@push.rocks/smartproxy 19.3.2 → 19.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +12 -12
- package/readme.plan.md +152 -257
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,1424 +0,0 @@
|
|
|
1
|
-
import * as plugins from './plugins.js';
|
|
2
|
-
import { ProxyRouter } from './classes.router.js';
|
|
3
|
-
import { Port80Handler, Port80HandlerEvents } from './classes.port80handler.js';
|
|
4
|
-
import * as fs from 'fs';
|
|
5
|
-
import * as path from 'path';
|
|
6
|
-
import { fileURLToPath } from 'url';
|
|
7
|
-
export class NetworkProxy {
|
|
8
|
-
/**
|
|
9
|
-
* Creates a new NetworkProxy instance
|
|
10
|
-
*/
|
|
11
|
-
constructor(optionsArg) {
|
|
12
|
-
this.proxyConfigs = [];
|
|
13
|
-
this.defaultHeaders = {};
|
|
14
|
-
// State tracking
|
|
15
|
-
this.router = new ProxyRouter();
|
|
16
|
-
this.socketMap = new plugins.lik.ObjectMap();
|
|
17
|
-
this.activeContexts = new Set();
|
|
18
|
-
this.connectedClients = 0;
|
|
19
|
-
this.startTime = 0;
|
|
20
|
-
this.requestsServed = 0;
|
|
21
|
-
this.failedRequests = 0;
|
|
22
|
-
// New tracking for PortProxy integration
|
|
23
|
-
this.portProxyConnections = 0;
|
|
24
|
-
this.tlsTerminatedConnections = 0;
|
|
25
|
-
this.certificateCache = new Map();
|
|
26
|
-
// Port80Handler for certificate management
|
|
27
|
-
this.port80Handler = null;
|
|
28
|
-
// New connection pool for backend connections
|
|
29
|
-
this.connectionPool = new Map();
|
|
30
|
-
// Track round-robin positions for load balancing
|
|
31
|
-
this.roundRobinPositions = new Map();
|
|
32
|
-
// Set default options
|
|
33
|
-
this.options = {
|
|
34
|
-
port: optionsArg.port,
|
|
35
|
-
maxConnections: optionsArg.maxConnections || 10000,
|
|
36
|
-
keepAliveTimeout: optionsArg.keepAliveTimeout || 120000, // 2 minutes
|
|
37
|
-
headersTimeout: optionsArg.headersTimeout || 60000, // 1 minute
|
|
38
|
-
logLevel: optionsArg.logLevel || 'info',
|
|
39
|
-
cors: optionsArg.cors || {
|
|
40
|
-
allowOrigin: '*',
|
|
41
|
-
allowMethods: 'GET, POST, PUT, DELETE, OPTIONS',
|
|
42
|
-
allowHeaders: 'Content-Type, Authorization',
|
|
43
|
-
maxAge: 86400
|
|
44
|
-
},
|
|
45
|
-
// New defaults for PortProxy integration
|
|
46
|
-
connectionPoolSize: optionsArg.connectionPoolSize || 50,
|
|
47
|
-
portProxyIntegration: optionsArg.portProxyIntegration || false,
|
|
48
|
-
// Default ACME options
|
|
49
|
-
acme: {
|
|
50
|
-
enabled: optionsArg.acme?.enabled || false,
|
|
51
|
-
port: optionsArg.acme?.port || 80,
|
|
52
|
-
contactEmail: optionsArg.acme?.contactEmail || 'admin@example.com',
|
|
53
|
-
useProduction: optionsArg.acme?.useProduction || false, // Default to staging for safety
|
|
54
|
-
renewThresholdDays: optionsArg.acme?.renewThresholdDays || 30,
|
|
55
|
-
autoRenew: optionsArg.acme?.autoRenew !== false, // Default to true
|
|
56
|
-
certificateStore: optionsArg.acme?.certificateStore || './certs',
|
|
57
|
-
skipConfiguredCerts: optionsArg.acme?.skipConfiguredCerts || false
|
|
58
|
-
}
|
|
59
|
-
};
|
|
60
|
-
// Set up certificate store directory
|
|
61
|
-
this.certificateStoreDir = path.resolve(this.options.acme.certificateStore);
|
|
62
|
-
// Ensure certificate store directory exists
|
|
63
|
-
try {
|
|
64
|
-
if (!fs.existsSync(this.certificateStoreDir)) {
|
|
65
|
-
fs.mkdirSync(this.certificateStoreDir, { recursive: true });
|
|
66
|
-
this.log('info', `Created certificate store directory: ${this.certificateStoreDir}`);
|
|
67
|
-
}
|
|
68
|
-
}
|
|
69
|
-
catch (error) {
|
|
70
|
-
this.log('warn', `Failed to create certificate store directory: ${error}`);
|
|
71
|
-
}
|
|
72
|
-
this.loadDefaultCertificates();
|
|
73
|
-
}
|
|
74
|
-
/**
|
|
75
|
-
* Loads default certificates from the filesystem
|
|
76
|
-
*/
|
|
77
|
-
loadDefaultCertificates() {
|
|
78
|
-
const __dirname = path.dirname(fileURLToPath(import.meta.url));
|
|
79
|
-
const certPath = path.join(__dirname, '..', 'assets', 'certs');
|
|
80
|
-
try {
|
|
81
|
-
this.defaultCertificates = {
|
|
82
|
-
key: fs.readFileSync(path.join(certPath, 'key.pem'), 'utf8'),
|
|
83
|
-
cert: fs.readFileSync(path.join(certPath, 'cert.pem'), 'utf8')
|
|
84
|
-
};
|
|
85
|
-
this.log('info', 'Default certificates loaded successfully');
|
|
86
|
-
}
|
|
87
|
-
catch (error) {
|
|
88
|
-
this.log('error', 'Error loading default certificates', error);
|
|
89
|
-
// Generate self-signed fallback certificates
|
|
90
|
-
try {
|
|
91
|
-
// This is a placeholder for actual certificate generation code
|
|
92
|
-
// In a real implementation, you would use a library like selfsigned to generate certs
|
|
93
|
-
this.defaultCertificates = {
|
|
94
|
-
key: "FALLBACK_KEY_CONTENT",
|
|
95
|
-
cert: "FALLBACK_CERT_CONTENT"
|
|
96
|
-
};
|
|
97
|
-
this.log('warn', 'Using fallback self-signed certificates');
|
|
98
|
-
}
|
|
99
|
-
catch (fallbackError) {
|
|
100
|
-
this.log('error', 'Failed to generate fallback certificates', fallbackError);
|
|
101
|
-
throw new Error('Could not load or generate SSL certificates');
|
|
102
|
-
}
|
|
103
|
-
}
|
|
104
|
-
}
|
|
105
|
-
/**
|
|
106
|
-
* Returns the port number this NetworkProxy is listening on
|
|
107
|
-
* Useful for PortProxy to determine where to forward connections
|
|
108
|
-
*/
|
|
109
|
-
getListeningPort() {
|
|
110
|
-
return this.options.port;
|
|
111
|
-
}
|
|
112
|
-
/**
|
|
113
|
-
* Updates the server capacity settings
|
|
114
|
-
* @param maxConnections Maximum number of simultaneous connections
|
|
115
|
-
* @param keepAliveTimeout Keep-alive timeout in milliseconds
|
|
116
|
-
* @param connectionPoolSize Size of the connection pool per backend
|
|
117
|
-
*/
|
|
118
|
-
updateCapacity(maxConnections, keepAliveTimeout, connectionPoolSize) {
|
|
119
|
-
if (maxConnections !== undefined) {
|
|
120
|
-
this.options.maxConnections = maxConnections;
|
|
121
|
-
this.log('info', `Updated max connections to ${maxConnections}`);
|
|
122
|
-
}
|
|
123
|
-
if (keepAliveTimeout !== undefined) {
|
|
124
|
-
this.options.keepAliveTimeout = keepAliveTimeout;
|
|
125
|
-
if (this.httpsServer) {
|
|
126
|
-
this.httpsServer.keepAliveTimeout = keepAliveTimeout;
|
|
127
|
-
this.log('info', `Updated keep-alive timeout to ${keepAliveTimeout}ms`);
|
|
128
|
-
}
|
|
129
|
-
}
|
|
130
|
-
if (connectionPoolSize !== undefined) {
|
|
131
|
-
this.options.connectionPoolSize = connectionPoolSize;
|
|
132
|
-
this.log('info', `Updated connection pool size to ${connectionPoolSize}`);
|
|
133
|
-
// Cleanup excess connections in the pool if the size was reduced
|
|
134
|
-
this.cleanupConnectionPool();
|
|
135
|
-
}
|
|
136
|
-
}
|
|
137
|
-
/**
|
|
138
|
-
* Returns current server metrics
|
|
139
|
-
* Useful for PortProxy to determine which NetworkProxy to use for load balancing
|
|
140
|
-
*/
|
|
141
|
-
getMetrics() {
|
|
142
|
-
return {
|
|
143
|
-
activeConnections: this.connectedClients,
|
|
144
|
-
totalRequests: this.requestsServed,
|
|
145
|
-
failedRequests: this.failedRequests,
|
|
146
|
-
portProxyConnections: this.portProxyConnections,
|
|
147
|
-
tlsTerminatedConnections: this.tlsTerminatedConnections,
|
|
148
|
-
connectionPoolSize: Array.from(this.connectionPool.entries()).reduce((acc, [host, connections]) => {
|
|
149
|
-
acc[host] = connections.length;
|
|
150
|
-
return acc;
|
|
151
|
-
}, {}),
|
|
152
|
-
uptime: Math.floor((Date.now() - this.startTime) / 1000),
|
|
153
|
-
memoryUsage: process.memoryUsage(),
|
|
154
|
-
activeWebSockets: this.wsServer?.clients.size || 0
|
|
155
|
-
};
|
|
156
|
-
}
|
|
157
|
-
/**
|
|
158
|
-
* Cleanup the connection pool by removing idle connections
|
|
159
|
-
* or reducing pool size if it exceeds the configured maximum
|
|
160
|
-
*/
|
|
161
|
-
cleanupConnectionPool() {
|
|
162
|
-
const now = Date.now();
|
|
163
|
-
const idleTimeout = this.options.keepAliveTimeout || 120000; // 2 minutes default
|
|
164
|
-
for (const [host, connections] of this.connectionPool.entries()) {
|
|
165
|
-
// Sort by last used time (oldest first)
|
|
166
|
-
connections.sort((a, b) => a.lastUsed - b.lastUsed);
|
|
167
|
-
// Remove idle connections older than the idle timeout
|
|
168
|
-
let removed = 0;
|
|
169
|
-
while (connections.length > 0) {
|
|
170
|
-
const connection = connections[0];
|
|
171
|
-
// Remove if idle and exceeds timeout, or if pool is too large
|
|
172
|
-
if ((connection.isIdle && now - connection.lastUsed > idleTimeout) ||
|
|
173
|
-
connections.length > this.options.connectionPoolSize) {
|
|
174
|
-
try {
|
|
175
|
-
if (!connection.socket.destroyed) {
|
|
176
|
-
connection.socket.end();
|
|
177
|
-
connection.socket.destroy();
|
|
178
|
-
}
|
|
179
|
-
}
|
|
180
|
-
catch (err) {
|
|
181
|
-
this.log('error', `Error destroying pooled connection to ${host}`, err);
|
|
182
|
-
}
|
|
183
|
-
connections.shift(); // Remove from pool
|
|
184
|
-
removed++;
|
|
185
|
-
}
|
|
186
|
-
else {
|
|
187
|
-
break; // Stop removing if we've reached active or recent connections
|
|
188
|
-
}
|
|
189
|
-
}
|
|
190
|
-
if (removed > 0) {
|
|
191
|
-
this.log('debug', `Removed ${removed} idle connections from pool for ${host}, ${connections.length} remaining`);
|
|
192
|
-
}
|
|
193
|
-
// Update the pool with the remaining connections
|
|
194
|
-
if (connections.length === 0) {
|
|
195
|
-
this.connectionPool.delete(host);
|
|
196
|
-
}
|
|
197
|
-
else {
|
|
198
|
-
this.connectionPool.set(host, connections);
|
|
199
|
-
}
|
|
200
|
-
}
|
|
201
|
-
}
|
|
202
|
-
/**
|
|
203
|
-
* Get a connection from the pool or create a new one
|
|
204
|
-
*/
|
|
205
|
-
getConnectionFromPool(host, port) {
|
|
206
|
-
return new Promise((resolve, reject) => {
|
|
207
|
-
const poolKey = `${host}:${port}`;
|
|
208
|
-
const connectionList = this.connectionPool.get(poolKey) || [];
|
|
209
|
-
// Look for an idle connection
|
|
210
|
-
const idleConnectionIndex = connectionList.findIndex(c => c.isIdle);
|
|
211
|
-
if (idleConnectionIndex >= 0) {
|
|
212
|
-
// Get existing connection from pool
|
|
213
|
-
const connection = connectionList[idleConnectionIndex];
|
|
214
|
-
connection.isIdle = false;
|
|
215
|
-
connection.lastUsed = Date.now();
|
|
216
|
-
this.log('debug', `Reusing connection from pool for ${poolKey}`);
|
|
217
|
-
// Update the pool
|
|
218
|
-
this.connectionPool.set(poolKey, connectionList);
|
|
219
|
-
resolve(connection.socket);
|
|
220
|
-
return;
|
|
221
|
-
}
|
|
222
|
-
// No idle connection available, create a new one if pool isn't full
|
|
223
|
-
if (connectionList.length < this.options.connectionPoolSize) {
|
|
224
|
-
this.log('debug', `Creating new connection to ${host}:${port}`);
|
|
225
|
-
try {
|
|
226
|
-
const socket = plugins.net.connect({
|
|
227
|
-
host,
|
|
228
|
-
port,
|
|
229
|
-
keepAlive: true,
|
|
230
|
-
keepAliveInitialDelay: 30000 // 30 seconds
|
|
231
|
-
});
|
|
232
|
-
socket.once('connect', () => {
|
|
233
|
-
// Add to connection pool
|
|
234
|
-
const connection = {
|
|
235
|
-
socket,
|
|
236
|
-
lastUsed: Date.now(),
|
|
237
|
-
isIdle: false
|
|
238
|
-
};
|
|
239
|
-
connectionList.push(connection);
|
|
240
|
-
this.connectionPool.set(poolKey, connectionList);
|
|
241
|
-
// Setup cleanup when the connection is closed
|
|
242
|
-
socket.once('close', () => {
|
|
243
|
-
const idx = connectionList.findIndex(c => c.socket === socket);
|
|
244
|
-
if (idx >= 0) {
|
|
245
|
-
connectionList.splice(idx, 1);
|
|
246
|
-
this.connectionPool.set(poolKey, connectionList);
|
|
247
|
-
this.log('debug', `Removed closed connection from pool for ${poolKey}`);
|
|
248
|
-
}
|
|
249
|
-
});
|
|
250
|
-
resolve(socket);
|
|
251
|
-
});
|
|
252
|
-
socket.once('error', (err) => {
|
|
253
|
-
this.log('error', `Error creating connection to ${host}:${port}`, err);
|
|
254
|
-
reject(err);
|
|
255
|
-
});
|
|
256
|
-
}
|
|
257
|
-
catch (err) {
|
|
258
|
-
this.log('error', `Failed to create connection to ${host}:${port}`, err);
|
|
259
|
-
reject(err);
|
|
260
|
-
}
|
|
261
|
-
}
|
|
262
|
-
else {
|
|
263
|
-
// Pool is full, wait for an idle connection or reject
|
|
264
|
-
this.log('warn', `Connection pool for ${poolKey} is full (${connectionList.length})`);
|
|
265
|
-
reject(new Error(`Connection pool for ${poolKey} is full`));
|
|
266
|
-
}
|
|
267
|
-
});
|
|
268
|
-
}
|
|
269
|
-
/**
|
|
270
|
-
* Return a connection to the pool for reuse
|
|
271
|
-
*/
|
|
272
|
-
returnConnectionToPool(socket, host, port) {
|
|
273
|
-
const poolKey = `${host}:${port}`;
|
|
274
|
-
const connectionList = this.connectionPool.get(poolKey) || [];
|
|
275
|
-
// Find this connection in the pool
|
|
276
|
-
const connectionIndex = connectionList.findIndex(c => c.socket === socket);
|
|
277
|
-
if (connectionIndex >= 0) {
|
|
278
|
-
// Mark as idle and update last used time
|
|
279
|
-
connectionList[connectionIndex].isIdle = true;
|
|
280
|
-
connectionList[connectionIndex].lastUsed = Date.now();
|
|
281
|
-
this.log('debug', `Returned connection to pool for ${poolKey}`);
|
|
282
|
-
}
|
|
283
|
-
else {
|
|
284
|
-
this.log('warn', `Attempted to return unknown connection to pool for ${poolKey}`);
|
|
285
|
-
}
|
|
286
|
-
}
|
|
287
|
-
/**
|
|
288
|
-
* Initializes the Port80Handler for ACME certificate management
|
|
289
|
-
* @private
|
|
290
|
-
*/
|
|
291
|
-
async initializePort80Handler() {
|
|
292
|
-
if (!this.options.acme.enabled) {
|
|
293
|
-
return;
|
|
294
|
-
}
|
|
295
|
-
// Create certificate manager
|
|
296
|
-
this.port80Handler = new Port80Handler({
|
|
297
|
-
port: this.options.acme.port,
|
|
298
|
-
contactEmail: this.options.acme.contactEmail,
|
|
299
|
-
useProduction: this.options.acme.useProduction,
|
|
300
|
-
renewThresholdDays: this.options.acme.renewThresholdDays,
|
|
301
|
-
httpsRedirectPort: this.options.port, // Redirect to our HTTPS port
|
|
302
|
-
renewCheckIntervalHours: 24 // Check daily for renewals
|
|
303
|
-
});
|
|
304
|
-
// Register event handlers
|
|
305
|
-
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_ISSUED, this.handleCertificateIssued.bind(this));
|
|
306
|
-
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_RENEWED, this.handleCertificateIssued.bind(this));
|
|
307
|
-
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_FAILED, this.handleCertificateFailed.bind(this));
|
|
308
|
-
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_EXPIRING, (data) => {
|
|
309
|
-
this.log('info', `Certificate for ${data.domain} expires in ${data.daysRemaining} days`);
|
|
310
|
-
});
|
|
311
|
-
// Start the handler
|
|
312
|
-
try {
|
|
313
|
-
await this.port80Handler.start();
|
|
314
|
-
this.log('info', `Port80Handler started on port ${this.options.acme.port}`);
|
|
315
|
-
// Add domains from proxy configs
|
|
316
|
-
this.registerDomainsWithPort80Handler();
|
|
317
|
-
}
|
|
318
|
-
catch (error) {
|
|
319
|
-
this.log('error', `Failed to start Port80Handler: ${error}`);
|
|
320
|
-
this.port80Handler = null;
|
|
321
|
-
}
|
|
322
|
-
}
|
|
323
|
-
/**
|
|
324
|
-
* Registers domains from proxy configs with the Port80Handler
|
|
325
|
-
* @private
|
|
326
|
-
*/
|
|
327
|
-
registerDomainsWithPort80Handler() {
|
|
328
|
-
if (!this.port80Handler)
|
|
329
|
-
return;
|
|
330
|
-
// Get all hostnames from proxy configs
|
|
331
|
-
this.proxyConfigs.forEach(config => {
|
|
332
|
-
const hostname = config.hostName;
|
|
333
|
-
// Skip wildcard domains - can't get certs for these with HTTP-01 validation
|
|
334
|
-
if (hostname.includes('*')) {
|
|
335
|
-
this.log('info', `Skipping wildcard domain for ACME: ${hostname}`);
|
|
336
|
-
return;
|
|
337
|
-
}
|
|
338
|
-
// Skip domains already with certificates if configured to do so
|
|
339
|
-
if (this.options.acme.skipConfiguredCerts) {
|
|
340
|
-
const cachedCert = this.certificateCache.get(hostname);
|
|
341
|
-
if (cachedCert) {
|
|
342
|
-
this.log('info', `Skipping domain with existing certificate: ${hostname}`);
|
|
343
|
-
return;
|
|
344
|
-
}
|
|
345
|
-
}
|
|
346
|
-
// Check for existing certificate in the store
|
|
347
|
-
const certPath = path.join(this.certificateStoreDir, `${hostname}.cert.pem`);
|
|
348
|
-
const keyPath = path.join(this.certificateStoreDir, `${hostname}.key.pem`);
|
|
349
|
-
try {
|
|
350
|
-
if (fs.existsSync(certPath) && fs.existsSync(keyPath)) {
|
|
351
|
-
// Load existing certificate and key
|
|
352
|
-
const cert = fs.readFileSync(certPath, 'utf8');
|
|
353
|
-
const key = fs.readFileSync(keyPath, 'utf8');
|
|
354
|
-
// Extract expiry date from certificate if possible
|
|
355
|
-
let expiryDate;
|
|
356
|
-
try {
|
|
357
|
-
const matches = cert.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
|
|
358
|
-
if (matches && matches[1]) {
|
|
359
|
-
expiryDate = new Date(matches[1]);
|
|
360
|
-
}
|
|
361
|
-
}
|
|
362
|
-
catch (error) {
|
|
363
|
-
this.log('warn', `Failed to extract expiry date from certificate for ${hostname}`);
|
|
364
|
-
}
|
|
365
|
-
// Update the certificate in the handler
|
|
366
|
-
this.port80Handler.setCertificate(hostname, cert, key, expiryDate);
|
|
367
|
-
// Also update our own certificate cache
|
|
368
|
-
this.updateCertificateCache(hostname, cert, key, expiryDate);
|
|
369
|
-
this.log('info', `Loaded existing certificate for ${hostname}`);
|
|
370
|
-
}
|
|
371
|
-
else {
|
|
372
|
-
// Register the domain for certificate issuance with new domain options format
|
|
373
|
-
const domainOptions = {
|
|
374
|
-
domainName: hostname,
|
|
375
|
-
sslRedirect: true,
|
|
376
|
-
acmeMaintenance: true
|
|
377
|
-
};
|
|
378
|
-
this.port80Handler.addDomain(domainOptions);
|
|
379
|
-
this.log('info', `Registered domain for ACME certificate issuance: ${hostname}`);
|
|
380
|
-
}
|
|
381
|
-
}
|
|
382
|
-
catch (error) {
|
|
383
|
-
this.log('error', `Error registering domain ${hostname} with Port80Handler: ${error}`);
|
|
384
|
-
}
|
|
385
|
-
});
|
|
386
|
-
}
|
|
387
|
-
/**
|
|
388
|
-
* Handles newly issued or renewed certificates from Port80Handler
|
|
389
|
-
* @private
|
|
390
|
-
*/
|
|
391
|
-
handleCertificateIssued(data) {
|
|
392
|
-
const { domain, certificate, privateKey, expiryDate } = data;
|
|
393
|
-
this.log('info', `Certificate ${this.certificateCache.has(domain) ? 'renewed' : 'issued'} for ${domain}, valid until ${expiryDate.toISOString()}`);
|
|
394
|
-
// Update certificate in HTTPS server
|
|
395
|
-
this.updateCertificateCache(domain, certificate, privateKey, expiryDate);
|
|
396
|
-
// Save the certificate to the filesystem
|
|
397
|
-
this.saveCertificateToStore(domain, certificate, privateKey);
|
|
398
|
-
}
|
|
399
|
-
/**
|
|
400
|
-
* Handles certificate issuance failures
|
|
401
|
-
* @private
|
|
402
|
-
*/
|
|
403
|
-
handleCertificateFailed(data) {
|
|
404
|
-
this.log('error', `Certificate issuance failed for ${data.domain}: ${data.error}`);
|
|
405
|
-
}
|
|
406
|
-
/**
|
|
407
|
-
* Saves certificate and private key to the filesystem
|
|
408
|
-
* @private
|
|
409
|
-
*/
|
|
410
|
-
saveCertificateToStore(domain, certificate, privateKey) {
|
|
411
|
-
try {
|
|
412
|
-
const certPath = path.join(this.certificateStoreDir, `${domain}.cert.pem`);
|
|
413
|
-
const keyPath = path.join(this.certificateStoreDir, `${domain}.key.pem`);
|
|
414
|
-
fs.writeFileSync(certPath, certificate);
|
|
415
|
-
fs.writeFileSync(keyPath, privateKey);
|
|
416
|
-
// Ensure private key has restricted permissions
|
|
417
|
-
try {
|
|
418
|
-
fs.chmodSync(keyPath, 0o600);
|
|
419
|
-
}
|
|
420
|
-
catch (error) {
|
|
421
|
-
this.log('warn', `Failed to set permissions on private key for ${domain}: ${error}`);
|
|
422
|
-
}
|
|
423
|
-
this.log('info', `Saved certificate for ${domain} to ${certPath}`);
|
|
424
|
-
}
|
|
425
|
-
catch (error) {
|
|
426
|
-
this.log('error', `Failed to save certificate for ${domain}: ${error}`);
|
|
427
|
-
}
|
|
428
|
-
}
|
|
429
|
-
/**
|
|
430
|
-
* Handles SNI (Server Name Indication) for TLS connections
|
|
431
|
-
* Used by the HTTPS server to select the correct certificate for each domain
|
|
432
|
-
* @private
|
|
433
|
-
*/
|
|
434
|
-
handleSNI(domain, cb) {
|
|
435
|
-
this.log('debug', `SNI request for domain: ${domain}`);
|
|
436
|
-
// Check if we have a certificate for this domain
|
|
437
|
-
const certs = this.certificateCache.get(domain);
|
|
438
|
-
if (certs) {
|
|
439
|
-
try {
|
|
440
|
-
// Create TLS context with the cached certificate
|
|
441
|
-
const context = plugins.tls.createSecureContext({
|
|
442
|
-
key: certs.key,
|
|
443
|
-
cert: certs.cert
|
|
444
|
-
});
|
|
445
|
-
this.log('debug', `Using cached certificate for ${domain}`);
|
|
446
|
-
cb(null, context);
|
|
447
|
-
return;
|
|
448
|
-
}
|
|
449
|
-
catch (err) {
|
|
450
|
-
this.log('error', `Error creating secure context for ${domain}:`, err);
|
|
451
|
-
}
|
|
452
|
-
}
|
|
453
|
-
// Check if we should trigger certificate issuance
|
|
454
|
-
if (this.options.acme?.enabled && this.port80Handler && !domain.includes('*')) {
|
|
455
|
-
// Check if this domain is already registered
|
|
456
|
-
const certData = this.port80Handler.getCertificate(domain);
|
|
457
|
-
if (!certData) {
|
|
458
|
-
this.log('info', `No certificate found for ${domain}, registering for issuance`);
|
|
459
|
-
// Register with new domain options format
|
|
460
|
-
const domainOptions = {
|
|
461
|
-
domainName: domain,
|
|
462
|
-
sslRedirect: true,
|
|
463
|
-
acmeMaintenance: true
|
|
464
|
-
};
|
|
465
|
-
this.port80Handler.addDomain(domainOptions);
|
|
466
|
-
}
|
|
467
|
-
}
|
|
468
|
-
// Fall back to default certificate
|
|
469
|
-
try {
|
|
470
|
-
const context = plugins.tls.createSecureContext({
|
|
471
|
-
key: this.defaultCertificates.key,
|
|
472
|
-
cert: this.defaultCertificates.cert
|
|
473
|
-
});
|
|
474
|
-
this.log('debug', `Using default certificate for ${domain}`);
|
|
475
|
-
cb(null, context);
|
|
476
|
-
}
|
|
477
|
-
catch (err) {
|
|
478
|
-
this.log('error', `Error creating default secure context:`, err);
|
|
479
|
-
cb(new Error('Cannot create secure context'), null);
|
|
480
|
-
}
|
|
481
|
-
}
|
|
482
|
-
/**
|
|
483
|
-
* Starts the proxy server
|
|
484
|
-
*/
|
|
485
|
-
async start() {
|
|
486
|
-
this.startTime = Date.now();
|
|
487
|
-
// Initialize Port80Handler if enabled
|
|
488
|
-
if (this.options.acme.enabled) {
|
|
489
|
-
await this.initializePort80Handler();
|
|
490
|
-
}
|
|
491
|
-
// Create the HTTPS server
|
|
492
|
-
this.httpsServer = plugins.https.createServer({
|
|
493
|
-
key: this.defaultCertificates.key,
|
|
494
|
-
cert: this.defaultCertificates.cert,
|
|
495
|
-
SNICallback: (domain, cb) => this.handleSNI(domain, cb)
|
|
496
|
-
}, (req, res) => this.handleRequest(req, res));
|
|
497
|
-
// Configure server timeouts
|
|
498
|
-
this.httpsServer.keepAliveTimeout = this.options.keepAliveTimeout;
|
|
499
|
-
this.httpsServer.headersTimeout = this.options.headersTimeout;
|
|
500
|
-
// Setup connection tracking
|
|
501
|
-
this.setupConnectionTracking();
|
|
502
|
-
// Setup WebSocket support
|
|
503
|
-
this.setupWebsocketSupport();
|
|
504
|
-
// Start metrics collection
|
|
505
|
-
this.setupMetricsCollection();
|
|
506
|
-
// Setup connection pool cleanup interval
|
|
507
|
-
this.setupConnectionPoolCleanup();
|
|
508
|
-
// Start the server
|
|
509
|
-
return new Promise((resolve) => {
|
|
510
|
-
this.httpsServer.listen(this.options.port, () => {
|
|
511
|
-
this.log('info', `NetworkProxy started on port ${this.options.port}`);
|
|
512
|
-
resolve();
|
|
513
|
-
});
|
|
514
|
-
});
|
|
515
|
-
}
|
|
516
|
-
/**
|
|
517
|
-
* Sets up tracking of TCP connections
|
|
518
|
-
*/
|
|
519
|
-
setupConnectionTracking() {
|
|
520
|
-
this.httpsServer.on('connection', (connection) => {
|
|
521
|
-
// Check if max connections reached
|
|
522
|
-
if (this.socketMap.getArray().length >= this.options.maxConnections) {
|
|
523
|
-
this.log('warn', `Max connections (${this.options.maxConnections}) reached, rejecting new connection`);
|
|
524
|
-
connection.destroy();
|
|
525
|
-
return;
|
|
526
|
-
}
|
|
527
|
-
// Add connection to tracking
|
|
528
|
-
this.socketMap.add(connection);
|
|
529
|
-
this.connectedClients = this.socketMap.getArray().length;
|
|
530
|
-
// Check for connection from PortProxy by inspecting the source port
|
|
531
|
-
// This is a heuristic - in a production environment you might use a more robust method
|
|
532
|
-
const localPort = connection.localPort;
|
|
533
|
-
const remotePort = connection.remotePort;
|
|
534
|
-
// If this connection is from a PortProxy (usually indicated by it coming from localhost)
|
|
535
|
-
if (this.options.portProxyIntegration && connection.remoteAddress?.includes('127.0.0.1')) {
|
|
536
|
-
this.portProxyConnections++;
|
|
537
|
-
this.log('debug', `New connection from PortProxy (local: ${localPort}, remote: ${remotePort})`);
|
|
538
|
-
}
|
|
539
|
-
else {
|
|
540
|
-
this.log('debug', `New direct connection (local: ${localPort}, remote: ${remotePort})`);
|
|
541
|
-
}
|
|
542
|
-
// Setup connection cleanup handlers
|
|
543
|
-
const cleanupConnection = () => {
|
|
544
|
-
if (this.socketMap.checkForObject(connection)) {
|
|
545
|
-
this.socketMap.remove(connection);
|
|
546
|
-
this.connectedClients = this.socketMap.getArray().length;
|
|
547
|
-
// If this was a PortProxy connection, decrement the counter
|
|
548
|
-
if (this.options.portProxyIntegration && connection.remoteAddress?.includes('127.0.0.1')) {
|
|
549
|
-
this.portProxyConnections--;
|
|
550
|
-
}
|
|
551
|
-
this.log('debug', `Connection closed. ${this.connectedClients} connections remaining`);
|
|
552
|
-
}
|
|
553
|
-
};
|
|
554
|
-
connection.on('close', cleanupConnection);
|
|
555
|
-
connection.on('error', (err) => {
|
|
556
|
-
this.log('debug', 'Connection error', err);
|
|
557
|
-
cleanupConnection();
|
|
558
|
-
});
|
|
559
|
-
connection.on('end', cleanupConnection);
|
|
560
|
-
connection.on('timeout', () => {
|
|
561
|
-
this.log('debug', 'Connection timeout');
|
|
562
|
-
cleanupConnection();
|
|
563
|
-
});
|
|
564
|
-
});
|
|
565
|
-
// Track TLS handshake completions
|
|
566
|
-
this.httpsServer.on('secureConnection', (tlsSocket) => {
|
|
567
|
-
this.tlsTerminatedConnections++;
|
|
568
|
-
this.log('debug', 'TLS handshake completed, connection secured');
|
|
569
|
-
});
|
|
570
|
-
}
|
|
571
|
-
/**
|
|
572
|
-
* Sets up WebSocket support
|
|
573
|
-
*/
|
|
574
|
-
setupWebsocketSupport() {
|
|
575
|
-
// Create WebSocket server
|
|
576
|
-
this.wsServer = new plugins.ws.WebSocketServer({
|
|
577
|
-
server: this.httpsServer,
|
|
578
|
-
// Add WebSocket specific timeout
|
|
579
|
-
clientTracking: true
|
|
580
|
-
});
|
|
581
|
-
// Handle WebSocket connections
|
|
582
|
-
this.wsServer.on('connection', (wsIncoming, reqArg) => {
|
|
583
|
-
this.handleWebSocketConnection(wsIncoming, reqArg);
|
|
584
|
-
});
|
|
585
|
-
// Set up the heartbeat interval (check every 30 seconds, terminate after 2 minutes of inactivity)
|
|
586
|
-
this.heartbeatInterval = setInterval(() => {
|
|
587
|
-
if (this.wsServer.clients.size === 0) {
|
|
588
|
-
return; // Skip if no active connections
|
|
589
|
-
}
|
|
590
|
-
this.log('debug', `WebSocket heartbeat check for ${this.wsServer.clients.size} clients`);
|
|
591
|
-
this.wsServer.clients.forEach((ws) => {
|
|
592
|
-
const wsWithHeartbeat = ws;
|
|
593
|
-
if (wsWithHeartbeat.isAlive === false) {
|
|
594
|
-
this.log('debug', 'Terminating inactive WebSocket connection');
|
|
595
|
-
return wsWithHeartbeat.terminate();
|
|
596
|
-
}
|
|
597
|
-
wsWithHeartbeat.isAlive = false;
|
|
598
|
-
wsWithHeartbeat.ping();
|
|
599
|
-
});
|
|
600
|
-
}, 30000);
|
|
601
|
-
}
|
|
602
|
-
/**
|
|
603
|
-
* Sets up metrics collection
|
|
604
|
-
*/
|
|
605
|
-
setupMetricsCollection() {
|
|
606
|
-
this.metricsInterval = setInterval(() => {
|
|
607
|
-
const uptime = Math.floor((Date.now() - this.startTime) / 1000);
|
|
608
|
-
const metrics = {
|
|
609
|
-
uptime,
|
|
610
|
-
activeConnections: this.connectedClients,
|
|
611
|
-
totalRequests: this.requestsServed,
|
|
612
|
-
failedRequests: this.failedRequests,
|
|
613
|
-
portProxyConnections: this.portProxyConnections,
|
|
614
|
-
tlsTerminatedConnections: this.tlsTerminatedConnections,
|
|
615
|
-
activeWebSockets: this.wsServer?.clients.size || 0,
|
|
616
|
-
memoryUsage: process.memoryUsage(),
|
|
617
|
-
activeContexts: Array.from(this.activeContexts),
|
|
618
|
-
connectionPool: Object.fromEntries(Array.from(this.connectionPool.entries()).map(([host, connections]) => [
|
|
619
|
-
host,
|
|
620
|
-
{
|
|
621
|
-
total: connections.length,
|
|
622
|
-
idle: connections.filter(c => c.isIdle).length
|
|
623
|
-
}
|
|
624
|
-
]))
|
|
625
|
-
};
|
|
626
|
-
this.log('debug', 'Proxy metrics', metrics);
|
|
627
|
-
}, 60000); // Log metrics every minute
|
|
628
|
-
}
|
|
629
|
-
/**
|
|
630
|
-
* Sets up connection pool cleanup
|
|
631
|
-
*/
|
|
632
|
-
setupConnectionPoolCleanup() {
|
|
633
|
-
// Clean up idle connections every minute
|
|
634
|
-
this.connectionPoolCleanupInterval = setInterval(() => {
|
|
635
|
-
this.cleanupConnectionPool();
|
|
636
|
-
}, 60000); // 1 minute
|
|
637
|
-
}
|
|
638
|
-
/**
|
|
639
|
-
* Handles an incoming WebSocket connection
|
|
640
|
-
*/
|
|
641
|
-
handleWebSocketConnection(wsIncoming, reqArg) {
|
|
642
|
-
const wsPath = reqArg.url;
|
|
643
|
-
const wsHost = reqArg.headers.host;
|
|
644
|
-
this.log('info', `WebSocket connection for ${wsHost}${wsPath}`);
|
|
645
|
-
// Setup heartbeat tracking
|
|
646
|
-
wsIncoming.isAlive = true;
|
|
647
|
-
wsIncoming.lastPong = Date.now();
|
|
648
|
-
wsIncoming.on('pong', () => {
|
|
649
|
-
wsIncoming.isAlive = true;
|
|
650
|
-
wsIncoming.lastPong = Date.now();
|
|
651
|
-
});
|
|
652
|
-
// Get the destination configuration
|
|
653
|
-
const wsDestinationConfig = this.router.routeReq(reqArg);
|
|
654
|
-
if (!wsDestinationConfig) {
|
|
655
|
-
this.log('warn', `No route found for WebSocket ${wsHost}${wsPath}`);
|
|
656
|
-
wsIncoming.terminate();
|
|
657
|
-
return;
|
|
658
|
-
}
|
|
659
|
-
// Check authentication if required
|
|
660
|
-
if (wsDestinationConfig.authentication) {
|
|
661
|
-
try {
|
|
662
|
-
if (!this.authenticateRequest(reqArg, wsDestinationConfig)) {
|
|
663
|
-
this.log('warn', `WebSocket authentication failed for ${wsHost}${wsPath}`);
|
|
664
|
-
wsIncoming.terminate();
|
|
665
|
-
return;
|
|
666
|
-
}
|
|
667
|
-
}
|
|
668
|
-
catch (error) {
|
|
669
|
-
this.log('error', 'WebSocket authentication error', error);
|
|
670
|
-
wsIncoming.terminate();
|
|
671
|
-
return;
|
|
672
|
-
}
|
|
673
|
-
}
|
|
674
|
-
// Setup outgoing WebSocket connection
|
|
675
|
-
let wsOutgoing;
|
|
676
|
-
const outGoingDeferred = plugins.smartpromise.defer();
|
|
677
|
-
try {
|
|
678
|
-
// Select destination IP and port for WebSocket
|
|
679
|
-
const wsDestinationIp = this.selectDestinationIp(wsDestinationConfig);
|
|
680
|
-
const wsDestinationPort = this.selectDestinationPort(wsDestinationConfig);
|
|
681
|
-
const wsTarget = `ws://${wsDestinationIp}:${wsDestinationPort}${reqArg.url}`;
|
|
682
|
-
this.log('debug', `Proxying WebSocket to ${wsTarget}`);
|
|
683
|
-
wsOutgoing = new plugins.wsDefault(wsTarget);
|
|
684
|
-
wsOutgoing.on('open', () => {
|
|
685
|
-
this.log('debug', 'Outgoing WebSocket connection established');
|
|
686
|
-
outGoingDeferred.resolve();
|
|
687
|
-
});
|
|
688
|
-
wsOutgoing.on('error', (error) => {
|
|
689
|
-
this.log('error', 'Outgoing WebSocket error', error);
|
|
690
|
-
outGoingDeferred.reject(error);
|
|
691
|
-
if (wsIncoming.readyState === wsIncoming.OPEN) {
|
|
692
|
-
wsIncoming.terminate();
|
|
693
|
-
}
|
|
694
|
-
});
|
|
695
|
-
}
|
|
696
|
-
catch (err) {
|
|
697
|
-
this.log('error', 'Failed to create outgoing WebSocket connection', err);
|
|
698
|
-
wsIncoming.terminate();
|
|
699
|
-
return;
|
|
700
|
-
}
|
|
701
|
-
// Handle message forwarding from client to backend
|
|
702
|
-
wsIncoming.on('message', async (message, isBinary) => {
|
|
703
|
-
try {
|
|
704
|
-
// Wait for outgoing connection to be ready
|
|
705
|
-
await outGoingDeferred.promise;
|
|
706
|
-
// Only forward if both connections are still open
|
|
707
|
-
if (wsOutgoing.readyState === wsOutgoing.OPEN) {
|
|
708
|
-
wsOutgoing.send(message, { binary: isBinary });
|
|
709
|
-
}
|
|
710
|
-
}
|
|
711
|
-
catch (error) {
|
|
712
|
-
this.log('error', 'Error forwarding WebSocket message to backend', error);
|
|
713
|
-
}
|
|
714
|
-
});
|
|
715
|
-
// Handle message forwarding from backend to client
|
|
716
|
-
wsOutgoing.on('message', (message, isBinary) => {
|
|
717
|
-
try {
|
|
718
|
-
// Only forward if the incoming connection is still open
|
|
719
|
-
if (wsIncoming.readyState === wsIncoming.OPEN) {
|
|
720
|
-
wsIncoming.send(message, { binary: isBinary });
|
|
721
|
-
}
|
|
722
|
-
}
|
|
723
|
-
catch (error) {
|
|
724
|
-
this.log('error', 'Error forwarding WebSocket message to client', error);
|
|
725
|
-
}
|
|
726
|
-
});
|
|
727
|
-
// Clean up connections when either side closes
|
|
728
|
-
wsIncoming.on('close', (code, reason) => {
|
|
729
|
-
this.log('debug', `Incoming WebSocket closed: ${code} - ${reason}`);
|
|
730
|
-
if (wsOutgoing && wsOutgoing.readyState !== wsOutgoing.CLOSED) {
|
|
731
|
-
try {
|
|
732
|
-
// Validate close code (must be 1000-4999) or use 1000 as default
|
|
733
|
-
const validCode = (code >= 1000 && code <= 4999) ? code : 1000;
|
|
734
|
-
wsOutgoing.close(validCode, reason.toString() || '');
|
|
735
|
-
}
|
|
736
|
-
catch (error) {
|
|
737
|
-
this.log('error', 'Error closing outgoing WebSocket', error);
|
|
738
|
-
wsOutgoing.terminate();
|
|
739
|
-
}
|
|
740
|
-
}
|
|
741
|
-
});
|
|
742
|
-
wsOutgoing.on('close', (code, reason) => {
|
|
743
|
-
this.log('debug', `Outgoing WebSocket closed: ${code} - ${reason}`);
|
|
744
|
-
if (wsIncoming && wsIncoming.readyState !== wsIncoming.CLOSED) {
|
|
745
|
-
try {
|
|
746
|
-
// Validate close code (must be 1000-4999) or use 1000 as default
|
|
747
|
-
const validCode = (code >= 1000 && code <= 4999) ? code : 1000;
|
|
748
|
-
wsIncoming.close(validCode, reason.toString() || '');
|
|
749
|
-
}
|
|
750
|
-
catch (error) {
|
|
751
|
-
this.log('error', 'Error closing incoming WebSocket', error);
|
|
752
|
-
wsIncoming.terminate();
|
|
753
|
-
}
|
|
754
|
-
}
|
|
755
|
-
});
|
|
756
|
-
}
|
|
757
|
-
/**
|
|
758
|
-
* Handles an HTTP/HTTPS request
|
|
759
|
-
*/
|
|
760
|
-
async handleRequest(originRequest, originResponse) {
|
|
761
|
-
this.requestsServed++;
|
|
762
|
-
const startTime = Date.now();
|
|
763
|
-
const reqId = `req_${Date.now()}_${Math.random().toString(36).substring(2, 7)}`;
|
|
764
|
-
try {
|
|
765
|
-
const reqPath = plugins.url.parse(originRequest.url).path;
|
|
766
|
-
this.log('info', `[${reqId}] ${originRequest.method} ${originRequest.headers.host}${reqPath}`);
|
|
767
|
-
// Handle preflight OPTIONS requests for CORS
|
|
768
|
-
if (originRequest.method === 'OPTIONS' && this.options.cors) {
|
|
769
|
-
this.handleCorsRequest(originRequest, originResponse);
|
|
770
|
-
return;
|
|
771
|
-
}
|
|
772
|
-
// Get destination configuration
|
|
773
|
-
const destinationConfig = this.router.routeReq(originRequest);
|
|
774
|
-
if (!destinationConfig) {
|
|
775
|
-
this.log('warn', `[${reqId}] No route found for ${originRequest.headers.host}`);
|
|
776
|
-
this.sendErrorResponse(originResponse, 404, 'Not Found: No matching route');
|
|
777
|
-
this.failedRequests++;
|
|
778
|
-
return;
|
|
779
|
-
}
|
|
780
|
-
// Handle authentication if configured
|
|
781
|
-
if (destinationConfig.authentication) {
|
|
782
|
-
try {
|
|
783
|
-
if (!this.authenticateRequest(originRequest, destinationConfig)) {
|
|
784
|
-
this.sendErrorResponse(originResponse, 401, 'Unauthorized', {
|
|
785
|
-
'WWW-Authenticate': 'Basic realm="Access to the proxy site", charset="UTF-8"'
|
|
786
|
-
});
|
|
787
|
-
this.failedRequests++;
|
|
788
|
-
return;
|
|
789
|
-
}
|
|
790
|
-
}
|
|
791
|
-
catch (error) {
|
|
792
|
-
this.log('error', `[${reqId}] Authentication error`, error);
|
|
793
|
-
this.sendErrorResponse(originResponse, 500, 'Internal Server Error: Authentication failed');
|
|
794
|
-
this.failedRequests++;
|
|
795
|
-
return;
|
|
796
|
-
}
|
|
797
|
-
}
|
|
798
|
-
// Determine if we should use connection pooling
|
|
799
|
-
const useConnectionPool = this.options.portProxyIntegration &&
|
|
800
|
-
originRequest.socket.remoteAddress?.includes('127.0.0.1');
|
|
801
|
-
// Select destination IP and port from the arrays
|
|
802
|
-
const destinationIp = this.selectDestinationIp(destinationConfig);
|
|
803
|
-
const destinationPort = this.selectDestinationPort(destinationConfig);
|
|
804
|
-
// Construct destination URL
|
|
805
|
-
const destinationUrl = `http://${destinationIp}:${destinationPort}${originRequest.url}`;
|
|
806
|
-
if (useConnectionPool) {
|
|
807
|
-
this.log('debug', `[${reqId}] Proxying to ${destinationUrl} (using connection pool)`);
|
|
808
|
-
await this.forwardRequestUsingConnectionPool(reqId, originRequest, originResponse, destinationIp, destinationPort, originRequest.url);
|
|
809
|
-
}
|
|
810
|
-
else {
|
|
811
|
-
this.log('debug', `[${reqId}] Proxying to ${destinationUrl}`);
|
|
812
|
-
await this.forwardRequest(reqId, originRequest, originResponse, destinationUrl);
|
|
813
|
-
}
|
|
814
|
-
const processingTime = Date.now() - startTime;
|
|
815
|
-
this.log('debug', `[${reqId}] Request completed in ${processingTime}ms`);
|
|
816
|
-
}
|
|
817
|
-
catch (error) {
|
|
818
|
-
this.log('error', `[${reqId}] Unhandled error in request handler`, error);
|
|
819
|
-
try {
|
|
820
|
-
this.sendErrorResponse(originResponse, 502, 'Bad Gateway: Server error');
|
|
821
|
-
}
|
|
822
|
-
catch (responseError) {
|
|
823
|
-
this.log('error', `[${reqId}] Failed to send error response`, responseError);
|
|
824
|
-
}
|
|
825
|
-
this.failedRequests++;
|
|
826
|
-
}
|
|
827
|
-
}
|
|
828
|
-
/**
|
|
829
|
-
* Handles a CORS preflight request
|
|
830
|
-
*/
|
|
831
|
-
handleCorsRequest(req, res) {
|
|
832
|
-
const cors = this.options.cors;
|
|
833
|
-
// Set CORS headers
|
|
834
|
-
res.setHeader('Access-Control-Allow-Origin', cors.allowOrigin);
|
|
835
|
-
res.setHeader('Access-Control-Allow-Methods', cors.allowMethods);
|
|
836
|
-
res.setHeader('Access-Control-Allow-Headers', cors.allowHeaders);
|
|
837
|
-
res.setHeader('Access-Control-Max-Age', String(cors.maxAge));
|
|
838
|
-
// Handle preflight request
|
|
839
|
-
res.statusCode = 204;
|
|
840
|
-
res.end();
|
|
841
|
-
// Count this as a request served
|
|
842
|
-
this.requestsServed++;
|
|
843
|
-
}
|
|
844
|
-
/**
|
|
845
|
-
* Authenticates a request against the destination config
|
|
846
|
-
*/
|
|
847
|
-
authenticateRequest(req, config) {
|
|
848
|
-
const authInfo = config.authentication;
|
|
849
|
-
if (!authInfo) {
|
|
850
|
-
return true; // No authentication required
|
|
851
|
-
}
|
|
852
|
-
switch (authInfo.type) {
|
|
853
|
-
case 'Basic': {
|
|
854
|
-
const authHeader = req.headers.authorization;
|
|
855
|
-
if (!authHeader || !authHeader.includes('Basic ')) {
|
|
856
|
-
return false;
|
|
857
|
-
}
|
|
858
|
-
const authStringBase64 = authHeader.replace('Basic ', '');
|
|
859
|
-
const authString = plugins.smartstring.base64.decode(authStringBase64);
|
|
860
|
-
const [user, pass] = authString.split(':');
|
|
861
|
-
// Use constant-time comparison to prevent timing attacks
|
|
862
|
-
const userMatch = user === authInfo.user;
|
|
863
|
-
const passMatch = pass === authInfo.pass;
|
|
864
|
-
return userMatch && passMatch;
|
|
865
|
-
}
|
|
866
|
-
default:
|
|
867
|
-
throw new Error(`Unsupported authentication method: ${authInfo.type}`);
|
|
868
|
-
}
|
|
869
|
-
}
|
|
870
|
-
/**
|
|
871
|
-
* Forwards a request to the destination using connection pool
|
|
872
|
-
* for optimized connection reuse from PortProxy
|
|
873
|
-
*/
|
|
874
|
-
async forwardRequestUsingConnectionPool(reqId, originRequest, originResponse, host, port, path) {
|
|
875
|
-
try {
|
|
876
|
-
// Try to get a connection from the pool
|
|
877
|
-
const socket = await this.getConnectionFromPool(host, port);
|
|
878
|
-
// Create an HTTP client request using the pooled socket
|
|
879
|
-
const reqOptions = {
|
|
880
|
-
createConnection: () => socket,
|
|
881
|
-
host,
|
|
882
|
-
port,
|
|
883
|
-
path,
|
|
884
|
-
method: originRequest.method,
|
|
885
|
-
headers: this.prepareForwardHeaders(originRequest),
|
|
886
|
-
timeout: 30000 // 30 second timeout
|
|
887
|
-
};
|
|
888
|
-
const proxyReq = plugins.http.request(reqOptions);
|
|
889
|
-
// Handle timeouts
|
|
890
|
-
proxyReq.on('timeout', () => {
|
|
891
|
-
this.log('warn', `[${reqId}] Request to ${host}:${port}${path} timed out`);
|
|
892
|
-
proxyReq.destroy();
|
|
893
|
-
});
|
|
894
|
-
// Handle errors
|
|
895
|
-
proxyReq.on('error', (err) => {
|
|
896
|
-
this.log('error', `[${reqId}] Error in proxy request to ${host}:${port}${path}`, err);
|
|
897
|
-
// Check if the client response is still writable
|
|
898
|
-
if (!originResponse.writableEnded) {
|
|
899
|
-
this.sendErrorResponse(originResponse, 502, 'Bad Gateway: Error communicating with upstream server');
|
|
900
|
-
}
|
|
901
|
-
// Don't return the socket to the pool on error
|
|
902
|
-
try {
|
|
903
|
-
if (!socket.destroyed) {
|
|
904
|
-
socket.destroy();
|
|
905
|
-
}
|
|
906
|
-
}
|
|
907
|
-
catch (socketErr) {
|
|
908
|
-
this.log('error', `[${reqId}] Error destroying socket after request error`, socketErr);
|
|
909
|
-
}
|
|
910
|
-
});
|
|
911
|
-
// Forward request body
|
|
912
|
-
originRequest.pipe(proxyReq);
|
|
913
|
-
// Handle response
|
|
914
|
-
proxyReq.on('response', (proxyRes) => {
|
|
915
|
-
// Copy status and headers
|
|
916
|
-
originResponse.statusCode = proxyRes.statusCode;
|
|
917
|
-
for (const [name, value] of Object.entries(proxyRes.headers)) {
|
|
918
|
-
if (value !== undefined) {
|
|
919
|
-
originResponse.setHeader(name, value);
|
|
920
|
-
}
|
|
921
|
-
}
|
|
922
|
-
// Forward the response body
|
|
923
|
-
proxyRes.pipe(originResponse);
|
|
924
|
-
// Return connection to pool when the response completes
|
|
925
|
-
proxyRes.on('end', () => {
|
|
926
|
-
if (!socket.destroyed) {
|
|
927
|
-
this.returnConnectionToPool(socket, host, port);
|
|
928
|
-
}
|
|
929
|
-
});
|
|
930
|
-
proxyRes.on('error', (err) => {
|
|
931
|
-
this.log('error', `[${reqId}] Error in proxy response from ${host}:${port}${path}`, err);
|
|
932
|
-
// Don't return the socket to the pool on error
|
|
933
|
-
try {
|
|
934
|
-
if (!socket.destroyed) {
|
|
935
|
-
socket.destroy();
|
|
936
|
-
}
|
|
937
|
-
}
|
|
938
|
-
catch (socketErr) {
|
|
939
|
-
this.log('error', `[${reqId}] Error destroying socket after response error`, socketErr);
|
|
940
|
-
}
|
|
941
|
-
});
|
|
942
|
-
});
|
|
943
|
-
}
|
|
944
|
-
catch (error) {
|
|
945
|
-
this.log('error', `[${reqId}] Error setting up pooled connection to ${host}:${port}`, error);
|
|
946
|
-
this.sendErrorResponse(originResponse, 502, 'Bad Gateway: Unable to reach upstream server');
|
|
947
|
-
throw error;
|
|
948
|
-
}
|
|
949
|
-
}
|
|
950
|
-
/**
|
|
951
|
-
* Forwards a request to the destination (standard method)
|
|
952
|
-
*/
|
|
953
|
-
async forwardRequest(reqId, originRequest, originResponse, destinationUrl) {
|
|
954
|
-
try {
|
|
955
|
-
const proxyRequest = await plugins.smartrequest.request(destinationUrl, {
|
|
956
|
-
method: originRequest.method,
|
|
957
|
-
headers: this.prepareForwardHeaders(originRequest),
|
|
958
|
-
keepAlive: true,
|
|
959
|
-
timeout: 30000 // 30 second timeout
|
|
960
|
-
}, true, // streaming
|
|
961
|
-
(proxyRequestStream) => this.setupRequestStreaming(originRequest, proxyRequestStream));
|
|
962
|
-
// Handle the response
|
|
963
|
-
this.processProxyResponse(reqId, originResponse, proxyRequest);
|
|
964
|
-
}
|
|
965
|
-
catch (error) {
|
|
966
|
-
this.log('error', `[${reqId}] Error forwarding request`, error);
|
|
967
|
-
this.sendErrorResponse(originResponse, 502, 'Bad Gateway: Unable to reach upstream server');
|
|
968
|
-
throw error; // Let the main handler catch this
|
|
969
|
-
}
|
|
970
|
-
}
|
|
971
|
-
/**
|
|
972
|
-
* Prepares headers to forward to the backend
|
|
973
|
-
*/
|
|
974
|
-
prepareForwardHeaders(req) {
|
|
975
|
-
const safeHeaders = { ...req.headers };
|
|
976
|
-
// Add forwarding headers
|
|
977
|
-
safeHeaders['X-Forwarded-Host'] = req.headers.host;
|
|
978
|
-
safeHeaders['X-Forwarded-Proto'] = 'https';
|
|
979
|
-
safeHeaders['X-Forwarded-For'] = (req.socket.remoteAddress || '').replace(/^::ffff:/, '');
|
|
980
|
-
// Add proxy-specific headers
|
|
981
|
-
safeHeaders['X-Proxy-Id'] = `NetworkProxy-${this.options.port}`;
|
|
982
|
-
// If this is coming from PortProxy, add a header to indicate that
|
|
983
|
-
if (this.options.portProxyIntegration && req.socket.remoteAddress?.includes('127.0.0.1')) {
|
|
984
|
-
safeHeaders['X-PortProxy-Forwarded'] = 'true';
|
|
985
|
-
}
|
|
986
|
-
// Remove sensitive headers we don't want to forward
|
|
987
|
-
const sensitiveHeaders = ['connection', 'upgrade', 'http2-settings'];
|
|
988
|
-
for (const header of sensitiveHeaders) {
|
|
989
|
-
delete safeHeaders[header];
|
|
990
|
-
}
|
|
991
|
-
return safeHeaders;
|
|
992
|
-
}
|
|
993
|
-
/**
|
|
994
|
-
* Sets up request streaming for the proxy
|
|
995
|
-
*/
|
|
996
|
-
setupRequestStreaming(originRequest, proxyRequest) {
|
|
997
|
-
// Forward request body data
|
|
998
|
-
originRequest.on('data', (chunk) => {
|
|
999
|
-
proxyRequest.write(chunk);
|
|
1000
|
-
});
|
|
1001
|
-
// End the request when done
|
|
1002
|
-
originRequest.on('end', () => {
|
|
1003
|
-
proxyRequest.end();
|
|
1004
|
-
});
|
|
1005
|
-
// Handle request errors
|
|
1006
|
-
originRequest.on('error', (error) => {
|
|
1007
|
-
this.log('error', 'Error in client request stream', error);
|
|
1008
|
-
proxyRequest.destroy(error);
|
|
1009
|
-
});
|
|
1010
|
-
// Handle client abort/timeout
|
|
1011
|
-
originRequest.on('close', () => {
|
|
1012
|
-
if (!originRequest.complete) {
|
|
1013
|
-
this.log('debug', 'Client closed connection before request completed');
|
|
1014
|
-
proxyRequest.destroy();
|
|
1015
|
-
}
|
|
1016
|
-
});
|
|
1017
|
-
originRequest.on('timeout', () => {
|
|
1018
|
-
this.log('debug', 'Client request timeout');
|
|
1019
|
-
proxyRequest.destroy(new Error('Client request timeout'));
|
|
1020
|
-
});
|
|
1021
|
-
// Handle proxy request errors
|
|
1022
|
-
proxyRequest.on('error', (error) => {
|
|
1023
|
-
this.log('error', 'Error in outgoing proxy request', error);
|
|
1024
|
-
});
|
|
1025
|
-
}
|
|
1026
|
-
/**
|
|
1027
|
-
* Processes a proxy response
|
|
1028
|
-
*/
|
|
1029
|
-
processProxyResponse(reqId, originResponse, proxyResponse) {
|
|
1030
|
-
this.log('debug', `[${reqId}] Received upstream response: ${proxyResponse.statusCode}`);
|
|
1031
|
-
// Set status code
|
|
1032
|
-
originResponse.statusCode = proxyResponse.statusCode;
|
|
1033
|
-
// Add default headers
|
|
1034
|
-
for (const [headerName, headerValue] of Object.entries(this.defaultHeaders)) {
|
|
1035
|
-
originResponse.setHeader(headerName, headerValue);
|
|
1036
|
-
}
|
|
1037
|
-
// Add CORS headers if enabled
|
|
1038
|
-
if (this.options.cors) {
|
|
1039
|
-
originResponse.setHeader('Access-Control-Allow-Origin', this.options.cors.allowOrigin);
|
|
1040
|
-
}
|
|
1041
|
-
// Copy response headers
|
|
1042
|
-
for (const [headerName, headerValue] of Object.entries(proxyResponse.headers)) {
|
|
1043
|
-
// Skip hop-by-hop headers
|
|
1044
|
-
const hopByHopHeaders = ['connection', 'keep-alive', 'transfer-encoding', 'te',
|
|
1045
|
-
'trailer', 'upgrade', 'proxy-authorization', 'proxy-authenticate'];
|
|
1046
|
-
if (!hopByHopHeaders.includes(headerName.toLowerCase())) {
|
|
1047
|
-
originResponse.setHeader(headerName, headerValue);
|
|
1048
|
-
}
|
|
1049
|
-
}
|
|
1050
|
-
// Stream response body
|
|
1051
|
-
proxyResponse.on('data', (chunk) => {
|
|
1052
|
-
const canContinue = originResponse.write(chunk);
|
|
1053
|
-
// Apply backpressure if needed
|
|
1054
|
-
if (!canContinue) {
|
|
1055
|
-
proxyResponse.pause();
|
|
1056
|
-
originResponse.once('drain', () => {
|
|
1057
|
-
proxyResponse.resume();
|
|
1058
|
-
});
|
|
1059
|
-
}
|
|
1060
|
-
});
|
|
1061
|
-
// End the response when done
|
|
1062
|
-
proxyResponse.on('end', () => {
|
|
1063
|
-
originResponse.end();
|
|
1064
|
-
});
|
|
1065
|
-
// Handle response errors
|
|
1066
|
-
proxyResponse.on('error', (error) => {
|
|
1067
|
-
this.log('error', `[${reqId}] Error in proxy response stream`, error);
|
|
1068
|
-
originResponse.destroy(error);
|
|
1069
|
-
});
|
|
1070
|
-
originResponse.on('error', (error) => {
|
|
1071
|
-
this.log('error', `[${reqId}] Error in client response stream`, error);
|
|
1072
|
-
proxyResponse.destroy();
|
|
1073
|
-
});
|
|
1074
|
-
}
|
|
1075
|
-
/**
|
|
1076
|
-
* Sends an error response to the client
|
|
1077
|
-
*/
|
|
1078
|
-
sendErrorResponse(res, statusCode = 500, message = 'Internal Server Error', headers = {}) {
|
|
1079
|
-
try {
|
|
1080
|
-
// If headers already sent, just end the response
|
|
1081
|
-
if (res.headersSent) {
|
|
1082
|
-
res.end();
|
|
1083
|
-
return;
|
|
1084
|
-
}
|
|
1085
|
-
// Add default headers
|
|
1086
|
-
for (const [key, value] of Object.entries(this.defaultHeaders)) {
|
|
1087
|
-
res.setHeader(key, value);
|
|
1088
|
-
}
|
|
1089
|
-
// Add provided headers
|
|
1090
|
-
for (const [key, value] of Object.entries(headers)) {
|
|
1091
|
-
res.setHeader(key, value);
|
|
1092
|
-
}
|
|
1093
|
-
// Send error response
|
|
1094
|
-
res.writeHead(statusCode, message);
|
|
1095
|
-
// Send error body as JSON for API clients
|
|
1096
|
-
if (res.getHeader('Content-Type') === 'application/json') {
|
|
1097
|
-
res.end(JSON.stringify({ error: { status: statusCode, message } }));
|
|
1098
|
-
}
|
|
1099
|
-
else {
|
|
1100
|
-
// Send as plain text
|
|
1101
|
-
res.end(message);
|
|
1102
|
-
}
|
|
1103
|
-
}
|
|
1104
|
-
catch (error) {
|
|
1105
|
-
this.log('error', 'Error sending error response', error);
|
|
1106
|
-
try {
|
|
1107
|
-
res.destroy();
|
|
1108
|
-
}
|
|
1109
|
-
catch (destroyError) {
|
|
1110
|
-
// Last resort - nothing more we can do
|
|
1111
|
-
}
|
|
1112
|
-
}
|
|
1113
|
-
}
|
|
1114
|
-
/**
|
|
1115
|
-
* Selects a destination IP from the array using round-robin
|
|
1116
|
-
* @param config The proxy configuration
|
|
1117
|
-
* @returns A destination IP address
|
|
1118
|
-
*/
|
|
1119
|
-
selectDestinationIp(config) {
|
|
1120
|
-
// For array-based configs
|
|
1121
|
-
if (Array.isArray(config.destinationIps) && config.destinationIps.length > 0) {
|
|
1122
|
-
// Get the current position or initialize it
|
|
1123
|
-
const key = `ip_${config.hostName}`;
|
|
1124
|
-
let position = this.roundRobinPositions.get(key) || 0;
|
|
1125
|
-
// Select the IP using round-robin
|
|
1126
|
-
const selectedIp = config.destinationIps[position];
|
|
1127
|
-
// Update the position for next time
|
|
1128
|
-
position = (position + 1) % config.destinationIps.length;
|
|
1129
|
-
this.roundRobinPositions.set(key, position);
|
|
1130
|
-
return selectedIp;
|
|
1131
|
-
}
|
|
1132
|
-
// For backward compatibility with test suites that rely on specific behavior
|
|
1133
|
-
// Check if there's a proxyConfigs entry that matches this hostname
|
|
1134
|
-
const matchingConfig = this.proxyConfigs.find(cfg => cfg.hostName === config.hostName &&
|
|
1135
|
-
cfg.destinationIp);
|
|
1136
|
-
if (matchingConfig) {
|
|
1137
|
-
return matchingConfig.destinationIp;
|
|
1138
|
-
}
|
|
1139
|
-
// Fallback to localhost
|
|
1140
|
-
return 'localhost';
|
|
1141
|
-
}
|
|
1142
|
-
/**
|
|
1143
|
-
* Selects a destination port from the array using round-robin
|
|
1144
|
-
* @param config The proxy configuration
|
|
1145
|
-
* @returns A destination port number
|
|
1146
|
-
*/
|
|
1147
|
-
selectDestinationPort(config) {
|
|
1148
|
-
// For array-based configs
|
|
1149
|
-
if (Array.isArray(config.destinationPorts) && config.destinationPorts.length > 0) {
|
|
1150
|
-
// Get the current position or initialize it
|
|
1151
|
-
const key = `port_${config.hostName}`;
|
|
1152
|
-
let position = this.roundRobinPositions.get(key) || 0;
|
|
1153
|
-
// Select the port using round-robin
|
|
1154
|
-
const selectedPort = config.destinationPorts[position];
|
|
1155
|
-
// Update the position for next time
|
|
1156
|
-
position = (position + 1) % config.destinationPorts.length;
|
|
1157
|
-
this.roundRobinPositions.set(key, position);
|
|
1158
|
-
return selectedPort;
|
|
1159
|
-
}
|
|
1160
|
-
// For backward compatibility with test suites that rely on specific behavior
|
|
1161
|
-
// Check if there's a proxyConfigs entry that matches this hostname
|
|
1162
|
-
const matchingConfig = this.proxyConfigs.find(cfg => cfg.hostName === config.hostName &&
|
|
1163
|
-
cfg.destinationPort);
|
|
1164
|
-
if (matchingConfig) {
|
|
1165
|
-
return parseInt(matchingConfig.destinationPort, 10);
|
|
1166
|
-
}
|
|
1167
|
-
// Fallback to port 80
|
|
1168
|
-
return 80;
|
|
1169
|
-
}
|
|
1170
|
-
/**
|
|
1171
|
-
* Updates proxy configurations
|
|
1172
|
-
*/
|
|
1173
|
-
async updateProxyConfigs(proxyConfigsArg) {
|
|
1174
|
-
this.log('info', `Updating proxy configurations (${proxyConfigsArg.length} configs)`);
|
|
1175
|
-
// Update internal configs
|
|
1176
|
-
this.proxyConfigs = proxyConfigsArg;
|
|
1177
|
-
this.router.setNewProxyConfigs(proxyConfigsArg);
|
|
1178
|
-
// Collect all hostnames for cleanup later
|
|
1179
|
-
const currentHostNames = new Set();
|
|
1180
|
-
// Add/update SSL contexts for each host
|
|
1181
|
-
for (const config of proxyConfigsArg) {
|
|
1182
|
-
currentHostNames.add(config.hostName);
|
|
1183
|
-
try {
|
|
1184
|
-
// Check if we need to update the cert
|
|
1185
|
-
const currentCert = this.certificateCache.get(config.hostName);
|
|
1186
|
-
const shouldUpdate = !currentCert ||
|
|
1187
|
-
currentCert.key !== config.privateKey ||
|
|
1188
|
-
currentCert.cert !== config.publicKey;
|
|
1189
|
-
if (shouldUpdate) {
|
|
1190
|
-
this.log('debug', `Updating SSL context for ${config.hostName}`);
|
|
1191
|
-
// Update the HTTPS server context
|
|
1192
|
-
this.httpsServer.addContext(config.hostName, {
|
|
1193
|
-
key: config.privateKey,
|
|
1194
|
-
cert: config.publicKey
|
|
1195
|
-
});
|
|
1196
|
-
// Update the cache
|
|
1197
|
-
this.certificateCache.set(config.hostName, {
|
|
1198
|
-
key: config.privateKey,
|
|
1199
|
-
cert: config.publicKey
|
|
1200
|
-
});
|
|
1201
|
-
this.activeContexts.add(config.hostName);
|
|
1202
|
-
}
|
|
1203
|
-
}
|
|
1204
|
-
catch (error) {
|
|
1205
|
-
this.log('error', `Failed to add SSL context for ${config.hostName}`, error);
|
|
1206
|
-
}
|
|
1207
|
-
}
|
|
1208
|
-
// Clean up removed contexts
|
|
1209
|
-
// Note: Node.js doesn't officially support removing contexts
|
|
1210
|
-
// This would require server restart in production
|
|
1211
|
-
for (const hostname of this.activeContexts) {
|
|
1212
|
-
if (!currentHostNames.has(hostname)) {
|
|
1213
|
-
this.log('info', `Hostname ${hostname} removed from configuration`);
|
|
1214
|
-
this.activeContexts.delete(hostname);
|
|
1215
|
-
this.certificateCache.delete(hostname);
|
|
1216
|
-
}
|
|
1217
|
-
}
|
|
1218
|
-
}
|
|
1219
|
-
/**
|
|
1220
|
-
* Converts PortProxy domain configurations to NetworkProxy configs
|
|
1221
|
-
* @param domainConfigs PortProxy domain configs
|
|
1222
|
-
* @param sslKeyPair Default SSL key pair to use if not specified
|
|
1223
|
-
* @returns Array of NetworkProxy configs
|
|
1224
|
-
*/
|
|
1225
|
-
convertPortProxyConfigs(domainConfigs, sslKeyPair) {
|
|
1226
|
-
const proxyConfigs = [];
|
|
1227
|
-
// Use default certificates if not provided
|
|
1228
|
-
const sslKey = sslKeyPair?.key || this.defaultCertificates.key;
|
|
1229
|
-
const sslCert = sslKeyPair?.cert || this.defaultCertificates.cert;
|
|
1230
|
-
for (const domainConfig of domainConfigs) {
|
|
1231
|
-
// Each domain in the domains array gets its own config
|
|
1232
|
-
for (const domain of domainConfig.domains) {
|
|
1233
|
-
// Skip non-hostname patterns (like IP addresses)
|
|
1234
|
-
if (domain.match(/^\d+\.\d+\.\d+\.\d+$/) || domain === '*' || domain === 'localhost') {
|
|
1235
|
-
continue;
|
|
1236
|
-
}
|
|
1237
|
-
proxyConfigs.push({
|
|
1238
|
-
hostName: domain,
|
|
1239
|
-
destinationIps: domainConfig.targetIPs || ['localhost'],
|
|
1240
|
-
destinationPorts: [this.options.port], // Use the NetworkProxy port
|
|
1241
|
-
privateKey: sslKey,
|
|
1242
|
-
publicKey: sslCert
|
|
1243
|
-
});
|
|
1244
|
-
}
|
|
1245
|
-
}
|
|
1246
|
-
this.log('info', `Converted ${domainConfigs.length} PortProxy configs to ${proxyConfigs.length} NetworkProxy configs`);
|
|
1247
|
-
return proxyConfigs;
|
|
1248
|
-
}
|
|
1249
|
-
/**
|
|
1250
|
-
* Adds default headers to be included in all responses
|
|
1251
|
-
*/
|
|
1252
|
-
async addDefaultHeaders(headersArg) {
|
|
1253
|
-
this.log('info', 'Adding default headers', headersArg);
|
|
1254
|
-
this.defaultHeaders = {
|
|
1255
|
-
...this.defaultHeaders,
|
|
1256
|
-
...headersArg
|
|
1257
|
-
};
|
|
1258
|
-
}
|
|
1259
|
-
/**
|
|
1260
|
-
* Stops the proxy server
|
|
1261
|
-
*/
|
|
1262
|
-
async stop() {
|
|
1263
|
-
this.log('info', 'Stopping NetworkProxy server');
|
|
1264
|
-
// Clear intervals
|
|
1265
|
-
if (this.heartbeatInterval) {
|
|
1266
|
-
clearInterval(this.heartbeatInterval);
|
|
1267
|
-
}
|
|
1268
|
-
if (this.metricsInterval) {
|
|
1269
|
-
clearInterval(this.metricsInterval);
|
|
1270
|
-
}
|
|
1271
|
-
if (this.connectionPoolCleanupInterval) {
|
|
1272
|
-
clearInterval(this.connectionPoolCleanupInterval);
|
|
1273
|
-
}
|
|
1274
|
-
// Close WebSocket server if exists
|
|
1275
|
-
if (this.wsServer) {
|
|
1276
|
-
for (const client of this.wsServer.clients) {
|
|
1277
|
-
try {
|
|
1278
|
-
client.terminate();
|
|
1279
|
-
}
|
|
1280
|
-
catch (error) {
|
|
1281
|
-
this.log('error', 'Error terminating WebSocket client', error);
|
|
1282
|
-
}
|
|
1283
|
-
}
|
|
1284
|
-
}
|
|
1285
|
-
// Close all tracked sockets
|
|
1286
|
-
for (const socket of this.socketMap.getArray()) {
|
|
1287
|
-
try {
|
|
1288
|
-
socket.destroy();
|
|
1289
|
-
}
|
|
1290
|
-
catch (error) {
|
|
1291
|
-
this.log('error', 'Error destroying socket', error);
|
|
1292
|
-
}
|
|
1293
|
-
}
|
|
1294
|
-
// Close all connection pool connections
|
|
1295
|
-
for (const [host, connections] of this.connectionPool.entries()) {
|
|
1296
|
-
for (const connection of connections) {
|
|
1297
|
-
try {
|
|
1298
|
-
if (!connection.socket.destroyed) {
|
|
1299
|
-
connection.socket.destroy();
|
|
1300
|
-
}
|
|
1301
|
-
}
|
|
1302
|
-
catch (error) {
|
|
1303
|
-
this.log('error', `Error destroying pooled connection to ${host}`, error);
|
|
1304
|
-
}
|
|
1305
|
-
}
|
|
1306
|
-
}
|
|
1307
|
-
this.connectionPool.clear();
|
|
1308
|
-
// Stop Port80Handler if it's running
|
|
1309
|
-
if (this.port80Handler) {
|
|
1310
|
-
try {
|
|
1311
|
-
await this.port80Handler.stop();
|
|
1312
|
-
this.log('info', 'Port80Handler stopped');
|
|
1313
|
-
}
|
|
1314
|
-
catch (error) {
|
|
1315
|
-
this.log('error', 'Error stopping Port80Handler', error);
|
|
1316
|
-
}
|
|
1317
|
-
}
|
|
1318
|
-
// Close the HTTPS server
|
|
1319
|
-
return new Promise((resolve) => {
|
|
1320
|
-
this.httpsServer.close(() => {
|
|
1321
|
-
this.log('info', 'NetworkProxy server stopped successfully');
|
|
1322
|
-
resolve();
|
|
1323
|
-
});
|
|
1324
|
-
});
|
|
1325
|
-
}
|
|
1326
|
-
/**
|
|
1327
|
-
* Requests a new certificate for a domain
|
|
1328
|
-
* This can be used to manually trigger certificate issuance
|
|
1329
|
-
* @param domain The domain to request a certificate for
|
|
1330
|
-
* @returns A promise that resolves when the request is submitted (not when the certificate is issued)
|
|
1331
|
-
*/
|
|
1332
|
-
async requestCertificate(domain) {
|
|
1333
|
-
if (!this.options.acme.enabled) {
|
|
1334
|
-
this.log('warn', 'ACME certificate management is not enabled');
|
|
1335
|
-
return false;
|
|
1336
|
-
}
|
|
1337
|
-
if (!this.port80Handler) {
|
|
1338
|
-
this.log('error', 'Port80Handler is not initialized');
|
|
1339
|
-
return false;
|
|
1340
|
-
}
|
|
1341
|
-
// Skip wildcard domains - can't get certs for these with HTTP-01 validation
|
|
1342
|
-
if (domain.includes('*')) {
|
|
1343
|
-
this.log('error', `Cannot request certificate for wildcard domain: ${domain}`);
|
|
1344
|
-
return false;
|
|
1345
|
-
}
|
|
1346
|
-
try {
|
|
1347
|
-
// Use the new domain options format
|
|
1348
|
-
const domainOptions = {
|
|
1349
|
-
domainName: domain,
|
|
1350
|
-
sslRedirect: true,
|
|
1351
|
-
acmeMaintenance: true
|
|
1352
|
-
};
|
|
1353
|
-
this.port80Handler.addDomain(domainOptions);
|
|
1354
|
-
this.log('info', `Certificate request submitted for domain: ${domain}`);
|
|
1355
|
-
return true;
|
|
1356
|
-
}
|
|
1357
|
-
catch (error) {
|
|
1358
|
-
this.log('error', `Error requesting certificate for domain ${domain}:`, error);
|
|
1359
|
-
return false;
|
|
1360
|
-
}
|
|
1361
|
-
}
|
|
1362
|
-
/**
|
|
1363
|
-
* Updates the certificate cache for a domain
|
|
1364
|
-
* @param domain The domain name
|
|
1365
|
-
* @param certificate The certificate (PEM format)
|
|
1366
|
-
* @param privateKey The private key (PEM format)
|
|
1367
|
-
* @param expiryDate Optional expiry date
|
|
1368
|
-
*/
|
|
1369
|
-
updateCertificateCache(domain, certificate, privateKey, expiryDate) {
|
|
1370
|
-
// Update certificate context in HTTPS server if it's running
|
|
1371
|
-
if (this.httpsServer) {
|
|
1372
|
-
try {
|
|
1373
|
-
this.httpsServer.addContext(domain, {
|
|
1374
|
-
key: privateKey,
|
|
1375
|
-
cert: certificate
|
|
1376
|
-
});
|
|
1377
|
-
this.log('debug', `Updated SSL context for domain: ${domain}`);
|
|
1378
|
-
}
|
|
1379
|
-
catch (error) {
|
|
1380
|
-
this.log('error', `Error updating SSL context for domain ${domain}:`, error);
|
|
1381
|
-
}
|
|
1382
|
-
}
|
|
1383
|
-
// Update certificate in cache
|
|
1384
|
-
this.certificateCache.set(domain, {
|
|
1385
|
-
key: privateKey,
|
|
1386
|
-
cert: certificate,
|
|
1387
|
-
expires: expiryDate
|
|
1388
|
-
});
|
|
1389
|
-
// Add to active contexts set
|
|
1390
|
-
this.activeContexts.add(domain);
|
|
1391
|
-
}
|
|
1392
|
-
/**
|
|
1393
|
-
* Logs a message according to the configured log level
|
|
1394
|
-
*/
|
|
1395
|
-
log(level, message, data) {
|
|
1396
|
-
const logLevels = {
|
|
1397
|
-
error: 0,
|
|
1398
|
-
warn: 1,
|
|
1399
|
-
info: 2,
|
|
1400
|
-
debug: 3
|
|
1401
|
-
};
|
|
1402
|
-
// Skip if log level is higher than configured
|
|
1403
|
-
if (logLevels[level] > logLevels[this.options.logLevel]) {
|
|
1404
|
-
return;
|
|
1405
|
-
}
|
|
1406
|
-
const timestamp = new Date().toISOString();
|
|
1407
|
-
const prefix = `[${timestamp}] [${level.toUpperCase()}]`;
|
|
1408
|
-
switch (level) {
|
|
1409
|
-
case 'error':
|
|
1410
|
-
console.error(`${prefix} ${message}`, data || '');
|
|
1411
|
-
break;
|
|
1412
|
-
case 'warn':
|
|
1413
|
-
console.warn(`${prefix} ${message}`, data || '');
|
|
1414
|
-
break;
|
|
1415
|
-
case 'info':
|
|
1416
|
-
console.log(`${prefix} ${message}`, data || '');
|
|
1417
|
-
break;
|
|
1418
|
-
case 'debug':
|
|
1419
|
-
console.log(`${prefix} ${message}`, data || '');
|
|
1420
|
-
break;
|
|
1421
|
-
}
|
|
1422
|
-
}
|
|
1423
|
-
}
|
|
1424
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.networkproxy.js","sourceRoot":"","sources":["../ts/classes.networkproxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,cAAc,CAAC;AACxC,OAAO,EAAE,WAAW,EAAE,MAAM,qBAAqB,CAAC;AAClD,OAAO,EAAE,aAAa,EAAE,mBAAmB,EAAuB,MAAM,4BAA4B,CAAC;AACrG,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,EAAE,aAAa,EAAE,MAAM,KAAK,CAAC;AAqCpC,MAAM,OAAO,YAAY;IA8CvB;;OAEG;IACH,YAAY,UAAgC;QA9CrC,iBAAY,GAAkD,EAAE,CAAC;QACjE,mBAAc,GAA8B,EAAE,CAAC;QAMtD,iBAAiB;QACV,WAAM,GAAG,IAAI,WAAW,EAAE,CAAC;QAC3B,cAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,EAAsB,CAAC;QAC5D,mBAAc,GAAgB,IAAI,GAAG,EAAE,CAAC;QACxC,qBAAgB,GAAW,CAAC,CAAC;QAC7B,cAAS,GAAW,CAAC,CAAC;QACtB,mBAAc,GAAW,CAAC,CAAC;QAC3B,mBAAc,GAAW,CAAC,CAAC;QAElC,yCAAyC;QACjC,yBAAoB,GAAW,CAAC,CAAC;QACjC,6BAAwB,GAAW,CAAC,CAAC;QASrC,qBAAgB,GAA+D,IAAI,GAAG,EAAE,CAAC;QAEjG,2CAA2C;QACnC,kBAAa,GAAyB,IAAI,CAAC;QAGnD,8CAA8C;QACtC,mBAAc,GAIhB,IAAI,GAAG,EAAE,CAAC;QAEhB,iDAAiD;QACzC,wBAAmB,GAAwB,IAAI,GAAG,EAAE,CAAC;QAM3D,sBAAsB;QACtB,IAAI,CAAC,OAAO,GAAG;YACb,IAAI,EAAE,UAAU,CAAC,IAAI;YACrB,cAAc,EAAE,UAAU,CAAC,cAAc,IAAI,KAAK;YAClD,gBAAgB,EAAE,UAAU,CAAC,gBAAgB,IAAI,MAAM,EAAE,aAAa;YACtE,cAAc,EAAE,UAAU,CAAC,cAAc,IAAI,KAAK,EAAE,WAAW;YAC/D,QAAQ,EAAE,UAAU,CAAC,QAAQ,IAAI,MAAM;YACvC,IAAI,EAAE,UAAU,CAAC,IAAI,IAAI;gBACvB,WAAW,EAAE,GAAG;gBAChB,YAAY,EAAE,iCAAiC;gBAC/C,YAAY,EAAE,6BAA6B;gBAC3C,MAAM,EAAE,KAAK;aACd;YACD,yCAAyC;YACzC,kBAAkB,EAAE,UAAU,CAAC,kBAAkB,IAAI,EAAE;YACvD,oBAAoB,EAAE,UAAU,CAAC,oBAAoB,IAAI,KAAK;YAC9D,uBAAuB;YACvB,IAAI,EAAE;gBACJ,OAAO,EAAE,UAAU,CAAC,IAAI,EAAE,OAAO,IAAI,KAAK;gBAC1C,IAAI,EAAE,UAAU,CAAC,IAAI,EAAE,IAAI,IAAI,EAAE;gBACjC,YAAY,EAAE,UAAU,CAAC,IAAI,EAAE,YAAY,IAAI,mBAAmB;gBAClE,aAAa,EAAE,UAAU,CAAC,IAAI,EAAE,aAAa,IAAI,KAAK,EAAE,gCAAgC;gBACxF,kBAAkB,EAAE,UAAU,CAAC,IAAI,EAAE,kBAAkB,IAAI,EAAE;gBAC7D,SAAS,EAAE,UAAU,CAAC,IAAI,EAAE,SAAS,KAAK,KAAK,EAAE,kBAAkB;gBACnE,gBAAgB,EAAE,UAAU,CAAC,IAAI,EAAE,gBAAgB,IAAI,SAAS;gBAChE,mBAAmB,EAAE,UAAU,CAAC,IAAI,EAAE,mBAAmB,IAAI,KAAK;aACnE;SACF,CAAC;QAEF,qCAAqC;QACrC,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;QAE5E,4CAA4C;QAC5C,IAAI,CAAC;YACH,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC;gBAC7C,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,mBAAmB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC5D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,wCAAwC,IAAI,CAAC,mBAAmB,EAAE,CAAC,CAAC;YACvF,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iDAAiD,KAAK,EAAE,CAAC,CAAC;QAC7E,CAAC;QAED,IAAI,CAAC,uBAAuB,EAAE,CAAC;IACjC,CAAC;IAED;;OAEG;IACK,uBAAuB;QAC7B,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;QAE/D,IAAI,CAAC;YACH,IAAI,CAAC,mBAAmB,GAAG;gBACzB,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,SAAS,CAAC,EAAE,MAAM,CAAC;gBAC5D,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,UAAU,CAAC,EAAE,MAAM,CAAC;aAC/D,CAAC;YACF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,CAAC,CAAC;QAC/D,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,oCAAoC,EAAE,KAAK,CAAC,CAAC;YAE/D,6CAA6C;YAC7C,IAAI,CAAC;gBACH,+DAA+D;gBAC/D,sFAAsF;gBACtF,IAAI,CAAC,mBAAmB,GAAG;oBACzB,GAAG,EAAE,sBAAsB;oBAC3B,IAAI,EAAE,uBAAuB;iBAC9B,CAAC;gBACF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yCAAyC,CAAC,CAAC;YAC9D,CAAC;YAAC,OAAO,aAAa,EAAE,CAAC;gBACvB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,0CAA0C,EAAE,aAAa,CAAC,CAAC;gBAC7E,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;YACjE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,gBAAgB;QACrB,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;IAC3B,CAAC;IAED;;;;;OAKG;IACI,cAAc,CAAC,cAAuB,EAAE,gBAAyB,EAAE,kBAA2B;QACnG,IAAI,cAAc,KAAK,SAAS,EAAE,CAAC;YACjC,IAAI,CAAC,OAAO,CAAC,cAAc,GAAG,cAAc,CAAC;YAC7C,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,cAAc,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,IAAI,gBAAgB,KAAK,SAAS,EAAE,CAAC;YACnC,IAAI,CAAC,OAAO,CAAC,gBAAgB,GAAG,gBAAgB,CAAC;YAEjD,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;gBACrB,IAAI,CAAC,WAAW,CAAC,gBAAgB,GAAG,gBAAgB,CAAC;gBACrD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iCAAiC,gBAAgB,IAAI,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC;QAED,IAAI,kBAAkB,KAAK,SAAS,EAAE,CAAC;YACrC,IAAI,CAAC,OAAO,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;YACrD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,kBAAkB,EAAE,CAAC,CAAC;YAE1E,iEAAiE;YACjE,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC/B,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,UAAU;QACf,OAAO;YACL,iBAAiB,EAAE,IAAI,CAAC,gBAAgB;YACxC,aAAa,EAAE,IAAI,CAAC,cAAc;YAClC,cAAc,EAAE,IAAI,CAAC,cAAc;YACnC,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;YAC/C,wBAAwB,EAAE,IAAI,CAAC,wBAAwB;YACvD,kBAAkB,EAAE,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,GAAG,EAAE,CAAC,IAAI,EAAE,WAAW,CAAC,EAAE,EAAE;gBAChG,GAAG,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC,MAAM,CAAC;gBAC/B,OAAO,GAAG,CAAC;YACb,CAAC,EAAE,EAA4B,CAAC;YAChC,MAAM,EAAE,IAAI,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC;YACxD,WAAW,EAAE,OAAO,CAAC,WAAW,EAAE;YAClC,gBAAgB,EAAE,IAAI,CAAC,QAAQ,EAAE,OAAO,CAAC,IAAI,IAAI,CAAC;SACnD,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,qBAAqB;QAC3B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,gBAAgB,IAAI,MAAM,CAAC,CAAC,oBAAoB;QAEjF,KAAK,MAAM,CAAC,IAAI,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,EAAE,CAAC;YAChE,wCAAwC;YACxC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,GAAG,CAAC,CAAC,QAAQ,CAAC,CAAC;YAEpD,sDAAsD;YACtD,IAAI,OAAO,GAAG,CAAC,CAAC;YAChB,OAAO,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC9B,MAAM,UAAU,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;gBAElC,8DAA8D;gBAC9D,IAAI,CAAC,UAAU,CAAC,MAAM,IAAI,GAAG,GAAG,UAAU,CAAC,QAAQ,GAAG,WAAW,CAAC;oBAC9D,WAAW,CAAC,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,kBAAmB,EAAE,CAAC;oBAE1D,IAAI,CAAC;wBACH,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;4BACjC,UAAU,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC;4BACxB,UAAU,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;wBAC9B,CAAC;oBACH,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;oBAC1E,CAAC;oBAED,WAAW,CAAC,KAAK,EAAE,CAAC,CAAC,mBAAmB;oBACxC,OAAO,EAAE,CAAC;gBACZ,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,8DAA8D;gBACvE,CAAC;YACH,CAAC;YAED,IAAI,OAAO,GAAG,CAAC,EAAE,CAAC;gBAChB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,WAAW,OAAO,mCAAmC,IAAI,KAAK,WAAW,CAAC,MAAM,YAAY,CAAC,CAAC;YAClH,CAAC;YAED,iDAAiD;YACjD,IAAI,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7B,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;YACnC,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,EAAE,WAAW,CAAC,CAAC;YAC7C,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,qBAAqB,CAAC,IAAY,EAAE,IAAY;QACtD,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YACrC,MAAM,OAAO,GAAG,GAAG,IAAI,IAAI,IAAI,EAAE,CAAC;YAClC,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;YAE9D,8BAA8B;YAC9B,MAAM,mBAAmB,GAAG,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YAEpE,IAAI,mBAAmB,IAAI,CAAC,EAAE,CAAC;gBAC7B,oCAAoC;gBACpC,MAAM,UAAU,GAAG,cAAc,CAAC,mBAAmB,CAAC,CAAC;gBACvD,UAAU,CAAC,MAAM,GAAG,KAAK,CAAC;gBAC1B,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACjC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,oCAAoC,OAAO,EAAE,CAAC,CAAC;gBAEjE,kBAAkB;gBAClB,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;gBAEjD,OAAO,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBAC3B,OAAO;YACT,CAAC;YAED,oEAAoE;YACpE,IAAI,cAAc,CAAC,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,kBAAmB,EAAE,CAAC;gBAC7D,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8BAA8B,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC;gBAEhE,IAAI,CAAC;oBACH,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;wBACjC,IAAI;wBACJ,IAAI;wBACJ,SAAS,EAAE,IAAI;wBACf,qBAAqB,EAAE,KAAK,CAAC,aAAa;qBAC3C,CAAC,CAAC;oBAEH,MAAM,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;wBAC1B,yBAAyB;wBACzB,MAAM,UAAU,GAAG;4BACjB,MAAM;4BACN,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE;4BACpB,MAAM,EAAE,KAAK;yBACd,CAAC;wBAEF,cAAc,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;wBAChC,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;wBAEjD,8CAA8C;wBAC9C,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,EAAE;4BACxB,MAAM,GAAG,GAAG,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;4BAC/D,IAAI,GAAG,IAAI,CAAC,EAAE,CAAC;gCACb,cAAc,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;gCAC9B,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;gCACjD,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,2CAA2C,OAAO,EAAE,CAAC,CAAC;4BAC1E,CAAC;wBACH,CAAC,CAAC,CAAC;wBAEH,OAAO,CAAC,MAAM,CAAC,CAAC;oBAClB,CAAC,CAAC,CAAC;oBAEH,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;wBAC3B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,IAAI,IAAI,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;wBACvE,MAAM,CAAC,GAAG,CAAC,CAAC;oBACd,CAAC,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,IAAI,IAAI,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;oBACzE,MAAM,CAAC,GAAG,CAAC,CAAC;gBACd,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,sDAAsD;gBACtD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,OAAO,aAAa,cAAc,CAAC,MAAM,GAAG,CAAC,CAAC;gBACtF,MAAM,CAAC,IAAI,KAAK,CAAC,uBAAuB,OAAO,UAAU,CAAC,CAAC,CAAC;YAC9D,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,MAA0B,EAAE,IAAY,EAAE,IAAY;QACnF,MAAM,OAAO,GAAG,GAAG,IAAI,IAAI,IAAI,EAAE,CAAC;QAClC,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;QAE9D,mCAAmC;QACnC,MAAM,eAAe,GAAG,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;QAE3E,IAAI,eAAe,IAAI,CAAC,EAAE,CAAC;YACzB,yCAAyC;YACzC,cAAc,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,IAAI,CAAC;YAC9C,cAAc,CAAC,eAAe,CAAC,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YAEtD,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,mCAAmC,OAAO,EAAE,CAAC,CAAC;QAClE,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,sDAAsD,OAAO,EAAE,CAAC,CAAC;QACpF,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,uBAAuB;QACnC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,6BAA6B;QAC7B,IAAI,CAAC,aAAa,GAAG,IAAI,aAAa,CAAC;YACrC,IAAI,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI;YAC5B,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,YAAY;YAC5C,aAAa,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa;YAC9C,kBAAkB,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,kBAAkB;YACxD,iBAAiB,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,6BAA6B;YACnE,uBAAuB,EAAE,EAAE,CAAC,2BAA2B;SACxD,CAAC,CAAC;QAEH,0BAA0B;QAC1B,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACxG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,oBAAoB,EAAE,CAAC,IAAI,EAAE,EAAE;YACvE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mBAAmB,IAAI,CAAC,MAAM,eAAe,IAAI,CAAC,aAAa,OAAO,CAAC,CAAC;QAC3F,CAAC,CAAC,CAAC;QAEH,oBAAoB;QACpB,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,CAAC;YACjC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iCAAiC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;YAE5E,iCAAiC;YACjC,IAAI,CAAC,gCAAgC,EAAE,CAAC;QAC1C,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,KAAK,EAAE,CAAC,CAAC;YAC7D,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC;QAC5B,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,gCAAgC;QACtC,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,OAAO;QAEhC,uCAAuC;QACvC,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,MAAM,CAAC,EAAE;YACjC,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC;YAEjC,4EAA4E;YAC5E,IAAI,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,QAAQ,EAAE,CAAC,CAAC;gBACnE,OAAO;YACT,CAAC;YAED,gEAAgE;YAChE,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBAC1C,MAAM,UAAU,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;gBACvD,IAAI,UAAU,EAAE,CAAC;oBACf,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,8CAA8C,QAAQ,EAAE,CAAC,CAAC;oBAC3E,OAAO;gBACT,CAAC;YACH,CAAC;YAED,8CAA8C;YAC9C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,GAAG,QAAQ,WAAW,CAAC,CAAC;YAC7E,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,GAAG,QAAQ,UAAU,CAAC,CAAC;YAE3E,IAAI,CAAC;gBACH,IAAI,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;oBACtD,oCAAoC;oBACpC,MAAM,IAAI,GAAG,EAAE,CAAC,YAAY,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;oBAC/C,MAAM,GAAG,GAAG,EAAE,CAAC,YAAY,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;oBAE7C,mDAAmD;oBACnD,IAAI,UAA4B,CAAC;oBACjC,IAAI,CAAC;wBACH,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,gCAAgC,CAAC,CAAC;wBAC7D,IAAI,OAAO,IAAI,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;4BAC1B,UAAU,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;wBACpC,CAAC;oBACH,CAAC;oBAAC,OAAO,KAAK,EAAE,CAAC;wBACf,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,sDAAsD,QAAQ,EAAE,CAAC,CAAC;oBACrF,CAAC;oBAED,wCAAwC;oBACxC,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,QAAQ,EAAE,IAAI,EAAE,GAAG,EAAE,UAAU,CAAC,CAAC;oBAEnE,wCAAwC;oBACxC,IAAI,CAAC,sBAAsB,CAAC,QAAQ,EAAE,IAAI,EAAE,GAAG,EAAE,UAAU,CAAC,CAAC;oBAE7D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,QAAQ,EAAE,CAAC,CAAC;gBAClE,CAAC;qBAAM,CAAC;oBACN,8EAA8E;oBAC9E,MAAM,aAAa,GAAmB;wBACpC,UAAU,EAAE,QAAQ;wBACpB,WAAW,EAAE,IAAI;wBACjB,eAAe,EAAE,IAAI;qBACtB,CAAC;oBAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;oBAC5C,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oDAAoD,QAAQ,EAAE,CAAC,CAAC;gBACnF,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,4BAA4B,QAAQ,wBAAwB,KAAK,EAAE,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACK,uBAAuB,CAAC,IAAmF;QACjH,MAAM,EAAE,MAAM,EAAE,WAAW,EAAE,UAAU,EAAE,UAAU,EAAE,GAAG,IAAI,CAAC;QAE7D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,eAAe,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ,QAAQ,MAAM,iBAAiB,UAAU,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QAEnJ,qCAAqC;QACrC,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,UAAU,EAAE,UAAU,CAAC,CAAC;QAEzE,yCAAyC;QACzC,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,UAAU,CAAC,CAAC;IAC/D,CAAC;IAED;;;OAGG;IACK,uBAAuB,CAAC,IAAuC;QACrE,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,mCAAmC,IAAI,CAAC,MAAM,KAAK,IAAI,CAAC,KAAK,EAAE,CAAC,CAAC;IACrF,CAAC;IAED;;;OAGG;IACK,sBAAsB,CAAC,MAAc,EAAE,WAAmB,EAAE,UAAkB;QACpF,IAAI,CAAC;YACH,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,GAAG,MAAM,WAAW,CAAC,CAAC;YAC3E,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,GAAG,MAAM,UAAU,CAAC,CAAC;YAEzE,EAAE,CAAC,aAAa,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;YACxC,EAAE,CAAC,aAAa,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;YAEtC,gDAAgD;YAChD,IAAI,CAAC;gBACH,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAC/B,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gDAAgD,MAAM,KAAK,KAAK,EAAE,CAAC,CAAC;YACvF,CAAC;YAED,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,MAAM,OAAO,QAAQ,EAAE,CAAC,CAAC;QACrE,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,MAAM,KAAK,KAAK,EAAE,CAAC,CAAC;QAC1E,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,SAAS,CAAC,MAAc,EAAE,EAA+D;QAC/F,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,MAAM,EAAE,CAAC,CAAC;QAEvD,iDAAiD;QACjD,MAAM,KAAK,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QAEhD,IAAI,KAAK,EAAE,CAAC;YACV,IAAI,CAAC;gBACH,iDAAiD;gBACjD,MAAM,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;oBAC9C,GAAG,EAAE,KAAK,CAAC,GAAG;oBACd,IAAI,EAAE,KAAK,CAAC,IAAI;iBACjB,CAAC,CAAC;gBAEH,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,MAAM,EAAE,CAAC,CAAC;gBAC5D,EAAE,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;gBAClB,OAAO;YACT,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,qCAAqC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YACzE,CAAC;QACH,CAAC;QAED,kDAAkD;QAClD,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,IAAI,IAAI,CAAC,aAAa,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC9E,6CAA6C;YAC7C,MAAM,QAAQ,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;YAE3D,IAAI,CAAC,QAAQ,EAAE,CAAC;gBACd,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,MAAM,4BAA4B,CAAC,CAAC;gBAEjF,0CAA0C;gBAC1C,MAAM,aAAa,GAAmB;oBACpC,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC;gBAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;YAC9C,CAAC;QACH,CAAC;QAED,mCAAmC;QACnC,IAAI,CAAC;YACH,MAAM,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBAC9C,GAAG,EAAE,IAAI,CAAC,mBAAmB,CAAC,GAAG;gBACjC,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI;aACpC,CAAC,CAAC;YAEH,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,MAAM,EAAE,CAAC,CAAC;YAC7D,EAAE,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QACpB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAwC,EAAE,GAAG,CAAC,CAAC;YACjE,EAAE,CAAC,IAAI,KAAK,CAAC,8BAA8B,CAAC,EAAE,IAAI,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAE5B,sCAAsC;QACtC,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,uBAAuB,EAAE,CAAC;QACvC,CAAC;QAED,0BAA0B;QAC1B,IAAI,CAAC,WAAW,GAAG,OAAO,CAAC,KAAK,CAAC,YAAY,CAC3C;YACE,GAAG,EAAE,IAAI,CAAC,mBAAmB,CAAC,GAAG;YACjC,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI;YACnC,WAAW,EAAE,CAAC,MAAM,EAAE,EAAE,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,EAAE,CAAC;SACxD,EACD,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,CAC3C,CAAC;QAEF,4BAA4B;QAC5B,IAAI,CAAC,WAAW,CAAC,gBAAgB,GAAG,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAAC;QAClE,IAAI,CAAC,WAAW,CAAC,cAAc,GAAG,IAAI,CAAC,OAAO,CAAC,cAAc,CAAC;QAE9D,4BAA4B;QAC5B,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,0BAA0B;QAC1B,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAE7B,2BAA2B;QAC3B,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAE9B,yCAAyC;QACzC,IAAI,CAAC,0BAA0B,EAAE,CAAC;QAElC,mBAAmB;QACnB,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAC7B,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,EAAE;gBAC9C,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;gBACtE,OAAO,EAAE,CAAC;YACZ,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,uBAAuB;QAC7B,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,YAAY,EAAE,CAAC,UAA8B,EAAE,EAAE;YACnE,mCAAmC;YACnC,IAAI,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,MAAM,IAAI,IAAI,CAAC,OAAO,CAAC,cAAc,EAAE,CAAC;gBACpE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oBAAoB,IAAI,CAAC,OAAO,CAAC,cAAc,qCAAqC,CAAC,CAAC;gBACvG,UAAU,CAAC,OAAO,EAAE,CAAC;gBACrB,OAAO;YACT,CAAC;YAED,6BAA6B;YAC7B,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YAC/B,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,MAAM,CAAC;YAEzD,oEAAoE;YACpE,uFAAuF;YACvF,MAAM,SAAS,GAAG,UAAU,CAAC,SAAS,CAAC;YACvC,MAAM,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;YAEzC,yFAAyF;YACzF,IAAI,IAAI,CAAC,OAAO,CAAC,oBAAoB,IAAI,UAAU,CAAC,aAAa,EAAE,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;gBACzF,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC5B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,SAAS,aAAa,UAAU,GAAG,CAAC,CAAC;YAClG,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,SAAS,aAAa,UAAU,GAAG,CAAC,CAAC;YAC1F,CAAC;YAED,oCAAoC;YACpC,MAAM,iBAAiB,GAAG,GAAG,EAAE;gBAC7B,IAAI,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,UAAU,CAAC,EAAE,CAAC;oBAC9C,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;oBAClC,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,MAAM,CAAC;oBAEzD,4DAA4D;oBAC5D,IAAI,IAAI,CAAC,OAAO,CAAC,oBAAoB,IAAI,UAAU,CAAC,aAAa,EAAE,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;wBACzF,IAAI,CAAC,oBAAoB,EAAE,CAAC;oBAC9B,CAAC;oBAED,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,sBAAsB,IAAI,CAAC,gBAAgB,wBAAwB,CAAC,CAAC;gBACzF,CAAC;YACH,CAAC,CAAC;YAEF,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,iBAAiB,CAAC,CAAC;YAC1C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;gBAC7B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kBAAkB,EAAE,GAAG,CAAC,CAAC;gBAC3C,iBAAiB,EAAE,CAAC;YACtB,CAAC,CAAC,CAAC;YACH,UAAU,CAAC,EAAE,CAAC,KAAK,EAAE,iBAAiB,CAAC,CAAC;YACxC,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBAC5B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,oBAAoB,CAAC,CAAC;gBACxC,iBAAiB,EAAE,CAAC;YACtB,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,kCAAkC;QAClC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,kBAAkB,EAAE,CAAC,SAAS,EAAE,EAAE;YACpD,IAAI,CAAC,wBAAwB,EAAE,CAAC;YAChC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6CAA6C,CAAC,CAAC;QACnE,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,qBAAqB;QAC3B,0BAA0B;QAC1B,IAAI,CAAC,QAAQ,GAAG,IAAI,OAAO,CAAC,EAAE,CAAC,eAAe,CAAC;YAC7C,MAAM,EAAE,IAAI,CAAC,WAAW;YACxB,iCAAiC;YACjC,cAAc,EAAE,IAAI;SACrB,CAAC,CAAC;QAEH,+BAA+B;QAC/B,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,YAAY,EAAE,CAAC,UAAmC,EAAE,MAAoC,EAAE,EAAE;YAC3G,IAAI,CAAC,yBAAyB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;QACrD,CAAC,CAAC,CAAC;QAEH,kGAAkG;QAClG,IAAI,CAAC,iBAAiB,GAAG,WAAW,CAAC,GAAG,EAAE;YACxC,IAAI,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,KAAK,CAAC,EAAE,CAAC;gBACrC,OAAO,CAAC,gCAAgC;YAC1C,CAAC;YAED,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,CAAC;YACzF,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,EAAqB,EAAE,EAAE;gBACtD,MAAM,eAAe,GAAG,EAA6B,CAAC;gBAEtD,IAAI,eAAe,CAAC,OAAO,KAAK,KAAK,EAAE,CAAC;oBACtC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,2CAA2C,CAAC,CAAC;oBAC/D,OAAO,eAAe,CAAC,SAAS,EAAE,CAAC;gBACrC,CAAC;gBAED,eAAe,CAAC,OAAO,GAAG,KAAK,CAAC;gBAChC,eAAe,CAAC,IAAI,EAAE,CAAC;YACzB,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,KAAK,CAAC,CAAC;IACZ,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,IAAI,CAAC,eAAe,GAAG,WAAW,CAAC,GAAG,EAAE;YACtC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC;YAChE,MAAM,OAAO,GAAG;gBACd,MAAM;gBACN,iBAAiB,EAAE,IAAI,CAAC,gBAAgB;gBACxC,aAAa,EAAE,IAAI,CAAC,cAAc;gBAClC,cAAc,EAAE,IAAI,CAAC,cAAc;gBACnC,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;gBAC/C,wBAAwB,EAAE,IAAI,CAAC,wBAAwB;gBACvD,gBAAgB,EAAE,IAAI,CAAC,QAAQ,EAAE,OAAO,CAAC,IAAI,IAAI,CAAC;gBAClD,WAAW,EAAE,OAAO,CAAC,WAAW,EAAE;gBAClC,cAAc,EAAE,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC;gBAC/C,cAAc,EAAE,MAAM,CAAC,WAAW,CAChC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,IAAI,EAAE,WAAW,CAAC,EAAE,EAAE,CAAC;oBACrE,IAAI;oBACJ;wBACE,KAAK,EAAE,WAAW,CAAC,MAAM;wBACzB,IAAI,EAAE,WAAW,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,MAAM;qBAC/C;iBACF,CAAC,CACH;aACF,CAAC;YAEF,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAC;QAC9C,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,2BAA2B;IACxC,CAAC;IAED;;OAEG;IACK,0BAA0B;QAChC,yCAAyC;QACzC,IAAI,CAAC,6BAA6B,GAAG,WAAW,CAAC,GAAG,EAAE;YACpD,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC/B,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,WAAW;IACxB,CAAC;IAED;;OAEG;IACK,yBAAyB,CAAC,UAAmC,EAAE,MAAoC;QACzG,MAAM,MAAM,GAAG,MAAM,CAAC,GAAG,CAAC;QAC1B,MAAM,MAAM,GAAG,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC;QAEnC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,MAAM,GAAG,MAAM,EAAE,CAAC,CAAC;QAEhE,2BAA2B;QAC3B,UAAU,CAAC,OAAO,GAAG,IAAI,CAAC;QAC1B,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACjC,UAAU,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE;YACzB,UAAU,CAAC,OAAO,GAAG,IAAI,CAAC;YAC1B,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACnC,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,MAAM,mBAAmB,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QACzD,IAAI,CAAC,mBAAmB,EAAE,CAAC;YACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,MAAM,GAAG,MAAM,EAAE,CAAC,CAAC;YACpE,UAAU,CAAC,SAAS,EAAE,CAAC;YACvB,OAAO;QACT,CAAC;QAED,mCAAmC;QACnC,IAAI,mBAAmB,CAAC,cAAc,EAAE,CAAC;YACvC,IAAI,CAAC;gBACH,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,mBAAmB,CAAC,EAAE,CAAC;oBAC3D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uCAAuC,MAAM,GAAG,MAAM,EAAE,CAAC,CAAC;oBAC3E,UAAU,CAAC,SAAS,EAAE,CAAC;oBACvB,OAAO;gBACT,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,EAAE,KAAK,CAAC,CAAC;gBAC3D,UAAU,CAAC,SAAS,EAAE,CAAC;gBACvB,OAAO;YACT,CAAC;QACH,CAAC;QAED,sCAAsC;QACtC,IAAI,UAA6B,CAAC;QAClC,MAAM,gBAAgB,GAAG,OAAO,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;QAEtD,IAAI,CAAC;YACH,+CAA+C;YAC/C,MAAM,eAAe,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,CAAC;YACtE,MAAM,iBAAiB,GAAG,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,CAAC,CAAC;YAC1E,MAAM,QAAQ,GAAG,QAAQ,eAAe,IAAI,iBAAiB,GAAG,MAAM,CAAC,GAAG,EAAE,CAAC;YAC7E,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,QAAQ,EAAE,CAAC,CAAC;YAEvD,UAAU,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;YAE7C,UAAU,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE;gBACzB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,2CAA2C,CAAC,CAAC;gBAC/D,gBAAgB,CAAC,OAAO,EAAE,CAAC;YAC7B,CAAC,CAAC,CAAC;YAEH,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;gBAC/B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,0BAA0B,EAAE,KAAK,CAAC,CAAC;gBACrD,gBAAgB,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAC/B,IAAI,UAAU,CAAC,UAAU,KAAK,UAAU,CAAC,IAAI,EAAE,CAAC;oBAC9C,UAAU,CAAC,SAAS,EAAE,CAAC;gBACzB,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gDAAgD,EAAE,GAAG,CAAC,CAAC;YACzE,UAAU,CAAC,SAAS,EAAE,CAAC;YACvB,OAAO;QACT,CAAC;QAED,mDAAmD;QACnD,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YACnD,IAAI,CAAC;gBACH,2CAA2C;gBAC3C,MAAM,gBAAgB,CAAC,OAAO,CAAC;gBAE/B,kDAAkD;gBAClD,IAAI,UAAU,CAAC,UAAU,KAAK,UAAU,CAAC,IAAI,EAAE,CAAC;oBAC9C,UAAU,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,CAAC;gBACjD,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,+CAA+C,EAAE,KAAK,CAAC,CAAC;YAC5E,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,mDAAmD;QACnD,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,CAAC,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC7C,IAAI,CAAC;gBACH,wDAAwD;gBACxD,IAAI,UAAU,CAAC,UAAU,KAAK,UAAU,CAAC,IAAI,EAAE,CAAC;oBAC9C,UAAU,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,CAAC;gBACjD,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8CAA8C,EAAE,KAAK,CAAC,CAAC;YAC3E,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,+CAA+C;QAC/C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,IAAI,EAAE,MAAM,EAAE,EAAE;YACtC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8BAA8B,IAAI,MAAM,MAAM,EAAE,CAAC,CAAC;YACpE,IAAI,UAAU,IAAI,UAAU,CAAC,UAAU,KAAK,UAAU,CAAC,MAAM,EAAE,CAAC;gBAC9D,IAAI,CAAC;oBACH,iEAAiE;oBACjE,MAAM,SAAS,GAAG,CAAC,IAAI,IAAI,IAAI,IAAI,IAAI,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC;oBAC/D,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,MAAM,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC;gBACvD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,EAAE,KAAK,CAAC,CAAC;oBAC7D,UAAU,CAAC,SAAS,EAAE,CAAC;gBACzB,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,IAAI,EAAE,MAAM,EAAE,EAAE;YACtC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8BAA8B,IAAI,MAAM,MAAM,EAAE,CAAC,CAAC;YACpE,IAAI,UAAU,IAAI,UAAU,CAAC,UAAU,KAAK,UAAU,CAAC,MAAM,EAAE,CAAC;gBAC9D,IAAI,CAAC;oBACH,iEAAiE;oBACjE,MAAM,SAAS,GAAG,CAAC,IAAI,IAAI,IAAI,IAAI,IAAI,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC;oBAC/D,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,MAAM,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC;gBACvD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,EAAE,KAAK,CAAC,CAAC;oBAC7D,UAAU,CAAC,SAAS,EAAE,CAAC;gBACzB,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,aAAa,CACzB,aAA2C,EAC3C,cAA2C;QAE3C,IAAI,CAAC,cAAc,EAAE,CAAC;QACtB,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,MAAM,KAAK,GAAG,OAAO,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;QAEhF,IAAI,CAAC;YACH,MAAM,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;YAC1D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,IAAI,KAAK,KAAK,aAAa,CAAC,MAAM,IAAI,aAAa,CAAC,OAAO,CAAC,IAAI,GAAG,OAAO,EAAE,CAAC,CAAC;YAE/F,6CAA6C;YAC7C,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;gBAC5D,IAAI,CAAC,iBAAiB,CAAC,aAAa,EAAE,cAAc,CAAC,CAAC;gBACtD,OAAO;YACT,CAAC;YAED,gCAAgC;YAChC,MAAM,iBAAiB,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;YAC9D,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,IAAI,KAAK,wBAAwB,aAAa,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;gBAChF,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,GAAG,EAAE,8BAA8B,CAAC,CAAC;gBAC5E,IAAI,CAAC,cAAc,EAAE,CAAC;gBACtB,OAAO;YACT,CAAC;YAED,sCAAsC;YACtC,IAAI,iBAAiB,CAAC,cAAc,EAAE,CAAC;gBACrC,IAAI,CAAC;oBACH,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,EAAE,iBAAiB,CAAC,EAAE,CAAC;wBAChE,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,GAAG,EAAE,cAAc,EAAE;4BAC1D,kBAAkB,EAAE,yDAAyD;yBAC9E,CAAC,CAAC;wBACH,IAAI,CAAC,cAAc,EAAE,CAAC;wBACtB,OAAO;oBACT,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,wBAAwB,EAAE,KAAK,CAAC,CAAC;oBAC5D,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,GAAG,EAAE,8CAA8C,CAAC,CAAC;oBAC5F,IAAI,CAAC,cAAc,EAAE,CAAC;oBACtB,OAAO;gBACT,CAAC;YACH,CAAC;YAED,gDAAgD;YAChD,MAAM,iBAAiB,GAAG,IAAI,CAAC,OAAO,CAAC,oBAAoB;gBACjC,aAAa,CAAC,MAAM,CAAC,aAAa,EAAE,QAAQ,CAAC,WAAW,CAAC,CAAC;YAEpF,iDAAiD;YACjD,MAAM,aAAa,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,CAAC,CAAC;YAClE,MAAM,eAAe,GAAG,IAAI,CAAC,qBAAqB,CAAC,iBAAiB,CAAC,CAAC;YAEtE,4BAA4B;YAC5B,MAAM,cAAc,GAAG,UAAU,aAAa,IAAI,eAAe,GAAG,aAAa,CAAC,GAAG,EAAE,CAAC;YAExF,IAAI,iBAAiB,EAAE,CAAC;gBACtB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,iBAAiB,cAAc,0BAA0B,CAAC,CAAC;gBACtF,MAAM,IAAI,CAAC,iCAAiC,CAC1C,KAAK,EACL,aAAa,EACb,cAAc,EACd,aAAa,EACb,eAAe,EACf,aAAa,CAAC,GAAG,CAClB,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,iBAAiB,cAAc,EAAE,CAAC,CAAC;gBAC9D,MAAM,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,aAAa,EAAE,cAAc,EAAE,cAAc,CAAC,CAAC;YAClF,CAAC;YAED,MAAM,cAAc,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,CAAC;YAC9C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,0BAA0B,cAAc,IAAI,CAAC,CAAC;QAC3E,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,sCAAsC,EAAE,KAAK,CAAC,CAAC;YAC1E,IAAI,CAAC;gBACH,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,GAAG,EAAE,2BAA2B,CAAC,CAAC;YAC3E,CAAC;YAAC,OAAO,aAAa,EAAE,CAAC;gBACvB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,iCAAiC,EAAE,aAAa,CAAC,CAAC;YAC/E,CAAC;YACD,IAAI,CAAC,cAAc,EAAE,CAAC;QACxB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB,CACvB,GAAiC,EACjC,GAAgC;QAEhC,MAAM,IAAI,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QAE/B,mBAAmB;QACnB,GAAG,CAAC,SAAS,CAAC,6BAA6B,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;QAC/D,GAAG,CAAC,SAAS,CAAC,8BAA8B,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;QACjE,GAAG,CAAC,SAAS,CAAC,8BAA8B,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;QACjE,GAAG,CAAC,SAAS,CAAC,wBAAwB,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC;QAE7D,2BAA2B;QAC3B,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;QACrB,GAAG,CAAC,GAAG,EAAE,CAAC;QAEV,iCAAiC;QACjC,IAAI,CAAC,cAAc,EAAE,CAAC;IACxB,CAAC;IAED;;OAEG;IACK,mBAAmB,CACzB,GAAiC,EACjC,MAAmD;QAEnD,MAAM,QAAQ,GAAG,MAAM,CAAC,cAAc,CAAC;QACvC,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,OAAO,IAAI,CAAC,CAAC,6BAA6B;QAC5C,CAAC;QAED,QAAQ,QAAQ,CAAC,IAAI,EAAE,CAAC;YACtB,KAAK,OAAO,CAAC,CAAC,CAAC;gBACb,MAAM,UAAU,GAAG,GAAG,CAAC,OAAO,CAAC,aAAa,CAAC;gBAC7C,IAAI,CAAC,UAAU,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;oBAClD,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,gBAAgB,GAAG,UAAU,CAAC,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;gBAC1D,MAAM,UAAU,GAAW,OAAO,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC;gBAC/E,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBAE3C,yDAAyD;gBACzD,MAAM,SAAS,GAAG,IAAI,KAAK,QAAQ,CAAC,IAAI,CAAC;gBACzC,MAAM,SAAS,GAAG,IAAI,KAAK,QAAQ,CAAC,IAAI,CAAC;gBAEzC,OAAO,SAAS,IAAI,SAAS,CAAC;YAChC,CAAC;YACD;gBACE,MAAM,IAAI,KAAK,CAAC,sCAAsC,QAAQ,CAAC,IAAI,EAAE,CAAC,CAAC;QAC3E,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,iCAAiC,CAC7C,KAAa,EACb,aAA2C,EAC3C,cAA2C,EAC3C,IAAY,EACZ,IAAY,EACZ,IAAY;QAEZ,IAAI,CAAC;YACH,wCAAwC;YACxC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YAE5D,wDAAwD;YACxD,MAAM,UAAU,GAAG;gBACjB,gBAAgB,EAAE,GAAG,EAAE,CAAC,MAAM;gBAC9B,IAAI;gBACJ,IAAI;gBACJ,IAAI;gBACJ,MAAM,EAAE,aAAa,CAAC,MAAM;gBAC5B,OAAO,EAAE,IAAI,CAAC,qBAAqB,CAAC,aAAa,CAAC;gBAClD,OAAO,EAAE,KAAK,CAAC,oBAAoB;aACpC,CAAC;YAEF,MAAM,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;YAElD,kBAAkB;YAClB,QAAQ,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBAC1B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,IAAI,KAAK,gBAAgB,IAAI,IAAI,IAAI,GAAG,IAAI,YAAY,CAAC,CAAC;gBAC3E,QAAQ,CAAC,OAAO,EAAE,CAAC;YACrB,CAAC,CAAC,CAAC;YAEH,gBAAgB;YAChB,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;gBAC3B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,+BAA+B,IAAI,IAAI,IAAI,GAAG,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;gBAEtF,iDAAiD;gBACjD,IAAI,CAAC,cAAc,CAAC,aAAa,EAAE,CAAC;oBAClC,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,GAAG,EAAE,uDAAuD,CAAC,CAAC;gBACvG,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,CAAC;oBACH,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;wBACtB,MAAM,CAAC,OAAO,EAAE,CAAC;oBACnB,CAAC;gBACH,CAAC;gBAAC,OAAO,SAAS,EAAE,CAAC;oBACnB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,+CAA+C,EAAE,SAAS,CAAC,CAAC;gBACzF,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,uBAAuB;YACvB,aAAa,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAE7B,kBAAkB;YAClB,QAAQ,CAAC,EAAE,CAAC,UAAU,EAAE,CAAC,QAAQ,EAAE,EAAE;gBACnC,0BAA0B;gBAC1B,cAAc,CAAC,UAAU,GAAG,QAAQ,CAAC,UAAU,CAAC;gBAEhD,KAAK,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC7D,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;wBACxB,cAAc,CAAC,SAAS,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC;oBACxC,CAAC;gBACH,CAAC;gBAED,4BAA4B;gBAC5B,QAAQ,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;gBAE9B,wDAAwD;gBACxD,QAAQ,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;oBACtB,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;wBACtB,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;oBAClD,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;oBAC3B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,kCAAkC,IAAI,IAAI,IAAI,GAAG,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;oBAEzF,+CAA+C;oBAC/C,IAAI,CAAC;wBACH,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;4BACtB,MAAM,CAAC,OAAO,EAAE,CAAC;wBACnB,CAAC;oBACH,CAAC;oBAAC,OAAO,SAAS,EAAE,CAAC;wBACnB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,gDAAgD,EAAE,SAAS,CAAC,CAAC;oBAC1F,CAAC;gBACH,CAAC,CAAC,CAAC;YACL,CAAC,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,2CAA2C,IAAI,IAAI,IAAI,EAAE,EAAE,KAAK,CAAC,CAAC;YAC7F,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,GAAG,EAAE,8CAA8C,CAAC,CAAC;YAC5F,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,cAAc,CAC1B,KAAa,EACb,aAA2C,EAC3C,cAA2C,EAC3C,cAAsB;QAEtB,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,YAAY,CAAC,OAAO,CACrD,cAAc,EACd;gBACE,MAAM,EAAE,aAAa,CAAC,MAAM;gBAC5B,OAAO,EAAE,IAAI,CAAC,qBAAqB,CAAC,aAAa,CAAC;gBAClD,SAAS,EAAE,IAAI;gBACf,OAAO,EAAE,KAAK,CAAC,oBAAoB;aACpC,EACD,IAAI,EAAE,YAAY;YAClB,CAAC,kBAAkB,EAAE,EAAE,CAAC,IAAI,CAAC,qBAAqB,CAAC,aAAa,EAAE,kBAAkB,CAAC,CACtF,CAAC;YAEF,sBAAsB;YACtB,IAAI,CAAC,oBAAoB,CAAC,KAAK,EAAE,cAAc,EAAE,YAAY,CAAC,CAAC;QACjE,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,4BAA4B,EAAE,KAAK,CAAC,CAAC;YAChE,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,GAAG,EAAE,8CAA8C,CAAC,CAAC;YAC5F,MAAM,KAAK,CAAC,CAAC,kCAAkC;QACjD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,qBAAqB,CAAC,GAAiC;QAC7D,MAAM,WAAW,GAAG,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;QAEvC,yBAAyB;QACzB,WAAW,CAAC,kBAAkB,CAAC,GAAG,GAAG,CAAC,OAAO,CAAC,IAAI,CAAC;QACnD,WAAW,CAAC,mBAAmB,CAAC,GAAG,OAAO,CAAC;QAC3C,WAAW,CAAC,iBAAiB,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC,CAAC,OAAO,CAAC,UAAU,EAAE,EAAE,CAAC,CAAC;QAE1F,6BAA6B;QAC7B,WAAW,CAAC,YAAY,CAAC,GAAG,gBAAgB,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;QAEhE,kEAAkE;QAClE,IAAI,IAAI,CAAC,OAAO,CAAC,oBAAoB,IAAI,GAAG,CAAC,MAAM,CAAC,aAAa,EAAE,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;YACzF,WAAW,CAAC,uBAAuB,CAAC,GAAG,MAAM,CAAC;QAChD,CAAC;QAED,oDAAoD;QACpD,MAAM,gBAAgB,GAAG,CAAC,YAAY,EAAE,SAAS,EAAE,gBAAgB,CAAC,CAAC;QACrE,KAAK,MAAM,MAAM,IAAI,gBAAgB,EAAE,CAAC;YACtC,OAAO,WAAW,CAAC,MAAM,CAAC,CAAC;QAC7B,CAAC;QAED,OAAO,WAAW,CAAC;IACrB,CAAC;IAED;;OAEG;IACK,qBAAqB,CAC3B,aAA2C,EAC3C,YAAwC;QAExC,4BAA4B;QAC5B,aAAa,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;YACjC,YAAY,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QAC5B,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,aAAa,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;YAC3B,YAAY,CAAC,GAAG,EAAE,CAAC;QACrB,CAAC,CAAC,CAAC;QAEH,wBAAwB;QACxB,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAClC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,EAAE,KAAK,CAAC,CAAC;YAC3D,YAAY,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;QAC9B,CAAC,CAAC,CAAC;QAEH,8BAA8B;QAC9B,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;YAC7B,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC;gBAC5B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,mDAAmD,CAAC,CAAC;gBACvE,YAAY,CAAC,OAAO,EAAE,CAAC;YACzB,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,aAAa,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC/B,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,wBAAwB,CAAC,CAAC;YAC5C,YAAY,CAAC,OAAO,CAAC,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC;QAC5D,CAAC,CAAC,CAAC;QAEH,8BAA8B;QAC9B,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YACjC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,EAAE,KAAK,CAAC,CAAC;QAC9D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,oBAAoB,CAC1B,KAAa,EACb,cAA2C,EAC3C,aAA2C;QAE3C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,iCAAiC,aAAa,CAAC,UAAU,EAAE,CAAC,CAAC;QAExF,kBAAkB;QAClB,cAAc,CAAC,UAAU,GAAG,aAAa,CAAC,UAAU,CAAC;QAErD,sBAAsB;QACtB,KAAK,MAAM,CAAC,UAAU,EAAE,WAAW,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC;QACpD,CAAC;QAED,8BAA8B;QAC9B,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;YACtB,cAAc,CAAC,SAAS,CAAC,6BAA6B,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QACzF,CAAC;QAED,wBAAwB;QACxB,KAAK,MAAM,CAAC,UAAU,EAAE,WAAW,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,aAAa,CAAC,OAAO,CAAC,EAAE,CAAC;YAC9E,0BAA0B;YAC1B,MAAM,eAAe,GAAG,CAAC,YAAY,EAAE,YAAY,EAAE,mBAAmB,EAAE,IAAI;gBACrD,SAAS,EAAE,SAAS,EAAE,qBAAqB,EAAE,oBAAoB,CAAC,CAAC;YAC5F,IAAI,CAAC,eAAe,CAAC,QAAQ,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,EAAE,CAAC;gBACxD,cAAc,CAAC,SAAS,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC;YACpD,CAAC;QACH,CAAC;QAED,uBAAuB;QACvB,aAAa,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;YACjC,MAAM,WAAW,GAAG,cAAc,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YAEhD,+BAA+B;YAC/B,IAAI,CAAC,WAAW,EAAE,CAAC;gBACjB,aAAa,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,EAAE;oBAChC,aAAa,CAAC,MAAM,EAAE,CAAC;gBACzB,CAAC,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,aAAa,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;YAC3B,cAAc,CAAC,GAAG,EAAE,CAAC;QACvB,CAAC,CAAC,CAAC;QAEH,yBAAyB;QACzB,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAClC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,kCAAkC,EAAE,KAAK,CAAC,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;QAChC,CAAC,CAAC,CAAC;QAEH,cAAc,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YACnC,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,KAAK,mCAAmC,EAAE,KAAK,CAAC,CAAC;YACvE,aAAa,CAAC,OAAO,EAAE,CAAC;QAC1B,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,iBAAiB,CACvB,GAAgC,EAChC,aAAqB,GAAG,EACxB,UAAkB,uBAAuB,EACzC,UAA4C,EAAE;QAE9C,IAAI,CAAC;YACH,iDAAiD;YACjD,IAAI,GAAG,CAAC,WAAW,EAAE,CAAC;gBACpB,GAAG,CAAC,GAAG,EAAE,CAAC;gBACV,OAAO;YACT,CAAC;YAED,sBAAsB;YACtB,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;gBAC/D,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YAC5B,CAAC;YAED,uBAAuB;YACvB,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC;gBACnD,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YAC5B,CAAC;YAED,sBAAsB;YACtB,GAAG,CAAC,SAAS,CAAC,UAAU,EAAE,OAAO,CAAC,CAAC;YAEnC,0CAA0C;YAC1C,IAAI,GAAG,CAAC,SAAS,CAAC,cAAc,CAAC,KAAK,kBAAkB,EAAE,CAAC;gBACzD,GAAG,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,KAAK,EAAE,EAAE,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC;YACtE,CAAC;iBAAM,CAAC;gBACN,qBAAqB;gBACrB,GAAG,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;YACnB,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8BAA8B,EAAE,KAAK,CAAC,CAAC;YACzD,IAAI,CAAC;gBACH,GAAG,CAAC,OAAO,EAAE,CAAC;YAChB,CAAC;YAAC,OAAO,YAAY,EAAE,CAAC;gBACtB,uCAAuC;YACzC,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,mBAAmB,CAAC,MAAmD;QAC7E,0BAA0B;QAC1B,IAAI,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,cAAc,CAAC,IAAI,MAAM,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC7E,4CAA4C;YAC5C,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,QAAQ,EAAE,CAAC;YACpC,IAAI,QAAQ,GAAG,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;YAEtD,kCAAkC;YAClC,MAAM,UAAU,GAAG,MAAM,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YAEnD,oCAAoC;YACpC,QAAQ,GAAG,CAAC,QAAQ,GAAG,CAAC,CAAC,GAAG,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC;YACzD,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;YAE5C,OAAO,UAAU,CAAC;QACpB,CAAC;QAED,6EAA6E;QAC7E,mEAAmE;QACnE,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAClD,GAAG,CAAC,QAAQ,KAAK,MAAM,CAAC,QAAQ;YAC/B,GAAW,CAAC,aAAa,CAC3B,CAAC;QAEF,IAAI,cAAc,EAAE,CAAC;YACnB,OAAQ,cAAsB,CAAC,aAAa,CAAC;QAC/C,CAAC;QAED,wBAAwB;QACxB,OAAO,WAAW,CAAC;IACrB,CAAC;IAED;;;;OAIG;IACK,qBAAqB,CAAC,MAAmD;QAC/E,0BAA0B;QAC1B,IAAI,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,gBAAgB,CAAC,IAAI,MAAM,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACjF,4CAA4C;YAC5C,MAAM,GAAG,GAAG,QAAQ,MAAM,CAAC,QAAQ,EAAE,CAAC;YACtC,IAAI,QAAQ,GAAG,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;YAEtD,oCAAoC;YACpC,MAAM,YAAY,GAAG,MAAM,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YAEvD,oCAAoC;YACpC,QAAQ,GAAG,CAAC,QAAQ,GAAG,CAAC,CAAC,GAAG,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC;YAC3D,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;YAE5C,OAAO,YAAY,CAAC;QACtB,CAAC;QAED,6EAA6E;QAC7E,mEAAmE;QACnE,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAClD,GAAG,CAAC,QAAQ,KAAK,MAAM,CAAC,QAAQ;YAC/B,GAAW,CAAC,eAAe,CAC7B,CAAC;QAEF,IAAI,cAAc,EAAE,CAAC;YACnB,OAAO,QAAQ,CAAE,cAAsB,CAAC,eAAe,EAAE,EAAE,CAAC,CAAC;QAC/D,CAAC;QAED,sBAAsB;QACtB,OAAO,EAAE,CAAC;IACZ,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAC7B,eAA8D;QAE9D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,eAAe,CAAC,MAAM,WAAW,CAAC,CAAC;QAEtF,0BAA0B;QAC1B,IAAI,CAAC,YAAY,GAAG,eAAe,CAAC;QACpC,IAAI,CAAC,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAAC,CAAC;QAEhD,0CAA0C;QAC1C,MAAM,gBAAgB,GAAG,IAAI,GAAG,EAAU,CAAC;QAE3C,wCAAwC;QACxC,KAAK,MAAM,MAAM,IAAI,eAAe,EAAE,CAAC;YACrC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;YAEtC,IAAI,CAAC;gBACH,sCAAsC;gBACtC,MAAM,WAAW,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAC/D,MAAM,YAAY,GAAG,CAAC,WAAW;oBACb,WAAW,CAAC,GAAG,KAAK,MAAM,CAAC,UAAU;oBACrC,WAAW,CAAC,IAAI,KAAK,MAAM,CAAC,SAAS,CAAC;gBAE1D,IAAI,YAAY,EAAE,CAAC;oBACjB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,4BAA4B,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;oBAEjE,kCAAkC;oBAClC,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,MAAM,CAAC,QAAQ,EAAE;wBAC3C,GAAG,EAAE,MAAM,CAAC,UAAU;wBACtB,IAAI,EAAE,MAAM,CAAC,SAAS;qBACvB,CAAC,CAAC;oBAEH,mBAAmB;oBACnB,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE;wBACzC,GAAG,EAAE,MAAM,CAAC,UAAU;wBACtB,IAAI,EAAE,MAAM,CAAC,SAAS;qBACvB,CAAC,CAAC;oBAEH,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAC3C,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,MAAM,CAAC,QAAQ,EAAE,EAAE,KAAK,CAAC,CAAC;YAC/E,CAAC;QACH,CAAC;QAED,4BAA4B;QAC5B,6DAA6D;QAC7D,kDAAkD;QAClD,KAAK,MAAM,QAAQ,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YAC3C,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACpC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,YAAY,QAAQ,6BAA6B,CAAC,CAAC;gBACpE,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBACrC,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;YACzC,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,uBAAuB,CAC5B,aAIE,EACF,UAA0C;QAE1C,MAAM,YAAY,GAAkD,EAAE,CAAC;QAEvE,2CAA2C;QAC3C,MAAM,MAAM,GAAG,UAAU,EAAE,GAAG,IAAI,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC;QAC/D,MAAM,OAAO,GAAG,UAAU,EAAE,IAAI,IAAI,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC;QAElE,KAAK,MAAM,YAAY,IAAI,aAAa,EAAE,CAAC;YACzC,uDAAuD;YACvD,KAAK,MAAM,MAAM,IAAI,YAAY,CAAC,OAAO,EAAE,CAAC;gBAC1C,iDAAiD;gBACjD,IAAI,MAAM,CAAC,KAAK,CAAC,sBAAsB,CAAC,IAAI,MAAM,KAAK,GAAG,IAAI,MAAM,KAAK,WAAW,EAAE,CAAC;oBACrF,SAAS;gBACX,CAAC;gBAED,YAAY,CAAC,IAAI,CAAC;oBAChB,QAAQ,EAAE,MAAM;oBAChB,cAAc,EAAE,YAAY,CAAC,SAAS,IAAI,CAAC,WAAW,CAAC;oBACvD,gBAAgB,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,4BAA4B;oBACnE,UAAU,EAAE,MAAM;oBAClB,SAAS,EAAE,OAAO;iBACnB,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,aAAa,CAAC,MAAM,yBAAyB,YAAY,CAAC,MAAM,uBAAuB,CAAC,CAAC;QACvH,OAAO,YAAY,CAAC;IACtB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB,CAAC,UAAqC;QAClE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,wBAAwB,EAAE,UAAU,CAAC,CAAC;QACvD,IAAI,CAAC,cAAc,GAAG;YACpB,GAAG,IAAI,CAAC,cAAc;YACtB,GAAG,UAAU;SACd,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,CAAC,CAAC;QAEjD,kBAAkB;QAClB,IAAI,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAC3B,aAAa,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC;QACxC,CAAC;QAED,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;YACzB,aAAa,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QACtC,CAAC;QAED,IAAI,IAAI,CAAC,6BAA6B,EAAE,CAAC;YACvC,aAAa,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC;QACpD,CAAC;QAED,mCAAmC;QACnC,IAAI,IAAI,CAAC,QAAQ,EAAE,CAAC;YAClB,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;gBAC3C,IAAI,CAAC;oBACH,MAAM,CAAC,SAAS,EAAE,CAAC;gBACrB,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,oCAAoC,EAAE,KAAK,CAAC,CAAC;gBACjE,CAAC;YACH,CAAC;QACH,CAAC;QAED,4BAA4B;QAC5B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;YAC/C,IAAI,CAAC;gBACH,MAAM,CAAC,OAAO,EAAE,CAAC;YACnB,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,EAAE,KAAK,CAAC,CAAC;YACtD,CAAC;QACH,CAAC;QAED,wCAAwC;QACxC,KAAK,MAAM,CAAC,IAAI,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,EAAE,CAAC;YAChE,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,CAAC;oBACH,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;wBACjC,UAAU,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;oBAC9B,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,IAAI,EAAE,EAAE,KAAK,CAAC,CAAC;gBAC5E,CAAC;YACH,CAAC;QACH,CAAC;QACD,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;QAE5B,qCAAqC;QACrC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC;gBAChC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;YAC5C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8BAA8B,EAAE,KAAK,CAAC,CAAC;YAC3D,CAAC;QACH,CAAC;QAED,yBAAyB;QACzB,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAC7B,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,GAAG,EAAE;gBAC1B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,CAAC,CAAC;gBAC7D,OAAO,EAAE,CAAC;YACZ,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC;YAC/B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,4CAA4C,CAAC,CAAC;YAC/D,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,CAAC,CAAC;YACtD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,4EAA4E;QAC5E,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,mDAAmD,MAAM,EAAE,CAAC,CAAC;YAC/E,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,oCAAoC;YACpC,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;aACtB,CAAC;YAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;YAC5C,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,6CAA6C,MAAM,EAAE,CAAC,CAAC;YACxE,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,2CAA2C,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;YAC/E,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACK,sBAAsB,CAAC,MAAc,EAAE,WAAmB,EAAE,UAAkB,EAAE,UAAiB;QACvG,6DAA6D;QAC7D,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,IAAI,CAAC;gBACH,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,MAAM,EAAE;oBAClC,GAAG,EAAE,UAAU;oBACf,IAAI,EAAE,WAAW;iBAClB,CAAC,CAAC;gBACH,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,mCAAmC,MAAM,EAAE,CAAC,CAAC;YACjE,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;YAC/E,CAAC;QACH,CAAC;QAED,8BAA8B;QAC9B,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,EAAE;YAChC,GAAG,EAAE,UAAU;YACf,IAAI,EAAE,WAAW;YACjB,OAAO,EAAE,UAAU;SACpB,CAAC,CAAC;QAEH,6BAA6B;QAC7B,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IAClC,CAAC;IAED;;OAEG;IACK,GAAG,CAAC,KAA0C,EAAE,OAAe,EAAE,IAAU;QACjF,MAAM,SAAS,GAAG;YAChB,KAAK,EAAE,CAAC;YACR,IAAI,EAAE,CAAC;YACP,IAAI,EAAE,CAAC;YACP,KAAK,EAAE,CAAC;SACT,CAAC;QAEF,8CAA8C;QAC9C,IAAI,SAAS,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YACxD,OAAO;QACT,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAC3C,MAAM,MAAM,GAAG,IAAI,SAAS,MAAM,KAAK,CAAC,WAAW,EAAE,GAAG,CAAC;QAEzD,QAAQ,KAAK,EAAE,CAAC;YACd,KAAK,OAAO;gBACV,OAAO,CAAC,KAAK,CAAC,GAAG,MAAM,IAAI,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;gBAClD,MAAM;YACR,KAAK,MAAM;gBACT,OAAO,CAAC,IAAI,CAAC,GAAG,MAAM,IAAI,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;gBACjD,MAAM;YACR,KAAK,MAAM;gBACT,OAAO,CAAC,GAAG,CAAC,GAAG,MAAM,IAAI,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;gBAChD,MAAM;YACR,KAAK,OAAO;gBACV,OAAO,CAAC,GAAG,CAAC,GAAG,MAAM,IAAI,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;gBAChD,MAAM;QACV,CAAC;IACH,CAAC;CACF"}
|