@push.rocks/smartproxy 19.3.2 → 19.3.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
  3. package/dist_ts/http/index.d.ts +1 -3
  4. package/dist_ts/http/index.js +4 -10
  5. package/dist_ts/http/models/http-types.d.ts +4 -91
  6. package/dist_ts/http/models/http-types.js +5 -60
  7. package/dist_ts/http/router/proxy-router.d.ts +1 -1
  8. package/dist_ts/http/router/route-router.d.ts +1 -1
  9. package/dist_ts/index.d.ts +9 -7
  10. package/dist_ts/index.js +10 -7
  11. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
  12. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
  13. package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
  14. package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
  15. package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
  16. package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
  17. package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
  18. package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
  19. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
  20. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
  21. package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
  22. package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
  23. package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
  24. package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
  25. package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
  26. package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
  27. package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
  28. package/dist_ts/proxies/http-proxy/index.js +12 -0
  29. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
  30. package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
  31. package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
  32. package/dist_ts/proxies/http-proxy/models/index.js +6 -0
  33. package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
  34. package/dist_ts/proxies/http-proxy/models/types.js +276 -0
  35. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
  36. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
  37. package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
  38. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
  39. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
  40. package/dist_ts/proxies/index.d.ts +5 -5
  41. package/dist_ts/proxies/index.js +5 -5
  42. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
  43. package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
  44. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
  45. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
  46. package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
  47. package/dist_ts/proxies/smart-proxy/index.js +4 -2
  48. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
  49. package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
  50. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
  51. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
  52. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
  53. package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
  54. package/dist_ts/routing/index.d.ts +5 -0
  55. package/dist_ts/routing/index.js +8 -0
  56. package/dist_ts/routing/models/http-types.d.ts +6 -0
  57. package/dist_ts/routing/models/http-types.js +7 -0
  58. package/dist_ts/routing/router/index.d.ts +8 -0
  59. package/dist_ts/routing/router/index.js +7 -0
  60. package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
  61. package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
  62. package/dist_ts/routing/router/route-router.d.ts +108 -0
  63. package/dist_ts/routing/router/route-router.js +393 -0
  64. package/package.json +1 -1
  65. package/readme.md +18 -35
  66. package/readme.plan.md +173 -271
  67. package/ts/00_commitinfo_data.ts +1 -1
  68. package/ts/forwarding/factory/forwarding-factory.ts +28 -0
  69. package/ts/index.ts +13 -9
  70. package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
  71. package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
  72. package/ts/proxies/http-proxy/handlers/index.ts +6 -0
  73. package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
  74. package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
  75. package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
  76. package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
  77. package/ts/proxies/http-proxy/models/http-types.ts +165 -0
  78. package/ts/proxies/http-proxy/models/index.ts +5 -0
  79. package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
  80. package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
  81. package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
  82. package/ts/proxies/index.ts +7 -7
  83. package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
  84. package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
  85. package/ts/proxies/smart-proxy/index.ts +4 -1
  86. package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
  87. package/ts/proxies/smart-proxy/port-manager.ts +2 -2
  88. package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
  89. package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
  90. package/ts/routing/index.ts +9 -0
  91. package/ts/routing/models/http-types.ts +6 -0
  92. package/ts/{http → routing}/router/proxy-router.ts +1 -1
  93. package/ts/{http → routing}/router/route-router.ts +1 -1
  94. package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
  95. package/dist_ts/certificate/acme/acme-factory.js +0 -40
  96. package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
  97. package/dist_ts/certificate/acme/challenge-handler.js +0 -92
  98. package/dist_ts/certificate/acme/index.d.ts +0 -4
  99. package/dist_ts/certificate/acme/index.js +0 -5
  100. package/dist_ts/certificate/certificate-manager.d.ts +0 -150
  101. package/dist_ts/certificate/certificate-manager.js +0 -505
  102. package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
  103. package/dist_ts/certificate/events/certificate-events.js +0 -38
  104. package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
  105. package/dist_ts/certificate/events/simplified-events.js +0 -13
  106. package/dist_ts/certificate/index.d.ts +0 -30
  107. package/dist_ts/certificate/index.js +0 -37
  108. package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
  109. package/dist_ts/certificate/models/certificate-errors.js +0 -141
  110. package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
  111. package/dist_ts/certificate/models/certificate-strategy.js +0 -73
  112. package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
  113. package/dist_ts/certificate/models/certificate-types.js +0 -2
  114. package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
  115. package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
  116. package/dist_ts/certificate/providers/index.d.ts +0 -4
  117. package/dist_ts/certificate/providers/index.js +0 -5
  118. package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
  119. package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
  120. package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
  121. package/dist_ts/certificate/storage/file-storage.js +0 -194
  122. package/dist_ts/certificate/storage/index.d.ts +0 -4
  123. package/dist_ts/certificate/storage/index.js +0 -5
  124. package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
  125. package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
  126. package/dist_ts/classes.iptablesproxy.d.ts +0 -112
  127. package/dist_ts/classes.iptablesproxy.js +0 -765
  128. package/dist_ts/classes.networkproxy.d.ts +0 -243
  129. package/dist_ts/classes.networkproxy.js +0 -1424
  130. package/dist_ts/classes.nftablesproxy.d.ts +0 -219
  131. package/dist_ts/classes.nftablesproxy.js +0 -1542
  132. package/dist_ts/classes.port80handler.d.ts +0 -215
  133. package/dist_ts/classes.port80handler.js +0 -736
  134. package/dist_ts/classes.portproxy.d.ts +0 -171
  135. package/dist_ts/classes.portproxy.js +0 -1802
  136. package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
  137. package/dist_ts/classes.pp.acmemanager.js +0 -123
  138. package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
  139. package/dist_ts/classes.pp.connectionhandler.js +0 -754
  140. package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
  141. package/dist_ts/classes.pp.connectionmanager.js +0 -378
  142. package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
  143. package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
  144. package/dist_ts/classes.pp.interfaces.d.ts +0 -133
  145. package/dist_ts/classes.pp.interfaces.js +0 -2
  146. package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
  147. package/dist_ts/classes.pp.networkproxybridge.js +0 -306
  148. package/dist_ts/classes.pp.portproxy.d.ts +0 -64
  149. package/dist_ts/classes.pp.portproxy.js +0 -567
  150. package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
  151. package/dist_ts/classes.pp.portrangemanager.js +0 -179
  152. package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
  153. package/dist_ts/classes.pp.securitymanager.js +0 -126
  154. package/dist_ts/classes.pp.snihandler.d.ts +0 -153
  155. package/dist_ts/classes.pp.snihandler.js +0 -1053
  156. package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
  157. package/dist_ts/classes.pp.timeoutmanager.js +0 -154
  158. package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
  159. package/dist_ts/classes.pp.tlsalert.js +0 -225
  160. package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
  161. package/dist_ts/classes.pp.tlsmanager.js +0 -132
  162. package/dist_ts/classes.snihandler.d.ts +0 -198
  163. package/dist_ts/classes.snihandler.js +0 -1210
  164. package/dist_ts/classes.sslredirect.d.ts +0 -8
  165. package/dist_ts/classes.sslredirect.js +0 -28
  166. package/dist_ts/common/acmeFactory.d.ts +0 -9
  167. package/dist_ts/common/acmeFactory.js +0 -20
  168. package/dist_ts/common/port80-adapter.d.ts +0 -11
  169. package/dist_ts/common/port80-adapter.js +0 -87
  170. package/dist_ts/examples/forwarding-example.d.ts +0 -1
  171. package/dist_ts/examples/forwarding-example.js +0 -96
  172. package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
  173. package/dist_ts/forwarding/config/domain-config.js +0 -12
  174. package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
  175. package/dist_ts/forwarding/config/domain-manager.js +0 -242
  176. package/dist_ts/helpers.certificates.d.ts +0 -5
  177. package/dist_ts/helpers.certificates.js +0 -23
  178. package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
  179. package/dist_ts/http/port80/acme-interfaces.js +0 -51
  180. package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
  181. package/dist_ts/http/port80/challenge-responder.js +0 -203
  182. package/dist_ts/http/port80/index.d.ts +0 -6
  183. package/dist_ts/http/port80/index.js +0 -9
  184. package/dist_ts/http/port80/port80-handler.d.ts +0 -136
  185. package/dist_ts/http/port80/port80-handler.js +0 -592
  186. package/dist_ts/http/redirects/index.d.ts +0 -4
  187. package/dist_ts/http/redirects/index.js +0 -5
  188. package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
  189. package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
  190. package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
  191. package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
  192. package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
  193. package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
  194. package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
  195. package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
  196. package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
  197. package/dist_ts/networkproxy/classes.np.types.js +0 -35
  198. package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
  199. package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
  200. package/dist_ts/networkproxy/index.d.ts +0 -1
  201. package/dist_ts/networkproxy/index.js +0 -4
  202. package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
  203. package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
  204. package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
  205. package/dist_ts/port80handler/classes.port80handler.js +0 -16
  206. package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
  207. package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
  208. package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
  209. package/dist_ts/proxies/network-proxy/index.js +0 -12
  210. package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
  211. package/dist_ts/proxies/network-proxy/models/index.js +0 -5
  212. package/dist_ts/proxies/network-proxy/models/types.js +0 -276
  213. package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
  214. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
  215. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
  216. package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
  217. package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
  218. package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
  219. package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
  220. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
  221. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
  222. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
  223. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
  224. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
  225. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
  226. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
  227. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
  228. package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
  229. package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
  230. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
  231. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
  232. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
  233. package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
  234. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
  235. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
  236. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
  237. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
  238. package/dist_ts/redirect/classes.redirect.d.ts +0 -96
  239. package/dist_ts/redirect/classes.redirect.js +0 -194
  240. package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
  241. package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
  242. package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
  243. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
  244. package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
  245. package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
  246. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
  247. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
  248. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
  249. package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
  250. package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
  251. package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
  252. package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
  253. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
  254. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
  255. package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
  256. package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
  257. package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
  258. package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
  259. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
  260. package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
  261. package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
  262. package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
  263. package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
  264. package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
  265. package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
  266. package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
  267. package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
  268. package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
  269. package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
  270. package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
  271. package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
  272. package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
  273. package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
  274. package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
  275. package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
  276. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
  277. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
  278. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
  279. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
  280. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
  281. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
  282. package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
  283. package/dist_ts/smartproxy/forwarding/index.js +0 -23
  284. package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
  285. package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
  286. package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
  287. package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
  288. package/dist_ts/smartproxy.classes.router.d.ts +0 -13
  289. package/dist_ts/smartproxy.classes.router.js +0 -33
  290. package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
  291. package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
  292. package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
  293. package/dist_ts/smartproxy.helpers.certificates.js +0 -23
  294. package/dist_ts/smartproxy.plugins.d.ts +0 -18
  295. package/dist_ts/smartproxy.plugins.js +0 -23
  296. package/dist_ts/smartproxy.portproxy.d.ts +0 -26
  297. package/dist_ts/smartproxy.portproxy.js +0 -295
  298. package/ts/http/index.ts +0 -16
  299. package/ts/http/models/http-types.ts +0 -108
  300. package/ts/http/redirects/index.ts +0 -3
  301. package/ts/proxies/network-proxy/models/index.ts +0 -4
  302. package/ts/redirect/classes.redirect.ts +0 -295
  303. /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
  304. /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
  305. /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
  306. /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
  307. /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
  308. /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
  309. /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
  310. /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
  311. /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
  312. /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
  313. /package/ts/{http → routing}/router/index.ts +0 -0
@@ -1,765 +0,0 @@
1
- import { exec, execSync } from 'child_process';
2
- import { promisify } from 'util';
3
- const execAsync = promisify(exec);
4
- /**
5
- * IPTablesProxy sets up iptables NAT rules to forward TCP traffic.
6
- * Enhanced with multi-port support, IPv6, and integration with PortProxy/NetworkProxy.
7
- */
8
- export class IPTablesProxy {
9
- constructor(settings) {
10
- this.rules = [];
11
- this.customChain = null;
12
- // Validate inputs to prevent command injection
13
- this.validateSettings(settings);
14
- // Set default settings
15
- this.settings = {
16
- ...settings,
17
- toHost: settings.toHost || 'localhost',
18
- protocol: settings.protocol || 'tcp',
19
- enableLogging: settings.enableLogging !== undefined ? settings.enableLogging : false,
20
- ipv6Support: settings.ipv6Support !== undefined ? settings.ipv6Support : false,
21
- checkExistingRules: settings.checkExistingRules !== undefined ? settings.checkExistingRules : true,
22
- netProxyIntegration: settings.netProxyIntegration || { enabled: false }
23
- };
24
- // Generate a unique identifier for the rules added by this instance
25
- this.ruleTag = `IPTablesProxy:${Date.now()}:${Math.random().toString(36).substr(2, 5)}`;
26
- if (this.settings.addJumpRule) {
27
- this.customChain = `IPTablesProxy_${Math.random().toString(36).substr(2, 5)}`;
28
- }
29
- // Register cleanup handlers if deleteOnExit is true
30
- if (this.settings.deleteOnExit) {
31
- const cleanup = () => {
32
- try {
33
- this.stopSync();
34
- }
35
- catch (err) {
36
- console.error('Error cleaning iptables rules on exit:', err);
37
- }
38
- };
39
- process.on('exit', cleanup);
40
- process.on('SIGINT', () => {
41
- cleanup();
42
- process.exit();
43
- });
44
- process.on('SIGTERM', () => {
45
- cleanup();
46
- process.exit();
47
- });
48
- }
49
- }
50
- /**
51
- * Validates settings to prevent command injection and ensure valid values
52
- */
53
- validateSettings(settings) {
54
- // Validate port numbers
55
- const validatePorts = (port) => {
56
- if (Array.isArray(port)) {
57
- port.forEach(p => validatePorts(p));
58
- return;
59
- }
60
- if (typeof port === 'number') {
61
- if (port < 1 || port > 65535) {
62
- throw new Error(`Invalid port number: ${port}`);
63
- }
64
- }
65
- else if (typeof port === 'object') {
66
- if (port.from < 1 || port.from > 65535 || port.to < 1 || port.to > 65535 || port.from > port.to) {
67
- throw new Error(`Invalid port range: ${port.from}-${port.to}`);
68
- }
69
- }
70
- };
71
- validatePorts(settings.fromPort);
72
- validatePorts(settings.toPort);
73
- // Define regex patterns at the method level so they're available throughout
74
- const ipRegex = /^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\/([0-9]|[1-2][0-9]|3[0-2]))?$/;
75
- const ipv6Regex = /^(([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))(\/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$/;
76
- // Validate IP addresses
77
- const validateIPs = (ips) => {
78
- if (!ips)
79
- return;
80
- for (const ip of ips) {
81
- if (!ipRegex.test(ip) && !ipv6Regex.test(ip)) {
82
- throw new Error(`Invalid IP address format: ${ip}`);
83
- }
84
- }
85
- };
86
- validateIPs(settings.allowedSourceIPs);
87
- validateIPs(settings.bannedSourceIPs);
88
- // Validate toHost - only allow hostnames or IPs
89
- if (settings.toHost) {
90
- const hostRegex = /^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\-]*[A-Za-z0-9])$/;
91
- if (!hostRegex.test(settings.toHost) && !ipRegex.test(settings.toHost) && !ipv6Regex.test(settings.toHost)) {
92
- throw new Error(`Invalid host format: ${settings.toHost}`);
93
- }
94
- }
95
- }
96
- /**
97
- * Normalizes port specifications into an array of port ranges
98
- */
99
- normalizePortSpec(portSpec) {
100
- const result = [];
101
- if (Array.isArray(portSpec)) {
102
- // If it's an array, process each element
103
- for (const spec of portSpec) {
104
- result.push(...this.normalizePortSpec(spec));
105
- }
106
- }
107
- else if (typeof portSpec === 'number') {
108
- // Single port becomes a range with the same start and end
109
- result.push({ from: portSpec, to: portSpec });
110
- }
111
- else {
112
- // Already a range
113
- result.push(portSpec);
114
- }
115
- return result;
116
- }
117
- /**
118
- * Gets the appropriate iptables command based on settings
119
- */
120
- getIptablesCommand(isIpv6 = false) {
121
- return isIpv6 ? 'ip6tables' : 'iptables';
122
- }
123
- /**
124
- * Checks if a rule already exists in iptables
125
- */
126
- async ruleExists(table, command, isIpv6 = false) {
127
- try {
128
- const iptablesCmd = this.getIptablesCommand(isIpv6);
129
- const { stdout } = await execAsync(`${iptablesCmd}-save -t ${table}`);
130
- // Convert the command to the format found in iptables-save output
131
- // (This is a simplification - in reality, you'd need more parsing)
132
- const rulePattern = command.replace(`${iptablesCmd} -t ${table} -A `, '-A ');
133
- return stdout.split('\n').some(line => line.trim() === rulePattern);
134
- }
135
- catch (err) {
136
- this.log('error', `Failed to check if rule exists: ${err}`);
137
- return false;
138
- }
139
- }
140
- /**
141
- * Sets up a custom chain for better rule management
142
- */
143
- async setupCustomChain(isIpv6 = false) {
144
- if (!this.customChain)
145
- return true;
146
- const iptablesCmd = this.getIptablesCommand(isIpv6);
147
- const table = 'nat';
148
- try {
149
- // Create the chain
150
- await execAsync(`${iptablesCmd} -t ${table} -N ${this.customChain}`);
151
- this.log('info', `Created custom chain: ${this.customChain}`);
152
- // Add jump rule to PREROUTING chain
153
- const jumpCommand = `${iptablesCmd} -t ${table} -A PREROUTING -j ${this.customChain} -m comment --comment "${this.ruleTag}:JUMP"`;
154
- await execAsync(jumpCommand);
155
- this.log('info', `Added jump rule to ${this.customChain}`);
156
- // Store the jump rule
157
- this.rules.push({
158
- table,
159
- chain: 'PREROUTING',
160
- command: jumpCommand,
161
- tag: `${this.ruleTag}:JUMP`,
162
- added: true
163
- });
164
- return true;
165
- }
166
- catch (err) {
167
- this.log('error', `Failed to set up custom chain: ${err}`);
168
- return false;
169
- }
170
- }
171
- /**
172
- * Add a source IP filter rule
173
- */
174
- async addSourceIPFilter(isIpv6 = false) {
175
- if (!this.settings.allowedSourceIPs && !this.settings.bannedSourceIPs) {
176
- return true;
177
- }
178
- const iptablesCmd = this.getIptablesCommand(isIpv6);
179
- const table = 'nat';
180
- const chain = this.customChain || 'PREROUTING';
181
- try {
182
- // Add banned IPs first (explicit deny)
183
- if (this.settings.bannedSourceIPs && this.settings.bannedSourceIPs.length > 0) {
184
- for (const ip of this.settings.bannedSourceIPs) {
185
- const command = `${iptablesCmd} -t ${table} -A ${chain} -s ${ip} -j DROP -m comment --comment "${this.ruleTag}:BANNED"`;
186
- // Check if rule already exists
187
- if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
188
- this.log('info', `Rule already exists, skipping: ${command}`);
189
- continue;
190
- }
191
- await execAsync(command);
192
- this.log('info', `Added banned IP rule: ${command}`);
193
- this.rules.push({
194
- table,
195
- chain,
196
- command,
197
- tag: `${this.ruleTag}:BANNED`,
198
- added: true
199
- });
200
- }
201
- }
202
- // Add allowed IPs (explicit allow)
203
- if (this.settings.allowedSourceIPs && this.settings.allowedSourceIPs.length > 0) {
204
- // First add a default deny for all
205
- const denyAllCommand = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} -j DROP -m comment --comment "${this.ruleTag}:DENY_ALL"`;
206
- // Add allow rules for specific IPs
207
- for (const ip of this.settings.allowedSourceIPs) {
208
- const command = `${iptablesCmd} -t ${table} -A ${chain} -s ${ip} -p ${this.settings.protocol} -j ACCEPT -m comment --comment "${this.ruleTag}:ALLOWED"`;
209
- // Check if rule already exists
210
- if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
211
- this.log('info', `Rule already exists, skipping: ${command}`);
212
- continue;
213
- }
214
- await execAsync(command);
215
- this.log('info', `Added allowed IP rule: ${command}`);
216
- this.rules.push({
217
- table,
218
- chain,
219
- command,
220
- tag: `${this.ruleTag}:ALLOWED`,
221
- added: true
222
- });
223
- }
224
- // Now add the default deny after all allows
225
- if (this.settings.checkExistingRules && await this.ruleExists(table, denyAllCommand, isIpv6)) {
226
- this.log('info', `Rule already exists, skipping: ${denyAllCommand}`);
227
- }
228
- else {
229
- await execAsync(denyAllCommand);
230
- this.log('info', `Added default deny rule: ${denyAllCommand}`);
231
- this.rules.push({
232
- table,
233
- chain,
234
- command: denyAllCommand,
235
- tag: `${this.ruleTag}:DENY_ALL`,
236
- added: true
237
- });
238
- }
239
- }
240
- return true;
241
- }
242
- catch (err) {
243
- this.log('error', `Failed to add source IP filter rules: ${err}`);
244
- return false;
245
- }
246
- }
247
- /**
248
- * Adds a port forwarding rule
249
- */
250
- async addPortForwardingRule(fromPortRange, toPortRange, isIpv6 = false) {
251
- const iptablesCmd = this.getIptablesCommand(isIpv6);
252
- const table = 'nat';
253
- const chain = this.customChain || 'PREROUTING';
254
- try {
255
- // Handle single port case
256
- if (fromPortRange.from === fromPortRange.to && toPortRange.from === toPortRange.to) {
257
- // Single port forward
258
- const command = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} --dport ${fromPortRange.from} ` +
259
- `-j DNAT --to-destination ${this.settings.toHost}:${toPortRange.from} ` +
260
- `-m comment --comment "${this.ruleTag}:DNAT"`;
261
- // Check if rule already exists
262
- if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
263
- this.log('info', `Rule already exists, skipping: ${command}`);
264
- }
265
- else {
266
- await execAsync(command);
267
- this.log('info', `Added port forwarding rule: ${command}`);
268
- this.rules.push({
269
- table,
270
- chain,
271
- command,
272
- tag: `${this.ruleTag}:DNAT`,
273
- added: true
274
- });
275
- }
276
- }
277
- else if (fromPortRange.to - fromPortRange.from === toPortRange.to - toPortRange.from) {
278
- // Port range forward with equal ranges
279
- const command = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} --dport ${fromPortRange.from}:${fromPortRange.to} ` +
280
- `-j DNAT --to-destination ${this.settings.toHost}:${toPortRange.from}-${toPortRange.to} ` +
281
- `-m comment --comment "${this.ruleTag}:DNAT_RANGE"`;
282
- // Check if rule already exists
283
- if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
284
- this.log('info', `Rule already exists, skipping: ${command}`);
285
- }
286
- else {
287
- await execAsync(command);
288
- this.log('info', `Added port range forwarding rule: ${command}`);
289
- this.rules.push({
290
- table,
291
- chain,
292
- command,
293
- tag: `${this.ruleTag}:DNAT_RANGE`,
294
- added: true
295
- });
296
- }
297
- }
298
- else {
299
- // Unequal port ranges need individual rules
300
- for (let i = 0; i <= fromPortRange.to - fromPortRange.from; i++) {
301
- const fromPort = fromPortRange.from + i;
302
- const toPort = toPortRange.from + i % (toPortRange.to - toPortRange.from + 1);
303
- const command = `${iptablesCmd} -t ${table} -A ${chain} -p ${this.settings.protocol} --dport ${fromPort} ` +
304
- `-j DNAT --to-destination ${this.settings.toHost}:${toPort} ` +
305
- `-m comment --comment "${this.ruleTag}:DNAT_INDIVIDUAL"`;
306
- // Check if rule already exists
307
- if (this.settings.checkExistingRules && await this.ruleExists(table, command, isIpv6)) {
308
- this.log('info', `Rule already exists, skipping: ${command}`);
309
- continue;
310
- }
311
- await execAsync(command);
312
- this.log('info', `Added individual port forwarding rule: ${command}`);
313
- this.rules.push({
314
- table,
315
- chain,
316
- command,
317
- tag: `${this.ruleTag}:DNAT_INDIVIDUAL`,
318
- added: true
319
- });
320
- }
321
- }
322
- // If preserveSourceIP is false, add a MASQUERADE rule
323
- if (!this.settings.preserveSourceIP) {
324
- // For port range
325
- const masqCommand = `${iptablesCmd} -t nat -A POSTROUTING -p ${this.settings.protocol} -d ${this.settings.toHost} ` +
326
- `--dport ${toPortRange.from}:${toPortRange.to} -j MASQUERADE ` +
327
- `-m comment --comment "${this.ruleTag}:MASQ"`;
328
- // Check if rule already exists
329
- if (this.settings.checkExistingRules && await this.ruleExists('nat', masqCommand, isIpv6)) {
330
- this.log('info', `Rule already exists, skipping: ${masqCommand}`);
331
- }
332
- else {
333
- await execAsync(masqCommand);
334
- this.log('info', `Added MASQUERADE rule: ${masqCommand}`);
335
- this.rules.push({
336
- table: 'nat',
337
- chain: 'POSTROUTING',
338
- command: masqCommand,
339
- tag: `${this.ruleTag}:MASQ`,
340
- added: true
341
- });
342
- }
343
- }
344
- return true;
345
- }
346
- catch (err) {
347
- this.log('error', `Failed to add port forwarding rule: ${err}`);
348
- // Try to roll back any rules that were already added
349
- await this.rollbackRules();
350
- return false;
351
- }
352
- }
353
- /**
354
- * Special handling for NetworkProxy integration
355
- */
356
- async setupNetworkProxyIntegration(isIpv6 = false) {
357
- if (!this.settings.netProxyIntegration?.enabled) {
358
- return true;
359
- }
360
- const netProxyConfig = this.settings.netProxyIntegration;
361
- const iptablesCmd = this.getIptablesCommand(isIpv6);
362
- const table = 'nat';
363
- const chain = this.customChain || 'PREROUTING';
364
- try {
365
- // If redirectLocalhost is true, set up special rule to redirect localhost traffic to NetworkProxy
366
- if (netProxyConfig.redirectLocalhost && netProxyConfig.sslTerminationPort) {
367
- const redirectCommand = `${iptablesCmd} -t ${table} -A OUTPUT -p tcp -d 127.0.0.1 -j REDIRECT ` +
368
- `--to-port ${netProxyConfig.sslTerminationPort} ` +
369
- `-m comment --comment "${this.ruleTag}:NETPROXY_REDIRECT"`;
370
- // Check if rule already exists
371
- if (this.settings.checkExistingRules && await this.ruleExists(table, redirectCommand, isIpv6)) {
372
- this.log('info', `Rule already exists, skipping: ${redirectCommand}`);
373
- }
374
- else {
375
- await execAsync(redirectCommand);
376
- this.log('info', `Added NetworkProxy redirection rule: ${redirectCommand}`);
377
- this.rules.push({
378
- table,
379
- chain: 'OUTPUT',
380
- command: redirectCommand,
381
- tag: `${this.ruleTag}:NETPROXY_REDIRECT`,
382
- added: true
383
- });
384
- }
385
- }
386
- return true;
387
- }
388
- catch (err) {
389
- this.log('error', `Failed to set up NetworkProxy integration: ${err}`);
390
- return false;
391
- }
392
- }
393
- /**
394
- * Rolls back rules that were added in case of error
395
- */
396
- async rollbackRules() {
397
- // Process rules in reverse order (LIFO)
398
- for (let i = this.rules.length - 1; i >= 0; i--) {
399
- const rule = this.rules[i];
400
- if (rule.added) {
401
- try {
402
- // Convert -A (add) to -D (delete)
403
- const deleteCommand = rule.command.replace('-A', '-D');
404
- await execAsync(deleteCommand);
405
- this.log('info', `Rolled back rule: ${deleteCommand}`);
406
- rule.added = false;
407
- }
408
- catch (err) {
409
- this.log('error', `Failed to roll back rule: ${err}`);
410
- }
411
- }
412
- }
413
- }
414
- /**
415
- * Sets up iptables rules for port forwarding with enhanced features
416
- */
417
- async start() {
418
- // Optionally clean the slate first
419
- if (this.settings.forceCleanSlate) {
420
- await IPTablesProxy.cleanSlate();
421
- }
422
- // First set up any custom chains
423
- if (this.settings.addJumpRule) {
424
- const chainSetupSuccess = await this.setupCustomChain();
425
- if (!chainSetupSuccess) {
426
- throw new Error('Failed to set up custom chain');
427
- }
428
- // For IPv6 if enabled
429
- if (this.settings.ipv6Support) {
430
- const chainSetupSuccessIpv6 = await this.setupCustomChain(true);
431
- if (!chainSetupSuccessIpv6) {
432
- this.log('warn', 'Failed to set up IPv6 custom chain, continuing with IPv4 only');
433
- }
434
- }
435
- }
436
- // Add source IP filters
437
- await this.addSourceIPFilter();
438
- if (this.settings.ipv6Support) {
439
- await this.addSourceIPFilter(true);
440
- }
441
- // Set up NetworkProxy integration if enabled
442
- if (this.settings.netProxyIntegration?.enabled) {
443
- const netProxySetupSuccess = await this.setupNetworkProxyIntegration();
444
- if (!netProxySetupSuccess) {
445
- this.log('warn', 'Failed to set up NetworkProxy integration');
446
- }
447
- if (this.settings.ipv6Support) {
448
- await this.setupNetworkProxyIntegration(true);
449
- }
450
- }
451
- // Normalize port specifications
452
- const fromPortRanges = this.normalizePortSpec(this.settings.fromPort);
453
- const toPortRanges = this.normalizePortSpec(this.settings.toPort);
454
- // Handle the case where fromPort and toPort counts don't match
455
- if (fromPortRanges.length !== toPortRanges.length) {
456
- if (toPortRanges.length === 1) {
457
- // If there's only one toPort, use it for all fromPorts
458
- for (const fromRange of fromPortRanges) {
459
- await this.addPortForwardingRule(fromRange, toPortRanges[0]);
460
- if (this.settings.ipv6Support) {
461
- await this.addPortForwardingRule(fromRange, toPortRanges[0], true);
462
- }
463
- }
464
- }
465
- else {
466
- throw new Error('Mismatched port counts: fromPort and toPort arrays must have equal length or toPort must be a single value');
467
- }
468
- }
469
- else {
470
- // Add port forwarding rules for each port specification
471
- for (let i = 0; i < fromPortRanges.length; i++) {
472
- await this.addPortForwardingRule(fromPortRanges[i], toPortRanges[i]);
473
- if (this.settings.ipv6Support) {
474
- await this.addPortForwardingRule(fromPortRanges[i], toPortRanges[i], true);
475
- }
476
- }
477
- }
478
- // Final check - ensure we have at least one rule added
479
- if (this.rules.filter(r => r.added).length === 0) {
480
- throw new Error('No rules were added');
481
- }
482
- }
483
- /**
484
- * Removes all added iptables rules
485
- */
486
- async stop() {
487
- // Process rules in reverse order (LIFO)
488
- for (let i = this.rules.length - 1; i >= 0; i--) {
489
- const rule = this.rules[i];
490
- if (rule.added) {
491
- try {
492
- // Convert -A (add) to -D (delete)
493
- const deleteCommand = rule.command.replace('-A', '-D');
494
- await execAsync(deleteCommand);
495
- this.log('info', `Removed rule: ${deleteCommand}`);
496
- rule.added = false;
497
- }
498
- catch (err) {
499
- this.log('error', `Failed to remove rule: ${err}`);
500
- }
501
- }
502
- }
503
- // If we created a custom chain, we need to clean it up
504
- if (this.customChain) {
505
- try {
506
- // First flush the chain
507
- await execAsync(`iptables -t nat -F ${this.customChain}`);
508
- this.log('info', `Flushed custom chain: ${this.customChain}`);
509
- // Then delete it
510
- await execAsync(`iptables -t nat -X ${this.customChain}`);
511
- this.log('info', `Deleted custom chain: ${this.customChain}`);
512
- // Same for IPv6 if enabled
513
- if (this.settings.ipv6Support) {
514
- try {
515
- await execAsync(`ip6tables -t nat -F ${this.customChain}`);
516
- await execAsync(`ip6tables -t nat -X ${this.customChain}`);
517
- this.log('info', `Deleted IPv6 custom chain: ${this.customChain}`);
518
- }
519
- catch (err) {
520
- this.log('error', `Failed to delete IPv6 custom chain: ${err}`);
521
- }
522
- }
523
- }
524
- catch (err) {
525
- this.log('error', `Failed to delete custom chain: ${err}`);
526
- }
527
- }
528
- // Clear rules array
529
- this.rules = [];
530
- }
531
- /**
532
- * Synchronous version of stop, for use in exit handlers
533
- */
534
- stopSync() {
535
- // Process rules in reverse order (LIFO)
536
- for (let i = this.rules.length - 1; i >= 0; i--) {
537
- const rule = this.rules[i];
538
- if (rule.added) {
539
- try {
540
- // Convert -A (add) to -D (delete)
541
- const deleteCommand = rule.command.replace('-A', '-D');
542
- execSync(deleteCommand);
543
- this.log('info', `Removed rule: ${deleteCommand}`);
544
- rule.added = false;
545
- }
546
- catch (err) {
547
- this.log('error', `Failed to remove rule: ${err}`);
548
- }
549
- }
550
- }
551
- // If we created a custom chain, we need to clean it up
552
- if (this.customChain) {
553
- try {
554
- // First flush the chain
555
- execSync(`iptables -t nat -F ${this.customChain}`);
556
- // Then delete it
557
- execSync(`iptables -t nat -X ${this.customChain}`);
558
- this.log('info', `Deleted custom chain: ${this.customChain}`);
559
- // Same for IPv6 if enabled
560
- if (this.settings.ipv6Support) {
561
- try {
562
- execSync(`ip6tables -t nat -F ${this.customChain}`);
563
- execSync(`ip6tables -t nat -X ${this.customChain}`);
564
- }
565
- catch (err) {
566
- // IPv6 failures are non-critical
567
- }
568
- }
569
- }
570
- catch (err) {
571
- this.log('error', `Failed to delete custom chain: ${err}`);
572
- }
573
- }
574
- // Clear rules array
575
- this.rules = [];
576
- }
577
- /**
578
- * Asynchronously cleans up any iptables rules in the nat table that were added by this module.
579
- * It looks for rules with comments containing "IPTablesProxy:".
580
- */
581
- static async cleanSlate() {
582
- await IPTablesProxy.cleanSlateInternal();
583
- // Also clean IPv6 rules
584
- await IPTablesProxy.cleanSlateInternal(true);
585
- }
586
- /**
587
- * Internal implementation of cleanSlate with IPv6 support
588
- */
589
- static async cleanSlateInternal(isIpv6 = false) {
590
- const iptablesCmd = isIpv6 ? 'ip6tables' : 'iptables';
591
- try {
592
- const { stdout } = await execAsync(`${iptablesCmd}-save -t nat`);
593
- const lines = stdout.split('\n');
594
- const proxyLines = lines.filter(line => line.includes('IPTablesProxy:'));
595
- // First, find and remove any custom chains
596
- const customChains = new Set();
597
- const jumpRules = [];
598
- for (const line of proxyLines) {
599
- if (line.includes('IPTablesProxy:JUMP')) {
600
- // Extract chain name from jump rule
601
- const match = line.match(/\s+-j\s+(\S+)\s+/);
602
- if (match && match[1].startsWith('IPTablesProxy_')) {
603
- customChains.add(match[1]);
604
- jumpRules.push(line);
605
- }
606
- }
607
- }
608
- // Remove jump rules first
609
- for (const line of jumpRules) {
610
- const trimmedLine = line.trim();
611
- if (trimmedLine.startsWith('-A')) {
612
- // Replace the "-A" with "-D" to form a deletion command
613
- const deleteRule = trimmedLine.replace('-A', '-D');
614
- const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
615
- try {
616
- await execAsync(cmd);
617
- console.log(`Cleaned up iptables jump rule: ${cmd}`);
618
- }
619
- catch (err) {
620
- console.error(`Failed to remove iptables jump rule: ${cmd}`, err);
621
- }
622
- }
623
- }
624
- // Then remove all other rules
625
- for (const line of proxyLines) {
626
- if (!line.includes('IPTablesProxy:JUMP')) { // Skip jump rules we already handled
627
- const trimmedLine = line.trim();
628
- if (trimmedLine.startsWith('-A')) {
629
- // Replace the "-A" with "-D" to form a deletion command
630
- const deleteRule = trimmedLine.replace('-A', '-D');
631
- const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
632
- try {
633
- await execAsync(cmd);
634
- console.log(`Cleaned up iptables rule: ${cmd}`);
635
- }
636
- catch (err) {
637
- console.error(`Failed to remove iptables rule: ${cmd}`, err);
638
- }
639
- }
640
- }
641
- }
642
- // Finally clean up custom chains
643
- for (const chain of customChains) {
644
- try {
645
- // Flush the chain
646
- await execAsync(`${iptablesCmd} -t nat -F ${chain}`);
647
- console.log(`Flushed custom chain: ${chain}`);
648
- // Delete the chain
649
- await execAsync(`${iptablesCmd} -t nat -X ${chain}`);
650
- console.log(`Deleted custom chain: ${chain}`);
651
- }
652
- catch (err) {
653
- console.error(`Failed to delete custom chain ${chain}:`, err);
654
- }
655
- }
656
- }
657
- catch (err) {
658
- console.error(`Failed to run ${iptablesCmd}-save: ${err}`);
659
- }
660
- }
661
- /**
662
- * Synchronously cleans up any iptables rules in the nat table that were added by this module.
663
- * It looks for rules with comments containing "IPTablesProxy:".
664
- * This method is intended for use in process exit handlers.
665
- */
666
- static cleanSlateSync() {
667
- IPTablesProxy.cleanSlateSyncInternal();
668
- // Also clean IPv6 rules
669
- IPTablesProxy.cleanSlateSyncInternal(true);
670
- }
671
- /**
672
- * Internal implementation of cleanSlateSync with IPv6 support
673
- */
674
- static cleanSlateSyncInternal(isIpv6 = false) {
675
- const iptablesCmd = isIpv6 ? 'ip6tables' : 'iptables';
676
- try {
677
- const stdout = execSync(`${iptablesCmd}-save -t nat`).toString();
678
- const lines = stdout.split('\n');
679
- const proxyLines = lines.filter(line => line.includes('IPTablesProxy:'));
680
- // First, find and remove any custom chains
681
- const customChains = new Set();
682
- const jumpRules = [];
683
- for (const line of proxyLines) {
684
- if (line.includes('IPTablesProxy:JUMP')) {
685
- // Extract chain name from jump rule
686
- const match = line.match(/\s+-j\s+(\S+)\s+/);
687
- if (match && match[1].startsWith('IPTablesProxy_')) {
688
- customChains.add(match[1]);
689
- jumpRules.push(line);
690
- }
691
- }
692
- }
693
- // Remove jump rules first
694
- for (const line of jumpRules) {
695
- const trimmedLine = line.trim();
696
- if (trimmedLine.startsWith('-A')) {
697
- // Replace the "-A" with "-D" to form a deletion command
698
- const deleteRule = trimmedLine.replace('-A', '-D');
699
- const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
700
- try {
701
- execSync(cmd);
702
- console.log(`Cleaned up iptables jump rule: ${cmd}`);
703
- }
704
- catch (err) {
705
- console.error(`Failed to remove iptables jump rule: ${cmd}`, err);
706
- }
707
- }
708
- }
709
- // Then remove all other rules
710
- for (const line of proxyLines) {
711
- if (!line.includes('IPTablesProxy:JUMP')) { // Skip jump rules we already handled
712
- const trimmedLine = line.trim();
713
- if (trimmedLine.startsWith('-A')) {
714
- const deleteRule = trimmedLine.replace('-A', '-D');
715
- const cmd = `${iptablesCmd} -t nat ${deleteRule}`;
716
- try {
717
- execSync(cmd);
718
- console.log(`Cleaned up iptables rule: ${cmd}`);
719
- }
720
- catch (err) {
721
- console.error(`Failed to remove iptables rule: ${cmd}`, err);
722
- }
723
- }
724
- }
725
- }
726
- // Finally clean up custom chains
727
- for (const chain of customChains) {
728
- try {
729
- // Flush the chain
730
- execSync(`${iptablesCmd} -t nat -F ${chain}`);
731
- // Delete the chain
732
- execSync(`${iptablesCmd} -t nat -X ${chain}`);
733
- console.log(`Deleted custom chain: ${chain}`);
734
- }
735
- catch (err) {
736
- console.error(`Failed to delete custom chain ${chain}:`, err);
737
- }
738
- }
739
- }
740
- catch (err) {
741
- console.error(`Failed to run ${iptablesCmd}-save: ${err}`);
742
- }
743
- }
744
- /**
745
- * Logging utility that respects the enableLogging setting
746
- */
747
- log(level, message) {
748
- if (!this.settings.enableLogging && level === 'info') {
749
- return;
750
- }
751
- const timestamp = new Date().toISOString();
752
- switch (level) {
753
- case 'info':
754
- console.log(`[${timestamp}] [INFO] ${message}`);
755
- break;
756
- case 'warn':
757
- console.warn(`[${timestamp}] [WARN] ${message}`);
758
- break;
759
- case 'error':
760
- console.error(`[${timestamp}] [ERROR] ${message}`);
761
- break;
762
- }
763
- }
764
- }
765
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.iptablesproxy.js","sourceRoot":"","sources":["../ts/classes.iptablesproxy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AAC/C,OAAO,EAAE,SAAS,EAAE,MAAM,MAAM,CAAC;AAEjC,MAAM,SAAS,GAAG,SAAS,CAAC,IAAI,CAAC,CAAC;AAsDlC;;;GAGG;AACH,MAAM,OAAO,aAAa;IAMxB,YAAY,QAA+B;QAJnC,UAAK,GAAmB,EAAE,CAAC;QAE3B,gBAAW,GAAkB,IAAI,CAAC;QAGxC,+CAA+C;QAC/C,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;QAEhC,uBAAuB;QACvB,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,QAAQ;YACX,MAAM,EAAE,QAAQ,CAAC,MAAM,IAAI,WAAW;YACtC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,IAAI,KAAK;YACpC,aAAa,EAAE,QAAQ,CAAC,aAAa,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK;YACpF,WAAW,EAAE,QAAQ,CAAC,WAAW,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,CAAC,KAAK;YAC9E,kBAAkB,EAAE,QAAQ,CAAC,kBAAkB,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,kBAAkB,CAAC,CAAC,CAAC,IAAI;YAClG,mBAAmB,EAAE,QAAQ,CAAC,mBAAmB,IAAI,EAAE,OAAO,EAAE,KAAK,EAAE;SACxE,CAAC;QAEF,oEAAoE;QACpE,IAAI,CAAC,OAAO,GAAG,iBAAiB,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;QAExF,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,IAAI,CAAC,WAAW,GAAG,iBAAiB,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;QAChF,CAAC;QAED,oDAAoD;QACpD,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,EAAE,CAAC;YAC/B,MAAM,OAAO,GAAG,GAAG,EAAE;gBACnB,IAAI,CAAC;oBACH,IAAI,CAAC,QAAQ,EAAE,CAAC;gBAClB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,KAAK,CAAC,wCAAwC,EAAE,GAAG,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC,CAAC;YAEF,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAC5B,OAAO,CAAC,EAAE,CAAC,QAAQ,EAAE,GAAG,EAAE;gBACxB,OAAO,EAAE,CAAC;gBACV,OAAO,CAAC,IAAI,EAAE,CAAC;YACjB,CAAC,CAAC,CAAC;YACH,OAAO,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBACzB,OAAO,EAAE,CAAC;gBACV,OAAO,CAAC,IAAI,EAAE,CAAC;YACjB,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,QAA+B;QACtD,wBAAwB;QACxB,MAAM,aAAa,GAAG,CAAC,IAAsD,EAAE,EAAE;YAC/E,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBACxB,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;gBACpC,OAAO;YACT,CAAC;YAED,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;gBAC7B,IAAI,IAAI,GAAG,CAAC,IAAI,IAAI,GAAG,KAAK,EAAE,CAAC;oBAC7B,MAAM,IAAI,KAAK,CAAC,wBAAwB,IAAI,EAAE,CAAC,CAAC;gBAClD,CAAC;YACH,CAAC;iBAAM,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;gBACpC,IAAI,IAAI,CAAC,IAAI,GAAG,CAAC,IAAI,IAAI,CAAC,IAAI,GAAG,KAAK,IAAI,IAAI,CAAC,EAAE,GAAG,CAAC,IAAI,IAAI,CAAC,EAAE,GAAG,KAAK,IAAI,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;oBAChG,MAAM,IAAI,KAAK,CAAC,uBAAuB,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;gBACjE,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,aAAa,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACjC,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE/B,4EAA4E;QAC5E,MAAM,OAAO,GAAG,yIAAyI,CAAC;QAC1J,MAAM,SAAS,GAAG,ksBAAksB,CAAC;QAErtB,wBAAwB;QACxB,MAAM,WAAW,GAAG,CAAC,GAAc,EAAE,EAAE;YACrC,IAAI,CAAC,GAAG;gBAAE,OAAO;YAEjB,KAAK,MAAM,EAAE,IAAI,GAAG,EAAE,CAAC;gBACrB,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC7C,MAAM,IAAI,KAAK,CAAC,8BAA8B,EAAE,EAAE,CAAC,CAAC;gBACtD,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,WAAW,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAC;QACvC,WAAW,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;QAEtC,gDAAgD;QAChD,IAAI,QAAQ,CAAC,MAAM,EAAE,CAAC;YACpB,MAAM,SAAS,GAAG,6GAA6G,CAAC;YAChI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC3G,MAAM,IAAI,KAAK,CAAC,wBAAwB,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,QAA0D;QAClF,MAAM,MAAM,GAAiB,EAAE,CAAC;QAEhC,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC5B,yCAAyC;YACzC,KAAK,MAAM,IAAI,IAAI,QAAQ,EAAE,CAAC;gBAC5B,MAAM,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,IAAI,OAAO,QAAQ,KAAK,QAAQ,EAAE,CAAC;YACxC,0DAA0D;YAC1D,MAAM,CAAC,IAAI,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,EAAE,EAAE,QAAQ,EAAE,CAAC,CAAC;QAChD,CAAC;aAAM,CAAC;YACN,kBAAkB;YAClB,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACxB,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,SAAkB,KAAK;QAChD,OAAO,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC;IAC3C,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,UAAU,CAAC,KAAa,EAAE,OAAe,EAAE,SAAkB,KAAK;QAC9E,IAAI,CAAC;YACH,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YACpD,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,SAAS,CAAC,GAAG,WAAW,YAAY,KAAK,EAAE,CAAC,CAAC;YACtE,kEAAkE;YAClE,mEAAmE;YACnE,MAAM,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,GAAG,WAAW,OAAO,KAAK,MAAM,EAAE,KAAK,CAAC,CAAC;YAC7E,OAAO,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,WAAW,CAAC,CAAC;QACtE,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,mCAAmC,GAAG,EAAE,CAAC,CAAC;YAC5D,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,SAAkB,KAAK;QACpD,IAAI,CAAC,IAAI,CAAC,WAAW;YAAE,OAAO,IAAI,CAAC;QAEnC,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QAEpB,IAAI,CAAC;YACH,mBAAmB;YACnB,MAAM,SAAS,CAAC,GAAG,WAAW,OAAO,KAAK,OAAO,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;YACrE,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;YAE9D,oCAAoC;YACpC,MAAM,WAAW,GAAG,GAAG,WAAW,OAAO,KAAK,qBAAqB,IAAI,CAAC,WAAW,0BAA0B,IAAI,CAAC,OAAO,QAAQ,CAAC;YAClI,MAAM,SAAS,CAAC,WAAW,CAAC,CAAC;YAC7B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;YAE3D,sBAAsB;YACtB,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;gBACd,KAAK;gBACL,KAAK,EAAE,YAAY;gBACnB,OAAO,EAAE,WAAW;gBACpB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,OAAO;gBAC3B,KAAK,EAAE,IAAI;aACZ,CAAC,CAAC;YAEH,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,EAAE,CAAC,CAAC;YAC3D,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,SAAkB,KAAK;QACrD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YACtE,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QACpB,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,IAAI,YAAY,CAAC;QAE/C,IAAI,CAAC;YACH,uCAAuC;YACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC9E,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;oBAC/C,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,EAAE,kCAAkC,IAAI,CAAC,OAAO,UAAU,CAAC;oBAExH,+BAA+B;oBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;wBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;wBAC9D,SAAS;oBACX,CAAC;oBAED,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,OAAO,EAAE,CAAC,CAAC;oBAErD,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,SAAS;wBAC7B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,mCAAmC;YACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAChF,mCAAmC;gBACnC,MAAM,cAAc,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,kCAAkC,IAAI,CAAC,OAAO,YAAY,CAAC;gBAErJ,mCAAmC;gBACnC,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;oBAChD,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,EAAE,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,oCAAoC,IAAI,CAAC,OAAO,WAAW,CAAC;oBAExJ,+BAA+B;oBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;wBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;wBAC9D,SAAS;oBACX,CAAC;oBAED,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,OAAO,EAAE,CAAC,CAAC;oBAEtD,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,UAAU;wBAC9B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;gBAED,4CAA4C;gBAC5C,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,cAAc,EAAE,MAAM,CAAC,EAAE,CAAC;oBAC7F,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,cAAc,EAAE,CAAC,CAAC;gBACvE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,cAAc,CAAC,CAAC;oBAChC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,cAAc,EAAE,CAAC,CAAC;oBAE/D,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO,EAAE,cAAc;wBACvB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,WAAW;wBAC/B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,GAAG,EAAE,CAAC,CAAC;YAClE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB,CACjC,aAAyB,EACzB,WAAuB,EACvB,SAAkB,KAAK;QAEvB,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QACpB,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,IAAI,YAAY,CAAC;QAE/C,IAAI,CAAC;YACH,0BAA0B;YAC1B,IAAI,aAAa,CAAC,IAAI,KAAK,aAAa,CAAC,EAAE,IAAI,WAAW,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,EAAE,CAAC;gBACnF,sBAAsB;gBACtB,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,YAAY,aAAa,CAAC,IAAI,GAAG;oBAClH,4BAA4B,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,GAAG;oBACvE,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC;gBAEhD,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;oBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;gBAChE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,OAAO,EAAE,CAAC,CAAC;oBAE3D,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,OAAO;wBAC3B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;iBAAM,IAAI,aAAa,CAAC,EAAE,GAAG,aAAa,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,GAAG,WAAW,CAAC,IAAI,EAAE,CAAC;gBACvF,uCAAuC;gBACvC,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,YAAY,aAAa,CAAC,IAAI,IAAI,aAAa,CAAC,EAAE,GAAG;oBACtI,4BAA4B,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,IAAI,WAAW,CAAC,EAAE,GAAG;oBACzF,yBAAyB,IAAI,CAAC,OAAO,cAAc,CAAC;gBAEtD,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;oBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;gBAChE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,qCAAqC,OAAO,EAAE,CAAC,CAAC;oBAEjE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,aAAa;wBACjC,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,4CAA4C;gBAC5C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,IAAI,aAAa,CAAC,EAAE,GAAG,aAAa,CAAC,IAAI,EAAE,CAAC,EAAE,EAAE,CAAC;oBAChE,MAAM,QAAQ,GAAG,aAAa,CAAC,IAAI,GAAG,CAAC,CAAC;oBACxC,MAAM,MAAM,GAAG,WAAW,CAAC,IAAI,GAAG,CAAC,GAAG,CAAC,WAAW,CAAC,EAAE,GAAG,WAAW,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC;oBAE9E,MAAM,OAAO,GAAG,GAAG,WAAW,OAAO,KAAK,OAAO,KAAK,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAQ,YAAY,QAAQ,GAAG;wBACxG,4BAA4B,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,MAAM,GAAG;wBAC7D,yBAAyB,IAAI,CAAC,OAAO,mBAAmB,CAAC;oBAE3D,+BAA+B;oBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC;wBACtF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,OAAO,EAAE,CAAC,CAAC;wBAC9D,SAAS;oBACX,CAAC;oBAED,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC;oBACzB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,OAAO,EAAE,CAAC,CAAC;oBAEtE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK;wBACL,OAAO;wBACP,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,kBAAkB;wBACtC,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,sDAAsD;YACtD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACpC,iBAAiB;gBACjB,MAAM,WAAW,GAAG,GAAG,WAAW,6BAA6B,IAAI,CAAC,QAAQ,CAAC,QAAQ,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,GAAG;oBACjH,WAAW,WAAW,CAAC,IAAI,IAAI,WAAW,CAAC,EAAE,iBAAiB;oBAC9D,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC;gBAEhD,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,WAAW,EAAE,MAAM,CAAC,EAAE,CAAC;oBAC1F,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,WAAW,EAAE,CAAC,CAAC;gBACpE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,WAAW,CAAC,CAAC;oBAC7B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,WAAW,EAAE,CAAC,CAAC;oBAE1D,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK,EAAE,KAAK;wBACZ,KAAK,EAAE,aAAa;wBACpB,OAAO,EAAE,WAAW;wBACpB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,OAAO;wBAC3B,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;YAEhE,qDAAqD;YACrD,MAAM,IAAI,CAAC,aAAa,EAAE,CAAC;YAE3B,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,SAAkB,KAAK;QAChE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAChD,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,cAAc,GAAG,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACzD,MAAM,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACpD,MAAM,KAAK,GAAG,KAAK,CAAC;QACpB,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,IAAI,YAAY,CAAC;QAE/C,IAAI,CAAC;YACH,kGAAkG;YAClG,IAAI,cAAc,CAAC,iBAAiB,IAAI,cAAc,CAAC,kBAAkB,EAAE,CAAC;gBAC1E,MAAM,eAAe,GAAG,GAAG,WAAW,OAAO,KAAK,6CAA6C;oBAC7F,aAAa,cAAc,CAAC,kBAAkB,GAAG;oBACjD,yBAAyB,IAAI,CAAC,OAAO,qBAAqB,CAAC;gBAE7D,+BAA+B;gBAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,eAAe,EAAE,MAAM,CAAC,EAAE,CAAC;oBAC9F,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,eAAe,EAAE,CAAC,CAAC;gBACxE,CAAC;qBAAM,CAAC;oBACN,MAAM,SAAS,CAAC,eAAe,CAAC,CAAC;oBACjC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,wCAAwC,eAAe,EAAE,CAAC,CAAC;oBAE5E,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,KAAK;wBACL,KAAK,EAAE,QAAQ;wBACf,OAAO,EAAE,eAAe;wBACxB,GAAG,EAAE,GAAG,IAAI,CAAC,OAAO,oBAAoB;wBACxC,KAAK,EAAE,IAAI;qBACZ,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8CAA8C,GAAG,EAAE,CAAC,CAAC;YACvE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,aAAa;QACzB,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,kCAAkC;oBAClC,MAAM,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACvD,MAAM,SAAS,CAAC,aAAa,CAAC,CAAC;oBAC/B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,qBAAqB,aAAa,EAAE,CAAC,CAAC;oBAEvD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;gBACrB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,EAAE,CAAC,CAAC;gBACxD,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,mCAAmC;QACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YAClC,MAAM,aAAa,CAAC,UAAU,EAAE,CAAC;QACnC,CAAC;QAED,iCAAiC;QACjC,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;YACxD,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,sBAAsB;YACtB,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,qBAAqB,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;gBAChE,IAAI,CAAC,qBAAqB,EAAE,CAAC;oBAC3B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,+DAA+D,CAAC,CAAC;gBACpF,CAAC;YACH,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,MAAM,IAAI,CAAC,iBAAiB,EAAE,CAAC;QAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;QACrC,CAAC;QAED,6CAA6C;QAC7C,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAC/C,MAAM,oBAAoB,GAAG,MAAM,IAAI,CAAC,4BAA4B,EAAE,CAAC;YACvE,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC1B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,CAAC,CAAC;YAChE,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,IAAI,CAAC,4BAA4B,CAAC,IAAI,CAAC,CAAC;YAChD,CAAC;QACH,CAAC;QAED,gCAAgC;QAChC,MAAM,cAAc,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACtE,MAAM,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAElE,+DAA+D;QAC/D,IAAI,cAAc,CAAC,MAAM,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC;YAClD,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC9B,uDAAuD;gBACvD,KAAK,MAAM,SAAS,IAAI,cAAc,EAAE,CAAC;oBACvC,MAAM,IAAI,CAAC,qBAAqB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC;oBAE7D,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;oBACrE,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CAAC,4GAA4G,CAAC,CAAC;YAChI,CAAC;QACH,CAAC;aAAM,CAAC;YACN,wDAAwD;YACxD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC/C,MAAM,IAAI,CAAC,qBAAqB,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC;gBAErE,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;gBAC7E,CAAC;YACH,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC;QACzC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,kCAAkC;oBAClC,MAAM,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACvD,MAAM,SAAS,CAAC,aAAa,CAAC,CAAC;oBAC/B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,aAAa,EAAE,CAAC,CAAC;oBAEnD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;gBACrB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,0BAA0B,GAAG,EAAE,CAAC,CAAC;gBACrD,CAAC;YACH,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,IAAI,CAAC;gBACH,wBAAwB;gBACxB,MAAM,SAAS,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAC1D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAE9D,iBAAiB;gBACjB,MAAM,SAAS,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAC1D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAE9D,2BAA2B;gBAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC9B,IAAI,CAAC;wBACH,MAAM,SAAS,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;wBAC3D,MAAM,SAAS,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;wBAC3D,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;oBACrE,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;oBAClE,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,EAAE,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IAClB,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,kCAAkC;oBAClC,MAAM,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACvD,QAAQ,CAAC,aAAa,CAAC,CAAC;oBACxB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,aAAa,EAAE,CAAC,CAAC;oBAEnD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;gBACrB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,0BAA0B,GAAG,EAAE,CAAC,CAAC;gBACrD,CAAC;YACH,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,IAAI,CAAC;gBACH,wBAAwB;gBACxB,QAAQ,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAEnD,iBAAiB;gBACjB,QAAQ,CAAC,sBAAsB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBACnD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;gBAE9D,2BAA2B;gBAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC9B,IAAI,CAAC;wBACH,QAAQ,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;wBACpD,QAAQ,CAAC,uBAAuB,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;oBACtD,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,iCAAiC;oBACnC,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,EAAE,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IAClB,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,UAAU;QAC5B,MAAM,aAAa,CAAC,kBAAkB,EAAE,CAAC;QAEzC,wBAAwB;QACxB,MAAM,aAAa,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;IAC/C,CAAC;IAED;;OAEG;IACK,MAAM,CAAC,KAAK,CAAC,kBAAkB,CAAC,SAAkB,KAAK;QAC7D,MAAM,WAAW,GAAG,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC;QAEtD,IAAI,CAAC;YACH,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,SAAS,CAAC,GAAG,WAAW,cAAc,CAAC,CAAC;YACjE,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YACjC,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAC,CAAC;YAEzE,2CAA2C;YAC3C,MAAM,YAAY,GAAG,IAAI,GAAG,EAAU,CAAC;YACvC,MAAM,SAAS,GAAa,EAAE,CAAC;YAE/B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC;oBACxC,oCAAoC;oBACpC,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBAC7C,IAAI,KAAK,IAAI,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC,EAAE,CAAC;wBACnD,YAAY,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;wBAC3B,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACvB,CAAC;gBACH,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;gBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;oBACjC,wDAAwD;oBACxD,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;oBAClD,IAAI,CAAC;wBACH,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;wBACrB,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;oBACvD,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,KAAK,CAAC,wCAAwC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;oBACpE,CAAC;gBACH,CAAC;YACH,CAAC;YAED,8BAA8B;YAC9B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC,CAAC,qCAAqC;oBAC/E,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;oBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;wBACjC,wDAAwD;wBACxD,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;wBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;wBAClD,IAAI,CAAC;4BACH,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;4BACrB,OAAO,CAAC,GAAG,CAAC,6BAA6B,GAAG,EAAE,CAAC,CAAC;wBAClD,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,KAAK,CAAC,mCAAmC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;wBAC/D,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iCAAiC;YACjC,KAAK,MAAM,KAAK,IAAI,YAAY,EAAE,CAAC;gBACjC,IAAI,CAAC;oBACH,kBAAkB;oBAClB,MAAM,SAAS,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBACrD,OAAO,CAAC,GAAG,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBAE9C,mBAAmB;oBACnB,MAAM,SAAS,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBACrD,OAAO,CAAC,GAAG,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;gBAChD,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,KAAK,CAAC,iCAAiC,KAAK,GAAG,EAAE,GAAG,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,iBAAiB,WAAW,UAAU,GAAG,EAAE,CAAC,CAAC;QAC7D,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc;QAC1B,aAAa,CAAC,sBAAsB,EAAE,CAAC;QAEvC,wBAAwB;QACxB,aAAa,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;IAC7C,CAAC;IAED;;OAEG;IACK,MAAM,CAAC,sBAAsB,CAAC,SAAkB,KAAK;QAC3D,MAAM,WAAW,GAAG,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,UAAU,CAAC;QAEtD,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,QAAQ,CAAC,GAAG,WAAW,cAAc,CAAC,CAAC,QAAQ,EAAE,CAAC;YACjE,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YACjC,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,CAAC,CAAC;YAEzE,2CAA2C;YAC3C,MAAM,YAAY,GAAG,IAAI,GAAG,EAAU,CAAC;YACvC,MAAM,SAAS,GAAa,EAAE,CAAC;YAE/B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC;oBACxC,oCAAoC;oBACpC,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBAC7C,IAAI,KAAK,IAAI,KAAK,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC,EAAE,CAAC;wBACnD,YAAY,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;wBAC3B,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACvB,CAAC;gBACH,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;gBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;oBACjC,wDAAwD;oBACxD,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;oBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;oBAClD,IAAI,CAAC;wBACH,QAAQ,CAAC,GAAG,CAAC,CAAC;wBACd,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;oBACvD,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,KAAK,CAAC,wCAAwC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;oBACpE,CAAC;gBACH,CAAC;YACH,CAAC;YAED,8BAA8B;YAC9B,KAAK,MAAM,IAAI,IAAI,UAAU,EAAE,CAAC;gBAC9B,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC,CAAC,qCAAqC;oBAC/E,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;oBAChC,IAAI,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;wBACjC,MAAM,UAAU,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;wBACnD,MAAM,GAAG,GAAG,GAAG,WAAW,WAAW,UAAU,EAAE,CAAC;wBAClD,IAAI,CAAC;4BACH,QAAQ,CAAC,GAAG,CAAC,CAAC;4BACd,OAAO,CAAC,GAAG,CAAC,6BAA6B,GAAG,EAAE,CAAC,CAAC;wBAClD,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,KAAK,CAAC,mCAAmC,GAAG,EAAE,EAAE,GAAG,CAAC,CAAC;wBAC/D,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iCAAiC;YACjC,KAAK,MAAM,KAAK,IAAI,YAAY,EAAE,CAAC;gBACjC,IAAI,CAAC;oBACH,kBAAkB;oBAClB,QAAQ,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBAE9C,mBAAmB;oBACnB,QAAQ,CAAC,GAAG,WAAW,cAAc,KAAK,EAAE,CAAC,CAAC;oBAC9C,OAAO,CAAC,GAAG,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;gBAChD,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,KAAK,CAAC,iCAAiC,KAAK,GAAG,EAAE,GAAG,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,iBAAiB,WAAW,UAAU,GAAG,EAAE,CAAC,CAAC;QAC7D,CAAC;IACH,CAAC;IAED;;OAEG;IACK,GAAG,CAAC,KAAgC,EAAE,OAAe;QAC3D,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YACrD,OAAO;QACT,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAE3C,QAAQ,KAAK,EAAE,CAAC;YACd,KAAK,MAAM;gBACT,OAAO,CAAC,GAAG,CAAC,IAAI,SAAS,YAAY,OAAO,EAAE,CAAC,CAAC;gBAChD,MAAM;YACR,KAAK,MAAM;gBACT,OAAO,CAAC,IAAI,CAAC,IAAI,SAAS,YAAY,OAAO,EAAE,CAAC,CAAC;gBACjD,MAAM;YACR,KAAK,OAAO;gBACV,OAAO,CAAC,KAAK,CAAC,IAAI,SAAS,aAAa,OAAO,EAAE,CAAC,CAAC;gBACnD,MAAM;QACV,CAAC;IACH,CAAC;CACF"}