@push.rocks/smartproxy 19.3.2 → 19.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +12 -12
- package/readme.plan.md +152 -257
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,765 +0,0 @@
|
|
|
1
|
-
import { exec, execSync } from 'child_process';
|
|
2
|
-
import { promisify } from 'util';
|
|
3
|
-
const execAsync = promisify(exec);
|
|
4
|
-
/**
|
|
5
|
-
* IPTablesProxy sets up iptables NAT rules to forward TCP traffic.
|
|
6
|
-
* Enhanced with multi-port support, IPv6, and integration with PortProxy/NetworkProxy.
|
|
7
|
-
*/
|
|
8
|
-
export class IPTablesProxy {
|
|
9
|
-
constructor(settings) {
|
|
10
|
-
this.rules = [];
|
|
11
|
-
this.customChain = null;
|
|
12
|
-
// Validate inputs to prevent command injection
|
|
13
|
-
this.validateSettings(settings);
|
|
14
|
-
// Set default settings
|
|
15
|
-
this.settings = {
|
|
16
|
-
...settings,
|
|
17
|
-
toHost: settings.toHost || 'localhost',
|
|
18
|
-
protocol: settings.protocol || 'tcp',
|
|
19
|
-
enableLogging: settings.enableLogging !== undefined ? settings.enableLogging : false,
|
|
20
|
-
ipv6Support: settings.ipv6Support !== undefined ? settings.ipv6Support : false,
|
|
21
|
-
checkExistingRules: settings.checkExistingRules !== undefined ? settings.checkExistingRules : true,
|
|
22
|
-
netProxyIntegration: settings.netProxyIntegration || { enabled: false }
|
|
23
|
-
};
|
|
24
|
-
// Generate a unique identifier for the rules added by this instance
|
|
25
|
-
this.ruleTag = `IPTablesProxy:${Date.now()}:${Math.random().toString(36).substr(2, 5)}`;
|
|
26
|
-
if (this.settings.addJumpRule) {
|
|
27
|
-
this.customChain = `IPTablesProxy_${Math.random().toString(36).substr(2, 5)}`;
|
|
28
|
-
}
|
|
29
|
-
// Register cleanup handlers if deleteOnExit is true
|
|
30
|
-
if (this.settings.deleteOnExit) {
|
|
31
|
-
const cleanup = () => {
|
|
32
|
-
try {
|
|
33
|
-
this.stopSync();
|
|
34
|
-
}
|
|
35
|
-
catch (err) {
|
|
36
|
-
console.error('Error cleaning iptables rules on exit:', err);
|
|
37
|
-
}
|
|
38
|
-
};
|
|
39
|
-
process.on('exit', cleanup);
|
|
40
|
-
process.on('SIGINT', () => {
|
|
41
|
-
cleanup();
|
|
42
|
-
process.exit();
|
|
43
|
-
});
|
|
44
|
-
process.on('SIGTERM', () => {
|
|
45
|
-
cleanup();
|
|
46
|
-
process.exit();
|
|
47
|
-
});
|
|
48
|
-
}
|
|
49
|
-
}
|
|
50
|
-
/**
|
|
51
|
-
* Validates settings to prevent command injection and ensure valid values
|
|
52
|
-
*/
|
|
53
|
-
validateSettings(settings) {
|
|
54
|
-
// Validate port numbers
|
|
55
|
-
const validatePorts = (port) => {
|
|
56
|
-
if (Array.isArray(port)) {
|
|
57
|
-
port.forEach(p => validatePorts(p));
|
|
58
|
-
return;
|
|
59
|
-
}
|
|
60
|
-
if (typeof port === 'number') {
|
|
61
|
-
if (port < 1 || port > 65535) {
|
|
62
|
-
throw new Error(`Invalid port number: ${port}`);
|
|
63
|
-
}
|
|
64
|
-
}
|
|
65
|
-
else if (typeof port === 'object') {
|
|
66
|
-
if (port.from < 1 || port.from > 65535 || port.to < 1 || port.to > 65535 || port.from > port.to) {
|
|
67
|
-
throw new Error(`Invalid port range: ${port.from}-${port.to}`);
|
|
68
|
-
}
|
|
69
|
-
}
|
|
70
|
-
};
|
|
71
|
-
validatePorts(settings.fromPort);
|
|
72
|
-
validatePorts(settings.toPort);
|
|
73
|
-
// Define regex patterns at the method level so they're available throughout
|
|
74
|
-
const ipRegex = /^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\/([0-9]|[1-2][0-9]|3[0-2]))?$/;
|
|
75
|
-
const ipv6Regex = /^(([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))(\/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$/;
|
|
76
|
-
// Validate IP addresses
|
|
77
|
-
const validateIPs = (ips) => {
|
|
78
|
-
if (!ips)
|
|
79
|
-
return;
|
|
80
|
-
for (const ip of ips) {
|
|
81
|
-
if (!ipRegex.test(ip) && !ipv6Regex.test(ip)) {
|
|
82
|
-
throw new Error(`Invalid IP address format: ${ip}`);
|
|
83
|
-
}
|
|
84
|
-
}
|
|
85
|
-
};
|
|
86
|
-
validateIPs(settings.allowedSourceIPs);
|
|
87
|
-
validateIPs(settings.bannedSourceIPs);
|
|
88
|
-
// Validate toHost - only allow hostnames or IPs
|
|
89
|
-
if (settings.toHost) {
|
|
90
|
-
const hostRegex = /^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\-]*[A-Za-z0-9])$/;
|
|
91
|
-
if (!hostRegex.test(settings.toHost) && !ipRegex.test(settings.toHost) && !ipv6Regex.test(settings.toHost)) {
|
|
92
|
-
throw new Error(`Invalid host format: ${settings.toHost}`);
|
|
93
|
-
}
|
|
94
|
-
}
|
|
95
|
-
}
|
|
96
|
-
/**
|
|
97
|
-
* Normalizes port specifications into an array of port ranges
|
|
98
|
-
*/
|
|
99
|
-
normalizePortSpec(portSpec) {
|
|
100
|
-
const result = [];
|
|
101
|
-
if (Array.isArray(portSpec)) {
|
|
102
|
-
// If it's an array, process each element
|
|
103
|
-
for (const spec of portSpec) {
|
|
104
|
-
result.push(...this.normalizePortSpec(spec));
|
|
105
|
-
}
|
|
106
|
-
}
|
|
107
|
-
else if (typeof portSpec === 'number') {
|
|
108
|
-
// Single port becomes a range with the same start and end
|
|
109
|
-
result.push({ from: portSpec, to: portSpec });
|
|
110
|
-
}
|
|
111
|
-
else {
|
|
112
|
-
// Already a range
|
|
113
|
-
result.push(portSpec);
|
|
114
|
-
}
|
|
115
|
-
return result;
|
|
116
|
-
}
|
|
117
|
-
/**
|
|
118
|
-
* Gets the appropriate iptables command based on settings
|
|
119
|
-
*/
|
|
120
|
-
getIptablesCommand(isIpv6 = false) {
|
|
121
|
-
return isIpv6 ? 'ip6tables' : 'iptables';
|
|
122
|
-
}
|
|
123
|
-
/**
|
|
124
|
-
* Checks if a rule already exists in iptables
|
|
125
|
-
*/
|
|
126
|
-
async ruleExists(table, command, isIpv6 = false) {
|
|
127
|
-
try {
|
|
128
|
-
const iptablesCmd = this.getIptablesCommand(isIpv6);
|
|
129
|
-
const { stdout } = await execAsync(`${iptablesCmd}-save -t ${table}`);
|
|
130
|
-
// Convert the command to the format found in iptables-save output
|
|
131
|
-
// (This is a simplification - in reality, you'd need more parsing)
|
|
132
|
-
const rulePattern = command.replace(`${iptablesCmd} -t ${table} -A `, '-A ');
|
|
133
|
-
return stdout.split('\n').some(line => line.trim() === rulePattern);
|
|
134
|
-
}
|
|
135
|
-
catch (err) {
|
|
136
|
-
this.log('error', `Failed to check if rule exists: ${err}`);
|
|
137
|
-
return false;
|
|
138
|
-
}
|
|
139
|
-
}
|
|
140
|
-
/**
|
|
141
|
-
* Sets up a custom chain for better rule management
|
|
142
|
-
*/
|
|
143
|
-
async setupCustomChain(isIpv6 = false) {
|
|
144
|
-
if (!this.customChain)
|
|
145
|
-
return true;
|
|
146
|
-
const iptablesCmd = this.getIptablesCommand(isIpv6);
|
|
147
|
-
const table = 'nat';
|
|
148
|
-
try {
|
|
149
|
-
// Create the chain
|
|
150
|
-
await execAsync(`${iptablesCmd} -t ${table} -N ${this.customChain}`);
|
|
151
|
-
this.log('info', `Created custom chain: ${this.customChain}`);
|
|
152
|
-
// Add jump rule to PREROUTING chain
|
|
153
|
-
const jumpCommand = `${iptablesCmd} -t ${table} -A PREROUTING -j ${this.customChain} -m comment --comment "${this.ruleTag}:JUMP"`;
|
|
154
|
-
await execAsync(jumpCommand);
|
|
155
|
-
this.log('info', `Added jump rule to ${this.customChain}`);
|
|
156
|
-
// Store the jump rule
|
|
157
|
-
this.rules.push({
|
|
158
|
-
table,
|
|
159
|
-
chain: 'PREROUTING',
|
|
160
|
-
command: jumpCommand,
|
|
161
|
-
tag: `${this.ruleTag}:JUMP`,
|
|
162
|
-
added: true
|
|
163
|
-
});
|
|
164
|
-
return true;
|
|
165
|
-
}
|
|
166
|
-
catch (err) {
|
|
167
|
-
this.log('error', `Failed to set up custom chain: ${err}`);
|
|
168
|
-
return false;
|
|
169
|
-
}
|
|
170
|
-
}
|
|
171
|
-
/**
|
|
172
|
-
* Add a source IP filter rule
|
|
173
|
-
*/
|
|
174
|
-
async addSourceIPFilter(isIpv6 = false) {
|
|
175
|
-
if (!this.settings.allowedSourceIPs && !this.settings.bannedSourceIPs) {
|
|
176
|
-
return true;
|
|
177
|
-
}
|
|
178
|
-
const iptablesCmd = this.getIptablesCommand(isIpv6);
|
|
179
|
-
const table = 'nat';
|
|
180
|
-
const chain = this.customChain || 'PREROUTING';
|
|
181
|
-
try {
|
|
182
|
-
// Add banned IPs first (explicit deny)
|
|
183
|
-
if (this.settings.bannedSourceIPs && this.settings.bannedSourceIPs.length > 0) {
|
|
184
|
-
for (const ip of this.settings.bannedSourceIPs) {
|
|
185
|
-
const command = `${iptablesCmd} -t ${table} -A ${chain} -s ${ip} -j DROP -m comment --comment "${this.ruleTag}:BANNED"`;
|
|
186
|
-
// Check if rule already exists
|
|
187
|
-
if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
|
|
188
|
-
this.log('info', `Rule already exists, skipping: ${command}`);
|
|
189
|
-
continue;
|
|
190
|
-
}
|
|
191
|
-
await execAsync(command);
|
|
192
|
-
this.log('info', `Added banned IP rule: ${command}`);
|
|
193
|
-
this.rules.push({
|
|
194
|
-
table,
|
|
195
|
-
chain,
|
|
196
|
-
command,
|
|
197
|
-
tag: `${this.ruleTag}:BANNED`,
|
|
198
|
-
added: true
|
|
199
|
-
});
|
|
200
|
-
}
|
|
201
|
-
}
|
|
202
|
-
// Add allowed IPs (explicit allow)
|
|
203
|
-
if (this.settings.allowedSourceIPs && this.settings.allowedSourceIPs.length > 0) {
|
|
204
|
-
// First add a default deny for all
|
|
205
|
-
const denyAllCommand = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} -j DROP -m comment --comment "${this.ruleTag}:DENY_ALL"`;
|
|
206
|
-
// Add allow rules for specific IPs
|
|
207
|
-
for (const ip of this.settings.allowedSourceIPs) {
|
|
208
|
-
const command = `${iptablesCmd} -t ${table} -A ${chain} -s ${ip} -p ${this.settings.protocol} -j ACCEPT -m comment --comment "${this.ruleTag}:ALLOWED"`;
|
|
209
|
-
// Check if rule already exists
|
|
210
|
-
if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
|
|
211
|
-
this.log('info', `Rule already exists, skipping: ${command}`);
|
|
212
|
-
continue;
|
|
213
|
-
}
|
|
214
|
-
await execAsync(command);
|
|
215
|
-
this.log('info', `Added allowed IP rule: ${command}`);
|
|
216
|
-
this.rules.push({
|
|
217
|
-
table,
|
|
218
|
-
chain,
|
|
219
|
-
command,
|
|
220
|
-
tag: `${this.ruleTag}:ALLOWED`,
|
|
221
|
-
added: true
|
|
222
|
-
});
|
|
223
|
-
}
|
|
224
|
-
// Now add the default deny after all allows
|
|
225
|
-
if (this.settings.checkExistingRules && await this.ruleExists(table, denyAllCommand, isIpv6)) {
|
|
226
|
-
this.log('info', `Rule already exists, skipping: ${denyAllCommand}`);
|
|
227
|
-
}
|
|
228
|
-
else {
|
|
229
|
-
await execAsync(denyAllCommand);
|
|
230
|
-
this.log('info', `Added default deny rule: ${denyAllCommand}`);
|
|
231
|
-
this.rules.push({
|
|
232
|
-
table,
|
|
233
|
-
chain,
|
|
234
|
-
command: denyAllCommand,
|
|
235
|
-
tag: `${this.ruleTag}:DENY_ALL`,
|
|
236
|
-
added: true
|
|
237
|
-
});
|
|
238
|
-
}
|
|
239
|
-
}
|
|
240
|
-
return true;
|
|
241
|
-
}
|
|
242
|
-
catch (err) {
|
|
243
|
-
this.log('error', `Failed to add source IP filter rules: ${err}`);
|
|
244
|
-
return false;
|
|
245
|
-
}
|
|
246
|
-
}
|
|
247
|
-
/**
|
|
248
|
-
* Adds a port forwarding rule
|
|
249
|
-
*/
|
|
250
|
-
async addPortForwardingRule(fromPortRange, toPortRange, isIpv6 = false) {
|
|
251
|
-
const iptablesCmd = this.getIptablesCommand(isIpv6);
|
|
252
|
-
const table = 'nat';
|
|
253
|
-
const chain = this.customChain || 'PREROUTING';
|
|
254
|
-
try {
|
|
255
|
-
// Handle single port case
|
|
256
|
-
if (fromPortRange.from === fromPortRange.to && toPortRange.from === toPortRange.to) {
|
|
257
|
-
// Single port forward
|
|
258
|
-
const command = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} --dport ${fromPortRange.from} ` +
|
|
259
|
-
`-j DNAT --to-destination ${this.settings.toHost}:${toPortRange.from} ` +
|
|
260
|
-
`-m comment --comment "${this.ruleTag}:DNAT"`;
|
|
261
|
-
// Check if rule already exists
|
|
262
|
-
if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
|
|
263
|
-
this.log('info', `Rule already exists, skipping: ${command}`);
|
|
264
|
-
}
|
|
265
|
-
else {
|
|
266
|
-
await execAsync(command);
|
|
267
|
-
this.log('info', `Added port forwarding rule: ${command}`);
|
|
268
|
-
this.rules.push({
|
|
269
|
-
table,
|
|
270
|
-
chain,
|
|
271
|
-
command,
|
|
272
|
-
tag: `${this.ruleTag}:DNAT`,
|
|
273
|
-
added: true
|
|
274
|
-
});
|
|
275
|
-
}
|
|
276
|
-
}
|
|
277
|
-
else if (fromPortRange.to - fromPortRange.from === toPortRange.to - toPortRange.from) {
|
|
278
|
-
// Port range forward with equal ranges
|
|
279
|
-
const command = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} --dport ${fromPortRange.from}:${fromPortRange.to} ` +
|
|
280
|
-
`-j DNAT --to-destination ${this.settings.toHost}:${toPortRange.from}-${toPortRange.to} ` +
|
|
281
|
-
`-m comment --comment "${this.ruleTag}:DNAT_RANGE"`;
|
|
282
|
-
// Check if rule already exists
|
|
283
|
-
if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
|
|
284
|
-
this.log('info', `Rule already exists, skipping: ${command}`);
|
|
285
|
-
}
|
|
286
|
-
else {
|
|
287
|
-
await execAsync(command);
|
|
288
|
-
this.log('info', `Added port range forwarding rule: ${command}`);
|
|
289
|
-
this.rules.push({
|
|
290
|
-
table,
|
|
291
|
-
chain,
|
|
292
|
-
command,
|
|
293
|
-
tag: `${this.ruleTag}:DNAT_RANGE`,
|
|
294
|
-
added: true
|
|
295
|
-
});
|
|
296
|
-
}
|
|
297
|
-
}
|
|
298
|
-
else {
|
|
299
|
-
// Unequal port ranges need individual rules
|
|
300
|
-
for (let i = 0; i <= fromPortRange.to - fromPortRange.from; i++) {
|
|
301
|
-
const fromPort = fromPortRange.from + i;
|
|
302
|
-
const toPort = toPortRange.from + i % (toPortRange.to - toPortRange.from + 1);
|
|
303
|
-
const command = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} --dport ${fromPort} ` +
|
|
304
|
-
`-j DNAT --to-destination ${this.settings.toHost}:${toPort} ` +
|
|
305
|
-
`-m comment --comment "${this.ruleTag}:DNAT_INDIVIDUAL"`;
|
|
306
|
-
// Check if rule already exists
|
|
307
|
-
if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
|
|
308
|
-
this.log('info', `Rule already exists, skipping: ${command}`);
|
|
309
|
-
continue;
|
|
310
|
-
}
|
|
311
|
-
await execAsync(command);
|
|
312
|
-
this.log('info', `Added individual port forwarding rule: ${command}`);
|
|
313
|
-
this.rules.push({
|
|
314
|
-
table,
|
|
315
|
-
chain,
|
|
316
|
-
command,
|
|
317
|
-
tag: `${this.ruleTag}:DNAT_INDIVIDUAL`,
|
|
318
|
-
added: true
|
|
319
|
-
});
|
|
320
|
-
}
|
|
321
|
-
}
|
|
322
|
-
// If preserveSourceIP is false, add a MASQUERADE rule
|
|
323
|
-
if (!this.settings.preserveSourceIP) {
|
|
324
|
-
// For port range
|
|
325
|
-
const masqCommand = `${iptablesCmd} -t nat -A POSTROUTING -p ${this.settings.protocol} -d ${this.settings.toHost} ` +
|
|
326
|
-
`--dport ${toPortRange.from}:${toPortRange.to} -j MASQUERADE ` +
|
|
327
|
-
`-m comment --comment "${this.ruleTag}:MASQ"`;
|
|
328
|
-
// Check if rule already exists
|
|
329
|
-
if (this.settings.checkExistingRules && await this.ruleExists('nat', masqCommand, isIpv6)) {
|
|
330
|
-
this.log('info', `Rule already exists, skipping: ${masqCommand}`);
|
|
331
|
-
}
|
|
332
|
-
else {
|
|
333
|
-
await execAsync(masqCommand);
|
|
334
|
-
this.log('info', `Added MASQUERADE rule: ${masqCommand}`);
|
|
335
|
-
this.rules.push({
|
|
336
|
-
table: 'nat',
|
|
337
|
-
chain: 'POSTROUTING',
|
|
338
|
-
command: masqCommand,
|
|
339
|
-
tag: `${this.ruleTag}:MASQ`,
|
|
340
|
-
added: true
|
|
341
|
-
});
|
|
342
|
-
}
|
|
343
|
-
}
|
|
344
|
-
return true;
|
|
345
|
-
}
|
|
346
|
-
catch (err) {
|
|
347
|
-
this.log('error', `Failed to add port forwarding rule: ${err}`);
|
|
348
|
-
// Try to roll back any rules that were already added
|
|
349
|
-
await this.rollbackRules();
|
|
350
|
-
return false;
|
|
351
|
-
}
|
|
352
|
-
}
|
|
353
|
-
/**
|
|
354
|
-
* Special handling for NetworkProxy integration
|
|
355
|
-
*/
|
|
356
|
-
async setupNetworkProxyIntegration(isIpv6 = false) {
|
|
357
|
-
if (!this.settings.netProxyIntegration?.enabled) {
|
|
358
|
-
return true;
|
|
359
|
-
}
|
|
360
|
-
const netProxyConfig = this.settings.netProxyIntegration;
|
|
361
|
-
const iptablesCmd = this.getIptablesCommand(isIpv6);
|
|
362
|
-
const table = 'nat';
|
|
363
|
-
const chain = this.customChain || 'PREROUTING';
|
|
364
|
-
try {
|
|
365
|
-
// If redirectLocalhost is true, set up special rule to redirect localhost traffic to NetworkProxy
|
|
366
|
-
if (netProxyConfig.redirectLocalhost && netProxyConfig.sslTerminationPort) {
|
|
367
|
-
const redirectCommand = `${iptablesCmd} -t ${table} -A OUTPUT -p tcp -d 127.0.0.1 -j REDIRECT ` +
|
|
368
|
-
`--to-port ${netProxyConfig.sslTerminationPort} ` +
|
|
369
|
-
`-m comment --comment "${this.ruleTag}:NETPROXY_REDIRECT"`;
|
|
370
|
-
// Check if rule already exists
|
|
371
|
-
if (this.settings.checkExistingRules && await this.ruleExists(table, redirectCommand, isIpv6)) {
|
|
372
|
-
this.log('info', `Rule already exists, skipping: ${redirectCommand}`);
|
|
373
|
-
}
|
|
374
|
-
else {
|
|
375
|
-
await execAsync(redirectCommand);
|
|
376
|
-
this.log('info', `Added NetworkProxy redirection rule: ${redirectCommand}`);
|
|
377
|
-
this.rules.push({
|
|
378
|
-
table,
|
|
379
|
-
chain: 'OUTPUT',
|
|
380
|
-
command: redirectCommand,
|
|
381
|
-
tag: `${this.ruleTag}:NETPROXY_REDIRECT`,
|
|
382
|
-
added: true
|
|
383
|
-
});
|
|
384
|
-
}
|
|
385
|
-
}
|
|
386
|
-
return true;
|
|
387
|
-
}
|
|
388
|
-
catch (err) {
|
|
389
|
-
this.log('error', `Failed to set up NetworkProxy integration: ${err}`);
|
|
390
|
-
return false;
|
|
391
|
-
}
|
|
392
|
-
}
|
|
393
|
-
/**
|
|
394
|
-
* Rolls back rules that were added in case of error
|
|
395
|
-
*/
|
|
396
|
-
async rollbackRules() {
|
|
397
|
-
// Process rules in reverse order (LIFO)
|
|
398
|
-
for (let i = this.rules.length - 1; i >= 0; i--) {
|
|
399
|
-
const rule = this.rules[i];
|
|
400
|
-
if (rule.added) {
|
|
401
|
-
try {
|
|
402
|
-
// Convert -A (add) to -D (delete)
|
|
403
|
-
const deleteCommand = rule.command.replace('-A', '-D');
|
|
404
|
-
await execAsync(deleteCommand);
|
|
405
|
-
this.log('info', `Rolled back rule: ${deleteCommand}`);
|
|
406
|
-
rule.added = false;
|
|
407
|
-
}
|
|
408
|
-
catch (err) {
|
|
409
|
-
this.log('error', `Failed to roll back rule: ${err}`);
|
|
410
|
-
}
|
|
411
|
-
}
|
|
412
|
-
}
|
|
413
|
-
}
|
|
414
|
-
/**
|
|
415
|
-
* Sets up iptables rules for port forwarding with enhanced features
|
|
416
|
-
*/
|
|
417
|
-
async start() {
|
|
418
|
-
// Optionally clean the slate first
|
|
419
|
-
if (this.settings.forceCleanSlate) {
|
|
420
|
-
await IPTablesProxy.cleanSlate();
|
|
421
|
-
}
|
|
422
|
-
// First set up any custom chains
|
|
423
|
-
if (this.settings.addJumpRule) {
|
|
424
|
-
const chainSetupSuccess = await this.setupCustomChain();
|
|
425
|
-
if (!chainSetupSuccess) {
|
|
426
|
-
throw new Error('Failed to set up custom chain');
|
|
427
|
-
}
|
|
428
|
-
// For IPv6 if enabled
|
|
429
|
-
if (this.settings.ipv6Support) {
|
|
430
|
-
const chainSetupSuccessIpv6 = await this.setupCustomChain(true);
|
|
431
|
-
if (!chainSetupSuccessIpv6) {
|
|
432
|
-
this.log('warn', 'Failed to set up IPv6 custom chain, continuing with IPv4 only');
|
|
433
|
-
}
|
|
434
|
-
}
|
|
435
|
-
}
|
|
436
|
-
// Add source IP filters
|
|
437
|
-
await this.addSourceIPFilter();
|
|
438
|
-
if (this.settings.ipv6Support) {
|
|
439
|
-
await this.addSourceIPFilter(true);
|
|
440
|
-
}
|
|
441
|
-
// Set up NetworkProxy integration if enabled
|
|
442
|
-
if (this.settings.netProxyIntegration?.enabled) {
|
|
443
|
-
const netProxySetupSuccess = await this.setupNetworkProxyIntegration();
|
|
444
|
-
if (!netProxySetupSuccess) {
|
|
445
|
-
this.log('warn', 'Failed to set up NetworkProxy integration');
|
|
446
|
-
}
|
|
447
|
-
if (this.settings.ipv6Support) {
|
|
448
|
-
await this.setupNetworkProxyIntegration(true);
|
|
449
|
-
}
|
|
450
|
-
}
|
|
451
|
-
// Normalize port specifications
|
|
452
|
-
const fromPortRanges = this.normalizePortSpec(this.settings.fromPort);
|
|
453
|
-
const toPortRanges = this.normalizePortSpec(this.settings.toPort);
|
|
454
|
-
// Handle the case where fromPort and toPort counts don't match
|
|
455
|
-
if (fromPortRanges.length !== toPortRanges.length) {
|
|
456
|
-
if (toPortRanges.length === 1) {
|
|
457
|
-
// If there's only one toPort, use it for all fromPorts
|
|
458
|
-
for (const fromRange of fromPortRanges) {
|
|
459
|
-
await this.addPortForwardingRule(fromRange, toPortRanges[0]);
|
|
460
|
-
if (this.settings.ipv6Support) {
|
|
461
|
-
await this.addPortForwardingRule(fromRange, toPortRanges[0], true);
|
|
462
|
-
}
|
|
463
|
-
}
|
|
464
|
-
}
|
|
465
|
-
else {
|
|
466
|
-
throw new Error('Mismatched port counts: fromPort and toPort arrays must have equal length or toPort must be a single value');
|
|
467
|
-
}
|
|
468
|
-
}
|
|
469
|
-
else {
|
|
470
|
-
// Add port forwarding rules for each port specification
|
|
471
|
-
for (let i = 0; i < fromPortRanges.length; i++) {
|
|
472
|
-
await this.addPortForwardingRule(fromPortRanges[i], toPortRanges[i]);
|
|
473
|
-
if (this.settings.ipv6Support) {
|
|
474
|
-
await this.addPortForwardingRule(fromPortRanges[i], toPortRanges[i], true);
|
|
475
|
-
}
|
|
476
|
-
}
|
|
477
|
-
}
|
|
478
|
-
// Final check - ensure we have at least one rule added
|
|
479
|
-
if (this.rules.filter(r => r.added).length === 0) {
|
|
480
|
-
throw new Error('No rules were added');
|
|
481
|
-
}
|
|
482
|
-
}
|
|
483
|
-
/**
|
|
484
|
-
* Removes all added iptables rules
|
|
485
|
-
*/
|
|
486
|
-
async stop() {
|
|
487
|
-
// Process rules in reverse order (LIFO)
|
|
488
|
-
for (let i = this.rules.length - 1; i >= 0; i--) {
|
|
489
|
-
const rule = this.rules[i];
|
|
490
|
-
if (rule.added) {
|
|
491
|
-
try {
|
|
492
|
-
// Convert -A (add) to -D (delete)
|
|
493
|
-
const deleteCommand = rule.command.replace('-A', '-D');
|
|
494
|
-
await execAsync(deleteCommand);
|
|
495
|
-
this.log('info', `Removed rule: ${deleteCommand}`);
|
|
496
|
-
rule.added = false;
|
|
497
|
-
}
|
|
498
|
-
catch (err) {
|
|
499
|
-
this.log('error', `Failed to remove rule: ${err}`);
|
|
500
|
-
}
|
|
501
|
-
}
|
|
502
|
-
}
|
|
503
|
-
// If we created a custom chain, we need to clean it up
|
|
504
|
-
if (this.customChain) {
|
|
505
|
-
try {
|
|
506
|
-
// First flush the chain
|
|
507
|
-
await execAsync(`iptables -t nat -F ${this.customChain}`);
|
|
508
|
-
this.log('info', `Flushed custom chain: ${this.customChain}`);
|
|
509
|
-
// Then delete it
|
|
510
|
-
await execAsync(`iptables -t nat -X ${this.customChain}`);
|
|
511
|
-
this.log('info', `Deleted custom chain: ${this.customChain}`);
|
|
512
|
-
// Same for IPv6 if enabled
|
|
513
|
-
if (this.settings.ipv6Support) {
|
|
514
|
-
try {
|
|
515
|
-
await execAsync(`ip6tables -t nat -F ${this.customChain}`);
|
|
516
|
-
await execAsync(`ip6tables -t nat -X ${this.customChain}`);
|
|
517
|
-
this.log('info', `Deleted IPv6 custom chain: ${this.customChain}`);
|
|
518
|
-
}
|
|
519
|
-
catch (err) {
|
|
520
|
-
this.log('error', `Failed to delete IPv6 custom chain: ${err}`);
|
|
521
|
-
}
|
|
522
|
-
}
|
|
523
|
-
}
|
|
524
|
-
catch (err) {
|
|
525
|
-
this.log('error', `Failed to delete custom chain: ${err}`);
|
|
526
|
-
}
|
|
527
|
-
}
|
|
528
|
-
// Clear rules array
|
|
529
|
-
this.rules = [];
|
|
530
|
-
}
|
|
531
|
-
/**
|
|
532
|
-
* Synchronous version of stop, for use in exit handlers
|
|
533
|
-
*/
|
|
534
|
-
stopSync() {
|
|
535
|
-
// Process rules in reverse order (LIFO)
|
|
536
|
-
for (let i = this.rules.length - 1; i >= 0; i--) {
|
|
537
|
-
const rule = this.rules[i];
|
|
538
|
-
if (rule.added) {
|
|
539
|
-
try {
|
|
540
|
-
// Convert -A (add) to -D (delete)
|
|
541
|
-
const deleteCommand = rule.command.replace('-A', '-D');
|
|
542
|
-
execSync(deleteCommand);
|
|
543
|
-
this.log('info', `Removed rule: ${deleteCommand}`);
|
|
544
|
-
rule.added = false;
|
|
545
|
-
}
|
|
546
|
-
catch (err) {
|
|
547
|
-
this.log('error', `Failed to remove rule: ${err}`);
|
|
548
|
-
}
|
|
549
|
-
}
|
|
550
|
-
}
|
|
551
|
-
// If we created a custom chain, we need to clean it up
|
|
552
|
-
if (this.customChain) {
|
|
553
|
-
try {
|
|
554
|
-
// First flush the chain
|
|
555
|
-
execSync(`iptables -t nat -F ${this.customChain}`);
|
|
556
|
-
// Then delete it
|
|
557
|
-
execSync(`iptables -t nat -X ${this.customChain}`);
|
|
558
|
-
this.log('info', `Deleted custom chain: ${this.customChain}`);
|
|
559
|
-
// Same for IPv6 if enabled
|
|
560
|
-
if (this.settings.ipv6Support) {
|
|
561
|
-
try {
|
|
562
|
-
execSync(`ip6tables -t nat -F ${this.customChain}`);
|
|
563
|
-
execSync(`ip6tables -t nat -X ${this.customChain}`);
|
|
564
|
-
}
|
|
565
|
-
catch (err) {
|
|
566
|
-
// IPv6 failures are non-critical
|
|
567
|
-
}
|
|
568
|
-
}
|
|
569
|
-
}
|
|
570
|
-
catch (err) {
|
|
571
|
-
this.log('error', `Failed to delete custom chain: ${err}`);
|
|
572
|
-
}
|
|
573
|
-
}
|
|
574
|
-
// Clear rules array
|
|
575
|
-
this.rules = [];
|
|
576
|
-
}
|
|
577
|
-
/**
|
|
578
|
-
* Asynchronously cleans up any iptables rules in the nat table that were added by this module.
|
|
579
|
-
* It looks for rules with comments containing "IPTablesProxy:".
|
|
580
|
-
*/
|
|
581
|
-
static async cleanSlate() {
|
|
582
|
-
await IPTablesProxy.cleanSlateInternal();
|
|
583
|
-
// Also clean IPv6 rules
|
|
584
|
-
await IPTablesProxy.cleanSlateInternal(true);
|
|
585
|
-
}
|
|
586
|
-
/**
|
|
587
|
-
* Internal implementation of cleanSlate with IPv6 support
|
|
588
|
-
*/
|
|
589
|
-
static async cleanSlateInternal(isIpv6 = false) {
|
|
590
|
-
const iptablesCmd = isIpv6 ? 'ip6tables' : 'iptables';
|
|
591
|
-
try {
|
|
592
|
-
const { stdout } = await execAsync(`${iptablesCmd}-save -t nat`);
|
|
593
|
-
const lines = stdout.split('\n');
|
|
594
|
-
const proxyLines = lines.filter(line => line.includes('IPTablesProxy:'));
|
|
595
|
-
// First, find and remove any custom chains
|
|
596
|
-
const customChains = new Set();
|
|
597
|
-
const jumpRules = [];
|
|
598
|
-
for (const line of proxyLines) {
|
|
599
|
-
if (line.includes('IPTablesProxy:JUMP')) {
|
|
600
|
-
// Extract chain name from jump rule
|
|
601
|
-
const match = line.match(/\s+-j\s+(\S+)\s+/);
|
|
602
|
-
if (match && match[1].startsWith('IPTablesProxy_')) {
|
|
603
|
-
customChains.add(match[1]);
|
|
604
|
-
jumpRules.push(line);
|
|
605
|
-
}
|
|
606
|
-
}
|
|
607
|
-
}
|
|
608
|
-
// Remove jump rules first
|
|
609
|
-
for (const line of jumpRules) {
|
|
610
|
-
const trimmedLine = line.trim();
|
|
611
|
-
if (trimmedLine.startsWith('-A')) {
|
|
612
|
-
// Replace the "-A" with "-D" to form a deletion command
|
|
613
|
-
const deleteRule = trimmedLine.replace('-A', '-D');
|
|
614
|
-
const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
|
|
615
|
-
try {
|
|
616
|
-
await execAsync(cmd);
|
|
617
|
-
console.log(`Cleaned up iptables jump rule: ${cmd}`);
|
|
618
|
-
}
|
|
619
|
-
catch (err) {
|
|
620
|
-
console.error(`Failed to remove iptables jump rule: ${cmd}`, err);
|
|
621
|
-
}
|
|
622
|
-
}
|
|
623
|
-
}
|
|
624
|
-
// Then remove all other rules
|
|
625
|
-
for (const line of proxyLines) {
|
|
626
|
-
if (!line.includes('IPTablesProxy:JUMP')) { // Skip jump rules we already handled
|
|
627
|
-
const trimmedLine = line.trim();
|
|
628
|
-
if (trimmedLine.startsWith('-A')) {
|
|
629
|
-
// Replace the "-A" with "-D" to form a deletion command
|
|
630
|
-
const deleteRule = trimmedLine.replace('-A', '-D');
|
|
631
|
-
const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
|
|
632
|
-
try {
|
|
633
|
-
await execAsync(cmd);
|
|
634
|
-
console.log(`Cleaned up iptables rule: ${cmd}`);
|
|
635
|
-
}
|
|
636
|
-
catch (err) {
|
|
637
|
-
console.error(`Failed to remove iptables rule: ${cmd}`, err);
|
|
638
|
-
}
|
|
639
|
-
}
|
|
640
|
-
}
|
|
641
|
-
}
|
|
642
|
-
// Finally clean up custom chains
|
|
643
|
-
for (const chain of customChains) {
|
|
644
|
-
try {
|
|
645
|
-
// Flush the chain
|
|
646
|
-
await execAsync(`${iptablesCmd} -t nat -F ${chain}`);
|
|
647
|
-
console.log(`Flushed custom chain: ${chain}`);
|
|
648
|
-
// Delete the chain
|
|
649
|
-
await execAsync(`${iptablesCmd} -t nat -X ${chain}`);
|
|
650
|
-
console.log(`Deleted custom chain: ${chain}`);
|
|
651
|
-
}
|
|
652
|
-
catch (err) {
|
|
653
|
-
console.error(`Failed to delete custom chain ${chain}:`, err);
|
|
654
|
-
}
|
|
655
|
-
}
|
|
656
|
-
}
|
|
657
|
-
catch (err) {
|
|
658
|
-
console.error(`Failed to run ${iptablesCmd}-save: ${err}`);
|
|
659
|
-
}
|
|
660
|
-
}
|
|
661
|
-
/**
|
|
662
|
-
* Synchronously cleans up any iptables rules in the nat table that were added by this module.
|
|
663
|
-
* It looks for rules with comments containing "IPTablesProxy:".
|
|
664
|
-
* This method is intended for use in process exit handlers.
|
|
665
|
-
*/
|
|
666
|
-
static cleanSlateSync() {
|
|
667
|
-
IPTablesProxy.cleanSlateSyncInternal();
|
|
668
|
-
// Also clean IPv6 rules
|
|
669
|
-
IPTablesProxy.cleanSlateSyncInternal(true);
|
|
670
|
-
}
|
|
671
|
-
/**
|
|
672
|
-
* Internal implementation of cleanSlateSync with IPv6 support
|
|
673
|
-
*/
|
|
674
|
-
static cleanSlateSyncInternal(isIpv6 = false) {
|
|
675
|
-
const iptablesCmd = isIpv6 ? 'ip6tables' : 'iptables';
|
|
676
|
-
try {
|
|
677
|
-
const stdout = execSync(`${iptablesCmd}-save -t nat`).toString();
|
|
678
|
-
const lines = stdout.split('\n');
|
|
679
|
-
const proxyLines = lines.filter(line => line.includes('IPTablesProxy:'));
|
|
680
|
-
// First, find and remove any custom chains
|
|
681
|
-
const customChains = new Set();
|
|
682
|
-
const jumpRules = [];
|
|
683
|
-
for (const line of proxyLines) {
|
|
684
|
-
if (line.includes('IPTablesProxy:JUMP')) {
|
|
685
|
-
// Extract chain name from jump rule
|
|
686
|
-
const match = line.match(/\s+-j\s+(\S+)\s+/);
|
|
687
|
-
if (match && match[1].startsWith('IPTablesProxy_')) {
|
|
688
|
-
customChains.add(match[1]);
|
|
689
|
-
jumpRules.push(line);
|
|
690
|
-
}
|
|
691
|
-
}
|
|
692
|
-
}
|
|
693
|
-
// Remove jump rules first
|
|
694
|
-
for (const line of jumpRules) {
|
|
695
|
-
const trimmedLine = line.trim();
|
|
696
|
-
if (trimmedLine.startsWith('-A')) {
|
|
697
|
-
// Replace the "-A" with "-D" to form a deletion command
|
|
698
|
-
const deleteRule = trimmedLine.replace('-A', '-D');
|
|
699
|
-
const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
|
|
700
|
-
try {
|
|
701
|
-
execSync(cmd);
|
|
702
|
-
console.log(`Cleaned up iptables jump rule: ${cmd}`);
|
|
703
|
-
}
|
|
704
|
-
catch (err) {
|
|
705
|
-
console.error(`Failed to remove iptables jump rule: ${cmd}`, err);
|
|
706
|
-
}
|
|
707
|
-
}
|
|
708
|
-
}
|
|
709
|
-
// Then remove all other rules
|
|
710
|
-
for (const line of proxyLines) {
|
|
711
|
-
if (!line.includes('IPTablesProxy:JUMP')) { // Skip jump rules we already handled
|
|
712
|
-
const trimmedLine = line.trim();
|
|
713
|
-
if (trimmedLine.startsWith('-A')) {
|
|
714
|
-
const deleteRule = trimmedLine.replace('-A', '-D');
|
|
715
|
-
const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
|
|
716
|
-
try {
|
|
717
|
-
execSync(cmd);
|
|
718
|
-
console.log(`Cleaned up iptables rule: ${cmd}`);
|
|
719
|
-
}
|
|
720
|
-
catch (err) {
|
|
721
|
-
console.error(`Failed to remove iptables rule: ${cmd}`, err);
|
|
722
|
-
}
|
|
723
|
-
}
|
|
724
|
-
}
|
|
725
|
-
}
|
|
726
|
-
// Finally clean up custom chains
|
|
727
|
-
for (const chain of customChains) {
|
|
728
|
-
try {
|
|
729
|
-
// Flush the chain
|
|
730
|
-
execSync(`${iptablesCmd} -t nat -F ${chain}`);
|
|
731
|
-
// Delete the chain
|
|
732
|
-
execSync(`${iptablesCmd} -t nat -X ${chain}`);
|
|
733
|
-
console.log(`Deleted custom chain: ${chain}`);
|
|
734
|
-
}
|
|
735
|
-
catch (err) {
|
|
736
|
-
console.error(`Failed to delete custom chain ${chain}:`, err);
|
|
737
|
-
}
|
|
738
|
-
}
|
|
739
|
-
}
|
|
740
|
-
catch (err) {
|
|
741
|
-
console.error(`Failed to run ${iptablesCmd}-save: ${err}`);
|
|
742
|
-
}
|
|
743
|
-
}
|
|
744
|
-
/**
|
|
745
|
-
* Logging utility that respects the enableLogging setting
|
|
746
|
-
*/
|
|
747
|
-
log(level, message) {
|
|
748
|
-
if (!this.settings.enableLogging && level === 'info') {
|
|
749
|
-
return;
|
|
750
|
-
}
|
|
751
|
-
const timestamp = new Date().toISOString();
|
|
752
|
-
switch (level) {
|
|
753
|
-
case 'info':
|
|
754
|
-
console.log(`[${timestamp}] [INFO] ${message}`);
|
|
755
|
-
break;
|
|
756
|
-
case 'warn':
|
|
757
|
-
console.warn(`[${timestamp}] [WARN] ${message}`);
|
|
758
|
-
break;
|
|
759
|
-
case 'error':
|
|
760
|
-
console.error(`[${timestamp}] [ERROR] ${message}`);
|
|
761
|
-
break;
|
|
762
|
-
}
|
|
763
|
-
}
|
|
764
|
-
}
|
|
765
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.iptablesproxy.js","sourceRoot":"","sources":["../ts/classes.iptablesproxy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AAC/C,OAAO,EAAE,SAAS,EAAE,MAAM,MAAM,CAAC;AAEjC,MAAM,SAAS,GAAG,SAAS,CAAC,IAAI,CAAC,CAAC;AAsDlC;;;GAGG;AACH,MAAM,OAAO,aAAa;IAMxB,YAAY,QAA+B;QAJnC,UAAK,GAAmB,EAAE,CAAC;QAE3B,gBAAW,GAAkB,IAAI,CAAC;QAGxC,+CAA+C;QAC/C,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;QAEhC,uBAAuB;QACvB,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,QAAQ;YACX,MAAM,EAAE,QAAQ,CAAC,MAAM,IAAI,WAAW;YACtC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,IAAI,KAAK;YACpC,aAAa,EAAE,QAAQ,CAAC,aAAa,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK;YACpF,WAAW,EAAE,QAAQ,CAAC,WAAW,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,CAAC,KAAK;YAC9E,kBAAkB,EAAE,QAAQ,CAAC,kBAAkB,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,kBAAkB,CAAC,CAAC,CAAC,IAAI;YAClG,mBAAmB,EAAE,QAAQ,CAAC,mBAAmB,IAAI,EAAE,OAAO,EAAE,KAAK,EAAE;SACxE,CAAC;QAEF,oEAAoE;QACpE,IAAI,CAAC,OAAO,GAAG,iBAAiB,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;QAExF,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,IAAI,CAAC,WAAW,GAAG,iBAAiB,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;QAChF,CAAC;QAED,oDAAoD;QACpD,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,EAAE,CAAC;YAC/B,MAAM,OAAO,GAAG,GAAG,EAAE;gBACnB,IAAI,CAAC;oBACH,IAAI,CAAC,QAAQ,EAAE,CAAC;gBAClB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,KAAK,CAAC,wCAAwC,EAAE,GAAG,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC,CAAC;YAEF,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAC5B,OAAO,CAAC,EAAE,CAAC,QAAQ,EAAE,GAAG,EAAE;gBACxB,OAAO,EAAE,CAAC;gBACV,OAAO,CAAC,IAAI,EAAE,CAAC;YACjB,CAAC,CAAC,CAAC;YACH,OAAO,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBACzB,OAAO,EAAE,CAAC;gBACV,OAAO,CAAC,IAAI,EAAE,CAAC;YACjB,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,QAA+B;QACtD,wBAAwB;QACxB,MAAM,aAAa,GAAG,CAAC,IAAsD,EAAE,EAAE;YAC/E,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBACxB,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;gBACpC,OAAO;YACT,CAAC;YAED,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;gBAC7B,IAAI,IAAI,GAAG,CAAC,IAAI,IAAI,GAAG,KAAK,EAAE,CAAC;oBAC7B,MAAM,IAAI,KAAK,CAAC,wBAAwB,IAAI,EAAE,CAAC,CAAC;gBAClD,CAAC;YACH,CAAC;iBAAM,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;gBACpC,IAAI,IAAI,CAAC,IAAI,GAAG,CAAC,IAAI,IAAI,CAAC,IAAI,GAAG,KAAK,IAAI,IAAI,CAAC,EAAE,GAAG,CAAC,IAAI,IAAI,CAAC,EAAE,GAAG,KAAK,IAAI,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;oBAChG,MAAM,IAAI,KAAK,CAAC,uBAAuB,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;gBACjE,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,aAAa,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACjC,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE/B,4EAA4E;QAC5E,MAAM,OAAO,GAAG,yIAAyI,CAAC;QAC1J,MAAM,SAAS,GAAG,ksBAAksB,CAAC;QAErtB,wBAAwB;QACxB,MAAM,WAAW,GAAG,CAAC,GAAc,EAAE,EAAE;YACrC,IAAI,CAAC,GAAG;gBAAE,OAAO;YAEjB,KAAK,MAAM,EAAE,IAAI,GAAG,EAAE,CAAC;gBACrB,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC7C,MAAM,IAAI,KAAK,CAAC,8BAA8B,EAAE,EAAE,CAAC,CAAC;gBACtD,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,WAAW,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAC;QACvC,WAAW,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;QAEtC,gDAAgD;QAChD,IAAI,QAAQ,CAAC,MAAM,EAAE,CAAC;YACpB,MAAM,SAAS,GAAG,6GAA6G,CAAC;YAChI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC3G,MAAM,IAAI,KAAK,CAAC,wBAAwB,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,QAA0D;QAClF,MAAM,MAAM,GAAiB,EAAE,CAAC;QAEhC,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC5B,yCAAyC;YACzC,KAAK,MAAM,IAAI,IAAI,QAAQ,EAAE,CAAC;gBAC5B,MAAM,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,IAAI,OAAO,QAAQ,KAAK,QAAQ,EAAE,CAAC;YACxC,0DAA0D;YAC1D,MAAM,CAAC,IAAI,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;QAChD,CAAC;aAAM,CAAC;YACN,kBAAkB;YAClB,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACxB,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,SAAkB,KAAK;QAChD,OAAO,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC;IAC3C,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,UAAU,CAAC,KAAa,EAAE,OAAe,EAAE,SAAkB,KAAK;QAC9E,IAAI,CAAC;YACH,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YACpD,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,SAAS,CAAC,GAAG,WAAW,YAAY,KAAK,EAAE,CAAC,CAAC;YACtE,kEAAkE;YAClE,mEAAmE;YACnE,MAAM,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,GAAG,WAAW,OAAO,KAAK,MAAM,EAAE,KAAK,CAAC,CAAC;YAC7E,OAAO,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,WAAW,CAAC,CAAC;QACtE,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,mCAAmC,GAAG,EAAE,CAAC,CAAC;YAC5D,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,SAAkB,KAAK;QACpD,IAAI,CAAC,IAAI,CAAC,WAAW;YAAE,OAAO,IAAI,CAAC;QAEnC,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QAEpB,IAAI,CAAC;YACH,mBAAmB;YACnB,MAAM,SAAS,CAAC,GAAG,WAAW,OAAO,KAAK,OAAO,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;YACrE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;YAE9D,oCAAoC;YACpC,MAAM,WAAW,GAAG,GAAG,WAAW,OAAO,KAAK,qBAAqB,IAAI,CAAC,WAAW,0BAA0B,IAAI,CAAC,OAAO,QAAQ,CAAC;YAClI,MAAM,SAAS,CAAC,WAAW,CAAC,CAAC;YAC7B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;YAE3D,sBAAsB;YACtB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;gBACd,KAAK;gBACL,KAAK,EAAE,YAAY;gBACnB,OAAO,EAAE,WAAW;gBACpB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,OAAO;gBAC3B,KAAK,EAAE,IAAI;aACZ,CAAC,CAAC;YAEH,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,EAAE,CAAC,CAAC;YAC3D,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,SAAkB,KAAK;QACrD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YACtE,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QACpB,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,IAAI,YAAY,CAAC;QAE/C,IAAI,CAAC;YACH,uCAAuC;YACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC9E,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;oBAC/C,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,EAAE,kCAAkC,IAAI,CAAC,OAAO,UAAU,CAAC;oBAExH,+BAA+B;oBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;wBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;wBAC9D,SAAS;oBACX,CAAC;oBAED,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,OAAO,EAAE,CAAC,CAAC;oBAErD,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,SAAS;wBAC7B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,mCAAmC;YACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAChF,mCAAmC;gBACnC,MAAM,cAAc,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,kCAAkC,IAAI,CAAC,OAAO,YAAY,CAAC;gBAErJ,mCAAmC;gBACnC,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;oBAChD,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,EAAE,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,oCAAoC,IAAI,CAAC,OAAO,WAAW,CAAC;oBAExJ,+BAA+B;oBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;wBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;wBAC9D,SAAS;oBACX,CAAC;oBAED,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,OAAO,EAAE,CAAC,CAAC;oBAEtD,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,UAAU;wBAC9B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;gBAED,4CAA4C;gBAC5C,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,cAAc,EAAE,MAAM,CAAC,EAAE,CAAC;oBAC7F,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,cAAc,EAAE,CAAC,CAAC;gBACvE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,cAAc,CAAC,CAAC;oBAChC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,cAAc,EAAE,CAAC,CAAC;oBAE/D,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO,EAAE,cAAc;wBACvB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,WAAW;wBAC/B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,GAAG,EAAE,CAAC,CAAC;YAClE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB,CACjC,aAAyB,EACzB,WAAuB,EACvB,SAAkB,KAAK;QAEvB,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QACpB,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,IAAI,YAAY,CAAC;QAE/C,IAAI,CAAC;YACH,0BAA0B;YAC1B,IAAI,aAAa,CAAC,IAAI,KAAK,aAAa,CAAC,EAAE,IAAI,WAAW,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,EAAE,CAAC;gBACnF,sBAAsB;gBACtB,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,YAAY,aAAa,CAAC,IAAI,GAAG;oBAClH,4BAA4B,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,GAAG;oBACvE,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC;gBAEhD,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;oBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;gBAChE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,OAAO,EAAE,CAAC,CAAC;oBAE3D,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,OAAO;wBAC3B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;iBAAM,IAAI,aAAa,CAAC,EAAE,GAAG,aAAa,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,GAAG,WAAW,CAAC,IAAI,EAAE,CAAC;gBACvF,uCAAuC;gBACvC,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,YAAY,aAAa,CAAC,IAAI,IAAI,aAAa,CAAC,EAAE,GAAG;oBACtI,4BAA4B,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,IAAI,WAAW,CAAC,EAAE,GAAG;oBACzF,yBAAyB,IAAI,CAAC,OAAO,cAAc,CAAC;gBAEtD,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;oBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;gBAChE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,qCAAqC,OAAO,EAAE,CAAC,CAAC;oBAEjE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,aAAa;wBACjC,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,4CAA4C;gBAC5C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,IAAI,aAAa,CAAC,EAAE,GAAG,aAAa,CAAC,IAAI,EAAE,CAAC,EAAE,EAAE,CAAC;oBAChE,MAAM,QAAQ,GAAG,aAAa,CAAC,IAAI,GAAG,CAAC,CAAC;oBACxC,MAAM,MAAM,GAAG,WAAW,CAAC,IAAI,GAAG,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,GAAG,WAAW,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC;oBAE9E,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,YAAY,QAAQ,GAAG;wBACxG,4BAA4B,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,MAAM,GAAG;wBAC7D,yBAAyB,IAAI,CAAC,OAAO,mBAAmB,CAAC;oBAE3D,+BAA+B;oBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;wBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;wBAC9D,SAAS;oBACX,CAAC;oBAED,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,OAAO,EAAE,CAAC,CAAC;oBAEtE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,kBAAkB;wBACtC,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,sDAAsD;YACtD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACpC,iBAAiB;gBACjB,MAAM,WAAW,GAAG,GAAG,WAAW,6BAA6B,IAAI,CAAC,QAAQ,CAAC,QAAQ,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,GAAG;oBACjH,WAAW,WAAW,CAAC,IAAI,IAAI,WAAW,CAAC,EAAE,iBAAiB;oBAC9D,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC;gBAEhD,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,WAAW,EAAE,MAAM,CAAC,EAAE,CAAC;oBAC1F,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,WAAW,EAAE,CAAC,CAAC;gBACpE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,WAAW,CAAC,CAAC;oBAC7B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,WAAW,EAAE,CAAC,CAAC;oBAE1D,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK,EAAE,KAAK;wBACZ,KAAK,EAAE,aAAa;wBACpB,OAAO,EAAE,WAAW;wBACpB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,OAAO;wBAC3B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;YAEhE,qDAAqD;YACrD,MAAM,IAAI,CAAC,aAAa,EAAE,CAAC;YAE3B,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,SAAkB,KAAK;QAChE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAChD,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,cAAc,GAAG,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACzD,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QACpB,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,IAAI,YAAY,CAAC;QAE/C,IAAI,CAAC;YACH,kGAAkG;YAClG,IAAI,cAAc,CAAC,iBAAiB,IAAI,cAAc,CAAC,kBAAkB,EAAE,CAAC;gBAC1E,MAAM,eAAe,GAAG,GAAG,WAAW,OAAO,KAAK,6CAA6C;oBAC7F,aAAa,cAAc,CAAC,kBAAkB,GAAG;oBACjD,yBAAyB,IAAI,CAAC,OAAO,qBAAqB,CAAC;gBAE7D,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,eAAe,EAAE,MAAM,CAAC,EAAE,CAAC;oBAC9F,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,eAAe,EAAE,CAAC,CAAC;gBACxE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,eAAe,CAAC,CAAC;oBACjC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,wCAAwC,eAAe,EAAE,CAAC,CAAC;oBAE5E,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK,EAAE,QAAQ;wBACf,OAAO,EAAE,eAAe;wBACxB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,oBAAoB;wBACxC,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8CAA8C,GAAG,EAAE,CAAC,CAAC;YACvE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,aAAa;QACzB,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,kCAAkC;oBAClC,MAAM,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACvD,MAAM,SAAS,CAAC,aAAa,CAAC,CAAC;oBAC/B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,qBAAqB,aAAa,EAAE,CAAC,CAAC;oBAEvD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;gBACrB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,EAAE,CAAC,CAAC;gBACxD,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,mCAAmC;QACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YAClC,MAAM,aAAa,CAAC,UAAU,EAAE,CAAC;QACnC,CAAC;QAED,iCAAiC;QACjC,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;YACxD,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,sBAAsB;YACtB,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,qBAAqB,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;gBAChE,IAAI,CAAC,qBAAqB,EAAE,CAAC;oBAC3B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,+DAA+D,CAAC,CAAC;gBACpF,CAAC;YACH,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,MAAM,IAAI,CAAC,iBAAiB,EAAE,CAAC;QAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;QACrC,CAAC;QAED,6CAA6C;QAC7C,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAC/C,MAAM,oBAAoB,GAAG,MAAM,IAAI,CAAC,4BAA4B,EAAE,CAAC;YACvE,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC1B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,CAAC,CAAC;YAChE,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,IAAI,CAAC,4BAA4B,CAAC,IAAI,CAAC,CAAC;YAChD,CAAC;QACH,CAAC;QAED,gCAAgC;QAChC,MAAM,cAAc,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACtE,MAAM,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAElE,+DAA+D;QAC/D,IAAI,cAAc,CAAC,MAAM,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC;YAClD,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC9B,uDAAuD;gBACvD,KAAK,MAAM,SAAS,IAAI,cAAc,EAAE,CAAC;oBACvC,MAAM,IAAI,CAAC,qBAAqB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC;oBAE7D,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;oBACrE,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CAAC,4GAA4G,CAAC,CAAC;YAChI,CAAC;QACH,CAAC;aAAM,CAAC;YACN,wDAAwD;YACxD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC/C,MAAM,IAAI,CAAC,qBAAqB,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC;gBAErE,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;gBAC7E,CAAC;YACH,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;QACzC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,kCAAkC;oBAClC,MAAM,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACvD,MAAM,SAAS,CAAC,aAAa,CAAC,CAAC;oBAC/B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,aAAa,EAAE,CAAC,CAAC;oBAEnD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;gBACrB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,0BAA0B,GAAG,EAAE,CAAC,CAAC;gBACrD,CAAC;YACH,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,IAAI,CAAC;gBACH,wBAAwB;gBACxB,MAAM,SAAS,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAC1D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAE9D,iBAAiB;gBACjB,MAAM,SAAS,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAC1D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAE9D,2BAA2B;gBAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC9B,IAAI,CAAC;wBACH,MAAM,SAAS,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;wBAC3D,MAAM,SAAS,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;wBAC3D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;oBACrE,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;oBAClE,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,EAAE,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IAClB,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,kCAAkC;oBAClC,MAAM,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACvD,QAAQ,CAAC,aAAa,CAAC,CAAC;oBACxB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,aAAa,EAAE,CAAC,CAAC;oBAEnD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;gBACrB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,0BAA0B,GAAG,EAAE,CAAC,CAAC;gBACrD,CAAC;YACH,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,IAAI,CAAC;gBACH,wBAAwB;gBACxB,QAAQ,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAEnD,iBAAiB;gBACjB,QAAQ,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBACnD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAE9D,2BAA2B;gBAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC9B,IAAI,CAAC;wBACH,QAAQ,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;wBACpD,QAAQ,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;oBACtD,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,iCAAiC;oBACnC,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,EAAE,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IAClB,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,UAAU;QAC5B,MAAM,aAAa,CAAC,kBAAkB,EAAE,CAAC;QAEzC,wBAAwB;QACxB,MAAM,aAAa,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;IAC/C,CAAC;IAED;;OAEG;IACK,MAAM,CAAC,KAAK,CAAC,kBAAkB,CAAC,SAAkB,KAAK;QAC7D,MAAM,WAAW,GAAG,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC;QAEtD,IAAI,CAAC;YACH,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,SAAS,CAAC,GAAG,WAAW,cAAc,CAAC,CAAC;YACjE,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YACjC,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAC,CAAC;YAEzE,2CAA2C;YAC3C,MAAM,YAAY,GAAG,IAAI,GAAG,EAAU,CAAC;YACvC,MAAM,SAAS,GAAa,EAAE,CAAC;YAE/B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC;oBACxC,oCAAoC;oBACpC,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBAC7C,IAAI,KAAK,IAAI,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC,EAAE,CAAC;wBACnD,YAAY,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;wBAC3B,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACvB,CAAC;gBACH,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;gBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;oBACjC,wDAAwD;oBACxD,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;oBAClD,IAAI,CAAC;wBACH,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;wBACrB,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;oBACvD,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,KAAK,CAAC,wCAAwC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;oBACpE,CAAC;gBACH,CAAC;YACH,CAAC;YAED,8BAA8B;YAC9B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC,CAAC,qCAAqC;oBAC/E,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;oBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;wBACjC,wDAAwD;wBACxD,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;wBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;wBAClD,IAAI,CAAC;4BACH,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;4BACrB,OAAO,CAAC,GAAG,CAAC,6BAA6B,GAAG,EAAE,CAAC,CAAC;wBAClD,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,KAAK,CAAC,mCAAmC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;wBAC/D,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iCAAiC;YACjC,KAAK,MAAM,KAAK,IAAI,YAAY,EAAE,CAAC;gBACjC,IAAI,CAAC;oBACH,kBAAkB;oBAClB,MAAM,SAAS,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBACrD,OAAO,CAAC,GAAG,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBAE9C,mBAAmB;oBACnB,MAAM,SAAS,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBACrD,OAAO,CAAC,GAAG,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;gBAChD,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,KAAK,CAAC,iCAAiC,KAAK,GAAG,EAAE,GAAG,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,iBAAiB,WAAW,UAAU,GAAG,EAAE,CAAC,CAAC;QAC7D,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc;QAC1B,aAAa,CAAC,sBAAsB,EAAE,CAAC;QAEvC,wBAAwB;QACxB,aAAa,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;IAC7C,CAAC;IAED;;OAEG;IACK,MAAM,CAAC,sBAAsB,CAAC,SAAkB,KAAK;QAC3D,MAAM,WAAW,GAAG,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC;QAEtD,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,QAAQ,CAAC,GAAG,WAAW,cAAc,CAAC,CAAC,QAAQ,EAAE,CAAC;YACjE,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YACjC,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAC,CAAC;YAEzE,2CAA2C;YAC3C,MAAM,YAAY,GAAG,IAAI,GAAG,EAAU,CAAC;YACvC,MAAM,SAAS,GAAa,EAAE,CAAC;YAE/B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC;oBACxC,oCAAoC;oBACpC,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBAC7C,IAAI,KAAK,IAAI,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC,EAAE,CAAC;wBACnD,YAAY,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;wBAC3B,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACvB,CAAC;gBACH,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;gBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;oBACjC,wDAAwD;oBACxD,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;oBAClD,IAAI,CAAC;wBACH,QAAQ,CAAC,GAAG,CAAC,CAAC;wBACd,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;oBACvD,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,KAAK,CAAC,wCAAwC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;oBACpE,CAAC;gBACH,CAAC;YACH,CAAC;YAED,8BAA8B;YAC9B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC,CAAC,qCAAqC;oBAC/E,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;oBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;wBACjC,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;wBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;wBAClD,IAAI,CAAC;4BACH,QAAQ,CAAC,GAAG,CAAC,CAAC;4BACd,OAAO,CAAC,GAAG,CAAC,6BAA6B,GAAG,EAAE,CAAC,CAAC;wBAClD,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,KAAK,CAAC,mCAAmC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;wBAC/D,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iCAAiC;YACjC,KAAK,MAAM,KAAK,IAAI,YAAY,EAAE,CAAC;gBACjC,IAAI,CAAC;oBACH,kBAAkB;oBAClB,QAAQ,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBAE9C,mBAAmB;oBACnB,QAAQ,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBAC9C,OAAO,CAAC,GAAG,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;gBAChD,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,KAAK,CAAC,iCAAiC,KAAK,GAAG,EAAE,GAAG,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,iBAAiB,WAAW,UAAU,GAAG,EAAE,CAAC,CAAC;QAC7D,CAAC;IACH,CAAC;IAED;;OAEG;IACK,GAAG,CAAC,KAAgC,EAAE,OAAe;QAC3D,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YACrD,OAAO;QACT,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAE3C,QAAQ,KAAK,EAAE,CAAC;YACd,KAAK,MAAM;gBACT,OAAO,CAAC,GAAG,CAAC,IAAI,SAAS,YAAY,OAAO,EAAE,CAAC,CAAC;gBAChD,MAAM;YACR,KAAK,MAAM;gBACT,OAAO,CAAC,IAAI,CAAC,IAAI,SAAS,YAAY,OAAO,EAAE,CAAC,CAAC;gBACjD,MAAM;YACR,KAAK,OAAO;gBACV,OAAO,CAAC,KAAK,CAAC,IAAI,SAAS,aAAa,OAAO,EAAE,CAAC,CAAC;gBACnD,MAAM;QACV,CAAC;IACH,CAAC;CACF"}
|