@push.rocks/smartproxy 19.3.2 → 19.3.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
  3. package/dist_ts/http/index.d.ts +1 -3
  4. package/dist_ts/http/index.js +4 -10
  5. package/dist_ts/http/models/http-types.d.ts +4 -91
  6. package/dist_ts/http/models/http-types.js +5 -60
  7. package/dist_ts/http/router/proxy-router.d.ts +1 -1
  8. package/dist_ts/http/router/route-router.d.ts +1 -1
  9. package/dist_ts/index.d.ts +9 -7
  10. package/dist_ts/index.js +10 -7
  11. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
  12. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
  13. package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
  14. package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
  15. package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
  16. package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
  17. package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
  18. package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
  19. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
  20. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
  21. package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
  22. package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
  23. package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
  24. package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
  25. package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
  26. package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
  27. package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
  28. package/dist_ts/proxies/http-proxy/index.js +12 -0
  29. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
  30. package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
  31. package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
  32. package/dist_ts/proxies/http-proxy/models/index.js +6 -0
  33. package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
  34. package/dist_ts/proxies/http-proxy/models/types.js +276 -0
  35. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
  36. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
  37. package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
  38. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
  39. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
  40. package/dist_ts/proxies/index.d.ts +5 -5
  41. package/dist_ts/proxies/index.js +5 -5
  42. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
  43. package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
  44. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
  45. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
  46. package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
  47. package/dist_ts/proxies/smart-proxy/index.js +4 -2
  48. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
  49. package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
  50. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
  51. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
  52. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
  53. package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
  54. package/dist_ts/routing/index.d.ts +5 -0
  55. package/dist_ts/routing/index.js +8 -0
  56. package/dist_ts/routing/models/http-types.d.ts +6 -0
  57. package/dist_ts/routing/models/http-types.js +7 -0
  58. package/dist_ts/routing/router/index.d.ts +8 -0
  59. package/dist_ts/routing/router/index.js +7 -0
  60. package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
  61. package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
  62. package/dist_ts/routing/router/route-router.d.ts +108 -0
  63. package/dist_ts/routing/router/route-router.js +393 -0
  64. package/package.json +1 -1
  65. package/readme.md +12 -12
  66. package/readme.plan.md +152 -257
  67. package/ts/00_commitinfo_data.ts +1 -1
  68. package/ts/forwarding/factory/forwarding-factory.ts +28 -0
  69. package/ts/index.ts +13 -9
  70. package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
  71. package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
  72. package/ts/proxies/http-proxy/handlers/index.ts +6 -0
  73. package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
  74. package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
  75. package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
  76. package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
  77. package/ts/proxies/http-proxy/models/http-types.ts +165 -0
  78. package/ts/proxies/http-proxy/models/index.ts +5 -0
  79. package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
  80. package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
  81. package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
  82. package/ts/proxies/index.ts +7 -7
  83. package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
  84. package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
  85. package/ts/proxies/smart-proxy/index.ts +4 -1
  86. package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
  87. package/ts/proxies/smart-proxy/port-manager.ts +2 -2
  88. package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
  89. package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
  90. package/ts/routing/index.ts +9 -0
  91. package/ts/routing/models/http-types.ts +6 -0
  92. package/ts/{http → routing}/router/proxy-router.ts +1 -1
  93. package/ts/{http → routing}/router/route-router.ts +1 -1
  94. package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
  95. package/dist_ts/certificate/acme/acme-factory.js +0 -40
  96. package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
  97. package/dist_ts/certificate/acme/challenge-handler.js +0 -92
  98. package/dist_ts/certificate/acme/index.d.ts +0 -4
  99. package/dist_ts/certificate/acme/index.js +0 -5
  100. package/dist_ts/certificate/certificate-manager.d.ts +0 -150
  101. package/dist_ts/certificate/certificate-manager.js +0 -505
  102. package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
  103. package/dist_ts/certificate/events/certificate-events.js +0 -38
  104. package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
  105. package/dist_ts/certificate/events/simplified-events.js +0 -13
  106. package/dist_ts/certificate/index.d.ts +0 -30
  107. package/dist_ts/certificate/index.js +0 -37
  108. package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
  109. package/dist_ts/certificate/models/certificate-errors.js +0 -141
  110. package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
  111. package/dist_ts/certificate/models/certificate-strategy.js +0 -73
  112. package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
  113. package/dist_ts/certificate/models/certificate-types.js +0 -2
  114. package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
  115. package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
  116. package/dist_ts/certificate/providers/index.d.ts +0 -4
  117. package/dist_ts/certificate/providers/index.js +0 -5
  118. package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
  119. package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
  120. package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
  121. package/dist_ts/certificate/storage/file-storage.js +0 -194
  122. package/dist_ts/certificate/storage/index.d.ts +0 -4
  123. package/dist_ts/certificate/storage/index.js +0 -5
  124. package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
  125. package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
  126. package/dist_ts/classes.iptablesproxy.d.ts +0 -112
  127. package/dist_ts/classes.iptablesproxy.js +0 -765
  128. package/dist_ts/classes.networkproxy.d.ts +0 -243
  129. package/dist_ts/classes.networkproxy.js +0 -1424
  130. package/dist_ts/classes.nftablesproxy.d.ts +0 -219
  131. package/dist_ts/classes.nftablesproxy.js +0 -1542
  132. package/dist_ts/classes.port80handler.d.ts +0 -215
  133. package/dist_ts/classes.port80handler.js +0 -736
  134. package/dist_ts/classes.portproxy.d.ts +0 -171
  135. package/dist_ts/classes.portproxy.js +0 -1802
  136. package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
  137. package/dist_ts/classes.pp.acmemanager.js +0 -123
  138. package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
  139. package/dist_ts/classes.pp.connectionhandler.js +0 -754
  140. package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
  141. package/dist_ts/classes.pp.connectionmanager.js +0 -378
  142. package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
  143. package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
  144. package/dist_ts/classes.pp.interfaces.d.ts +0 -133
  145. package/dist_ts/classes.pp.interfaces.js +0 -2
  146. package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
  147. package/dist_ts/classes.pp.networkproxybridge.js +0 -306
  148. package/dist_ts/classes.pp.portproxy.d.ts +0 -64
  149. package/dist_ts/classes.pp.portproxy.js +0 -567
  150. package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
  151. package/dist_ts/classes.pp.portrangemanager.js +0 -179
  152. package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
  153. package/dist_ts/classes.pp.securitymanager.js +0 -126
  154. package/dist_ts/classes.pp.snihandler.d.ts +0 -153
  155. package/dist_ts/classes.pp.snihandler.js +0 -1053
  156. package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
  157. package/dist_ts/classes.pp.timeoutmanager.js +0 -154
  158. package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
  159. package/dist_ts/classes.pp.tlsalert.js +0 -225
  160. package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
  161. package/dist_ts/classes.pp.tlsmanager.js +0 -132
  162. package/dist_ts/classes.snihandler.d.ts +0 -198
  163. package/dist_ts/classes.snihandler.js +0 -1210
  164. package/dist_ts/classes.sslredirect.d.ts +0 -8
  165. package/dist_ts/classes.sslredirect.js +0 -28
  166. package/dist_ts/common/acmeFactory.d.ts +0 -9
  167. package/dist_ts/common/acmeFactory.js +0 -20
  168. package/dist_ts/common/port80-adapter.d.ts +0 -11
  169. package/dist_ts/common/port80-adapter.js +0 -87
  170. package/dist_ts/examples/forwarding-example.d.ts +0 -1
  171. package/dist_ts/examples/forwarding-example.js +0 -96
  172. package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
  173. package/dist_ts/forwarding/config/domain-config.js +0 -12
  174. package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
  175. package/dist_ts/forwarding/config/domain-manager.js +0 -242
  176. package/dist_ts/helpers.certificates.d.ts +0 -5
  177. package/dist_ts/helpers.certificates.js +0 -23
  178. package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
  179. package/dist_ts/http/port80/acme-interfaces.js +0 -51
  180. package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
  181. package/dist_ts/http/port80/challenge-responder.js +0 -203
  182. package/dist_ts/http/port80/index.d.ts +0 -6
  183. package/dist_ts/http/port80/index.js +0 -9
  184. package/dist_ts/http/port80/port80-handler.d.ts +0 -136
  185. package/dist_ts/http/port80/port80-handler.js +0 -592
  186. package/dist_ts/http/redirects/index.d.ts +0 -4
  187. package/dist_ts/http/redirects/index.js +0 -5
  188. package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
  189. package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
  190. package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
  191. package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
  192. package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
  193. package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
  194. package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
  195. package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
  196. package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
  197. package/dist_ts/networkproxy/classes.np.types.js +0 -35
  198. package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
  199. package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
  200. package/dist_ts/networkproxy/index.d.ts +0 -1
  201. package/dist_ts/networkproxy/index.js +0 -4
  202. package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
  203. package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
  204. package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
  205. package/dist_ts/port80handler/classes.port80handler.js +0 -16
  206. package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
  207. package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
  208. package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
  209. package/dist_ts/proxies/network-proxy/index.js +0 -12
  210. package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
  211. package/dist_ts/proxies/network-proxy/models/index.js +0 -5
  212. package/dist_ts/proxies/network-proxy/models/types.js +0 -276
  213. package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
  214. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
  215. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
  216. package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
  217. package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
  218. package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
  219. package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
  220. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
  221. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
  222. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
  223. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
  224. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
  225. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
  226. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
  227. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
  228. package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
  229. package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
  230. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
  231. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
  232. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
  233. package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
  234. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
  235. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
  236. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
  237. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
  238. package/dist_ts/redirect/classes.redirect.d.ts +0 -96
  239. package/dist_ts/redirect/classes.redirect.js +0 -194
  240. package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
  241. package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
  242. package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
  243. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
  244. package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
  245. package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
  246. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
  247. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
  248. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
  249. package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
  250. package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
  251. package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
  252. package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
  253. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
  254. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
  255. package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
  256. package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
  257. package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
  258. package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
  259. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
  260. package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
  261. package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
  262. package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
  263. package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
  264. package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
  265. package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
  266. package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
  267. package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
  268. package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
  269. package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
  270. package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
  271. package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
  272. package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
  273. package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
  274. package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
  275. package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
  276. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
  277. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
  278. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
  279. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
  280. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
  281. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
  282. package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
  283. package/dist_ts/smartproxy/forwarding/index.js +0 -23
  284. package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
  285. package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
  286. package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
  287. package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
  288. package/dist_ts/smartproxy.classes.router.d.ts +0 -13
  289. package/dist_ts/smartproxy.classes.router.js +0 -33
  290. package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
  291. package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
  292. package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
  293. package/dist_ts/smartproxy.helpers.certificates.js +0 -23
  294. package/dist_ts/smartproxy.plugins.d.ts +0 -18
  295. package/dist_ts/smartproxy.plugins.js +0 -23
  296. package/dist_ts/smartproxy.portproxy.d.ts +0 -26
  297. package/dist_ts/smartproxy.portproxy.js +0 -295
  298. package/ts/http/index.ts +0 -16
  299. package/ts/http/models/http-types.ts +0 -108
  300. package/ts/http/redirects/index.ts +0 -3
  301. package/ts/proxies/network-proxy/models/index.ts +0 -4
  302. package/ts/redirect/classes.redirect.ts +0 -295
  303. /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
  304. /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
  305. /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
  306. /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
  307. /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
  308. /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
  309. /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
  310. /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
  311. /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
  312. /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
  313. /package/ts/{http → routing}/router/index.ts +0 -0
@@ -1,1542 +0,0 @@
1
- import { exec, execSync } from 'child_process';
2
- import { promisify } from 'util';
3
- import * as fs from 'fs';
4
- import * as path from 'path';
5
- import * as os from 'os';
6
- const execAsync = promisify(exec);
7
- /**
8
- * Custom error classes for better error handling
9
- */
10
- export class NftBaseError extends Error {
11
- constructor(message) {
12
- super(message);
13
- this.name = 'NftBaseError';
14
- }
15
- }
16
- export class NftValidationError extends NftBaseError {
17
- constructor(message) {
18
- super(message);
19
- this.name = 'NftValidationError';
20
- }
21
- }
22
- export class NftExecutionError extends NftBaseError {
23
- constructor(message) {
24
- super(message);
25
- this.name = 'NftExecutionError';
26
- }
27
- }
28
- export class NftResourceError extends NftBaseError {
29
- constructor(message) {
30
- super(message);
31
- this.name = 'NftResourceError';
32
- }
33
- }
34
- /**
35
- * NfTablesProxy sets up nftables NAT rules to forward TCP traffic.
36
- * Enhanced with multi-port support, IPv6, connection tracking, metrics,
37
- * and more advanced features.
38
- */
39
- export class NfTablesProxy {
40
- static { this.NFT_CMD = 'nft'; }
41
- constructor(settings) {
42
- this.rules = [];
43
- this.ipSets = new Map(); // Store IP sets for tracking
44
- // Validate inputs to prevent command injection
45
- this.validateSettings(settings);
46
- // Set default settings
47
- this.settings = {
48
- ...settings,
49
- toHost: settings.toHost || 'localhost',
50
- protocol: settings.protocol || 'tcp',
51
- enableLogging: settings.enableLogging !== undefined ? settings.enableLogging : false,
52
- ipv6Support: settings.ipv6Support !== undefined ? settings.ipv6Support : false,
53
- tableName: settings.tableName || 'portproxy',
54
- logFormat: settings.logFormat || 'plain',
55
- useIPSets: settings.useIPSets !== undefined ? settings.useIPSets : true,
56
- maxRetries: settings.maxRetries || 3,
57
- retryDelayMs: settings.retryDelayMs || 1000,
58
- useAdvancedNAT: settings.useAdvancedNAT !== undefined ? settings.useAdvancedNAT : false,
59
- };
60
- // Generate a unique identifier for the rules added by this instance
61
- this.ruleTag = `NfTablesProxy:${Date.now()}:${Math.random().toString(36).substr(2, 5)}`;
62
- // Set table name
63
- this.tableName = this.settings.tableName || 'portproxy';
64
- // Create a temp file path for batch operations
65
- this.tempFilePath = path.join(os.tmpdir(), `nft-rules-${Date.now()}.nft`);
66
- // Register cleanup handlers if deleteOnExit is true
67
- if (this.settings.deleteOnExit) {
68
- const cleanup = () => {
69
- try {
70
- this.stopSync();
71
- }
72
- catch (err) {
73
- this.log('error', 'Error cleaning nftables rules on exit:', { error: err.message });
74
- }
75
- };
76
- process.on('exit', cleanup);
77
- process.on('SIGINT', () => {
78
- cleanup();
79
- process.exit();
80
- });
81
- process.on('SIGTERM', () => {
82
- cleanup();
83
- process.exit();
84
- });
85
- }
86
- }
87
- /**
88
- * Validates settings to prevent command injection and ensure valid values
89
- */
90
- validateSettings(settings) {
91
- // Validate port numbers
92
- const validatePorts = (port) => {
93
- if (Array.isArray(port)) {
94
- port.forEach(p => validatePorts(p));
95
- return;
96
- }
97
- if (typeof port === 'number') {
98
- if (port < 1 || port > 65535) {
99
- throw new NftValidationError(`Invalid port number: ${port}`);
100
- }
101
- }
102
- else if (typeof port === 'object') {
103
- if (port.from < 1 || port.from > 65535 || port.to < 1 || port.to > 65535 || port.from > port.to) {
104
- throw new NftValidationError(`Invalid port range: ${port.from}-${port.to}`);
105
- }
106
- }
107
- };
108
- validatePorts(settings.fromPort);
109
- validatePorts(settings.toPort);
110
- // Define regex patterns for validation
111
- const ipRegex = /^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\/([0-9]|[1-2][0-9]|3[0-2]))?$/;
112
- const ipv6Regex = /^(([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))(\/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$/;
113
- // Validate IP addresses
114
- const validateIPs = (ips) => {
115
- if (!ips)
116
- return;
117
- for (const ip of ips) {
118
- if (!ipRegex.test(ip) && !ipv6Regex.test(ip)) {
119
- throw new NftValidationError(`Invalid IP address format: ${ip}`);
120
- }
121
- }
122
- };
123
- validateIPs(settings.allowedSourceIPs);
124
- validateIPs(settings.bannedSourceIPs);
125
- // Validate toHost - only allow hostnames or IPs
126
- if (settings.toHost) {
127
- const hostRegex = /^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\-]*[A-Za-z0-9])$/;
128
- if (!hostRegex.test(settings.toHost) && !ipRegex.test(settings.toHost) && !ipv6Regex.test(settings.toHost)) {
129
- throw new NftValidationError(`Invalid host format: ${settings.toHost}`);
130
- }
131
- }
132
- // Validate table name to prevent command injection
133
- if (settings.tableName) {
134
- const tableNameRegex = /^[a-zA-Z0-9_]+$/;
135
- if (!tableNameRegex.test(settings.tableName)) {
136
- throw new NftValidationError(`Invalid table name: ${settings.tableName}. Only alphanumeric characters and underscores are allowed.`);
137
- }
138
- }
139
- // Validate QoS settings if enabled
140
- if (settings.qos?.enabled) {
141
- if (settings.qos.maxRate) {
142
- const rateRegex = /^[0-9]+[kKmMgG]?bps$/;
143
- if (!rateRegex.test(settings.qos.maxRate)) {
144
- throw new NftValidationError(`Invalid rate format: ${settings.qos.maxRate}. Use format like "10mbps", "1gbps", etc.`);
145
- }
146
- }
147
- if (settings.qos.priority !== undefined) {
148
- if (settings.qos.priority < 1 || settings.qos.priority > 10 || !Number.isInteger(settings.qos.priority)) {
149
- throw new NftValidationError(`Invalid priority: ${settings.qos.priority}. Must be an integer between 1 and 10.`);
150
- }
151
- }
152
- }
153
- }
154
- /**
155
- * Normalizes port specifications into an array of port ranges
156
- */
157
- normalizePortSpec(portSpec) {
158
- const result = [];
159
- if (Array.isArray(portSpec)) {
160
- // If it's an array, process each element
161
- for (const spec of portSpec) {
162
- result.push(...this.normalizePortSpec(spec));
163
- }
164
- }
165
- else if (typeof portSpec === 'number') {
166
- // Single port becomes a range with the same start and end
167
- result.push({ from: portSpec, to: portSpec });
168
- }
169
- else {
170
- // Already a range
171
- result.push(portSpec);
172
- }
173
- return result;
174
- }
175
- /**
176
- * Execute a command with retry capability
177
- */
178
- async executeWithRetry(command, maxRetries = 3, retryDelayMs = 1000) {
179
- let lastError;
180
- for (let i = 0; i < maxRetries; i++) {
181
- try {
182
- const { stdout } = await execAsync(command);
183
- return stdout;
184
- }
185
- catch (err) {
186
- lastError = err;
187
- this.log('warn', `Command failed (attempt ${i + 1}/${maxRetries}): ${command}`, { error: err.message });
188
- // Wait before retry, unless it's the last attempt
189
- if (i < maxRetries - 1) {
190
- await new Promise(resolve => setTimeout(resolve, retryDelayMs));
191
- }
192
- }
193
- }
194
- throw new NftExecutionError(`Failed after ${maxRetries} attempts: ${lastError?.message || 'Unknown error'}`);
195
- }
196
- /**
197
- * Execute system command synchronously with multiple attempts
198
- */
199
- executeWithRetrySync(command, maxRetries = 3, retryDelayMs = 1000) {
200
- let lastError;
201
- for (let i = 0; i < maxRetries; i++) {
202
- try {
203
- return execSync(command).toString();
204
- }
205
- catch (err) {
206
- lastError = err;
207
- this.log('warn', `Command failed (attempt ${i + 1}/${maxRetries}): ${command}`, { error: err.message });
208
- // Wait before retry, unless it's the last attempt
209
- if (i < maxRetries - 1) {
210
- // A naive sleep in sync context
211
- const waitUntil = Date.now() + retryDelayMs;
212
- while (Date.now() < waitUntil) {
213
- // busy wait - not great, but this is a fallback method
214
- }
215
- }
216
- }
217
- }
218
- throw new NftExecutionError(`Failed after ${maxRetries} attempts: ${lastError?.message || 'Unknown error'}`);
219
- }
220
- /**
221
- * Checks if nftables is available and the required modules are loaded
222
- */
223
- async checkNftablesAvailability() {
224
- try {
225
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} --version`, this.settings.maxRetries, this.settings.retryDelayMs);
226
- // Check for conntrack support if we're using advanced NAT
227
- if (this.settings.useAdvancedNAT) {
228
- try {
229
- await this.executeWithRetry('lsmod | grep nf_conntrack', this.settings.maxRetries, this.settings.retryDelayMs);
230
- }
231
- catch (err) {
232
- this.log('warn', 'Connection tracking modules might not be loaded, advanced NAT features may not work');
233
- }
234
- }
235
- return true;
236
- }
237
- catch (err) {
238
- this.log('error', `nftables is not available: ${err.message}`);
239
- return false;
240
- }
241
- }
242
- /**
243
- * Creates the necessary tables and chains
244
- */
245
- async setupTablesAndChains(isIpv6 = false) {
246
- const family = isIpv6 ? 'ip6' : 'ip';
247
- try {
248
- // Check if the table already exists
249
- const stdout = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list tables ${family}`, this.settings.maxRetries, this.settings.retryDelayMs);
250
- const tableExists = stdout.includes(`table ${family} ${this.tableName}`);
251
- if (!tableExists) {
252
- // Create the table
253
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
254
- this.log('info', `Created table ${family} ${this.tableName}`);
255
- // Create the nat chain for the prerouting hook
256
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} nat_prerouting { type nat hook prerouting priority -100 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
257
- this.log('info', `Created nat_prerouting chain in ${family} ${this.tableName}`);
258
- // Create the nat chain for the postrouting hook if not preserving source IP
259
- if (!this.settings.preserveSourceIP) {
260
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} nat_postrouting { type nat hook postrouting priority 100 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
261
- this.log('info', `Created nat_postrouting chain in ${family} ${this.tableName}`);
262
- }
263
- // Create the chain for NetworkProxy integration if needed
264
- if (this.settings.netProxyIntegration?.enabled && this.settings.netProxyIntegration.redirectLocalhost) {
265
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} nat_output { type nat hook output priority 0 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
266
- this.log('info', `Created nat_output chain in ${family} ${this.tableName}`);
267
- }
268
- // Create the QoS chain if needed
269
- if (this.settings.qos?.enabled) {
270
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} qos_forward { type filter hook forward priority 0 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
271
- this.log('info', `Created QoS forward chain in ${family} ${this.tableName}`);
272
- }
273
- }
274
- else {
275
- this.log('info', `Table ${family} ${this.tableName} already exists, using existing table`);
276
- }
277
- return true;
278
- }
279
- catch (err) {
280
- this.log('error', `Failed to set up tables and chains: ${err.message}`);
281
- return false;
282
- }
283
- }
284
- /**
285
- * Creates IP sets for efficient filtering of large IP lists
286
- */
287
- async createIPSet(family, setName, ips, setType = 'ipv4_addr') {
288
- try {
289
- // Filter IPs based on family
290
- const filteredIPs = ips.filter(ip => {
291
- if (family === 'ip6' && ip.includes(':'))
292
- return true;
293
- if (family === 'ip' && ip.includes('.'))
294
- return true;
295
- return false;
296
- });
297
- if (filteredIPs.length === 0) {
298
- this.log('info', `No IP addresses of type ${setType} to add to set ${setName}`);
299
- return true;
300
- }
301
- // Check if set already exists
302
- try {
303
- const sets = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list sets ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
304
- if (sets.includes(`set ${setName} {`)) {
305
- this.log('info', `IP set ${setName} already exists, will add elements`);
306
- }
307
- else {
308
- // Create the set
309
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add set ${family} ${this.tableName} ${setName} { type ${setType}; }`, this.settings.maxRetries, this.settings.retryDelayMs);
310
- this.log('info', `Created IP set ${setName} for ${family} with type ${setType}`);
311
- }
312
- }
313
- catch (err) {
314
- // Set might not exist yet, create it
315
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add set ${family} ${this.tableName} ${setName} { type ${setType}; }`, this.settings.maxRetries, this.settings.retryDelayMs);
316
- this.log('info', `Created IP set ${setName} for ${family} with type ${setType}`);
317
- }
318
- // Add IPs to the set in batches to avoid command line length limitations
319
- const batchSize = 100;
320
- for (let i = 0; i < filteredIPs.length; i += batchSize) {
321
- const batch = filteredIPs.slice(i, i + batchSize);
322
- const elements = batch.join(', ');
323
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} add element ${family} ${this.tableName} ${setName} { ${elements} }`, this.settings.maxRetries, this.settings.retryDelayMs);
324
- this.log('info', `Added batch of ${batch.length} IPs to set ${setName}`);
325
- }
326
- // Track the IP set
327
- this.ipSets.set(`${family}:${setName}`, filteredIPs);
328
- return true;
329
- }
330
- catch (err) {
331
- this.log('error', `Failed to create IP set ${setName}: ${err.message}`);
332
- return false;
333
- }
334
- }
335
- /**
336
- * Adds source IP filtering rules, potentially using IP sets for efficiency
337
- */
338
- async addSourceIPFilters(isIpv6 = false) {
339
- if (!this.settings.allowedSourceIPs && !this.settings.bannedSourceIPs) {
340
- return true; // Nothing to do
341
- }
342
- const family = isIpv6 ? 'ip6' : 'ip';
343
- const chain = 'nat_prerouting';
344
- const setType = isIpv6 ? 'ipv6_addr' : 'ipv4_addr';
345
- try {
346
- // Start building the ruleset file content
347
- let rulesetContent = '';
348
- // Using IP sets for more efficient rule processing with large IP lists
349
- if (this.settings.useIPSets) {
350
- // Create sets for banned and allowed IPs if needed
351
- if (this.settings.bannedSourceIPs && this.settings.bannedSourceIPs.length > 0) {
352
- const setName = 'banned_ips';
353
- await this.createIPSet(family, setName, this.settings.bannedSourceIPs, setType);
354
- // Add rule to drop traffic from banned IPs
355
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr @${setName} drop comment "${this.ruleTag}:BANNED_SET"`;
356
- rulesetContent += `${rule}\n`;
357
- this.rules.push({
358
- tableFamily: family,
359
- tableName: this.tableName,
360
- chainName: chain,
361
- ruleContents: rule,
362
- added: false
363
- });
364
- }
365
- if (this.settings.allowedSourceIPs && this.settings.allowedSourceIPs.length > 0) {
366
- const setName = 'allowed_ips';
367
- await this.createIPSet(family, setName, this.settings.allowedSourceIPs, setType);
368
- // Add rule to allow traffic from allowed IPs
369
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr @${setName} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED_SET"`;
370
- rulesetContent += `${rule}\n`;
371
- this.rules.push({
372
- tableFamily: family,
373
- tableName: this.tableName,
374
- chainName: chain,
375
- ruleContents: rule,
376
- added: false
377
- });
378
- // Add default deny rule for unlisted IPs
379
- const denyRule = `add rule ${family} ${this.tableName} ${chain} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`;
380
- rulesetContent += `${denyRule}\n`;
381
- this.rules.push({
382
- tableFamily: family,
383
- tableName: this.tableName,
384
- chainName: chain,
385
- ruleContents: denyRule,
386
- added: false
387
- });
388
- }
389
- }
390
- else {
391
- // Traditional approach without IP sets - less efficient for large IP lists
392
- // Ban specific IPs first
393
- if (this.settings.bannedSourceIPs && this.settings.bannedSourceIPs.length > 0) {
394
- for (const ip of this.settings.bannedSourceIPs) {
395
- // Skip IPv4 addresses for IPv6 rules and vice versa
396
- if (isIpv6 && ip.includes('.'))
397
- continue;
398
- if (!isIpv6 && ip.includes(':'))
399
- continue;
400
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr ${ip} drop comment "${this.ruleTag}:BANNED"`;
401
- rulesetContent += `${rule}\n`;
402
- this.rules.push({
403
- tableFamily: family,
404
- tableName: this.tableName,
405
- chainName: chain,
406
- ruleContents: rule,
407
- added: false
408
- });
409
- }
410
- }
411
- // Allow specific IPs
412
- if (this.settings.allowedSourceIPs && this.settings.allowedSourceIPs.length > 0) {
413
- // Add rules to allow specific IPs
414
- for (const ip of this.settings.allowedSourceIPs) {
415
- // Skip IPv4 addresses for IPv6 rules and vice versa
416
- if (isIpv6 && ip.includes('.'))
417
- continue;
418
- if (!isIpv6 && ip.includes(':'))
419
- continue;
420
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr ${ip} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED"`;
421
- rulesetContent += `${rule}\n`;
422
- this.rules.push({
423
- tableFamily: family,
424
- tableName: this.tableName,
425
- chainName: chain,
426
- ruleContents: rule,
427
- added: false
428
- });
429
- }
430
- // Add default deny rule for unlisted IPs
431
- const denyRule = `add rule ${family} ${this.tableName} ${chain} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`;
432
- rulesetContent += `${denyRule}\n`;
433
- this.rules.push({
434
- tableFamily: family,
435
- tableName: this.tableName,
436
- chainName: chain,
437
- ruleContents: denyRule,
438
- added: false
439
- });
440
- }
441
- }
442
- // Only write and apply if we have rules to add
443
- if (rulesetContent) {
444
- // Write the ruleset to a temporary file
445
- fs.writeFileSync(this.tempFilePath, rulesetContent);
446
- // Apply the ruleset
447
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
448
- this.log('info', `Added source IP filter rules for ${family}`);
449
- // Mark rules as added
450
- for (const rule of this.rules) {
451
- if (rule.tableFamily === family && !rule.added) {
452
- rule.added = true;
453
- // Verify the rule was applied
454
- await this.verifyRuleApplication(rule);
455
- }
456
- }
457
- // Remove the temporary file
458
- fs.unlinkSync(this.tempFilePath);
459
- }
460
- return true;
461
- }
462
- catch (err) {
463
- this.log('error', `Failed to add source IP filter rules: ${err.message}`);
464
- // Try to clean up any rules that might have been added
465
- this.rollbackRules();
466
- return false;
467
- }
468
- }
469
- /**
470
- * Gets a comma-separated list of all ports from a port specification
471
- */
472
- getAllPorts(portSpec) {
473
- const portRanges = this.normalizePortSpec(portSpec);
474
- const ports = [];
475
- for (const range of portRanges) {
476
- if (range.from === range.to) {
477
- ports.push(range.from.toString());
478
- }
479
- else {
480
- ports.push(`${range.from}-${range.to}`);
481
- }
482
- }
483
- return ports.join(', ');
484
- }
485
- /**
486
- * Configures advanced NAT with connection tracking
487
- */
488
- async setupAdvancedNAT(isIpv6 = false) {
489
- if (!this.settings.useAdvancedNAT) {
490
- return true; // Skip if not using advanced NAT
491
- }
492
- const family = isIpv6 ? 'ip6' : 'ip';
493
- const preroutingChain = 'nat_prerouting';
494
- try {
495
- // Get the port ranges
496
- const fromPortRanges = this.normalizePortSpec(this.settings.fromPort);
497
- const toPortRanges = this.normalizePortSpec(this.settings.toPort);
498
- let rulesetContent = '';
499
- // Simple case - one-to-one mapping with connection tracking
500
- if (fromPortRanges.length === 1 && toPortRanges.length === 1) {
501
- const fromRange = fromPortRanges[0];
502
- const toRange = toPortRanges[0];
503
- // Single port to single port with connection tracking
504
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
505
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from} ct state new dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT_CT"`;
506
- rulesetContent += `${rule}\n`;
507
- this.rules.push({
508
- tableFamily: family,
509
- tableName: this.tableName,
510
- chainName: preroutingChain,
511
- ruleContents: rule,
512
- added: false
513
- });
514
- }
515
- // Port range with same size
516
- else if ((fromRange.to - fromRange.from) === (toRange.to - toRange.from)) {
517
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} ct state new dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE_CT"`;
518
- rulesetContent += `${rule}\n`;
519
- this.rules.push({
520
- tableFamily: family,
521
- tableName: this.tableName,
522
- chainName: preroutingChain,
523
- ruleContents: rule,
524
- added: false
525
- });
526
- }
527
- // Add related and established connection rule for efficient connection handling
528
- const ctRule = `add rule ${family} ${this.tableName} ${preroutingChain} ct state established,related accept comment "${this.ruleTag}:CT_ESTABLISHED"`;
529
- rulesetContent += `${ctRule}\n`;
530
- this.rules.push({
531
- tableFamily: family,
532
- tableName: this.tableName,
533
- chainName: preroutingChain,
534
- ruleContents: ctRule,
535
- added: false
536
- });
537
- // Apply the rules if we have any
538
- if (rulesetContent) {
539
- fs.writeFileSync(this.tempFilePath, rulesetContent);
540
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
541
- this.log('info', `Added advanced NAT rules for ${family}`);
542
- // Mark rules as added
543
- for (const rule of this.rules) {
544
- if (rule.tableFamily === family && !rule.added) {
545
- rule.added = true;
546
- // Verify the rule was applied
547
- await this.verifyRuleApplication(rule);
548
- }
549
- }
550
- // Remove the temporary file
551
- fs.unlinkSync(this.tempFilePath);
552
- }
553
- }
554
- return true;
555
- }
556
- catch (err) {
557
- this.log('error', `Failed to set up advanced NAT: ${err.message}`);
558
- return false;
559
- }
560
- }
561
- /**
562
- * Adds port forwarding rules
563
- */
564
- async addPortForwardingRules(isIpv6 = false) {
565
- // Skip if using advanced NAT as that already handles the port forwarding
566
- if (this.settings.useAdvancedNAT) {
567
- return true;
568
- }
569
- const family = isIpv6 ? 'ip6' : 'ip';
570
- const preroutingChain = 'nat_prerouting';
571
- const postroutingChain = 'nat_postrouting';
572
- try {
573
- // Normalize port specifications
574
- const fromPortRanges = this.normalizePortSpec(this.settings.fromPort);
575
- const toPortRanges = this.normalizePortSpec(this.settings.toPort);
576
- // Handle the case where fromPort and toPort counts don't match
577
- if (fromPortRanges.length !== toPortRanges.length) {
578
- if (toPortRanges.length === 1) {
579
- // If there's only one toPort, use it for all fromPorts
580
- const singleToRange = toPortRanges[0];
581
- return await this.addPortMappings(family, preroutingChain, postroutingChain, fromPortRanges, singleToRange);
582
- }
583
- else {
584
- throw new NftValidationError('Mismatched port counts: fromPort and toPort arrays must have equal length or toPort must be a single value');
585
- }
586
- }
587
- else {
588
- // Add port mapping rules for each port pair
589
- return await this.addPortPairMappings(family, preroutingChain, postroutingChain, fromPortRanges, toPortRanges);
590
- }
591
- }
592
- catch (err) {
593
- this.log('error', `Failed to add port forwarding rules: ${err.message}`);
594
- return false;
595
- }
596
- }
597
- /**
598
- * Adds port forwarding rules for the case where one toPortRange maps to multiple fromPortRanges
599
- */
600
- async addPortMappings(family, preroutingChain, postroutingChain, fromPortRanges, toPortRange) {
601
- try {
602
- let rulesetContent = '';
603
- // For each from port range, create a mapping to the single to port range
604
- for (const fromRange of fromPortRanges) {
605
- // Simple case: single port to single port
606
- if (fromRange.from === fromRange.to && toPortRange.from === toPortRange.to) {
607
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from} dnat to ${this.settings.toHost}:${toPortRange.from} comment "${this.ruleTag}:DNAT"`;
608
- rulesetContent += `${rule}\n`;
609
- this.rules.push({
610
- tableFamily: family,
611
- tableName: this.tableName,
612
- chainName: preroutingChain,
613
- ruleContents: rule,
614
- added: false
615
- });
616
- }
617
- // Multiple ports in from range, but only one port in to range
618
- else if (toPortRange.from === toPortRange.to) {
619
- // Map each port in from range to the single to port
620
- for (let p = fromRange.from; p <= fromRange.to; p++) {
621
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${p} dnat to ${this.settings.toHost}:${toPortRange.from} comment "${this.ruleTag}:DNAT"`;
622
- rulesetContent += `${rule}\n`;
623
- this.rules.push({
624
- tableFamily: family,
625
- tableName: this.tableName,
626
- chainName: preroutingChain,
627
- ruleContents: rule,
628
- added: false
629
- });
630
- }
631
- }
632
- // Port range to port range mapping with modulo distribution
633
- else {
634
- const toRangeSize = toPortRange.to - toPortRange.from + 1;
635
- for (let p = fromRange.from; p <= fromRange.to; p++) {
636
- const offset = (p - fromRange.from) % toRangeSize;
637
- const targetPort = toPortRange.from + offset;
638
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${p} dnat to ${this.settings.toHost}:${targetPort} comment "${this.ruleTag}:DNAT"`;
639
- rulesetContent += `${rule}\n`;
640
- this.rules.push({
641
- tableFamily: family,
642
- tableName: this.tableName,
643
- chainName: preroutingChain,
644
- ruleContents: rule,
645
- added: false
646
- });
647
- }
648
- }
649
- }
650
- // Add masquerade rule for source NAT if not preserving source IP
651
- if (!this.settings.preserveSourceIP) {
652
- const ports = this.getAllPorts(this.settings.toPort);
653
- const masqRule = `add rule ${family} ${this.tableName} ${postroutingChain} ${this.settings.protocol} daddr ${this.settings.toHost} dport {${ports}} masquerade comment "${this.ruleTag}:MASQ"`;
654
- rulesetContent += `${masqRule}\n`;
655
- this.rules.push({
656
- tableFamily: family,
657
- tableName: this.tableName,
658
- chainName: postroutingChain,
659
- ruleContents: masqRule,
660
- added: false
661
- });
662
- }
663
- // Apply the ruleset if we have any rules
664
- if (rulesetContent) {
665
- // Write to temporary file
666
- fs.writeFileSync(this.tempFilePath, rulesetContent);
667
- // Apply the ruleset
668
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
669
- this.log('info', `Added port forwarding rules for ${family}`);
670
- // Mark rules as added
671
- for (const rule of this.rules) {
672
- if (rule.tableFamily === family && !rule.added) {
673
- rule.added = true;
674
- // Verify the rule was applied
675
- await this.verifyRuleApplication(rule);
676
- }
677
- }
678
- // Remove temporary file
679
- fs.unlinkSync(this.tempFilePath);
680
- }
681
- return true;
682
- }
683
- catch (err) {
684
- this.log('error', `Failed to add port mappings: ${err.message}`);
685
- return false;
686
- }
687
- }
688
- /**
689
- * Adds port forwarding rules for pairs of fromPortRanges and toPortRanges
690
- */
691
- async addPortPairMappings(family, preroutingChain, postroutingChain, fromPortRanges, toPortRanges) {
692
- try {
693
- let rulesetContent = '';
694
- // Process each fromPort and toPort pair
695
- for (let i = 0; i < fromPortRanges.length; i++) {
696
- const fromRange = fromPortRanges[i];
697
- const toRange = toPortRanges[i];
698
- // Simple case: single port to single port
699
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
700
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from} dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT"`;
701
- rulesetContent += `${rule}\n`;
702
- this.rules.push({
703
- tableFamily: family,
704
- tableName: this.tableName,
705
- chainName: preroutingChain,
706
- ruleContents: rule,
707
- added: false
708
- });
709
- }
710
- // Port range with equal size - can use direct mapping
711
- else if ((fromRange.to - fromRange.from) === (toRange.to - toRange.from)) {
712
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE"`;
713
- rulesetContent += `${rule}\n`;
714
- this.rules.push({
715
- tableFamily: family,
716
- tableName: this.tableName,
717
- chainName: preroutingChain,
718
- ruleContents: rule,
719
- added: false
720
- });
721
- }
722
- // Unequal port ranges - need to map individually
723
- else {
724
- const toRangeSize = toRange.to - toRange.from + 1;
725
- for (let p = fromRange.from; p <= fromRange.to; p++) {
726
- const offset = (p - fromRange.from) % toRangeSize;
727
- const targetPort = toRange.from + offset;
728
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${p} dnat to ${this.settings.toHost}:${targetPort} comment "${this.ruleTag}:DNAT_INDIVIDUAL"`;
729
- rulesetContent += `${rule}\n`;
730
- this.rules.push({
731
- tableFamily: family,
732
- tableName: this.tableName,
733
- chainName: preroutingChain,
734
- ruleContents: rule,
735
- added: false
736
- });
737
- }
738
- }
739
- // Add masquerade rule for this port range if not preserving source IP
740
- if (!this.settings.preserveSourceIP) {
741
- const masqRule = `add rule ${family} ${this.tableName} ${postroutingChain} ${this.settings.protocol} daddr ${this.settings.toHost} dport ${toRange.from}-${toRange.to} masquerade comment "${this.ruleTag}:MASQ"`;
742
- rulesetContent += `${masqRule}\n`;
743
- this.rules.push({
744
- tableFamily: family,
745
- tableName: this.tableName,
746
- chainName: postroutingChain,
747
- ruleContents: masqRule,
748
- added: false
749
- });
750
- }
751
- }
752
- // Apply the ruleset if we have any rules
753
- if (rulesetContent) {
754
- // Write to temporary file
755
- fs.writeFileSync(this.tempFilePath, rulesetContent);
756
- // Apply the ruleset
757
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
758
- this.log('info', `Added port forwarding rules for ${family}`);
759
- // Mark rules as added
760
- for (const rule of this.rules) {
761
- if (rule.tableFamily === family && !rule.added) {
762
- rule.added = true;
763
- // Verify the rule was applied
764
- await this.verifyRuleApplication(rule);
765
- }
766
- }
767
- // Remove temporary file
768
- fs.unlinkSync(this.tempFilePath);
769
- }
770
- return true;
771
- }
772
- catch (err) {
773
- this.log('error', `Failed to add port pair mappings: ${err.message}`);
774
- return false;
775
- }
776
- }
777
- /**
778
- * Setup quality of service rules
779
- */
780
- async addTrafficShaping(isIpv6 = false) {
781
- if (!this.settings.qos?.enabled) {
782
- return true;
783
- }
784
- const family = isIpv6 ? 'ip6' : 'ip';
785
- const qosChain = 'qos_forward';
786
- try {
787
- let rulesetContent = '';
788
- // Add rate limiting rule if specified
789
- if (this.settings.qos.maxRate) {
790
- const ruleContent = `add rule ${family} ${this.tableName} ${qosChain} ip daddr ${this.settings.toHost} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.toPort)}} limit rate over ${this.settings.qos.maxRate} drop comment "${this.ruleTag}:QOS_RATE"`;
791
- rulesetContent += `${ruleContent}\n`;
792
- this.rules.push({
793
- tableFamily: family,
794
- tableName: this.tableName,
795
- chainName: qosChain,
796
- ruleContents: ruleContent,
797
- added: false
798
- });
799
- }
800
- // Add priority marking if specified
801
- if (this.settings.qos.priority !== undefined) {
802
- // Check if the chain exists
803
- const chainsOutput = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list chains ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
804
- // Check if we need to create priority queues
805
- const hasPrioChain = chainsOutput.includes(`chain prio${this.settings.qos.priority}`);
806
- if (!hasPrioChain) {
807
- // Create priority chain
808
- const prioChainRule = `add chain ${family} ${this.tableName} prio${this.settings.qos.priority} { type filter hook forward priority ${this.settings.qos.priority * 10}; }`;
809
- rulesetContent += `${prioChainRule}\n`;
810
- }
811
- // Add the rules to mark packets with this priority
812
- for (const range of this.normalizePortSpec(this.settings.toPort)) {
813
- const markRule = `add rule ${family} ${this.tableName} ${qosChain} ${this.settings.protocol} dport ${range.from}-${range.to} counter goto prio${this.settings.qos.priority} comment "${this.ruleTag}:QOS_PRIORITY"`;
814
- rulesetContent += `${markRule}\n`;
815
- this.rules.push({
816
- tableFamily: family,
817
- tableName: this.tableName,
818
- chainName: qosChain,
819
- ruleContents: markRule,
820
- added: false
821
- });
822
- }
823
- }
824
- // Apply the ruleset if we have any rules
825
- if (rulesetContent) {
826
- // Write to temporary file
827
- fs.writeFileSync(this.tempFilePath, rulesetContent);
828
- // Apply the ruleset
829
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
830
- this.log('info', `Added QoS rules for ${family}`);
831
- // Mark rules as added
832
- for (const rule of this.rules) {
833
- if (rule.tableFamily === family && !rule.added) {
834
- rule.added = true;
835
- // Verify the rule was applied
836
- await this.verifyRuleApplication(rule);
837
- }
838
- }
839
- // Remove temporary file
840
- fs.unlinkSync(this.tempFilePath);
841
- }
842
- return true;
843
- }
844
- catch (err) {
845
- this.log('error', `Failed to add traffic shaping: ${err.message}`);
846
- return false;
847
- }
848
- }
849
- /**
850
- * Setup NetworkProxy integration rules
851
- */
852
- async setupNetworkProxyIntegration(isIpv6 = false) {
853
- if (!this.settings.netProxyIntegration?.enabled) {
854
- return true;
855
- }
856
- const netProxyConfig = this.settings.netProxyIntegration;
857
- const family = isIpv6 ? 'ip6' : 'ip';
858
- const outputChain = 'nat_output';
859
- try {
860
- // Only proceed if we're redirecting localhost and have a port
861
- if (netProxyConfig.redirectLocalhost && netProxyConfig.sslTerminationPort) {
862
- const localhost = isIpv6 ? '::1' : '127.0.0.1';
863
- // Create the redirect rule
864
- const rule = `add rule ${family} ${this.tableName} ${outputChain} ${this.settings.protocol} daddr ${localhost} redirect to :${netProxyConfig.sslTerminationPort} comment "${this.ruleTag}:NETPROXY_REDIRECT"`;
865
- // Apply the rule
866
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} ${rule}`, this.settings.maxRetries, this.settings.retryDelayMs);
867
- this.log('info', `Added NetworkProxy redirection rule for ${family}`);
868
- const newRule = {
869
- tableFamily: family,
870
- tableName: this.tableName,
871
- chainName: outputChain,
872
- ruleContents: rule,
873
- added: true
874
- };
875
- this.rules.push(newRule);
876
- // Verify the rule was actually applied
877
- await this.verifyRuleApplication(newRule);
878
- }
879
- return true;
880
- }
881
- catch (err) {
882
- this.log('error', `Failed to set up NetworkProxy integration: ${err.message}`);
883
- return false;
884
- }
885
- }
886
- /**
887
- * Verify that a rule was successfully applied
888
- */
889
- async verifyRuleApplication(rule) {
890
- try {
891
- const { tableFamily, tableName, chainName, ruleContents } = rule;
892
- // Extract the distinctive parts of the rule to create a search pattern
893
- const commentMatch = ruleContents.match(/comment "([^"]+)"/);
894
- if (!commentMatch)
895
- return false;
896
- const commentTag = commentMatch[1];
897
- // List the chain to check if our rule is there
898
- const stdout = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list chain ${tableFamily} ${tableName} ${chainName}`, this.settings.maxRetries, this.settings.retryDelayMs);
899
- // Check if the comment appears in the output
900
- const isApplied = stdout.includes(commentTag);
901
- rule.verified = isApplied;
902
- if (!isApplied) {
903
- this.log('warn', `Rule verification failed: ${commentTag} not found in chain ${chainName}`);
904
- }
905
- else {
906
- this.log('debug', `Rule verified: ${commentTag} found in chain ${chainName}`);
907
- }
908
- return isApplied;
909
- }
910
- catch (err) {
911
- this.log('error', `Failed to verify rule application: ${err.message}`);
912
- return false;
913
- }
914
- }
915
- /**
916
- * Rolls back rules in case of error during setup
917
- */
918
- async rollbackRules() {
919
- // Process rules in reverse order (LIFO)
920
- for (let i = this.rules.length - 1; i >= 0; i--) {
921
- const rule = this.rules[i];
922
- if (rule.added) {
923
- try {
924
- // For nftables, create a delete rule by replacing 'add' with 'delete'
925
- const deleteRule = rule.ruleContents.replace('add rule', 'delete rule');
926
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} ${deleteRule}`, this.settings.maxRetries, this.settings.retryDelayMs);
927
- this.log('info', `Rolled back rule: ${deleteRule}`);
928
- rule.added = false;
929
- rule.verified = false;
930
- }
931
- catch (err) {
932
- this.log('error', `Failed to roll back rule: ${err.message}`);
933
- }
934
- }
935
- }
936
- }
937
- /**
938
- * Checks if nftables table exists
939
- */
940
- async tableExists(family, tableName) {
941
- try {
942
- const stdout = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list tables ${family}`, this.settings.maxRetries, this.settings.retryDelayMs);
943
- return stdout.includes(`table ${family} ${tableName}`);
944
- }
945
- catch (err) {
946
- return false;
947
- }
948
- }
949
- /**
950
- * Get system metrics like connection counts
951
- */
952
- async getSystemMetrics() {
953
- const metrics = {};
954
- try {
955
- // Try to get connection metrics if conntrack is available
956
- try {
957
- const stdout = await this.executeWithRetry('conntrack -C', this.settings.maxRetries, this.settings.retryDelayMs);
958
- metrics.activeConnections = parseInt(stdout.trim(), 10);
959
- }
960
- catch (err) {
961
- // conntrack not available, skip this metric
962
- }
963
- // Try to get forwarded connections count from nftables counters
964
- try {
965
- // Look for counters in our rules
966
- const stdout = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list table ip ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
967
- // Parse counter information from the output
968
- const counterMatches = stdout.matchAll(/counter packets (\d+) bytes (\d+)/g);
969
- let totalPackets = 0;
970
- let totalBytes = 0;
971
- for (const match of counterMatches) {
972
- totalPackets += parseInt(match[1], 10);
973
- totalBytes += parseInt(match[2], 10);
974
- }
975
- if (totalPackets > 0) {
976
- metrics.forwardedConnections = totalPackets;
977
- metrics.bytesForwarded = {
978
- sent: totalBytes,
979
- received: 0 // We can't easily determine this without additional rules
980
- };
981
- }
982
- }
983
- catch (err) {
984
- // Failed to get counter info, skip this metric
985
- }
986
- return metrics;
987
- }
988
- catch (err) {
989
- this.log('error', `Failed to get system metrics: ${err.message}`);
990
- return metrics;
991
- }
992
- }
993
- /**
994
- * Get status of IP sets
995
- */
996
- async getIPSetStatus() {
997
- const result = [];
998
- try {
999
- for (const family of ['ip', 'ip6']) {
1000
- try {
1001
- const stdout = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list sets ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1002
- const setMatches = stdout.matchAll(/set (\w+) {\s*type (\w+)/g);
1003
- for (const match of setMatches) {
1004
- const setName = match[1];
1005
- const setType = match[2];
1006
- // Get element count from tracking map
1007
- const setKey = `${family}:${setName}`;
1008
- const elements = this.ipSets.get(setKey) || [];
1009
- result.push({
1010
- name: setName,
1011
- elementCount: elements.length,
1012
- type: setType
1013
- });
1014
- }
1015
- }
1016
- catch (err) {
1017
- // No sets for this family, or table doesn't exist
1018
- }
1019
- }
1020
- return result;
1021
- }
1022
- catch (err) {
1023
- this.log('error', `Failed to get IP set status: ${err.message}`);
1024
- return result;
1025
- }
1026
- }
1027
- /**
1028
- * Get detailed status about the current state of the proxy
1029
- */
1030
- async getStatus() {
1031
- const result = {
1032
- active: this.rules.some(r => r.added),
1033
- ruleCount: {
1034
- total: this.rules.length,
1035
- added: this.rules.filter(r => r.added).length,
1036
- verified: this.rules.filter(r => r.verified).length
1037
- },
1038
- tablesConfigured: [],
1039
- metrics: {},
1040
- qosEnabled: this.settings.qos?.enabled || false
1041
- };
1042
- try {
1043
- // Get list of configured tables
1044
- const stdout = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list tables`, this.settings.maxRetries, this.settings.retryDelayMs);
1045
- const tableRegex = /table (ip|ip6) (\w+)/g;
1046
- let match;
1047
- while ((match = tableRegex.exec(stdout)) !== null) {
1048
- const [, family, name] = match;
1049
- if (name === this.tableName) {
1050
- result.tablesConfigured.push({ family, tableName: name });
1051
- }
1052
- }
1053
- // Get system metrics
1054
- result.metrics = await this.getSystemMetrics();
1055
- // Get IP set status if using IP sets
1056
- if (this.settings.useIPSets) {
1057
- result.ipSetsConfigured = await this.getIPSetStatus();
1058
- }
1059
- return result;
1060
- }
1061
- catch (err) {
1062
- this.log('error', `Failed to get status: ${err.message}`);
1063
- return result;
1064
- }
1065
- }
1066
- /**
1067
- * Performs a dry run to see what commands would be executed without actually applying them
1068
- */
1069
- async dryRun() {
1070
- const commands = [];
1071
- // Simulate all the necessary setup steps and collect commands
1072
- // Tables and chains
1073
- commands.push(`add table ip ${this.tableName}`);
1074
- commands.push(`add chain ip ${this.tableName} nat_prerouting { type nat hook prerouting priority -100; }`);
1075
- if (!this.settings.preserveSourceIP) {
1076
- commands.push(`add chain ip ${this.tableName} nat_postrouting { type nat hook postrouting priority 100; }`);
1077
- }
1078
- if (this.settings.netProxyIntegration?.enabled && this.settings.netProxyIntegration.redirectLocalhost) {
1079
- commands.push(`add chain ip ${this.tableName} nat_output { type nat hook output priority 0; }`);
1080
- }
1081
- if (this.settings.qos?.enabled) {
1082
- commands.push(`add chain ip ${this.tableName} qos_forward { type filter hook forward priority 0; }`);
1083
- }
1084
- // Add IPv6 tables if enabled
1085
- if (this.settings.ipv6Support) {
1086
- commands.push(`add table ip6 ${this.tableName}`);
1087
- commands.push(`add chain ip6 ${this.tableName} nat_prerouting { type nat hook prerouting priority -100; }`);
1088
- if (!this.settings.preserveSourceIP) {
1089
- commands.push(`add chain ip6 ${this.tableName} nat_postrouting { type nat hook postrouting priority 100; }`);
1090
- }
1091
- if (this.settings.netProxyIntegration?.enabled && this.settings.netProxyIntegration.redirectLocalhost) {
1092
- commands.push(`add chain ip6 ${this.tableName} nat_output { type nat hook output priority 0; }`);
1093
- }
1094
- if (this.settings.qos?.enabled) {
1095
- commands.push(`add chain ip6 ${this.tableName} qos_forward { type filter hook forward priority 0; }`);
1096
- }
1097
- }
1098
- // Source IP filters
1099
- if (this.settings.useIPSets) {
1100
- if (this.settings.bannedSourceIPs?.length) {
1101
- commands.push(`add set ip ${this.tableName} banned_ips { type ipv4_addr; }`);
1102
- commands.push(`add element ip ${this.tableName} banned_ips { ${this.settings.bannedSourceIPs.join(', ')} }`);
1103
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr @banned_ips drop comment "${this.ruleTag}:BANNED_SET"`);
1104
- }
1105
- if (this.settings.allowedSourceIPs?.length) {
1106
- commands.push(`add set ip ${this.tableName} allowed_ips { type ipv4_addr; }`);
1107
- commands.push(`add element ip ${this.tableName} allowed_ips { ${this.settings.allowedSourceIPs.join(', ')} }`);
1108
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr @allowed_ips ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED_SET"`);
1109
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`);
1110
- }
1111
- }
1112
- else if (this.settings.bannedSourceIPs?.length || this.settings.allowedSourceIPs?.length) {
1113
- // Traditional approach without IP sets
1114
- if (this.settings.bannedSourceIPs?.length) {
1115
- for (const ip of this.settings.bannedSourceIPs) {
1116
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr ${ip} drop comment "${this.ruleTag}:BANNED"`);
1117
- }
1118
- }
1119
- if (this.settings.allowedSourceIPs?.length) {
1120
- for (const ip of this.settings.allowedSourceIPs) {
1121
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr ${ip} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED"`);
1122
- }
1123
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`);
1124
- }
1125
- }
1126
- // Port forwarding rules
1127
- if (this.settings.useAdvancedNAT) {
1128
- // Advanced NAT with connection tracking
1129
- const fromPortRanges = this.normalizePortSpec(this.settings.fromPort);
1130
- const toPortRanges = this.normalizePortSpec(this.settings.toPort);
1131
- if (fromPortRanges.length === 1 && toPortRanges.length === 1) {
1132
- const fromRange = fromPortRanges[0];
1133
- const toRange = toPortRanges[0];
1134
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
1135
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from} ct state new dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT_CT"`);
1136
- }
1137
- else if ((fromRange.to - fromRange.from) === (toRange.to - toRange.from)) {
1138
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} ct state new dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE_CT"`);
1139
- }
1140
- commands.push(`add rule ip ${this.tableName} nat_prerouting ct state established,related accept comment "${this.ruleTag}:CT_ESTABLISHED"`);
1141
- }
1142
- }
1143
- else {
1144
- // Standard NAT rules
1145
- const fromRanges = this.normalizePortSpec(this.settings.fromPort);
1146
- const toRanges = this.normalizePortSpec(this.settings.toPort);
1147
- if (fromRanges.length === 1 && toRanges.length === 1) {
1148
- const fromRange = fromRanges[0];
1149
- const toRange = toRanges[0];
1150
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
1151
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from} dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT"`);
1152
- }
1153
- else {
1154
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE"`);
1155
- }
1156
- }
1157
- else if (toRanges.length === 1) {
1158
- // One-to-many mapping
1159
- for (const fromRange of fromRanges) {
1160
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} dnat to ${this.settings.toHost}:${toRanges[0].from}-${toRanges[0].to} comment "${this.ruleTag}:DNAT_RANGE"`);
1161
- }
1162
- }
1163
- else {
1164
- // One-to-one mapping of multiple ranges
1165
- for (let i = 0; i < fromRanges.length; i++) {
1166
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRanges[i].from}-${fromRanges[i].to} dnat to ${this.settings.toHost}:${toRanges[i].from}-${toRanges[i].to} comment "${this.ruleTag}:DNAT_RANGE"`);
1167
- }
1168
- }
1169
- }
1170
- // Masquerade rules if not preserving source IP
1171
- if (!this.settings.preserveSourceIP) {
1172
- commands.push(`add rule ip ${this.tableName} nat_postrouting ${this.settings.protocol} daddr ${this.settings.toHost} dport {${this.getAllPorts(this.settings.toPort)}} masquerade comment "${this.ruleTag}:MASQ"`);
1173
- }
1174
- // NetworkProxy integration
1175
- if (this.settings.netProxyIntegration?.enabled &&
1176
- this.settings.netProxyIntegration.redirectLocalhost &&
1177
- this.settings.netProxyIntegration.sslTerminationPort) {
1178
- commands.push(`add rule ip ${this.tableName} nat_output ${this.settings.protocol} daddr 127.0.0.1 redirect to :${this.settings.netProxyIntegration.sslTerminationPort} comment "${this.ruleTag}:NETPROXY_REDIRECT"`);
1179
- }
1180
- // QoS rules
1181
- if (this.settings.qos?.enabled) {
1182
- if (this.settings.qos.maxRate) {
1183
- commands.push(`add rule ip ${this.tableName} qos_forward ip daddr ${this.settings.toHost} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.toPort)}} limit rate over ${this.settings.qos.maxRate} drop comment "${this.ruleTag}:QOS_RATE"`);
1184
- }
1185
- if (this.settings.qos.priority !== undefined) {
1186
- commands.push(`add chain ip ${this.tableName} prio${this.settings.qos.priority} { type filter hook forward priority ${this.settings.qos.priority * 10}; }`);
1187
- for (const range of this.normalizePortSpec(this.settings.toPort)) {
1188
- commands.push(`add rule ip ${this.tableName} qos_forward ${this.settings.protocol} dport ${range.from}-${range.to} counter goto prio${this.settings.qos.priority} comment "${this.ruleTag}:QOS_PRIORITY"`);
1189
- }
1190
- }
1191
- }
1192
- return commands;
1193
- }
1194
- /**
1195
- * Starts the proxy by setting up all nftables rules
1196
- */
1197
- async start() {
1198
- // Check if nftables is available
1199
- const nftablesAvailable = await this.checkNftablesAvailability();
1200
- if (!nftablesAvailable) {
1201
- throw new NftResourceError('nftables is not available or not properly configured');
1202
- }
1203
- // Optionally clean slate first
1204
- if (this.settings.forceCleanSlate) {
1205
- await NfTablesProxy.cleanSlate();
1206
- }
1207
- // Set up tables and chains for IPv4
1208
- const setupSuccess = await this.setupTablesAndChains();
1209
- if (!setupSuccess) {
1210
- throw new NftExecutionError('Failed to set up nftables tables and chains');
1211
- }
1212
- // Set up IPv6 tables and chains if enabled
1213
- if (this.settings.ipv6Support) {
1214
- const setupIPv6Success = await this.setupTablesAndChains(true);
1215
- if (!setupIPv6Success) {
1216
- this.log('warn', 'Failed to set up IPv6 tables and chains, continuing with IPv4 only');
1217
- }
1218
- }
1219
- // Add source IP filters
1220
- await this.addSourceIPFilters();
1221
- if (this.settings.ipv6Support) {
1222
- await this.addSourceIPFilters(true);
1223
- }
1224
- // Set up advanced NAT with connection tracking if enabled
1225
- if (this.settings.useAdvancedNAT) {
1226
- const advancedNatSuccess = await this.setupAdvancedNAT();
1227
- if (!advancedNatSuccess) {
1228
- this.log('warn', 'Failed to set up advanced NAT, falling back to standard NAT');
1229
- this.settings.useAdvancedNAT = false;
1230
- }
1231
- else if (this.settings.ipv6Support) {
1232
- await this.setupAdvancedNAT(true);
1233
- }
1234
- }
1235
- // Add port forwarding rules (skip if using advanced NAT)
1236
- if (!this.settings.useAdvancedNAT) {
1237
- const forwardingSuccess = await this.addPortForwardingRules();
1238
- if (!forwardingSuccess) {
1239
- throw new NftExecutionError('Failed to add port forwarding rules');
1240
- }
1241
- // Add IPv6 port forwarding rules if enabled
1242
- if (this.settings.ipv6Support) {
1243
- const forwardingIPv6Success = await this.addPortForwardingRules(true);
1244
- if (!forwardingIPv6Success) {
1245
- this.log('warn', 'Failed to add IPv6 port forwarding rules');
1246
- }
1247
- }
1248
- }
1249
- // Set up QoS if enabled
1250
- if (this.settings.qos?.enabled) {
1251
- const qosSuccess = await this.addTrafficShaping();
1252
- if (!qosSuccess) {
1253
- this.log('warn', 'Failed to set up QoS rules, continuing without traffic shaping');
1254
- }
1255
- else if (this.settings.ipv6Support) {
1256
- await this.addTrafficShaping(true);
1257
- }
1258
- }
1259
- // Set up NetworkProxy integration if enabled
1260
- if (this.settings.netProxyIntegration?.enabled) {
1261
- const netProxySetupSuccess = await this.setupNetworkProxyIntegration();
1262
- if (!netProxySetupSuccess) {
1263
- this.log('warn', 'Failed to set up NetworkProxy integration');
1264
- }
1265
- if (this.settings.ipv6Support) {
1266
- await this.setupNetworkProxyIntegration(true);
1267
- }
1268
- }
1269
- // Final check - ensure we have at least one rule added
1270
- if (this.rules.filter(r => r.added).length === 0) {
1271
- throw new NftExecutionError('No rules were added');
1272
- }
1273
- this.log('info', 'NfTablesProxy started successfully');
1274
- }
1275
- /**
1276
- * Stops the proxy by removing all added rules
1277
- */
1278
- async stop() {
1279
- try {
1280
- let rulesetContent = '';
1281
- // Process rules in reverse order (LIFO)
1282
- for (let i = this.rules.length - 1; i >= 0; i--) {
1283
- const rule = this.rules[i];
1284
- if (rule.added) {
1285
- // Create delete rules by replacing 'add' with 'delete'
1286
- const deleteRule = rule.ruleContents.replace('add rule', 'delete rule');
1287
- rulesetContent += `${deleteRule}\n`;
1288
- }
1289
- }
1290
- // Apply the ruleset if we have any rules to delete
1291
- if (rulesetContent) {
1292
- // Write to temporary file
1293
- fs.writeFileSync(this.tempFilePath, rulesetContent);
1294
- // Apply the ruleset
1295
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
1296
- this.log('info', 'Removed all added rules');
1297
- // Mark all rules as removed
1298
- this.rules.forEach(rule => {
1299
- rule.added = false;
1300
- rule.verified = false;
1301
- });
1302
- // Remove temporary file
1303
- fs.unlinkSync(this.tempFilePath);
1304
- }
1305
- // Clean up IP sets if we created any
1306
- if (this.settings.useIPSets && this.ipSets.size > 0) {
1307
- for (const [key, _] of this.ipSets) {
1308
- const [family, setName] = key.split(':');
1309
- try {
1310
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} delete set ${family} ${this.tableName} ${setName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1311
- this.log('info', `Removed IP set ${setName} from ${family} ${this.tableName}`);
1312
- }
1313
- catch (err) {
1314
- this.log('warn', `Failed to remove IP set ${setName}: ${err.message}`);
1315
- }
1316
- }
1317
- this.ipSets.clear();
1318
- }
1319
- // Optionally clean up tables if they're empty
1320
- await this.cleanupEmptyTables();
1321
- this.log('info', 'NfTablesProxy stopped successfully');
1322
- }
1323
- catch (err) {
1324
- this.log('error', `Error stopping NfTablesProxy: ${err.message}`);
1325
- throw err;
1326
- }
1327
- }
1328
- /**
1329
- * Synchronous version of stop, for use in exit handlers
1330
- */
1331
- stopSync() {
1332
- try {
1333
- let rulesetContent = '';
1334
- // Process rules in reverse order (LIFO)
1335
- for (let i = this.rules.length - 1; i >= 0; i--) {
1336
- const rule = this.rules[i];
1337
- if (rule.added) {
1338
- // Create delete rules by replacing 'add' with 'delete'
1339
- const deleteRule = rule.ruleContents.replace('add rule', 'delete rule');
1340
- rulesetContent += `${deleteRule}\n`;
1341
- }
1342
- }
1343
- // Apply the ruleset if we have any rules to delete
1344
- if (rulesetContent) {
1345
- // Write to temporary file
1346
- fs.writeFileSync(this.tempFilePath, rulesetContent);
1347
- // Apply the ruleset
1348
- this.executeWithRetrySync(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
1349
- this.log('info', 'Removed all added rules');
1350
- // Mark all rules as removed
1351
- this.rules.forEach(rule => {
1352
- rule.added = false;
1353
- rule.verified = false;
1354
- });
1355
- // Remove temporary file
1356
- fs.unlinkSync(this.tempFilePath);
1357
- }
1358
- // Clean up IP sets if we created any
1359
- if (this.settings.useIPSets && this.ipSets.size > 0) {
1360
- for (const [key, _] of this.ipSets) {
1361
- const [family, setName] = key.split(':');
1362
- try {
1363
- this.executeWithRetrySync(`${NfTablesProxy.NFT_CMD} delete set ${family} ${this.tableName} ${setName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1364
- }
1365
- catch (err) {
1366
- // Non-critical error, continue
1367
- }
1368
- }
1369
- }
1370
- // Optionally clean up tables if they're empty (sync version)
1371
- this.cleanupEmptyTablesSync();
1372
- this.log('info', 'NfTablesProxy stopped successfully');
1373
- }
1374
- catch (err) {
1375
- this.log('error', `Error stopping NfTablesProxy: ${err.message}`);
1376
- }
1377
- }
1378
- /**
1379
- * Cleans up empty tables
1380
- */
1381
- async cleanupEmptyTables() {
1382
- // Check if tables are empty, and if so, delete them
1383
- for (const family of ['ip', 'ip6']) {
1384
- // Skip IPv6 if not enabled
1385
- if (family === 'ip6' && !this.settings.ipv6Support) {
1386
- continue;
1387
- }
1388
- try {
1389
- // Check if table exists
1390
- const tableExists = await this.tableExists(family, this.tableName);
1391
- if (!tableExists) {
1392
- continue;
1393
- }
1394
- // Check if the table has any rules
1395
- const stdout = await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} list table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1396
- const hasRules = stdout.includes('rule');
1397
- if (!hasRules) {
1398
- // Table is empty, delete it
1399
- await this.executeWithRetry(`${NfTablesProxy.NFT_CMD} delete table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1400
- this.log('info', `Deleted empty table ${family} ${this.tableName}`);
1401
- }
1402
- }
1403
- catch (err) {
1404
- this.log('error', `Error cleaning up tables: ${err.message}`);
1405
- }
1406
- }
1407
- }
1408
- /**
1409
- * Synchronous version of cleanupEmptyTables
1410
- */
1411
- cleanupEmptyTablesSync() {
1412
- // Check if tables are empty, and if so, delete them
1413
- for (const family of ['ip', 'ip6']) {
1414
- // Skip IPv6 if not enabled
1415
- if (family === 'ip6' && !this.settings.ipv6Support) {
1416
- continue;
1417
- }
1418
- try {
1419
- // Check if table exists
1420
- const tableExistsOutput = this.executeWithRetrySync(`${NfTablesProxy.NFT_CMD} list tables ${family}`, this.settings.maxRetries, this.settings.retryDelayMs);
1421
- const tableExists = tableExistsOutput.includes(`table ${family} ${this.tableName}`);
1422
- if (!tableExists) {
1423
- continue;
1424
- }
1425
- // Check if the table has any rules
1426
- const stdout = this.executeWithRetrySync(`${NfTablesProxy.NFT_CMD} list table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1427
- const hasRules = stdout.includes('rule');
1428
- if (!hasRules) {
1429
- // Table is empty, delete it
1430
- this.executeWithRetrySync(`${NfTablesProxy.NFT_CMD} delete table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1431
- this.log('info', `Deleted empty table ${family} ${this.tableName}`);
1432
- }
1433
- }
1434
- catch (err) {
1435
- this.log('error', `Error cleaning up tables: ${err.message}`);
1436
- }
1437
- }
1438
- }
1439
- /**
1440
- * Removes all nftables rules created by this module
1441
- */
1442
- static async cleanSlate() {
1443
- try {
1444
- // Check for rules with our comment pattern
1445
- const stdout = await execAsync(`${NfTablesProxy.NFT_CMD} list ruleset`);
1446
- // Extract our tables
1447
- const tableMatches = stdout.stdout.match(/table (ip|ip6) (\w+) {[^}]*NfTablesProxy:[^}]*}/g);
1448
- if (tableMatches) {
1449
- for (const tableMatch of tableMatches) {
1450
- // Extract table family and name
1451
- const familyMatch = tableMatch.match(/table (ip|ip6) (\w+)/);
1452
- if (familyMatch) {
1453
- const family = familyMatch[1];
1454
- const tableName = familyMatch[2];
1455
- // Delete the table
1456
- await execAsync(`${NfTablesProxy.NFT_CMD} delete table ${family} ${tableName}`);
1457
- console.log(`Deleted table ${family} ${tableName} containing NfTablesProxy rules`);
1458
- }
1459
- }
1460
- }
1461
- else {
1462
- console.log('No NfTablesProxy rules found to clean up');
1463
- }
1464
- }
1465
- catch (err) {
1466
- console.error(`Error in cleanSlate: ${err}`);
1467
- }
1468
- }
1469
- /**
1470
- * Synchronous version of cleanSlate
1471
- */
1472
- static cleanSlateSync() {
1473
- try {
1474
- // Check for rules with our comment pattern
1475
- const stdout = execSync(`${NfTablesProxy.NFT_CMD} list ruleset`).toString();
1476
- // Extract our tables
1477
- const tableMatches = stdout.match(/table (ip|ip6) (\w+) {[^}]*NfTablesProxy:[^}]*}/g);
1478
- if (tableMatches) {
1479
- for (const tableMatch of tableMatches) {
1480
- // Extract table family and name
1481
- const familyMatch = tableMatch.match(/table (ip|ip6) (\w+)/);
1482
- if (familyMatch) {
1483
- const family = familyMatch[1];
1484
- const tableName = familyMatch[2];
1485
- // Delete the table
1486
- execSync(`${NfTablesProxy.NFT_CMD} delete table ${family} ${tableName}`);
1487
- console.log(`Deleted table ${family} ${tableName} containing NfTablesProxy rules`);
1488
- }
1489
- }
1490
- }
1491
- else {
1492
- console.log('No NfTablesProxy rules found to clean up');
1493
- }
1494
- }
1495
- catch (err) {
1496
- console.error(`Error in cleanSlateSync: ${err}`);
1497
- }
1498
- }
1499
- /**
1500
- * Improved logging with structured output
1501
- */
1502
- log(level, message, meta) {
1503
- if (!this.settings.enableLogging && (level === 'info' || level === 'debug')) {
1504
- return;
1505
- }
1506
- const timestamp = new Date().toISOString();
1507
- const logData = {
1508
- timestamp,
1509
- level: level.toUpperCase(),
1510
- message,
1511
- ...meta,
1512
- context: {
1513
- instance: this.ruleTag,
1514
- table: this.tableName
1515
- }
1516
- };
1517
- // Determine if output should be JSON or plain text based on settings
1518
- const useJson = this.settings.logFormat === 'json';
1519
- if (useJson) {
1520
- const logOutput = JSON.stringify(logData);
1521
- console.log(logOutput);
1522
- return;
1523
- }
1524
- // Plain text format
1525
- const metaStr = meta ? ` ${JSON.stringify(meta)}` : '';
1526
- switch (level) {
1527
- case 'info':
1528
- console.log(`[${timestamp}] [INFO] ${message}${metaStr}`);
1529
- break;
1530
- case 'warn':
1531
- console.warn(`[${timestamp}] [WARN] ${message}${metaStr}`);
1532
- break;
1533
- case 'error':
1534
- console.error(`[${timestamp}] [ERROR] ${message}${metaStr}`);
1535
- break;
1536
- case 'debug':
1537
- console.log(`[${timestamp}] [DEBUG] ${message}${metaStr}`);
1538
- break;
1539
- }
1540
- }
1541
- }
1542
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.nftablesproxy.js","sourceRoot":"","sources":["../../ts/nfttablesproxy/classes.nftablesproxy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AAC/C,OAAO,EAAE,SAAS,EAAE,MAAM,MAAM,CAAC;AACjC,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AAEzB,MAAM,SAAS,GAAG,SAAS,CAAC,IAAI,CAAC,CAAC;AAElC;;GAEG;AACH,MAAM,OAAO,YAAa,SAAQ,KAAK;IACrC,YAAY,OAAe;QACzB,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,cAAc,CAAC;IAC7B,CAAC;CACF;AAED,MAAM,OAAO,kBAAmB,SAAQ,YAAY;IAClD,YAAY,OAAe;QACzB,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,oBAAoB,CAAC;IACnC,CAAC;CACF;AAED,MAAM,OAAO,iBAAkB,SAAQ,YAAY;IACjD,YAAY,OAAe;QACzB,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,mBAAmB,CAAC;IAClC,CAAC;CACF;AAED,MAAM,OAAO,gBAAiB,SAAQ,YAAY;IAChD,YAAY,OAAe;QACzB,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,kBAAkB,CAAC;IACjC,CAAC;CACF;AAiGD;;;;GAIG;AACH,MAAM,OAAO,aAAa;aAOT,YAAO,GAAG,KAAK,AAAR,CAAS;IAE/B,YAAY,QAA+B;QAPnC,UAAK,GAAmB,EAAE,CAAC;QAC3B,WAAM,GAA0B,IAAI,GAAG,EAAE,CAAC,CAAC,6BAA6B;QAO9E,+CAA+C;QAC/C,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;QAEhC,uBAAuB;QACvB,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,QAAQ;YACX,MAAM,EAAE,QAAQ,CAAC,MAAM,IAAI,WAAW;YACtC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,IAAI,KAAK;YACpC,aAAa,EAAE,QAAQ,CAAC,aAAa,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK;YACpF,WAAW,EAAE,QAAQ,CAAC,WAAW,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,CAAC,KAAK;YAC9E,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,WAAW;YAC5C,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,OAAO;YACxC,SAAS,EAAE,QAAQ,CAAC,SAAS,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YACvE,UAAU,EAAE,QAAQ,CAAC,UAAU,IAAI,CAAC;YACpC,YAAY,EAAE,QAAQ,CAAC,YAAY,IAAI,IAAI;YAC3C,cAAc,EAAE,QAAQ,CAAC,cAAc,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC,CAAC,KAAK;SACxF,CAAC;QAEF,oEAAoE;QACpE,IAAI,CAAC,OAAO,GAAG,iBAAiB,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;QAExF,iBAAiB;QACjB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,SAAS,IAAI,WAAW,CAAC;QAExD,+CAA+C;QAC/C,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,aAAa,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;QAE1E,oDAAoD;QACpD,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,EAAE,CAAC;YAC/B,MAAM,OAAO,GAAG,GAAG,EAAE;gBACnB,IAAI,CAAC;oBACH,IAAI,CAAC,QAAQ,EAAE,CAAC;gBAClB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAwC,EAAE,EAAE,KAAK,EAAE,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACtF,CAAC;YACH,CAAC,CAAC;YAEF,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAC5B,OAAO,CAAC,EAAE,CAAC,QAAQ,EAAE,GAAG,EAAE;gBACxB,OAAO,EAAE,CAAC;gBACV,OAAO,CAAC,IAAI,EAAE,CAAC;YACjB,CAAC,CAAC,CAAC;YACH,OAAO,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBACzB,OAAO,EAAE,CAAC;gBACV,OAAO,CAAC,IAAI,EAAE,CAAC;YACjB,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,QAA+B;QACtD,wBAAwB;QACxB,MAAM,aAAa,GAAG,CAAC,IAAsD,EAAE,EAAE;YAC/E,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBACxB,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;gBACpC,OAAO;YACT,CAAC;YAED,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;gBAC7B,IAAI,IAAI,GAAG,CAAC,IAAI,IAAI,GAAG,KAAK,EAAE,CAAC;oBAC7B,MAAM,IAAI,kBAAkB,CAAC,wBAAwB,IAAI,EAAE,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC;iBAAM,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;gBACpC,IAAI,IAAI,CAAC,IAAI,GAAG,CAAC,IAAI,IAAI,CAAC,IAAI,GAAG,KAAK,IAAI,IAAI,CAAC,EAAE,GAAG,CAAC,IAAI,IAAI,CAAC,EAAE,GAAG,KAAK,IAAI,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;oBAChG,MAAM,IAAI,kBAAkB,CAAC,uBAAuB,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;gBAC9E,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,aAAa,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACjC,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE/B,uCAAuC;QACvC,MAAM,OAAO,GAAG,yIAAyI,CAAC;QAC1J,MAAM,SAAS,GAAG,ksBAAksB,CAAC;QAErtB,wBAAwB;QACxB,MAAM,WAAW,GAAG,CAAC,GAAc,EAAE,EAAE;YACrC,IAAI,CAAC,GAAG;gBAAE,OAAO;YAEjB,KAAK,MAAM,EAAE,IAAI,GAAG,EAAE,CAAC;gBACrB,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC7C,MAAM,IAAI,kBAAkB,CAAC,8BAA8B,EAAE,EAAE,CAAC,CAAC;gBACnE,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,WAAW,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAC;QACvC,WAAW,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;QAEtC,gDAAgD;QAChD,IAAI,QAAQ,CAAC,MAAM,EAAE,CAAC;YACpB,MAAM,SAAS,GAAG,6GAA6G,CAAC;YAChI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC3G,MAAM,IAAI,kBAAkB,CAAC,wBAAwB,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC;QAED,mDAAmD;QACnD,IAAI,QAAQ,CAAC,SAAS,EAAE,CAAC;YACvB,MAAM,cAAc,GAAG,iBAAiB,CAAC;YACzC,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;gBAC7C,MAAM,IAAI,kBAAkB,CAAC,uBAAuB,QAAQ,CAAC,SAAS,6DAA6D,CAAC,CAAC;YACvI,CAAC;QACH,CAAC;QAED,mCAAmC;QACnC,IAAI,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAC1B,IAAI,QAAQ,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;gBACzB,MAAM,SAAS,GAAG,sBAAsB,CAAC;gBACzC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC1C,MAAM,IAAI,kBAAkB,CAAC,wBAAwB,QAAQ,CAAC,GAAG,CAAC,OAAO,2CAA2C,CAAC,CAAC;gBACxH,CAAC;YACH,CAAC;YAED,IAAI,QAAQ,CAAC,GAAG,CAAC,QAAQ,KAAK,SAAS,EAAE,CAAC;gBACxC,IAAI,QAAQ,CAAC,GAAG,CAAC,QAAQ,GAAG,CAAC,IAAI,QAAQ,CAAC,GAAG,CAAC,QAAQ,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;oBACxG,MAAM,IAAI,kBAAkB,CAAC,qBAAqB,QAAQ,CAAC,GAAG,CAAC,QAAQ,wCAAwC,CAAC,CAAC;gBACnH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,QAA0D;QAClF,MAAM,MAAM,GAAiB,EAAE,CAAC;QAEhC,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC5B,yCAAyC;YACzC,KAAK,MAAM,IAAI,IAAI,QAAQ,EAAE,CAAC;gBAC5B,MAAM,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,IAAI,OAAO,QAAQ,KAAK,QAAQ,EAAE,CAAC;YACxC,0DAA0D;YAC1D,MAAM,CAAC,IAAI,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;QAChD,CAAC;aAAM,CAAC;YACN,kBAAkB;YAClB,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACxB,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,OAAe,EAAE,UAAU,GAAG,CAAC,EAAE,YAAY,GAAG,IAAI;QACjF,IAAI,SAA4B,CAAC;QAEjC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,CAAC,EAAE,EAAE,CAAC;YACpC,IAAI,CAAC;gBACH,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;gBAC5C,OAAO,MAAM,CAAC;YAChB,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,SAAS,GAAG,GAAG,CAAC;gBAChB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2BAA2B,CAAC,GAAC,CAAC,IAAI,UAAU,MAAM,OAAO,EAAE,EAAE,EAAE,KAAK,EAAE,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBAEtG,kDAAkD;gBAClD,IAAI,CAAC,GAAG,UAAU,GAAG,CAAC,EAAE,CAAC;oBACvB,MAAM,IAAI,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,YAAY,CAAC,CAAC,CAAC;gBAClE,CAAC;YACH,CAAC;QACH,CAAC;QAED,MAAM,IAAI,iBAAiB,CAAC,gBAAgB,UAAU,cAAc,SAAS,EAAE,OAAO,IAAI,eAAe,EAAE,CAAC,CAAC;IAC/G,CAAC;IAED;;OAEG;IACK,oBAAoB,CAAC,OAAe,EAAE,UAAU,GAAG,CAAC,EAAE,YAAY,GAAG,IAAI;QAC/E,IAAI,SAA4B,CAAC;QAEjC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,CAAC,EAAE,EAAE,CAAC;YACpC,IAAI,CAAC;gBACH,OAAO,QAAQ,CAAC,OAAO,CAAC,CAAC,QAAQ,EAAE,CAAC;YACtC,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,SAAS,GAAG,GAAG,CAAC;gBAChB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2BAA2B,CAAC,GAAC,CAAC,IAAI,UAAU,MAAM,OAAO,EAAE,EAAE,EAAE,KAAK,EAAE,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBAEtG,kDAAkD;gBAClD,IAAI,CAAC,GAAG,UAAU,GAAG,CAAC,EAAE,CAAC;oBACvB,gCAAgC;oBAChC,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,YAAY,CAAC;oBAC5C,OAAO,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,EAAE,CAAC;wBAC9B,uDAAuD;oBACzD,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,MAAM,IAAI,iBAAiB,CAAC,gBAAgB,UAAU,cAAc,SAAS,EAAE,OAAO,IAAI,eAAe,EAAE,CAAC,CAAC;IAC/G,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB;QACrC,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,gBAAgB,CAAC,GAAG,aAAa,CAAC,OAAO,YAAY,EAAE,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;YAExH,0DAA0D;YAC1D,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;gBACjC,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,gBAAgB,CAAC,2BAA2B,EAAE,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;gBACjH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,qFAAqF,CAAC,CAAC;gBAC1G,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8BAA8B,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC/D,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,SAAkB,KAAK;QACxD,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QAErC,IAAI,CAAC;YACH,oCAAoC;YACpC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACxC,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,EAAE,EAChD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,MAAM,WAAW,GAAG,MAAM,CAAC,QAAQ,CAAC,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;YAEzE,IAAI,CAAC,WAAW,EAAE,CAAC;gBACjB,mBAAmB;gBACnB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAChE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAE9D,+CAA+C;gBAC/C,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,8DAA8D,EAC5H,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAEhF,4EAA4E;gBAC5E,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;oBACpC,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,+DAA+D,EAC7H,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBACnF,CAAC;gBAED,0DAA0D;gBAC1D,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;oBACtG,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,mDAAmD,EACjH,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAC9E,CAAC;gBAED,iCAAiC;gBACjC,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;oBAC/B,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,wDAAwD,EACtH,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAC/E,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC;YAC7F,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACxE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CACvB,MAAc,EACd,OAAe,EACf,GAAa,EACb,UAAqC,WAAW;QAEhD,IAAI,CAAC;YACH,6BAA6B;YAC7B,MAAM,WAAW,GAAG,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,EAAE;gBAClC,IAAI,MAAM,KAAK,KAAK,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;oBAAE,OAAO,IAAI,CAAC;gBACtD,IAAI,MAAM,KAAK,IAAI,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;oBAAE,OAAO,IAAI,CAAC;gBACrD,OAAO,KAAK,CAAC;YACf,CAAC,CAAC,CAAC;YAEH,IAAI,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2BAA2B,OAAO,kBAAkB,OAAO,EAAE,CAAC,CAAC;gBAChF,OAAO,IAAI,CAAC;YACd,CAAC;YAED,8BAA8B;YAC9B,IAAI,CAAC;gBACH,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACtC,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAChE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,IAAI,CAAC,QAAQ,CAAC,OAAO,OAAO,IAAI,CAAC,EAAE,CAAC;oBACtC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,OAAO,oCAAoC,CAAC,CAAC;gBAC1E,CAAC;qBAAM,CAAC;oBACN,iBAAiB;oBACjB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,WAAW,OAAO,KAAK,EAC9F,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,OAAO,QAAQ,MAAM,cAAc,OAAO,EAAE,CAAC,CAAC;gBACnF,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,qCAAqC;gBACrC,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,WAAW,OAAO,KAAK,EAC9F,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,OAAO,QAAQ,MAAM,cAAc,OAAO,EAAE,CAAC,CAAC;YACnF,CAAC;YAED,yEAAyE;YACzE,MAAM,SAAS,GAAG,GAAG,CAAC;YACtB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,WAAW,CAAC,MAAM,EAAE,CAAC,IAAI,SAAS,EAAE,CAAC;gBACvD,MAAM,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,CAAC;gBAClD,MAAM,QAAQ,GAAG,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAElC,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,MAAM,QAAQ,IAAI,EAC7F,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,KAAK,CAAC,MAAM,eAAe,OAAO,EAAE,CAAC,CAAC;YAC3E,CAAC;YAED,mBAAmB;YACnB,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,MAAM,IAAI,OAAO,EAAE,EAAE,WAAW,CAAC,CAAC;YAErD,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,OAAO,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACxE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,SAAkB,KAAK;QACtD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YACtE,OAAO,IAAI,CAAC,CAAC,gBAAgB;QAC/B,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,KAAK,GAAG,gBAAgB,CAAC;QAC/B,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,WAAW,CAAC;QAEnD,IAAI,CAAC;YACH,0CAA0C;YAC1C,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,uEAAuE;YACvE,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gBAC5B,mDAAmD;gBACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC9E,MAAM,OAAO,GAAG,YAAY,CAAC;oBAC7B,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,OAAc,CAAC,CAAC;oBAEvF,2CAA2C;oBAC3C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,WAAW,OAAO,kBAAkB,IAAI,CAAC,OAAO,cAAc,CAAC;oBAChJ,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAChF,MAAM,OAAO,GAAG,aAAa,CAAC;oBAC9B,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,OAAc,CAAC,CAAC;oBAExF,6CAA6C;oBAC7C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,WAAW,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,eAAe,CAAC;oBACjO,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;oBAEH,yCAAyC;oBACzC,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC;oBACvL,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,2EAA2E;gBAE3E,yBAAyB;gBACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC9E,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;wBAC/C,oDAAoD;wBACpD,IAAI,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBACzC,IAAI,CAAC,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBAE1C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,UAAU,EAAE,kBAAkB,IAAI,CAAC,OAAO,UAAU,CAAC;wBACtI,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,KAAK;4BAChB,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAED,qBAAqB;gBACrB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAChF,kCAAkC;oBAClC,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;wBAChD,oDAAoD;wBACpD,IAAI,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBACzC,IAAI,CAAC,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBAE1C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,WAAW,CAAC;wBACvN,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,KAAK;4BAChB,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;oBAED,yCAAyC;oBACzC,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC;oBACvL,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,+CAA+C;YAC/C,IAAI,cAAc,EAAE,CAAC;gBACnB,wCAAwC;gBACxC,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEpD,oBAAoB;gBACpB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,MAAM,EAAE,CAAC,CAAC;gBAE/D,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;gBAED,4BAA4B;gBAC5B,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACnC,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAE1E,uDAAuD;YACvD,IAAI,CAAC,aAAa,EAAE,CAAC;YAErB,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,QAA0D;QAC5E,MAAM,UAAU,GAAG,IAAI,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QACpD,MAAM,KAAK,GAAa,EAAE,CAAC;QAE3B,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;YAC/B,IAAI,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,EAAE,EAAE,CAAC;gBAC5B,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC;YACpC,CAAC;iBAAM,CAAC;gBACN,KAAK,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;YAC1C,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,SAAkB,KAAK;QACpD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YAClC,OAAO,IAAI,CAAC,CAAC,iCAAiC;QAChD,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,eAAe,GAAG,gBAAgB,CAAC;QAEzC,IAAI,CAAC;YACH,sBAAsB;YACtB,MAAM,cAAc,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YACtE,MAAM,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAElE,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,4DAA4D;YAC5D,IAAI,cAAc,CAAC,MAAM,KAAK,CAAC,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7D,MAAM,SAAS,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;gBACpC,MAAM,OAAO,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;gBAEhC,sDAAsD;gBACtD,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,WAAW,CAAC;oBACxN,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,4BAA4B;qBACvB,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;oBACzE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,iBAAiB,CAAC;oBAC5P,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,gFAAgF;gBAChF,MAAM,MAAM,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,iDAAiD,IAAI,CAAC,OAAO,kBAAkB,CAAC;gBACtJ,cAAc,IAAI,GAAG,MAAM,IAAI,CAAC;gBAEhC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,eAAe;oBAC1B,YAAY,EAAE,MAAM;oBACpB,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;gBAEH,iCAAiC;gBACjC,IAAI,cAAc,EAAE,CAAC;oBACnB,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;oBAEpD,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,MAAM,EAAE,CAAC,CAAC;oBAE3D,sBAAsB;oBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;4BAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;4BAElB,8BAA8B;4BAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;wBACzC,CAAC;oBACH,CAAC;oBAED,4BAA4B;oBAC5B,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBACnC,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACnE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB,CAAC,SAAkB,KAAK;QAC1D,yEAAyE;QACzE,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YACjC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,eAAe,GAAG,gBAAgB,CAAC;QACzC,MAAM,gBAAgB,GAAG,iBAAiB,CAAC;QAE3C,IAAI,CAAC;YACH,gCAAgC;YAChC,MAAM,cAAc,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YACtE,MAAM,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAElE,+DAA+D;YAC/D,IAAI,cAAc,CAAC,MAAM,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC;gBAClD,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;oBAC9B,uDAAuD;oBACvD,MAAM,aAAa,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;oBAEtC,OAAO,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,eAAe,EAAE,gBAAgB,EAAE,cAAc,EAAE,aAAa,CAAC,CAAC;gBAC9G,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,kBAAkB,CAAC,4GAA4G,CAAC,CAAC;gBAC7I,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,4CAA4C;gBAC5C,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,eAAe,EAAE,gBAAgB,EAAE,cAAc,EAAE,YAAY,CAAC,CAAC;YACjH,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAwC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe,CAC3B,MAAc,EACd,eAAuB,EACvB,gBAAwB,EACxB,cAA4B,EAC5B,WAAuB;QAEvB,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,yEAAyE;YACzE,KAAK,MAAM,SAAS,IAAI,cAAc,EAAE,CAAC;gBACvC,0CAA0C;gBAC1C,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,WAAW,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,EAAE,CAAC;oBAC3E,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;oBAC5M,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,8DAA8D;qBACzD,IAAI,WAAW,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,EAAE,CAAC;oBAC7C,oDAAoD;oBACpD,KAAK,IAAI,CAAC,GAAG,SAAS,CAAC,IAAI,EAAE,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACpD,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,CAAC,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;wBAC/L,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,eAAe;4BAC1B,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBACD,4DAA4D;qBACvD,CAAC;oBACJ,MAAM,WAAW,GAAG,WAAW,CAAC,EAAE,GAAG,WAAW,CAAC,IAAI,GAAG,CAAC,CAAC;oBAE1D,KAAK,IAAI,CAAC,GAAG,SAAS,CAAC,IAAI,EAAE,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACpD,MAAM,MAAM,GAAG,CAAC,CAAC,GAAG,SAAS,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC;wBAClD,MAAM,UAAU,GAAG,WAAW,CAAC,IAAI,GAAG,MAAM,CAAC;wBAE7C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,CAAC,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,UAAU,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;wBACzL,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,eAAe;4BAC1B,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iEAAiE;YACjE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACpC,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gBACrD,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,IAAI,CAAC,QAAQ,CAAC,MAAM,WAAW,KAAK,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC;gBAC/L,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;gBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,gBAAgB;oBAC3B,YAAY,EAAE,QAAQ;oBACtB,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YACL,CAAC;YAED,yCAAyC;YACzC,IAAI,cAAc,EAAE,CAAC;gBACnB,0BAA0B;gBAC1B,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEpD,oBAAoB;gBACpB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,MAAM,EAAE,CAAC,CAAC;gBAE9D,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;gBAED,wBAAwB;gBACxB,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACnC,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACjE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,mBAAmB,CAC/B,MAAc,EACd,eAAuB,EACvB,gBAAwB,EACxB,cAA4B,EAC5B,YAA0B;QAE1B,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,wCAAwC;YACxC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC/C,MAAM,SAAS,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;gBACpC,MAAM,OAAO,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;gBAEhC,0CAA0C;gBAC1C,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;oBACxM,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,sDAAsD;qBACjD,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;oBACzE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC;oBAC5O,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,iDAAiD;qBAC5C,CAAC;oBACJ,MAAM,WAAW,GAAG,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,GAAG,CAAC,CAAC;oBAElD,KAAK,IAAI,CAAC,GAAG,SAAS,CAAC,IAAI,EAAE,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACpD,MAAM,MAAM,GAAG,CAAC,CAAC,GAAG,SAAS,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC;wBAClD,MAAM,UAAU,GAAG,OAAO,CAAC,IAAI,GAAG,MAAM,CAAC;wBAEzC,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,CAAC,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,UAAU,aAAa,IAAI,CAAC,OAAO,mBAAmB,CAAC;wBACpM,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,eAAe;4BAC1B,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAED,sEAAsE;gBACtE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;oBACpC,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,IAAI,CAAC,QAAQ,CAAC,MAAM,UAAU,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,wBAAwB,IAAI,CAAC,OAAO,QAAQ,CAAC;oBAClN,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,gBAAgB;wBAC3B,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,yCAAyC;YACzC,IAAI,cAAc,EAAE,CAAC;gBACnB,0BAA0B;gBAC1B,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEpD,oBAAoB;gBACpB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,MAAM,EAAE,CAAC,CAAC;gBAE9D,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;gBAED,wBAAwB;gBACxB,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACnC,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,qCAAqC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACtE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,SAAkB,KAAK;QACrD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAChC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,QAAQ,GAAG,aAAa,CAAC;QAE/B,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,sCAAsC;YACtC,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;gBAC9B,MAAM,WAAW,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,QAAQ,aAAa,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,kBAAkB,IAAI,CAAC,OAAO,YAAY,CAAC;gBACzQ,cAAc,IAAI,GAAG,WAAW,IAAI,CAAC;gBAErC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,QAAQ;oBACnB,YAAY,EAAE,WAAW;oBACzB,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YACL,CAAC;YAED,oCAAoC;YACpC,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,KAAK,SAAS,EAAE,CAAC;gBAC7C,4BAA4B;gBAC5B,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAC9C,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAClE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,6CAA6C;gBAC7C,MAAM,YAAY,GAAG,YAAY,CAAC,QAAQ,CAAC,aAAa,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;gBAEtF,IAAI,CAAC,YAAY,EAAE,CAAC;oBAClB,wBAAwB;oBACxB,MAAM,aAAa,GAAG,aAAa,MAAM,IAAI,IAAI,CAAC,SAAS,QAAQ,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,wCAAwC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,GAAG,EAAE,KAAK,CAAC;oBAC1K,cAAc,IAAI,GAAG,aAAa,IAAI,CAAC;gBACzC,CAAC;gBAED,mDAAmD;gBACnD,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;oBACjE,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,QAAQ,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,aAAa,IAAI,CAAC,OAAO,gBAAgB,CAAC;oBACpN,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,QAAQ;wBACnB,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,yCAAyC;YACzC,IAAI,cAAc,EAAE,CAAC;gBACnB,0BAA0B;gBAC1B,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEpD,oBAAoB;gBACpB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,MAAM,EAAE,CAAC,CAAC;gBAElD,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;gBAED,wBAAwB;gBACxB,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACnC,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACnE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,SAAkB,KAAK;QAChE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAChD,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,cAAc,GAAG,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACzD,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,WAAW,GAAG,YAAY,CAAC;QAEjC,IAAI,CAAC;YACH,8DAA8D;YAC9D,IAAI,cAAc,CAAC,iBAAiB,IAAI,cAAc,CAAC,kBAAkB,EAAE,CAAC;gBAC1E,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,WAAW,CAAC;gBAE/C,2BAA2B;gBAC3B,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,WAAW,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,iBAAiB,cAAc,CAAC,kBAAkB,aAAa,IAAI,CAAC,OAAO,qBAAqB,CAAC;gBAE9M,iBAAiB;gBACjB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,IAAI,IAAI,EAAE,EAClC,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,MAAM,EAAE,CAAC,CAAC;gBAEtE,MAAM,OAAO,GAAG;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,WAAW;oBACtB,YAAY,EAAE,IAAI;oBAClB,KAAK,EAAE,IAAI;iBACZ,CAAC;gBAEF,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;gBAEzB,uCAAuC;gBACvC,MAAM,IAAI,CAAC,qBAAqB,CAAC,OAAO,CAAC,CAAC;YAC5C,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8CAA8C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC/E,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB,CAAC,IAAkB;QACpD,IAAI,CAAC;YACH,MAAM,EAAE,WAAW,EAAE,SAAS,EAAE,SAAS,EAAE,YAAY,EAAE,GAAG,IAAI,CAAC;YAEjE,uEAAuE;YACvE,MAAM,YAAY,GAAG,YAAY,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC;YAC7D,IAAI,CAAC,YAAY;gBAAE,OAAO,KAAK,CAAC;YAEhC,MAAM,UAAU,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;YAEnC,+CAA+C;YAC/C,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACxC,GAAG,aAAa,CAAC,OAAO,eAAe,WAAW,IAAI,SAAS,IAAI,SAAS,EAAE,EAC9E,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,6CAA6C;YAC7C,MAAM,SAAS,GAAG,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;YAE9C,IAAI,CAAC,QAAQ,GAAG,SAAS,CAAC;YAE1B,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,UAAU,uBAAuB,SAAS,EAAE,CAAC,CAAC;YAC9F,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kBAAkB,UAAU,mBAAmB,SAAS,EAAE,CAAC,CAAC;YAChF,CAAC;YAED,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,sCAAsC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACvE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,aAAa;QACzB,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,sEAAsE;oBACtE,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;oBACxE,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,IAAI,UAAU,EAAE,EACxC,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,qBAAqB,UAAU,EAAE,CAAC,CAAC;oBAEpD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;oBACnB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;gBACxB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,SAAiB;QACzD,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACxC,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,EAAE,EAChD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,OAAO,MAAM,CAAC,QAAQ,CAAC,SAAS,MAAM,IAAI,SAAS,EAAE,CAAC,CAAC;QACzD,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAK5B,MAAM,OAAO,GAIT,EAAE,CAAC;QAEP,IAAI,CAAC;YACH,0DAA0D;YAC1D,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,cAAc,EAAE,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;gBACjH,OAAO,CAAC,iBAAiB,GAAG,QAAQ,CAAC,MAAM,CAAC,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;YAC1D,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,4CAA4C;YAC9C,CAAC;YAED,gEAAgE;YAChE,IAAI,CAAC;gBACH,iCAAiC;gBACjC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACxC,GAAG,aAAa,CAAC,OAAO,kBAAkB,IAAI,CAAC,SAAS,EAAE,EAC1D,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,4CAA4C;gBAC5C,MAAM,cAAc,GAAG,MAAM,CAAC,QAAQ,CAAC,oCAAoC,CAAC,CAAC;gBAC7E,IAAI,YAAY,GAAG,CAAC,CAAC;gBACrB,IAAI,UAAU,GAAG,CAAC,CAAC;gBAEnB,KAAK,MAAM,KAAK,IAAI,cAAc,EAAE,CAAC;oBACnC,YAAY,IAAI,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;oBACvC,UAAU,IAAI,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;gBACvC,CAAC;gBAED,IAAI,YAAY,GAAG,CAAC,EAAE,CAAC;oBACrB,OAAO,CAAC,oBAAoB,GAAG,YAAY,CAAC;oBAC5C,OAAO,CAAC,cAAc,GAAG;wBACvB,IAAI,EAAE,UAAU;wBAChB,QAAQ,EAAE,CAAC,CAAE,0DAA0D;qBACxE,CAAC;gBACJ,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,+CAA+C;YACjD,CAAC;YAED,OAAO,OAAO,CAAC;QACjB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClE,OAAO,OAAO,CAAC;QACjB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,cAAc;QAK1B,MAAM,MAAM,GAIN,EAAE,CAAC;QAET,IAAI,CAAC;YACH,KAAK,MAAM,MAAM,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,EAAE,CAAC;gBACnC,IAAI,CAAC;oBACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACxC,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAChE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,2BAA2B,CAAC,CAAC;oBAEhE,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;wBAC/B,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;wBACzB,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;wBAEzB,sCAAsC;wBACtC,MAAM,MAAM,GAAG,GAAG,MAAM,IAAI,OAAO,EAAE,CAAC;wBACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;wBAE/C,MAAM,CAAC,IAAI,CAAC;4BACV,IAAI,EAAE,OAAO;4BACb,YAAY,EAAE,QAAQ,CAAC,MAAM;4BAC7B,IAAI,EAAE,OAAO;yBACd,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;gBACpD,CAAC;YACH,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACjE,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,SAAS;QACpB,MAAM,MAAM,GAAoB;YAC9B,MAAM,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC;YACrC,SAAS,EAAE;gBACT,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,MAAM;gBACxB,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM;gBAC7C,QAAQ,EAAE,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,MAAM;aACpD;YACD,gBAAgB,EAAE,EAAE;YACpB,OAAO,EAAE,EAAE;YACX,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,IAAI,KAAK;SAChD,CAAC;QAEF,IAAI,CAAC;YACH,gCAAgC;YAChC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACxC,GAAG,aAAa,CAAC,OAAO,cAAc,EACtC,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,MAAM,UAAU,GAAG,uBAAuB,CAAC;YAC3C,IAAI,KAAK,CAAC;YAEV,OAAO,CAAC,KAAK,GAAG,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;gBAClD,MAAM,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,GAAG,KAAK,CAAC;gBAC/B,IAAI,IAAI,KAAK,IAAI,CAAC,SAAS,EAAE,CAAC;oBAC5B,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC5D,CAAC;YACH,CAAC;YAED,qBAAqB;YACrB,MAAM,CAAC,OAAO,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAE/C,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gBAC5B,MAAM,CAAC,gBAAgB,GAAG,MAAM,IAAI,CAAC,cAAc,EAAE,CAAC;YACxD,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC1D,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,MAAM;QACjB,MAAM,QAAQ,GAAa,EAAE,CAAC;QAE9B,8DAA8D;QAE9D,oBAAoB;QACpB,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;QAChD,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC;QAE3G,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACpC,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC;QAC9G,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;YACtG,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC;QAClG,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAC/B,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC;QACvG,CAAC;QAED,6BAA6B;QAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;YACjD,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC;YAE5G,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACpC,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC;YAC/G,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;gBACtG,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC;YACnG,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;gBAC/B,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC;YACxG,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,MAAM,EAAE,CAAC;gBAC1C,QAAQ,CAAC,IAAI,CAAC,cAAc,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC;gBAC7E,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,CAAC,SAAS,iBAAiB,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAC7G,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,sDAAsD,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;YAC/H,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;gBAC3C,QAAQ,CAAC,IAAI,CAAC,cAAc,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC;gBAC9E,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,CAAC,SAAS,kBAAkB,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAC/G,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,yCAAyC,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,eAAe,CAAC,CAAC;gBAC/M,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC,CAAC;YACtL,CAAC;QACH,CAAC;aAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YAC3F,uCAAuC;YACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,MAAM,EAAE,CAAC;gBAC1C,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;oBAC/C,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,4BAA4B,EAAE,kBAAkB,IAAI,CAAC,OAAO,UAAU,CAAC,CAAC;gBACrH,CAAC;YACH,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;gBAC3C,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;oBAChD,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,4BAA4B,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,WAAW,CAAC,CAAC;gBACtM,CAAC;gBACD,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC,CAAC;YACtL,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YACjC,wCAAwC;YACxC,MAAM,cAAc,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YACtE,MAAM,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAElE,IAAI,cAAc,CAAC,MAAM,KAAK,CAAC,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7D,MAAM,SAAS,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;gBACpC,MAAM,OAAO,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;gBAEhC,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,WAAW,CAAC,CAAC;gBACjN,CAAC;qBAAM,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC3E,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,iBAAiB,CAAC,CAAC;gBACrP,CAAC;gBAED,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,gEAAgE,IAAI,CAAC,OAAO,kBAAkB,CAAC,CAAC;YAC7I,CAAC;QACH,CAAC;aAAM,CAAC;YACN,qBAAqB;YACrB,MAAM,UAAU,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YAClE,MAAM,QAAQ,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAE9D,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACrD,MAAM,SAAS,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;gBAChC,MAAM,OAAO,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAC;gBAE5B,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC,CAAC;gBACjM,CAAC;qBAAM,CAAC;oBACN,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;gBACrO,CAAC;YACH,CAAC;iBAAM,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACjC,sBAAsB;gBACtB,KAAK,MAAM,SAAS,IAAI,UAAU,EAAE,CAAC;oBACnC,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,IAAI,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;gBAC7O,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,wCAAwC;gBACxC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;oBAC3C,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,UAAU,CAAC,CAAC,CAAC,CAAC,IAAI,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,IAAI,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;gBACrP,CAAC;YACH,CAAC;QACH,CAAC;QAED,+CAA+C;QAC/C,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACpC,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,oBAAoB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,IAAI,CAAC,QAAQ,CAAC,MAAM,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC,CAAC;QACrN,CAAC;QAED,2BAA2B;QAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO;YAC1C,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB;YACnD,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC;YAEzD,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,eAAe,IAAI,CAAC,QAAQ,CAAC,QAAQ,iCAAiC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,kBAAkB,aAAa,IAAI,CAAC,OAAO,qBAAqB,CAAC,CAAC;QACvN,CAAC;QAED,YAAY;QACZ,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;gBAC9B,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,kBAAkB,IAAI,CAAC,OAAO,YAAY,CAAC,CAAC;YAC/P,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,KAAK,SAAS,EAAE,CAAC;gBAC7C,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,QAAQ,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,wCAAwC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,GAAG,EAAE,KAAK,CAAC,CAAC;gBAE5J,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;oBACjE,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,gBAAgB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,aAAa,IAAI,CAAC,OAAO,gBAAgB,CAAC,CAAC;gBAC7M,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,iCAAiC;QACjC,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,yBAAyB,EAAE,CAAC;QACjE,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,MAAM,IAAI,gBAAgB,CAAC,sDAAsD,CAAC,CAAC;QACrF,CAAC;QAED,+BAA+B;QAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YAClC,MAAM,aAAa,CAAC,UAAU,EAAE,CAAC;QACnC,CAAC;QAED,oCAAoC;QACpC,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACvD,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,iBAAiB,CAAC,6CAA6C,CAAC,CAAC;QAC7E,CAAC;QAED,2CAA2C;QAC3C,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;YAC/D,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBACtB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oEAAoE,CAAC,CAAC;YACzF,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,MAAM,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAChC,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;QACtC,CAAC;QAED,0DAA0D;QAC1D,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YACjC,MAAM,kBAAkB,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;YACzD,IAAI,CAAC,kBAAkB,EAAE,CAAC;gBACxB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,6DAA6D,CAAC,CAAC;gBAChF,IAAI,CAAC,QAAQ,CAAC,cAAc,GAAG,KAAK,CAAC;YACvC,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACrC,MAAM,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;YACpC,CAAC;QACH,CAAC;QAED,yDAAyD;QACzD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YAClC,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;YAC9D,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,MAAM,IAAI,iBAAiB,CAAC,qCAAqC,CAAC,CAAC;YACrE,CAAC;YAED,4CAA4C;YAC5C,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,qBAAqB,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;gBACtE,IAAI,CAAC,qBAAqB,EAAE,CAAC;oBAC3B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAC/B,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAClD,IAAI,CAAC,UAAU,EAAE,CAAC;gBAChB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gEAAgE,CAAC,CAAC;YACrF,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACrC,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;YACrC,CAAC;QACH,CAAC;QAED,6CAA6C;QAC7C,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAC/C,MAAM,oBAAoB,GAAG,MAAM,IAAI,CAAC,4BAA4B,EAAE,CAAC;YACvE,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC1B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,CAAC,CAAC;YAChE,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,IAAI,CAAC,4BAA4B,CAAC,IAAI,CAAC,CAAC;YAChD,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjD,MAAM,IAAI,iBAAiB,CAAC,qBAAqB,CAAC,CAAC;QACrD,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;IACzD,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,wCAAwC;YACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;gBAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;gBAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBACf,uDAAuD;oBACvD,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;oBACxE,cAAc,IAAI,GAAG,UAAU,IAAI,CAAC;gBACtC,CAAC;YACH,CAAC;YAED,mDAAmD;YACnD,IAAI,cAAc,EAAE,CAAC;gBACnB,0BAA0B;gBAC1B,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEpD,oBAAoB;gBACpB,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,CAAC,CAAC;gBAE5C,4BAA4B;gBAC5B,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE;oBACxB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;oBACnB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;gBACxB,CAAC,CAAC,CAAC;gBAEH,wBAAwB;gBACxB,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACnC,CAAC;YAED,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;gBACpD,KAAK,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;oBACnC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBAEzC,IAAI,CAAC;wBACH,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,EAAE,EAC5E,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;wBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,OAAO,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;oBACjF,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2BAA2B,OAAO,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;oBACzE,CAAC;gBACH,CAAC;gBAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YACtB,CAAC;YAED,8CAA8C;YAC9C,MAAM,IAAI,CAAC,kBAAkB,EAAE,CAAC;YAEhC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;QACzD,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClE,MAAM,GAAG,CAAC;QACZ,CAAC;IACH,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,wCAAwC;YACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;gBAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;gBAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBACf,uDAAuD;oBACvD,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;oBACxE,cAAc,IAAI,GAAG,UAAU,IAAI,CAAC;gBACtC,CAAC;YACH,CAAC;YAED,mDAAmD;YACnD,IAAI,cAAc,EAAE,CAAC;gBACnB,0BAA0B;gBAC1B,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEpD,oBAAoB;gBACpB,IAAI,CAAC,oBAAoB,CACvB,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,CAAC,CAAC;gBAE5C,4BAA4B;gBAC5B,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE;oBACxB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;oBACnB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;gBACxB,CAAC,CAAC,CAAC;gBAEH,wBAAwB;gBACxB,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACnC,CAAC;YAED,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;gBACpD,KAAK,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;oBACnC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBAEzC,IAAI,CAAC;wBACH,IAAI,CAAC,oBAAoB,CACvB,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,EAAE,EAC5E,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBACJ,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,+BAA+B;oBACjC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,6DAA6D;YAC7D,IAAI,CAAC,sBAAsB,EAAE,CAAC;YAE9B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;QACzD,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB;QAC9B,oDAAoD;QACpD,KAAK,MAAM,MAAM,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,EAAE,CAAC;YACnC,2BAA2B;YAC3B,IAAI,MAAM,KAAK,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACnD,SAAS;YACX,CAAC;YAED,IAAI,CAAC;gBACH,wBAAwB;gBACxB,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;gBACnE,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,SAAS;gBACX,CAAC;gBAED,mCAAmC;gBACnC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CACxC,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EACjE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gBAEzC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,4BAA4B;oBAC5B,MAAM,IAAI,CAAC,gBAAgB,CACzB,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EACnE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBACtE,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,oDAAoD;QACpD,KAAK,MAAM,MAAM,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,EAAE,CAAC;YACnC,2BAA2B;YAC3B,IAAI,MAAM,KAAK,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACnD,SAAS;YACX,CAAC;YAED,IAAI,CAAC;gBACH,wBAAwB;gBACxB,MAAM,iBAAiB,GAAG,IAAI,CAAC,oBAAoB,CACjD,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,EAAE,EAChD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,MAAM,WAAW,GAAG,iBAAiB,CAAC,QAAQ,CAAC,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAEpF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,SAAS;gBACX,CAAC;gBAED,mCAAmC;gBACnC,MAAM,MAAM,GAAG,IAAI,CAAC,oBAAoB,CACtC,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EACjE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gBAEzC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,4BAA4B;oBAC5B,IAAI,CAAC,oBAAoB,CACvB,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EACnE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBACtE,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,KAAK,CAAC,UAAU;QAC5B,IAAI,CAAC;YACH,2CAA2C;YAC3C,MAAM,MAAM,GAAG,MAAM,SAAS,CAAC,GAAG,aAAa,CAAC,OAAO,eAAe,CAAC,CAAC;YAExE,qBAAqB;YACrB,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,kDAAkD,CAAC,CAAC;YAE7F,IAAI,YAAY,EAAE,CAAC;gBACjB,KAAK,MAAM,UAAU,IAAI,YAAY,EAAE,CAAC;oBACtC,gCAAgC;oBAChC,MAAM,WAAW,GAAG,UAAU,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC;oBAC7D,IAAI,WAAW,EAAE,CAAC;wBAChB,MAAM,MAAM,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAC9B,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAEjC,mBAAmB;wBACnB,MAAM,SAAS,CAAC,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,SAAS,EAAE,CAAC,CAAC;wBAChF,OAAO,CAAC,GAAG,CAAC,iBAAiB,MAAM,IAAI,SAAS,iCAAiC,CAAC,CAAC;oBACrF,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,0CAA0C,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,wBAAwB,GAAG,EAAE,CAAC,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,cAAc;QAC1B,IAAI,CAAC;YACH,2CAA2C;YAC3C,MAAM,MAAM,GAAG,QAAQ,CAAC,GAAG,aAAa,CAAC,OAAO,eAAe,CAAC,CAAC,QAAQ,EAAE,CAAC;YAE5E,qBAAqB;YACrB,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,kDAAkD,CAAC,CAAC;YAEtF,IAAI,YAAY,EAAE,CAAC;gBACjB,KAAK,MAAM,UAAU,IAAI,YAAY,EAAE,CAAC;oBACtC,gCAAgC;oBAChC,MAAM,WAAW,GAAG,UAAU,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC;oBAC7D,IAAI,WAAW,EAAE,CAAC;wBAChB,MAAM,MAAM,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAC9B,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAEjC,mBAAmB;wBACnB,QAAQ,CAAC,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,SAAS,EAAE,CAAC,CAAC;wBACzE,OAAO,CAAC,GAAG,CAAC,iBAAiB,MAAM,IAAI,SAAS,iCAAiC,CAAC,CAAC;oBACrF,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,0CAA0C,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,4BAA4B,GAAG,EAAE,CAAC,CAAC;QACnD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,GAAG,CAAC,KAA0C,EAAE,OAAe,EAAE,IAA0B;QACjG,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,CAAC,KAAK,KAAK,MAAM,IAAI,KAAK,KAAK,OAAO,CAAC,EAAE,CAAC;YAC5E,OAAO;QACT,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAE3C,MAAM,OAAO,GAAG;YACd,SAAS;YACT,KAAK,EAAE,KAAK,CAAC,WAAW,EAAE;YAC1B,OAAO;YACP,GAAG,IAAI;YACP,OAAO,EAAE;gBACP,QAAQ,EAAE,IAAI,CAAC,OAAO;gBACtB,KAAK,EAAE,IAAI,CAAC,SAAS;aACtB;SACF,CAAC;QAEF,qEAAqE;QACrE,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,SAAS,KAAK,MAAM,CAAC;QAEnD,IAAI,OAAO,EAAE,CAAC;YACZ,MAAM,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;YAC1C,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACvB,OAAO;QACT,CAAC;QAED,oBAAoB;QACpB,MAAM,OAAO,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;QAEvD,QAAQ,KAAK,EAAE,CAAC;YACd,KAAK,MAAM;gBACT,OAAO,CAAC,GAAG,CAAC,IAAI,SAAS,YAAY,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC1D,MAAM;YACR,KAAK,MAAM;gBACT,OAAO,CAAC,IAAI,CAAC,IAAI,SAAS,YAAY,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC3D,MAAM;YACR,KAAK,OAAO;gBACV,OAAO,CAAC,KAAK,CAAC,IAAI,SAAS,aAAa,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC7D,MAAM;YACR,KAAK,OAAO;gBACV,OAAO,CAAC,GAAG,CAAC,IAAI,SAAS,aAAa,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC3D,MAAM;QACV,CAAC;IACH,CAAC"}