@push.rocks/smartproxy 18.0.2 → 18.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/certificate/certificate-manager.d.ts +150 -0
  3. package/dist_ts/certificate/certificate-manager.js +505 -0
  4. package/dist_ts/certificate/events/simplified-events.d.ts +56 -0
  5. package/dist_ts/certificate/events/simplified-events.js +13 -0
  6. package/dist_ts/certificate/models/certificate-errors.d.ts +69 -0
  7. package/dist_ts/certificate/models/certificate-errors.js +141 -0
  8. package/dist_ts/certificate/models/certificate-strategy.d.ts +60 -0
  9. package/dist_ts/certificate/models/certificate-strategy.js +73 -0
  10. package/dist_ts/certificate/simplified-certificate-manager.d.ts +150 -0
  11. package/dist_ts/certificate/simplified-certificate-manager.js +501 -0
  12. package/dist_ts/http/index.d.ts +1 -9
  13. package/dist_ts/http/index.js +5 -11
  14. package/dist_ts/plugins.d.ts +3 -1
  15. package/dist_ts/plugins.js +4 -2
  16. package/dist_ts/proxies/network-proxy/network-proxy.js +3 -1
  17. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +48 -0
  18. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +76 -0
  19. package/dist_ts/proxies/network-proxy/websocket-handler.js +41 -4
  20. package/dist_ts/proxies/smart-proxy/cert-store.d.ts +10 -0
  21. package/dist_ts/proxies/smart-proxy/cert-store.js +70 -0
  22. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +116 -0
  23. package/dist_ts/proxies/smart-proxy/certificate-manager.js +401 -0
  24. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +168 -0
  25. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +642 -0
  26. package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +26 -0
  27. package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
  28. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +65 -0
  29. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +31 -0
  30. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +102 -0
  31. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +73 -0
  32. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +10 -44
  33. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +66 -202
  34. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +4 -0
  35. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +62 -2
  36. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +41 -0
  37. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +132 -0
  38. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +18 -13
  39. package/dist_ts/proxies/smart-proxy/smart-proxy.js +79 -196
  40. package/package.json +7 -5
  41. package/readme.md +224 -10
  42. package/readme.plan.md +1405 -617
  43. package/ts/00_commitinfo_data.ts +1 -1
  44. package/ts/http/index.ts +5 -12
  45. package/ts/plugins.ts +4 -1
  46. package/ts/proxies/network-proxy/network-proxy.ts +3 -0
  47. package/ts/proxies/network-proxy/websocket-handler.ts +38 -3
  48. package/ts/proxies/smart-proxy/cert-store.ts +86 -0
  49. package/ts/proxies/smart-proxy/certificate-manager.ts +506 -0
  50. package/ts/proxies/smart-proxy/models/route-types.ts +33 -3
  51. package/ts/proxies/smart-proxy/network-proxy-bridge.ts +86 -239
  52. package/ts/proxies/smart-proxy/route-connection-handler.ts +74 -1
  53. package/ts/proxies/smart-proxy/smart-proxy.ts +105 -222
@@ -0,0 +1,501 @@
1
+ /**
2
+ * Simplified, unified certificate manager for SmartProxy
3
+ */
4
+ import * as plugins from '../plugins.js';
5
+ import * as path from 'path';
6
+ import * as fs from 'fs/promises';
7
+ import { CertificateError, CertificateErrors } from './models/certificate-errors.js';
8
+ import { CertificateEvent } from './events/simplified-events.js';
9
+ /**
10
+ * Unified certificate manager
11
+ */
12
+ export class SimplifiedCertificateManager extends plugins.EventEmitter {
13
+ constructor(config) {
14
+ super();
15
+ this.certificateCache = new Map();
16
+ this.pendingRequests = new Map();
17
+ // Validate configuration
18
+ if (!config.certProvider) {
19
+ throw CertificateErrors.noCertProvider();
20
+ }
21
+ if (!config.acmeEmail) {
22
+ throw CertificateErrors.missingAcmeEmail();
23
+ }
24
+ // Set defaults
25
+ this.config = {
26
+ ...config,
27
+ storageDir: config.storageDir || './certs',
28
+ renewBeforeDays: config.renewBeforeDays || 30,
29
+ defaultCertPath: config.defaultCertPath || path.join(process.cwd(), 'assets/certs/cert.pem'),
30
+ defaultKeyPath: config.defaultKeyPath || path.join(process.cwd(), 'assets/certs/key.pem')
31
+ };
32
+ // Ensure storage directory exists
33
+ this.ensureStorageDir();
34
+ }
35
+ /**
36
+ * Initialize the certificate manager
37
+ */
38
+ async start() {
39
+ // Initialize ACME client
40
+ await this.initializeAcmeClient();
41
+ // Load stored certificates
42
+ await this.loadStoredCertificates();
43
+ // Start renewal timer
44
+ this.startRenewalTimer();
45
+ }
46
+ /**
47
+ * Stop the certificate manager
48
+ */
49
+ async stop() {
50
+ if (this.renewalTimer) {
51
+ clearInterval(this.renewalTimer);
52
+ this.renewalTimer = undefined;
53
+ }
54
+ }
55
+ /**
56
+ * Get a certificate for a domain (main entry point)
57
+ */
58
+ async getCertificate(domain) {
59
+ // Check cache first
60
+ const cached = this.certificateCache.get(domain);
61
+ if (cached && this.isCertificateValid(cached)) {
62
+ return cached;
63
+ }
64
+ // Check for pending request to avoid duplicates
65
+ const pending = this.pendingRequests.get(domain);
66
+ if (pending) {
67
+ return pending;
68
+ }
69
+ // Start new certificate request
70
+ const request = this.requestCertificate(domain);
71
+ this.pendingRequests.set(domain, request);
72
+ try {
73
+ const cert = await request;
74
+ this.pendingRequests.delete(domain);
75
+ return cert;
76
+ }
77
+ catch (error) {
78
+ this.pendingRequests.delete(domain);
79
+ throw error;
80
+ }
81
+ }
82
+ /**
83
+ * Request a new certificate
84
+ */
85
+ async requestCertificate(domain) {
86
+ try {
87
+ // Get strategy from provider
88
+ let strategy;
89
+ try {
90
+ strategy = await this.config.certProvider(domain);
91
+ }
92
+ catch (providerError) {
93
+ throw CertificateErrors.invalidCertProvider(providerError);
94
+ }
95
+ let certificate;
96
+ switch (strategy.type) {
97
+ case 'acme-http':
98
+ certificate = await this.requestAcmeHttpCertificate(domain);
99
+ break;
100
+ case 'acme-dns':
101
+ certificate = await this.requestAcmeDnsCertificate(domain);
102
+ break;
103
+ case 'static':
104
+ certificate = {
105
+ domain,
106
+ certificate: strategy.cert,
107
+ privateKey: strategy.key,
108
+ expiresAt: strategy.expiresAt || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000),
109
+ source: 'static'
110
+ };
111
+ break;
112
+ case 'skip':
113
+ throw CertificateErrors.certificateNotFound(domain);
114
+ default:
115
+ throw CertificateErrors.invalidCertProvider(new Error('Unknown strategy type'));
116
+ }
117
+ // Cache and store
118
+ this.certificateCache.set(domain, certificate);
119
+ await this.storeCertificate(certificate);
120
+ // Emit success event
121
+ this.emit(CertificateEvent.OBTAINED, {
122
+ domain,
123
+ type: 'new',
124
+ expiresAt: certificate.expiresAt,
125
+ source: certificate.source,
126
+ certificate: certificate.certificate,
127
+ privateKey: certificate.privateKey
128
+ });
129
+ return certificate;
130
+ }
131
+ catch (error) {
132
+ const certError = error instanceof CertificateError
133
+ ? error
134
+ : new CertificateError({
135
+ code: 'UNKNOWN_ERROR',
136
+ message: error.message || 'Unknown error',
137
+ domain,
138
+ cause: error
139
+ });
140
+ this.emit(CertificateEvent.FAILED, {
141
+ domain,
142
+ error: certError
143
+ });
144
+ throw certError;
145
+ }
146
+ }
147
+ /**
148
+ * Request certificate via ACME HTTP-01
149
+ */
150
+ async requestAcmeHttpCertificate(domain) {
151
+ if (domain.includes('*')) {
152
+ throw CertificateErrors.wildcardNotSupported(domain);
153
+ }
154
+ try {
155
+ // Create ACME order
156
+ const order = await this.acmeClient.createOrder({
157
+ identifiers: [{ type: 'dns', value: domain }]
158
+ });
159
+ // Get authorization
160
+ const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
161
+ const challenge = authorization.challenges.find(c => c.type === 'http-01');
162
+ if (!challenge) {
163
+ throw new Error('No HTTP-01 challenge available');
164
+ }
165
+ // Prepare challenge response
166
+ const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
167
+ // Set up HTTP responder (this would integrate with Port80Handler)
168
+ await this.setupHttpChallenge(challenge.token, keyAuthorization);
169
+ // Notify ACME server
170
+ await this.acmeClient.completeChallenge(challenge);
171
+ await this.acmeClient.waitForValidation(challenge);
172
+ // Generate CSR
173
+ const keypair = await this.generateKeypair();
174
+ const csr = await this.generateCsr(domain, keypair);
175
+ // Finalize order
176
+ await this.acmeClient.finalizeOrder(order, csr);
177
+ const cert = await this.acmeClient.getCertificate(order);
178
+ // Clean up challenge
179
+ await this.cleanupHttpChallenge(challenge.token);
180
+ return {
181
+ domain,
182
+ certificate: cert,
183
+ privateKey: keypair.privateKey,
184
+ expiresAt: this.extractExpiryDate(cert),
185
+ source: 'acme-http'
186
+ };
187
+ }
188
+ catch (error) {
189
+ throw CertificateErrors.acmeHttpChallengeFailed(domain, error);
190
+ }
191
+ }
192
+ /**
193
+ * Request certificate via ACME DNS-01
194
+ */
195
+ async requestAcmeDnsCertificate(domain) {
196
+ try {
197
+ // Create ACME order
198
+ const order = await this.acmeClient.createOrder({
199
+ identifiers: [{ type: 'dns', value: domain }]
200
+ });
201
+ // Get authorization
202
+ const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
203
+ const challenge = authorization.challenges.find(c => c.type === 'dns-01');
204
+ if (!challenge) {
205
+ throw new Error('No DNS-01 challenge available');
206
+ }
207
+ // Get DNS record value
208
+ const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
209
+ const dnsRecord = this.acmeClient.keyAuthorizationToDns01(keyAuthorization);
210
+ // Note: Actual DNS record creation would be handled externally
211
+ console.log(`Please create DNS TXT record: _acme-challenge.${domain} = ${dnsRecord}`);
212
+ // In a real implementation, we'd wait for DNS propagation
213
+ // For now, this is a placeholder
214
+ await new Promise(resolve => setTimeout(resolve, 60000)); // Wait 60 seconds
215
+ // Notify ACME server
216
+ await this.acmeClient.completeChallenge(challenge);
217
+ await this.acmeClient.waitForValidation(challenge);
218
+ // Generate CSR
219
+ const keypair = await this.generateKeypair();
220
+ const csr = await this.generateCsr(domain, keypair);
221
+ // Finalize order
222
+ await this.acmeClient.finalizeOrder(order, csr);
223
+ const cert = await this.acmeClient.getCertificate(order);
224
+ return {
225
+ domain,
226
+ certificate: cert,
227
+ privateKey: keypair.privateKey,
228
+ expiresAt: this.extractExpiryDate(cert),
229
+ source: 'acme-dns'
230
+ };
231
+ }
232
+ catch (error) {
233
+ throw CertificateErrors.acmeDnsChallengeFailed(domain, error);
234
+ }
235
+ }
236
+ /**
237
+ * Renew a certificate
238
+ */
239
+ async renewCertificate(domain) {
240
+ const existing = this.certificateCache.get(domain);
241
+ if (!existing) {
242
+ throw CertificateErrors.certificateNotFound(domain);
243
+ }
244
+ try {
245
+ // Request new certificate
246
+ const renewed = await this.requestCertificate(domain);
247
+ // Emit renewal event
248
+ this.emit(CertificateEvent.OBTAINED, {
249
+ domain,
250
+ type: 'renewed',
251
+ expiresAt: renewed.expiresAt,
252
+ source: renewed.source,
253
+ certificate: renewed.certificate,
254
+ privateKey: renewed.privateKey
255
+ });
256
+ return renewed;
257
+ }
258
+ catch (error) {
259
+ throw error;
260
+ }
261
+ }
262
+ /**
263
+ * Check certificates for renewal
264
+ */
265
+ async checkForRenewals() {
266
+ for (const [domain, cert] of this.certificateCache.entries()) {
267
+ if (this.shouldRenew(cert)) {
268
+ try {
269
+ await this.renewCertificate(domain);
270
+ }
271
+ catch (error) {
272
+ console.error(`Failed to renew certificate for ${domain}:`, error);
273
+ }
274
+ }
275
+ else if (this.isExpiringSoon(cert)) {
276
+ this.emit(CertificateEvent.EXPIRING, {
277
+ domain,
278
+ expiresAt: cert.expiresAt,
279
+ daysRemaining: this.getDaysRemaining(cert)
280
+ });
281
+ }
282
+ }
283
+ }
284
+ /**
285
+ * Initialize ACME client
286
+ */
287
+ async initializeAcmeClient() {
288
+ // ACME client initialization placeholder
289
+ // In a real implementation, this would use an ACME library
290
+ console.log(`Initializing ACME client for ${this.config.acmeServer} environment`);
291
+ }
292
+ /**
293
+ * Load stored certificates from disk
294
+ */
295
+ async loadStoredCertificates() {
296
+ try {
297
+ const files = await fs.readdir(this.config.storageDir);
298
+ const certFiles = files.filter(f => f.endsWith('.json'));
299
+ for (const file of certFiles) {
300
+ try {
301
+ const content = await fs.readFile(path.join(this.config.storageDir, file), 'utf-8');
302
+ const cert = JSON.parse(content);
303
+ cert.expiresAt = new Date(cert.expiresAt);
304
+ if (this.isCertificateValid(cert)) {
305
+ this.certificateCache.set(cert.domain, cert);
306
+ }
307
+ }
308
+ catch (error) {
309
+ console.error(`Failed to load certificate ${file}:`, error);
310
+ }
311
+ }
312
+ }
313
+ catch (error) {
314
+ console.error('Failed to load certificates:', error);
315
+ }
316
+ }
317
+ /**
318
+ * Store certificate to disk
319
+ */
320
+ async storeCertificate(cert) {
321
+ const filename = `${cert.domain}.json`;
322
+ const filepath = path.join(this.config.storageDir, filename);
323
+ try {
324
+ await fs.writeFile(filepath, JSON.stringify(cert, null, 2));
325
+ // Also save individual cert and key files
326
+ await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.crt`), cert.certificate);
327
+ await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.key`), cert.privateKey);
328
+ // Set proper permissions on key file
329
+ await fs.chmod(path.join(this.config.storageDir, `${cert.domain}.key`), 0o600);
330
+ }
331
+ catch (error) {
332
+ throw CertificateErrors.storageError('write', filepath, error);
333
+ }
334
+ }
335
+ /**
336
+ * Ensure storage directory exists
337
+ */
338
+ async ensureStorageDir() {
339
+ try {
340
+ await fs.mkdir(this.config.storageDir, { recursive: true });
341
+ }
342
+ catch (error) {
343
+ console.error('Failed to create storage directory:', error);
344
+ }
345
+ }
346
+ /**
347
+ * Get or create ACME account key
348
+ */
349
+ async getOrCreateAccountKey() {
350
+ const keyPath = path.join(this.config.storageDir, 'account.key');
351
+ try {
352
+ return await fs.readFile(keyPath, 'utf-8');
353
+ }
354
+ catch {
355
+ // Generate new key - placeholder
356
+ const dummyKey = '-----BEGIN PRIVATE KEY-----\nDUMMY_KEY_FOR_TESTING\n-----END PRIVATE KEY-----';
357
+ await fs.writeFile(keyPath, dummyKey);
358
+ await fs.chmod(keyPath, 0o600);
359
+ return dummyKey;
360
+ }
361
+ }
362
+ /**
363
+ * Generate keypair for certificate
364
+ */
365
+ async generateKeypair() {
366
+ // Keypair generation placeholder
367
+ return {
368
+ privateKey: '-----BEGIN PRIVATE KEY-----\nDUMMY_PRIVATE_KEY\n-----END PRIVATE KEY-----',
369
+ publicKey: '-----BEGIN PUBLIC KEY-----\nDUMMY_PUBLIC_KEY\n-----END PUBLIC KEY-----'
370
+ };
371
+ }
372
+ /**
373
+ * Generate CSR for domain
374
+ */
375
+ async generateCsr(domain, keypair) {
376
+ // CSR generation placeholder
377
+ return `-----BEGIN CERTIFICATE REQUEST-----\nDUMMY_CSR_FOR_${domain}\n-----END CERTIFICATE REQUEST-----`;
378
+ }
379
+ /**
380
+ * Extract expiry date from certificate
381
+ */
382
+ extractExpiryDate(certPem) {
383
+ // Certificate expiry extraction placeholder
384
+ // In a real implementation, this would parse the certificate
385
+ return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days from now
386
+ }
387
+ /**
388
+ * Check if certificate is valid
389
+ */
390
+ isCertificateValid(cert) {
391
+ return cert.expiresAt > new Date();
392
+ }
393
+ /**
394
+ * Check if certificate should be renewed
395
+ */
396
+ shouldRenew(cert) {
397
+ const daysRemaining = this.getDaysRemaining(cert);
398
+ return daysRemaining <= this.config.renewBeforeDays;
399
+ }
400
+ /**
401
+ * Check if certificate is expiring soon
402
+ */
403
+ isExpiringSoon(cert) {
404
+ const daysRemaining = this.getDaysRemaining(cert);
405
+ return daysRemaining <= this.config.renewBeforeDays + 7; // Warn 7 days before renewal
406
+ }
407
+ /**
408
+ * Get days remaining until expiry
409
+ */
410
+ getDaysRemaining(cert) {
411
+ const now = new Date();
412
+ const diff = cert.expiresAt.getTime() - now.getTime();
413
+ return Math.floor(diff / (1000 * 60 * 60 * 24));
414
+ }
415
+ /**
416
+ * Start renewal timer
417
+ */
418
+ startRenewalTimer() {
419
+ // Check every 6 hours
420
+ this.renewalTimer = setInterval(() => {
421
+ this.checkForRenewals().catch(error => {
422
+ console.error('Renewal check failed:', error);
423
+ });
424
+ }, 6 * 60 * 60 * 1000);
425
+ // Also check immediately
426
+ this.checkForRenewals().catch(error => {
427
+ console.error('Initial renewal check failed:', error);
428
+ });
429
+ }
430
+ /**
431
+ * Get default certificate for SNI fallback
432
+ */
433
+ async getDefaultCertificate() {
434
+ try {
435
+ const [cert, key] = await Promise.all([
436
+ fs.readFile(this.config.defaultCertPath, 'utf-8'),
437
+ fs.readFile(this.config.defaultKeyPath, 'utf-8')
438
+ ]);
439
+ return { cert, key };
440
+ }
441
+ catch (error) {
442
+ throw new CertificateError({
443
+ code: 'DEFAULT_CERT_ERROR',
444
+ message: 'Failed to load default certificate',
445
+ solution: 'Ensure default certificate files exist at configured paths',
446
+ cause: error
447
+ });
448
+ }
449
+ }
450
+ /**
451
+ * Set up HTTP challenge responder
452
+ */
453
+ async setupHttpChallenge(token, keyAuthorization) {
454
+ // This would integrate with Port80Handler
455
+ // For now, it's a placeholder
456
+ console.log(`HTTP Challenge: /.well-known/acme-challenge/${token} = ${keyAuthorization}`);
457
+ }
458
+ /**
459
+ * Clean up HTTP challenge
460
+ */
461
+ async cleanupHttpChallenge(token) {
462
+ // This would integrate with Port80Handler
463
+ // For now, it's a placeholder
464
+ console.log(`Cleanup HTTP Challenge: ${token}`);
465
+ }
466
+ /**
467
+ * Type assertion for event emitter
468
+ */
469
+ on(event, listener) {
470
+ return super.on(event, listener);
471
+ }
472
+ off(event, listener) {
473
+ return super.off(event, listener);
474
+ }
475
+ emit(event, data) {
476
+ return super.emit(event, data);
477
+ }
478
+ /**
479
+ * Update routes (placeholder for future implementation)
480
+ */
481
+ async updateRoutes(routes) {
482
+ // Process routes to extract certificate requirements
483
+ for (const route of routes) {
484
+ if (route.action.type === 'forward' &&
485
+ route.action.tls?.mode === 'terminate' &&
486
+ route.action.tls?.certificate === 'auto' &&
487
+ route.match.domains) {
488
+ const domains = Array.isArray(route.match.domains)
489
+ ? route.match.domains
490
+ : [route.match.domains];
491
+ for (const domain of domains) {
492
+ // Trigger certificate retrieval for auto domains
493
+ this.getCertificate(domain).catch(err => {
494
+ console.error(`Failed to get certificate for ${domain}:`, err);
495
+ });
496
+ }
497
+ }
498
+ }
499
+ }
500
+ }
501
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"simplified-certificate-manager.js","sourceRoot":"","sources":["../../ts/certificate/simplified-certificate-manager.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAElC,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACrF,OAAO,EAAE,gBAAgB,EAAE,MAAM,+BAA+B,CAAC;AA+BjE;;GAEG;AACH,MAAM,OAAO,4BAA6B,SAAQ,OAAO,CAAC,YAAY;IAOpE,YAAY,MAAgC;QAC1C,KAAK,EAAE,CAAC;QANF,qBAAgB,GAAG,IAAI,GAAG,EAA6B,CAAC;QAGxD,oBAAe,GAAG,IAAI,GAAG,EAAsC,CAAC;QAKtE,yBAAyB;QACzB,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,cAAc,EAAE,CAAC;QAC3C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;YACtB,MAAM,iBAAiB,CAAC,gBAAgB,EAAE,CAAC;QAC7C,CAAC;QAED,eAAe;QACf,IAAI,CAAC,MAAM,GAAG;YACZ,GAAG,MAAM;YACT,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,SAAS;YAC1C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,EAAE;YAC7C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,uBAAuB,CAAC;YAC5F,cAAc,EAAE,MAAM,CAAC,cAAc,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,sBAAsB,CAAC;SAC1F,CAAC;QAEF,kCAAkC;QAClC,IAAI,CAAC,gBAAgB,EAAE,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,yBAAyB;QACzB,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QAElC,2BAA2B;QAC3B,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAEpC,sBAAsB;QACtB,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,cAAc,CAAC,MAAc;QACxC,oBAAoB;QACpB,MAAM,MAAM,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,MAAM,IAAI,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC9C,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,gDAAgD;QAChD,MAAM,OAAO,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,OAAO,EAAE,CAAC;YACZ,OAAO,OAAO,CAAC;QACjB,CAAC;QAED,gCAAgC;QAChC,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAChD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAE1C,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC;YAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC7C,IAAI,CAAC;YACH,6BAA6B;YAC7B,IAAI,QAA6B,CAAC;YAClC,IAAI,CAAC;gBACH,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;YACpD,CAAC;YAAC,OAAO,aAAa,EAAE,CAAC;gBACvB,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,aAAa,CAAC,CAAC;YAC7D,CAAC;YAED,IAAI,WAA8B,CAAC;YAEnC,QAAQ,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACtB,KAAK,WAAW;oBACd,WAAW,GAAG,MAAM,IAAI,CAAC,0BAA0B,CAAC,MAAM,CAAC,CAAC;oBAC5D,MAAM;gBAER,KAAK,UAAU;oBACb,WAAW,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,CAAC,CAAC;oBAC3D,MAAM;gBAER,KAAK,QAAQ;oBACX,WAAW,GAAG;wBACZ,MAAM;wBACN,WAAW,EAAE,QAAQ,CAAC,IAAI;wBAC1B,UAAU,EAAE,QAAQ,CAAC,GAAG;wBACxB,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;wBAChF,MAAM,EAAE,QAAQ;qBACjB,CAAC;oBACF,MAAM;gBAER,KAAK,MAAM;oBACT,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEtD;oBACE,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC;YACpF,CAAC;YAED,kBAAkB;YAClB,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;YAC/C,MAAM,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;YAEzC,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,KAAK;gBACX,SAAS,EAAE,WAAW,CAAC,SAAS;gBAChC,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,WAAW,EAAE,WAAW,CAAC,WAAW;gBACpC,UAAU,EAAE,WAAW,CAAC,UAAU;aACnC,CAAC,CAAC;YAEH,OAAO,WAAW,CAAC;QAErB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,SAAS,GAAG,KAAK,YAAY,gBAAgB;gBACjD,CAAC,CAAC,KAAK;gBACP,CAAC,CAAC,IAAI,gBAAgB,CAAC;oBACnB,IAAI,EAAE,eAAe;oBACrB,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,eAAe;oBACzC,MAAM;oBACN,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YAEP,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE;gBACjC,MAAM;gBACN,KAAK,EAAE,SAAS;aACjB,CAAC,CAAC;YAEH,MAAM,SAAS,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,0BAA0B,CAAC,MAAc;QACrD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;QAED,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;YAE3E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACpD,CAAC;YAED,6BAA6B;YAC7B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YAEvF,kEAAkE;YAClE,MAAM,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,KAAK,EAAE,gBAAgB,CAAC,CAAC;YAEjE,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,qBAAqB;YACrB,MAAM,IAAI,CAAC,oBAAoB,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YAEjD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,WAAW;aACpB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,uBAAuB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB,CAAC,MAAc;QACpD,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC;YAE1E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,uBAAuB;YACvB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YACvF,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,uBAAuB,CAAC,gBAAgB,CAAC,CAAC;YAE5E,+DAA+D;YAC/D,OAAO,CAAC,GAAG,CAAC,iDAAiD,MAAM,MAAM,SAAS,EAAE,CAAC,CAAC;YAEtF,0DAA0D;YAC1D,iCAAiC;YACjC,MAAM,IAAI,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,kBAAkB;YAE5E,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,UAAU;aACnB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,sBAAsB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACnD,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QACtD,CAAC;QAED,IAAI,CAAC;YACH,0BAA0B;YAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAEtD,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,SAAS;gBACf,SAAS,EAAE,OAAO,CAAC,SAAS;gBAC5B,MAAM,EAAE,OAAO,CAAC,MAAM;gBACtB,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,UAAU,EAAE,OAAO,CAAC,UAAU;aAC/B,CAAC,CAAC;YAEH,OAAO,OAAO,CAAC;QAEjB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,gBAAgB,CAAC,OAAO,EAAE,EAAE,CAAC;YAC7D,IAAI,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;gBACtC,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,mCAAmC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;gBACrE,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;oBACnC,MAAM;oBACN,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,aAAa,EAAE,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC;iBAC3C,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB;QAChC,yCAAyC;QACzC,2DAA2D;QAC3D,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,MAAM,CAAC,UAAU,cAAc,CAAC,CAAC;IACpF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB;QAClC,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACvD,MAAM,SAAS,GAAG,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAEzD,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,IAAI,CAAC;oBACH,MAAM,OAAO,GAAG,MAAM,EAAE,CAAC,QAAQ,CAC/B,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,IAAI,CAAC,EACvC,OAAO,CACR,CAAC;oBACF,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAsB,CAAC;oBACtD,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBAE1C,IAAI,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;wBAClC,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;oBAC/C,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,IAAI,GAAG,EAAE,KAAK,CAAC,CAAC;gBAC9D,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,EAAE,KAAK,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,IAAuB;QACpD,MAAM,QAAQ,GAAG,GAAG,IAAI,CAAC,MAAM,OAAO,CAAC;QACvC,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;QAE7D,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;YAE5D,0CAA0C;YAC1C,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,WAAW,CACjB,CAAC;YACF,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,UAAU,CAChB,CAAC;YAEF,qCAAqC;YACrC,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QAEjF,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAC9D,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,qCAAqC,EAAE,KAAK,CAAC,CAAC;QAC9D,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB;QACjC,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;QAEjE,IAAI,CAAC;YACH,OAAO,MAAM,EAAE,CAAC,QAAQ,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC;QAC7C,CAAC;QAAC,MAAM,CAAC;YACP,iCAAiC;YACjC,MAAM,QAAQ,GAAG,+EAA+E,CAAC;YAEjG,MAAM,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;YACtC,MAAM,EAAE,CAAC,KAAK,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAE/B,OAAO,QAAQ,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,iCAAiC;QACjC,OAAO;YACL,UAAU,EAAE,2EAA2E;YACvF,SAAS,EAAE,wEAAwE;SACpF,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,OAA+B;QACvE,6BAA6B;QAC7B,OAAO,sDAAsD,MAAM,qCAAqC,CAAC;IAC3G,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,OAAe;QACvC,4CAA4C;QAC5C,6DAA6D;QAC7D,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;IAC7E,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,IAAuB;QAChD,OAAO,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAAuB;QACzC,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC;IACtD,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,IAAuB;QAC5C,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC,CAAC,6BAA6B;IACxF,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,IAAuB;QAC9C,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;QACtD,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,GAAG,CAAC,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,sBAAsB;QACtB,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE;YACnC,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;gBACpC,OAAO,CAAC,KAAK,CAAC,uBAAuB,EAAE,KAAK,CAAC,CAAC;YAChD,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAEvB,yBAAyB;QACzB,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;YACpC,OAAO,CAAC,KAAK,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,qBAAqB;QAChC,IAAI,CAAC;YACH,MAAM,CAAC,IAAI,EAAE,GAAG,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;gBACpC,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,EAAE,OAAO,CAAC;gBACjD,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,cAAc,EAAE,OAAO,CAAC;aACjD,CAAC,CAAC;YAEH,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,gBAAgB,CAAC;gBACzB,IAAI,EAAE,oBAAoB;gBAC1B,OAAO,EAAE,oCAAoC;gBAC7C,QAAQ,EAAE,4DAA4D;gBACtE,KAAK,EAAE,KAAK;aACb,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,KAAa,EAAE,gBAAwB;QACtE,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,+CAA+C,KAAK,MAAM,gBAAgB,EAAE,CAAC,CAAC;IAC5F,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,KAAa;QAC9C,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,2BAA2B,KAAK,EAAE,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACI,EAAE,CACP,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,EAAE,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACnC,CAAC;IAEM,GAAG,CACR,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACpC,CAAC;IAEM,IAAI,CACT,KAAQ,EACR,IAA4B;QAE5B,OAAO,KAAK,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,MAAsB;QAC9C,qDAAqD;QACrD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;gBACtC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM;gBACxC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;gBAExB,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;oBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBAE1B,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;oBAC7B,iDAAiD;oBACjD,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;wBACtC,OAAO,CAAC,KAAK,CAAC,iCAAiC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;oBACjE,CAAC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
@@ -2,14 +2,6 @@
2
2
  * HTTP functionality module
3
3
  */
4
4
  export * from './models/http-types.js';
5
- export * from './port80/index.js';
6
5
  export * from './router/index.js';
7
6
  export * from './redirects/index.js';
8
- import { Port80Handler } from './port80/port80-handler.js';
9
- import { ChallengeResponder } from './port80/challenge-responder.js';
10
- export declare const Http: {
11
- Port80: {
12
- Handler: typeof Port80Handler;
13
- ChallengeResponder: typeof ChallengeResponder;
14
- };
15
- };
7
+ export declare const Http: {};
@@ -3,18 +3,12 @@
3
3
  */
4
4
  // Export types and models
5
5
  export * from './models/http-types.js';
6
- // Export submodules
7
- export * from './port80/index.js';
6
+ // Export submodules (remove port80 export)
8
7
  export * from './router/index.js';
9
8
  export * from './redirects/index.js';
10
- // Import the components we need for the namespace
11
- import { Port80Handler } from './port80/port80-handler.js';
12
- import { ChallengeResponder } from './port80/challenge-responder.js';
13
- // Convenience namespace exports
9
+ // REMOVED: export * from './port80/index.js';
10
+ // Convenience namespace exports (no more Port80)
14
11
  export const Http = {
15
- Port80: {
16
- Handler: Port80Handler,
17
- ChallengeResponder: ChallengeResponder
18
- }
12
+ // Only router and redirect functionality remain
19
13
  };
20
- //# sourceMappingURL=data:application/json;base64,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
14
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi90cy9odHRwL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHO0FBRUgsMEJBQTBCO0FBQzFCLGNBQWMsd0JBQXdCLENBQUM7QUFFdkMsMkNBQTJDO0FBQzNDLGNBQWMsbUJBQW1CLENBQUM7QUFDbEMsY0FBYyxzQkFBc0IsQ0FBQztBQUNyQyw4Q0FBOEM7QUFFOUMsaURBQWlEO0FBQ2pELE1BQU0sQ0FBQyxNQUFNLElBQUksR0FBRztBQUNsQixnREFBZ0Q7Q0FDakQsQ0FBQyJ9
@@ -14,11 +14,13 @@ import * as smartdelay from '@push.rocks/smartdelay';
14
14
  import * as smartpromise from '@push.rocks/smartpromise';
15
15
  import * as smartrequest from '@push.rocks/smartrequest';
16
16
  import * as smartstring from '@push.rocks/smartstring';
17
+ import * as smartfile from '@push.rocks/smartfile';
18
+ import * as smartcrypto from '@push.rocks/smartcrypto';
17
19
  import * as smartacme from '@push.rocks/smartacme';
18
20
  import * as smartacmePlugins from '@push.rocks/smartacme/dist_ts/smartacme.plugins.js';
19
21
  import * as smartacmeHandlers from '@push.rocks/smartacme/dist_ts/handlers/index.js';
20
22
  import * as taskbuffer from '@push.rocks/taskbuffer';
21
- export { lik, smartdelay, smartrequest, smartpromise, smartstring, smartacme, smartacmePlugins, smartacmeHandlers, taskbuffer, };
23
+ export { lik, smartdelay, smartrequest, smartpromise, smartstring, smartfile, smartcrypto, smartacme, smartacmePlugins, smartacmeHandlers, taskbuffer, };
22
24
  import prettyMs from 'pretty-ms';
23
25
  import * as ws from 'ws';
24
26
  import wsDefault from 'ws';
@@ -17,15 +17,17 @@ import * as smartdelay from '@push.rocks/smartdelay';
17
17
  import * as smartpromise from '@push.rocks/smartpromise';
18
18
  import * as smartrequest from '@push.rocks/smartrequest';
19
19
  import * as smartstring from '@push.rocks/smartstring';
20
+ import * as smartfile from '@push.rocks/smartfile';
21
+ import * as smartcrypto from '@push.rocks/smartcrypto';
20
22
  import * as smartacme from '@push.rocks/smartacme';
21
23
  import * as smartacmePlugins from '@push.rocks/smartacme/dist_ts/smartacme.plugins.js';
22
24
  import * as smartacmeHandlers from '@push.rocks/smartacme/dist_ts/handlers/index.js';
23
25
  import * as taskbuffer from '@push.rocks/taskbuffer';
24
- export { lik, smartdelay, smartrequest, smartpromise, smartstring, smartacme, smartacmePlugins, smartacmeHandlers, taskbuffer, };
26
+ export { lik, smartdelay, smartrequest, smartpromise, smartstring, smartfile, smartcrypto, smartacme, smartacmePlugins, smartacmeHandlers, taskbuffer, };
25
27
  // third party scope
26
28
  import prettyMs from 'pretty-ms';
27
29
  import * as ws from 'ws';
28
30
  import wsDefault from 'ws';
29
31
  import { minimatch } from 'minimatch';
30
32
  export { prettyMs, ws, wsDefault, minimatch };
31
- //# sourceMappingURL=data:application/json;base64,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
33
+ //# sourceMappingURL=data:application/json;base64,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