@push.rocks/smartproxy 19.3.2 → 19.3.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
  3. package/dist_ts/http/index.d.ts +1 -3
  4. package/dist_ts/http/index.js +4 -10
  5. package/dist_ts/http/models/http-types.d.ts +4 -91
  6. package/dist_ts/http/models/http-types.js +5 -60
  7. package/dist_ts/http/router/proxy-router.d.ts +1 -1
  8. package/dist_ts/http/router/route-router.d.ts +1 -1
  9. package/dist_ts/index.d.ts +9 -7
  10. package/dist_ts/index.js +10 -7
  11. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
  12. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
  13. package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
  14. package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
  15. package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
  16. package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
  17. package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
  18. package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
  19. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
  20. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
  21. package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
  22. package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
  23. package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
  24. package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
  25. package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
  26. package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
  27. package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
  28. package/dist_ts/proxies/http-proxy/index.js +12 -0
  29. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
  30. package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
  31. package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
  32. package/dist_ts/proxies/http-proxy/models/index.js +6 -0
  33. package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
  34. package/dist_ts/proxies/http-proxy/models/types.js +276 -0
  35. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
  36. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
  37. package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
  38. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
  39. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
  40. package/dist_ts/proxies/index.d.ts +5 -5
  41. package/dist_ts/proxies/index.js +5 -5
  42. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
  43. package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
  44. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
  45. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
  46. package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
  47. package/dist_ts/proxies/smart-proxy/index.js +4 -2
  48. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
  49. package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
  50. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
  51. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
  52. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
  53. package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
  54. package/dist_ts/routing/index.d.ts +5 -0
  55. package/dist_ts/routing/index.js +8 -0
  56. package/dist_ts/routing/models/http-types.d.ts +6 -0
  57. package/dist_ts/routing/models/http-types.js +7 -0
  58. package/dist_ts/routing/router/index.d.ts +8 -0
  59. package/dist_ts/routing/router/index.js +7 -0
  60. package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
  61. package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
  62. package/dist_ts/routing/router/route-router.d.ts +108 -0
  63. package/dist_ts/routing/router/route-router.js +393 -0
  64. package/package.json +1 -1
  65. package/readme.md +12 -12
  66. package/readme.plan.md +152 -257
  67. package/ts/00_commitinfo_data.ts +1 -1
  68. package/ts/forwarding/factory/forwarding-factory.ts +28 -0
  69. package/ts/index.ts +13 -9
  70. package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
  71. package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
  72. package/ts/proxies/http-proxy/handlers/index.ts +6 -0
  73. package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
  74. package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
  75. package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
  76. package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
  77. package/ts/proxies/http-proxy/models/http-types.ts +165 -0
  78. package/ts/proxies/http-proxy/models/index.ts +5 -0
  79. package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
  80. package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
  81. package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
  82. package/ts/proxies/index.ts +7 -7
  83. package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
  84. package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
  85. package/ts/proxies/smart-proxy/index.ts +4 -1
  86. package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
  87. package/ts/proxies/smart-proxy/port-manager.ts +2 -2
  88. package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
  89. package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
  90. package/ts/routing/index.ts +9 -0
  91. package/ts/routing/models/http-types.ts +6 -0
  92. package/ts/{http → routing}/router/proxy-router.ts +1 -1
  93. package/ts/{http → routing}/router/route-router.ts +1 -1
  94. package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
  95. package/dist_ts/certificate/acme/acme-factory.js +0 -40
  96. package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
  97. package/dist_ts/certificate/acme/challenge-handler.js +0 -92
  98. package/dist_ts/certificate/acme/index.d.ts +0 -4
  99. package/dist_ts/certificate/acme/index.js +0 -5
  100. package/dist_ts/certificate/certificate-manager.d.ts +0 -150
  101. package/dist_ts/certificate/certificate-manager.js +0 -505
  102. package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
  103. package/dist_ts/certificate/events/certificate-events.js +0 -38
  104. package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
  105. package/dist_ts/certificate/events/simplified-events.js +0 -13
  106. package/dist_ts/certificate/index.d.ts +0 -30
  107. package/dist_ts/certificate/index.js +0 -37
  108. package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
  109. package/dist_ts/certificate/models/certificate-errors.js +0 -141
  110. package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
  111. package/dist_ts/certificate/models/certificate-strategy.js +0 -73
  112. package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
  113. package/dist_ts/certificate/models/certificate-types.js +0 -2
  114. package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
  115. package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
  116. package/dist_ts/certificate/providers/index.d.ts +0 -4
  117. package/dist_ts/certificate/providers/index.js +0 -5
  118. package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
  119. package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
  120. package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
  121. package/dist_ts/certificate/storage/file-storage.js +0 -194
  122. package/dist_ts/certificate/storage/index.d.ts +0 -4
  123. package/dist_ts/certificate/storage/index.js +0 -5
  124. package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
  125. package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
  126. package/dist_ts/classes.iptablesproxy.d.ts +0 -112
  127. package/dist_ts/classes.iptablesproxy.js +0 -765
  128. package/dist_ts/classes.networkproxy.d.ts +0 -243
  129. package/dist_ts/classes.networkproxy.js +0 -1424
  130. package/dist_ts/classes.nftablesproxy.d.ts +0 -219
  131. package/dist_ts/classes.nftablesproxy.js +0 -1542
  132. package/dist_ts/classes.port80handler.d.ts +0 -215
  133. package/dist_ts/classes.port80handler.js +0 -736
  134. package/dist_ts/classes.portproxy.d.ts +0 -171
  135. package/dist_ts/classes.portproxy.js +0 -1802
  136. package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
  137. package/dist_ts/classes.pp.acmemanager.js +0 -123
  138. package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
  139. package/dist_ts/classes.pp.connectionhandler.js +0 -754
  140. package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
  141. package/dist_ts/classes.pp.connectionmanager.js +0 -378
  142. package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
  143. package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
  144. package/dist_ts/classes.pp.interfaces.d.ts +0 -133
  145. package/dist_ts/classes.pp.interfaces.js +0 -2
  146. package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
  147. package/dist_ts/classes.pp.networkproxybridge.js +0 -306
  148. package/dist_ts/classes.pp.portproxy.d.ts +0 -64
  149. package/dist_ts/classes.pp.portproxy.js +0 -567
  150. package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
  151. package/dist_ts/classes.pp.portrangemanager.js +0 -179
  152. package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
  153. package/dist_ts/classes.pp.securitymanager.js +0 -126
  154. package/dist_ts/classes.pp.snihandler.d.ts +0 -153
  155. package/dist_ts/classes.pp.snihandler.js +0 -1053
  156. package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
  157. package/dist_ts/classes.pp.timeoutmanager.js +0 -154
  158. package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
  159. package/dist_ts/classes.pp.tlsalert.js +0 -225
  160. package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
  161. package/dist_ts/classes.pp.tlsmanager.js +0 -132
  162. package/dist_ts/classes.snihandler.d.ts +0 -198
  163. package/dist_ts/classes.snihandler.js +0 -1210
  164. package/dist_ts/classes.sslredirect.d.ts +0 -8
  165. package/dist_ts/classes.sslredirect.js +0 -28
  166. package/dist_ts/common/acmeFactory.d.ts +0 -9
  167. package/dist_ts/common/acmeFactory.js +0 -20
  168. package/dist_ts/common/port80-adapter.d.ts +0 -11
  169. package/dist_ts/common/port80-adapter.js +0 -87
  170. package/dist_ts/examples/forwarding-example.d.ts +0 -1
  171. package/dist_ts/examples/forwarding-example.js +0 -96
  172. package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
  173. package/dist_ts/forwarding/config/domain-config.js +0 -12
  174. package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
  175. package/dist_ts/forwarding/config/domain-manager.js +0 -242
  176. package/dist_ts/helpers.certificates.d.ts +0 -5
  177. package/dist_ts/helpers.certificates.js +0 -23
  178. package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
  179. package/dist_ts/http/port80/acme-interfaces.js +0 -51
  180. package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
  181. package/dist_ts/http/port80/challenge-responder.js +0 -203
  182. package/dist_ts/http/port80/index.d.ts +0 -6
  183. package/dist_ts/http/port80/index.js +0 -9
  184. package/dist_ts/http/port80/port80-handler.d.ts +0 -136
  185. package/dist_ts/http/port80/port80-handler.js +0 -592
  186. package/dist_ts/http/redirects/index.d.ts +0 -4
  187. package/dist_ts/http/redirects/index.js +0 -5
  188. package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
  189. package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
  190. package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
  191. package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
  192. package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
  193. package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
  194. package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
  195. package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
  196. package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
  197. package/dist_ts/networkproxy/classes.np.types.js +0 -35
  198. package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
  199. package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
  200. package/dist_ts/networkproxy/index.d.ts +0 -1
  201. package/dist_ts/networkproxy/index.js +0 -4
  202. package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
  203. package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
  204. package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
  205. package/dist_ts/port80handler/classes.port80handler.js +0 -16
  206. package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
  207. package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
  208. package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
  209. package/dist_ts/proxies/network-proxy/index.js +0 -12
  210. package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
  211. package/dist_ts/proxies/network-proxy/models/index.js +0 -5
  212. package/dist_ts/proxies/network-proxy/models/types.js +0 -276
  213. package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
  214. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
  215. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
  216. package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
  217. package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
  218. package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
  219. package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
  220. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
  221. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
  222. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
  223. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
  224. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
  225. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
  226. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
  227. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
  228. package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
  229. package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
  230. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
  231. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
  232. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
  233. package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
  234. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
  235. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
  236. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
  237. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
  238. package/dist_ts/redirect/classes.redirect.d.ts +0 -96
  239. package/dist_ts/redirect/classes.redirect.js +0 -194
  240. package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
  241. package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
  242. package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
  243. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
  244. package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
  245. package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
  246. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
  247. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
  248. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
  249. package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
  250. package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
  251. package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
  252. package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
  253. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
  254. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
  255. package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
  256. package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
  257. package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
  258. package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
  259. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
  260. package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
  261. package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
  262. package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
  263. package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
  264. package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
  265. package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
  266. package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
  267. package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
  268. package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
  269. package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
  270. package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
  271. package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
  272. package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
  273. package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
  274. package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
  275. package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
  276. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
  277. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
  278. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
  279. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
  280. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
  281. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
  282. package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
  283. package/dist_ts/smartproxy/forwarding/index.js +0 -23
  284. package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
  285. package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
  286. package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
  287. package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
  288. package/dist_ts/smartproxy.classes.router.d.ts +0 -13
  289. package/dist_ts/smartproxy.classes.router.js +0 -33
  290. package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
  291. package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
  292. package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
  293. package/dist_ts/smartproxy.helpers.certificates.js +0 -23
  294. package/dist_ts/smartproxy.plugins.d.ts +0 -18
  295. package/dist_ts/smartproxy.plugins.js +0 -23
  296. package/dist_ts/smartproxy.portproxy.d.ts +0 -26
  297. package/dist_ts/smartproxy.portproxy.js +0 -295
  298. package/ts/http/index.ts +0 -16
  299. package/ts/http/models/http-types.ts +0 -108
  300. package/ts/http/redirects/index.ts +0 -3
  301. package/ts/proxies/network-proxy/models/index.ts +0 -4
  302. package/ts/redirect/classes.redirect.ts +0 -295
  303. /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
  304. /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
  305. /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
  306. /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
  307. /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
  308. /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
  309. /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
  310. /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
  311. /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
  312. /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
  313. /package/ts/{http → routing}/router/index.ts +0 -0
@@ -1,1802 +0,0 @@
1
- import * as plugins from './plugins.js';
2
- import { NetworkProxy } from './classes.networkproxy.js';
3
- import { SniHandler } from './classes.snihandler.js';
4
- // SNI functions are now imported from SniHandler class
5
- // No need for wrapper functions
6
- // Helper: Check if a port falls within any of the given port ranges
7
- const isPortInRanges = (port, ranges) => {
8
- return ranges.some((range) => port >= range.from && port <= range.to);
9
- };
10
- // Helper: Check if a given IP matches any of the glob patterns
11
- const isAllowed = (ip, patterns) => {
12
- if (!ip || !patterns || patterns.length === 0)
13
- return false;
14
- const normalizeIP = (ip) => {
15
- if (!ip)
16
- return [];
17
- if (ip.startsWith('::ffff:')) {
18
- const ipv4 = ip.slice(7);
19
- return [ip, ipv4];
20
- }
21
- if (/^\d{1,3}(\.\d{1,3}){3}$/.test(ip)) {
22
- return [ip, `::ffff:${ip}`];
23
- }
24
- return [ip];
25
- };
26
- const normalizedIPVariants = normalizeIP(ip);
27
- if (normalizedIPVariants.length === 0)
28
- return false;
29
- const expandedPatterns = patterns.flatMap(normalizeIP);
30
- return normalizedIPVariants.some((ipVariant) => expandedPatterns.some((pattern) => plugins.minimatch(ipVariant, pattern)));
31
- };
32
- // Helper: Check if an IP is allowed considering allowed and blocked glob patterns
33
- const isGlobIPAllowed = (ip, allowed, blocked = []) => {
34
- if (!ip)
35
- return false;
36
- if (blocked.length > 0 && isAllowed(ip, blocked))
37
- return false;
38
- return isAllowed(ip, allowed);
39
- };
40
- // Helper: Generate a unique connection ID
41
- const generateConnectionId = () => {
42
- return Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15);
43
- };
44
- // SNI functions are now imported from SniHandler class
45
- // Helper: Ensure timeout values don't exceed Node.js max safe integer
46
- const ensureSafeTimeout = (timeout) => {
47
- const MAX_SAFE_TIMEOUT = 2147483647; // Maximum safe value (2^31 - 1)
48
- return Math.min(Math.floor(timeout), MAX_SAFE_TIMEOUT);
49
- };
50
- // Helper: Generate a slightly randomized timeout to prevent thundering herd
51
- const randomizeTimeout = (baseTimeout, variationPercent = 5) => {
52
- const safeBaseTimeout = ensureSafeTimeout(baseTimeout);
53
- const variation = safeBaseTimeout * (variationPercent / 100);
54
- return ensureSafeTimeout(safeBaseTimeout + Math.floor(Math.random() * variation * 2) - variation);
55
- };
56
- export class PortProxy {
57
- constructor(settingsArg) {
58
- this.netServers = [];
59
- this.connectionRecords = new Map();
60
- this.connectionLogger = null;
61
- this.isShuttingDown = false;
62
- // Map to track round robin indices for each domain config
63
- this.domainTargetIndices = new Map();
64
- // Enhanced stats tracking
65
- this.terminationStats = {
66
- incoming: {},
67
- outgoing: {},
68
- };
69
- // Connection tracking by IP for rate limiting
70
- this.connectionsByIP = new Map();
71
- this.connectionRateByIP = new Map();
72
- // NetworkProxy instance for TLS termination
73
- this.networkProxy = null;
74
- // Set reasonable defaults for all settings
75
- this.settings = {
76
- ...settingsArg,
77
- targetIP: settingsArg.targetIP || 'localhost',
78
- // Timeout settings with reasonable defaults
79
- initialDataTimeout: settingsArg.initialDataTimeout || 120000, // 120 seconds for initial handshake
80
- socketTimeout: ensureSafeTimeout(settingsArg.socketTimeout || 3600000), // 1 hour socket timeout
81
- inactivityCheckInterval: settingsArg.inactivityCheckInterval || 60000, // 60 seconds interval
82
- maxConnectionLifetime: ensureSafeTimeout(settingsArg.maxConnectionLifetime || 86400000), // 24 hours default
83
- inactivityTimeout: ensureSafeTimeout(settingsArg.inactivityTimeout || 14400000), // 4 hours inactivity timeout
84
- gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000, // 30 seconds
85
- // Socket optimization settings
86
- noDelay: settingsArg.noDelay !== undefined ? settingsArg.noDelay : true,
87
- keepAlive: settingsArg.keepAlive !== undefined ? settingsArg.keepAlive : true,
88
- keepAliveInitialDelay: settingsArg.keepAliveInitialDelay || 10000, // 10 seconds
89
- maxPendingDataSize: settingsArg.maxPendingDataSize || 10 * 1024 * 1024, // 10MB
90
- // Feature flags
91
- disableInactivityCheck: settingsArg.disableInactivityCheck || false,
92
- enableKeepAliveProbes: settingsArg.enableKeepAliveProbes !== undefined ? settingsArg.enableKeepAliveProbes : true,
93
- enableDetailedLogging: settingsArg.enableDetailedLogging || false,
94
- enableTlsDebugLogging: settingsArg.enableTlsDebugLogging || false,
95
- enableRandomizedTimeouts: settingsArg.enableRandomizedTimeouts || false,
96
- allowSessionTicket: settingsArg.allowSessionTicket !== undefined ? settingsArg.allowSessionTicket : true,
97
- // Rate limiting defaults
98
- maxConnectionsPerIP: settingsArg.maxConnectionsPerIP || 100,
99
- connectionRateLimitPerMinute: settingsArg.connectionRateLimitPerMinute || 300,
100
- // Enhanced keep-alive settings
101
- keepAliveTreatment: settingsArg.keepAliveTreatment || 'extended',
102
- keepAliveInactivityMultiplier: settingsArg.keepAliveInactivityMultiplier || 6,
103
- extendedKeepAliveLifetime: settingsArg.extendedKeepAliveLifetime || 7 * 24 * 60 * 60 * 1000, // 7 days
104
- // NetworkProxy settings
105
- networkProxyPort: settingsArg.networkProxyPort || 8443, // Default NetworkProxy port
106
- // ACME certificate settings with reasonable defaults
107
- acme: settingsArg.acme || {
108
- enabled: false,
109
- port: 80,
110
- contactEmail: 'admin@example.com',
111
- useProduction: false,
112
- renewThresholdDays: 30,
113
- autoRenew: true,
114
- certificateStore: './certs',
115
- skipConfiguredCerts: false,
116
- },
117
- };
118
- // Initialize NetworkProxy if enabled
119
- if (this.settings.useNetworkProxy && this.settings.useNetworkProxy.length > 0) {
120
- this.initializeNetworkProxy();
121
- }
122
- }
123
- /**
124
- * Initialize NetworkProxy instance
125
- */
126
- async initializeNetworkProxy() {
127
- if (!this.networkProxy) {
128
- // Configure NetworkProxy options based on PortProxy settings
129
- const networkProxyOptions = {
130
- port: this.settings.networkProxyPort,
131
- portProxyIntegration: true,
132
- logLevel: this.settings.enableDetailedLogging ? 'debug' : 'info',
133
- };
134
- // Add ACME settings if configured
135
- if (this.settings.acme) {
136
- networkProxyOptions.acme = { ...this.settings.acme };
137
- }
138
- this.networkProxy = new NetworkProxy(networkProxyOptions);
139
- console.log(`Initialized NetworkProxy on port ${this.settings.networkProxyPort}`);
140
- // Convert and apply domain configurations to NetworkProxy
141
- await this.syncDomainConfigsToNetworkProxy();
142
- }
143
- }
144
- /**
145
- * Updates the domain configurations for the proxy
146
- * @param newDomainConfigs The new domain configurations
147
- */
148
- async updateDomainConfigs(newDomainConfigs) {
149
- console.log(`Updating domain configurations (${newDomainConfigs.length} configs)`);
150
- this.settings.domainConfigs = newDomainConfigs;
151
- // If NetworkProxy is initialized, resync the configurations
152
- if (this.networkProxy) {
153
- await this.syncDomainConfigsToNetworkProxy();
154
- }
155
- }
156
- /**
157
- * Updates the ACME certificate settings
158
- * @param acmeSettings New ACME settings
159
- */
160
- async updateAcmeSettings(acmeSettings) {
161
- console.log('Updating ACME certificate settings');
162
- // Update settings
163
- this.settings.acme = {
164
- ...this.settings.acme,
165
- ...acmeSettings,
166
- };
167
- // If NetworkProxy is initialized, update its ACME settings
168
- if (this.networkProxy) {
169
- try {
170
- // Recreate NetworkProxy with new settings if ACME enabled state has changed
171
- if (this.settings.acme.enabled !== acmeSettings.enabled) {
172
- console.log(`ACME enabled state changed to: ${acmeSettings.enabled}`);
173
- // Stop the current NetworkProxy
174
- await this.networkProxy.stop();
175
- this.networkProxy = null;
176
- // Reinitialize with new settings
177
- await this.initializeNetworkProxy();
178
- // Use start() to make sure ACME gets initialized if newly enabled
179
- await this.networkProxy.start();
180
- }
181
- else {
182
- // Update existing NetworkProxy with new settings
183
- // Note: Some settings may require a restart to take effect
184
- console.log('Updating ACME settings in NetworkProxy');
185
- // For certificate renewals, we might want to trigger checks with the new settings
186
- if (acmeSettings.renewThresholdDays) {
187
- console.log(`Setting new renewal threshold to ${acmeSettings.renewThresholdDays} days`);
188
- // This is implementation-dependent but gives an example
189
- if (this.networkProxy.options.acme) {
190
- this.networkProxy.options.acme.renewThresholdDays = acmeSettings.renewThresholdDays;
191
- }
192
- }
193
- }
194
- }
195
- catch (err) {
196
- console.log(`Error updating ACME settings: ${err}`);
197
- }
198
- }
199
- }
200
- /**
201
- * Synchronizes PortProxy domain configurations to NetworkProxy
202
- * This allows domains configured in PortProxy to be used by NetworkProxy
203
- */
204
- async syncDomainConfigsToNetworkProxy() {
205
- if (!this.networkProxy) {
206
- console.log('Cannot sync configurations - NetworkProxy not initialized');
207
- return;
208
- }
209
- try {
210
- // Get SSL certificates from assets
211
- // Import fs directly since it's not in plugins
212
- const fs = await import('fs');
213
- let certPair;
214
- try {
215
- certPair = {
216
- key: fs.readFileSync('assets/certs/key.pem', 'utf8'),
217
- cert: fs.readFileSync('assets/certs/cert.pem', 'utf8'),
218
- };
219
- }
220
- catch (certError) {
221
- console.log(`Warning: Could not read default certificates: ${certError}`);
222
- console.log('Using empty certificate placeholders - ACME will generate proper certificates if enabled');
223
- // Use empty placeholders - NetworkProxy will use its internal defaults
224
- // or ACME will generate proper ones if enabled
225
- certPair = {
226
- key: '',
227
- cert: '',
228
- };
229
- }
230
- // Convert domain configs to NetworkProxy configs
231
- const proxyConfigs = this.networkProxy.convertPortProxyConfigs(this.settings.domainConfigs, certPair);
232
- // Log ACME-eligible domains if ACME is enabled
233
- if (this.settings.acme?.enabled) {
234
- const acmeEligibleDomains = proxyConfigs
235
- .filter((config) => !config.hostName.includes('*')) // Exclude wildcards
236
- .map((config) => config.hostName);
237
- if (acmeEligibleDomains.length > 0) {
238
- console.log(`Domains eligible for ACME certificates: ${acmeEligibleDomains.join(', ')}`);
239
- }
240
- else {
241
- console.log('No domains eligible for ACME certificates found in configuration');
242
- }
243
- }
244
- // Update NetworkProxy with the converted configs
245
- this.networkProxy
246
- .updateProxyConfigs(proxyConfigs)
247
- .then(() => {
248
- console.log(`Successfully synchronized ${proxyConfigs.length} domain configurations to NetworkProxy`);
249
- })
250
- .catch((err) => {
251
- console.log(`Error synchronizing configurations: ${err.message}`);
252
- });
253
- }
254
- catch (err) {
255
- console.log(`Failed to sync configurations: ${err}`);
256
- }
257
- }
258
- /**
259
- * Requests a certificate for a specific domain
260
- * @param domain The domain to request a certificate for
261
- * @returns Promise that resolves to true if the request was successful, false otherwise
262
- */
263
- async requestCertificate(domain) {
264
- if (!this.networkProxy) {
265
- console.log('Cannot request certificate - NetworkProxy not initialized');
266
- return false;
267
- }
268
- if (!this.settings.acme?.enabled) {
269
- console.log('Cannot request certificate - ACME is not enabled');
270
- return false;
271
- }
272
- try {
273
- const result = await this.networkProxy.requestCertificate(domain);
274
- if (result) {
275
- console.log(`Certificate request for ${domain} submitted successfully`);
276
- }
277
- else {
278
- console.log(`Certificate request for ${domain} failed`);
279
- }
280
- return result;
281
- }
282
- catch (err) {
283
- console.log(`Error requesting certificate: ${err}`);
284
- return false;
285
- }
286
- }
287
- /**
288
- * Forwards a TLS connection to a NetworkProxy for handling
289
- * @param connectionId - Unique connection identifier
290
- * @param socket - The incoming client socket
291
- * @param record - The connection record
292
- * @param initialData - Initial data chunk (TLS ClientHello)
293
- * @param customProxyPort - Optional custom port for NetworkProxy (for domain-specific settings)
294
- */
295
- forwardToNetworkProxy(connectionId, socket, record, initialData, customProxyPort) {
296
- // Ensure NetworkProxy is initialized
297
- if (!this.networkProxy) {
298
- console.log(`[${connectionId}] NetworkProxy not initialized. Using fallback direct connection.`);
299
- // Fall back to direct connection
300
- return this.setupDirectConnection(connectionId, socket, record, undefined, undefined, initialData);
301
- }
302
- // Use the custom port if provided, otherwise use the default NetworkProxy port
303
- const proxyPort = customProxyPort || this.networkProxy.getListeningPort();
304
- const proxyHost = 'localhost'; // Assuming NetworkProxy runs locally
305
- if (this.settings.enableDetailedLogging) {
306
- console.log(`[${connectionId}] Forwarding TLS connection to NetworkProxy at ${proxyHost}:${proxyPort}`);
307
- }
308
- // Create a connection to the NetworkProxy
309
- const proxySocket = plugins.net.connect({
310
- host: proxyHost,
311
- port: proxyPort,
312
- });
313
- // Store the outgoing socket in the record
314
- record.outgoing = proxySocket;
315
- record.outgoingStartTime = Date.now();
316
- record.usingNetworkProxy = true;
317
- // Set up error handlers
318
- proxySocket.on('error', (err) => {
319
- console.log(`[${connectionId}] Error connecting to NetworkProxy: ${err.message}`);
320
- this.cleanupConnection(record, 'network_proxy_connect_error');
321
- });
322
- // Handle connection to NetworkProxy
323
- proxySocket.on('connect', () => {
324
- if (this.settings.enableDetailedLogging) {
325
- console.log(`[${connectionId}] Connected to NetworkProxy at ${proxyHost}:${proxyPort}`);
326
- }
327
- // First send the initial data that contains the TLS ClientHello
328
- proxySocket.write(initialData);
329
- // Now set up bidirectional piping between client and NetworkProxy
330
- socket.pipe(proxySocket);
331
- proxySocket.pipe(socket);
332
- // Setup cleanup handlers
333
- proxySocket.on('close', () => {
334
- if (this.settings.enableDetailedLogging) {
335
- console.log(`[${connectionId}] NetworkProxy connection closed`);
336
- }
337
- this.cleanupConnection(record, 'network_proxy_closed');
338
- });
339
- socket.on('close', () => {
340
- if (this.settings.enableDetailedLogging) {
341
- console.log(`[${connectionId}] Client connection closed after forwarding to NetworkProxy`);
342
- }
343
- this.cleanupConnection(record, 'client_closed');
344
- });
345
- // Update activity on data transfer
346
- socket.on('data', () => this.updateActivity(record));
347
- proxySocket.on('data', () => this.updateActivity(record));
348
- if (this.settings.enableDetailedLogging) {
349
- console.log(`[${connectionId}] TLS connection successfully forwarded to NetworkProxy`);
350
- }
351
- });
352
- }
353
- /**
354
- * Sets up a direct connection to the target (original behavior)
355
- * This is used when NetworkProxy isn't configured or as a fallback
356
- */
357
- setupDirectConnection(connectionId, socket, record, domainConfig, serverName, initialChunk, overridePort) {
358
- // Existing connection setup logic
359
- const targetHost = domainConfig ? this.getTargetIP(domainConfig) : this.settings.targetIP;
360
- const connectionOptions = {
361
- host: targetHost,
362
- port: overridePort !== undefined ? overridePort : this.settings.toPort,
363
- };
364
- if (this.settings.preserveSourceIP) {
365
- connectionOptions.localAddress = record.remoteIP.replace('::ffff:', '');
366
- }
367
- // Create a safe queue for incoming data using a Buffer array
368
- // We'll use this to ensure we don't lose data during handler transitions
369
- const dataQueue = [];
370
- let queueSize = 0;
371
- let processingQueue = false;
372
- let drainPending = false;
373
- // Flag to track if we've switched to the final piping mechanism
374
- // Once this is true, we no longer buffer data in dataQueue
375
- let pipingEstablished = false;
376
- // Pause the incoming socket to prevent buffer overflows
377
- // This ensures we control the flow of data until piping is set up
378
- socket.pause();
379
- // Function to safely process the data queue without losing events
380
- const processDataQueue = () => {
381
- if (processingQueue || dataQueue.length === 0 || pipingEstablished)
382
- return;
383
- processingQueue = true;
384
- try {
385
- // Process all queued chunks with the current active handler
386
- while (dataQueue.length > 0) {
387
- const chunk = dataQueue.shift();
388
- queueSize -= chunk.length;
389
- // Once piping is established, we shouldn't get here,
390
- // but just in case, pass to the outgoing socket directly
391
- if (pipingEstablished && record.outgoing) {
392
- record.outgoing.write(chunk);
393
- continue;
394
- }
395
- // Track bytes received
396
- record.bytesReceived += chunk.length;
397
- // Check for TLS handshake
398
- if (!record.isTLS && SniHandler.isTlsHandshake(chunk)) {
399
- record.isTLS = true;
400
- if (this.settings.enableTlsDebugLogging) {
401
- console.log(`[${connectionId}] TLS handshake detected in tempDataHandler, ${chunk.length} bytes`);
402
- }
403
- }
404
- // Check if adding this chunk would exceed the buffer limit
405
- const newSize = record.pendingDataSize + chunk.length;
406
- if (this.settings.maxPendingDataSize && newSize > this.settings.maxPendingDataSize) {
407
- console.log(`[${connectionId}] Buffer limit exceeded for connection from ${record.remoteIP}: ${newSize} bytes > ${this.settings.maxPendingDataSize} bytes`);
408
- socket.end(); // Gracefully close the socket
409
- this.initiateCleanupOnce(record, 'buffer_limit_exceeded');
410
- return;
411
- }
412
- // Buffer the chunk and update the size counter
413
- record.pendingData.push(Buffer.from(chunk));
414
- record.pendingDataSize = newSize;
415
- this.updateActivity(record);
416
- }
417
- }
418
- finally {
419
- processingQueue = false;
420
- // If there's a pending drain and we've processed everything,
421
- // signal we're ready for more data if we haven't established piping yet
422
- if (drainPending && dataQueue.length === 0 && !pipingEstablished) {
423
- drainPending = false;
424
- socket.resume();
425
- }
426
- }
427
- };
428
- // Unified data handler that safely queues incoming data
429
- const safeDataHandler = (chunk) => {
430
- // If piping is already established, just let the pipe handle it
431
- if (pipingEstablished)
432
- return;
433
- // Add to our queue for orderly processing
434
- dataQueue.push(Buffer.from(chunk)); // Make a copy to be safe
435
- queueSize += chunk.length;
436
- // If queue is getting large, pause socket until we catch up
437
- if (this.settings.maxPendingDataSize && queueSize > this.settings.maxPendingDataSize * 0.8) {
438
- socket.pause();
439
- drainPending = true;
440
- }
441
- // Process the queue
442
- processDataQueue();
443
- };
444
- // Add our safe data handler
445
- socket.on('data', safeDataHandler);
446
- // Add initial chunk to pending data if present
447
- if (initialChunk) {
448
- record.bytesReceived += initialChunk.length;
449
- record.pendingData.push(Buffer.from(initialChunk));
450
- record.pendingDataSize = initialChunk.length;
451
- }
452
- // Create the target socket but don't set up piping immediately
453
- const targetSocket = plugins.net.connect(connectionOptions);
454
- record.outgoing = targetSocket;
455
- record.outgoingStartTime = Date.now();
456
- // Apply socket optimizations
457
- targetSocket.setNoDelay(this.settings.noDelay);
458
- // Apply keep-alive settings to the outgoing connection as well
459
- if (this.settings.keepAlive) {
460
- targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
461
- // Apply enhanced TCP keep-alive options if enabled
462
- if (this.settings.enableKeepAliveProbes) {
463
- try {
464
- if ('setKeepAliveProbes' in targetSocket) {
465
- targetSocket.setKeepAliveProbes(10);
466
- }
467
- if ('setKeepAliveInterval' in targetSocket) {
468
- targetSocket.setKeepAliveInterval(1000);
469
- }
470
- }
471
- catch (err) {
472
- // Ignore errors - these are optional enhancements
473
- if (this.settings.enableDetailedLogging) {
474
- console.log(`[${connectionId}] Enhanced TCP keep-alive not supported for outgoing socket: ${err}`);
475
- }
476
- }
477
- }
478
- }
479
- // Setup specific error handler for connection phase
480
- targetSocket.once('error', (err) => {
481
- // This handler runs only once during the initial connection phase
482
- const code = err.code;
483
- console.log(`[${connectionId}] Connection setup error to ${targetHost}:${connectionOptions.port}: ${err.message} (${code})`);
484
- // Resume the incoming socket to prevent it from hanging
485
- socket.resume();
486
- if (code === 'ECONNREFUSED') {
487
- console.log(`[${connectionId}] Target ${targetHost}:${connectionOptions.port} refused connection`);
488
- }
489
- else if (code === 'ETIMEDOUT') {
490
- console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} timed out`);
491
- }
492
- else if (code === 'ECONNRESET') {
493
- console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} was reset`);
494
- }
495
- else if (code === 'EHOSTUNREACH') {
496
- console.log(`[${connectionId}] Host ${targetHost} is unreachable`);
497
- }
498
- // Clear any existing error handler after connection phase
499
- targetSocket.removeAllListeners('error');
500
- // Re-add the normal error handler for established connections
501
- targetSocket.on('error', this.handleError('outgoing', record));
502
- if (record.outgoingTerminationReason === null) {
503
- record.outgoingTerminationReason = 'connection_failed';
504
- this.incrementTerminationStat('outgoing', 'connection_failed');
505
- }
506
- // Clean up the connection
507
- this.initiateCleanupOnce(record, `connection_failed_${code}`);
508
- });
509
- // Setup close handler
510
- targetSocket.on('close', this.handleClose('outgoing', record));
511
- socket.on('close', this.handleClose('incoming', record));
512
- // Handle timeouts with keep-alive awareness
513
- socket.on('timeout', () => {
514
- // For keep-alive connections, just log a warning instead of closing
515
- if (record.hasKeepAlive) {
516
- console.log(`[${connectionId}] Timeout event on incoming keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
517
- // Don't close the connection - just log
518
- return;
519
- }
520
- // For non-keep-alive connections, proceed with normal cleanup
521
- console.log(`[${connectionId}] Timeout on incoming side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
522
- if (record.incomingTerminationReason === null) {
523
- record.incomingTerminationReason = 'timeout';
524
- this.incrementTerminationStat('incoming', 'timeout');
525
- }
526
- this.initiateCleanupOnce(record, 'timeout_incoming');
527
- });
528
- targetSocket.on('timeout', () => {
529
- // For keep-alive connections, just log a warning instead of closing
530
- if (record.hasKeepAlive) {
531
- console.log(`[${connectionId}] Timeout event on outgoing keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
532
- // Don't close the connection - just log
533
- return;
534
- }
535
- // For non-keep-alive connections, proceed with normal cleanup
536
- console.log(`[${connectionId}] Timeout on outgoing side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
537
- if (record.outgoingTerminationReason === null) {
538
- record.outgoingTerminationReason = 'timeout';
539
- this.incrementTerminationStat('outgoing', 'timeout');
540
- }
541
- this.initiateCleanupOnce(record, 'timeout_outgoing');
542
- });
543
- // Set appropriate timeouts, or disable for immortal keep-alive connections
544
- if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'immortal') {
545
- // Disable timeouts completely for immortal connections
546
- socket.setTimeout(0);
547
- targetSocket.setTimeout(0);
548
- if (this.settings.enableDetailedLogging) {
549
- console.log(`[${connectionId}] Disabled socket timeouts for immortal keep-alive connection`);
550
- }
551
- }
552
- else {
553
- // Set normal timeouts for other connections
554
- socket.setTimeout(ensureSafeTimeout(this.settings.socketTimeout || 3600000));
555
- targetSocket.setTimeout(ensureSafeTimeout(this.settings.socketTimeout || 3600000));
556
- }
557
- // Track outgoing data for bytes counting
558
- targetSocket.on('data', (chunk) => {
559
- record.bytesSent += chunk.length;
560
- this.updateActivity(record);
561
- });
562
- // Wait for the outgoing connection to be ready before setting up piping
563
- targetSocket.once('connect', () => {
564
- // Clear the initial connection error handler
565
- targetSocket.removeAllListeners('error');
566
- // Add the normal error handler for established connections
567
- targetSocket.on('error', this.handleError('outgoing', record));
568
- // Process any remaining data in the queue before switching to piping
569
- processDataQueue();
570
- // Set up piping immediately - don't delay this crucial step
571
- pipingEstablished = true;
572
- // Flush all pending data to target
573
- if (record.pendingData.length > 0) {
574
- const combinedData = Buffer.concat(record.pendingData);
575
- if (this.settings.enableDetailedLogging) {
576
- console.log(`[${connectionId}] Forwarding ${combinedData.length} bytes of initial data to target`);
577
- }
578
- // Write pending data immediately
579
- targetSocket.write(combinedData, (err) => {
580
- if (err) {
581
- console.log(`[${connectionId}] Error writing pending data to target: ${err.message}`);
582
- return this.initiateCleanupOnce(record, 'write_error');
583
- }
584
- });
585
- // Clear the buffer now that we've processed it
586
- record.pendingData = [];
587
- record.pendingDataSize = 0;
588
- }
589
- // Setup piping in both directions without any delays
590
- socket.pipe(targetSocket);
591
- targetSocket.pipe(socket);
592
- // Resume the socket to ensure data flows - CRITICAL!
593
- socket.resume();
594
- // Process any data that might be queued in the interim
595
- if (dataQueue.length > 0) {
596
- // Write any remaining queued data directly to the target socket
597
- for (const chunk of dataQueue) {
598
- targetSocket.write(chunk);
599
- }
600
- // Clear the queue
601
- dataQueue.length = 0;
602
- queueSize = 0;
603
- }
604
- if (this.settings.enableDetailedLogging) {
605
- console.log(`[${connectionId}] Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
606
- `${serverName
607
- ? ` (SNI: ${serverName})`
608
- : domainConfig
609
- ? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
610
- : ''}` +
611
- ` TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}`);
612
- }
613
- else {
614
- console.log(`Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
615
- `${serverName
616
- ? ` (SNI: ${serverName})`
617
- : domainConfig
618
- ? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
619
- : ''}`);
620
- }
621
- // Add the renegotiation handler for SNI validation with strict domain enforcement
622
- // This will be called after we've established piping
623
- if (serverName) {
624
- // Define a handler for checking renegotiation with improved detection
625
- const renegotiationHandler = (renegChunk) => {
626
- // Only process if this looks like a TLS ClientHello
627
- if (SniHandler.isClientHello(renegChunk)) {
628
- try {
629
- // Extract SNI from ClientHello
630
- // Create a connection info object for the existing connection
631
- const connInfo = {
632
- sourceIp: record.remoteIP,
633
- sourcePort: record.incoming.remotePort || 0,
634
- destIp: record.incoming.localAddress || '',
635
- destPort: record.incoming.localPort || 0,
636
- };
637
- // Check for session tickets if allowSessionTicket is disabled
638
- if (this.settings.allowSessionTicket === false) {
639
- // Analyze for session resumption attempt (session ticket or PSK)
640
- const resumptionInfo = SniHandler.hasSessionResumption(renegChunk, this.settings.enableTlsDebugLogging);
641
- if (resumptionInfo.isResumption) {
642
- // Always log resumption attempt for easier debugging
643
- // Try to extract SNI for logging
644
- const extractedSNI = SniHandler.extractSNI(renegChunk, this.settings.enableTlsDebugLogging);
645
- console.log(`[${connectionId}] Session resumption detected in renegotiation. ` +
646
- `Has SNI: ${resumptionInfo.hasSNI ? 'Yes' : 'No'}, ` +
647
- `SNI value: ${extractedSNI || 'None'}, ` +
648
- `allowSessionTicket: ${this.settings.allowSessionTicket}`);
649
- // Block if there's session resumption without SNI
650
- if (!resumptionInfo.hasSNI) {
651
- console.log(`[${connectionId}] Session resumption detected in renegotiation without SNI and allowSessionTicket=false. ` +
652
- `Terminating connection to force new TLS handshake.`);
653
- this.initiateCleanupOnce(record, 'session_ticket_blocked');
654
- return;
655
- }
656
- else {
657
- if (this.settings.enableDetailedLogging) {
658
- console.log(`[${connectionId}] Session resumption with SNI detected in renegotiation. ` +
659
- `Allowing connection since SNI is present.`);
660
- }
661
- }
662
- }
663
- }
664
- const newSNI = SniHandler.extractSNIWithResumptionSupport(renegChunk, connInfo, this.settings.enableTlsDebugLogging);
665
- // Skip if no SNI was found
666
- if (!newSNI)
667
- return;
668
- // Handle SNI change during renegotiation - always terminate for domain switches
669
- if (newSNI !== record.lockedDomain) {
670
- // Log and terminate the connection for any SNI change
671
- console.log(`[${connectionId}] Renegotiation with different SNI: ${record.lockedDomain} -> ${newSNI}. ` +
672
- `Terminating connection - SNI domain switching is not allowed.`);
673
- this.initiateCleanupOnce(record, 'sni_mismatch');
674
- }
675
- else if (this.settings.enableDetailedLogging) {
676
- console.log(`[${connectionId}] Renegotiation detected with same SNI: ${newSNI}. Allowing.`);
677
- }
678
- }
679
- catch (err) {
680
- console.log(`[${connectionId}] Error processing ClientHello: ${err}. Allowing connection to continue.`);
681
- }
682
- }
683
- };
684
- // Store the handler in the connection record so we can remove it during cleanup
685
- record.renegotiationHandler = renegotiationHandler;
686
- // The renegotiation handler is added when piping is established
687
- // Making it part of setupPiping ensures proper sequencing of event handlers
688
- socket.on('data', renegotiationHandler);
689
- if (this.settings.enableDetailedLogging) {
690
- console.log(`[${connectionId}] TLS renegotiation handler installed for SNI domain: ${serverName}`);
691
- if (this.settings.allowSessionTicket === false) {
692
- console.log(`[${connectionId}] Session ticket usage is disabled. Connection will be reset on reconnection attempts.`);
693
- }
694
- }
695
- }
696
- // Set connection timeout with simpler logic
697
- if (record.cleanupTimer) {
698
- clearTimeout(record.cleanupTimer);
699
- }
700
- // For immortal keep-alive connections, skip setting a timeout completely
701
- if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'immortal') {
702
- if (this.settings.enableDetailedLogging) {
703
- console.log(`[${connectionId}] Keep-alive connection with immortal treatment - no max lifetime`);
704
- }
705
- // No cleanup timer for immortal connections
706
- }
707
- // For extended keep-alive connections, use extended timeout
708
- else if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'extended') {
709
- const extendedTimeout = this.settings.extendedKeepAliveLifetime || 7 * 24 * 60 * 60 * 1000; // 7 days
710
- const safeTimeout = ensureSafeTimeout(extendedTimeout);
711
- record.cleanupTimer = setTimeout(() => {
712
- console.log(`[${connectionId}] Keep-alive connection from ${record.remoteIP} exceeded extended lifetime (${plugins.prettyMs(extendedTimeout)}), forcing cleanup.`);
713
- this.initiateCleanupOnce(record, 'extended_lifetime');
714
- }, safeTimeout);
715
- // Make sure timeout doesn't keep the process alive
716
- if (record.cleanupTimer.unref) {
717
- record.cleanupTimer.unref();
718
- }
719
- if (this.settings.enableDetailedLogging) {
720
- console.log(`[${connectionId}] Keep-alive connection with extended lifetime of ${plugins.prettyMs(extendedTimeout)}`);
721
- }
722
- }
723
- // For standard connections, use normal timeout
724
- else {
725
- // Use domain-specific timeout if available, otherwise use default
726
- const connectionTimeout = record.domainConfig?.connectionTimeout || this.settings.maxConnectionLifetime;
727
- const safeTimeout = ensureSafeTimeout(connectionTimeout);
728
- record.cleanupTimer = setTimeout(() => {
729
- console.log(`[${connectionId}] Connection from ${record.remoteIP} exceeded max lifetime (${plugins.prettyMs(connectionTimeout)}), forcing cleanup.`);
730
- this.initiateCleanupOnce(record, 'connection_timeout');
731
- }, safeTimeout);
732
- // Make sure timeout doesn't keep the process alive
733
- if (record.cleanupTimer.unref) {
734
- record.cleanupTimer.unref();
735
- }
736
- }
737
- // Mark TLS handshake as complete for TLS connections
738
- if (record.isTLS) {
739
- record.tlsHandshakeComplete = true;
740
- if (this.settings.enableTlsDebugLogging) {
741
- console.log(`[${connectionId}] TLS handshake complete for connection from ${record.remoteIP}`);
742
- }
743
- }
744
- });
745
- }
746
- /**
747
- * Get connections count by IP
748
- */
749
- getConnectionCountByIP(ip) {
750
- return this.connectionsByIP.get(ip)?.size || 0;
751
- }
752
- /**
753
- * Check and update connection rate for an IP
754
- */
755
- checkConnectionRate(ip) {
756
- const now = Date.now();
757
- const minute = 60 * 1000;
758
- if (!this.connectionRateByIP.has(ip)) {
759
- this.connectionRateByIP.set(ip, [now]);
760
- return true;
761
- }
762
- // Get timestamps and filter out entries older than 1 minute
763
- const timestamps = this.connectionRateByIP.get(ip).filter((time) => now - time < minute);
764
- timestamps.push(now);
765
- this.connectionRateByIP.set(ip, timestamps);
766
- // Check if rate exceeds limit
767
- return timestamps.length <= this.settings.connectionRateLimitPerMinute;
768
- }
769
- /**
770
- * Track connection by IP
771
- */
772
- trackConnectionByIP(ip, connectionId) {
773
- if (!this.connectionsByIP.has(ip)) {
774
- this.connectionsByIP.set(ip, new Set());
775
- }
776
- this.connectionsByIP.get(ip).add(connectionId);
777
- }
778
- /**
779
- * Remove connection tracking for an IP
780
- */
781
- removeConnectionByIP(ip, connectionId) {
782
- if (this.connectionsByIP.has(ip)) {
783
- const connections = this.connectionsByIP.get(ip);
784
- connections.delete(connectionId);
785
- if (connections.size === 0) {
786
- this.connectionsByIP.delete(ip);
787
- }
788
- }
789
- }
790
- /**
791
- * Track connection termination statistic
792
- */
793
- incrementTerminationStat(side, reason) {
794
- this.terminationStats[side][reason] = (this.terminationStats[side][reason] || 0) + 1;
795
- }
796
- /**
797
- * Cleans up a connection record.
798
- * Destroys both incoming and outgoing sockets, clears timers, and removes the record.
799
- * @param record - The connection record to clean up
800
- * @param reason - Optional reason for cleanup (for logging)
801
- */
802
- cleanupConnection(record, reason = 'normal') {
803
- if (!record.connectionClosed) {
804
- record.connectionClosed = true;
805
- // Track connection termination
806
- this.removeConnectionByIP(record.remoteIP, record.id);
807
- if (record.cleanupTimer) {
808
- clearTimeout(record.cleanupTimer);
809
- record.cleanupTimer = undefined;
810
- }
811
- // Detailed logging data
812
- const duration = Date.now() - record.incomingStartTime;
813
- const bytesReceived = record.bytesReceived;
814
- const bytesSent = record.bytesSent;
815
- // Remove all data handlers (both standard and renegotiation) to make sure we clean up properly
816
- if (record.incoming) {
817
- try {
818
- // Remove our safe data handler
819
- record.incoming.removeAllListeners('data');
820
- // Reset the handler references
821
- record.renegotiationHandler = undefined;
822
- }
823
- catch (err) {
824
- console.log(`[${record.id}] Error removing data handlers: ${err}`);
825
- }
826
- }
827
- try {
828
- if (!record.incoming.destroyed) {
829
- // Try graceful shutdown first, then force destroy after a short timeout
830
- record.incoming.end();
831
- const incomingTimeout = setTimeout(() => {
832
- try {
833
- if (record && !record.incoming.destroyed) {
834
- record.incoming.destroy();
835
- }
836
- }
837
- catch (err) {
838
- console.log(`[${record.id}] Error destroying incoming socket: ${err}`);
839
- }
840
- }, 1000);
841
- // Ensure the timeout doesn't block Node from exiting
842
- if (incomingTimeout.unref) {
843
- incomingTimeout.unref();
844
- }
845
- }
846
- }
847
- catch (err) {
848
- console.log(`[${record.id}] Error closing incoming socket: ${err}`);
849
- try {
850
- if (!record.incoming.destroyed) {
851
- record.incoming.destroy();
852
- }
853
- }
854
- catch (destroyErr) {
855
- console.log(`[${record.id}] Error destroying incoming socket: ${destroyErr}`);
856
- }
857
- }
858
- try {
859
- if (record.outgoing && !record.outgoing.destroyed) {
860
- // Try graceful shutdown first, then force destroy after a short timeout
861
- record.outgoing.end();
862
- const outgoingTimeout = setTimeout(() => {
863
- try {
864
- if (record && record.outgoing && !record.outgoing.destroyed) {
865
- record.outgoing.destroy();
866
- }
867
- }
868
- catch (err) {
869
- console.log(`[${record.id}] Error destroying outgoing socket: ${err}`);
870
- }
871
- }, 1000);
872
- // Ensure the timeout doesn't block Node from exiting
873
- if (outgoingTimeout.unref) {
874
- outgoingTimeout.unref();
875
- }
876
- }
877
- }
878
- catch (err) {
879
- console.log(`[${record.id}] Error closing outgoing socket: ${err}`);
880
- try {
881
- if (record.outgoing && !record.outgoing.destroyed) {
882
- record.outgoing.destroy();
883
- }
884
- }
885
- catch (destroyErr) {
886
- console.log(`[${record.id}] Error destroying outgoing socket: ${destroyErr}`);
887
- }
888
- }
889
- // Clear pendingData to avoid memory leaks
890
- record.pendingData = [];
891
- record.pendingDataSize = 0;
892
- // Remove the record from the tracking map
893
- this.connectionRecords.delete(record.id);
894
- // Log connection details
895
- if (this.settings.enableDetailedLogging) {
896
- console.log(`[${record.id}] Connection from ${record.remoteIP} on port ${record.localPort} terminated (${reason}).` +
897
- ` Duration: ${plugins.prettyMs(duration)}, Bytes IN: ${bytesReceived}, OUT: ${bytesSent}, ` +
898
- `TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}` +
899
- `${record.usingNetworkProxy ? ', Using NetworkProxy' : ''}` +
900
- `${record.domainSwitches ? `, Domain switches: ${record.domainSwitches}` : ''}`);
901
- }
902
- else {
903
- console.log(`[${record.id}] Connection from ${record.remoteIP} terminated (${reason}). Active connections: ${this.connectionRecords.size}`);
904
- }
905
- }
906
- }
907
- /**
908
- * Update connection activity timestamp
909
- */
910
- updateActivity(record) {
911
- record.lastActivity = Date.now();
912
- // Clear any inactivity warning
913
- if (record.inactivityWarningIssued) {
914
- record.inactivityWarningIssued = false;
915
- }
916
- }
917
- /**
918
- * Get target IP with round-robin support
919
- */
920
- getTargetIP(domainConfig) {
921
- if (domainConfig.targetIPs && domainConfig.targetIPs.length > 0) {
922
- const currentIndex = this.domainTargetIndices.get(domainConfig) || 0;
923
- const ip = domainConfig.targetIPs[currentIndex % domainConfig.targetIPs.length];
924
- this.domainTargetIndices.set(domainConfig, currentIndex + 1);
925
- return ip;
926
- }
927
- return this.settings.targetIP;
928
- }
929
- /**
930
- * Initiates cleanup once for a connection
931
- */
932
- initiateCleanupOnce(record, reason = 'normal') {
933
- if (this.settings.enableDetailedLogging) {
934
- console.log(`[${record.id}] Connection cleanup initiated for ${record.remoteIP} (${reason})`);
935
- }
936
- if (record.incomingTerminationReason === null ||
937
- record.incomingTerminationReason === undefined) {
938
- record.incomingTerminationReason = reason;
939
- this.incrementTerminationStat('incoming', reason);
940
- }
941
- this.cleanupConnection(record, reason);
942
- }
943
- /**
944
- * Creates a generic error handler for incoming or outgoing sockets
945
- */
946
- handleError(side, record) {
947
- return (err) => {
948
- const code = err.code;
949
- let reason = 'error';
950
- const now = Date.now();
951
- const connectionDuration = now - record.incomingStartTime;
952
- const lastActivityAge = now - record.lastActivity;
953
- if (code === 'ECONNRESET') {
954
- reason = 'econnreset';
955
- console.log(`[${record.id}] ECONNRESET on ${side} side from ${record.remoteIP}: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`);
956
- }
957
- else if (code === 'ETIMEDOUT') {
958
- reason = 'etimedout';
959
- console.log(`[${record.id}] ETIMEDOUT on ${side} side from ${record.remoteIP}: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`);
960
- }
961
- else {
962
- console.log(`[${record.id}] Error on ${side} side from ${record.remoteIP}: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`);
963
- }
964
- if (side === 'incoming' && record.incomingTerminationReason === null) {
965
- record.incomingTerminationReason = reason;
966
- this.incrementTerminationStat('incoming', reason);
967
- }
968
- else if (side === 'outgoing' && record.outgoingTerminationReason === null) {
969
- record.outgoingTerminationReason = reason;
970
- this.incrementTerminationStat('outgoing', reason);
971
- }
972
- this.initiateCleanupOnce(record, reason);
973
- };
974
- }
975
- /**
976
- * Creates a generic close handler for incoming or outgoing sockets
977
- */
978
- handleClose(side, record) {
979
- return () => {
980
- if (this.settings.enableDetailedLogging) {
981
- console.log(`[${record.id}] Connection closed on ${side} side from ${record.remoteIP}`);
982
- }
983
- if (side === 'incoming' && record.incomingTerminationReason === null) {
984
- record.incomingTerminationReason = 'normal';
985
- this.incrementTerminationStat('incoming', 'normal');
986
- }
987
- else if (side === 'outgoing' && record.outgoingTerminationReason === null) {
988
- record.outgoingTerminationReason = 'normal';
989
- this.incrementTerminationStat('outgoing', 'normal');
990
- // Record the time when outgoing socket closed.
991
- record.outgoingClosedTime = Date.now();
992
- }
993
- this.initiateCleanupOnce(record, 'closed_' + side);
994
- };
995
- }
996
- /**
997
- * Main method to start the proxy
998
- */
999
- async start() {
1000
- // Don't start if already shutting down
1001
- if (this.isShuttingDown) {
1002
- console.log("Cannot start PortProxy while it's shutting down");
1003
- return;
1004
- }
1005
- // Initialize NetworkProxy if needed (useNetworkProxy is set but networkProxy isn't initialized)
1006
- if (this.settings.useNetworkProxy &&
1007
- this.settings.useNetworkProxy.length > 0 &&
1008
- !this.networkProxy) {
1009
- await this.initializeNetworkProxy();
1010
- }
1011
- // Start NetworkProxy if configured
1012
- if (this.networkProxy) {
1013
- await this.networkProxy.start();
1014
- console.log(`NetworkProxy started on port ${this.settings.networkProxyPort}`);
1015
- // Log ACME status
1016
- if (this.settings.acme?.enabled) {
1017
- console.log(`ACME certificate management is enabled (${this.settings.acme.useProduction ? 'Production' : 'Staging'} mode)`);
1018
- console.log(`ACME HTTP challenge server on port ${this.settings.acme.port}`);
1019
- // Register domains for ACME certificates if enabled
1020
- if (this.networkProxy.options.acme?.enabled) {
1021
- console.log('Registering domains with ACME certificate manager...');
1022
- // The NetworkProxy will handle this internally via registerDomainsWithAcmeManager()
1023
- }
1024
- }
1025
- }
1026
- // Define a unified connection handler for all listening ports.
1027
- const connectionHandler = (socket) => {
1028
- if (this.isShuttingDown) {
1029
- socket.end();
1030
- socket.destroy();
1031
- return;
1032
- }
1033
- const remoteIP = socket.remoteAddress || '';
1034
- const localPort = socket.localPort || 0; // The port on which this connection was accepted.
1035
- // Check rate limits
1036
- if (this.settings.maxConnectionsPerIP &&
1037
- this.getConnectionCountByIP(remoteIP) >= this.settings.maxConnectionsPerIP) {
1038
- console.log(`Connection rejected from ${remoteIP}: Maximum connections per IP (${this.settings.maxConnectionsPerIP}) exceeded`);
1039
- socket.end();
1040
- socket.destroy();
1041
- return;
1042
- }
1043
- if (this.settings.connectionRateLimitPerMinute && !this.checkConnectionRate(remoteIP)) {
1044
- console.log(`Connection rejected from ${remoteIP}: Connection rate limit (${this.settings.connectionRateLimitPerMinute}/min) exceeded`);
1045
- socket.end();
1046
- socket.destroy();
1047
- return;
1048
- }
1049
- // Apply socket optimizations
1050
- socket.setNoDelay(this.settings.noDelay);
1051
- // Create a unique connection ID and record
1052
- const connectionId = generateConnectionId();
1053
- const connectionRecord = {
1054
- id: connectionId,
1055
- incoming: socket,
1056
- outgoing: null,
1057
- incomingStartTime: Date.now(),
1058
- lastActivity: Date.now(),
1059
- connectionClosed: false,
1060
- pendingData: [],
1061
- pendingDataSize: 0,
1062
- // Initialize enhanced tracking fields
1063
- bytesReceived: 0,
1064
- bytesSent: 0,
1065
- remoteIP: remoteIP,
1066
- localPort: localPort,
1067
- isTLS: false,
1068
- tlsHandshakeComplete: false,
1069
- hasReceivedInitialData: false,
1070
- hasKeepAlive: false, // Will set to true if keep-alive is applied
1071
- incomingTerminationReason: null,
1072
- outgoingTerminationReason: null,
1073
- // Initialize NetworkProxy tracking
1074
- usingNetworkProxy: false,
1075
- // Initialize browser connection tracking
1076
- isBrowserConnection: false,
1077
- domainSwitches: 0,
1078
- };
1079
- // Apply keep-alive settings if enabled
1080
- if (this.settings.keepAlive) {
1081
- socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
1082
- connectionRecord.hasKeepAlive = true; // Mark connection as having keep-alive
1083
- // Apply enhanced TCP keep-alive options if enabled
1084
- if (this.settings.enableKeepAliveProbes) {
1085
- try {
1086
- // These are platform-specific and may not be available
1087
- if ('setKeepAliveProbes' in socket) {
1088
- socket.setKeepAliveProbes(10); // More aggressive probing
1089
- }
1090
- if ('setKeepAliveInterval' in socket) {
1091
- socket.setKeepAliveInterval(1000); // 1 second interval between probes
1092
- }
1093
- }
1094
- catch (err) {
1095
- // Ignore errors - these are optional enhancements
1096
- if (this.settings.enableDetailedLogging) {
1097
- console.log(`[${connectionId}] Enhanced TCP keep-alive settings not supported: ${err}`);
1098
- }
1099
- }
1100
- }
1101
- }
1102
- // Track connection by IP
1103
- this.trackConnectionByIP(remoteIP, connectionId);
1104
- this.connectionRecords.set(connectionId, connectionRecord);
1105
- if (this.settings.enableDetailedLogging) {
1106
- console.log(`[${connectionId}] New connection from ${remoteIP} on port ${localPort}. ` +
1107
- `Keep-Alive: ${connectionRecord.hasKeepAlive ? 'Enabled' : 'Disabled'}. ` +
1108
- `Active connections: ${this.connectionRecords.size}`);
1109
- }
1110
- else {
1111
- console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionRecords.size}`);
1112
- }
1113
- // Check if this connection should be forwarded directly to NetworkProxy
1114
- // First check port-based forwarding settings
1115
- let shouldUseNetworkProxy = this.settings.useNetworkProxy && this.settings.useNetworkProxy.includes(localPort);
1116
- // We'll look for domain-specific settings after SNI extraction
1117
- if (shouldUseNetworkProxy) {
1118
- // For NetworkProxy ports, we want to capture the TLS handshake and forward directly
1119
- let initialDataReceived = false;
1120
- // Set an initial timeout for handshake data
1121
- let initialTimeout = setTimeout(() => {
1122
- if (!initialDataReceived) {
1123
- console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${remoteIP}`);
1124
- // Add a grace period instead of immediate termination
1125
- setTimeout(() => {
1126
- if (!initialDataReceived) {
1127
- console.log(`[${connectionId}] Final initial data timeout after grace period`);
1128
- if (connectionRecord.incomingTerminationReason === null) {
1129
- connectionRecord.incomingTerminationReason = 'initial_timeout';
1130
- this.incrementTerminationStat('incoming', 'initial_timeout');
1131
- }
1132
- socket.end();
1133
- this.cleanupConnection(connectionRecord, 'initial_timeout');
1134
- }
1135
- }, 30000); // 30 second grace period
1136
- }
1137
- }, this.settings.initialDataTimeout);
1138
- // Make sure timeout doesn't keep the process alive
1139
- if (initialTimeout.unref) {
1140
- initialTimeout.unref();
1141
- }
1142
- socket.on('error', this.handleError('incoming', connectionRecord));
1143
- // First data handler to capture initial TLS handshake for NetworkProxy
1144
- socket.once('data', (chunk) => {
1145
- // Clear the initial timeout since we've received data
1146
- if (initialTimeout) {
1147
- clearTimeout(initialTimeout);
1148
- initialTimeout = null;
1149
- }
1150
- initialDataReceived = true;
1151
- connectionRecord.hasReceivedInitialData = true;
1152
- // Block non-TLS connections on port 443
1153
- // Always enforce TLS on standard HTTPS port
1154
- if (!SniHandler.isTlsHandshake(chunk) && localPort === 443) {
1155
- console.log(`[${connectionId}] Non-TLS connection detected on port 443. ` +
1156
- `Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
1157
- if (connectionRecord.incomingTerminationReason === null) {
1158
- connectionRecord.incomingTerminationReason = 'non_tls_blocked';
1159
- this.incrementTerminationStat('incoming', 'non_tls_blocked');
1160
- }
1161
- socket.end();
1162
- this.cleanupConnection(connectionRecord, 'non_tls_blocked');
1163
- return;
1164
- }
1165
- // Check if this looks like a TLS handshake
1166
- if (SniHandler.isTlsHandshake(chunk)) {
1167
- connectionRecord.isTLS = true;
1168
- // Check for TLS ClientHello with either no SNI or session tickets
1169
- if (this.settings.allowSessionTicket === false && SniHandler.isClientHello(chunk)) {
1170
- // Extract SNI first
1171
- const extractedSNI = SniHandler.extractSNI(chunk, this.settings.enableTlsDebugLogging);
1172
- const hasSNI = !!extractedSNI;
1173
- // Analyze for session resumption attempt
1174
- const resumptionInfo = SniHandler.hasSessionResumption(chunk, this.settings.enableTlsDebugLogging);
1175
- // Always log for debugging purposes
1176
- console.log(`[${connectionId}] TLS ClientHello detected with allowSessionTicket=false. ` +
1177
- `Has SNI: ${hasSNI ? 'Yes' : 'No'}, ` +
1178
- `SNI value: ${extractedSNI || 'None'}, ` +
1179
- `Has session resumption: ${resumptionInfo.isResumption ? 'Yes' : 'No'}`);
1180
- // Block if this is a connection with session resumption but no SNI
1181
- if (resumptionInfo.isResumption && !hasSNI) {
1182
- console.log(`[${connectionId}] Session resumption detected in initial ClientHello without SNI and allowSessionTicket=false. ` +
1183
- `Terminating connection to force new TLS handshake.`);
1184
- if (connectionRecord.incomingTerminationReason === null) {
1185
- connectionRecord.incomingTerminationReason = 'session_ticket_blocked';
1186
- this.incrementTerminationStat('incoming', 'session_ticket_blocked');
1187
- }
1188
- socket.end();
1189
- this.cleanupConnection(connectionRecord, 'session_ticket_blocked');
1190
- return;
1191
- }
1192
- // Also block if this is a TLS connection without SNI when allowSessionTicket is false
1193
- // This forces clients to send SNI which helps with routing
1194
- if (!hasSNI && localPort === 443) {
1195
- console.log(`[${connectionId}] TLS ClientHello detected on port 443 without SNI and allowSessionTicket=false. ` +
1196
- `Terminating connection to force proper SNI in handshake.`);
1197
- if (connectionRecord.incomingTerminationReason === null) {
1198
- connectionRecord.incomingTerminationReason = 'no_sni_blocked';
1199
- this.incrementTerminationStat('incoming', 'no_sni_blocked');
1200
- }
1201
- socket.end();
1202
- this.cleanupConnection(connectionRecord, 'no_sni_blocked');
1203
- return;
1204
- }
1205
- }
1206
- // Try to extract SNI for domain-specific NetworkProxy handling
1207
- const connInfo = {
1208
- sourceIp: remoteIP,
1209
- sourcePort: socket.remotePort || 0,
1210
- destIp: socket.localAddress || '',
1211
- destPort: socket.localPort || 0,
1212
- };
1213
- // Extract SNI to check for domain-specific NetworkProxy settings
1214
- const serverName = SniHandler.processTlsPacket(chunk, connInfo, this.settings.enableTlsDebugLogging);
1215
- if (serverName) {
1216
- // If we got an SNI, check for domain-specific NetworkProxy settings
1217
- const domainConfig = this.settings.domainConfigs.find((config) => config.domains.some((d) => plugins.minimatch(serverName, d)));
1218
- // Save domain config and SNI in connection record
1219
- connectionRecord.domainConfig = domainConfig;
1220
- connectionRecord.lockedDomain = serverName;
1221
- // Use domain-specific NetworkProxy port if configured
1222
- if (domainConfig?.useNetworkProxy) {
1223
- const networkProxyPort = domainConfig.networkProxyPort || this.settings.networkProxyPort;
1224
- if (this.settings.enableDetailedLogging) {
1225
- console.log(`[${connectionId}] Using domain-specific NetworkProxy for ${serverName} on port ${networkProxyPort}`);
1226
- }
1227
- // Forward to NetworkProxy with domain-specific port
1228
- this.forwardToNetworkProxy(connectionId, socket, connectionRecord, chunk, networkProxyPort);
1229
- return;
1230
- }
1231
- }
1232
- // Forward directly to NetworkProxy without domain-specific settings
1233
- this.forwardToNetworkProxy(connectionId, socket, connectionRecord, chunk);
1234
- }
1235
- else {
1236
- // If not TLS, use normal direct connection
1237
- console.log(`[${connectionId}] Non-TLS connection on NetworkProxy port ${localPort}`);
1238
- this.setupDirectConnection(connectionId, socket, connectionRecord, undefined, undefined, chunk);
1239
- }
1240
- });
1241
- }
1242
- else {
1243
- // For non-NetworkProxy ports, proceed with normal processing
1244
- // Define helpers for rejecting connections
1245
- const rejectIncomingConnection = (reason, logMessage) => {
1246
- console.log(`[${connectionId}] ${logMessage}`);
1247
- socket.end();
1248
- if (connectionRecord.incomingTerminationReason === null) {
1249
- connectionRecord.incomingTerminationReason = reason;
1250
- this.incrementTerminationStat('incoming', reason);
1251
- }
1252
- this.cleanupConnection(connectionRecord, reason);
1253
- };
1254
- let initialDataReceived = false;
1255
- // Set an initial timeout for SNI data if needed
1256
- let initialTimeout = null;
1257
- if (this.settings.sniEnabled) {
1258
- initialTimeout = setTimeout(() => {
1259
- if (!initialDataReceived) {
1260
- console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${remoteIP}`);
1261
- // Add a grace period instead of immediate termination
1262
- setTimeout(() => {
1263
- if (!initialDataReceived) {
1264
- console.log(`[${connectionId}] Final initial data timeout after grace period`);
1265
- if (connectionRecord.incomingTerminationReason === null) {
1266
- connectionRecord.incomingTerminationReason = 'initial_timeout';
1267
- this.incrementTerminationStat('incoming', 'initial_timeout');
1268
- }
1269
- socket.end();
1270
- this.cleanupConnection(connectionRecord, 'initial_timeout');
1271
- }
1272
- }, 30000); // 30 second grace period
1273
- }
1274
- }, this.settings.initialDataTimeout);
1275
- // Make sure timeout doesn't keep the process alive
1276
- if (initialTimeout.unref) {
1277
- initialTimeout.unref();
1278
- }
1279
- }
1280
- else {
1281
- initialDataReceived = true;
1282
- connectionRecord.hasReceivedInitialData = true;
1283
- }
1284
- socket.on('error', this.handleError('incoming', connectionRecord));
1285
- // Track data for bytes counting
1286
- socket.on('data', (chunk) => {
1287
- connectionRecord.bytesReceived += chunk.length;
1288
- this.updateActivity(connectionRecord);
1289
- // Check for TLS handshake if this is the first chunk
1290
- if (!connectionRecord.isTLS && SniHandler.isTlsHandshake(chunk)) {
1291
- connectionRecord.isTLS = true;
1292
- if (this.settings.enableTlsDebugLogging) {
1293
- console.log(`[${connectionId}] TLS handshake detected from ${remoteIP}, ${chunk.length} bytes`);
1294
- // Try to extract SNI and log detailed debug info
1295
- // Create connection info for debug logging
1296
- const debugConnInfo = {
1297
- sourceIp: remoteIP,
1298
- sourcePort: socket.remotePort || 0,
1299
- destIp: socket.localAddress || '',
1300
- destPort: socket.localPort || 0,
1301
- };
1302
- SniHandler.extractSNIWithResumptionSupport(chunk, debugConnInfo, true);
1303
- }
1304
- }
1305
- });
1306
- /**
1307
- * Sets up the connection to the target host.
1308
- * @param serverName - The SNI hostname (unused when forcedDomain is provided).
1309
- * @param initialChunk - Optional initial data chunk.
1310
- * @param forcedDomain - If provided, overrides SNI/domain lookup (used for port-based routing).
1311
- * @param overridePort - If provided, use this port for the outgoing connection.
1312
- */
1313
- const setupConnection = (serverName, initialChunk, forcedDomain, overridePort) => {
1314
- // Clear the initial timeout since we've received data
1315
- if (initialTimeout) {
1316
- clearTimeout(initialTimeout);
1317
- initialTimeout = null;
1318
- }
1319
- // Mark that we've received initial data
1320
- initialDataReceived = true;
1321
- connectionRecord.hasReceivedInitialData = true;
1322
- // Check if this looks like a TLS handshake
1323
- const isTlsHandshakeDetected = initialChunk && SniHandler.isTlsHandshake(initialChunk);
1324
- if (isTlsHandshakeDetected) {
1325
- connectionRecord.isTLS = true;
1326
- if (this.settings.enableTlsDebugLogging) {
1327
- console.log(`[${connectionId}] TLS handshake detected in setup, ${initialChunk.length} bytes`);
1328
- }
1329
- }
1330
- // If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
1331
- const domainConfig = forcedDomain
1332
- ? forcedDomain
1333
- : serverName
1334
- ? this.settings.domainConfigs.find((config) => config.domains.some((d) => plugins.minimatch(serverName, d)))
1335
- : undefined;
1336
- // Save domain config in connection record
1337
- connectionRecord.domainConfig = domainConfig;
1338
- // Check if this domain should use NetworkProxy (domain-specific setting)
1339
- if (domainConfig?.useNetworkProxy && this.networkProxy) {
1340
- if (this.settings.enableDetailedLogging) {
1341
- console.log(`[${connectionId}] Domain ${serverName} is configured to use NetworkProxy`);
1342
- }
1343
- const networkProxyPort = domainConfig.networkProxyPort || this.settings.networkProxyPort;
1344
- if (initialChunk && connectionRecord.isTLS) {
1345
- // For TLS connections with initial chunk, forward to NetworkProxy
1346
- this.forwardToNetworkProxy(connectionId, socket, connectionRecord, initialChunk, networkProxyPort // Pass the domain-specific NetworkProxy port if configured
1347
- );
1348
- return; // Skip normal connection setup
1349
- }
1350
- }
1351
- // IP validation is skipped if allowedIPs is empty
1352
- if (domainConfig) {
1353
- const effectiveAllowedIPs = [
1354
- ...domainConfig.allowedIPs,
1355
- ...(this.settings.defaultAllowedIPs || []),
1356
- ];
1357
- const effectiveBlockedIPs = [
1358
- ...(domainConfig.blockedIPs || []),
1359
- ...(this.settings.defaultBlockedIPs || []),
1360
- ];
1361
- // Skip IP validation if allowedIPs is empty
1362
- if (domainConfig.allowedIPs.length > 0 &&
1363
- !isGlobIPAllowed(remoteIP, effectiveAllowedIPs, effectiveBlockedIPs)) {
1364
- return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for domain ${domainConfig.domains.join(', ')}`);
1365
- }
1366
- }
1367
- else if (this.settings.defaultAllowedIPs &&
1368
- this.settings.defaultAllowedIPs.length > 0) {
1369
- if (!isGlobIPAllowed(remoteIP, this.settings.defaultAllowedIPs, this.settings.defaultBlockedIPs || [])) {
1370
- return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed by default allowed list`);
1371
- }
1372
- }
1373
- // Save the initial SNI
1374
- if (serverName) {
1375
- connectionRecord.lockedDomain = serverName;
1376
- }
1377
- // Set up the direct connection
1378
- return this.setupDirectConnection(connectionId, socket, connectionRecord, domainConfig, serverName, initialChunk, overridePort);
1379
- };
1380
- // --- PORT RANGE-BASED HANDLING ---
1381
- // Only apply port-based rules if the incoming port is within one of the global port ranges.
1382
- if (this.settings.globalPortRanges &&
1383
- isPortInRanges(localPort, this.settings.globalPortRanges)) {
1384
- if (this.settings.forwardAllGlobalRanges) {
1385
- if (this.settings.defaultAllowedIPs &&
1386
- this.settings.defaultAllowedIPs.length > 0 &&
1387
- !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
1388
- console.log(`[${connectionId}] Connection from ${remoteIP} rejected: IP ${remoteIP} not allowed in global default allowed list.`);
1389
- socket.end();
1390
- return;
1391
- }
1392
- if (this.settings.enableDetailedLogging) {
1393
- console.log(`[${connectionId}] Port-based connection from ${remoteIP} on port ${localPort} forwarded to global target IP ${this.settings.targetIP}.`);
1394
- }
1395
- setupConnection('', undefined, {
1396
- domains: ['global'],
1397
- allowedIPs: this.settings.defaultAllowedIPs || [],
1398
- blockedIPs: this.settings.defaultBlockedIPs || [],
1399
- targetIPs: [this.settings.targetIP],
1400
- portRanges: [],
1401
- }, localPort);
1402
- return;
1403
- }
1404
- else {
1405
- // Attempt to find a matching forced domain config based on the local port.
1406
- const forcedDomain = this.settings.domainConfigs.find((domain) => domain.portRanges &&
1407
- domain.portRanges.length > 0 &&
1408
- isPortInRanges(localPort, domain.portRanges));
1409
- if (forcedDomain) {
1410
- const effectiveAllowedIPs = [
1411
- ...forcedDomain.allowedIPs,
1412
- ...(this.settings.defaultAllowedIPs || []),
1413
- ];
1414
- const effectiveBlockedIPs = [
1415
- ...(forcedDomain.blockedIPs || []),
1416
- ...(this.settings.defaultBlockedIPs || []),
1417
- ];
1418
- if (!isGlobIPAllowed(remoteIP, effectiveAllowedIPs, effectiveBlockedIPs)) {
1419
- console.log(`[${connectionId}] Connection from ${remoteIP} rejected: IP not allowed for domain ${forcedDomain.domains.join(', ')} on port ${localPort}.`);
1420
- socket.end();
1421
- return;
1422
- }
1423
- if (this.settings.enableDetailedLogging) {
1424
- console.log(`[${connectionId}] Port-based connection from ${remoteIP} on port ${localPort} matched domain ${forcedDomain.domains.join(', ')}.`);
1425
- }
1426
- setupConnection('', undefined, forcedDomain, localPort);
1427
- return;
1428
- }
1429
- // Fall through to SNI/default handling if no forced domain config is found.
1430
- }
1431
- }
1432
- // --- FALLBACK: SNI-BASED HANDLING (or default when SNI is disabled) ---
1433
- if (this.settings.sniEnabled) {
1434
- initialDataReceived = false;
1435
- socket.once('data', (chunk) => {
1436
- // Clear timeout immediately
1437
- if (initialTimeout) {
1438
- clearTimeout(initialTimeout);
1439
- initialTimeout = null;
1440
- }
1441
- initialDataReceived = true;
1442
- // Add debugging ONLY if detailed logging is enabled - avoid heavy processing
1443
- if (this.settings.enableTlsDebugLogging && SniHandler.isClientHello(chunk)) {
1444
- // Move heavy debug logging to a separate async task to not block the flow
1445
- setImmediate(() => {
1446
- try {
1447
- const resumptionInfo = SniHandler.hasSessionResumption(chunk, true);
1448
- const standardSNI = SniHandler.extractSNI(chunk, true);
1449
- const pskSNI = SniHandler.extractSNIFromPSKExtension(chunk, true);
1450
- console.log(`[${connectionId}] ClientHello details: isResumption=${resumptionInfo.isResumption}, hasSNI=${resumptionInfo.hasSNI}`);
1451
- console.log(`[${connectionId}] SNI extraction results: standardSNI=${standardSNI || 'none'}, pskSNI=${pskSNI || 'none'}`);
1452
- }
1453
- catch (err) {
1454
- console.log(`[${connectionId}] Error in debug logging: ${err}`);
1455
- }
1456
- });
1457
- }
1458
- // Block non-TLS connections on port 443
1459
- // Always enforce TLS on standard HTTPS port
1460
- if (!SniHandler.isTlsHandshake(chunk) && localPort === 443) {
1461
- console.log(`[${connectionId}] Non-TLS connection detected on port 443 in SNI handler. ` +
1462
- `Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
1463
- if (connectionRecord.incomingTerminationReason === null) {
1464
- connectionRecord.incomingTerminationReason = 'non_tls_blocked';
1465
- this.incrementTerminationStat('incoming', 'non_tls_blocked');
1466
- }
1467
- socket.end();
1468
- this.cleanupConnection(connectionRecord, 'non_tls_blocked');
1469
- return;
1470
- }
1471
- // Try to extract SNI
1472
- let serverName = '';
1473
- if (SniHandler.isTlsHandshake(chunk)) {
1474
- connectionRecord.isTLS = true;
1475
- if (this.settings.enableTlsDebugLogging) {
1476
- console.log(`[${connectionId}] Extracting SNI from TLS handshake, ${chunk.length} bytes`);
1477
- }
1478
- // Check for session tickets if allowSessionTicket is disabled
1479
- if (this.settings.allowSessionTicket === false && SniHandler.isClientHello(chunk)) {
1480
- // Analyze for session resumption attempt
1481
- const resumptionInfo = SniHandler.hasSessionResumption(chunk, this.settings.enableTlsDebugLogging);
1482
- if (resumptionInfo.isResumption) {
1483
- // Always log resumption attempt for easier debugging
1484
- // Try to extract SNI for logging
1485
- const extractedSNI = SniHandler.extractSNI(chunk, this.settings.enableTlsDebugLogging);
1486
- console.log(`[${connectionId}] Session resumption detected in SNI handler. ` +
1487
- `Has SNI: ${resumptionInfo.hasSNI ? 'Yes' : 'No'}, ` +
1488
- `SNI value: ${extractedSNI || 'None'}, ` +
1489
- `allowSessionTicket: ${this.settings.allowSessionTicket}`);
1490
- // Block if there's session resumption without SNI
1491
- if (!resumptionInfo.hasSNI) {
1492
- console.log(`[${connectionId}] Session resumption detected in SNI handler without SNI and allowSessionTicket=false. ` +
1493
- `Terminating connection to force new TLS handshake.`);
1494
- if (connectionRecord.incomingTerminationReason === null) {
1495
- connectionRecord.incomingTerminationReason = 'session_ticket_blocked';
1496
- this.incrementTerminationStat('incoming', 'session_ticket_blocked');
1497
- }
1498
- socket.end();
1499
- this.cleanupConnection(connectionRecord, 'session_ticket_blocked');
1500
- return;
1501
- }
1502
- else {
1503
- if (this.settings.enableDetailedLogging) {
1504
- console.log(`[${connectionId}] Session resumption with SNI detected in SNI handler. ` +
1505
- `Allowing connection since SNI is present.`);
1506
- }
1507
- }
1508
- }
1509
- }
1510
- // Create connection info object for SNI extraction
1511
- const connInfo = {
1512
- sourceIp: remoteIP,
1513
- sourcePort: socket.remotePort || 0,
1514
- destIp: socket.localAddress || '',
1515
- destPort: socket.localPort || 0,
1516
- };
1517
- // Use the new processTlsPacket method for comprehensive handling
1518
- serverName =
1519
- SniHandler.processTlsPacket(chunk, connInfo, this.settings.enableTlsDebugLogging, connectionRecord.lockedDomain // Pass any previously negotiated domain as a hint
1520
- ) || '';
1521
- }
1522
- // Lock the connection to the negotiated SNI.
1523
- connectionRecord.lockedDomain = serverName;
1524
- if (this.settings.enableDetailedLogging) {
1525
- console.log(`[${connectionId}] Received connection from ${remoteIP} with SNI: ${serverName || '(empty)'}`);
1526
- }
1527
- setupConnection(serverName, chunk);
1528
- });
1529
- }
1530
- else {
1531
- initialDataReceived = true;
1532
- connectionRecord.hasReceivedInitialData = true;
1533
- if (this.settings.defaultAllowedIPs &&
1534
- this.settings.defaultAllowedIPs.length > 0 &&
1535
- !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
1536
- return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for non-SNI connection`);
1537
- }
1538
- setupConnection('');
1539
- }
1540
- }
1541
- };
1542
- // --- SETUP LISTENERS ---
1543
- // Determine which ports to listen on.
1544
- const listeningPorts = new Set();
1545
- if (this.settings.globalPortRanges && this.settings.globalPortRanges.length > 0) {
1546
- // Listen on every port defined by the global ranges.
1547
- for (const range of this.settings.globalPortRanges) {
1548
- for (let port = range.from; port <= range.to; port++) {
1549
- listeningPorts.add(port);
1550
- }
1551
- }
1552
- // Also ensure the default fromPort is listened to if it isn't already in the ranges.
1553
- listeningPorts.add(this.settings.fromPort);
1554
- }
1555
- else {
1556
- listeningPorts.add(this.settings.fromPort);
1557
- }
1558
- // Create a server for each port.
1559
- for (const port of listeningPorts) {
1560
- const server = plugins.net.createServer(connectionHandler).on('error', (err) => {
1561
- console.log(`Server Error on port ${port}: ${err.message}`);
1562
- });
1563
- server.listen(port, () => {
1564
- const isNetworkProxyPort = this.settings.useNetworkProxy?.includes(port);
1565
- console.log(`PortProxy -> OK: Now listening on port ${port}${this.settings.sniEnabled && !isNetworkProxyPort ? ' (SNI passthrough enabled)' : ''}${isNetworkProxyPort ? ' (NetworkProxy forwarding enabled)' : ''}`);
1566
- });
1567
- this.netServers.push(server);
1568
- }
1569
- // Log active connection count, longest running durations, and run parity checks periodically
1570
- this.connectionLogger = setInterval(() => {
1571
- // Immediately return if shutting down
1572
- if (this.isShuttingDown)
1573
- return;
1574
- const now = Date.now();
1575
- let maxIncoming = 0;
1576
- let maxOutgoing = 0;
1577
- let tlsConnections = 0;
1578
- let nonTlsConnections = 0;
1579
- let completedTlsHandshakes = 0;
1580
- let pendingTlsHandshakes = 0;
1581
- let keepAliveConnections = 0;
1582
- let networkProxyConnections = 0;
1583
- let domainSwitchedConnections = 0;
1584
- // Create a copy of the keys to avoid modification during iteration
1585
- const connectionIds = [...this.connectionRecords.keys()];
1586
- for (const id of connectionIds) {
1587
- const record = this.connectionRecords.get(id);
1588
- if (!record)
1589
- continue;
1590
- // Track connection stats
1591
- if (record.isTLS) {
1592
- tlsConnections++;
1593
- if (record.tlsHandshakeComplete) {
1594
- completedTlsHandshakes++;
1595
- }
1596
- else {
1597
- pendingTlsHandshakes++;
1598
- }
1599
- }
1600
- else {
1601
- nonTlsConnections++;
1602
- }
1603
- if (record.hasKeepAlive) {
1604
- keepAliveConnections++;
1605
- }
1606
- if (record.usingNetworkProxy) {
1607
- networkProxyConnections++;
1608
- }
1609
- if (record.domainSwitches && record.domainSwitches > 0) {
1610
- domainSwitchedConnections++;
1611
- }
1612
- maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
1613
- if (record.outgoingStartTime) {
1614
- maxOutgoing = Math.max(maxOutgoing, now - record.outgoingStartTime);
1615
- }
1616
- // Parity check: if outgoing socket closed and incoming remains active
1617
- if (record.outgoingClosedTime &&
1618
- !record.incoming.destroyed &&
1619
- !record.connectionClosed &&
1620
- now - record.outgoingClosedTime > 120000) {
1621
- const remoteIP = record.remoteIP;
1622
- console.log(`[${id}] Parity check: Incoming socket for ${remoteIP} still active ${plugins.prettyMs(now - record.outgoingClosedTime)} after outgoing closed.`);
1623
- this.cleanupConnection(record, 'parity_check');
1624
- }
1625
- // Check for stalled connections waiting for initial data
1626
- if (!record.hasReceivedInitialData &&
1627
- now - record.incomingStartTime > this.settings.initialDataTimeout / 2) {
1628
- console.log(`[${id}] Warning: Connection from ${record.remoteIP} has not received initial data after ${plugins.prettyMs(now - record.incomingStartTime)}`);
1629
- }
1630
- // Skip inactivity check if disabled or for immortal keep-alive connections
1631
- if (!this.settings.disableInactivityCheck &&
1632
- !(record.hasKeepAlive && this.settings.keepAliveTreatment === 'immortal')) {
1633
- const inactivityTime = now - record.lastActivity;
1634
- // Use extended timeout for extended-treatment keep-alive connections
1635
- let effectiveTimeout = this.settings.inactivityTimeout;
1636
- if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'extended') {
1637
- const multiplier = this.settings.keepAliveInactivityMultiplier || 6;
1638
- effectiveTimeout = effectiveTimeout * multiplier;
1639
- }
1640
- if (inactivityTime > effectiveTimeout && !record.connectionClosed) {
1641
- // For keep-alive connections, issue a warning first
1642
- if (record.hasKeepAlive && !record.inactivityWarningIssued) {
1643
- console.log(`[${id}] Warning: Keep-alive connection from ${record.remoteIP} inactive for ${plugins.prettyMs(inactivityTime)}. ` +
1644
- `Will close in 10 minutes if no activity.`);
1645
- // Set warning flag and add grace period
1646
- record.inactivityWarningIssued = true;
1647
- record.lastActivity = now - (effectiveTimeout - 600000);
1648
- // Try to stimulate activity with a probe packet
1649
- if (record.outgoing && !record.outgoing.destroyed) {
1650
- try {
1651
- record.outgoing.write(Buffer.alloc(0));
1652
- if (this.settings.enableDetailedLogging) {
1653
- console.log(`[${id}] Sent probe packet to test keep-alive connection`);
1654
- }
1655
- }
1656
- catch (err) {
1657
- console.log(`[${id}] Error sending probe packet: ${err}`);
1658
- }
1659
- }
1660
- }
1661
- else {
1662
- // For non-keep-alive or after warning, close the connection
1663
- console.log(`[${id}] Inactivity check: No activity on connection from ${record.remoteIP} ` +
1664
- `for ${plugins.prettyMs(inactivityTime)}.` +
1665
- (record.hasKeepAlive ? ' Despite keep-alive being enabled.' : ''));
1666
- this.cleanupConnection(record, 'inactivity');
1667
- }
1668
- }
1669
- else if (inactivityTime <= effectiveTimeout && record.inactivityWarningIssued) {
1670
- // If activity detected after warning, clear the warning
1671
- if (this.settings.enableDetailedLogging) {
1672
- console.log(`[${id}] Connection activity detected after inactivity warning, resetting warning`);
1673
- }
1674
- record.inactivityWarningIssued = false;
1675
- }
1676
- }
1677
- }
1678
- // Log detailed stats periodically
1679
- console.log(`Active connections: ${this.connectionRecords.size}. ` +
1680
- `Types: TLS=${tlsConnections} (Completed=${completedTlsHandshakes}, Pending=${pendingTlsHandshakes}), ` +
1681
- `Non-TLS=${nonTlsConnections}, KeepAlive=${keepAliveConnections}, NetworkProxy=${networkProxyConnections}, ` +
1682
- `DomainSwitched=${domainSwitchedConnections}. ` +
1683
- `Longest running: IN=${plugins.prettyMs(maxIncoming)}, OUT=${plugins.prettyMs(maxOutgoing)}. ` +
1684
- `Termination stats: ${JSON.stringify({
1685
- IN: this.terminationStats.incoming,
1686
- OUT: this.terminationStats.outgoing,
1687
- })}`);
1688
- }, this.settings.inactivityCheckInterval || 60000);
1689
- // Make sure the interval doesn't keep the process alive
1690
- if (this.connectionLogger.unref) {
1691
- this.connectionLogger.unref();
1692
- }
1693
- }
1694
- /**
1695
- * Gracefully shut down the proxy
1696
- */
1697
- async stop() {
1698
- console.log('PortProxy shutting down...');
1699
- this.isShuttingDown = true;
1700
- // Stop accepting new connections
1701
- const closeServerPromises = this.netServers.map((server) => new Promise((resolve) => {
1702
- if (!server.listening) {
1703
- resolve();
1704
- return;
1705
- }
1706
- server.close((err) => {
1707
- if (err) {
1708
- console.log(`Error closing server: ${err.message}`);
1709
- }
1710
- resolve();
1711
- });
1712
- }));
1713
- // Stop the connection logger
1714
- if (this.connectionLogger) {
1715
- clearInterval(this.connectionLogger);
1716
- this.connectionLogger = null;
1717
- }
1718
- // Wait for servers to close
1719
- await Promise.all(closeServerPromises);
1720
- console.log('All servers closed. Cleaning up active connections...');
1721
- // Force destroy all active connections immediately
1722
- const connectionIds = [...this.connectionRecords.keys()];
1723
- console.log(`Cleaning up ${connectionIds.length} active connections...`);
1724
- // First pass: End all connections gracefully
1725
- for (const id of connectionIds) {
1726
- const record = this.connectionRecords.get(id);
1727
- if (record) {
1728
- try {
1729
- // Clear any timers
1730
- if (record.cleanupTimer) {
1731
- clearTimeout(record.cleanupTimer);
1732
- record.cleanupTimer = undefined;
1733
- }
1734
- // End sockets gracefully
1735
- if (record.incoming && !record.incoming.destroyed) {
1736
- record.incoming.end();
1737
- }
1738
- if (record.outgoing && !record.outgoing.destroyed) {
1739
- record.outgoing.end();
1740
- }
1741
- }
1742
- catch (err) {
1743
- console.log(`Error during graceful connection end for ${id}: ${err}`);
1744
- }
1745
- }
1746
- }
1747
- // Short delay to allow graceful ends to process
1748
- await new Promise((resolve) => setTimeout(resolve, 100));
1749
- // Second pass: Force destroy everything
1750
- for (const id of connectionIds) {
1751
- const record = this.connectionRecords.get(id);
1752
- if (record) {
1753
- try {
1754
- // Remove all listeners to prevent memory leaks
1755
- if (record.incoming) {
1756
- record.incoming.removeAllListeners();
1757
- if (!record.incoming.destroyed) {
1758
- record.incoming.destroy();
1759
- }
1760
- }
1761
- if (record.outgoing) {
1762
- record.outgoing.removeAllListeners();
1763
- if (!record.outgoing.destroyed) {
1764
- record.outgoing.destroy();
1765
- }
1766
- }
1767
- }
1768
- catch (err) {
1769
- console.log(`Error during forced connection destruction for ${id}: ${err}`);
1770
- }
1771
- }
1772
- }
1773
- // Stop NetworkProxy if it was started (which also stops ACME manager)
1774
- if (this.networkProxy) {
1775
- try {
1776
- console.log('Stopping NetworkProxy...');
1777
- await this.networkProxy.stop();
1778
- console.log('NetworkProxy stopped successfully');
1779
- // Log ACME shutdown if it was enabled
1780
- if (this.settings.acme?.enabled) {
1781
- console.log('ACME certificate manager stopped');
1782
- }
1783
- }
1784
- catch (err) {
1785
- console.log(`Error stopping NetworkProxy: ${err}`);
1786
- }
1787
- }
1788
- // Clear all tracking maps
1789
- this.connectionRecords.clear();
1790
- this.domainTargetIndices.clear();
1791
- this.connectionsByIP.clear();
1792
- this.connectionRateByIP.clear();
1793
- this.netServers = [];
1794
- // Reset termination stats
1795
- this.terminationStats = {
1796
- incoming: {},
1797
- outgoing: {},
1798
- };
1799
- console.log('PortProxy shutdown complete.');
1800
- }
1801
- }
1802
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.portproxy.js","sourceRoot":"","sources":["../ts/classes.portproxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,cAAc,CAAC;AACxC,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,UAAU,EAAE,MAAM,yBAAyB,CAAC;AA2HrD,uDAAuD;AACvD,gCAAgC;AAEhC,oEAAoE;AACpE,MAAM,cAAc,GAAG,CAAC,IAAY,EAAE,MAA2C,EAAW,EAAE;IAC5F,OAAO,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,IAAI,IAAI,KAAK,CAAC,IAAI,IAAI,IAAI,IAAI,KAAK,CAAC,EAAE,CAAC,CAAC;AACxE,CAAC,CAAC;AAEF,+DAA+D;AAC/D,MAAM,SAAS,GAAG,CAAC,EAAU,EAAE,QAAkB,EAAW,EAAE;IAC5D,IAAI,CAAC,EAAE,IAAI,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO,KAAK,CAAC;IAE5D,MAAM,WAAW,GAAG,CAAC,EAAU,EAAY,EAAE;QAC3C,IAAI,CAAC,EAAE;YAAE,OAAO,EAAE,CAAC;QACnB,IAAI,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;YAC7B,MAAM,IAAI,GAAG,EAAE,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YACzB,OAAO,CAAC,EAAE,EAAE,IAAI,CAAC,CAAC;QACpB,CAAC;QACD,IAAI,yBAAyB,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;YACvC,OAAO,CAAC,EAAE,EAAE,UAAU,EAAE,EAAE,CAAC,CAAC;QAC9B,CAAC;QACD,OAAO,CAAC,EAAE,CAAC,CAAC;IACd,CAAC,CAAC;IAEF,MAAM,oBAAoB,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC7C,IAAI,oBAAoB,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO,KAAK,CAAC;IAEpD,MAAM,gBAAgB,GAAG,QAAQ,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;IACvD,OAAO,oBAAoB,CAAC,IAAI,CAAC,CAAC,SAAS,EAAE,EAAE,CAC7C,gBAAgB,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAC1E,CAAC;AACJ,CAAC,CAAC;AAEF,kFAAkF;AAClF,MAAM,eAAe,GAAG,CAAC,EAAU,EAAE,OAAiB,EAAE,UAAoB,EAAE,EAAW,EAAE;IACzF,IAAI,CAAC,EAAE;QAAE,OAAO,KAAK,CAAC;IACtB,IAAI,OAAO,CAAC,MAAM,GAAG,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,OAAO,CAAC;QAAE,OAAO,KAAK,CAAC;IAC/D,OAAO,SAAS,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC;AAChC,CAAC,CAAC;AAEF,0CAA0C;AAC1C,MAAM,oBAAoB,GAAG,GAAW,EAAE;IACxC,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;AACnG,CAAC,CAAC;AAEF,uDAAuD;AAEvD,sEAAsE;AACtE,MAAM,iBAAiB,GAAG,CAAC,OAAe,EAAU,EAAE;IACpD,MAAM,gBAAgB,GAAG,UAAU,CAAC,CAAC,gCAAgC;IACrE,OAAO,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,gBAAgB,CAAC,CAAC;AACzD,CAAC,CAAC;AAEF,4EAA4E;AAC5E,MAAM,gBAAgB,GAAG,CAAC,WAAmB,EAAE,mBAA2B,CAAC,EAAU,EAAE;IACrF,MAAM,eAAe,GAAG,iBAAiB,CAAC,WAAW,CAAC,CAAC;IACvD,MAAM,SAAS,GAAG,eAAe,GAAG,CAAC,gBAAgB,GAAG,GAAG,CAAC,CAAC;IAC7D,OAAO,iBAAiB,CAAC,eAAe,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,SAAS,GAAG,CAAC,CAAC,GAAG,SAAS,CAAC,CAAC;AACpG,CAAC,CAAC;AAEF,MAAM,OAAO,SAAS;IA0BpB,YAAY,WAA+B;QAzBnC,eAAU,GAAyB,EAAE,CAAC;QAEtC,sBAAiB,GAAmC,IAAI,GAAG,EAAE,CAAC;QAC9D,qBAAgB,GAA0B,IAAI,CAAC;QAC/C,mBAAc,GAAY,KAAK,CAAC;QAExC,0DAA0D;QAClD,wBAAmB,GAA+B,IAAI,GAAG,EAAE,CAAC;QAEpE,0BAA0B;QAClB,qBAAgB,GAGpB;YACF,QAAQ,EAAE,EAAE;YACZ,QAAQ,EAAE,EAAE;SACb,CAAC;QAEF,8CAA8C;QACtC,oBAAe,GAA6B,IAAI,GAAG,EAAE,CAAC;QACtD,uBAAkB,GAA0B,IAAI,GAAG,EAAE,CAAC;QAE9D,4CAA4C;QACpC,iBAAY,GAAwB,IAAI,CAAC;QAG/C,2CAA2C;QAC3C,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,WAAW;YACd,QAAQ,EAAE,WAAW,CAAC,QAAQ,IAAI,WAAW;YAE7C,4CAA4C;YAC5C,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,MAAM,EAAE,oCAAoC;YAClG,aAAa,EAAE,iBAAiB,CAAC,WAAW,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,wBAAwB;YAChG,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK,EAAE,sBAAsB;YAC7F,qBAAqB,EAAE,iBAAiB,CAAC,WAAW,CAAC,qBAAqB,IAAI,QAAQ,CAAC,EAAE,mBAAmB;YAC5G,iBAAiB,EAAE,iBAAiB,CAAC,WAAW,CAAC,iBAAiB,IAAI,QAAQ,CAAC,EAAE,6BAA6B;YAE9G,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK,EAAE,aAAa;YAEpF,+BAA+B;YAC/B,OAAO,EAAE,WAAW,CAAC,OAAO,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI;YACvE,SAAS,EAAE,WAAW,CAAC,SAAS,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YAC7E,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK,EAAE,aAAa;YAChF,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;YAE/E,gBAAgB;YAChB,sBAAsB,EAAE,WAAW,CAAC,sBAAsB,IAAI,KAAK;YACnE,qBAAqB,EACnB,WAAW,CAAC,qBAAqB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,qBAAqB,CAAC,CAAC,CAAC,IAAI;YAC5F,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,wBAAwB,EAAE,WAAW,CAAC,wBAAwB,IAAI,KAAK;YACvE,kBAAkB,EAChB,WAAW,CAAC,kBAAkB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,kBAAkB,CAAC,CAAC,CAAC,IAAI;YAEtF,yBAAyB;YACzB,mBAAmB,EAAE,WAAW,CAAC,mBAAmB,IAAI,GAAG;YAC3D,4BAA4B,EAAE,WAAW,CAAC,4BAA4B,IAAI,GAAG;YAE7E,+BAA+B;YAC/B,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,UAAU;YAChE,6BAA6B,EAAE,WAAW,CAAC,6BAA6B,IAAI,CAAC;YAC7E,yBAAyB,EAAE,WAAW,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,SAAS;YAEtG,wBAAwB;YACxB,gBAAgB,EAAE,WAAW,CAAC,gBAAgB,IAAI,IAAI,EAAE,4BAA4B;YAEpF,qDAAqD;YACrD,IAAI,EAAE,WAAW,CAAC,IAAI,IAAI;gBACxB,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,EAAE;gBACR,YAAY,EAAE,mBAAmB;gBACjC,aAAa,EAAE,KAAK;gBACpB,kBAAkB,EAAE,EAAE;gBACtB,SAAS,EAAE,IAAI;gBACf,gBAAgB,EAAE,SAAS;gBAC3B,mBAAmB,EAAE,KAAK;aAC3B;SACF,CAAC;QAEF,qCAAqC;QACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC9E,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB;QAClC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,6DAA6D;YAC7D,MAAM,mBAAmB,GAAQ;gBAC/B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAiB;gBACrC,oBAAoB,EAAE,IAAI;gBAC1B,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM;aACjE,CAAC;YAEF,kCAAkC;YAClC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACvB,mBAAmB,CAAC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvD,CAAC;YAED,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC,mBAAmB,CAAC,CAAC;YAE1D,OAAO,CAAC,GAAG,CAAC,oCAAoC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAElF,0DAA0D;YAC1D,MAAM,IAAI,CAAC,+BAA+B,EAAE,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,mBAAmB,CAAC,gBAAiC;QAChE,OAAO,CAAC,GAAG,CAAC,mCAAmC,gBAAgB,CAAC,MAAM,WAAW,CAAC,CAAC;QACnF,IAAI,CAAC,QAAQ,CAAC,aAAa,GAAG,gBAAgB,CAAC;QAE/C,4DAA4D;QAC5D,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,+BAA+B,EAAE,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,kBAAkB,CAAC,YAAwC;QACtE,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;QAElD,kBAAkB;QAClB,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG;YACnB,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI;YACrB,GAAG,YAAY;SAChB,CAAC;QAEF,2DAA2D;QAC3D,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,4EAA4E;gBAC5E,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,KAAK,YAAY,CAAC,OAAO,EAAE,CAAC;oBACxD,OAAO,CAAC,GAAG,CAAC,kCAAkC,YAAY,CAAC,OAAO,EAAE,CAAC,CAAC;oBAEtE,gCAAgC;oBAChC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;oBAC/B,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;oBAEzB,iCAAiC;oBACjC,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBAEpC,kEAAkE;oBAClE,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;gBAClC,CAAC;qBAAM,CAAC;oBACN,iDAAiD;oBACjD,2DAA2D;oBAC3D,OAAO,CAAC,GAAG,CAAC,wCAAwC,CAAC,CAAC;oBAEtD,kFAAkF;oBAClF,IAAI,YAAY,CAAC,kBAAkB,EAAE,CAAC;wBACpC,OAAO,CAAC,GAAG,CAAC,oCAAoC,YAAY,CAAC,kBAAkB,OAAO,CAAC,CAAC;wBACxF,wDAAwD;wBACxD,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;4BACnC,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,kBAAkB,GAAG,YAAY,CAAC,kBAAkB,CAAC;wBACtF,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACtD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,+BAA+B;QAC3C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,mCAAmC;YACnC,+CAA+C;YAC/C,MAAM,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;YAE9B,IAAI,QAAQ,CAAC;YACb,IAAI,CAAC;gBACH,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,sBAAsB,EAAE,MAAM,CAAC;oBACpD,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,uBAAuB,EAAE,MAAM,CAAC;iBACvD,CAAC;YACJ,CAAC;YAAC,OAAO,SAAS,EAAE,CAAC;gBACnB,OAAO,CAAC,GAAG,CAAC,iDAAiD,SAAS,EAAE,CAAC,CAAC;gBAC1E,OAAO,CAAC,GAAG,CACT,0FAA0F,CAC3F,CAAC;gBAEF,uEAAuE;gBACvE,+CAA+C;gBAC/C,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE;oBACP,IAAI,EAAE,EAAE;iBACT,CAAC;YACJ,CAAC;YAED,iDAAiD;YACjD,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,uBAAuB,CAC5D,IAAI,CAAC,QAAQ,CAAC,aAAa,EAC3B,QAAQ,CACT,CAAC;YAEF,+CAA+C;YAC/C,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;gBAChC,MAAM,mBAAmB,GAAG,YAAY;qBACrC,MAAM,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,oBAAoB;qBACvE,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAEpC,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACnC,OAAO,CAAC,GAAG,CAAC,2CAA2C,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAC3F,CAAC;qBAAM,CAAC;oBACN,OAAO,CAAC,GAAG,CAAC,kEAAkE,CAAC,CAAC;gBAClF,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,IAAI,CAAC,YAAY;iBACd,kBAAkB,CAAC,YAAY,CAAC;iBAChC,IAAI,CAAC,GAAG,EAAE;gBACT,OAAO,CAAC,GAAG,CACT,6BAA6B,YAAY,CAAC,MAAM,wCAAwC,CACzF,CAAC;YACJ,CAAC,CAAC;iBACD,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;gBACb,OAAO,CAAC,GAAG,CAAC,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACpE,CAAC,CAAC,CAAC;QACP,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAClE,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,yBAAyB,CAAC,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,SAAS,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACK,qBAAqB,CAC3B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,WAAmB,EACnB,eAAwB;QAExB,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mEAAmE,CACpF,CAAC;YACF,iCAAiC;YACjC,OAAO,IAAI,CAAC,qBAAqB,CAC/B,YAAY,EACZ,MAAM,EACN,MAAM,EACN,SAAS,EACT,SAAS,EACT,WAAW,CACZ,CAAC;QACJ,CAAC;QAED,+EAA+E;QAC/E,MAAM,SAAS,GAAG,eAAe,IAAI,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC;QAC1E,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,qCAAqC;QAEpE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD,SAAS,IAAI,SAAS,EAAE,CAC3F,CAAC;QACJ,CAAC;QAED,0CAA0C;QAC1C,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YACtC,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,SAAS;SAChB,CAAC,CAAC;QAEH,0CAA0C;QAC1C,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC;QAC9B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtC,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAEhC,wBAAwB;QACxB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YAC9B,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClF,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,6BAA6B,CAAC,CAAC;QAChE,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,WAAW,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,SAAS,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,gEAAgE;YAChE,WAAW,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAE/B,kEAAkE;YAClE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACzB,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEzB,yBAAyB;YACzB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,CAAC,CAAC;gBAClE,CAAC;gBACD,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,sBAAsB,CAAC,CAAC;YACzD,CAAC,CAAC,CAAC;YAEH,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBACtB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6DAA6D,CAC9E,CAAC;gBACJ,CAAC;gBACD,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;YAClD,CAAC,CAAC,CAAC;YAEH,mCAAmC;YACnC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC;YACrD,WAAW,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC;YAE1D,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yDAAyD,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACK,qBAAqB,CAC3B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,YAAuC,EACvC,UAAmB,EACnB,YAAqB,EACrB,YAAqB;QAErB,kCAAkC;QAClC,MAAM,UAAU,GAAG,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;QAC3F,MAAM,iBAAiB,GAA+B;YACpD,IAAI,EAAE,UAAU;YAChB,IAAI,EAAE,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM;SACvE,CAAC;QACF,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACnC,iBAAiB,CAAC,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,6DAA6D;QAC7D,yEAAyE;QACzE,MAAM,SAAS,GAAa,EAAE,CAAC;QAC/B,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,IAAI,eAAe,GAAG,KAAK,CAAC;QAC5B,IAAI,YAAY,GAAG,KAAK,CAAC;QAEzB,gEAAgE;QAChE,2DAA2D;QAC3D,IAAI,iBAAiB,GAAG,KAAK,CAAC;QAE9B,wDAAwD;QACxD,kEAAkE;QAClE,MAAM,CAAC,KAAK,EAAE,CAAC;QAEf,kEAAkE;QAClE,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,IAAI,eAAe,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,iBAAiB;gBAAE,OAAO;YAE3E,eAAe,GAAG,IAAI,CAAC;YAEvB,IAAI,CAAC;gBACH,4DAA4D;gBAC5D,OAAO,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,EAAG,CAAC;oBACjC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;oBAE1B,qDAAqD;oBACrD,yDAAyD;oBACzD,IAAI,iBAAiB,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACzC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBAC7B,SAAS;oBACX,CAAC;oBAED,uBAAuB;oBACvB,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAErC,0BAA0B;oBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBACtD,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;wBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,KAAK,CAAC,MAAM,QAAQ,CACrF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,2DAA2D;oBAC3D,MAAM,OAAO,GAAG,MAAM,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC;oBAEtD,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACnF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,QAAQ,KAAK,OAAO,YAAY,IAAI,CAAC,QAAQ,CAAC,kBAAkB,QAAQ,CAC/I,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,8BAA8B;wBAC5C,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;wBAC1D,OAAO;oBACT,CAAC;oBAED,+CAA+C;oBAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;oBAC5C,MAAM,CAAC,eAAe,GAAG,OAAO,CAAC;oBACjC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBAC9B,CAAC;YACH,CAAC;oBAAS,CAAC;gBACT,eAAe,GAAG,KAAK,CAAC;gBAExB,6DAA6D;gBAC7D,wEAAwE;gBACxE,IAAI,YAAY,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;oBACjE,YAAY,GAAG,KAAK,CAAC;oBACrB,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,wDAAwD;QACxD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,gEAAgE;YAChE,IAAI,iBAAiB;gBAAE,OAAO;YAE9B,0CAA0C;YAC1C,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,yBAAyB;YAC7D,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YAE1B,4DAA4D;YAC5D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,GAAG,GAAG,EAAE,CAAC;gBAC3F,MAAM,CAAC,KAAK,EAAE,CAAC;gBACf,YAAY,GAAG,IAAI,CAAC;YACtB,CAAC;YAED,oBAAoB;YACpB,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC;QAEF,4BAA4B;QAC5B,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAEnC,+CAA+C;QAC/C,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;YACnD,MAAM,CAAC,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC;QAC/C,CAAC;QAED,+DAA+D;QAC/D,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;QAC5D,MAAM,CAAC,QAAQ,GAAG,YAAY,CAAC;QAC/B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEtC,6BAA6B;QAC7B,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE/C,+DAA+D;QAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,YAAY,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAErE,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,IAAI,oBAAoB,IAAI,YAAY,EAAE,CAAC;wBACxC,YAAoB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBAC/C,CAAC;oBACD,IAAI,sBAAsB,IAAI,YAAY,EAAE,CAAC;wBAC1C,YAAoB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACnD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gEAAgE,GAAG,EAAE,CACtF,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,YAAY,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YACjC,kEAAkE;YAClE,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+BAA+B,UAAU,IAAI,iBAAiB,CAAC,IAAI,KAAK,GAAG,CAAC,OAAO,KAAK,IAAI,GAAG,CAChH,CAAC;YAEF,wDAAwD;YACxD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC5B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,UAAU,IAAI,iBAAiB,CAAC,IAAI,qBAAqB,CACtF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,UAAU,UAAU,iBAAiB,CAAC,CAAC;YACrE,CAAC;YAED,0DAA0D;YAC1D,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,8DAA8D;YAC9D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAE/D,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,mBAAmB,CAAC;gBACvD,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,mBAAmB,CAAC,CAAC;YACjE,CAAC;YAED,0BAA0B;YAC1B,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,qBAAqB,IAAI,EAAE,CAAC,CAAC;QAChE,CAAC,CAAC,CAAC;QAEH,sBAAsB;QACtB,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAC/D,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAEzD,4CAA4C;QAC5C,MAAM,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YACxB,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,wCAAwC;gBACxC,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACvD,CAAC;YACD,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;QAEH,YAAY,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC9B,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,wCAAwC;gBACxC,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACvD,CAAC;YACD,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;QAEH,2EAA2E;QAC3E,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;YAC3E,uDAAuD;YACvD,MAAM,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;YACrB,YAAY,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+DAA+D,CAChF,CAAC;YACJ,CAAC;QACH,CAAC;aAAM,CAAC;YACN,4CAA4C;YAC5C,MAAM,CAAC,UAAU,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,CAAC,CAAC;YAC7E,YAAY,CAAC,UAAU,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,CAAC,CAAC;QACrF,CAAC;QAED,yCAAyC;QACzC,YAAY,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACxC,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YACjC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAC9B,CAAC,CAAC,CAAC;QAEH,wEAAwE;QACxE,YAAY,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;YAChC,6CAA6C;YAC7C,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,2DAA2D;YAC3D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAE/D,qEAAqE;YACrE,gBAAgB,EAAE,CAAC;YAEnB,4DAA4D;YAC5D,iBAAiB,GAAG,IAAI,CAAC;YAEzB,mCAAmC;YACnC,IAAI,MAAM,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClC,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;gBAEvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,gBAAgB,YAAY,CAAC,MAAM,kCAAkC,CAAC,CAAC;gBACrG,CAAC;gBAED,iCAAiC;gBACjC,YAAY,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC,GAAG,EAAE,EAAE;oBACvC,IAAI,GAAG,EAAE,CAAC;wBACR,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;wBACtF,OAAO,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;oBACzD,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,+CAA+C;gBAC/C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;gBACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAC7B,CAAC;YAED,qDAAqD;YACrD,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YAC1B,YAAY,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAE1B,qDAAqD;YACrD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,uDAAuD;YACvD,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzB,gEAAgE;gBAChE,KAAK,MAAM,KAAK,IAAI,SAAS,EAAE,CAAC;oBAC9B,YAAY,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;gBAC5B,CAAC;gBACD,kBAAkB;gBAClB,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;gBACrB,SAAS,GAAG,CAAC,CAAC;YAChB,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACvG,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE;oBACF,SAAS,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBAClC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE,CACL,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,2BAA2B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACrF,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE,CACL,CAAC;YACJ,CAAC;YAGD,kFAAkF;YAClF,qDAAqD;YACrD,IAAI,UAAU,EAAE,CAAC;gBACf,sEAAsE;gBACtE,MAAM,oBAAoB,GAAG,CAAC,UAAkB,EAAE,EAAE;oBAClD,oDAAoD;oBACpD,IAAI,UAAU,CAAC,aAAa,CAAC,UAAU,CAAC,EAAE,CAAC;wBACzC,IAAI,CAAC;4BACH,+BAA+B;4BAC/B,8DAA8D;4BAC9D,MAAM,QAAQ,GAAG;gCACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;gCACzB,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC;gCAC3C,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,YAAY,IAAI,EAAE;gCAC1C,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,SAAS,IAAI,CAAC;6BACzC,CAAC;4BAEF,8DAA8D;4BAC9D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;gCAC/C,iEAAiE;gCACjE,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CACpD,UAAU,EACV,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;gCAEF,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;oCAChC,qDAAqD;oCACrD,iCAAiC;oCACjC,MAAM,YAAY,GAAG,UAAU,CAAC,UAAU,CACxC,UAAU,EACV,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;oCACF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD;wCAChE,YAAY,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,IAAI;wCACpD,cAAc,YAAY,IAAI,MAAM,IAAI;wCACxC,uBAAuB,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAC5D,CAAC;oCAEF,kDAAkD;oCAClD,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,CAAC;wCAC3B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2FAA2F;4CACzG,oDAAoD,CACvD,CAAC;wCACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,wBAAwB,CAAC,CAAC;wCAC3D,OAAO;oCACT,CAAC;yCAAM,CAAC;wCACN,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4CACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2DAA2D;gDACzE,2CAA2C,CAC9C,CAAC;wCACJ,CAAC;oCACH,CAAC;gCACH,CAAC;4BACH,CAAC;4BAED,MAAM,MAAM,GAAG,UAAU,CAAC,+BAA+B,CACvD,UAAU,EACV,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;4BAEF,2BAA2B;4BAC3B,IAAI,CAAC,MAAM;gCAAE,OAAO;4BAEpB,gFAAgF;4BAChF,IAAI,MAAM,KAAK,MAAM,CAAC,YAAY,EAAE,CAAC;gCACnC,sDAAsD;gCACtD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,uCAAuC,MAAM,CAAC,YAAY,OAAO,MAAM,IAAI;oCACzF,+DAA+D,CAClE,CAAC;gCACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;4BACnD,CAAC;iCAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2CAA2C,MAAM,aAAa,CAC/E,CAAC;4BACJ,CAAC;wBACH,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCAAmC,GAAG,oCAAoC,CAC3F,CAAC;wBACJ,CAAC;oBACH,CAAC;gBACH,CAAC,CAAC;gBAEF,gFAAgF;gBAChF,MAAM,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;gBAEnD,gEAAgE;gBAChE,4EAA4E;gBAC5E,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAExC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD,UAAU,EAAE,CACtF,CAAC;oBACF,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wFAAwF,CACzG,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;YAED,4CAA4C;YAC5C,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YACpC,CAAC;YAED,yEAAyE;YACzE,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;gBAC3E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mEAAmE,CACpF,CAAC;gBACJ,CAAC;gBACD,4CAA4C;YAC9C,CAAC;YACD,4DAA4D;iBACvD,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;gBAChF,MAAM,eAAe,GAAG,IAAI,CAAC,QAAQ,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,SAAS;gBACrG,MAAM,WAAW,GAAG,iBAAiB,CAAC,eAAe,CAAC,CAAC;gBAEvD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC,GAAG,EAAE;oBACpC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCACd,MAAM,CAAC,QACT,gCAAgC,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAC,qBAAqB,CACvF,CAAC;oBACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,mBAAmB,CAAC,CAAC;gBACxD,CAAC,EAAE,WAAW,CAAC,CAAC;gBAEhB,mDAAmD;gBACnD,IAAI,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;oBAC9B,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;gBAC9B,CAAC;gBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qDAAqD,OAAO,CAAC,QAAQ,CACnF,eAAe,CAChB,EAAE,CACJ,CAAC;gBACJ,CAAC;YACH,CAAC;YACD,+CAA+C;iBAC1C,CAAC;gBACJ,kEAAkE;gBAClE,MAAM,iBAAiB,GACrB,MAAM,CAAC,YAAY,EAAE,iBAAiB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAsB,CAAC;gBACjF,MAAM,WAAW,GAAG,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;gBAEzD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC,GAAG,EAAE;oBACpC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBACd,MAAM,CAAC,QACT,2BAA2B,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAC,qBAAqB,CACpF,CAAC;oBACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBACzD,CAAC,EAAE,WAAW,CAAC,CAAC;gBAEhB,mDAAmD;gBACnD,IAAI,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;oBAC9B,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;gBAC9B,CAAC;YACH,CAAC;YAED,qDAAqD;YACrD,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC;gBAEnC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,EAAU;QACvC,OAAO,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IACjD,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,EAAU;QACpC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,EAAE,GAAG,IAAI,CAAC;QAEzB,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;YACvC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,4DAA4D;QAC5D,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,CAAE,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,GAAG,GAAG,IAAI,GAAG,MAAM,CAAC,CAAC;QAC1F,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACrB,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,EAAE,UAAU,CAAC,CAAC;QAE5C,8BAA8B;QAC9B,OAAO,UAAU,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,4BAA6B,CAAC;IAC1E,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,EAAU,EAAE,YAAoB;QAC1D,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC;YAClC,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC1C,CAAC;QACD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAE,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,oBAAoB,CAAC,EAAU,EAAE,YAAoB;QAC3D,IAAI,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC;YACjC,MAAM,WAAW,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAE,CAAC;YAClD,WAAW,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,WAAW,CAAC,IAAI,KAAK,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAClC,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,wBAAwB,CAAC,IAA6B,EAAE,MAAc;QAC5E,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC;IACvF,CAAC;IAED;;;;;OAKG;IACK,iBAAiB,CAAC,MAAyB,EAAE,SAAiB,QAAQ;QAC5E,IAAI,CAAC,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAC7B,MAAM,CAAC,gBAAgB,GAAG,IAAI,CAAC;YAE/B,+BAA+B;YAC/B,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,QAAQ,EAAE,MAAM,CAAC,EAAE,CAAC,CAAC;YAEtD,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;gBAClC,MAAM,CAAC,YAAY,GAAG,SAAS,CAAC;YAClC,CAAC;YAED,wBAAwB;YACxB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,MAAM,CAAC,iBAAiB,CAAC;YACvD,MAAM,aAAa,GAAG,MAAM,CAAC,aAAa,CAAC;YAC3C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;YAEnC,+FAA+F;YAC/F,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;gBACpB,IAAI,CAAC;oBACH,+BAA+B;oBAC/B,MAAM,CAAC,QAAQ,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;oBAE3C,+BAA+B;oBAC/B,MAAM,CAAC,oBAAoB,GAAG,SAAS,CAAC;gBAC1C,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,mCAAmC,GAAG,EAAE,CAAC,CAAC;gBACrE,CAAC;YACH,CAAC;YAED,IAAI,CAAC;gBACH,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;oBAC/B,wEAAwE;oBACxE,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACtB,MAAM,eAAe,GAAG,UAAU,CAAC,GAAG,EAAE;wBACtC,IAAI,CAAC;4BACH,IAAI,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gCACzC,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;4BAC5B,CAAC;wBACH,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;wBACzE,CAAC;oBACH,CAAC,EAAE,IAAI,CAAC,CAAC;oBAET,qDAAqD;oBACrD,IAAI,eAAe,CAAC,KAAK,EAAE,CAAC;wBAC1B,eAAe,CAAC,KAAK,EAAE,CAAC;oBAC1B,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,oCAAoC,GAAG,EAAE,CAAC,CAAC;gBACpE,IAAI,CAAC;oBACH,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAC/B,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;oBAC5B,CAAC;gBACH,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,UAAU,EAAE,CAAC,CAAC;gBAChF,CAAC;YACH,CAAC;YAED,IAAI,CAAC;gBACH,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;oBAClD,wEAAwE;oBACxE,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACtB,MAAM,eAAe,GAAG,UAAU,CAAC,GAAG,EAAE;wBACtC,IAAI,CAAC;4BACH,IAAI,MAAM,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gCAC5D,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;4BAC5B,CAAC;wBACH,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;wBACzE,CAAC;oBACH,CAAC,EAAE,IAAI,CAAC,CAAC;oBAET,qDAAqD;oBACrD,IAAI,eAAe,CAAC,KAAK,EAAE,CAAC;wBAC1B,eAAe,CAAC,KAAK,EAAE,CAAC;oBAC1B,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,oCAAoC,GAAG,EAAE,CAAC,CAAC;gBACpE,IAAI,CAAC;oBACH,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAClD,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;oBAC5B,CAAC;gBACH,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,UAAU,EAAE,CAAC,CAAC;gBAChF,CAAC;YACH,CAAC;YAED,0CAA0C;YAC1C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;YACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAE3B,0CAA0C;YAC1C,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAEzC,yBAAyB;YACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,qBAAqB,MAAM,CAAC,QAAQ,YAAY,MAAM,CAAC,SAAS,gBAAgB,MAAM,IAAI;oBACrG,cAAc,OAAO,CAAC,QAAQ,CAC5B,QAAQ,CACT,eAAe,aAAa,UAAU,SAAS,IAAI;oBACpD,QAAQ,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBACjC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE;oBACF,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC,CAAC,sBAAsB,CAAC,CAAC,CAAC,EAAE,EAAE;oBAC3D,GAAG,MAAM,CAAC,cAAc,CAAC,CAAC,CAAC,sBAAsB,MAAM,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAClF,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,qBAAqB,MAAM,CAAC,QAAQ,gBAAgB,MAAM,0BAA0B,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAC/H,CAAC;YACJ,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,MAAyB;QAC9C,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEjC,+BAA+B;QAC/B,IAAI,MAAM,CAAC,uBAAuB,EAAE,CAAC;YACnC,MAAM,CAAC,uBAAuB,GAAG,KAAK,CAAC;QACzC,CAAC;IACH,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,YAA2B;QAC7C,IAAI,YAAY,CAAC,SAAS,IAAI,YAAY,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChE,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC;YACrE,MAAM,EAAE,GAAG,YAAY,CAAC,SAAS,CAAC,YAAY,GAAG,YAAY,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;YAChF,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,YAAY,EAAE,YAAY,GAAG,CAAC,CAAC,CAAC;YAC7D,OAAO,EAAE,CAAC;QACZ,CAAC;QACD,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;IACjC,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,MAAyB,EAAE,SAAiB,QAAQ;QAC9E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,sCAAsC,MAAM,CAAC,QAAQ,KAAK,MAAM,GAAG,CAAC,CAAC;QAChG,CAAC;QAED,IACE,MAAM,CAAC,yBAAyB,KAAK,IAAI;YACzC,MAAM,CAAC,yBAAyB,KAAK,SAAS,EAC9C,CAAC;YACD,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;YAC1C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;QACpD,CAAC;QAED,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAA6B,EAAE,MAAyB;QAC1E,OAAO,CAAC,GAAU,EAAE,EAAE;YACpB,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,IAAI,MAAM,GAAG,OAAO,CAAC;YAErB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,MAAM,kBAAkB,GAAG,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC;YAC1D,MAAM,eAAe,GAAG,GAAG,GAAG,MAAM,CAAC,YAAY,CAAC;YAElD,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBAC1B,MAAM,GAAG,YAAY,CAAC;gBACtB,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,mBAAmB,IAAI,cAAc,MAAM,CAAC,QAAQ,KAC/D,GAAG,CAAC,OACN,eAAe,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,oBAAoB,OAAO,CAAC,QAAQ,CACrF,eAAe,CAChB,MAAM,CACR,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,MAAM,GAAG,WAAW,CAAC;gBACrB,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,kBAAkB,IAAI,cAAc,MAAM,CAAC,QAAQ,KAC9D,GAAG,CAAC,OACN,eAAe,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,oBAAoB,OAAO,CAAC,QAAQ,CACrF,eAAe,CAChB,MAAM,CACR,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,cAAc,IAAI,cAAc,MAAM,CAAC,QAAQ,KAC1D,GAAG,CAAC,OACN,eAAe,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,oBAAoB,OAAO,CAAC,QAAQ,CACrF,eAAe,CAChB,MAAM,CACR,CAAC;YACJ,CAAC;YAED,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBACrE,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;gBAC1C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;YACpD,CAAC;iBAAM,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC5E,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;gBAC1C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;YACpD,CAAC;YAED,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC3C,CAAC,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAA6B,EAAE,MAAyB;QAC1E,OAAO,GAAG,EAAE;YACV,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,0BAA0B,IAAI,cAAc,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBACrE,MAAM,CAAC,yBAAyB,GAAG,QAAQ,CAAC;gBAC5C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;YACtD,CAAC;iBAAM,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC5E,MAAM,CAAC,yBAAyB,GAAG,QAAQ,CAAC;gBAC5C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;gBACpD,+CAA+C;gBAC/C,MAAM,CAAC,kBAAkB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACzC,CAAC;YAED,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,SAAS,GAAG,IAAI,CAAC,CAAC;QACrD,CAAC,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,uCAAuC;QACvC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,OAAO,CAAC,GAAG,CAAC,iDAAiD,CAAC,CAAC;YAC/D,OAAO;QACT,CAAC;QAED,gGAAgG;QAChG,IACE,IAAI,CAAC,QAAQ,CAAC,eAAe;YAC7B,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC;YACxC,CAAC,IAAI,CAAC,YAAY,EAClB,CAAC;YACD,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;QACtC,CAAC;QAED,mCAAmC;QACnC,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAE9E,kBAAkB;YAClB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,2CACE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,SACpD,QAAQ,CACT,CAAC;gBACF,OAAO,CAAC,GAAG,CAAC,sCAAsC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;gBAE7E,oDAAoD;gBACpD,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;oBAC5C,OAAO,CAAC,GAAG,CAAC,sDAAsD,CAAC,CAAC;oBACpE,oFAAoF;gBACtF,CAAC;YACH,CAAC;QACH,CAAC;QAED,+DAA+D;QAC/D,MAAM,iBAAiB,GAAG,CAAC,MAA0B,EAAE,EAAE;YACvD,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;gBACxB,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,OAAO,EAAE,CAAC;gBACjB,OAAO;YACT,CAAC;YAED,MAAM,QAAQ,GAAG,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC;YAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,IAAI,CAAC,CAAC,CAAC,kDAAkD;YAE3F,oBAAoB;YACpB,IACE,IAAI,CAAC,QAAQ,CAAC,mBAAmB;gBACjC,IAAI,CAAC,sBAAsB,CAAC,QAAQ,CAAC,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAC1E,CAAC;gBACD,OAAO,CAAC,GAAG,CACT,4BAA4B,QAAQ,iCAAiC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,YAAY,CACnH,CAAC;gBACF,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,OAAO,EAAE,CAAC;gBACjB,OAAO;YACT,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,4BAA4B,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACtF,OAAO,CAAC,GAAG,CACT,4BAA4B,QAAQ,4BAA4B,IAAI,CAAC,QAAQ,CAAC,4BAA4B,gBAAgB,CAC3H,CAAC;gBACF,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,OAAO,EAAE,CAAC;gBACjB,OAAO;YACT,CAAC;YAED,6BAA6B;YAC7B,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;YAEzC,2CAA2C;YAC3C,MAAM,YAAY,GAAG,oBAAoB,EAAE,CAAC;YAC5C,MAAM,gBAAgB,GAAsB;gBAC1C,EAAE,EAAE,YAAY;gBAChB,QAAQ,EAAE,MAAM;gBAChB,QAAQ,EAAE,IAAI;gBACd,iBAAiB,EAAE,IAAI,CAAC,GAAG,EAAE;gBAC7B,YAAY,EAAE,IAAI,CAAC,GAAG,EAAE;gBACxB,gBAAgB,EAAE,KAAK;gBACvB,WAAW,EAAE,EAAE;gBACf,eAAe,EAAE,CAAC;gBAElB,sCAAsC;gBACtC,aAAa,EAAE,CAAC;gBAChB,SAAS,EAAE,CAAC;gBACZ,QAAQ,EAAE,QAAQ;gBAClB,SAAS,EAAE,SAAS;gBACpB,KAAK,EAAE,KAAK;gBACZ,oBAAoB,EAAE,KAAK;gBAC3B,sBAAsB,EAAE,KAAK;gBAC7B,YAAY,EAAE,KAAK,EAAE,4CAA4C;gBACjE,yBAAyB,EAAE,IAAI;gBAC/B,yBAAyB,EAAE,IAAI;gBAE/B,mCAAmC;gBACnC,iBAAiB,EAAE,KAAK;gBAExB,yCAAyC;gBACzC,mBAAmB,EAAE,KAAK;gBAC1B,cAAc,EAAE,CAAC;aAClB,CAAC;YAEF,uCAAuC;YACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gBAC5B,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;gBAC/D,gBAAgB,CAAC,YAAY,GAAG,IAAI,CAAC,CAAC,uCAAuC;gBAE7E,mDAAmD;gBACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,IAAI,CAAC;wBACH,uDAAuD;wBACvD,IAAI,oBAAoB,IAAI,MAAM,EAAE,CAAC;4BAClC,MAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC,CAAC,0BAA0B;wBACpE,CAAC;wBACD,IAAI,sBAAsB,IAAI,MAAM,EAAE,CAAC;4BACpC,MAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,mCAAmC;wBACjF,CAAC;oBACH,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,kDAAkD;wBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qDAAqD,GAAG,EAAE,CAC3E,CAAC;wBACJ,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,yBAAyB;YACzB,IAAI,CAAC,mBAAmB,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC;YACjD,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE,gBAAgB,CAAC,CAAC;YAE3D,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yBAAyB,QAAQ,YAAY,SAAS,IAAI;oBACxE,eAAe,gBAAgB,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,IAAI;oBACzE,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CACvD,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,uBAAuB,QAAQ,YAAY,SAAS,yBAAyB,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAC3G,CAAC;YACJ,CAAC;YAED,wEAAwE;YACxE,6CAA6C;YAC7C,IAAI,qBAAqB,GACvB,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;YAErF,+DAA+D;YAE/D,IAAI,qBAAqB,EAAE,CAAC;gBAC1B,oFAAoF;gBACpF,IAAI,mBAAmB,GAAG,KAAK,CAAC;gBAEhC,4CAA4C;gBAC5C,IAAI,cAAc,GAA0B,UAAU,CAAC,GAAG,EAAE;oBAC1D,IAAI,CAAC,mBAAmB,EAAE,CAAC;wBACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,QAAQ,EAAE,CAAC,CAAC;wBAE9H,sDAAsD;wBACtD,UAAU,CAAC,GAAG,EAAE;4BACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;gCACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;gCAC/E,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;oCAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;gCAC/D,CAAC;gCACD,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;4BAC9D,CAAC;wBACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;oBACtC,CAAC;gBACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;gBAEtC,mDAAmD;gBACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;oBACzB,cAAc,CAAC,KAAK,EAAE,CAAC;gBACzB,CAAC;gBAED,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,gBAAgB,CAAC,CAAC,CAAC;gBAEnE,uEAAuE;gBACvE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;oBACpC,sDAAsD;oBACtD,IAAI,cAAc,EAAE,CAAC;wBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;wBAC7B,cAAc,GAAG,IAAI,CAAC;oBACxB,CAAC;oBAED,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;oBAE/C,wCAAwC;oBACxC,4CAA4C;oBAC5C,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;wBAC3D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C;4BAC3D,8EAA8E,CACjF,CAAC;wBACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;4BAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;wBAC/D,CAAC;wBACD,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;wBAC5D,OAAO;oBACT,CAAC;oBAED,2CAA2C;oBAC3C,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBACrC,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;wBAE9B,kEAAkE;wBAClE,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,IAAI,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;4BAClF,oBAAoB;4BACpB,MAAM,YAAY,GAAG,UAAU,CAAC,UAAU,CACxC,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;4BACF,MAAM,MAAM,GAAG,CAAC,CAAC,YAAY,CAAC;4BAE9B,yCAAyC;4BACzC,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CACpD,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;4BAEF,oCAAoC;4BACpC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D;gCAC1E,YAAY,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,IAAI;gCACrC,cAAc,YAAY,IAAI,MAAM,IAAI;gCACxC,2BAA2B,cAAc,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,EAAE,CAC1E,CAAC;4BAEF,mEAAmE;4BACnE,IAAI,cAAc,CAAC,YAAY,IAAI,CAAC,MAAM,EAAE,CAAC;gCAC3C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,iGAAiG;oCAC/G,oDAAoD,CACvD,CAAC;gCACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCACxD,gBAAgB,CAAC,yBAAyB,GAAG,wBAAwB,CAAC;oCACtE,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,wBAAwB,CAAC,CAAC;gCACtE,CAAC;gCACD,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,wBAAwB,CAAC,CAAC;gCACnE,OAAO;4BACT,CAAC;4BAED,sFAAsF;4BACtF,2DAA2D;4BAC3D,IAAI,CAAC,MAAM,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;gCACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mFAAmF;oCACjG,0DAA0D,CAC7D,CAAC;gCACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCACxD,gBAAgB,CAAC,yBAAyB,GAAG,gBAAgB,CAAC;oCAC9D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,gBAAgB,CAAC,CAAC;gCAC9D,CAAC;gCACD,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,gBAAgB,CAAC,CAAC;gCAC3D,OAAO;4BACT,CAAC;wBACH,CAAC;wBAED,+DAA+D;wBAC/D,MAAM,QAAQ,GAAG;4BACf,QAAQ,EAAE,QAAQ;4BAClB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;4BAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;4BACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;yBAChC,CAAC;wBAEF,iEAAiE;wBACjE,MAAM,UAAU,GAAG,UAAU,CAAC,gBAAgB,CAC5C,KAAK,EACL,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;wBAEF,IAAI,UAAU,EAAE,CAAC;4BACf,oEAAoE;4BACpE,MAAM,YAAY,GAAG,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,EAAE,CAC/D,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC,CAC7D,CAAC;4BAEF,kDAAkD;4BAClD,gBAAgB,CAAC,YAAY,GAAG,YAAY,CAAC;4BAC7C,gBAAgB,CAAC,YAAY,GAAG,UAAU,CAAC;4BAE3C,sDAAsD;4BACtD,IAAI,YAAY,EAAE,eAAe,EAAE,CAAC;gCAClC,MAAM,gBAAgB,GACpB,YAAY,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC;gCAElE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4CAA4C,UAAU,YAAY,gBAAgB,EAAE,CACrG,CAAC;gCACJ,CAAC;gCAED,oDAAoD;gCACpD,IAAI,CAAC,qBAAqB,CACxB,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,KAAK,EACL,gBAAgB,CACjB,CAAC;gCACF,OAAO;4BACT,CAAC;wBACH,CAAC;wBAED,oEAAoE;wBACpE,IAAI,CAAC,qBAAqB,CAAC,YAAY,EAAE,MAAM,EAAE,gBAAgB,EAAE,KAAK,CAAC,CAAC;oBAC5E,CAAC;yBAAM,CAAC;wBACN,2CAA2C;wBAC3C,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,6CAA6C,SAAS,EAAE,CAAC,CAAC;wBACtF,IAAI,CAAC,qBAAqB,CACxB,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,SAAS,EACT,SAAS,EACT,KAAK,CACN,CAAC;oBACJ,CAAC;gBACH,CAAC,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,6DAA6D;gBAE7D,2CAA2C;gBAC3C,MAAM,wBAAwB,GAAG,CAAC,MAAc,EAAE,UAAkB,EAAE,EAAE;oBACtE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,KAAK,UAAU,EAAE,CAAC,CAAC;oBAC/C,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;wBACxD,gBAAgB,CAAC,yBAAyB,GAAG,MAAM,CAAC;wBACpD,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;oBACpD,CAAC;oBACD,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,MAAM,CAAC,CAAC;gBACnD,CAAC,CAAC;gBAEF,IAAI,mBAAmB,GAAG,KAAK,CAAC;gBAEhC,gDAAgD;gBAChD,IAAI,cAAc,GAA0B,IAAI,CAAC;gBACjD,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;oBAC7B,cAAc,GAAG,UAAU,CAAC,GAAG,EAAE;wBAC/B,IAAI,CAAC,mBAAmB,EAAE,CAAC;4BACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,QAAQ,EAAE,CAAC,CAAC;4BAE9H,sDAAsD;4BACtD,UAAU,CAAC,GAAG,EAAE;gCACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;oCACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;oCAC/E,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;wCACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;wCAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;oCAC/D,CAAC;oCACD,MAAM,CAAC,GAAG,EAAE,CAAC;oCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;gCAC9D,CAAC;4BACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;wBACtC,CAAC;oBACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;oBAEtC,mDAAmD;oBACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;wBACzB,cAAc,CAAC,KAAK,EAAE,CAAC;oBACzB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;gBACjD,CAAC;gBAED,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,gBAAgB,CAAC,CAAC,CAAC;gBAEnE,gCAAgC;gBAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;oBAClC,gBAAgB,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAC/C,IAAI,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC;oBAEtC,qDAAqD;oBACrD,IAAI,CAAC,gBAAgB,CAAC,KAAK,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBAChE,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;wBAE9B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,iCAAiC,QAAQ,KAAK,KAAK,CAAC,MAAM,QAAQ,CACnF,CAAC;4BACF,iDAAiD;4BACjD,2CAA2C;4BAC3C,MAAM,aAAa,GAAG;gCACpB,QAAQ,EAAE,QAAQ;gCAClB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;gCAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;gCACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;6BAChC,CAAC;4BAEF,UAAU,CAAC,+BAA+B,CAAC,KAAK,EAAE,aAAa,EAAE,IAAI,CAAC,CAAC;wBACzE,CAAC;oBACH,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH;;;;;;mBAMG;gBACH,MAAM,eAAe,GAAG,CACtB,UAAkB,EAClB,YAAqB,EACrB,YAA4B,EAC5B,YAAqB,EACrB,EAAE;oBACF,sDAAsD;oBACtD,IAAI,cAAc,EAAE,CAAC;wBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;wBAC7B,cAAc,GAAG,IAAI,CAAC;oBACxB,CAAC;oBAED,wCAAwC;oBACxC,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;oBAE/C,2CAA2C;oBAC3C,MAAM,sBAAsB,GAAG,YAAY,IAAI,UAAU,CAAC,cAAc,CAAC,YAAY,CAAC,CAAC;oBACvF,IAAI,sBAAsB,EAAE,CAAC;wBAC3B,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;wBAE9B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,sCAAsC,YAAY,CAAC,MAAM,QAAQ,CAClF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,+FAA+F;oBAC/F,MAAM,YAAY,GAAG,YAAY;wBAC/B,CAAC,CAAC,YAAY;wBACd,CAAC,CAAC,UAAU;4BACZ,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,EAAE,CAC1C,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC,CAC7D;4BACH,CAAC,CAAC,SAAS,CAAC;oBAEd,0CAA0C;oBAC1C,gBAAgB,CAAC,YAAY,GAAG,YAAY,CAAC;oBAE7C,yEAAyE;oBACzE,IAAI,YAAY,EAAE,eAAe,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;wBACvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,UAAU,oCAAoC,CAC3E,CAAC;wBACJ,CAAC;wBAED,MAAM,gBAAgB,GACpB,YAAY,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC;wBAElE,IAAI,YAAY,IAAI,gBAAgB,CAAC,KAAK,EAAE,CAAC;4BAC3C,kEAAkE;4BAClE,IAAI,CAAC,qBAAqB,CACxB,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,YAAY,EACZ,gBAAgB,CAAC,2DAA2D;6BAC7E,CAAC;4BACF,OAAO,CAAC,+BAA+B;wBACzC,CAAC;oBACH,CAAC;oBAED,kDAAkD;oBAClD,IAAI,YAAY,EAAE,CAAC;wBACjB,MAAM,mBAAmB,GAAa;4BACpC,GAAG,YAAY,CAAC,UAAU;4BAC1B,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;yBAC3C,CAAC;wBACF,MAAM,mBAAmB,GAAa;4BACpC,GAAG,CAAC,YAAY,CAAC,UAAU,IAAI,EAAE,CAAC;4BAClC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;yBAC3C,CAAC;wBAEF,4CAA4C;wBAC5C,IACE,YAAY,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC;4BAClC,CAAC,eAAe,CAAC,QAAQ,EAAE,mBAAmB,EAAE,mBAAmB,CAAC,EACpE,CAAC;4BACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,QAAQ,2BAA2B,YAAY,CAAC,OAAO,CAAC,IAAI,CACrF,IAAI,CACL,EAAE,CACJ,CAAC;wBACJ,CAAC;oBACH,CAAC;yBAAM,IACL,IAAI,CAAC,QAAQ,CAAC,iBAAiB;wBAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAC1C,CAAC;wBACD,IACE,CAAC,eAAe,CACd,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,iBAAiB,EAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CACtC,EACD,CAAC;4BACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,QAAQ,sCAAsC,CAC1E,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,uBAAuB;oBACvB,IAAI,UAAU,EAAE,CAAC;wBACf,gBAAgB,CAAC,YAAY,GAAG,UAAU,CAAC;oBAC7C,CAAC;oBAED,+BAA+B;oBAC/B,OAAO,IAAI,CAAC,qBAAqB,CAC/B,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,YAAY,EACZ,UAAU,EACV,YAAY,EACZ,YAAY,CACb,CAAC;gBACJ,CAAC,CAAC;gBAEF,oCAAoC;gBACpC,4FAA4F;gBAC5F,IACE,IAAI,CAAC,QAAQ,CAAC,gBAAgB;oBAC9B,cAAc,CAAC,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,EACzD,CAAC;oBACD,IAAI,IAAI,CAAC,QAAQ,CAAC,sBAAsB,EAAE,CAAC;wBACzC,IACE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;4BAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC;4BAC1C,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EACrD,CAAC;4BACD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,QAAQ,iBAAiB,QAAQ,8CAA8C,CACrH,CAAC;4BACF,MAAM,CAAC,GAAG,EAAE,CAAC;4BACb,OAAO;wBACT,CAAC;wBACD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCAAgC,QAAQ,YAAY,SAAS,kCAAkC,IAAI,CAAC,QAAQ,CAAC,QAAQ,GAAG,CACzI,CAAC;wBACJ,CAAC;wBACD,eAAe,CACb,EAAE,EACF,SAAS,EACT;4BACE,OAAO,EAAE,CAAC,QAAQ,CAAC;4BACnB,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;4BACjD,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;4BACjD,SAAS,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;4BACpC,UAAU,EAAE,EAAE;yBACf,EACD,SAAS,CACV,CAAC;wBACF,OAAO;oBACT,CAAC;yBAAM,CAAC;wBACN,2EAA2E;wBAC3E,MAAM,YAAY,GAAG,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CACnD,CAAC,MAAM,EAAE,EAAE,CACT,MAAM,CAAC,UAAU;4BACjB,MAAM,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC;4BAC5B,cAAc,CAAC,SAAS,EAAE,MAAM,CAAC,UAAU,CAAC,CAC/C,CAAC;wBACF,IAAI,YAAY,EAAE,CAAC;4BACjB,MAAM,mBAAmB,GAAa;gCACpC,GAAG,YAAY,CAAC,UAAU;gCAC1B,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;6BAC3C,CAAC;4BACF,MAAM,mBAAmB,GAAa;gCACpC,GAAG,CAAC,YAAY,CAAC,UAAU,IAAI,EAAE,CAAC;gCAClC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;6BAC3C,CAAC;4BACF,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,mBAAmB,EAAE,mBAAmB,CAAC,EAAE,CAAC;gCACzE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,QAAQ,wCAAwC,YAAY,CAAC,OAAO,CAAC,IAAI,CAC5G,IAAI,CACL,YAAY,SAAS,GAAG,CAC1B,CAAC;gCACF,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,OAAO;4BACT,CAAC;4BACD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCAAgC,QAAQ,YAAY,SAAS,mBAAmB,YAAY,CAAC,OAAO,CAAC,IAAI,CACvH,IAAI,CACL,GAAG,CACL,CAAC;4BACJ,CAAC;4BACD,eAAe,CAAC,EAAE,EAAE,SAAS,EAAE,YAAY,EAAE,SAAS,CAAC,CAAC;4BACxD,OAAO;wBACT,CAAC;wBACD,4EAA4E;oBAC9E,CAAC;gBACH,CAAC;gBAED,yEAAyE;gBACzE,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;oBAC7B,mBAAmB,GAAG,KAAK,CAAC;oBAE5B,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;wBACpC,4BAA4B;wBAC5B,IAAI,cAAc,EAAE,CAAC;4BACnB,YAAY,CAAC,cAAc,CAAC,CAAC;4BAC7B,cAAc,GAAG,IAAI,CAAC;wBACxB,CAAC;wBAED,mBAAmB,GAAG,IAAI,CAAC;wBAE3B,6EAA6E;wBAC7E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,IAAI,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;4BAC3E,0EAA0E;4BAC1E,YAAY,CAAC,GAAG,EAAE;gCAChB,IAAI,CAAC;oCACH,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;oCACpE,MAAM,WAAW,GAAG,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;oCACvD,MAAM,MAAM,GAAG,UAAU,CAAC,0BAA0B,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;oCAElE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,cAAc,CAAC,YAAY,YAAY,cAAc,CAAC,MAAM,EAAE,CAAC,CAAC;oCACnI,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yCAAyC,WAAW,IAAI,MAAM,YAAY,MAAM,IAAI,MAAM,EAAE,CAAC,CAAC;gCAC5H,CAAC;gCAAC,OAAO,GAAG,EAAE,CAAC;oCACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,6BAA6B,GAAG,EAAE,CAAC,CAAC;gCAClE,CAAC;4BACH,CAAC,CAAC,CAAC;wBACL,CAAC;wBAED,wCAAwC;wBACxC,4CAA4C;wBAC5C,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;4BAC3D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D;gCAC1E,8EAA8E,CACjF,CAAC;4BACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gCACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;gCAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;4BAC/D,CAAC;4BACD,MAAM,CAAC,GAAG,EAAE,CAAC;4BACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;4BAC5D,OAAO;wBACT,CAAC;wBAED,qBAAqB;wBACrB,IAAI,UAAU,GAAG,EAAE,CAAC;wBAEpB,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;4BACrC,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;4BAE9B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wCAAwC,KAAK,CAAC,MAAM,QAAQ,CAC7E,CAAC;4BACJ,CAAC;4BAED,8DAA8D;4BAC9D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,IAAI,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;gCAClF,yCAAyC;gCACzC,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CACpD,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;gCAEF,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;oCAChC,qDAAqD;oCACrD,iCAAiC;oCACjC,MAAM,YAAY,GAAG,UAAU,CAAC,UAAU,CACxC,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;oCACF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD;wCAC9D,YAAY,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,IAAI;wCACpD,cAAc,YAAY,IAAI,MAAM,IAAI;wCACxC,uBAAuB,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAC5D,CAAC;oCAEF,kDAAkD;oCAClD,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,CAAC;wCAC3B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yFAAyF;4CACvG,oDAAoD,CACvD,CAAC;wCACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4CACxD,gBAAgB,CAAC,yBAAyB,GAAG,wBAAwB,CAAC;4CACtE,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,wBAAwB,CAAC,CAAC;wCACtE,CAAC;wCACD,MAAM,CAAC,GAAG,EAAE,CAAC;wCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,wBAAwB,CAAC,CAAC;wCACnE,OAAO;oCACT,CAAC;yCAAM,CAAC;wCACN,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4CACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD;gDACvE,2CAA2C,CAC9C,CAAC;wCACJ,CAAC;oCACH,CAAC;gCACH,CAAC;4BACH,CAAC;4BAED,mDAAmD;4BACnD,MAAM,QAAQ,GAAG;gCACf,QAAQ,EAAE,QAAQ;gCAClB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;gCAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;gCACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;6BAChC,CAAC;4BAEF,iEAAiE;4BACjE,UAAU;gCACR,UAAU,CAAC,gBAAgB,CACzB,KAAK,EACL,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EACnC,gBAAgB,CAAC,YAAY,CAAC,kDAAkD;iCACjF,IAAI,EAAE,CAAC;wBACZ,CAAC;wBAED,6CAA6C;wBAC7C,gBAAgB,CAAC,YAAY,GAAG,UAAU,CAAC;wBAE3C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,8BAA8B,QAAQ,cACpD,UAAU,IAAI,SAChB,EAAE,CACH,CAAC;wBACJ,CAAC;wBAED,eAAe,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;oBACrC,CAAC,CAAC,CAAC;gBACL,CAAC;qBAAM,CAAC;oBACN,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;oBAE/C,IACE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;wBAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC;wBAC1C,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EACrD,CAAC;wBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,QAAQ,qCAAqC,CACzE,CAAC;oBACJ,CAAC;oBAED,eAAe,CAAC,EAAE,CAAC,CAAC;gBACtB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,0BAA0B;QAC1B,sCAAsC;QACtC,MAAM,cAAc,GAAG,IAAI,GAAG,EAAU,CAAC;QACzC,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChF,qDAAqD;YACrD,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACnD,KAAK,IAAI,IAAI,GAAG,KAAK,CAAC,IAAI,EAAE,IAAI,IAAI,KAAK,CAAC,EAAE,EAAE,IAAI,EAAE,EAAE,CAAC;oBACrD,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;gBAC3B,CAAC;YACH,CAAC;YACD,qFAAqF;YACrF,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC7C,CAAC;aAAM,CAAC;YACN,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC7C,CAAC;QAED,iCAAiC;QACjC,KAAK,MAAM,IAAI,IAAI,cAAc,EAAE,CAAC;YAClC,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,iBAAiB,CAAC,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAU,EAAE,EAAE;gBACpF,OAAO,CAAC,GAAG,CAAC,wBAAwB,IAAI,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC9D,CAAC,CAAC,CAAC;YACH,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,GAAG,EAAE;gBACvB,MAAM,kBAAkB,GAAG,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAC;gBACzE,OAAO,CAAC,GAAG,CACT,0CAA0C,IAAI,GAC5C,IAAI,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,EACnF,GAAG,kBAAkB,CAAC,CAAC,CAAC,oCAAoC,CAAC,CAAC,CAAC,EAAE,EAAE,CACpE,CAAC;YACJ,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC/B,CAAC;QAED,6FAA6F;QAC7F,IAAI,CAAC,gBAAgB,GAAG,WAAW,CAAC,GAAG,EAAE;YACvC,sCAAsC;YACtC,IAAI,IAAI,CAAC,cAAc;gBAAE,OAAO;YAEhC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,cAAc,GAAG,CAAC,CAAC;YACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;YAC1B,IAAI,sBAAsB,GAAG,CAAC,CAAC;YAC/B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,uBAAuB,GAAG,CAAC,CAAC;YAChC,IAAI,yBAAyB,GAAG,CAAC,CAAC;YAElC,mEAAmE;YACnE,MAAM,aAAa,GAAG,CAAC,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAAC,CAAC;YAEzD,KAAK,MAAM,EAAE,IAAI,aAAa,EAAE,CAAC;gBAC/B,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAC9C,IAAI,CAAC,MAAM;oBAAE,SAAS;gBAEtB,yBAAyB;gBACzB,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,cAAc,EAAE,CAAC;oBACjB,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;wBAChC,sBAAsB,EAAE,CAAC;oBAC3B,CAAC;yBAAM,CAAC;wBACN,oBAAoB,EAAE,CAAC;oBACzB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,iBAAiB,EAAE,CAAC;gBACtB,CAAC;gBAED,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;oBACxB,oBAAoB,EAAE,CAAC;gBACzB,CAAC;gBAED,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,uBAAuB,EAAE,CAAC;gBAC5B,CAAC;gBAED,IAAI,MAAM,CAAC,cAAc,IAAI,MAAM,CAAC,cAAc,GAAG,CAAC,EAAE,CAAC;oBACvD,yBAAyB,EAAE,CAAC;gBAC9B,CAAC;gBAED,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACpE,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACtE,CAAC;gBACD,sEAAsE;gBACtE,IACE,MAAM,CAAC,kBAAkB;oBACzB,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS;oBAC1B,CAAC,MAAM,CAAC,gBAAgB;oBACxB,GAAG,GAAG,MAAM,CAAC,kBAAkB,GAAG,MAAM,EACxC,CAAC;oBACD,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC;oBACjC,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,uCAAuC,QAAQ,iBAAiB,OAAO,CAAC,QAAQ,CACpF,GAAG,GAAG,MAAM,CAAC,kBAAkB,CAChC,yBAAyB,CAC3B,CAAC;oBACF,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;gBACjD,CAAC;gBAED,yDAAyD;gBACzD,IACE,CAAC,MAAM,CAAC,sBAAsB;oBAC9B,GAAG,GAAG,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAmB,GAAG,CAAC,EACtE,CAAC;oBACD,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,8BACJ,MAAM,CAAC,QACT,wCAAwC,OAAO,CAAC,QAAQ,CACtD,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAC/B,EAAE,CACJ,CAAC;gBACJ,CAAC;gBAED,2EAA2E;gBAC3E,IACE,CAAC,IAAI,CAAC,QAAQ,CAAC,sBAAsB;oBACrC,CAAC,CAAC,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,CAAC,EACzE,CAAC;oBACD,MAAM,cAAc,GAAG,GAAG,GAAG,MAAM,CAAC,YAAY,CAAC;oBAEjD,qEAAqE;oBACrE,IAAI,gBAAgB,GAAG,IAAI,CAAC,QAAQ,CAAC,iBAAkB,CAAC;oBACxD,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;wBAC3E,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,6BAA6B,IAAI,CAAC,CAAC;wBACpE,gBAAgB,GAAG,gBAAgB,GAAG,UAAU,CAAC;oBACnD,CAAC;oBAED,IAAI,cAAc,GAAG,gBAAgB,IAAI,CAAC,MAAM,CAAC,gBAAgB,EAAE,CAAC;wBAClE,oDAAoD;wBACpD,IAAI,MAAM,CAAC,YAAY,IAAI,CAAC,MAAM,CAAC,uBAAuB,EAAE,CAAC;4BAC3D,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,yCACJ,MAAM,CAAC,QACT,iBAAiB,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAC,IAAI;gCACnD,0CAA0C,CAC7C,CAAC;4BAEF,wCAAwC;4BACxC,MAAM,CAAC,uBAAuB,GAAG,IAAI,CAAC;4BACtC,MAAM,CAAC,YAAY,GAAG,GAAG,GAAG,CAAC,gBAAgB,GAAG,MAAM,CAAC,CAAC;4BAExD,gDAAgD;4BAChD,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gCAClD,IAAI,CAAC;oCACH,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;oCAEvC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wCACxC,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,mDAAmD,CAAC,CAAC;oCACzE,CAAC;gCACH,CAAC;gCAAC,OAAO,GAAG,EAAE,CAAC;oCACb,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,iCAAiC,GAAG,EAAE,CAAC,CAAC;gCAC5D,CAAC;4BACH,CAAC;wBACH,CAAC;6BAAM,CAAC;4BACN,4DAA4D;4BAC5D,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,sDAAsD,MAAM,CAAC,QAAQ,GAAG;gCAC5E,OAAO,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAC,GAAG;gCAC1C,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,oCAAoC,CAAC,CAAC,CAAC,EAAE,CAAC,CACpE,CAAC;4BACF,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;wBAC/C,CAAC;oBACH,CAAC;yBAAM,IAAI,cAAc,IAAI,gBAAgB,IAAI,MAAM,CAAC,uBAAuB,EAAE,CAAC;wBAChF,wDAAwD;wBACxD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,4EAA4E,CACnF,CAAC;wBACJ,CAAC;wBACD,MAAM,CAAC,uBAAuB,GAAG,KAAK,CAAC;oBACzC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,kCAAkC;YAClC,OAAO,CAAC,GAAG,CACT,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,IAAI,IAAI;gBACpD,cAAc,cAAc,eAAe,sBAAsB,aAAa,oBAAoB,KAAK;gBACvG,WAAW,iBAAiB,eAAe,oBAAoB,kBAAkB,uBAAuB,IAAI;gBAC5G,kBAAkB,yBAAyB,IAAI;gBAC/C,uBAAuB,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,SAAS,OAAO,CAAC,QAAQ,CAC3E,WAAW,CACZ,IAAI;gBACL,sBAAsB,IAAI,CAAC,SAAS,CAAC;oBACnC,EAAE,EAAE,IAAI,CAAC,gBAAgB,CAAC,QAAQ;oBAClC,GAAG,EAAE,IAAI,CAAC,gBAAgB,CAAC,QAAQ;iBACpC,CAAC,EAAE,CACP,CAAC;QACJ,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,uBAAuB,IAAI,KAAK,CAAC,CAAC;QAEnD,wDAAwD;QACxD,IAAI,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;YAChC,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,OAAO,CAAC,GAAG,CAAC,4BAA4B,CAAC,CAAC;QAC1C,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAE3B,iCAAiC;QACjC,MAAM,mBAAmB,GAAoB,IAAI,CAAC,UAAU,CAAC,GAAG,CAC9D,CAAC,MAAM,EAAE,EAAE,CACT,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;YAC5B,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;gBACtB,OAAO,EAAE,CAAC;gBACV,OAAO;YACT,CAAC;YACD,MAAM,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;gBACnB,IAAI,GAAG,EAAE,CAAC;oBACR,OAAO,CAAC,GAAG,CAAC,yBAAyB,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACtD,CAAC;gBACD,OAAO,EAAE,CAAC;YACZ,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CACL,CAAC;QAEF,6BAA6B;QAC7B,IAAI,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAC1B,aAAa,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACrC,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC;QAC/B,CAAC;QAED,4BAA4B;QAC5B,MAAM,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;QACvC,OAAO,CAAC,GAAG,CAAC,uDAAuD,CAAC,CAAC;QAErE,mDAAmD;QACnD,MAAM,aAAa,GAAG,CAAC,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAAC,CAAC;QACzD,OAAO,CAAC,GAAG,CAAC,eAAe,aAAa,CAAC,MAAM,wBAAwB,CAAC,CAAC;QAEzE,6CAA6C;QAC7C,KAAK,MAAM,EAAE,IAAI,aAAa,EAAE,CAAC;YAC/B,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;YAC9C,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,CAAC;oBACH,mBAAmB;oBACnB,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;wBACxB,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;wBAClC,MAAM,CAAC,YAAY,GAAG,SAAS,CAAC;oBAClC,CAAC;oBAED,yBAAyB;oBACzB,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACxB,CAAC;oBAED,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACxB,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,GAAG,CAAC,4CAA4C,EAAE,KAAK,GAAG,EAAE,CAAC,CAAC;gBACxE,CAAC;YACH,CAAC;QACH,CAAC;QAED,gDAAgD;QAChD,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC,CAAC;QAEzD,wCAAwC;QACxC,KAAK,MAAM,EAAE,IAAI,aAAa,EAAE,CAAC;YAC/B,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;YAC9C,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,CAAC;oBACH,+CAA+C;oBAC/C,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACpB,MAAM,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACrC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;4BAC/B,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;wBAC5B,CAAC;oBACH,CAAC;oBAED,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACpB,MAAM,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACrC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;4BAC/B,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;wBAC5B,CAAC;oBACH,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,GAAG,CAAC,kDAAkD,EAAE,KAAK,GAAG,EAAE,CAAC,CAAC;gBAC9E,CAAC;YACH,CAAC;QACH,CAAC;QAED,sEAAsE;QACtE,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC/B,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;gBAEjD,sCAAsC;gBACtC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;oBAChC,OAAO,CAAC,GAAG,CAAC,kCAAkC,CAAC,CAAC;gBAClD,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;QAED,0BAA0B;QAC1B,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,CAAC;QAC/B,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;QACjC,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;QAC7B,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,CAAC;QAChC,IAAI,CAAC,UAAU,GAAG,EAAE,CAAC;QAErB,0BAA0B;QAC1B,IAAI,CAAC,gBAAgB,GAAG;YACtB,QAAQ,EAAE,EAAE;YACZ,QAAQ,EAAE,EAAE;SACb,CAAC;QAEF,OAAO,CAAC,GAAG,CAAC,8BAA8B,CAAC,CAAC;IAC9C,CAAC;CACF"}