKey: string;
23
+ }
24
+ /**
25
+ * Certificate failed event data
26
+ */
27
+ export interface CertificateFailedEvent {
28
+ domain: string;
29
+ error: CertificateError;
30
+ attemptNumber?: number;
31
+ willRetry?: boolean;
32
+ }
33
+ /**
34
+ * Certificate expiring event data
35
+ */
36
+ export interface CertificateExpiringEvent {
37
+ domain: string;
38
+ expiresAt: Date;
39
+ daysRemaining: number;
40
+ }
41
+ /**
42
+ * Combined event map for TypeScript typing
43
+ */
44
+ export interface CertificateEventMap {
45
+ [CertificateEvent.OBTAINED]: CertificateObtainedEvent;
46
+ [CertificateEvent.FAILED]: CertificateFailedEvent;
47
+ [CertificateEvent.EXPIRING]: CertificateExpiringEvent;
48
+ }
49
+ /**
50
+ * Type-safe event emitter interface
51
+ */
52
+ export interface ICertificateEventEmitter {
53
+ on<K extends keyof CertificateEventMap>(event: K, listener: (data: CertificateEventMap[K]) => void): this;
54
+ off<K extends keyof CertificateEventMap>(event: K, listener: (data: CertificateEventMap[K]) => void): this;
55
+ emit<K extends keyof CertificateEventMap>(event: K, data: CertificateEventMap[K]): boolean;
56
+ }
@@ -0,0 +1,13 @@
1
+ /**
2
+ * Simplified certificate event system
3
+ */
4
+ /**
5
+ * Certificate event types - only the essentials
6
+ */
7
+ export var CertificateEvent;
8
+ (function (CertificateEvent) {
9
+ CertificateEvent["OBTAINED"] = "certificate:obtained";
10
+ CertificateEvent["FAILED"] = "certificate:failed";
11
+ CertificateEvent["EXPIRING"] = "certificate:expiring";
12
+ })(CertificateEvent || (CertificateEvent = {}));
13
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2ltcGxpZmllZC1ldmVudHMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9jZXJ0aWZpY2F0ZS9ldmVudHMvc2ltcGxpZmllZC1ldmVudHMudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUE7O0dBRUc7QUFJSDs7R0FFRztBQUNILE1BQU0sQ0FBTixJQUFZLGdCQUlYO0FBSkQsV0FBWSxnQkFBZ0I7SUFDMUIscURBQWlDLENBQUE7SUFDakMsaURBQTZCLENBQUE7SUFDN0IscURBQWlDLENBQUE7QUFDbkMsQ0FBQyxFQUpXLGdCQUFnQixLQUFoQixnQkFBZ0IsUUFJM0IifQ==
@@ -0,0 +1,69 @@
1
+ /**
2
+ * Structured error types for certificate management
3
+ */
4
+ export interface CertificateErrorDetails {
5
+ code: string;
6
+ message: string;
7
+ solution?: string;
8
+ domain?: string;
9
+ challengeType?: 'http' | 'dns';
10
+ details?: Record<string, any>;
11
+ cause?: Error;
12
+ }
13
+ /**
14
+ * Certificate-specific error class with structured information
15
+ */
16
+ export declare class CertificateError extends Error {
17
+ readonly code: string;
18
+ readonly solution?: string;
19
+ readonly domain?: string;
20
+ readonly challengeType?: 'http' | 'dns';
21
+ readonly details?: Record<string, any>;
22
+ readonly cause?: Error;
23
+ constructor(details: CertificateErrorDetails);
24
+ /**
25
+ * Convert error to JSON for logging
26
+ */
27
+ toJSON(): Record<string, any>;
28
+ }
29
+ /**
30
+ * Common certificate error codes
31
+ */
32
+ export declare const CertificateErrorCodes: {
33
+ readonly NO_CERT_PROVIDER: "NO_CERT_PROVIDER";
34
+ readonly INVALID_CERT_PROVIDER: "INVALID_CERT_PROVIDER";
35
+ readonly MISSING_ACME_EMAIL: "MISSING_ACME_EMAIL";
36
+ readonly ACME_HTTP_CHALLENGE_FAILED: "ACME_HTTP_CHALLENGE_FAILED";
37
+ readonly ACME_DNS_CHALLENGE_FAILED: "ACME_DNS_CHALLENGE_FAILED";
38
+ readonly ACME_RATE_LIMITED: "ACME_RATE_LIMITED";
39
+ readonly ACME_ACCOUNT_ERROR: "ACME_ACCOUNT_ERROR";
40
+ readonly ACME_VALIDATION_ERROR: "ACME_VALIDATION_ERROR";
41
+ readonly CERTIFICATE_EXPIRED: "CERTIFICATE_EXPIRED";
42
+ readonly CERTIFICATE_INVALID: "CERTIFICATE_INVALID";
43
+ readonly CERTIFICATE_NOT_FOUND: "CERTIFICATE_NOT_FOUND";
44
+ readonly CERTIFICATE_PARSE_ERROR: "CERTIFICATE_PARSE_ERROR";
45
+ readonly STORAGE_READ_ERROR: "STORAGE_READ_ERROR";
46
+ readonly STORAGE_WRITE_ERROR: "STORAGE_WRITE_ERROR";
47
+ readonly STORAGE_PERMISSION_ERROR: "STORAGE_PERMISSION_ERROR";
48
+ readonly NETWORK_TIMEOUT: "NETWORK_TIMEOUT";
49
+ readonly NETWORK_UNREACHABLE: "NETWORK_UNREACHABLE";
50
+ readonly DNS_RESOLUTION_FAILED: "DNS_RESOLUTION_FAILED";
51
+ readonly INVALID_DOMAIN: "INVALID_DOMAIN";
52
+ readonly WILDCARD_NOT_SUPPORTED: "WILDCARD_NOT_SUPPORTED";
53
+ readonly DOMAIN_NOT_CONFIGURED: "DOMAIN_NOT_CONFIGURED";
54
+ };
55
+ /**
56
+ * Helper functions for creating common certificate errors
57
+ */
58
+ export declare const CertificateErrors: {
59
+ noCertProvider: () => CertificateError;
60
+ invalidCertProvider: (error: Error) => CertificateError;
61
+ missingAcmeEmail: () => CertificateError;
62
+ acmeHttpChallengeFailed: (domain: string, details?: any) => CertificateError;
63
+ acmeDnsChallengeFailed: (domain: string, details?: any) => CertificateError;
64
+ acmeRateLimited: (domain: string, resetTime?: Date) => CertificateError;
65
+ certificateExpired: (domain: string, expiredAt: Date) => CertificateError;
66
+ certificateNotFound: (domain: string) => CertificateError;
67
+ wildcardNotSupported: (domain: string) => CertificateError;
68
+ storageError: (operation: "read" | "write", path: string, error: Error) => CertificateError;
69
+ };