@push.rocks/smartproxy 19.3.2 → 19.3.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +18 -35
- package/readme.plan.md +173 -271
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,1802 +0,0 @@
|
|
|
1
|
-
import * as plugins from './plugins.js';
|
|
2
|
-
import { NetworkProxy } from './classes.networkproxy.js';
|
|
3
|
-
import { SniHandler } from './classes.snihandler.js';
|
|
4
|
-
// SNI functions are now imported from SniHandler class
|
|
5
|
-
// No need for wrapper functions
|
|
6
|
-
// Helper: Check if a port falls within any of the given port ranges
|
|
7
|
-
const isPortInRanges = (port, ranges) => {
|
|
8
|
-
return ranges.some((range) => port >= range.from && port <= range.to);
|
|
9
|
-
};
|
|
10
|
-
// Helper: Check if a given IP matches any of the glob patterns
|
|
11
|
-
const isAllowed = (ip, patterns) => {
|
|
12
|
-
if (!ip || !patterns || patterns.length === 0)
|
|
13
|
-
return false;
|
|
14
|
-
const normalizeIP = (ip) => {
|
|
15
|
-
if (!ip)
|
|
16
|
-
return [];
|
|
17
|
-
if (ip.startsWith('::ffff:')) {
|
|
18
|
-
const ipv4 = ip.slice(7);
|
|
19
|
-
return [ip, ipv4];
|
|
20
|
-
}
|
|
21
|
-
if (/^\d{1,3}(\.\d{1,3}){3}$/.test(ip)) {
|
|
22
|
-
return [ip, `::ffff:${ip}`];
|
|
23
|
-
}
|
|
24
|
-
return [ip];
|
|
25
|
-
};
|
|
26
|
-
const normalizedIPVariants = normalizeIP(ip);
|
|
27
|
-
if (normalizedIPVariants.length === 0)
|
|
28
|
-
return false;
|
|
29
|
-
const expandedPatterns = patterns.flatMap(normalizeIP);
|
|
30
|
-
return normalizedIPVariants.some((ipVariant) => expandedPatterns.some((pattern) => plugins.minimatch(ipVariant, pattern)));
|
|
31
|
-
};
|
|
32
|
-
// Helper: Check if an IP is allowed considering allowed and blocked glob patterns
|
|
33
|
-
const isGlobIPAllowed = (ip, allowed, blocked = []) => {
|
|
34
|
-
if (!ip)
|
|
35
|
-
return false;
|
|
36
|
-
if (blocked.length > 0 && isAllowed(ip, blocked))
|
|
37
|
-
return false;
|
|
38
|
-
return isAllowed(ip, allowed);
|
|
39
|
-
};
|
|
40
|
-
// Helper: Generate a unique connection ID
|
|
41
|
-
const generateConnectionId = () => {
|
|
42
|
-
return Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15);
|
|
43
|
-
};
|
|
44
|
-
// SNI functions are now imported from SniHandler class
|
|
45
|
-
// Helper: Ensure timeout values don't exceed Node.js max safe integer
|
|
46
|
-
const ensureSafeTimeout = (timeout) => {
|
|
47
|
-
const MAX_SAFE_TIMEOUT = 2147483647; // Maximum safe value (2^31 - 1)
|
|
48
|
-
return Math.min(Math.floor(timeout), MAX_SAFE_TIMEOUT);
|
|
49
|
-
};
|
|
50
|
-
// Helper: Generate a slightly randomized timeout to prevent thundering herd
|
|
51
|
-
const randomizeTimeout = (baseTimeout, variationPercent = 5) => {
|
|
52
|
-
const safeBaseTimeout = ensureSafeTimeout(baseTimeout);
|
|
53
|
-
const variation = safeBaseTimeout * (variationPercent / 100);
|
|
54
|
-
return ensureSafeTimeout(safeBaseTimeout + Math.floor(Math.random() * variation * 2) - variation);
|
|
55
|
-
};
|
|
56
|
-
export class PortProxy {
|
|
57
|
-
constructor(settingsArg) {
|
|
58
|
-
this.netServers = [];
|
|
59
|
-
this.connectionRecords = new Map();
|
|
60
|
-
this.connectionLogger = null;
|
|
61
|
-
this.isShuttingDown = false;
|
|
62
|
-
// Map to track round robin indices for each domain config
|
|
63
|
-
this.domainTargetIndices = new Map();
|
|
64
|
-
// Enhanced stats tracking
|
|
65
|
-
this.terminationStats = {
|
|
66
|
-
incoming: {},
|
|
67
|
-
outgoing: {},
|
|
68
|
-
};
|
|
69
|
-
// Connection tracking by IP for rate limiting
|
|
70
|
-
this.connectionsByIP = new Map();
|
|
71
|
-
this.connectionRateByIP = new Map();
|
|
72
|
-
// NetworkProxy instance for TLS termination
|
|
73
|
-
this.networkProxy = null;
|
|
74
|
-
// Set reasonable defaults for all settings
|
|
75
|
-
this.settings = {
|
|
76
|
-
...settingsArg,
|
|
77
|
-
targetIP: settingsArg.targetIP || 'localhost',
|
|
78
|
-
// Timeout settings with reasonable defaults
|
|
79
|
-
initialDataTimeout: settingsArg.initialDataTimeout || 120000, // 120 seconds for initial handshake
|
|
80
|
-
socketTimeout: ensureSafeTimeout(settingsArg.socketTimeout || 3600000), // 1 hour socket timeout
|
|
81
|
-
inactivityCheckInterval: settingsArg.inactivityCheckInterval || 60000, // 60 seconds interval
|
|
82
|
-
maxConnectionLifetime: ensureSafeTimeout(settingsArg.maxConnectionLifetime || 86400000), // 24 hours default
|
|
83
|
-
inactivityTimeout: ensureSafeTimeout(settingsArg.inactivityTimeout || 14400000), // 4 hours inactivity timeout
|
|
84
|
-
gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000, // 30 seconds
|
|
85
|
-
// Socket optimization settings
|
|
86
|
-
noDelay: settingsArg.noDelay !== undefined ? settingsArg.noDelay : true,
|
|
87
|
-
keepAlive: settingsArg.keepAlive !== undefined ? settingsArg.keepAlive : true,
|
|
88
|
-
keepAliveInitialDelay: settingsArg.keepAliveInitialDelay || 10000, // 10 seconds
|
|
89
|
-
maxPendingDataSize: settingsArg.maxPendingDataSize || 10 * 1024 * 1024, // 10MB
|
|
90
|
-
// Feature flags
|
|
91
|
-
disableInactivityCheck: settingsArg.disableInactivityCheck || false,
|
|
92
|
-
enableKeepAliveProbes: settingsArg.enableKeepAliveProbes !== undefined ? settingsArg.enableKeepAliveProbes : true,
|
|
93
|
-
enableDetailedLogging: settingsArg.enableDetailedLogging || false,
|
|
94
|
-
enableTlsDebugLogging: settingsArg.enableTlsDebugLogging || false,
|
|
95
|
-
enableRandomizedTimeouts: settingsArg.enableRandomizedTimeouts || false,
|
|
96
|
-
allowSessionTicket: settingsArg.allowSessionTicket !== undefined ? settingsArg.allowSessionTicket : true,
|
|
97
|
-
// Rate limiting defaults
|
|
98
|
-
maxConnectionsPerIP: settingsArg.maxConnectionsPerIP || 100,
|
|
99
|
-
connectionRateLimitPerMinute: settingsArg.connectionRateLimitPerMinute || 300,
|
|
100
|
-
// Enhanced keep-alive settings
|
|
101
|
-
keepAliveTreatment: settingsArg.keepAliveTreatment || 'extended',
|
|
102
|
-
keepAliveInactivityMultiplier: settingsArg.keepAliveInactivityMultiplier || 6,
|
|
103
|
-
extendedKeepAliveLifetime: settingsArg.extendedKeepAliveLifetime || 7 * 24 * 60 * 60 * 1000, // 7 days
|
|
104
|
-
// NetworkProxy settings
|
|
105
|
-
networkProxyPort: settingsArg.networkProxyPort || 8443, // Default NetworkProxy port
|
|
106
|
-
// ACME certificate settings with reasonable defaults
|
|
107
|
-
acme: settingsArg.acme || {
|
|
108
|
-
enabled: false,
|
|
109
|
-
port: 80,
|
|
110
|
-
contactEmail: 'admin@example.com',
|
|
111
|
-
useProduction: false,
|
|
112
|
-
renewThresholdDays: 30,
|
|
113
|
-
autoRenew: true,
|
|
114
|
-
certificateStore: './certs',
|
|
115
|
-
skipConfiguredCerts: false,
|
|
116
|
-
},
|
|
117
|
-
};
|
|
118
|
-
// Initialize NetworkProxy if enabled
|
|
119
|
-
if (this.settings.useNetworkProxy && this.settings.useNetworkProxy.length > 0) {
|
|
120
|
-
this.initializeNetworkProxy();
|
|
121
|
-
}
|
|
122
|
-
}
|
|
123
|
-
/**
|
|
124
|
-
* Initialize NetworkProxy instance
|
|
125
|
-
*/
|
|
126
|
-
async initializeNetworkProxy() {
|
|
127
|
-
if (!this.networkProxy) {
|
|
128
|
-
// Configure NetworkProxy options based on PortProxy settings
|
|
129
|
-
const networkProxyOptions = {
|
|
130
|
-
port: this.settings.networkProxyPort,
|
|
131
|
-
portProxyIntegration: true,
|
|
132
|
-
logLevel: this.settings.enableDetailedLogging ? 'debug' : 'info',
|
|
133
|
-
};
|
|
134
|
-
// Add ACME settings if configured
|
|
135
|
-
if (this.settings.acme) {
|
|
136
|
-
networkProxyOptions.acme = { ...this.settings.acme };
|
|
137
|
-
}
|
|
138
|
-
this.networkProxy = new NetworkProxy(networkProxyOptions);
|
|
139
|
-
console.log(`Initialized NetworkProxy on port ${this.settings.networkProxyPort}`);
|
|
140
|
-
// Convert and apply domain configurations to NetworkProxy
|
|
141
|
-
await this.syncDomainConfigsToNetworkProxy();
|
|
142
|
-
}
|
|
143
|
-
}
|
|
144
|
-
/**
|
|
145
|
-
* Updates the domain configurations for the proxy
|
|
146
|
-
* @param newDomainConfigs The new domain configurations
|
|
147
|
-
*/
|
|
148
|
-
async updateDomainConfigs(newDomainConfigs) {
|
|
149
|
-
console.log(`Updating domain configurations (${newDomainConfigs.length} configs)`);
|
|
150
|
-
this.settings.domainConfigs = newDomainConfigs;
|
|
151
|
-
// If NetworkProxy is initialized, resync the configurations
|
|
152
|
-
if (this.networkProxy) {
|
|
153
|
-
await this.syncDomainConfigsToNetworkProxy();
|
|
154
|
-
}
|
|
155
|
-
}
|
|
156
|
-
/**
|
|
157
|
-
* Updates the ACME certificate settings
|
|
158
|
-
* @param acmeSettings New ACME settings
|
|
159
|
-
*/
|
|
160
|
-
async updateAcmeSettings(acmeSettings) {
|
|
161
|
-
console.log('Updating ACME certificate settings');
|
|
162
|
-
// Update settings
|
|
163
|
-
this.settings.acme = {
|
|
164
|
-
...this.settings.acme,
|
|
165
|
-
...acmeSettings,
|
|
166
|
-
};
|
|
167
|
-
// If NetworkProxy is initialized, update its ACME settings
|
|
168
|
-
if (this.networkProxy) {
|
|
169
|
-
try {
|
|
170
|
-
// Recreate NetworkProxy with new settings if ACME enabled state has changed
|
|
171
|
-
if (this.settings.acme.enabled !== acmeSettings.enabled) {
|
|
172
|
-
console.log(`ACME enabled state changed to: ${acmeSettings.enabled}`);
|
|
173
|
-
// Stop the current NetworkProxy
|
|
174
|
-
await this.networkProxy.stop();
|
|
175
|
-
this.networkProxy = null;
|
|
176
|
-
// Reinitialize with new settings
|
|
177
|
-
await this.initializeNetworkProxy();
|
|
178
|
-
// Use start() to make sure ACME gets initialized if newly enabled
|
|
179
|
-
await this.networkProxy.start();
|
|
180
|
-
}
|
|
181
|
-
else {
|
|
182
|
-
// Update existing NetworkProxy with new settings
|
|
183
|
-
// Note: Some settings may require a restart to take effect
|
|
184
|
-
console.log('Updating ACME settings in NetworkProxy');
|
|
185
|
-
// For certificate renewals, we might want to trigger checks with the new settings
|
|
186
|
-
if (acmeSettings.renewThresholdDays) {
|
|
187
|
-
console.log(`Setting new renewal threshold to ${acmeSettings.renewThresholdDays} days`);
|
|
188
|
-
// This is implementation-dependent but gives an example
|
|
189
|
-
if (this.networkProxy.options.acme) {
|
|
190
|
-
this.networkProxy.options.acme.renewThresholdDays = acmeSettings.renewThresholdDays;
|
|
191
|
-
}
|
|
192
|
-
}
|
|
193
|
-
}
|
|
194
|
-
}
|
|
195
|
-
catch (err) {
|
|
196
|
-
console.log(`Error updating ACME settings: ${err}`);
|
|
197
|
-
}
|
|
198
|
-
}
|
|
199
|
-
}
|
|
200
|
-
/**
|
|
201
|
-
* Synchronizes PortProxy domain configurations to NetworkProxy
|
|
202
|
-
* This allows domains configured in PortProxy to be used by NetworkProxy
|
|
203
|
-
*/
|
|
204
|
-
async syncDomainConfigsToNetworkProxy() {
|
|
205
|
-
if (!this.networkProxy) {
|
|
206
|
-
console.log('Cannot sync configurations - NetworkProxy not initialized');
|
|
207
|
-
return;
|
|
208
|
-
}
|
|
209
|
-
try {
|
|
210
|
-
// Get SSL certificates from assets
|
|
211
|
-
// Import fs directly since it's not in plugins
|
|
212
|
-
const fs = await import('fs');
|
|
213
|
-
let certPair;
|
|
214
|
-
try {
|
|
215
|
-
certPair = {
|
|
216
|
-
key: fs.readFileSync('assets/certs/key.pem', 'utf8'),
|
|
217
|
-
cert: fs.readFileSync('assets/certs/cert.pem', 'utf8'),
|
|
218
|
-
};
|
|
219
|
-
}
|
|
220
|
-
catch (certError) {
|
|
221
|
-
console.log(`Warning: Could not read default certificates: ${certError}`);
|
|
222
|
-
console.log('Using empty certificate placeholders - ACME will generate proper certificates if enabled');
|
|
223
|
-
// Use empty placeholders - NetworkProxy will use its internal defaults
|
|
224
|
-
// or ACME will generate proper ones if enabled
|
|
225
|
-
certPair = {
|
|
226
|
-
key: '',
|
|
227
|
-
cert: '',
|
|
228
|
-
};
|
|
229
|
-
}
|
|
230
|
-
// Convert domain configs to NetworkProxy configs
|
|
231
|
-
const proxyConfigs = this.networkProxy.convertPortProxyConfigs(this.settings.domainConfigs, certPair);
|
|
232
|
-
// Log ACME-eligible domains if ACME is enabled
|
|
233
|
-
if (this.settings.acme?.enabled) {
|
|
234
|
-
const acmeEligibleDomains = proxyConfigs
|
|
235
|
-
.filter((config) => !config.hostName.includes('*')) // Exclude wildcards
|
|
236
|
-
.map((config) => config.hostName);
|
|
237
|
-
if (acmeEligibleDomains.length > 0) {
|
|
238
|
-
console.log(`Domains eligible for ACME certificates: ${acmeEligibleDomains.join(', ')}`);
|
|
239
|
-
}
|
|
240
|
-
else {
|
|
241
|
-
console.log('No domains eligible for ACME certificates found in configuration');
|
|
242
|
-
}
|
|
243
|
-
}
|
|
244
|
-
// Update NetworkProxy with the converted configs
|
|
245
|
-
this.networkProxy
|
|
246
|
-
.updateProxyConfigs(proxyConfigs)
|
|
247
|
-
.then(() => {
|
|
248
|
-
console.log(`Successfully synchronized ${proxyConfigs.length} domain configurations to NetworkProxy`);
|
|
249
|
-
})
|
|
250
|
-
.catch((err) => {
|
|
251
|
-
console.log(`Error synchronizing configurations: ${err.message}`);
|
|
252
|
-
});
|
|
253
|
-
}
|
|
254
|
-
catch (err) {
|
|
255
|
-
console.log(`Failed to sync configurations: ${err}`);
|
|
256
|
-
}
|
|
257
|
-
}
|
|
258
|
-
/**
|
|
259
|
-
* Requests a certificate for a specific domain
|
|
260
|
-
* @param domain The domain to request a certificate for
|
|
261
|
-
* @returns Promise that resolves to true if the request was successful, false otherwise
|
|
262
|
-
*/
|
|
263
|
-
async requestCertificate(domain) {
|
|
264
|
-
if (!this.networkProxy) {
|
|
265
|
-
console.log('Cannot request certificate - NetworkProxy not initialized');
|
|
266
|
-
return false;
|
|
267
|
-
}
|
|
268
|
-
if (!this.settings.acme?.enabled) {
|
|
269
|
-
console.log('Cannot request certificate - ACME is not enabled');
|
|
270
|
-
return false;
|
|
271
|
-
}
|
|
272
|
-
try {
|
|
273
|
-
const result = await this.networkProxy.requestCertificate(domain);
|
|
274
|
-
if (result) {
|
|
275
|
-
console.log(`Certificate request for ${domain} submitted successfully`);
|
|
276
|
-
}
|
|
277
|
-
else {
|
|
278
|
-
console.log(`Certificate request for ${domain} failed`);
|
|
279
|
-
}
|
|
280
|
-
return result;
|
|
281
|
-
}
|
|
282
|
-
catch (err) {
|
|
283
|
-
console.log(`Error requesting certificate: ${err}`);
|
|
284
|
-
return false;
|
|
285
|
-
}
|
|
286
|
-
}
|
|
287
|
-
/**
|
|
288
|
-
* Forwards a TLS connection to a NetworkProxy for handling
|
|
289
|
-
* @param connectionId - Unique connection identifier
|
|
290
|
-
* @param socket - The incoming client socket
|
|
291
|
-
* @param record - The connection record
|
|
292
|
-
* @param initialData - Initial data chunk (TLS ClientHello)
|
|
293
|
-
* @param customProxyPort - Optional custom port for NetworkProxy (for domain-specific settings)
|
|
294
|
-
*/
|
|
295
|
-
forwardToNetworkProxy(connectionId, socket, record, initialData, customProxyPort) {
|
|
296
|
-
// Ensure NetworkProxy is initialized
|
|
297
|
-
if (!this.networkProxy) {
|
|
298
|
-
console.log(`[${connectionId}] NetworkProxy not initialized. Using fallback direct connection.`);
|
|
299
|
-
// Fall back to direct connection
|
|
300
|
-
return this.setupDirectConnection(connectionId, socket, record, undefined, undefined, initialData);
|
|
301
|
-
}
|
|
302
|
-
// Use the custom port if provided, otherwise use the default NetworkProxy port
|
|
303
|
-
const proxyPort = customProxyPort || this.networkProxy.getListeningPort();
|
|
304
|
-
const proxyHost = 'localhost'; // Assuming NetworkProxy runs locally
|
|
305
|
-
if (this.settings.enableDetailedLogging) {
|
|
306
|
-
console.log(`[${connectionId}] Forwarding TLS connection to NetworkProxy at ${proxyHost}:${proxyPort}`);
|
|
307
|
-
}
|
|
308
|
-
// Create a connection to the NetworkProxy
|
|
309
|
-
const proxySocket = plugins.net.connect({
|
|
310
|
-
host: proxyHost,
|
|
311
|
-
port: proxyPort,
|
|
312
|
-
});
|
|
313
|
-
// Store the outgoing socket in the record
|
|
314
|
-
record.outgoing = proxySocket;
|
|
315
|
-
record.outgoingStartTime = Date.now();
|
|
316
|
-
record.usingNetworkProxy = true;
|
|
317
|
-
// Set up error handlers
|
|
318
|
-
proxySocket.on('error', (err) => {
|
|
319
|
-
console.log(`[${connectionId}] Error connecting to NetworkProxy: ${err.message}`);
|
|
320
|
-
this.cleanupConnection(record, 'network_proxy_connect_error');
|
|
321
|
-
});
|
|
322
|
-
// Handle connection to NetworkProxy
|
|
323
|
-
proxySocket.on('connect', () => {
|
|
324
|
-
if (this.settings.enableDetailedLogging) {
|
|
325
|
-
console.log(`[${connectionId}] Connected to NetworkProxy at ${proxyHost}:${proxyPort}`);
|
|
326
|
-
}
|
|
327
|
-
// First send the initial data that contains the TLS ClientHello
|
|
328
|
-
proxySocket.write(initialData);
|
|
329
|
-
// Now set up bidirectional piping between client and NetworkProxy
|
|
330
|
-
socket.pipe(proxySocket);
|
|
331
|
-
proxySocket.pipe(socket);
|
|
332
|
-
// Setup cleanup handlers
|
|
333
|
-
proxySocket.on('close', () => {
|
|
334
|
-
if (this.settings.enableDetailedLogging) {
|
|
335
|
-
console.log(`[${connectionId}] NetworkProxy connection closed`);
|
|
336
|
-
}
|
|
337
|
-
this.cleanupConnection(record, 'network_proxy_closed');
|
|
338
|
-
});
|
|
339
|
-
socket.on('close', () => {
|
|
340
|
-
if (this.settings.enableDetailedLogging) {
|
|
341
|
-
console.log(`[${connectionId}] Client connection closed after forwarding to NetworkProxy`);
|
|
342
|
-
}
|
|
343
|
-
this.cleanupConnection(record, 'client_closed');
|
|
344
|
-
});
|
|
345
|
-
// Update activity on data transfer
|
|
346
|
-
socket.on('data', () => this.updateActivity(record));
|
|
347
|
-
proxySocket.on('data', () => this.updateActivity(record));
|
|
348
|
-
if (this.settings.enableDetailedLogging) {
|
|
349
|
-
console.log(`[${connectionId}] TLS connection successfully forwarded to NetworkProxy`);
|
|
350
|
-
}
|
|
351
|
-
});
|
|
352
|
-
}
|
|
353
|
-
/**
|
|
354
|
-
* Sets up a direct connection to the target (original behavior)
|
|
355
|
-
* This is used when NetworkProxy isn't configured or as a fallback
|
|
356
|
-
*/
|
|
357
|
-
setupDirectConnection(connectionId, socket, record, domainConfig, serverName, initialChunk, overridePort) {
|
|
358
|
-
// Existing connection setup logic
|
|
359
|
-
const targetHost = domainConfig ? this.getTargetIP(domainConfig) : this.settings.targetIP;
|
|
360
|
-
const connectionOptions = {
|
|
361
|
-
host: targetHost,
|
|
362
|
-
port: overridePort !== undefined ? overridePort : this.settings.toPort,
|
|
363
|
-
};
|
|
364
|
-
if (this.settings.preserveSourceIP) {
|
|
365
|
-
connectionOptions.localAddress = record.remoteIP.replace('::ffff:', '');
|
|
366
|
-
}
|
|
367
|
-
// Create a safe queue for incoming data using a Buffer array
|
|
368
|
-
// We'll use this to ensure we don't lose data during handler transitions
|
|
369
|
-
const dataQueue = [];
|
|
370
|
-
let queueSize = 0;
|
|
371
|
-
let processingQueue = false;
|
|
372
|
-
let drainPending = false;
|
|
373
|
-
// Flag to track if we've switched to the final piping mechanism
|
|
374
|
-
// Once this is true, we no longer buffer data in dataQueue
|
|
375
|
-
let pipingEstablished = false;
|
|
376
|
-
// Pause the incoming socket to prevent buffer overflows
|
|
377
|
-
// This ensures we control the flow of data until piping is set up
|
|
378
|
-
socket.pause();
|
|
379
|
-
// Function to safely process the data queue without losing events
|
|
380
|
-
const processDataQueue = () => {
|
|
381
|
-
if (processingQueue || dataQueue.length === 0 || pipingEstablished)
|
|
382
|
-
return;
|
|
383
|
-
processingQueue = true;
|
|
384
|
-
try {
|
|
385
|
-
// Process all queued chunks with the current active handler
|
|
386
|
-
while (dataQueue.length > 0) {
|
|
387
|
-
const chunk = dataQueue.shift();
|
|
388
|
-
queueSize -= chunk.length;
|
|
389
|
-
// Once piping is established, we shouldn't get here,
|
|
390
|
-
// but just in case, pass to the outgoing socket directly
|
|
391
|
-
if (pipingEstablished && record.outgoing) {
|
|
392
|
-
record.outgoing.write(chunk);
|
|
393
|
-
continue;
|
|
394
|
-
}
|
|
395
|
-
// Track bytes received
|
|
396
|
-
record.bytesReceived += chunk.length;
|
|
397
|
-
// Check for TLS handshake
|
|
398
|
-
if (!record.isTLS && SniHandler.isTlsHandshake(chunk)) {
|
|
399
|
-
record.isTLS = true;
|
|
400
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
401
|
-
console.log(`[${connectionId}] TLS handshake detected in tempDataHandler, ${chunk.length} bytes`);
|
|
402
|
-
}
|
|
403
|
-
}
|
|
404
|
-
// Check if adding this chunk would exceed the buffer limit
|
|
405
|
-
const newSize = record.pendingDataSize + chunk.length;
|
|
406
|
-
if (this.settings.maxPendingDataSize && newSize > this.settings.maxPendingDataSize) {
|
|
407
|
-
console.log(`[${connectionId}] Buffer limit exceeded for connection from ${record.remoteIP}: ${newSize} bytes > ${this.settings.maxPendingDataSize} bytes`);
|
|
408
|
-
socket.end(); // Gracefully close the socket
|
|
409
|
-
this.initiateCleanupOnce(record, 'buffer_limit_exceeded');
|
|
410
|
-
return;
|
|
411
|
-
}
|
|
412
|
-
// Buffer the chunk and update the size counter
|
|
413
|
-
record.pendingData.push(Buffer.from(chunk));
|
|
414
|
-
record.pendingDataSize = newSize;
|
|
415
|
-
this.updateActivity(record);
|
|
416
|
-
}
|
|
417
|
-
}
|
|
418
|
-
finally {
|
|
419
|
-
processingQueue = false;
|
|
420
|
-
// If there's a pending drain and we've processed everything,
|
|
421
|
-
// signal we're ready for more data if we haven't established piping yet
|
|
422
|
-
if (drainPending && dataQueue.length === 0 && !pipingEstablished) {
|
|
423
|
-
drainPending = false;
|
|
424
|
-
socket.resume();
|
|
425
|
-
}
|
|
426
|
-
}
|
|
427
|
-
};
|
|
428
|
-
// Unified data handler that safely queues incoming data
|
|
429
|
-
const safeDataHandler = (chunk) => {
|
|
430
|
-
// If piping is already established, just let the pipe handle it
|
|
431
|
-
if (pipingEstablished)
|
|
432
|
-
return;
|
|
433
|
-
// Add to our queue for orderly processing
|
|
434
|
-
dataQueue.push(Buffer.from(chunk)); // Make a copy to be safe
|
|
435
|
-
queueSize += chunk.length;
|
|
436
|
-
// If queue is getting large, pause socket until we catch up
|
|
437
|
-
if (this.settings.maxPendingDataSize && queueSize > this.settings.maxPendingDataSize * 0.8) {
|
|
438
|
-
socket.pause();
|
|
439
|
-
drainPending = true;
|
|
440
|
-
}
|
|
441
|
-
// Process the queue
|
|
442
|
-
processDataQueue();
|
|
443
|
-
};
|
|
444
|
-
// Add our safe data handler
|
|
445
|
-
socket.on('data', safeDataHandler);
|
|
446
|
-
// Add initial chunk to pending data if present
|
|
447
|
-
if (initialChunk) {
|
|
448
|
-
record.bytesReceived += initialChunk.length;
|
|
449
|
-
record.pendingData.push(Buffer.from(initialChunk));
|
|
450
|
-
record.pendingDataSize = initialChunk.length;
|
|
451
|
-
}
|
|
452
|
-
// Create the target socket but don't set up piping immediately
|
|
453
|
-
const targetSocket = plugins.net.connect(connectionOptions);
|
|
454
|
-
record.outgoing = targetSocket;
|
|
455
|
-
record.outgoingStartTime = Date.now();
|
|
456
|
-
// Apply socket optimizations
|
|
457
|
-
targetSocket.setNoDelay(this.settings.noDelay);
|
|
458
|
-
// Apply keep-alive settings to the outgoing connection as well
|
|
459
|
-
if (this.settings.keepAlive) {
|
|
460
|
-
targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
|
461
|
-
// Apply enhanced TCP keep-alive options if enabled
|
|
462
|
-
if (this.settings.enableKeepAliveProbes) {
|
|
463
|
-
try {
|
|
464
|
-
if ('setKeepAliveProbes' in targetSocket) {
|
|
465
|
-
targetSocket.setKeepAliveProbes(10);
|
|
466
|
-
}
|
|
467
|
-
if ('setKeepAliveInterval' in targetSocket) {
|
|
468
|
-
targetSocket.setKeepAliveInterval(1000);
|
|
469
|
-
}
|
|
470
|
-
}
|
|
471
|
-
catch (err) {
|
|
472
|
-
// Ignore errors - these are optional enhancements
|
|
473
|
-
if (this.settings.enableDetailedLogging) {
|
|
474
|
-
console.log(`[${connectionId}] Enhanced TCP keep-alive not supported for outgoing socket: ${err}`);
|
|
475
|
-
}
|
|
476
|
-
}
|
|
477
|
-
}
|
|
478
|
-
}
|
|
479
|
-
// Setup specific error handler for connection phase
|
|
480
|
-
targetSocket.once('error', (err) => {
|
|
481
|
-
// This handler runs only once during the initial connection phase
|
|
482
|
-
const code = err.code;
|
|
483
|
-
console.log(`[${connectionId}] Connection setup error to ${targetHost}:${connectionOptions.port}: ${err.message} (${code})`);
|
|
484
|
-
// Resume the incoming socket to prevent it from hanging
|
|
485
|
-
socket.resume();
|
|
486
|
-
if (code === 'ECONNREFUSED') {
|
|
487
|
-
console.log(`[${connectionId}] Target ${targetHost}:${connectionOptions.port} refused connection`);
|
|
488
|
-
}
|
|
489
|
-
else if (code === 'ETIMEDOUT') {
|
|
490
|
-
console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} timed out`);
|
|
491
|
-
}
|
|
492
|
-
else if (code === 'ECONNRESET') {
|
|
493
|
-
console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} was reset`);
|
|
494
|
-
}
|
|
495
|
-
else if (code === 'EHOSTUNREACH') {
|
|
496
|
-
console.log(`[${connectionId}] Host ${targetHost} is unreachable`);
|
|
497
|
-
}
|
|
498
|
-
// Clear any existing error handler after connection phase
|
|
499
|
-
targetSocket.removeAllListeners('error');
|
|
500
|
-
// Re-add the normal error handler for established connections
|
|
501
|
-
targetSocket.on('error', this.handleError('outgoing', record));
|
|
502
|
-
if (record.outgoingTerminationReason === null) {
|
|
503
|
-
record.outgoingTerminationReason = 'connection_failed';
|
|
504
|
-
this.incrementTerminationStat('outgoing', 'connection_failed');
|
|
505
|
-
}
|
|
506
|
-
// Clean up the connection
|
|
507
|
-
this.initiateCleanupOnce(record, `connection_failed_${code}`);
|
|
508
|
-
});
|
|
509
|
-
// Setup close handler
|
|
510
|
-
targetSocket.on('close', this.handleClose('outgoing', record));
|
|
511
|
-
socket.on('close', this.handleClose('incoming', record));
|
|
512
|
-
// Handle timeouts with keep-alive awareness
|
|
513
|
-
socket.on('timeout', () => {
|
|
514
|
-
// For keep-alive connections, just log a warning instead of closing
|
|
515
|
-
if (record.hasKeepAlive) {
|
|
516
|
-
console.log(`[${connectionId}] Timeout event on incoming keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
|
|
517
|
-
// Don't close the connection - just log
|
|
518
|
-
return;
|
|
519
|
-
}
|
|
520
|
-
// For non-keep-alive connections, proceed with normal cleanup
|
|
521
|
-
console.log(`[${connectionId}] Timeout on incoming side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
|
522
|
-
if (record.incomingTerminationReason === null) {
|
|
523
|
-
record.incomingTerminationReason = 'timeout';
|
|
524
|
-
this.incrementTerminationStat('incoming', 'timeout');
|
|
525
|
-
}
|
|
526
|
-
this.initiateCleanupOnce(record, 'timeout_incoming');
|
|
527
|
-
});
|
|
528
|
-
targetSocket.on('timeout', () => {
|
|
529
|
-
// For keep-alive connections, just log a warning instead of closing
|
|
530
|
-
if (record.hasKeepAlive) {
|
|
531
|
-
console.log(`[${connectionId}] Timeout event on outgoing keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
|
|
532
|
-
// Don't close the connection - just log
|
|
533
|
-
return;
|
|
534
|
-
}
|
|
535
|
-
// For non-keep-alive connections, proceed with normal cleanup
|
|
536
|
-
console.log(`[${connectionId}] Timeout on outgoing side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
|
537
|
-
if (record.outgoingTerminationReason === null) {
|
|
538
|
-
record.outgoingTerminationReason = 'timeout';
|
|
539
|
-
this.incrementTerminationStat('outgoing', 'timeout');
|
|
540
|
-
}
|
|
541
|
-
this.initiateCleanupOnce(record, 'timeout_outgoing');
|
|
542
|
-
});
|
|
543
|
-
// Set appropriate timeouts, or disable for immortal keep-alive connections
|
|
544
|
-
if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'immortal') {
|
|
545
|
-
// Disable timeouts completely for immortal connections
|
|
546
|
-
socket.setTimeout(0);
|
|
547
|
-
targetSocket.setTimeout(0);
|
|
548
|
-
if (this.settings.enableDetailedLogging) {
|
|
549
|
-
console.log(`[${connectionId}] Disabled socket timeouts for immortal keep-alive connection`);
|
|
550
|
-
}
|
|
551
|
-
}
|
|
552
|
-
else {
|
|
553
|
-
// Set normal timeouts for other connections
|
|
554
|
-
socket.setTimeout(ensureSafeTimeout(this.settings.socketTimeout || 3600000));
|
|
555
|
-
targetSocket.setTimeout(ensureSafeTimeout(this.settings.socketTimeout || 3600000));
|
|
556
|
-
}
|
|
557
|
-
// Track outgoing data for bytes counting
|
|
558
|
-
targetSocket.on('data', (chunk) => {
|
|
559
|
-
record.bytesSent += chunk.length;
|
|
560
|
-
this.updateActivity(record);
|
|
561
|
-
});
|
|
562
|
-
// Wait for the outgoing connection to be ready before setting up piping
|
|
563
|
-
targetSocket.once('connect', () => {
|
|
564
|
-
// Clear the initial connection error handler
|
|
565
|
-
targetSocket.removeAllListeners('error');
|
|
566
|
-
// Add the normal error handler for established connections
|
|
567
|
-
targetSocket.on('error', this.handleError('outgoing', record));
|
|
568
|
-
// Process any remaining data in the queue before switching to piping
|
|
569
|
-
processDataQueue();
|
|
570
|
-
// Set up piping immediately - don't delay this crucial step
|
|
571
|
-
pipingEstablished = true;
|
|
572
|
-
// Flush all pending data to target
|
|
573
|
-
if (record.pendingData.length > 0) {
|
|
574
|
-
const combinedData = Buffer.concat(record.pendingData);
|
|
575
|
-
if (this.settings.enableDetailedLogging) {
|
|
576
|
-
console.log(`[${connectionId}] Forwarding ${combinedData.length} bytes of initial data to target`);
|
|
577
|
-
}
|
|
578
|
-
// Write pending data immediately
|
|
579
|
-
targetSocket.write(combinedData, (err) => {
|
|
580
|
-
if (err) {
|
|
581
|
-
console.log(`[${connectionId}] Error writing pending data to target: ${err.message}`);
|
|
582
|
-
return this.initiateCleanupOnce(record, 'write_error');
|
|
583
|
-
}
|
|
584
|
-
});
|
|
585
|
-
// Clear the buffer now that we've processed it
|
|
586
|
-
record.pendingData = [];
|
|
587
|
-
record.pendingDataSize = 0;
|
|
588
|
-
}
|
|
589
|
-
// Setup piping in both directions without any delays
|
|
590
|
-
socket.pipe(targetSocket);
|
|
591
|
-
targetSocket.pipe(socket);
|
|
592
|
-
// Resume the socket to ensure data flows - CRITICAL!
|
|
593
|
-
socket.resume();
|
|
594
|
-
// Process any data that might be queued in the interim
|
|
595
|
-
if (dataQueue.length > 0) {
|
|
596
|
-
// Write any remaining queued data directly to the target socket
|
|
597
|
-
for (const chunk of dataQueue) {
|
|
598
|
-
targetSocket.write(chunk);
|
|
599
|
-
}
|
|
600
|
-
// Clear the queue
|
|
601
|
-
dataQueue.length = 0;
|
|
602
|
-
queueSize = 0;
|
|
603
|
-
}
|
|
604
|
-
if (this.settings.enableDetailedLogging) {
|
|
605
|
-
console.log(`[${connectionId}] Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
|
606
|
-
`${serverName
|
|
607
|
-
? ` (SNI: ${serverName})`
|
|
608
|
-
: domainConfig
|
|
609
|
-
? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
|
|
610
|
-
: ''}` +
|
|
611
|
-
` TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}`);
|
|
612
|
-
}
|
|
613
|
-
else {
|
|
614
|
-
console.log(`Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
|
615
|
-
`${serverName
|
|
616
|
-
? ` (SNI: ${serverName})`
|
|
617
|
-
: domainConfig
|
|
618
|
-
? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
|
|
619
|
-
: ''}`);
|
|
620
|
-
}
|
|
621
|
-
// Add the renegotiation handler for SNI validation with strict domain enforcement
|
|
622
|
-
// This will be called after we've established piping
|
|
623
|
-
if (serverName) {
|
|
624
|
-
// Define a handler for checking renegotiation with improved detection
|
|
625
|
-
const renegotiationHandler = (renegChunk) => {
|
|
626
|
-
// Only process if this looks like a TLS ClientHello
|
|
627
|
-
if (SniHandler.isClientHello(renegChunk)) {
|
|
628
|
-
try {
|
|
629
|
-
// Extract SNI from ClientHello
|
|
630
|
-
// Create a connection info object for the existing connection
|
|
631
|
-
const connInfo = {
|
|
632
|
-
sourceIp: record.remoteIP,
|
|
633
|
-
sourcePort: record.incoming.remotePort || 0,
|
|
634
|
-
destIp: record.incoming.localAddress || '',
|
|
635
|
-
destPort: record.incoming.localPort || 0,
|
|
636
|
-
};
|
|
637
|
-
// Check for session tickets if allowSessionTicket is disabled
|
|
638
|
-
if (this.settings.allowSessionTicket === false) {
|
|
639
|
-
// Analyze for session resumption attempt (session ticket or PSK)
|
|
640
|
-
const resumptionInfo = SniHandler.hasSessionResumption(renegChunk, this.settings.enableTlsDebugLogging);
|
|
641
|
-
if (resumptionInfo.isResumption) {
|
|
642
|
-
// Always log resumption attempt for easier debugging
|
|
643
|
-
// Try to extract SNI for logging
|
|
644
|
-
const extractedSNI = SniHandler.extractSNI(renegChunk, this.settings.enableTlsDebugLogging);
|
|
645
|
-
console.log(`[${connectionId}] Session resumption detected in renegotiation. ` +
|
|
646
|
-
`Has SNI: ${resumptionInfo.hasSNI ? 'Yes' : 'No'}, ` +
|
|
647
|
-
`SNI value: ${extractedSNI || 'None'}, ` +
|
|
648
|
-
`allowSessionTicket: ${this.settings.allowSessionTicket}`);
|
|
649
|
-
// Block if there's session resumption without SNI
|
|
650
|
-
if (!resumptionInfo.hasSNI) {
|
|
651
|
-
console.log(`[${connectionId}] Session resumption detected in renegotiation without SNI and allowSessionTicket=false. ` +
|
|
652
|
-
`Terminating connection to force new TLS handshake.`);
|
|
653
|
-
this.initiateCleanupOnce(record, 'session_ticket_blocked');
|
|
654
|
-
return;
|
|
655
|
-
}
|
|
656
|
-
else {
|
|
657
|
-
if (this.settings.enableDetailedLogging) {
|
|
658
|
-
console.log(`[${connectionId}] Session resumption with SNI detected in renegotiation. ` +
|
|
659
|
-
`Allowing connection since SNI is present.`);
|
|
660
|
-
}
|
|
661
|
-
}
|
|
662
|
-
}
|
|
663
|
-
}
|
|
664
|
-
const newSNI = SniHandler.extractSNIWithResumptionSupport(renegChunk, connInfo, this.settings.enableTlsDebugLogging);
|
|
665
|
-
// Skip if no SNI was found
|
|
666
|
-
if (!newSNI)
|
|
667
|
-
return;
|
|
668
|
-
// Handle SNI change during renegotiation - always terminate for domain switches
|
|
669
|
-
if (newSNI !== record.lockedDomain) {
|
|
670
|
-
// Log and terminate the connection for any SNI change
|
|
671
|
-
console.log(`[${connectionId}] Renegotiation with different SNI: ${record.lockedDomain} -> ${newSNI}. ` +
|
|
672
|
-
`Terminating connection - SNI domain switching is not allowed.`);
|
|
673
|
-
this.initiateCleanupOnce(record, 'sni_mismatch');
|
|
674
|
-
}
|
|
675
|
-
else if (this.settings.enableDetailedLogging) {
|
|
676
|
-
console.log(`[${connectionId}] Renegotiation detected with same SNI: ${newSNI}. Allowing.`);
|
|
677
|
-
}
|
|
678
|
-
}
|
|
679
|
-
catch (err) {
|
|
680
|
-
console.log(`[${connectionId}] Error processing ClientHello: ${err}. Allowing connection to continue.`);
|
|
681
|
-
}
|
|
682
|
-
}
|
|
683
|
-
};
|
|
684
|
-
// Store the handler in the connection record so we can remove it during cleanup
|
|
685
|
-
record.renegotiationHandler = renegotiationHandler;
|
|
686
|
-
// The renegotiation handler is added when piping is established
|
|
687
|
-
// Making it part of setupPiping ensures proper sequencing of event handlers
|
|
688
|
-
socket.on('data', renegotiationHandler);
|
|
689
|
-
if (this.settings.enableDetailedLogging) {
|
|
690
|
-
console.log(`[${connectionId}] TLS renegotiation handler installed for SNI domain: ${serverName}`);
|
|
691
|
-
if (this.settings.allowSessionTicket === false) {
|
|
692
|
-
console.log(`[${connectionId}] Session ticket usage is disabled. Connection will be reset on reconnection attempts.`);
|
|
693
|
-
}
|
|
694
|
-
}
|
|
695
|
-
}
|
|
696
|
-
// Set connection timeout with simpler logic
|
|
697
|
-
if (record.cleanupTimer) {
|
|
698
|
-
clearTimeout(record.cleanupTimer);
|
|
699
|
-
}
|
|
700
|
-
// For immortal keep-alive connections, skip setting a timeout completely
|
|
701
|
-
if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'immortal') {
|
|
702
|
-
if (this.settings.enableDetailedLogging) {
|
|
703
|
-
console.log(`[${connectionId}] Keep-alive connection with immortal treatment - no max lifetime`);
|
|
704
|
-
}
|
|
705
|
-
// No cleanup timer for immortal connections
|
|
706
|
-
}
|
|
707
|
-
// For extended keep-alive connections, use extended timeout
|
|
708
|
-
else if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'extended') {
|
|
709
|
-
const extendedTimeout = this.settings.extendedKeepAliveLifetime || 7 * 24 * 60 * 60 * 1000; // 7 days
|
|
710
|
-
const safeTimeout = ensureSafeTimeout(extendedTimeout);
|
|
711
|
-
record.cleanupTimer = setTimeout(() => {
|
|
712
|
-
console.log(`[${connectionId}] Keep-alive connection from ${record.remoteIP} exceeded extended lifetime (${plugins.prettyMs(extendedTimeout)}), forcing cleanup.`);
|
|
713
|
-
this.initiateCleanupOnce(record, 'extended_lifetime');
|
|
714
|
-
}, safeTimeout);
|
|
715
|
-
// Make sure timeout doesn't keep the process alive
|
|
716
|
-
if (record.cleanupTimer.unref) {
|
|
717
|
-
record.cleanupTimer.unref();
|
|
718
|
-
}
|
|
719
|
-
if (this.settings.enableDetailedLogging) {
|
|
720
|
-
console.log(`[${connectionId}] Keep-alive connection with extended lifetime of ${plugins.prettyMs(extendedTimeout)}`);
|
|
721
|
-
}
|
|
722
|
-
}
|
|
723
|
-
// For standard connections, use normal timeout
|
|
724
|
-
else {
|
|
725
|
-
// Use domain-specific timeout if available, otherwise use default
|
|
726
|
-
const connectionTimeout = record.domainConfig?.connectionTimeout || this.settings.maxConnectionLifetime;
|
|
727
|
-
const safeTimeout = ensureSafeTimeout(connectionTimeout);
|
|
728
|
-
record.cleanupTimer = setTimeout(() => {
|
|
729
|
-
console.log(`[${connectionId}] Connection from ${record.remoteIP} exceeded max lifetime (${plugins.prettyMs(connectionTimeout)}), forcing cleanup.`);
|
|
730
|
-
this.initiateCleanupOnce(record, 'connection_timeout');
|
|
731
|
-
}, safeTimeout);
|
|
732
|
-
// Make sure timeout doesn't keep the process alive
|
|
733
|
-
if (record.cleanupTimer.unref) {
|
|
734
|
-
record.cleanupTimer.unref();
|
|
735
|
-
}
|
|
736
|
-
}
|
|
737
|
-
// Mark TLS handshake as complete for TLS connections
|
|
738
|
-
if (record.isTLS) {
|
|
739
|
-
record.tlsHandshakeComplete = true;
|
|
740
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
741
|
-
console.log(`[${connectionId}] TLS handshake complete for connection from ${record.remoteIP}`);
|
|
742
|
-
}
|
|
743
|
-
}
|
|
744
|
-
});
|
|
745
|
-
}
|
|
746
|
-
/**
|
|
747
|
-
* Get connections count by IP
|
|
748
|
-
*/
|
|
749
|
-
getConnectionCountByIP(ip) {
|
|
750
|
-
return this.connectionsByIP.get(ip)?.size || 0;
|
|
751
|
-
}
|
|
752
|
-
/**
|
|
753
|
-
* Check and update connection rate for an IP
|
|
754
|
-
*/
|
|
755
|
-
checkConnectionRate(ip) {
|
|
756
|
-
const now = Date.now();
|
|
757
|
-
const minute = 60 * 1000;
|
|
758
|
-
if (!this.connectionRateByIP.has(ip)) {
|
|
759
|
-
this.connectionRateByIP.set(ip, [now]);
|
|
760
|
-
return true;
|
|
761
|
-
}
|
|
762
|
-
// Get timestamps and filter out entries older than 1 minute
|
|
763
|
-
const timestamps = this.connectionRateByIP.get(ip).filter((time) => now - time < minute);
|
|
764
|
-
timestamps.push(now);
|
|
765
|
-
this.connectionRateByIP.set(ip, timestamps);
|
|
766
|
-
// Check if rate exceeds limit
|
|
767
|
-
return timestamps.length <= this.settings.connectionRateLimitPerMinute;
|
|
768
|
-
}
|
|
769
|
-
/**
|
|
770
|
-
* Track connection by IP
|
|
771
|
-
*/
|
|
772
|
-
trackConnectionByIP(ip, connectionId) {
|
|
773
|
-
if (!this.connectionsByIP.has(ip)) {
|
|
774
|
-
this.connectionsByIP.set(ip, new Set());
|
|
775
|
-
}
|
|
776
|
-
this.connectionsByIP.get(ip).add(connectionId);
|
|
777
|
-
}
|
|
778
|
-
/**
|
|
779
|
-
* Remove connection tracking for an IP
|
|
780
|
-
*/
|
|
781
|
-
removeConnectionByIP(ip, connectionId) {
|
|
782
|
-
if (this.connectionsByIP.has(ip)) {
|
|
783
|
-
const connections = this.connectionsByIP.get(ip);
|
|
784
|
-
connections.delete(connectionId);
|
|
785
|
-
if (connections.size === 0) {
|
|
786
|
-
this.connectionsByIP.delete(ip);
|
|
787
|
-
}
|
|
788
|
-
}
|
|
789
|
-
}
|
|
790
|
-
/**
|
|
791
|
-
* Track connection termination statistic
|
|
792
|
-
*/
|
|
793
|
-
incrementTerminationStat(side, reason) {
|
|
794
|
-
this.terminationStats[side][reason] = (this.terminationStats[side][reason] || 0) + 1;
|
|
795
|
-
}
|
|
796
|
-
/**
|
|
797
|
-
* Cleans up a connection record.
|
|
798
|
-
* Destroys both incoming and outgoing sockets, clears timers, and removes the record.
|
|
799
|
-
* @param record - The connection record to clean up
|
|
800
|
-
* @param reason - Optional reason for cleanup (for logging)
|
|
801
|
-
*/
|
|
802
|
-
cleanupConnection(record, reason = 'normal') {
|
|
803
|
-
if (!record.connectionClosed) {
|
|
804
|
-
record.connectionClosed = true;
|
|
805
|
-
// Track connection termination
|
|
806
|
-
this.removeConnectionByIP(record.remoteIP, record.id);
|
|
807
|
-
if (record.cleanupTimer) {
|
|
808
|
-
clearTimeout(record.cleanupTimer);
|
|
809
|
-
record.cleanupTimer = undefined;
|
|
810
|
-
}
|
|
811
|
-
// Detailed logging data
|
|
812
|
-
const duration = Date.now() - record.incomingStartTime;
|
|
813
|
-
const bytesReceived = record.bytesReceived;
|
|
814
|
-
const bytesSent = record.bytesSent;
|
|
815
|
-
// Remove all data handlers (both standard and renegotiation) to make sure we clean up properly
|
|
816
|
-
if (record.incoming) {
|
|
817
|
-
try {
|
|
818
|
-
// Remove our safe data handler
|
|
819
|
-
record.incoming.removeAllListeners('data');
|
|
820
|
-
// Reset the handler references
|
|
821
|
-
record.renegotiationHandler = undefined;
|
|
822
|
-
}
|
|
823
|
-
catch (err) {
|
|
824
|
-
console.log(`[${record.id}] Error removing data handlers: ${err}`);
|
|
825
|
-
}
|
|
826
|
-
}
|
|
827
|
-
try {
|
|
828
|
-
if (!record.incoming.destroyed) {
|
|
829
|
-
// Try graceful shutdown first, then force destroy after a short timeout
|
|
830
|
-
record.incoming.end();
|
|
831
|
-
const incomingTimeout = setTimeout(() => {
|
|
832
|
-
try {
|
|
833
|
-
if (record && !record.incoming.destroyed) {
|
|
834
|
-
record.incoming.destroy();
|
|
835
|
-
}
|
|
836
|
-
}
|
|
837
|
-
catch (err) {
|
|
838
|
-
console.log(`[${record.id}] Error destroying incoming socket: ${err}`);
|
|
839
|
-
}
|
|
840
|
-
}, 1000);
|
|
841
|
-
// Ensure the timeout doesn't block Node from exiting
|
|
842
|
-
if (incomingTimeout.unref) {
|
|
843
|
-
incomingTimeout.unref();
|
|
844
|
-
}
|
|
845
|
-
}
|
|
846
|
-
}
|
|
847
|
-
catch (err) {
|
|
848
|
-
console.log(`[${record.id}] Error closing incoming socket: ${err}`);
|
|
849
|
-
try {
|
|
850
|
-
if (!record.incoming.destroyed) {
|
|
851
|
-
record.incoming.destroy();
|
|
852
|
-
}
|
|
853
|
-
}
|
|
854
|
-
catch (destroyErr) {
|
|
855
|
-
console.log(`[${record.id}] Error destroying incoming socket: ${destroyErr}`);
|
|
856
|
-
}
|
|
857
|
-
}
|
|
858
|
-
try {
|
|
859
|
-
if (record.outgoing && !record.outgoing.destroyed) {
|
|
860
|
-
// Try graceful shutdown first, then force destroy after a short timeout
|
|
861
|
-
record.outgoing.end();
|
|
862
|
-
const outgoingTimeout = setTimeout(() => {
|
|
863
|
-
try {
|
|
864
|
-
if (record && record.outgoing && !record.outgoing.destroyed) {
|
|
865
|
-
record.outgoing.destroy();
|
|
866
|
-
}
|
|
867
|
-
}
|
|
868
|
-
catch (err) {
|
|
869
|
-
console.log(`[${record.id}] Error destroying outgoing socket: ${err}`);
|
|
870
|
-
}
|
|
871
|
-
}, 1000);
|
|
872
|
-
// Ensure the timeout doesn't block Node from exiting
|
|
873
|
-
if (outgoingTimeout.unref) {
|
|
874
|
-
outgoingTimeout.unref();
|
|
875
|
-
}
|
|
876
|
-
}
|
|
877
|
-
}
|
|
878
|
-
catch (err) {
|
|
879
|
-
console.log(`[${record.id}] Error closing outgoing socket: ${err}`);
|
|
880
|
-
try {
|
|
881
|
-
if (record.outgoing && !record.outgoing.destroyed) {
|
|
882
|
-
record.outgoing.destroy();
|
|
883
|
-
}
|
|
884
|
-
}
|
|
885
|
-
catch (destroyErr) {
|
|
886
|
-
console.log(`[${record.id}] Error destroying outgoing socket: ${destroyErr}`);
|
|
887
|
-
}
|
|
888
|
-
}
|
|
889
|
-
// Clear pendingData to avoid memory leaks
|
|
890
|
-
record.pendingData = [];
|
|
891
|
-
record.pendingDataSize = 0;
|
|
892
|
-
// Remove the record from the tracking map
|
|
893
|
-
this.connectionRecords.delete(record.id);
|
|
894
|
-
// Log connection details
|
|
895
|
-
if (this.settings.enableDetailedLogging) {
|
|
896
|
-
console.log(`[${record.id}] Connection from ${record.remoteIP} on port ${record.localPort} terminated (${reason}).` +
|
|
897
|
-
` Duration: ${plugins.prettyMs(duration)}, Bytes IN: ${bytesReceived}, OUT: ${bytesSent}, ` +
|
|
898
|
-
`TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}` +
|
|
899
|
-
`${record.usingNetworkProxy ? ', Using NetworkProxy' : ''}` +
|
|
900
|
-
`${record.domainSwitches ? `, Domain switches: ${record.domainSwitches}` : ''}`);
|
|
901
|
-
}
|
|
902
|
-
else {
|
|
903
|
-
console.log(`[${record.id}] Connection from ${record.remoteIP} terminated (${reason}). Active connections: ${this.connectionRecords.size}`);
|
|
904
|
-
}
|
|
905
|
-
}
|
|
906
|
-
}
|
|
907
|
-
/**
|
|
908
|
-
* Update connection activity timestamp
|
|
909
|
-
*/
|
|
910
|
-
updateActivity(record) {
|
|
911
|
-
record.lastActivity = Date.now();
|
|
912
|
-
// Clear any inactivity warning
|
|
913
|
-
if (record.inactivityWarningIssued) {
|
|
914
|
-
record.inactivityWarningIssued = false;
|
|
915
|
-
}
|
|
916
|
-
}
|
|
917
|
-
/**
|
|
918
|
-
* Get target IP with round-robin support
|
|
919
|
-
*/
|
|
920
|
-
getTargetIP(domainConfig) {
|
|
921
|
-
if (domainConfig.targetIPs && domainConfig.targetIPs.length > 0) {
|
|
922
|
-
const currentIndex = this.domainTargetIndices.get(domainConfig) || 0;
|
|
923
|
-
const ip = domainConfig.targetIPs[currentIndex % domainConfig.targetIPs.length];
|
|
924
|
-
this.domainTargetIndices.set(domainConfig, currentIndex + 1);
|
|
925
|
-
return ip;
|
|
926
|
-
}
|
|
927
|
-
return this.settings.targetIP;
|
|
928
|
-
}
|
|
929
|
-
/**
|
|
930
|
-
* Initiates cleanup once for a connection
|
|
931
|
-
*/
|
|
932
|
-
initiateCleanupOnce(record, reason = 'normal') {
|
|
933
|
-
if (this.settings.enableDetailedLogging) {
|
|
934
|
-
console.log(`[${record.id}] Connection cleanup initiated for ${record.remoteIP} (${reason})`);
|
|
935
|
-
}
|
|
936
|
-
if (record.incomingTerminationReason === null ||
|
|
937
|
-
record.incomingTerminationReason === undefined) {
|
|
938
|
-
record.incomingTerminationReason = reason;
|
|
939
|
-
this.incrementTerminationStat('incoming', reason);
|
|
940
|
-
}
|
|
941
|
-
this.cleanupConnection(record, reason);
|
|
942
|
-
}
|
|
943
|
-
/**
|
|
944
|
-
* Creates a generic error handler for incoming or outgoing sockets
|
|
945
|
-
*/
|
|
946
|
-
handleError(side, record) {
|
|
947
|
-
return (err) => {
|
|
948
|
-
const code = err.code;
|
|
949
|
-
let reason = 'error';
|
|
950
|
-
const now = Date.now();
|
|
951
|
-
const connectionDuration = now - record.incomingStartTime;
|
|
952
|
-
const lastActivityAge = now - record.lastActivity;
|
|
953
|
-
if (code === 'ECONNRESET') {
|
|
954
|
-
reason = 'econnreset';
|
|
955
|
-
console.log(`[${record.id}] ECONNRESET on ${side} side from ${record.remoteIP}: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`);
|
|
956
|
-
}
|
|
957
|
-
else if (code === 'ETIMEDOUT') {
|
|
958
|
-
reason = 'etimedout';
|
|
959
|
-
console.log(`[${record.id}] ETIMEDOUT on ${side} side from ${record.remoteIP}: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`);
|
|
960
|
-
}
|
|
961
|
-
else {
|
|
962
|
-
console.log(`[${record.id}] Error on ${side} side from ${record.remoteIP}: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`);
|
|
963
|
-
}
|
|
964
|
-
if (side === 'incoming' && record.incomingTerminationReason === null) {
|
|
965
|
-
record.incomingTerminationReason = reason;
|
|
966
|
-
this.incrementTerminationStat('incoming', reason);
|
|
967
|
-
}
|
|
968
|
-
else if (side === 'outgoing' && record.outgoingTerminationReason === null) {
|
|
969
|
-
record.outgoingTerminationReason = reason;
|
|
970
|
-
this.incrementTerminationStat('outgoing', reason);
|
|
971
|
-
}
|
|
972
|
-
this.initiateCleanupOnce(record, reason);
|
|
973
|
-
};
|
|
974
|
-
}
|
|
975
|
-
/**
|
|
976
|
-
* Creates a generic close handler for incoming or outgoing sockets
|
|
977
|
-
*/
|
|
978
|
-
handleClose(side, record) {
|
|
979
|
-
return () => {
|
|
980
|
-
if (this.settings.enableDetailedLogging) {
|
|
981
|
-
console.log(`[${record.id}] Connection closed on ${side} side from ${record.remoteIP}`);
|
|
982
|
-
}
|
|
983
|
-
if (side === 'incoming' && record.incomingTerminationReason === null) {
|
|
984
|
-
record.incomingTerminationReason = 'normal';
|
|
985
|
-
this.incrementTerminationStat('incoming', 'normal');
|
|
986
|
-
}
|
|
987
|
-
else if (side === 'outgoing' && record.outgoingTerminationReason === null) {
|
|
988
|
-
record.outgoingTerminationReason = 'normal';
|
|
989
|
-
this.incrementTerminationStat('outgoing', 'normal');
|
|
990
|
-
// Record the time when outgoing socket closed.
|
|
991
|
-
record.outgoingClosedTime = Date.now();
|
|
992
|
-
}
|
|
993
|
-
this.initiateCleanupOnce(record, 'closed_' + side);
|
|
994
|
-
};
|
|
995
|
-
}
|
|
996
|
-
/**
|
|
997
|
-
* Main method to start the proxy
|
|
998
|
-
*/
|
|
999
|
-
async start() {
|
|
1000
|
-
// Don't start if already shutting down
|
|
1001
|
-
if (this.isShuttingDown) {
|
|
1002
|
-
console.log("Cannot start PortProxy while it's shutting down");
|
|
1003
|
-
return;
|
|
1004
|
-
}
|
|
1005
|
-
// Initialize NetworkProxy if needed (useNetworkProxy is set but networkProxy isn't initialized)
|
|
1006
|
-
if (this.settings.useNetworkProxy &&
|
|
1007
|
-
this.settings.useNetworkProxy.length > 0 &&
|
|
1008
|
-
!this.networkProxy) {
|
|
1009
|
-
await this.initializeNetworkProxy();
|
|
1010
|
-
}
|
|
1011
|
-
// Start NetworkProxy if configured
|
|
1012
|
-
if (this.networkProxy) {
|
|
1013
|
-
await this.networkProxy.start();
|
|
1014
|
-
console.log(`NetworkProxy started on port ${this.settings.networkProxyPort}`);
|
|
1015
|
-
// Log ACME status
|
|
1016
|
-
if (this.settings.acme?.enabled) {
|
|
1017
|
-
console.log(`ACME certificate management is enabled (${this.settings.acme.useProduction ? 'Production' : 'Staging'} mode)`);
|
|
1018
|
-
console.log(`ACME HTTP challenge server on port ${this.settings.acme.port}`);
|
|
1019
|
-
// Register domains for ACME certificates if enabled
|
|
1020
|
-
if (this.networkProxy.options.acme?.enabled) {
|
|
1021
|
-
console.log('Registering domains with ACME certificate manager...');
|
|
1022
|
-
// The NetworkProxy will handle this internally via registerDomainsWithAcmeManager()
|
|
1023
|
-
}
|
|
1024
|
-
}
|
|
1025
|
-
}
|
|
1026
|
-
// Define a unified connection handler for all listening ports.
|
|
1027
|
-
const connectionHandler = (socket) => {
|
|
1028
|
-
if (this.isShuttingDown) {
|
|
1029
|
-
socket.end();
|
|
1030
|
-
socket.destroy();
|
|
1031
|
-
return;
|
|
1032
|
-
}
|
|
1033
|
-
const remoteIP = socket.remoteAddress || '';
|
|
1034
|
-
const localPort = socket.localPort || 0; // The port on which this connection was accepted.
|
|
1035
|
-
// Check rate limits
|
|
1036
|
-
if (this.settings.maxConnectionsPerIP &&
|
|
1037
|
-
this.getConnectionCountByIP(remoteIP) >= this.settings.maxConnectionsPerIP) {
|
|
1038
|
-
console.log(`Connection rejected from ${remoteIP}: Maximum connections per IP (${this.settings.maxConnectionsPerIP}) exceeded`);
|
|
1039
|
-
socket.end();
|
|
1040
|
-
socket.destroy();
|
|
1041
|
-
return;
|
|
1042
|
-
}
|
|
1043
|
-
if (this.settings.connectionRateLimitPerMinute && !this.checkConnectionRate(remoteIP)) {
|
|
1044
|
-
console.log(`Connection rejected from ${remoteIP}: Connection rate limit (${this.settings.connectionRateLimitPerMinute}/min) exceeded`);
|
|
1045
|
-
socket.end();
|
|
1046
|
-
socket.destroy();
|
|
1047
|
-
return;
|
|
1048
|
-
}
|
|
1049
|
-
// Apply socket optimizations
|
|
1050
|
-
socket.setNoDelay(this.settings.noDelay);
|
|
1051
|
-
// Create a unique connection ID and record
|
|
1052
|
-
const connectionId = generateConnectionId();
|
|
1053
|
-
const connectionRecord = {
|
|
1054
|
-
id: connectionId,
|
|
1055
|
-
incoming: socket,
|
|
1056
|
-
outgoing: null,
|
|
1057
|
-
incomingStartTime: Date.now(),
|
|
1058
|
-
lastActivity: Date.now(),
|
|
1059
|
-
connectionClosed: false,
|
|
1060
|
-
pendingData: [],
|
|
1061
|
-
pendingDataSize: 0,
|
|
1062
|
-
// Initialize enhanced tracking fields
|
|
1063
|
-
bytesReceived: 0,
|
|
1064
|
-
bytesSent: 0,
|
|
1065
|
-
remoteIP: remoteIP,
|
|
1066
|
-
localPort: localPort,
|
|
1067
|
-
isTLS: false,
|
|
1068
|
-
tlsHandshakeComplete: false,
|
|
1069
|
-
hasReceivedInitialData: false,
|
|
1070
|
-
hasKeepAlive: false, // Will set to true if keep-alive is applied
|
|
1071
|
-
incomingTerminationReason: null,
|
|
1072
|
-
outgoingTerminationReason: null,
|
|
1073
|
-
// Initialize NetworkProxy tracking
|
|
1074
|
-
usingNetworkProxy: false,
|
|
1075
|
-
// Initialize browser connection tracking
|
|
1076
|
-
isBrowserConnection: false,
|
|
1077
|
-
domainSwitches: 0,
|
|
1078
|
-
};
|
|
1079
|
-
// Apply keep-alive settings if enabled
|
|
1080
|
-
if (this.settings.keepAlive) {
|
|
1081
|
-
socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
|
1082
|
-
connectionRecord.hasKeepAlive = true; // Mark connection as having keep-alive
|
|
1083
|
-
// Apply enhanced TCP keep-alive options if enabled
|
|
1084
|
-
if (this.settings.enableKeepAliveProbes) {
|
|
1085
|
-
try {
|
|
1086
|
-
// These are platform-specific and may not be available
|
|
1087
|
-
if ('setKeepAliveProbes' in socket) {
|
|
1088
|
-
socket.setKeepAliveProbes(10); // More aggressive probing
|
|
1089
|
-
}
|
|
1090
|
-
if ('setKeepAliveInterval' in socket) {
|
|
1091
|
-
socket.setKeepAliveInterval(1000); // 1 second interval between probes
|
|
1092
|
-
}
|
|
1093
|
-
}
|
|
1094
|
-
catch (err) {
|
|
1095
|
-
// Ignore errors - these are optional enhancements
|
|
1096
|
-
if (this.settings.enableDetailedLogging) {
|
|
1097
|
-
console.log(`[${connectionId}] Enhanced TCP keep-alive settings not supported: ${err}`);
|
|
1098
|
-
}
|
|
1099
|
-
}
|
|
1100
|
-
}
|
|
1101
|
-
}
|
|
1102
|
-
// Track connection by IP
|
|
1103
|
-
this.trackConnectionByIP(remoteIP, connectionId);
|
|
1104
|
-
this.connectionRecords.set(connectionId, connectionRecord);
|
|
1105
|
-
if (this.settings.enableDetailedLogging) {
|
|
1106
|
-
console.log(`[${connectionId}] New connection from ${remoteIP} on port ${localPort}. ` +
|
|
1107
|
-
`Keep-Alive: ${connectionRecord.hasKeepAlive ? 'Enabled' : 'Disabled'}. ` +
|
|
1108
|
-
`Active connections: ${this.connectionRecords.size}`);
|
|
1109
|
-
}
|
|
1110
|
-
else {
|
|
1111
|
-
console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionRecords.size}`);
|
|
1112
|
-
}
|
|
1113
|
-
// Check if this connection should be forwarded directly to NetworkProxy
|
|
1114
|
-
// First check port-based forwarding settings
|
|
1115
|
-
let shouldUseNetworkProxy = this.settings.useNetworkProxy && this.settings.useNetworkProxy.includes(localPort);
|
|
1116
|
-
// We'll look for domain-specific settings after SNI extraction
|
|
1117
|
-
if (shouldUseNetworkProxy) {
|
|
1118
|
-
// For NetworkProxy ports, we want to capture the TLS handshake and forward directly
|
|
1119
|
-
let initialDataReceived = false;
|
|
1120
|
-
// Set an initial timeout for handshake data
|
|
1121
|
-
let initialTimeout = setTimeout(() => {
|
|
1122
|
-
if (!initialDataReceived) {
|
|
1123
|
-
console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${remoteIP}`);
|
|
1124
|
-
// Add a grace period instead of immediate termination
|
|
1125
|
-
setTimeout(() => {
|
|
1126
|
-
if (!initialDataReceived) {
|
|
1127
|
-
console.log(`[${connectionId}] Final initial data timeout after grace period`);
|
|
1128
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1129
|
-
connectionRecord.incomingTerminationReason = 'initial_timeout';
|
|
1130
|
-
this.incrementTerminationStat('incoming', 'initial_timeout');
|
|
1131
|
-
}
|
|
1132
|
-
socket.end();
|
|
1133
|
-
this.cleanupConnection(connectionRecord, 'initial_timeout');
|
|
1134
|
-
}
|
|
1135
|
-
}, 30000); // 30 second grace period
|
|
1136
|
-
}
|
|
1137
|
-
}, this.settings.initialDataTimeout);
|
|
1138
|
-
// Make sure timeout doesn't keep the process alive
|
|
1139
|
-
if (initialTimeout.unref) {
|
|
1140
|
-
initialTimeout.unref();
|
|
1141
|
-
}
|
|
1142
|
-
socket.on('error', this.handleError('incoming', connectionRecord));
|
|
1143
|
-
// First data handler to capture initial TLS handshake for NetworkProxy
|
|
1144
|
-
socket.once('data', (chunk) => {
|
|
1145
|
-
// Clear the initial timeout since we've received data
|
|
1146
|
-
if (initialTimeout) {
|
|
1147
|
-
clearTimeout(initialTimeout);
|
|
1148
|
-
initialTimeout = null;
|
|
1149
|
-
}
|
|
1150
|
-
initialDataReceived = true;
|
|
1151
|
-
connectionRecord.hasReceivedInitialData = true;
|
|
1152
|
-
// Block non-TLS connections on port 443
|
|
1153
|
-
// Always enforce TLS on standard HTTPS port
|
|
1154
|
-
if (!SniHandler.isTlsHandshake(chunk) && localPort === 443) {
|
|
1155
|
-
console.log(`[${connectionId}] Non-TLS connection detected on port 443. ` +
|
|
1156
|
-
`Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
|
|
1157
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1158
|
-
connectionRecord.incomingTerminationReason = 'non_tls_blocked';
|
|
1159
|
-
this.incrementTerminationStat('incoming', 'non_tls_blocked');
|
|
1160
|
-
}
|
|
1161
|
-
socket.end();
|
|
1162
|
-
this.cleanupConnection(connectionRecord, 'non_tls_blocked');
|
|
1163
|
-
return;
|
|
1164
|
-
}
|
|
1165
|
-
// Check if this looks like a TLS handshake
|
|
1166
|
-
if (SniHandler.isTlsHandshake(chunk)) {
|
|
1167
|
-
connectionRecord.isTLS = true;
|
|
1168
|
-
// Check for TLS ClientHello with either no SNI or session tickets
|
|
1169
|
-
if (this.settings.allowSessionTicket === false && SniHandler.isClientHello(chunk)) {
|
|
1170
|
-
// Extract SNI first
|
|
1171
|
-
const extractedSNI = SniHandler.extractSNI(chunk, this.settings.enableTlsDebugLogging);
|
|
1172
|
-
const hasSNI = !!extractedSNI;
|
|
1173
|
-
// Analyze for session resumption attempt
|
|
1174
|
-
const resumptionInfo = SniHandler.hasSessionResumption(chunk, this.settings.enableTlsDebugLogging);
|
|
1175
|
-
// Always log for debugging purposes
|
|
1176
|
-
console.log(`[${connectionId}] TLS ClientHello detected with allowSessionTicket=false. ` +
|
|
1177
|
-
`Has SNI: ${hasSNI ? 'Yes' : 'No'}, ` +
|
|
1178
|
-
`SNI value: ${extractedSNI || 'None'}, ` +
|
|
1179
|
-
`Has session resumption: ${resumptionInfo.isResumption ? 'Yes' : 'No'}`);
|
|
1180
|
-
// Block if this is a connection with session resumption but no SNI
|
|
1181
|
-
if (resumptionInfo.isResumption && !hasSNI) {
|
|
1182
|
-
console.log(`[${connectionId}] Session resumption detected in initial ClientHello without SNI and allowSessionTicket=false. ` +
|
|
1183
|
-
`Terminating connection to force new TLS handshake.`);
|
|
1184
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1185
|
-
connectionRecord.incomingTerminationReason = 'session_ticket_blocked';
|
|
1186
|
-
this.incrementTerminationStat('incoming', 'session_ticket_blocked');
|
|
1187
|
-
}
|
|
1188
|
-
socket.end();
|
|
1189
|
-
this.cleanupConnection(connectionRecord, 'session_ticket_blocked');
|
|
1190
|
-
return;
|
|
1191
|
-
}
|
|
1192
|
-
// Also block if this is a TLS connection without SNI when allowSessionTicket is false
|
|
1193
|
-
// This forces clients to send SNI which helps with routing
|
|
1194
|
-
if (!hasSNI && localPort === 443) {
|
|
1195
|
-
console.log(`[${connectionId}] TLS ClientHello detected on port 443 without SNI and allowSessionTicket=false. ` +
|
|
1196
|
-
`Terminating connection to force proper SNI in handshake.`);
|
|
1197
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1198
|
-
connectionRecord.incomingTerminationReason = 'no_sni_blocked';
|
|
1199
|
-
this.incrementTerminationStat('incoming', 'no_sni_blocked');
|
|
1200
|
-
}
|
|
1201
|
-
socket.end();
|
|
1202
|
-
this.cleanupConnection(connectionRecord, 'no_sni_blocked');
|
|
1203
|
-
return;
|
|
1204
|
-
}
|
|
1205
|
-
}
|
|
1206
|
-
// Try to extract SNI for domain-specific NetworkProxy handling
|
|
1207
|
-
const connInfo = {
|
|
1208
|
-
sourceIp: remoteIP,
|
|
1209
|
-
sourcePort: socket.remotePort || 0,
|
|
1210
|
-
destIp: socket.localAddress || '',
|
|
1211
|
-
destPort: socket.localPort || 0,
|
|
1212
|
-
};
|
|
1213
|
-
// Extract SNI to check for domain-specific NetworkProxy settings
|
|
1214
|
-
const serverName = SniHandler.processTlsPacket(chunk, connInfo, this.settings.enableTlsDebugLogging);
|
|
1215
|
-
if (serverName) {
|
|
1216
|
-
// If we got an SNI, check for domain-specific NetworkProxy settings
|
|
1217
|
-
const domainConfig = this.settings.domainConfigs.find((config) => config.domains.some((d) => plugins.minimatch(serverName, d)));
|
|
1218
|
-
// Save domain config and SNI in connection record
|
|
1219
|
-
connectionRecord.domainConfig = domainConfig;
|
|
1220
|
-
connectionRecord.lockedDomain = serverName;
|
|
1221
|
-
// Use domain-specific NetworkProxy port if configured
|
|
1222
|
-
if (domainConfig?.useNetworkProxy) {
|
|
1223
|
-
const networkProxyPort = domainConfig.networkProxyPort || this.settings.networkProxyPort;
|
|
1224
|
-
if (this.settings.enableDetailedLogging) {
|
|
1225
|
-
console.log(`[${connectionId}] Using domain-specific NetworkProxy for ${serverName} on port ${networkProxyPort}`);
|
|
1226
|
-
}
|
|
1227
|
-
// Forward to NetworkProxy with domain-specific port
|
|
1228
|
-
this.forwardToNetworkProxy(connectionId, socket, connectionRecord, chunk, networkProxyPort);
|
|
1229
|
-
return;
|
|
1230
|
-
}
|
|
1231
|
-
}
|
|
1232
|
-
// Forward directly to NetworkProxy without domain-specific settings
|
|
1233
|
-
this.forwardToNetworkProxy(connectionId, socket, connectionRecord, chunk);
|
|
1234
|
-
}
|
|
1235
|
-
else {
|
|
1236
|
-
// If not TLS, use normal direct connection
|
|
1237
|
-
console.log(`[${connectionId}] Non-TLS connection on NetworkProxy port ${localPort}`);
|
|
1238
|
-
this.setupDirectConnection(connectionId, socket, connectionRecord, undefined, undefined, chunk);
|
|
1239
|
-
}
|
|
1240
|
-
});
|
|
1241
|
-
}
|
|
1242
|
-
else {
|
|
1243
|
-
// For non-NetworkProxy ports, proceed with normal processing
|
|
1244
|
-
// Define helpers for rejecting connections
|
|
1245
|
-
const rejectIncomingConnection = (reason, logMessage) => {
|
|
1246
|
-
console.log(`[${connectionId}] ${logMessage}`);
|
|
1247
|
-
socket.end();
|
|
1248
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1249
|
-
connectionRecord.incomingTerminationReason = reason;
|
|
1250
|
-
this.incrementTerminationStat('incoming', reason);
|
|
1251
|
-
}
|
|
1252
|
-
this.cleanupConnection(connectionRecord, reason);
|
|
1253
|
-
};
|
|
1254
|
-
let initialDataReceived = false;
|
|
1255
|
-
// Set an initial timeout for SNI data if needed
|
|
1256
|
-
let initialTimeout = null;
|
|
1257
|
-
if (this.settings.sniEnabled) {
|
|
1258
|
-
initialTimeout = setTimeout(() => {
|
|
1259
|
-
if (!initialDataReceived) {
|
|
1260
|
-
console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${remoteIP}`);
|
|
1261
|
-
// Add a grace period instead of immediate termination
|
|
1262
|
-
setTimeout(() => {
|
|
1263
|
-
if (!initialDataReceived) {
|
|
1264
|
-
console.log(`[${connectionId}] Final initial data timeout after grace period`);
|
|
1265
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1266
|
-
connectionRecord.incomingTerminationReason = 'initial_timeout';
|
|
1267
|
-
this.incrementTerminationStat('incoming', 'initial_timeout');
|
|
1268
|
-
}
|
|
1269
|
-
socket.end();
|
|
1270
|
-
this.cleanupConnection(connectionRecord, 'initial_timeout');
|
|
1271
|
-
}
|
|
1272
|
-
}, 30000); // 30 second grace period
|
|
1273
|
-
}
|
|
1274
|
-
}, this.settings.initialDataTimeout);
|
|
1275
|
-
// Make sure timeout doesn't keep the process alive
|
|
1276
|
-
if (initialTimeout.unref) {
|
|
1277
|
-
initialTimeout.unref();
|
|
1278
|
-
}
|
|
1279
|
-
}
|
|
1280
|
-
else {
|
|
1281
|
-
initialDataReceived = true;
|
|
1282
|
-
connectionRecord.hasReceivedInitialData = true;
|
|
1283
|
-
}
|
|
1284
|
-
socket.on('error', this.handleError('incoming', connectionRecord));
|
|
1285
|
-
// Track data for bytes counting
|
|
1286
|
-
socket.on('data', (chunk) => {
|
|
1287
|
-
connectionRecord.bytesReceived += chunk.length;
|
|
1288
|
-
this.updateActivity(connectionRecord);
|
|
1289
|
-
// Check for TLS handshake if this is the first chunk
|
|
1290
|
-
if (!connectionRecord.isTLS && SniHandler.isTlsHandshake(chunk)) {
|
|
1291
|
-
connectionRecord.isTLS = true;
|
|
1292
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
1293
|
-
console.log(`[${connectionId}] TLS handshake detected from ${remoteIP}, ${chunk.length} bytes`);
|
|
1294
|
-
// Try to extract SNI and log detailed debug info
|
|
1295
|
-
// Create connection info for debug logging
|
|
1296
|
-
const debugConnInfo = {
|
|
1297
|
-
sourceIp: remoteIP,
|
|
1298
|
-
sourcePort: socket.remotePort || 0,
|
|
1299
|
-
destIp: socket.localAddress || '',
|
|
1300
|
-
destPort: socket.localPort || 0,
|
|
1301
|
-
};
|
|
1302
|
-
SniHandler.extractSNIWithResumptionSupport(chunk, debugConnInfo, true);
|
|
1303
|
-
}
|
|
1304
|
-
}
|
|
1305
|
-
});
|
|
1306
|
-
/**
|
|
1307
|
-
* Sets up the connection to the target host.
|
|
1308
|
-
* @param serverName - The SNI hostname (unused when forcedDomain is provided).
|
|
1309
|
-
* @param initialChunk - Optional initial data chunk.
|
|
1310
|
-
* @param forcedDomain - If provided, overrides SNI/domain lookup (used for port-based routing).
|
|
1311
|
-
* @param overridePort - If provided, use this port for the outgoing connection.
|
|
1312
|
-
*/
|
|
1313
|
-
const setupConnection = (serverName, initialChunk, forcedDomain, overridePort) => {
|
|
1314
|
-
// Clear the initial timeout since we've received data
|
|
1315
|
-
if (initialTimeout) {
|
|
1316
|
-
clearTimeout(initialTimeout);
|
|
1317
|
-
initialTimeout = null;
|
|
1318
|
-
}
|
|
1319
|
-
// Mark that we've received initial data
|
|
1320
|
-
initialDataReceived = true;
|
|
1321
|
-
connectionRecord.hasReceivedInitialData = true;
|
|
1322
|
-
// Check if this looks like a TLS handshake
|
|
1323
|
-
const isTlsHandshakeDetected = initialChunk && SniHandler.isTlsHandshake(initialChunk);
|
|
1324
|
-
if (isTlsHandshakeDetected) {
|
|
1325
|
-
connectionRecord.isTLS = true;
|
|
1326
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
1327
|
-
console.log(`[${connectionId}] TLS handshake detected in setup, ${initialChunk.length} bytes`);
|
|
1328
|
-
}
|
|
1329
|
-
}
|
|
1330
|
-
// If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
|
|
1331
|
-
const domainConfig = forcedDomain
|
|
1332
|
-
? forcedDomain
|
|
1333
|
-
: serverName
|
|
1334
|
-
? this.settings.domainConfigs.find((config) => config.domains.some((d) => plugins.minimatch(serverName, d)))
|
|
1335
|
-
: undefined;
|
|
1336
|
-
// Save domain config in connection record
|
|
1337
|
-
connectionRecord.domainConfig = domainConfig;
|
|
1338
|
-
// Check if this domain should use NetworkProxy (domain-specific setting)
|
|
1339
|
-
if (domainConfig?.useNetworkProxy && this.networkProxy) {
|
|
1340
|
-
if (this.settings.enableDetailedLogging) {
|
|
1341
|
-
console.log(`[${connectionId}] Domain ${serverName} is configured to use NetworkProxy`);
|
|
1342
|
-
}
|
|
1343
|
-
const networkProxyPort = domainConfig.networkProxyPort || this.settings.networkProxyPort;
|
|
1344
|
-
if (initialChunk && connectionRecord.isTLS) {
|
|
1345
|
-
// For TLS connections with initial chunk, forward to NetworkProxy
|
|
1346
|
-
this.forwardToNetworkProxy(connectionId, socket, connectionRecord, initialChunk, networkProxyPort // Pass the domain-specific NetworkProxy port if configured
|
|
1347
|
-
);
|
|
1348
|
-
return; // Skip normal connection setup
|
|
1349
|
-
}
|
|
1350
|
-
}
|
|
1351
|
-
// IP validation is skipped if allowedIPs is empty
|
|
1352
|
-
if (domainConfig) {
|
|
1353
|
-
const effectiveAllowedIPs = [
|
|
1354
|
-
...domainConfig.allowedIPs,
|
|
1355
|
-
...(this.settings.defaultAllowedIPs || []),
|
|
1356
|
-
];
|
|
1357
|
-
const effectiveBlockedIPs = [
|
|
1358
|
-
...(domainConfig.blockedIPs || []),
|
|
1359
|
-
...(this.settings.defaultBlockedIPs || []),
|
|
1360
|
-
];
|
|
1361
|
-
// Skip IP validation if allowedIPs is empty
|
|
1362
|
-
if (domainConfig.allowedIPs.length > 0 &&
|
|
1363
|
-
!isGlobIPAllowed(remoteIP, effectiveAllowedIPs, effectiveBlockedIPs)) {
|
|
1364
|
-
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for domain ${domainConfig.domains.join(', ')}`);
|
|
1365
|
-
}
|
|
1366
|
-
}
|
|
1367
|
-
else if (this.settings.defaultAllowedIPs &&
|
|
1368
|
-
this.settings.defaultAllowedIPs.length > 0) {
|
|
1369
|
-
if (!isGlobIPAllowed(remoteIP, this.settings.defaultAllowedIPs, this.settings.defaultBlockedIPs || [])) {
|
|
1370
|
-
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed by default allowed list`);
|
|
1371
|
-
}
|
|
1372
|
-
}
|
|
1373
|
-
// Save the initial SNI
|
|
1374
|
-
if (serverName) {
|
|
1375
|
-
connectionRecord.lockedDomain = serverName;
|
|
1376
|
-
}
|
|
1377
|
-
// Set up the direct connection
|
|
1378
|
-
return this.setupDirectConnection(connectionId, socket, connectionRecord, domainConfig, serverName, initialChunk, overridePort);
|
|
1379
|
-
};
|
|
1380
|
-
// --- PORT RANGE-BASED HANDLING ---
|
|
1381
|
-
// Only apply port-based rules if the incoming port is within one of the global port ranges.
|
|
1382
|
-
if (this.settings.globalPortRanges &&
|
|
1383
|
-
isPortInRanges(localPort, this.settings.globalPortRanges)) {
|
|
1384
|
-
if (this.settings.forwardAllGlobalRanges) {
|
|
1385
|
-
if (this.settings.defaultAllowedIPs &&
|
|
1386
|
-
this.settings.defaultAllowedIPs.length > 0 &&
|
|
1387
|
-
!isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
|
1388
|
-
console.log(`[${connectionId}] Connection from ${remoteIP} rejected: IP ${remoteIP} not allowed in global default allowed list.`);
|
|
1389
|
-
socket.end();
|
|
1390
|
-
return;
|
|
1391
|
-
}
|
|
1392
|
-
if (this.settings.enableDetailedLogging) {
|
|
1393
|
-
console.log(`[${connectionId}] Port-based connection from ${remoteIP} on port ${localPort} forwarded to global target IP ${this.settings.targetIP}.`);
|
|
1394
|
-
}
|
|
1395
|
-
setupConnection('', undefined, {
|
|
1396
|
-
domains: ['global'],
|
|
1397
|
-
allowedIPs: this.settings.defaultAllowedIPs || [],
|
|
1398
|
-
blockedIPs: this.settings.defaultBlockedIPs || [],
|
|
1399
|
-
targetIPs: [this.settings.targetIP],
|
|
1400
|
-
portRanges: [],
|
|
1401
|
-
}, localPort);
|
|
1402
|
-
return;
|
|
1403
|
-
}
|
|
1404
|
-
else {
|
|
1405
|
-
// Attempt to find a matching forced domain config based on the local port.
|
|
1406
|
-
const forcedDomain = this.settings.domainConfigs.find((domain) => domain.portRanges &&
|
|
1407
|
-
domain.portRanges.length > 0 &&
|
|
1408
|
-
isPortInRanges(localPort, domain.portRanges));
|
|
1409
|
-
if (forcedDomain) {
|
|
1410
|
-
const effectiveAllowedIPs = [
|
|
1411
|
-
...forcedDomain.allowedIPs,
|
|
1412
|
-
...(this.settings.defaultAllowedIPs || []),
|
|
1413
|
-
];
|
|
1414
|
-
const effectiveBlockedIPs = [
|
|
1415
|
-
...(forcedDomain.blockedIPs || []),
|
|
1416
|
-
...(this.settings.defaultBlockedIPs || []),
|
|
1417
|
-
];
|
|
1418
|
-
if (!isGlobIPAllowed(remoteIP, effectiveAllowedIPs, effectiveBlockedIPs)) {
|
|
1419
|
-
console.log(`[${connectionId}] Connection from ${remoteIP} rejected: IP not allowed for domain ${forcedDomain.domains.join(', ')} on port ${localPort}.`);
|
|
1420
|
-
socket.end();
|
|
1421
|
-
return;
|
|
1422
|
-
}
|
|
1423
|
-
if (this.settings.enableDetailedLogging) {
|
|
1424
|
-
console.log(`[${connectionId}] Port-based connection from ${remoteIP} on port ${localPort} matched domain ${forcedDomain.domains.join(', ')}.`);
|
|
1425
|
-
}
|
|
1426
|
-
setupConnection('', undefined, forcedDomain, localPort);
|
|
1427
|
-
return;
|
|
1428
|
-
}
|
|
1429
|
-
// Fall through to SNI/default handling if no forced domain config is found.
|
|
1430
|
-
}
|
|
1431
|
-
}
|
|
1432
|
-
// --- FALLBACK: SNI-BASED HANDLING (or default when SNI is disabled) ---
|
|
1433
|
-
if (this.settings.sniEnabled) {
|
|
1434
|
-
initialDataReceived = false;
|
|
1435
|
-
socket.once('data', (chunk) => {
|
|
1436
|
-
// Clear timeout immediately
|
|
1437
|
-
if (initialTimeout) {
|
|
1438
|
-
clearTimeout(initialTimeout);
|
|
1439
|
-
initialTimeout = null;
|
|
1440
|
-
}
|
|
1441
|
-
initialDataReceived = true;
|
|
1442
|
-
// Add debugging ONLY if detailed logging is enabled - avoid heavy processing
|
|
1443
|
-
if (this.settings.enableTlsDebugLogging && SniHandler.isClientHello(chunk)) {
|
|
1444
|
-
// Move heavy debug logging to a separate async task to not block the flow
|
|
1445
|
-
setImmediate(() => {
|
|
1446
|
-
try {
|
|
1447
|
-
const resumptionInfo = SniHandler.hasSessionResumption(chunk, true);
|
|
1448
|
-
const standardSNI = SniHandler.extractSNI(chunk, true);
|
|
1449
|
-
const pskSNI = SniHandler.extractSNIFromPSKExtension(chunk, true);
|
|
1450
|
-
console.log(`[${connectionId}] ClientHello details: isResumption=${resumptionInfo.isResumption}, hasSNI=${resumptionInfo.hasSNI}`);
|
|
1451
|
-
console.log(`[${connectionId}] SNI extraction results: standardSNI=${standardSNI || 'none'}, pskSNI=${pskSNI || 'none'}`);
|
|
1452
|
-
}
|
|
1453
|
-
catch (err) {
|
|
1454
|
-
console.log(`[${connectionId}] Error in debug logging: ${err}`);
|
|
1455
|
-
}
|
|
1456
|
-
});
|
|
1457
|
-
}
|
|
1458
|
-
// Block non-TLS connections on port 443
|
|
1459
|
-
// Always enforce TLS on standard HTTPS port
|
|
1460
|
-
if (!SniHandler.isTlsHandshake(chunk) && localPort === 443) {
|
|
1461
|
-
console.log(`[${connectionId}] Non-TLS connection detected on port 443 in SNI handler. ` +
|
|
1462
|
-
`Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
|
|
1463
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1464
|
-
connectionRecord.incomingTerminationReason = 'non_tls_blocked';
|
|
1465
|
-
this.incrementTerminationStat('incoming', 'non_tls_blocked');
|
|
1466
|
-
}
|
|
1467
|
-
socket.end();
|
|
1468
|
-
this.cleanupConnection(connectionRecord, 'non_tls_blocked');
|
|
1469
|
-
return;
|
|
1470
|
-
}
|
|
1471
|
-
// Try to extract SNI
|
|
1472
|
-
let serverName = '';
|
|
1473
|
-
if (SniHandler.isTlsHandshake(chunk)) {
|
|
1474
|
-
connectionRecord.isTLS = true;
|
|
1475
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
1476
|
-
console.log(`[${connectionId}] Extracting SNI from TLS handshake, ${chunk.length} bytes`);
|
|
1477
|
-
}
|
|
1478
|
-
// Check for session tickets if allowSessionTicket is disabled
|
|
1479
|
-
if (this.settings.allowSessionTicket === false && SniHandler.isClientHello(chunk)) {
|
|
1480
|
-
// Analyze for session resumption attempt
|
|
1481
|
-
const resumptionInfo = SniHandler.hasSessionResumption(chunk, this.settings.enableTlsDebugLogging);
|
|
1482
|
-
if (resumptionInfo.isResumption) {
|
|
1483
|
-
// Always log resumption attempt for easier debugging
|
|
1484
|
-
// Try to extract SNI for logging
|
|
1485
|
-
const extractedSNI = SniHandler.extractSNI(chunk, this.settings.enableTlsDebugLogging);
|
|
1486
|
-
console.log(`[${connectionId}] Session resumption detected in SNI handler. ` +
|
|
1487
|
-
`Has SNI: ${resumptionInfo.hasSNI ? 'Yes' : 'No'}, ` +
|
|
1488
|
-
`SNI value: ${extractedSNI || 'None'}, ` +
|
|
1489
|
-
`allowSessionTicket: ${this.settings.allowSessionTicket}`);
|
|
1490
|
-
// Block if there's session resumption without SNI
|
|
1491
|
-
if (!resumptionInfo.hasSNI) {
|
|
1492
|
-
console.log(`[${connectionId}] Session resumption detected in SNI handler without SNI and allowSessionTicket=false. ` +
|
|
1493
|
-
`Terminating connection to force new TLS handshake.`);
|
|
1494
|
-
if (connectionRecord.incomingTerminationReason === null) {
|
|
1495
|
-
connectionRecord.incomingTerminationReason = 'session_ticket_blocked';
|
|
1496
|
-
this.incrementTerminationStat('incoming', 'session_ticket_blocked');
|
|
1497
|
-
}
|
|
1498
|
-
socket.end();
|
|
1499
|
-
this.cleanupConnection(connectionRecord, 'session_ticket_blocked');
|
|
1500
|
-
return;
|
|
1501
|
-
}
|
|
1502
|
-
else {
|
|
1503
|
-
if (this.settings.enableDetailedLogging) {
|
|
1504
|
-
console.log(`[${connectionId}] Session resumption with SNI detected in SNI handler. ` +
|
|
1505
|
-
`Allowing connection since SNI is present.`);
|
|
1506
|
-
}
|
|
1507
|
-
}
|
|
1508
|
-
}
|
|
1509
|
-
}
|
|
1510
|
-
// Create connection info object for SNI extraction
|
|
1511
|
-
const connInfo = {
|
|
1512
|
-
sourceIp: remoteIP,
|
|
1513
|
-
sourcePort: socket.remotePort || 0,
|
|
1514
|
-
destIp: socket.localAddress || '',
|
|
1515
|
-
destPort: socket.localPort || 0,
|
|
1516
|
-
};
|
|
1517
|
-
// Use the new processTlsPacket method for comprehensive handling
|
|
1518
|
-
serverName =
|
|
1519
|
-
SniHandler.processTlsPacket(chunk, connInfo, this.settings.enableTlsDebugLogging, connectionRecord.lockedDomain // Pass any previously negotiated domain as a hint
|
|
1520
|
-
) || '';
|
|
1521
|
-
}
|
|
1522
|
-
// Lock the connection to the negotiated SNI.
|
|
1523
|
-
connectionRecord.lockedDomain = serverName;
|
|
1524
|
-
if (this.settings.enableDetailedLogging) {
|
|
1525
|
-
console.log(`[${connectionId}] Received connection from ${remoteIP} with SNI: ${serverName || '(empty)'}`);
|
|
1526
|
-
}
|
|
1527
|
-
setupConnection(serverName, chunk);
|
|
1528
|
-
});
|
|
1529
|
-
}
|
|
1530
|
-
else {
|
|
1531
|
-
initialDataReceived = true;
|
|
1532
|
-
connectionRecord.hasReceivedInitialData = true;
|
|
1533
|
-
if (this.settings.defaultAllowedIPs &&
|
|
1534
|
-
this.settings.defaultAllowedIPs.length > 0 &&
|
|
1535
|
-
!isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
|
1536
|
-
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for non-SNI connection`);
|
|
1537
|
-
}
|
|
1538
|
-
setupConnection('');
|
|
1539
|
-
}
|
|
1540
|
-
}
|
|
1541
|
-
};
|
|
1542
|
-
// --- SETUP LISTENERS ---
|
|
1543
|
-
// Determine which ports to listen on.
|
|
1544
|
-
const listeningPorts = new Set();
|
|
1545
|
-
if (this.settings.globalPortRanges && this.settings.globalPortRanges.length > 0) {
|
|
1546
|
-
// Listen on every port defined by the global ranges.
|
|
1547
|
-
for (const range of this.settings.globalPortRanges) {
|
|
1548
|
-
for (let port = range.from; port <= range.to; port++) {
|
|
1549
|
-
listeningPorts.add(port);
|
|
1550
|
-
}
|
|
1551
|
-
}
|
|
1552
|
-
// Also ensure the default fromPort is listened to if it isn't already in the ranges.
|
|
1553
|
-
listeningPorts.add(this.settings.fromPort);
|
|
1554
|
-
}
|
|
1555
|
-
else {
|
|
1556
|
-
listeningPorts.add(this.settings.fromPort);
|
|
1557
|
-
}
|
|
1558
|
-
// Create a server for each port.
|
|
1559
|
-
for (const port of listeningPorts) {
|
|
1560
|
-
const server = plugins.net.createServer(connectionHandler).on('error', (err) => {
|
|
1561
|
-
console.log(`Server Error on port ${port}: ${err.message}`);
|
|
1562
|
-
});
|
|
1563
|
-
server.listen(port, () => {
|
|
1564
|
-
const isNetworkProxyPort = this.settings.useNetworkProxy?.includes(port);
|
|
1565
|
-
console.log(`PortProxy -> OK: Now listening on port ${port}${this.settings.sniEnabled && !isNetworkProxyPort ? ' (SNI passthrough enabled)' : ''}${isNetworkProxyPort ? ' (NetworkProxy forwarding enabled)' : ''}`);
|
|
1566
|
-
});
|
|
1567
|
-
this.netServers.push(server);
|
|
1568
|
-
}
|
|
1569
|
-
// Log active connection count, longest running durations, and run parity checks periodically
|
|
1570
|
-
this.connectionLogger = setInterval(() => {
|
|
1571
|
-
// Immediately return if shutting down
|
|
1572
|
-
if (this.isShuttingDown)
|
|
1573
|
-
return;
|
|
1574
|
-
const now = Date.now();
|
|
1575
|
-
let maxIncoming = 0;
|
|
1576
|
-
let maxOutgoing = 0;
|
|
1577
|
-
let tlsConnections = 0;
|
|
1578
|
-
let nonTlsConnections = 0;
|
|
1579
|
-
let completedTlsHandshakes = 0;
|
|
1580
|
-
let pendingTlsHandshakes = 0;
|
|
1581
|
-
let keepAliveConnections = 0;
|
|
1582
|
-
let networkProxyConnections = 0;
|
|
1583
|
-
let domainSwitchedConnections = 0;
|
|
1584
|
-
// Create a copy of the keys to avoid modification during iteration
|
|
1585
|
-
const connectionIds = [...this.connectionRecords.keys()];
|
|
1586
|
-
for (const id of connectionIds) {
|
|
1587
|
-
const record = this.connectionRecords.get(id);
|
|
1588
|
-
if (!record)
|
|
1589
|
-
continue;
|
|
1590
|
-
// Track connection stats
|
|
1591
|
-
if (record.isTLS) {
|
|
1592
|
-
tlsConnections++;
|
|
1593
|
-
if (record.tlsHandshakeComplete) {
|
|
1594
|
-
completedTlsHandshakes++;
|
|
1595
|
-
}
|
|
1596
|
-
else {
|
|
1597
|
-
pendingTlsHandshakes++;
|
|
1598
|
-
}
|
|
1599
|
-
}
|
|
1600
|
-
else {
|
|
1601
|
-
nonTlsConnections++;
|
|
1602
|
-
}
|
|
1603
|
-
if (record.hasKeepAlive) {
|
|
1604
|
-
keepAliveConnections++;
|
|
1605
|
-
}
|
|
1606
|
-
if (record.usingNetworkProxy) {
|
|
1607
|
-
networkProxyConnections++;
|
|
1608
|
-
}
|
|
1609
|
-
if (record.domainSwitches && record.domainSwitches > 0) {
|
|
1610
|
-
domainSwitchedConnections++;
|
|
1611
|
-
}
|
|
1612
|
-
maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
|
|
1613
|
-
if (record.outgoingStartTime) {
|
|
1614
|
-
maxOutgoing = Math.max(maxOutgoing, now - record.outgoingStartTime);
|
|
1615
|
-
}
|
|
1616
|
-
// Parity check: if outgoing socket closed and incoming remains active
|
|
1617
|
-
if (record.outgoingClosedTime &&
|
|
1618
|
-
!record.incoming.destroyed &&
|
|
1619
|
-
!record.connectionClosed &&
|
|
1620
|
-
now - record.outgoingClosedTime > 120000) {
|
|
1621
|
-
const remoteIP = record.remoteIP;
|
|
1622
|
-
console.log(`[${id}] Parity check: Incoming socket for ${remoteIP} still active ${plugins.prettyMs(now - record.outgoingClosedTime)} after outgoing closed.`);
|
|
1623
|
-
this.cleanupConnection(record, 'parity_check');
|
|
1624
|
-
}
|
|
1625
|
-
// Check for stalled connections waiting for initial data
|
|
1626
|
-
if (!record.hasReceivedInitialData &&
|
|
1627
|
-
now - record.incomingStartTime > this.settings.initialDataTimeout / 2) {
|
|
1628
|
-
console.log(`[${id}] Warning: Connection from ${record.remoteIP} has not received initial data after ${plugins.prettyMs(now - record.incomingStartTime)}`);
|
|
1629
|
-
}
|
|
1630
|
-
// Skip inactivity check if disabled or for immortal keep-alive connections
|
|
1631
|
-
if (!this.settings.disableInactivityCheck &&
|
|
1632
|
-
!(record.hasKeepAlive && this.settings.keepAliveTreatment === 'immortal')) {
|
|
1633
|
-
const inactivityTime = now - record.lastActivity;
|
|
1634
|
-
// Use extended timeout for extended-treatment keep-alive connections
|
|
1635
|
-
let effectiveTimeout = this.settings.inactivityTimeout;
|
|
1636
|
-
if (record.hasKeepAlive && this.settings.keepAliveTreatment === 'extended') {
|
|
1637
|
-
const multiplier = this.settings.keepAliveInactivityMultiplier || 6;
|
|
1638
|
-
effectiveTimeout = effectiveTimeout * multiplier;
|
|
1639
|
-
}
|
|
1640
|
-
if (inactivityTime > effectiveTimeout && !record.connectionClosed) {
|
|
1641
|
-
// For keep-alive connections, issue a warning first
|
|
1642
|
-
if (record.hasKeepAlive && !record.inactivityWarningIssued) {
|
|
1643
|
-
console.log(`[${id}] Warning: Keep-alive connection from ${record.remoteIP} inactive for ${plugins.prettyMs(inactivityTime)}. ` +
|
|
1644
|
-
`Will close in 10 minutes if no activity.`);
|
|
1645
|
-
// Set warning flag and add grace period
|
|
1646
|
-
record.inactivityWarningIssued = true;
|
|
1647
|
-
record.lastActivity = now - (effectiveTimeout - 600000);
|
|
1648
|
-
// Try to stimulate activity with a probe packet
|
|
1649
|
-
if (record.outgoing && !record.outgoing.destroyed) {
|
|
1650
|
-
try {
|
|
1651
|
-
record.outgoing.write(Buffer.alloc(0));
|
|
1652
|
-
if (this.settings.enableDetailedLogging) {
|
|
1653
|
-
console.log(`[${id}] Sent probe packet to test keep-alive connection`);
|
|
1654
|
-
}
|
|
1655
|
-
}
|
|
1656
|
-
catch (err) {
|
|
1657
|
-
console.log(`[${id}] Error sending probe packet: ${err}`);
|
|
1658
|
-
}
|
|
1659
|
-
}
|
|
1660
|
-
}
|
|
1661
|
-
else {
|
|
1662
|
-
// For non-keep-alive or after warning, close the connection
|
|
1663
|
-
console.log(`[${id}] Inactivity check: No activity on connection from ${record.remoteIP} ` +
|
|
1664
|
-
`for ${plugins.prettyMs(inactivityTime)}.` +
|
|
1665
|
-
(record.hasKeepAlive ? ' Despite keep-alive being enabled.' : ''));
|
|
1666
|
-
this.cleanupConnection(record, 'inactivity');
|
|
1667
|
-
}
|
|
1668
|
-
}
|
|
1669
|
-
else if (inactivityTime <= effectiveTimeout && record.inactivityWarningIssued) {
|
|
1670
|
-
// If activity detected after warning, clear the warning
|
|
1671
|
-
if (this.settings.enableDetailedLogging) {
|
|
1672
|
-
console.log(`[${id}] Connection activity detected after inactivity warning, resetting warning`);
|
|
1673
|
-
}
|
|
1674
|
-
record.inactivityWarningIssued = false;
|
|
1675
|
-
}
|
|
1676
|
-
}
|
|
1677
|
-
}
|
|
1678
|
-
// Log detailed stats periodically
|
|
1679
|
-
console.log(`Active connections: ${this.connectionRecords.size}. ` +
|
|
1680
|
-
`Types: TLS=${tlsConnections} (Completed=${completedTlsHandshakes}, Pending=${pendingTlsHandshakes}), ` +
|
|
1681
|
-
`Non-TLS=${nonTlsConnections}, KeepAlive=${keepAliveConnections}, NetworkProxy=${networkProxyConnections}, ` +
|
|
1682
|
-
`DomainSwitched=${domainSwitchedConnections}. ` +
|
|
1683
|
-
`Longest running: IN=${plugins.prettyMs(maxIncoming)}, OUT=${plugins.prettyMs(maxOutgoing)}. ` +
|
|
1684
|
-
`Termination stats: ${JSON.stringify({
|
|
1685
|
-
IN: this.terminationStats.incoming,
|
|
1686
|
-
OUT: this.terminationStats.outgoing,
|
|
1687
|
-
})}`);
|
|
1688
|
-
}, this.settings.inactivityCheckInterval || 60000);
|
|
1689
|
-
// Make sure the interval doesn't keep the process alive
|
|
1690
|
-
if (this.connectionLogger.unref) {
|
|
1691
|
-
this.connectionLogger.unref();
|
|
1692
|
-
}
|
|
1693
|
-
}
|
|
1694
|
-
/**
|
|
1695
|
-
* Gracefully shut down the proxy
|
|
1696
|
-
*/
|
|
1697
|
-
async stop() {
|
|
1698
|
-
console.log('PortProxy shutting down...');
|
|
1699
|
-
this.isShuttingDown = true;
|
|
1700
|
-
// Stop accepting new connections
|
|
1701
|
-
const closeServerPromises = this.netServers.map((server) => new Promise((resolve) => {
|
|
1702
|
-
if (!server.listening) {
|
|
1703
|
-
resolve();
|
|
1704
|
-
return;
|
|
1705
|
-
}
|
|
1706
|
-
server.close((err) => {
|
|
1707
|
-
if (err) {
|
|
1708
|
-
console.log(`Error closing server: ${err.message}`);
|
|
1709
|
-
}
|
|
1710
|
-
resolve();
|
|
1711
|
-
});
|
|
1712
|
-
}));
|
|
1713
|
-
// Stop the connection logger
|
|
1714
|
-
if (this.connectionLogger) {
|
|
1715
|
-
clearInterval(this.connectionLogger);
|
|
1716
|
-
this.connectionLogger = null;
|
|
1717
|
-
}
|
|
1718
|
-
// Wait for servers to close
|
|
1719
|
-
await Promise.all(closeServerPromises);
|
|
1720
|
-
console.log('All servers closed. Cleaning up active connections...');
|
|
1721
|
-
// Force destroy all active connections immediately
|
|
1722
|
-
const connectionIds = [...this.connectionRecords.keys()];
|
|
1723
|
-
console.log(`Cleaning up ${connectionIds.length} active connections...`);
|
|
1724
|
-
// First pass: End all connections gracefully
|
|
1725
|
-
for (const id of connectionIds) {
|
|
1726
|
-
const record = this.connectionRecords.get(id);
|
|
1727
|
-
if (record) {
|
|
1728
|
-
try {
|
|
1729
|
-
// Clear any timers
|
|
1730
|
-
if (record.cleanupTimer) {
|
|
1731
|
-
clearTimeout(record.cleanupTimer);
|
|
1732
|
-
record.cleanupTimer = undefined;
|
|
1733
|
-
}
|
|
1734
|
-
// End sockets gracefully
|
|
1735
|
-
if (record.incoming && !record.incoming.destroyed) {
|
|
1736
|
-
record.incoming.end();
|
|
1737
|
-
}
|
|
1738
|
-
if (record.outgoing && !record.outgoing.destroyed) {
|
|
1739
|
-
record.outgoing.end();
|
|
1740
|
-
}
|
|
1741
|
-
}
|
|
1742
|
-
catch (err) {
|
|
1743
|
-
console.log(`Error during graceful connection end for ${id}: ${err}`);
|
|
1744
|
-
}
|
|
1745
|
-
}
|
|
1746
|
-
}
|
|
1747
|
-
// Short delay to allow graceful ends to process
|
|
1748
|
-
await new Promise((resolve) => setTimeout(resolve, 100));
|
|
1749
|
-
// Second pass: Force destroy everything
|
|
1750
|
-
for (const id of connectionIds) {
|
|
1751
|
-
const record = this.connectionRecords.get(id);
|
|
1752
|
-
if (record) {
|
|
1753
|
-
try {
|
|
1754
|
-
// Remove all listeners to prevent memory leaks
|
|
1755
|
-
if (record.incoming) {
|
|
1756
|
-
record.incoming.removeAllListeners();
|
|
1757
|
-
if (!record.incoming.destroyed) {
|
|
1758
|
-
record.incoming.destroy();
|
|
1759
|
-
}
|
|
1760
|
-
}
|
|
1761
|
-
if (record.outgoing) {
|
|
1762
|
-
record.outgoing.removeAllListeners();
|
|
1763
|
-
if (!record.outgoing.destroyed) {
|
|
1764
|
-
record.outgoing.destroy();
|
|
1765
|
-
}
|
|
1766
|
-
}
|
|
1767
|
-
}
|
|
1768
|
-
catch (err) {
|
|
1769
|
-
console.log(`Error during forced connection destruction for ${id}: ${err}`);
|
|
1770
|
-
}
|
|
1771
|
-
}
|
|
1772
|
-
}
|
|
1773
|
-
// Stop NetworkProxy if it was started (which also stops ACME manager)
|
|
1774
|
-
if (this.networkProxy) {
|
|
1775
|
-
try {
|
|
1776
|
-
console.log('Stopping NetworkProxy...');
|
|
1777
|
-
await this.networkProxy.stop();
|
|
1778
|
-
console.log('NetworkProxy stopped successfully');
|
|
1779
|
-
// Log ACME shutdown if it was enabled
|
|
1780
|
-
if (this.settings.acme?.enabled) {
|
|
1781
|
-
console.log('ACME certificate manager stopped');
|
|
1782
|
-
}
|
|
1783
|
-
}
|
|
1784
|
-
catch (err) {
|
|
1785
|
-
console.log(`Error stopping NetworkProxy: ${err}`);
|
|
1786
|
-
}
|
|
1787
|
-
}
|
|
1788
|
-
// Clear all tracking maps
|
|
1789
|
-
this.connectionRecords.clear();
|
|
1790
|
-
this.domainTargetIndices.clear();
|
|
1791
|
-
this.connectionsByIP.clear();
|
|
1792
|
-
this.connectionRateByIP.clear();
|
|
1793
|
-
this.netServers = [];
|
|
1794
|
-
// Reset termination stats
|
|
1795
|
-
this.terminationStats = {
|
|
1796
|
-
incoming: {},
|
|
1797
|
-
outgoing: {},
|
|
1798
|
-
};
|
|
1799
|
-
console.log('PortProxy shutdown complete.');
|
|
1800
|
-
}
|
|
1801
|
-
}
|
|
1802
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.portproxy.js","sourceRoot":"","sources":["../ts/classes.portproxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,cAAc,CAAC;AACxC,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,UAAU,EAAE,MAAM,yBAAyB,CAAC;AA2HrD,uDAAuD;AACvD,gCAAgC;AAEhC,oEAAoE;AACpE,MAAM,cAAc,GAAG,CAAC,IAAY,EAAE,MAA2C,EAAW,EAAE;IAC5F,OAAO,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,IAAI,IAAI,KAAK,CAAC,IAAI,IAAI,IAAI,IAAI,KAAK,CAAC,EAAE,CAAC,CAAC;AACxE,CAAC,CAAC;AAEF,+DAA+D;AAC/D,MAAM,SAAS,GAAG,CAAC,EAAU,EAAE,QAAkB,EAAW,EAAE;IAC5D,IAAI,CAAC,EAAE,IAAI,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO,KAAK,CAAC;IAE5D,MAAM,WAAW,GAAG,CAAC,EAAU,EAAY,EAAE;QAC3C,IAAI,CAAC,EAAE;YAAE,OAAO,EAAE,CAAC;QACnB,IAAI,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;YAC7B,MAAM,IAAI,GAAG,EAAE,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YACzB,OAAO,CAAC,EAAE,EAAE,IAAI,CAAC,CAAC;QACpB,CAAC;QACD,IAAI,yBAAyB,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;YACvC,OAAO,CAAC,EAAE,EAAE,UAAU,EAAE,EAAE,CAAC,CAAC;QAC9B,CAAC;QACD,OAAO,CAAC,EAAE,CAAC,CAAC;IACd,CAAC,CAAC;IAEF,MAAM,oBAAoB,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC7C,IAAI,oBAAoB,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO,KAAK,CAAC;IAEpD,MAAM,gBAAgB,GAAG,QAAQ,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;IACvD,OAAO,oBAAoB,CAAC,IAAI,CAAC,CAAC,SAAS,EAAE,EAAE,CAC7C,gBAAgB,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAC1E,CAAC;AACJ,CAAC,CAAC;AAEF,kFAAkF;AAClF,MAAM,eAAe,GAAG,CAAC,EAAU,EAAE,OAAiB,EAAE,UAAoB,EAAE,EAAW,EAAE;IACzF,IAAI,CAAC,EAAE;QAAE,OAAO,KAAK,CAAC;IACtB,IAAI,OAAO,CAAC,MAAM,GAAG,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,OAAO,CAAC;QAAE,OAAO,KAAK,CAAC;IAC/D,OAAO,SAAS,CAAC,EAAE,EAAE,OAAO,CAAC,CAAC;AAChC,CAAC,CAAC;AAEF,0CAA0C;AAC1C,MAAM,oBAAoB,GAAG,GAAW,EAAE;IACxC,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;AACnG,CAAC,CAAC;AAEF,uDAAuD;AAEvD,sEAAsE;AACtE,MAAM,iBAAiB,GAAG,CAAC,OAAe,EAAU,EAAE;IACpD,MAAM,gBAAgB,GAAG,UAAU,CAAC,CAAC,gCAAgC;IACrE,OAAO,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,gBAAgB,CAAC,CAAC;AACzD,CAAC,CAAC;AAEF,4EAA4E;AAC5E,MAAM,gBAAgB,GAAG,CAAC,WAAmB,EAAE,mBAA2B,CAAC,EAAU,EAAE;IACrF,MAAM,eAAe,GAAG,iBAAiB,CAAC,WAAW,CAAC,CAAC;IACvD,MAAM,SAAS,GAAG,eAAe,GAAG,CAAC,gBAAgB,GAAG,GAAG,CAAC,CAAC;IAC7D,OAAO,iBAAiB,CAAC,eAAe,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,SAAS,GAAG,CAAC,CAAC,GAAG,SAAS,CAAC,CAAC;AACpG,CAAC,CAAC;AAEF,MAAM,OAAO,SAAS;IA0BpB,YAAY,WAA+B;QAzBnC,eAAU,GAAyB,EAAE,CAAC;QAEtC,sBAAiB,GAAmC,IAAI,GAAG,EAAE,CAAC;QAC9D,qBAAgB,GAA0B,IAAI,CAAC;QAC/C,mBAAc,GAAY,KAAK,CAAC;QAExC,0DAA0D;QAClD,wBAAmB,GAA+B,IAAI,GAAG,EAAE,CAAC;QAEpE,0BAA0B;QAClB,qBAAgB,GAGpB;YACF,QAAQ,EAAE,EAAE;YACZ,QAAQ,EAAE,EAAE;SACb,CAAC;QAEF,8CAA8C;QACtC,oBAAe,GAA6B,IAAI,GAAG,EAAE,CAAC;QACtD,uBAAkB,GAA0B,IAAI,GAAG,EAAE,CAAC;QAE9D,4CAA4C;QACpC,iBAAY,GAAwB,IAAI,CAAC;QAG/C,2CAA2C;QAC3C,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,WAAW;YACd,QAAQ,EAAE,WAAW,CAAC,QAAQ,IAAI,WAAW;YAE7C,4CAA4C;YAC5C,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,MAAM,EAAE,oCAAoC;YAClG,aAAa,EAAE,iBAAiB,CAAC,WAAW,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,wBAAwB;YAChG,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK,EAAE,sBAAsB;YAC7F,qBAAqB,EAAE,iBAAiB,CAAC,WAAW,CAAC,qBAAqB,IAAI,QAAQ,CAAC,EAAE,mBAAmB;YAC5G,iBAAiB,EAAE,iBAAiB,CAAC,WAAW,CAAC,iBAAiB,IAAI,QAAQ,CAAC,EAAE,6BAA6B;YAE9G,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK,EAAE,aAAa;YAEpF,+BAA+B;YAC/B,OAAO,EAAE,WAAW,CAAC,OAAO,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI;YACvE,SAAS,EAAE,WAAW,CAAC,SAAS,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YAC7E,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK,EAAE,aAAa;YAChF,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;YAE/E,gBAAgB;YAChB,sBAAsB,EAAE,WAAW,CAAC,sBAAsB,IAAI,KAAK;YACnE,qBAAqB,EACnB,WAAW,CAAC,qBAAqB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,qBAAqB,CAAC,CAAC,CAAC,IAAI;YAC5F,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,wBAAwB,EAAE,WAAW,CAAC,wBAAwB,IAAI,KAAK;YACvE,kBAAkB,EAChB,WAAW,CAAC,kBAAkB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,kBAAkB,CAAC,CAAC,CAAC,IAAI;YAEtF,yBAAyB;YACzB,mBAAmB,EAAE,WAAW,CAAC,mBAAmB,IAAI,GAAG;YAC3D,4BAA4B,EAAE,WAAW,CAAC,4BAA4B,IAAI,GAAG;YAE7E,+BAA+B;YAC/B,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,UAAU;YAChE,6BAA6B,EAAE,WAAW,CAAC,6BAA6B,IAAI,CAAC;YAC7E,yBAAyB,EAAE,WAAW,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,SAAS;YAEtG,wBAAwB;YACxB,gBAAgB,EAAE,WAAW,CAAC,gBAAgB,IAAI,IAAI,EAAE,4BAA4B;YAEpF,qDAAqD;YACrD,IAAI,EAAE,WAAW,CAAC,IAAI,IAAI;gBACxB,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,EAAE;gBACR,YAAY,EAAE,mBAAmB;gBACjC,aAAa,EAAE,KAAK;gBACpB,kBAAkB,EAAE,EAAE;gBACtB,SAAS,EAAE,IAAI;gBACf,gBAAgB,EAAE,SAAS;gBAC3B,mBAAmB,EAAE,KAAK;aAC3B;SACF,CAAC;QAEF,qCAAqC;QACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC9E,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB;QAClC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,6DAA6D;YAC7D,MAAM,mBAAmB,GAAQ;gBAC/B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAiB;gBACrC,oBAAoB,EAAE,IAAI;gBAC1B,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM;aACjE,CAAC;YAEF,kCAAkC;YAClC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACvB,mBAAmB,CAAC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvD,CAAC;YAED,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC,mBAAmB,CAAC,CAAC;YAE1D,OAAO,CAAC,GAAG,CAAC,oCAAoC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAElF,0DAA0D;YAC1D,MAAM,IAAI,CAAC,+BAA+B,EAAE,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,mBAAmB,CAAC,gBAAiC;QAChE,OAAO,CAAC,GAAG,CAAC,mCAAmC,gBAAgB,CAAC,MAAM,WAAW,CAAC,CAAC;QACnF,IAAI,CAAC,QAAQ,CAAC,aAAa,GAAG,gBAAgB,CAAC;QAE/C,4DAA4D;QAC5D,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,+BAA+B,EAAE,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,kBAAkB,CAAC,YAAwC;QACtE,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;QAElD,kBAAkB;QAClB,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG;YACnB,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI;YACrB,GAAG,YAAY;SAChB,CAAC;QAEF,2DAA2D;QAC3D,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,4EAA4E;gBAC5E,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,KAAK,YAAY,CAAC,OAAO,EAAE,CAAC;oBACxD,OAAO,CAAC,GAAG,CAAC,kCAAkC,YAAY,CAAC,OAAO,EAAE,CAAC,CAAC;oBAEtE,gCAAgC;oBAChC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;oBAC/B,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;oBAEzB,iCAAiC;oBACjC,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBAEpC,kEAAkE;oBAClE,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;gBAClC,CAAC;qBAAM,CAAC;oBACN,iDAAiD;oBACjD,2DAA2D;oBAC3D,OAAO,CAAC,GAAG,CAAC,wCAAwC,CAAC,CAAC;oBAEtD,kFAAkF;oBAClF,IAAI,YAAY,CAAC,kBAAkB,EAAE,CAAC;wBACpC,OAAO,CAAC,GAAG,CAAC,oCAAoC,YAAY,CAAC,kBAAkB,OAAO,CAAC,CAAC;wBACxF,wDAAwD;wBACxD,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;4BACnC,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,kBAAkB,GAAG,YAAY,CAAC,kBAAkB,CAAC;wBACtF,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACtD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,+BAA+B;QAC3C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,mCAAmC;YACnC,+CAA+C;YAC/C,MAAM,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;YAE9B,IAAI,QAAQ,CAAC;YACb,IAAI,CAAC;gBACH,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,sBAAsB,EAAE,MAAM,CAAC;oBACpD,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,uBAAuB,EAAE,MAAM,CAAC;iBACvD,CAAC;YACJ,CAAC;YAAC,OAAO,SAAS,EAAE,CAAC;gBACnB,OAAO,CAAC,GAAG,CAAC,iDAAiD,SAAS,EAAE,CAAC,CAAC;gBAC1E,OAAO,CAAC,GAAG,CACT,0FAA0F,CAC3F,CAAC;gBAEF,uEAAuE;gBACvE,+CAA+C;gBAC/C,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE;oBACP,IAAI,EAAE,EAAE;iBACT,CAAC;YACJ,CAAC;YAED,iDAAiD;YACjD,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,uBAAuB,CAC5D,IAAI,CAAC,QAAQ,CAAC,aAAa,EAC3B,QAAQ,CACT,CAAC;YAEF,+CAA+C;YAC/C,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;gBAChC,MAAM,mBAAmB,GAAG,YAAY;qBACrC,MAAM,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,oBAAoB;qBACvE,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAEpC,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACnC,OAAO,CAAC,GAAG,CAAC,2CAA2C,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAC3F,CAAC;qBAAM,CAAC;oBACN,OAAO,CAAC,GAAG,CAAC,kEAAkE,CAAC,CAAC;gBAClF,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,IAAI,CAAC,YAAY;iBACd,kBAAkB,CAAC,YAAY,CAAC;iBAChC,IAAI,CAAC,GAAG,EAAE;gBACT,OAAO,CAAC,GAAG,CACT,6BAA6B,YAAY,CAAC,MAAM,wCAAwC,CACzF,CAAC;YACJ,CAAC,CAAC;iBACD,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;gBACb,OAAO,CAAC,GAAG,CAAC,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACpE,CAAC,CAAC,CAAC;QACP,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAClE,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,yBAAyB,CAAC,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,SAAS,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACK,qBAAqB,CAC3B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,WAAmB,EACnB,eAAwB;QAExB,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mEAAmE,CACpF,CAAC;YACF,iCAAiC;YACjC,OAAO,IAAI,CAAC,qBAAqB,CAC/B,YAAY,EACZ,MAAM,EACN,MAAM,EACN,SAAS,EACT,SAAS,EACT,WAAW,CACZ,CAAC;QACJ,CAAC;QAED,+EAA+E;QAC/E,MAAM,SAAS,GAAG,eAAe,IAAI,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC;QAC1E,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,qCAAqC;QAEpE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD,SAAS,IAAI,SAAS,EAAE,CAC3F,CAAC;QACJ,CAAC;QAED,0CAA0C;QAC1C,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YACtC,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,SAAS;SAChB,CAAC,CAAC;QAEH,0CAA0C;QAC1C,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC;QAC9B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtC,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAEhC,wBAAwB;QACxB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YAC9B,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClF,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,6BAA6B,CAAC,CAAC;QAChE,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,WAAW,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,SAAS,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,gEAAgE;YAChE,WAAW,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAE/B,kEAAkE;YAClE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACzB,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEzB,yBAAyB;YACzB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,CAAC,CAAC;gBAClE,CAAC;gBACD,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,sBAAsB,CAAC,CAAC;YACzD,CAAC,CAAC,CAAC;YAEH,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBACtB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6DAA6D,CAC9E,CAAC;gBACJ,CAAC;gBACD,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;YAClD,CAAC,CAAC,CAAC;YAEH,mCAAmC;YACnC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC;YACrD,WAAW,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC;YAE1D,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yDAAyD,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACK,qBAAqB,CAC3B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,YAAuC,EACvC,UAAmB,EACnB,YAAqB,EACrB,YAAqB;QAErB,kCAAkC;QAClC,MAAM,UAAU,GAAG,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;QAC3F,MAAM,iBAAiB,GAA+B;YACpD,IAAI,EAAE,UAAU;YAChB,IAAI,EAAE,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM;SACvE,CAAC;QACF,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACnC,iBAAiB,CAAC,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,6DAA6D;QAC7D,yEAAyE;QACzE,MAAM,SAAS,GAAa,EAAE,CAAC;QAC/B,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,IAAI,eAAe,GAAG,KAAK,CAAC;QAC5B,IAAI,YAAY,GAAG,KAAK,CAAC;QAEzB,gEAAgE;QAChE,2DAA2D;QAC3D,IAAI,iBAAiB,GAAG,KAAK,CAAC;QAE9B,wDAAwD;QACxD,kEAAkE;QAClE,MAAM,CAAC,KAAK,EAAE,CAAC;QAEf,kEAAkE;QAClE,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,IAAI,eAAe,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,iBAAiB;gBAAE,OAAO;YAE3E,eAAe,GAAG,IAAI,CAAC;YAEvB,IAAI,CAAC;gBACH,4DAA4D;gBAC5D,OAAO,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,EAAG,CAAC;oBACjC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;oBAE1B,qDAAqD;oBACrD,yDAAyD;oBACzD,IAAI,iBAAiB,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACzC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBAC7B,SAAS;oBACX,CAAC;oBAED,uBAAuB;oBACvB,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAErC,0BAA0B;oBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBACtD,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;wBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,KAAK,CAAC,MAAM,QAAQ,CACrF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,2DAA2D;oBAC3D,MAAM,OAAO,GAAG,MAAM,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC;oBAEtD,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACnF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,QAAQ,KAAK,OAAO,YAAY,IAAI,CAAC,QAAQ,CAAC,kBAAkB,QAAQ,CAC/I,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,8BAA8B;wBAC5C,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;wBAC1D,OAAO;oBACT,CAAC;oBAED,+CAA+C;oBAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;oBAC5C,MAAM,CAAC,eAAe,GAAG,OAAO,CAAC;oBACjC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBAC9B,CAAC;YACH,CAAC;oBAAS,CAAC;gBACT,eAAe,GAAG,KAAK,CAAC;gBAExB,6DAA6D;gBAC7D,wEAAwE;gBACxE,IAAI,YAAY,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;oBACjE,YAAY,GAAG,KAAK,CAAC;oBACrB,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,wDAAwD;QACxD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,gEAAgE;YAChE,IAAI,iBAAiB;gBAAE,OAAO;YAE9B,0CAA0C;YAC1C,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,yBAAyB;YAC7D,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YAE1B,4DAA4D;YAC5D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,GAAG,GAAG,EAAE,CAAC;gBAC3F,MAAM,CAAC,KAAK,EAAE,CAAC;gBACf,YAAY,GAAG,IAAI,CAAC;YACtB,CAAC;YAED,oBAAoB;YACpB,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC;QAEF,4BAA4B;QAC5B,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAEnC,+CAA+C;QAC/C,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;YACnD,MAAM,CAAC,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC;QAC/C,CAAC;QAED,+DAA+D;QAC/D,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;QAC5D,MAAM,CAAC,QAAQ,GAAG,YAAY,CAAC;QAC/B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEtC,6BAA6B;QAC7B,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE/C,+DAA+D;QAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,YAAY,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAErE,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,IAAI,oBAAoB,IAAI,YAAY,EAAE,CAAC;wBACxC,YAAoB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBAC/C,CAAC;oBACD,IAAI,sBAAsB,IAAI,YAAY,EAAE,CAAC;wBAC1C,YAAoB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACnD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gEAAgE,GAAG,EAAE,CACtF,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,YAAY,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YACjC,kEAAkE;YAClE,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+BAA+B,UAAU,IAAI,iBAAiB,CAAC,IAAI,KAAK,GAAG,CAAC,OAAO,KAAK,IAAI,GAAG,CAChH,CAAC;YAEF,wDAAwD;YACxD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC5B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,UAAU,IAAI,iBAAiB,CAAC,IAAI,qBAAqB,CACtF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,UAAU,UAAU,iBAAiB,CAAC,CAAC;YACrE,CAAC;YAED,0DAA0D;YAC1D,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,8DAA8D;YAC9D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAE/D,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,mBAAmB,CAAC;gBACvD,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,mBAAmB,CAAC,CAAC;YACjE,CAAC;YAED,0BAA0B;YAC1B,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,qBAAqB,IAAI,EAAE,CAAC,CAAC;QAChE,CAAC,CAAC,CAAC;QAEH,sBAAsB;QACtB,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAC/D,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAEzD,4CAA4C;QAC5C,MAAM,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YACxB,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,wCAAwC;gBACxC,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACvD,CAAC;YACD,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;QAEH,YAAY,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC9B,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,wCAAwC;gBACxC,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACvD,CAAC;YACD,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;QAEH,2EAA2E;QAC3E,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;YAC3E,uDAAuD;YACvD,MAAM,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;YACrB,YAAY,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+DAA+D,CAChF,CAAC;YACJ,CAAC;QACH,CAAC;aAAM,CAAC;YACN,4CAA4C;YAC5C,MAAM,CAAC,UAAU,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,CAAC,CAAC;YAC7E,YAAY,CAAC,UAAU,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,CAAC,CAAC;QACrF,CAAC;QAED,yCAAyC;QACzC,YAAY,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACxC,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YACjC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAC9B,CAAC,CAAC,CAAC;QAEH,wEAAwE;QACxE,YAAY,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;YAChC,6CAA6C;YAC7C,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,2DAA2D;YAC3D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAE/D,qEAAqE;YACrE,gBAAgB,EAAE,CAAC;YAEnB,4DAA4D;YAC5D,iBAAiB,GAAG,IAAI,CAAC;YAEzB,mCAAmC;YACnC,IAAI,MAAM,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClC,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;gBAEvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,gBAAgB,YAAY,CAAC,MAAM,kCAAkC,CAAC,CAAC;gBACrG,CAAC;gBAED,iCAAiC;gBACjC,YAAY,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC,GAAG,EAAE,EAAE;oBACvC,IAAI,GAAG,EAAE,CAAC;wBACR,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;wBACtF,OAAO,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;oBACzD,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,+CAA+C;gBAC/C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;gBACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAC7B,CAAC;YAED,qDAAqD;YACrD,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YAC1B,YAAY,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAE1B,qDAAqD;YACrD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,uDAAuD;YACvD,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzB,gEAAgE;gBAChE,KAAK,MAAM,KAAK,IAAI,SAAS,EAAE,CAAC;oBAC9B,YAAY,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;gBAC5B,CAAC;gBACD,kBAAkB;gBAClB,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;gBACrB,SAAS,GAAG,CAAC,CAAC;YAChB,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACvG,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE;oBACF,SAAS,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBAClC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE,CACL,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,2BAA2B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACrF,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE,CACL,CAAC;YACJ,CAAC;YAGD,kFAAkF;YAClF,qDAAqD;YACrD,IAAI,UAAU,EAAE,CAAC;gBACf,sEAAsE;gBACtE,MAAM,oBAAoB,GAAG,CAAC,UAAkB,EAAE,EAAE;oBAClD,oDAAoD;oBACpD,IAAI,UAAU,CAAC,aAAa,CAAC,UAAU,CAAC,EAAE,CAAC;wBACzC,IAAI,CAAC;4BACH,+BAA+B;4BAC/B,8DAA8D;4BAC9D,MAAM,QAAQ,GAAG;gCACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;gCACzB,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC;gCAC3C,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,YAAY,IAAI,EAAE;gCAC1C,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,SAAS,IAAI,CAAC;6BACzC,CAAC;4BAEF,8DAA8D;4BAC9D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;gCAC/C,iEAAiE;gCACjE,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CACpD,UAAU,EACV,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;gCAEF,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;oCAChC,qDAAqD;oCACrD,iCAAiC;oCACjC,MAAM,YAAY,GAAG,UAAU,CAAC,UAAU,CACxC,UAAU,EACV,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;oCACF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD;wCAChE,YAAY,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,IAAI;wCACpD,cAAc,YAAY,IAAI,MAAM,IAAI;wCACxC,uBAAuB,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAC5D,CAAC;oCAEF,kDAAkD;oCAClD,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,CAAC;wCAC3B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2FAA2F;4CACzG,oDAAoD,CACvD,CAAC;wCACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,wBAAwB,CAAC,CAAC;wCAC3D,OAAO;oCACT,CAAC;yCAAM,CAAC;wCACN,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4CACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2DAA2D;gDACzE,2CAA2C,CAC9C,CAAC;wCACJ,CAAC;oCACH,CAAC;gCACH,CAAC;4BACH,CAAC;4BAED,MAAM,MAAM,GAAG,UAAU,CAAC,+BAA+B,CACvD,UAAU,EACV,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;4BAEF,2BAA2B;4BAC3B,IAAI,CAAC,MAAM;gCAAE,OAAO;4BAEpB,gFAAgF;4BAChF,IAAI,MAAM,KAAK,MAAM,CAAC,YAAY,EAAE,CAAC;gCACnC,sDAAsD;gCACtD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,uCAAuC,MAAM,CAAC,YAAY,OAAO,MAAM,IAAI;oCACzF,+DAA+D,CAClE,CAAC;gCACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;4BACnD,CAAC;iCAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2CAA2C,MAAM,aAAa,CAC/E,CAAC;4BACJ,CAAC;wBACH,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCAAmC,GAAG,oCAAoC,CAC3F,CAAC;wBACJ,CAAC;oBACH,CAAC;gBACH,CAAC,CAAC;gBAEF,gFAAgF;gBAChF,MAAM,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;gBAEnD,gEAAgE;gBAChE,4EAA4E;gBAC5E,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAExC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD,UAAU,EAAE,CACtF,CAAC;oBACF,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wFAAwF,CACzG,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;YAED,4CAA4C;YAC5C,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YACpC,CAAC;YAED,yEAAyE;YACzE,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;gBAC3E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mEAAmE,CACpF,CAAC;gBACJ,CAAC;gBACD,4CAA4C;YAC9C,CAAC;YACD,4DAA4D;iBACvD,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;gBAChF,MAAM,eAAe,GAAG,IAAI,CAAC,QAAQ,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,SAAS;gBACrG,MAAM,WAAW,GAAG,iBAAiB,CAAC,eAAe,CAAC,CAAC;gBAEvD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC,GAAG,EAAE;oBACpC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCACd,MAAM,CAAC,QACT,gCAAgC,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAC,qBAAqB,CACvF,CAAC;oBACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,mBAAmB,CAAC,CAAC;gBACxD,CAAC,EAAE,WAAW,CAAC,CAAC;gBAEhB,mDAAmD;gBACnD,IAAI,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;oBAC9B,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;gBAC9B,CAAC;gBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qDAAqD,OAAO,CAAC,QAAQ,CACnF,eAAe,CAChB,EAAE,CACJ,CAAC;gBACJ,CAAC;YACH,CAAC;YACD,+CAA+C;iBAC1C,CAAC;gBACJ,kEAAkE;gBAClE,MAAM,iBAAiB,GACrB,MAAM,CAAC,YAAY,EAAE,iBAAiB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAsB,CAAC;gBACjF,MAAM,WAAW,GAAG,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;gBAEzD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC,GAAG,EAAE;oBACpC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBACd,MAAM,CAAC,QACT,2BAA2B,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAC,qBAAqB,CACpF,CAAC;oBACF,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBACzD,CAAC,EAAE,WAAW,CAAC,CAAC;gBAEhB,mDAAmD;gBACnD,IAAI,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;oBAC9B,MAAM,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;gBAC9B,CAAC;YACH,CAAC;YAED,qDAAqD;YACrD,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC;gBAEnC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,EAAU;QACvC,OAAO,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IACjD,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,EAAU;QACpC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,EAAE,GAAG,IAAI,CAAC;QAEzB,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;YACvC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,4DAA4D;QAC5D,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,CAAE,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,GAAG,GAAG,IAAI,GAAG,MAAM,CAAC,CAAC;QAC1F,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACrB,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,EAAE,UAAU,CAAC,CAAC;QAE5C,8BAA8B;QAC9B,OAAO,UAAU,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,4BAA6B,CAAC;IAC1E,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,EAAU,EAAE,YAAoB;QAC1D,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC;YAClC,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC1C,CAAC;QACD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAE,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,oBAAoB,CAAC,EAAU,EAAE,YAAoB;QAC3D,IAAI,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE,CAAC;YACjC,MAAM,WAAW,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAE,CAAC;YAClD,WAAW,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,WAAW,CAAC,IAAI,KAAK,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAClC,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,wBAAwB,CAAC,IAA6B,EAAE,MAAc;QAC5E,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC;IACvF,CAAC;IAED;;;;;OAKG;IACK,iBAAiB,CAAC,MAAyB,EAAE,SAAiB,QAAQ;QAC5E,IAAI,CAAC,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAC7B,MAAM,CAAC,gBAAgB,GAAG,IAAI,CAAC;YAE/B,+BAA+B;YAC/B,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,QAAQ,EAAE,MAAM,CAAC,EAAE,CAAC,CAAC;YAEtD,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;gBAClC,MAAM,CAAC,YAAY,GAAG,SAAS,CAAC;YAClC,CAAC;YAED,wBAAwB;YACxB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,MAAM,CAAC,iBAAiB,CAAC;YACvD,MAAM,aAAa,GAAG,MAAM,CAAC,aAAa,CAAC;YAC3C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;YAEnC,+FAA+F;YAC/F,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;gBACpB,IAAI,CAAC;oBACH,+BAA+B;oBAC/B,MAAM,CAAC,QAAQ,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;oBAE3C,+BAA+B;oBAC/B,MAAM,CAAC,oBAAoB,GAAG,SAAS,CAAC;gBAC1C,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,mCAAmC,GAAG,EAAE,CAAC,CAAC;gBACrE,CAAC;YACH,CAAC;YAED,IAAI,CAAC;gBACH,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;oBAC/B,wEAAwE;oBACxE,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACtB,MAAM,eAAe,GAAG,UAAU,CAAC,GAAG,EAAE;wBACtC,IAAI,CAAC;4BACH,IAAI,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gCACzC,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;4BAC5B,CAAC;wBACH,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;wBACzE,CAAC;oBACH,CAAC,EAAE,IAAI,CAAC,CAAC;oBAET,qDAAqD;oBACrD,IAAI,eAAe,CAAC,KAAK,EAAE,CAAC;wBAC1B,eAAe,CAAC,KAAK,EAAE,CAAC;oBAC1B,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,oCAAoC,GAAG,EAAE,CAAC,CAAC;gBACpE,IAAI,CAAC;oBACH,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAC/B,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;oBAC5B,CAAC;gBACH,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,UAAU,EAAE,CAAC,CAAC;gBAChF,CAAC;YACH,CAAC;YAED,IAAI,CAAC;gBACH,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;oBAClD,wEAAwE;oBACxE,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACtB,MAAM,eAAe,GAAG,UAAU,CAAC,GAAG,EAAE;wBACtC,IAAI,CAAC;4BACH,IAAI,MAAM,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gCAC5D,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;4BAC5B,CAAC;wBACH,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,GAAG,EAAE,CAAC,CAAC;wBACzE,CAAC;oBACH,CAAC,EAAE,IAAI,CAAC,CAAC;oBAET,qDAAqD;oBACrD,IAAI,eAAe,CAAC,KAAK,EAAE,CAAC;wBAC1B,eAAe,CAAC,KAAK,EAAE,CAAC;oBAC1B,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,oCAAoC,GAAG,EAAE,CAAC,CAAC;gBACpE,IAAI,CAAC;oBACH,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAClD,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;oBAC5B,CAAC;gBACH,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,uCAAuC,UAAU,EAAE,CAAC,CAAC;gBAChF,CAAC;YACH,CAAC;YAED,0CAA0C;YAC1C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;YACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAE3B,0CAA0C;YAC1C,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAEzC,yBAAyB;YACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,qBAAqB,MAAM,CAAC,QAAQ,YAAY,MAAM,CAAC,SAAS,gBAAgB,MAAM,IAAI;oBACrG,cAAc,OAAO,CAAC,QAAQ,CAC5B,QAAQ,CACT,eAAe,aAAa,UAAU,SAAS,IAAI;oBACpD,QAAQ,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBACjC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE;oBACF,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC,CAAC,sBAAsB,CAAC,CAAC,CAAC,EAAE,EAAE;oBAC3D,GAAG,MAAM,CAAC,cAAc,CAAC,CAAC,CAAC,sBAAsB,MAAM,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAClF,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,qBAAqB,MAAM,CAAC,QAAQ,gBAAgB,MAAM,0BAA0B,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAC/H,CAAC;YACJ,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,MAAyB;QAC9C,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEjC,+BAA+B;QAC/B,IAAI,MAAM,CAAC,uBAAuB,EAAE,CAAC;YACnC,MAAM,CAAC,uBAAuB,GAAG,KAAK,CAAC;QACzC,CAAC;IACH,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,YAA2B;QAC7C,IAAI,YAAY,CAAC,SAAS,IAAI,YAAY,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChE,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC;YACrE,MAAM,EAAE,GAAG,YAAY,CAAC,SAAS,CAAC,YAAY,GAAG,YAAY,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;YAChF,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,YAAY,EAAE,YAAY,GAAG,CAAC,CAAC,CAAC;YAC7D,OAAO,EAAE,CAAC;QACZ,CAAC;QACD,OAAO,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;IACjC,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,MAAyB,EAAE,SAAiB,QAAQ;QAC9E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,sCAAsC,MAAM,CAAC,QAAQ,KAAK,MAAM,GAAG,CAAC,CAAC;QAChG,CAAC;QAED,IACE,MAAM,CAAC,yBAAyB,KAAK,IAAI;YACzC,MAAM,CAAC,yBAAyB,KAAK,SAAS,EAC9C,CAAC;YACD,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;YAC1C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;QACpD,CAAC;QAED,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAA6B,EAAE,MAAyB;QAC1E,OAAO,CAAC,GAAU,EAAE,EAAE;YACpB,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,IAAI,MAAM,GAAG,OAAO,CAAC;YAErB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,MAAM,kBAAkB,GAAG,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC;YAC1D,MAAM,eAAe,GAAG,GAAG,GAAG,MAAM,CAAC,YAAY,CAAC;YAElD,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBAC1B,MAAM,GAAG,YAAY,CAAC;gBACtB,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,mBAAmB,IAAI,cAAc,MAAM,CAAC,QAAQ,KAC/D,GAAG,CAAC,OACN,eAAe,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,oBAAoB,OAAO,CAAC,QAAQ,CACrF,eAAe,CAChB,MAAM,CACR,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,MAAM,GAAG,WAAW,CAAC;gBACrB,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,kBAAkB,IAAI,cAAc,MAAM,CAAC,QAAQ,KAC9D,GAAG,CAAC,OACN,eAAe,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,oBAAoB,OAAO,CAAC,QAAQ,CACrF,eAAe,CAChB,MAAM,CACR,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,IAAI,MAAM,CAAC,EAAE,cAAc,IAAI,cAAc,MAAM,CAAC,QAAQ,KAC1D,GAAG,CAAC,OACN,eAAe,OAAO,CAAC,QAAQ,CAAC,kBAAkB,CAAC,oBAAoB,OAAO,CAAC,QAAQ,CACrF,eAAe,CAChB,MAAM,CACR,CAAC;YACJ,CAAC;YAED,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBACrE,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;gBAC1C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;YACpD,CAAC;iBAAM,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC5E,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;gBAC1C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;YACpD,CAAC;YAED,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC3C,CAAC,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAA6B,EAAE,MAAyB;QAC1E,OAAO,GAAG,EAAE;YACV,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,MAAM,CAAC,EAAE,0BAA0B,IAAI,cAAc,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBACrE,MAAM,CAAC,yBAAyB,GAAG,QAAQ,CAAC;gBAC5C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;YACtD,CAAC;iBAAM,IAAI,IAAI,KAAK,UAAU,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC5E,MAAM,CAAC,yBAAyB,GAAG,QAAQ,CAAC;gBAC5C,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;gBACpD,+CAA+C;gBAC/C,MAAM,CAAC,kBAAkB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACzC,CAAC;YAED,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,SAAS,GAAG,IAAI,CAAC,CAAC;QACrD,CAAC,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,uCAAuC;QACvC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,OAAO,CAAC,GAAG,CAAC,iDAAiD,CAAC,CAAC;YAC/D,OAAO;QACT,CAAC;QAED,gGAAgG;QAChG,IACE,IAAI,CAAC,QAAQ,CAAC,eAAe;YAC7B,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC;YACxC,CAAC,IAAI,CAAC,YAAY,EAClB,CAAC;YACD,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;QACtC,CAAC;QAED,mCAAmC;QACnC,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAE9E,kBAAkB;YAClB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,2CACE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,SACpD,QAAQ,CACT,CAAC;gBACF,OAAO,CAAC,GAAG,CAAC,sCAAsC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;gBAE7E,oDAAoD;gBACpD,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;oBAC5C,OAAO,CAAC,GAAG,CAAC,sDAAsD,CAAC,CAAC;oBACpE,oFAAoF;gBACtF,CAAC;YACH,CAAC;QACH,CAAC;QAED,+DAA+D;QAC/D,MAAM,iBAAiB,GAAG,CAAC,MAA0B,EAAE,EAAE;YACvD,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;gBACxB,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,OAAO,EAAE,CAAC;gBACjB,OAAO;YACT,CAAC;YAED,MAAM,QAAQ,GAAG,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC;YAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,IAAI,CAAC,CAAC,CAAC,kDAAkD;YAE3F,oBAAoB;YACpB,IACE,IAAI,CAAC,QAAQ,CAAC,mBAAmB;gBACjC,IAAI,CAAC,sBAAsB,CAAC,QAAQ,CAAC,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAC1E,CAAC;gBACD,OAAO,CAAC,GAAG,CACT,4BAA4B,QAAQ,iCAAiC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,YAAY,CACnH,CAAC;gBACF,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,OAAO,EAAE,CAAC;gBACjB,OAAO;YACT,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,4BAA4B,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACtF,OAAO,CAAC,GAAG,CACT,4BAA4B,QAAQ,4BAA4B,IAAI,CAAC,QAAQ,CAAC,4BAA4B,gBAAgB,CAC3H,CAAC;gBACF,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,OAAO,EAAE,CAAC;gBACjB,OAAO;YACT,CAAC;YAED,6BAA6B;YAC7B,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;YAEzC,2CAA2C;YAC3C,MAAM,YAAY,GAAG,oBAAoB,EAAE,CAAC;YAC5C,MAAM,gBAAgB,GAAsB;gBAC1C,EAAE,EAAE,YAAY;gBAChB,QAAQ,EAAE,MAAM;gBAChB,QAAQ,EAAE,IAAI;gBACd,iBAAiB,EAAE,IAAI,CAAC,GAAG,EAAE;gBAC7B,YAAY,EAAE,IAAI,CAAC,GAAG,EAAE;gBACxB,gBAAgB,EAAE,KAAK;gBACvB,WAAW,EAAE,EAAE;gBACf,eAAe,EAAE,CAAC;gBAElB,sCAAsC;gBACtC,aAAa,EAAE,CAAC;gBAChB,SAAS,EAAE,CAAC;gBACZ,QAAQ,EAAE,QAAQ;gBAClB,SAAS,EAAE,SAAS;gBACpB,KAAK,EAAE,KAAK;gBACZ,oBAAoB,EAAE,KAAK;gBAC3B,sBAAsB,EAAE,KAAK;gBAC7B,YAAY,EAAE,KAAK,EAAE,4CAA4C;gBACjE,yBAAyB,EAAE,IAAI;gBAC/B,yBAAyB,EAAE,IAAI;gBAE/B,mCAAmC;gBACnC,iBAAiB,EAAE,KAAK;gBAExB,yCAAyC;gBACzC,mBAAmB,EAAE,KAAK;gBAC1B,cAAc,EAAE,CAAC;aAClB,CAAC;YAEF,uCAAuC;YACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gBAC5B,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;gBAC/D,gBAAgB,CAAC,YAAY,GAAG,IAAI,CAAC,CAAC,uCAAuC;gBAE7E,mDAAmD;gBACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,IAAI,CAAC;wBACH,uDAAuD;wBACvD,IAAI,oBAAoB,IAAI,MAAM,EAAE,CAAC;4BAClC,MAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC,CAAC,0BAA0B;wBACpE,CAAC;wBACD,IAAI,sBAAsB,IAAI,MAAM,EAAE,CAAC;4BACpC,MAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,mCAAmC;wBACjF,CAAC;oBACH,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,kDAAkD;wBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qDAAqD,GAAG,EAAE,CAC3E,CAAC;wBACJ,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,yBAAyB;YACzB,IAAI,CAAC,mBAAmB,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC;YACjD,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE,gBAAgB,CAAC,CAAC;YAE3D,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yBAAyB,QAAQ,YAAY,SAAS,IAAI;oBACxE,eAAe,gBAAgB,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,IAAI;oBACzE,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CACvD,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,uBAAuB,QAAQ,YAAY,SAAS,yBAAyB,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAC3G,CAAC;YACJ,CAAC;YAED,wEAAwE;YACxE,6CAA6C;YAC7C,IAAI,qBAAqB,GACvB,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;YAErF,+DAA+D;YAE/D,IAAI,qBAAqB,EAAE,CAAC;gBAC1B,oFAAoF;gBACpF,IAAI,mBAAmB,GAAG,KAAK,CAAC;gBAEhC,4CAA4C;gBAC5C,IAAI,cAAc,GAA0B,UAAU,CAAC,GAAG,EAAE;oBAC1D,IAAI,CAAC,mBAAmB,EAAE,CAAC;wBACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,QAAQ,EAAE,CAAC,CAAC;wBAE9H,sDAAsD;wBACtD,UAAU,CAAC,GAAG,EAAE;4BACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;gCACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;gCAC/E,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;oCAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;gCAC/D,CAAC;gCACD,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;4BAC9D,CAAC;wBACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;oBACtC,CAAC;gBACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;gBAEtC,mDAAmD;gBACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;oBACzB,cAAc,CAAC,KAAK,EAAE,CAAC;gBACzB,CAAC;gBAED,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,gBAAgB,CAAC,CAAC,CAAC;gBAEnE,uEAAuE;gBACvE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;oBACpC,sDAAsD;oBACtD,IAAI,cAAc,EAAE,CAAC;wBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;wBAC7B,cAAc,GAAG,IAAI,CAAC;oBACxB,CAAC;oBAED,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;oBAE/C,wCAAwC;oBACxC,4CAA4C;oBAC5C,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;wBAC3D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C;4BAC3D,8EAA8E,CACjF,CAAC;wBACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;4BAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;wBAC/D,CAAC;wBACD,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;wBAC5D,OAAO;oBACT,CAAC;oBAED,2CAA2C;oBAC3C,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBACrC,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;wBAE9B,kEAAkE;wBAClE,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,IAAI,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;4BAClF,oBAAoB;4BACpB,MAAM,YAAY,GAAG,UAAU,CAAC,UAAU,CACxC,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;4BACF,MAAM,MAAM,GAAG,CAAC,CAAC,YAAY,CAAC;4BAE9B,yCAAyC;4BACzC,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CACpD,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;4BAEF,oCAAoC;4BACpC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D;gCAC1E,YAAY,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,IAAI;gCACrC,cAAc,YAAY,IAAI,MAAM,IAAI;gCACxC,2BAA2B,cAAc,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,EAAE,CAC1E,CAAC;4BAEF,mEAAmE;4BACnE,IAAI,cAAc,CAAC,YAAY,IAAI,CAAC,MAAM,EAAE,CAAC;gCAC3C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,iGAAiG;oCAC/G,oDAAoD,CACvD,CAAC;gCACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCACxD,gBAAgB,CAAC,yBAAyB,GAAG,wBAAwB,CAAC;oCACtE,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,wBAAwB,CAAC,CAAC;gCACtE,CAAC;gCACD,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,wBAAwB,CAAC,CAAC;gCACnE,OAAO;4BACT,CAAC;4BAED,sFAAsF;4BACtF,2DAA2D;4BAC3D,IAAI,CAAC,MAAM,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;gCACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mFAAmF;oCACjG,0DAA0D,CAC7D,CAAC;gCACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCACxD,gBAAgB,CAAC,yBAAyB,GAAG,gBAAgB,CAAC;oCAC9D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,gBAAgB,CAAC,CAAC;gCAC9D,CAAC;gCACD,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,gBAAgB,CAAC,CAAC;gCAC3D,OAAO;4BACT,CAAC;wBACH,CAAC;wBAED,+DAA+D;wBAC/D,MAAM,QAAQ,GAAG;4BACf,QAAQ,EAAE,QAAQ;4BAClB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;4BAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;4BACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;yBAChC,CAAC;wBAEF,iEAAiE;wBACjE,MAAM,UAAU,GAAG,UAAU,CAAC,gBAAgB,CAC5C,KAAK,EACL,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;wBAEF,IAAI,UAAU,EAAE,CAAC;4BACf,oEAAoE;4BACpE,MAAM,YAAY,GAAG,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,EAAE,CAC/D,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC,CAC7D,CAAC;4BAEF,kDAAkD;4BAClD,gBAAgB,CAAC,YAAY,GAAG,YAAY,CAAC;4BAC7C,gBAAgB,CAAC,YAAY,GAAG,UAAU,CAAC;4BAE3C,sDAAsD;4BACtD,IAAI,YAAY,EAAE,eAAe,EAAE,CAAC;gCAClC,MAAM,gBAAgB,GACpB,YAAY,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC;gCAElE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4CAA4C,UAAU,YAAY,gBAAgB,EAAE,CACrG,CAAC;gCACJ,CAAC;gCAED,oDAAoD;gCACpD,IAAI,CAAC,qBAAqB,CACxB,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,KAAK,EACL,gBAAgB,CACjB,CAAC;gCACF,OAAO;4BACT,CAAC;wBACH,CAAC;wBAED,oEAAoE;wBACpE,IAAI,CAAC,qBAAqB,CAAC,YAAY,EAAE,MAAM,EAAE,gBAAgB,EAAE,KAAK,CAAC,CAAC;oBAC5E,CAAC;yBAAM,CAAC;wBACN,2CAA2C;wBAC3C,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,6CAA6C,SAAS,EAAE,CAAC,CAAC;wBACtF,IAAI,CAAC,qBAAqB,CACxB,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,SAAS,EACT,SAAS,EACT,KAAK,CACN,CAAC;oBACJ,CAAC;gBACH,CAAC,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,6DAA6D;gBAE7D,2CAA2C;gBAC3C,MAAM,wBAAwB,GAAG,CAAC,MAAc,EAAE,UAAkB,EAAE,EAAE;oBACtE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,KAAK,UAAU,EAAE,CAAC,CAAC;oBAC/C,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;wBACxD,gBAAgB,CAAC,yBAAyB,GAAG,MAAM,CAAC;wBACpD,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;oBACpD,CAAC;oBACD,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,MAAM,CAAC,CAAC;gBACnD,CAAC,CAAC;gBAEF,IAAI,mBAAmB,GAAG,KAAK,CAAC;gBAEhC,gDAAgD;gBAChD,IAAI,cAAc,GAA0B,IAAI,CAAC;gBACjD,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;oBAC7B,cAAc,GAAG,UAAU,CAAC,GAAG,EAAE;wBAC/B,IAAI,CAAC,mBAAmB,EAAE,CAAC;4BACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,QAAQ,EAAE,CAAC,CAAC;4BAE9H,sDAAsD;4BACtD,UAAU,CAAC,GAAG,EAAE;gCACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;oCACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;oCAC/E,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;wCACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;wCAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;oCAC/D,CAAC;oCACD,MAAM,CAAC,GAAG,EAAE,CAAC;oCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;gCAC9D,CAAC;4BACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;wBACtC,CAAC;oBACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;oBAEtC,mDAAmD;oBACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;wBACzB,cAAc,CAAC,KAAK,EAAE,CAAC;oBACzB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;gBACjD,CAAC;gBAED,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,gBAAgB,CAAC,CAAC,CAAC;gBAEnE,gCAAgC;gBAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;oBAClC,gBAAgB,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAC/C,IAAI,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC;oBAEtC,qDAAqD;oBACrD,IAAI,CAAC,gBAAgB,CAAC,KAAK,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBAChE,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;wBAE9B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,iCAAiC,QAAQ,KAAK,KAAK,CAAC,MAAM,QAAQ,CACnF,CAAC;4BACF,iDAAiD;4BACjD,2CAA2C;4BAC3C,MAAM,aAAa,GAAG;gCACpB,QAAQ,EAAE,QAAQ;gCAClB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;gCAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;gCACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;6BAChC,CAAC;4BAEF,UAAU,CAAC,+BAA+B,CAAC,KAAK,EAAE,aAAa,EAAE,IAAI,CAAC,CAAC;wBACzE,CAAC;oBACH,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH;;;;;;mBAMG;gBACH,MAAM,eAAe,GAAG,CACtB,UAAkB,EAClB,YAAqB,EACrB,YAA4B,EAC5B,YAAqB,EACrB,EAAE;oBACF,sDAAsD;oBACtD,IAAI,cAAc,EAAE,CAAC;wBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;wBAC7B,cAAc,GAAG,IAAI,CAAC;oBACxB,CAAC;oBAED,wCAAwC;oBACxC,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;oBAE/C,2CAA2C;oBAC3C,MAAM,sBAAsB,GAAG,YAAY,IAAI,UAAU,CAAC,cAAc,CAAC,YAAY,CAAC,CAAC;oBACvF,IAAI,sBAAsB,EAAE,CAAC;wBAC3B,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;wBAE9B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,sCAAsC,YAAY,CAAC,MAAM,QAAQ,CAClF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,+FAA+F;oBAC/F,MAAM,YAAY,GAAG,YAAY;wBAC/B,CAAC,CAAC,YAAY;wBACd,CAAC,CAAC,UAAU;4BACZ,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,EAAE,CAC1C,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC,CAC7D;4BACH,CAAC,CAAC,SAAS,CAAC;oBAEd,0CAA0C;oBAC1C,gBAAgB,CAAC,YAAY,GAAG,YAAY,CAAC;oBAE7C,yEAAyE;oBACzE,IAAI,YAAY,EAAE,eAAe,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;wBACvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,UAAU,oCAAoC,CAC3E,CAAC;wBACJ,CAAC;wBAED,MAAM,gBAAgB,GACpB,YAAY,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC;wBAElE,IAAI,YAAY,IAAI,gBAAgB,CAAC,KAAK,EAAE,CAAC;4BAC3C,kEAAkE;4BAClE,IAAI,CAAC,qBAAqB,CACxB,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,YAAY,EACZ,gBAAgB,CAAC,2DAA2D;6BAC7E,CAAC;4BACF,OAAO,CAAC,+BAA+B;wBACzC,CAAC;oBACH,CAAC;oBAED,kDAAkD;oBAClD,IAAI,YAAY,EAAE,CAAC;wBACjB,MAAM,mBAAmB,GAAa;4BACpC,GAAG,YAAY,CAAC,UAAU;4BAC1B,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;yBAC3C,CAAC;wBACF,MAAM,mBAAmB,GAAa;4BACpC,GAAG,CAAC,YAAY,CAAC,UAAU,IAAI,EAAE,CAAC;4BAClC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;yBAC3C,CAAC;wBAEF,4CAA4C;wBAC5C,IACE,YAAY,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC;4BAClC,CAAC,eAAe,CAAC,QAAQ,EAAE,mBAAmB,EAAE,mBAAmB,CAAC,EACpE,CAAC;4BACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,QAAQ,2BAA2B,YAAY,CAAC,OAAO,CAAC,IAAI,CACrF,IAAI,CACL,EAAE,CACJ,CAAC;wBACJ,CAAC;oBACH,CAAC;yBAAM,IACL,IAAI,CAAC,QAAQ,CAAC,iBAAiB;wBAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAC1C,CAAC;wBACD,IACE,CAAC,eAAe,CACd,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,iBAAiB,EAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CACtC,EACD,CAAC;4BACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,QAAQ,sCAAsC,CAC1E,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,uBAAuB;oBACvB,IAAI,UAAU,EAAE,CAAC;wBACf,gBAAgB,CAAC,YAAY,GAAG,UAAU,CAAC;oBAC7C,CAAC;oBAED,+BAA+B;oBAC/B,OAAO,IAAI,CAAC,qBAAqB,CAC/B,YAAY,EACZ,MAAM,EACN,gBAAgB,EAChB,YAAY,EACZ,UAAU,EACV,YAAY,EACZ,YAAY,CACb,CAAC;gBACJ,CAAC,CAAC;gBAEF,oCAAoC;gBACpC,4FAA4F;gBAC5F,IACE,IAAI,CAAC,QAAQ,CAAC,gBAAgB;oBAC9B,cAAc,CAAC,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,EACzD,CAAC;oBACD,IAAI,IAAI,CAAC,QAAQ,CAAC,sBAAsB,EAAE,CAAC;wBACzC,IACE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;4BAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC;4BAC1C,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EACrD,CAAC;4BACD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,QAAQ,iBAAiB,QAAQ,8CAA8C,CACrH,CAAC;4BACF,MAAM,CAAC,GAAG,EAAE,CAAC;4BACb,OAAO;wBACT,CAAC;wBACD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCAAgC,QAAQ,YAAY,SAAS,kCAAkC,IAAI,CAAC,QAAQ,CAAC,QAAQ,GAAG,CACzI,CAAC;wBACJ,CAAC;wBACD,eAAe,CACb,EAAE,EACF,SAAS,EACT;4BACE,OAAO,EAAE,CAAC,QAAQ,CAAC;4BACnB,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;4BACjD,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;4BACjD,SAAS,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;4BACpC,UAAU,EAAE,EAAE;yBACf,EACD,SAAS,CACV,CAAC;wBACF,OAAO;oBACT,CAAC;yBAAM,CAAC;wBACN,2EAA2E;wBAC3E,MAAM,YAAY,GAAG,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CACnD,CAAC,MAAM,EAAE,EAAE,CACT,MAAM,CAAC,UAAU;4BACjB,MAAM,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC;4BAC5B,cAAc,CAAC,SAAS,EAAE,MAAM,CAAC,UAAU,CAAC,CAC/C,CAAC;wBACF,IAAI,YAAY,EAAE,CAAC;4BACjB,MAAM,mBAAmB,GAAa;gCACpC,GAAG,YAAY,CAAC,UAAU;gCAC1B,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;6BAC3C,CAAC;4BACF,MAAM,mBAAmB,GAAa;gCACpC,GAAG,CAAC,YAAY,CAAC,UAAU,IAAI,EAAE,CAAC;gCAClC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CAAC;6BAC3C,CAAC;4BACF,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,mBAAmB,EAAE,mBAAmB,CAAC,EAAE,CAAC;gCACzE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,QAAQ,wCAAwC,YAAY,CAAC,OAAO,CAAC,IAAI,CAC5G,IAAI,CACL,YAAY,SAAS,GAAG,CAC1B,CAAC;gCACF,MAAM,CAAC,GAAG,EAAE,CAAC;gCACb,OAAO;4BACT,CAAC;4BACD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCAAgC,QAAQ,YAAY,SAAS,mBAAmB,YAAY,CAAC,OAAO,CAAC,IAAI,CACvH,IAAI,CACL,GAAG,CACL,CAAC;4BACJ,CAAC;4BACD,eAAe,CAAC,EAAE,EAAE,SAAS,EAAE,YAAY,EAAE,SAAS,CAAC,CAAC;4BACxD,OAAO;wBACT,CAAC;wBACD,4EAA4E;oBAC9E,CAAC;gBACH,CAAC;gBAED,yEAAyE;gBACzE,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;oBAC7B,mBAAmB,GAAG,KAAK,CAAC;oBAE5B,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;wBACpC,4BAA4B;wBAC5B,IAAI,cAAc,EAAE,CAAC;4BACnB,YAAY,CAAC,cAAc,CAAC,CAAC;4BAC7B,cAAc,GAAG,IAAI,CAAC;wBACxB,CAAC;wBAED,mBAAmB,GAAG,IAAI,CAAC;wBAE3B,6EAA6E;wBAC7E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,IAAI,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;4BAC3E,0EAA0E;4BAC1E,YAAY,CAAC,GAAG,EAAE;gCAChB,IAAI,CAAC;oCACH,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;oCACpE,MAAM,WAAW,GAAG,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;oCACvD,MAAM,MAAM,GAAG,UAAU,CAAC,0BAA0B,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;oCAElE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,cAAc,CAAC,YAAY,YAAY,cAAc,CAAC,MAAM,EAAE,CAAC,CAAC;oCACnI,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yCAAyC,WAAW,IAAI,MAAM,YAAY,MAAM,IAAI,MAAM,EAAE,CAAC,CAAC;gCAC5H,CAAC;gCAAC,OAAO,GAAG,EAAE,CAAC;oCACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,6BAA6B,GAAG,EAAE,CAAC,CAAC;gCAClE,CAAC;4BACH,CAAC,CAAC,CAAC;wBACL,CAAC;wBAED,wCAAwC;wBACxC,4CAA4C;wBAC5C,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;4BAC3D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D;gCAC1E,8EAA8E,CACjF,CAAC;4BACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gCACxD,gBAAgB,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;gCAC/D,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;4BAC/D,CAAC;4BACD,MAAM,CAAC,GAAG,EAAE,CAAC;4BACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;4BAC5D,OAAO;wBACT,CAAC;wBAED,qBAAqB;wBACrB,IAAI,UAAU,GAAG,EAAE,CAAC;wBAEpB,IAAI,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;4BACrC,gBAAgB,CAAC,KAAK,GAAG,IAAI,CAAC;4BAE9B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wCAAwC,KAAK,CAAC,MAAM,QAAQ,CAC7E,CAAC;4BACJ,CAAC;4BAED,8DAA8D;4BAC9D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,IAAI,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;gCAClF,yCAAyC;gCACzC,MAAM,cAAc,GAAG,UAAU,CAAC,oBAAoB,CACpD,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;gCAEF,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;oCAChC,qDAAqD;oCACrD,iCAAiC;oCACjC,MAAM,YAAY,GAAG,UAAU,CAAC,UAAU,CACxC,KAAK,EACL,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CACpC,CAAC;oCACF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD;wCAC9D,YAAY,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,IAAI;wCACpD,cAAc,YAAY,IAAI,MAAM,IAAI;wCACxC,uBAAuB,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAC5D,CAAC;oCAEF,kDAAkD;oCAClD,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,CAAC;wCAC3B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yFAAyF;4CACvG,oDAAoD,CACvD,CAAC;wCACF,IAAI,gBAAgB,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4CACxD,gBAAgB,CAAC,yBAAyB,GAAG,wBAAwB,CAAC;4CACtE,IAAI,CAAC,wBAAwB,CAAC,UAAU,EAAE,wBAAwB,CAAC,CAAC;wCACtE,CAAC;wCACD,MAAM,CAAC,GAAG,EAAE,CAAC;wCACb,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,wBAAwB,CAAC,CAAC;wCACnE,OAAO;oCACT,CAAC;yCAAM,CAAC;wCACN,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4CACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD;gDACvE,2CAA2C,CAC9C,CAAC;wCACJ,CAAC;oCACH,CAAC;gCACH,CAAC;4BACH,CAAC;4BAED,mDAAmD;4BACnD,MAAM,QAAQ,GAAG;gCACf,QAAQ,EAAE,QAAQ;gCAClB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;gCAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;gCACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;6BAChC,CAAC;4BAEF,iEAAiE;4BACjE,UAAU;gCACR,UAAU,CAAC,gBAAgB,CACzB,KAAK,EACL,QAAQ,EACR,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EACnC,gBAAgB,CAAC,YAAY,CAAC,kDAAkD;iCACjF,IAAI,EAAE,CAAC;wBACZ,CAAC;wBAED,6CAA6C;wBAC7C,gBAAgB,CAAC,YAAY,GAAG,UAAU,CAAC;wBAE3C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,8BAA8B,QAAQ,cACpD,UAAU,IAAI,SAChB,EAAE,CACH,CAAC;wBACJ,CAAC;wBAED,eAAe,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;oBACrC,CAAC,CAAC,CAAC;gBACL,CAAC;qBAAM,CAAC;oBACN,mBAAmB,GAAG,IAAI,CAAC;oBAC3B,gBAAgB,CAAC,sBAAsB,GAAG,IAAI,CAAC;oBAE/C,IACE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;wBAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC;wBAC1C,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,EACrD,CAAC;wBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,QAAQ,qCAAqC,CACzE,CAAC;oBACJ,CAAC;oBAED,eAAe,CAAC,EAAE,CAAC,CAAC;gBACtB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,0BAA0B;QAC1B,sCAAsC;QACtC,MAAM,cAAc,GAAG,IAAI,GAAG,EAAU,CAAC;QACzC,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChF,qDAAqD;YACrD,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACnD,KAAK,IAAI,IAAI,GAAG,KAAK,CAAC,IAAI,EAAE,IAAI,IAAI,KAAK,CAAC,EAAE,EAAE,IAAI,EAAE,EAAE,CAAC;oBACrD,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;gBAC3B,CAAC;YACH,CAAC;YACD,qFAAqF;YACrF,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC7C,CAAC;aAAM,CAAC;YACN,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC7C,CAAC;QAED,iCAAiC;QACjC,KAAK,MAAM,IAAI,IAAI,cAAc,EAAE,CAAC;YAClC,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,iBAAiB,CAAC,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAU,EAAE,EAAE;gBACpF,OAAO,CAAC,GAAG,CAAC,wBAAwB,IAAI,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC9D,CAAC,CAAC,CAAC;YACH,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,GAAG,EAAE;gBACvB,MAAM,kBAAkB,GAAG,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAC;gBACzE,OAAO,CAAC,GAAG,CACT,0CAA0C,IAAI,GAC5C,IAAI,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,EACnF,GAAG,kBAAkB,CAAC,CAAC,CAAC,oCAAoC,CAAC,CAAC,CAAC,EAAE,EAAE,CACpE,CAAC;YACJ,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC/B,CAAC;QAED,6FAA6F;QAC7F,IAAI,CAAC,gBAAgB,GAAG,WAAW,CAAC,GAAG,EAAE;YACvC,sCAAsC;YACtC,IAAI,IAAI,CAAC,cAAc;gBAAE,OAAO;YAEhC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,cAAc,GAAG,CAAC,CAAC;YACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;YAC1B,IAAI,sBAAsB,GAAG,CAAC,CAAC;YAC/B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,uBAAuB,GAAG,CAAC,CAAC;YAChC,IAAI,yBAAyB,GAAG,CAAC,CAAC;YAElC,mEAAmE;YACnE,MAAM,aAAa,GAAG,CAAC,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAAC,CAAC;YAEzD,KAAK,MAAM,EAAE,IAAI,aAAa,EAAE,CAAC;gBAC/B,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBAC9C,IAAI,CAAC,MAAM;oBAAE,SAAS;gBAEtB,yBAAyB;gBACzB,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,cAAc,EAAE,CAAC;oBACjB,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;wBAChC,sBAAsB,EAAE,CAAC;oBAC3B,CAAC;yBAAM,CAAC;wBACN,oBAAoB,EAAE,CAAC;oBACzB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,iBAAiB,EAAE,CAAC;gBACtB,CAAC;gBAED,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;oBACxB,oBAAoB,EAAE,CAAC;gBACzB,CAAC;gBAED,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,uBAAuB,EAAE,CAAC;gBAC5B,CAAC;gBAED,IAAI,MAAM,CAAC,cAAc,IAAI,MAAM,CAAC,cAAc,GAAG,CAAC,EAAE,CAAC;oBACvD,yBAAyB,EAAE,CAAC;gBAC9B,CAAC;gBAED,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACpE,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACtE,CAAC;gBACD,sEAAsE;gBACtE,IACE,MAAM,CAAC,kBAAkB;oBACzB,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS;oBAC1B,CAAC,MAAM,CAAC,gBAAgB;oBACxB,GAAG,GAAG,MAAM,CAAC,kBAAkB,GAAG,MAAM,EACxC,CAAC;oBACD,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC;oBACjC,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,uCAAuC,QAAQ,iBAAiB,OAAO,CAAC,QAAQ,CACpF,GAAG,GAAG,MAAM,CAAC,kBAAkB,CAChC,yBAAyB,CAC3B,CAAC;oBACF,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;gBACjD,CAAC;gBAED,yDAAyD;gBACzD,IACE,CAAC,MAAM,CAAC,sBAAsB;oBAC9B,GAAG,GAAG,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAmB,GAAG,CAAC,EACtE,CAAC;oBACD,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,8BACJ,MAAM,CAAC,QACT,wCAAwC,OAAO,CAAC,QAAQ,CACtD,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAC/B,EAAE,CACJ,CAAC;gBACJ,CAAC;gBAED,2EAA2E;gBAC3E,IACE,CAAC,IAAI,CAAC,QAAQ,CAAC,sBAAsB;oBACrC,CAAC,CAAC,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,CAAC,EACzE,CAAC;oBACD,MAAM,cAAc,GAAG,GAAG,GAAG,MAAM,CAAC,YAAY,CAAC;oBAEjD,qEAAqE;oBACrE,IAAI,gBAAgB,GAAG,IAAI,CAAC,QAAQ,CAAC,iBAAkB,CAAC;oBACxD,IAAI,MAAM,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,UAAU,EAAE,CAAC;wBAC3E,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,6BAA6B,IAAI,CAAC,CAAC;wBACpE,gBAAgB,GAAG,gBAAgB,GAAG,UAAU,CAAC;oBACnD,CAAC;oBAED,IAAI,cAAc,GAAG,gBAAgB,IAAI,CAAC,MAAM,CAAC,gBAAgB,EAAE,CAAC;wBAClE,oDAAoD;wBACpD,IAAI,MAAM,CAAC,YAAY,IAAI,CAAC,MAAM,CAAC,uBAAuB,EAAE,CAAC;4BAC3D,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,yCACJ,MAAM,CAAC,QACT,iBAAiB,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAC,IAAI;gCACnD,0CAA0C,CAC7C,CAAC;4BAEF,wCAAwC;4BACxC,MAAM,CAAC,uBAAuB,GAAG,IAAI,CAAC;4BACtC,MAAM,CAAC,YAAY,GAAG,GAAG,GAAG,CAAC,gBAAgB,GAAG,MAAM,CAAC,CAAC;4BAExD,gDAAgD;4BAChD,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gCAClD,IAAI,CAAC;oCACH,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;oCAEvC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wCACxC,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,mDAAmD,CAAC,CAAC;oCACzE,CAAC;gCACH,CAAC;gCAAC,OAAO,GAAG,EAAE,CAAC;oCACb,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,iCAAiC,GAAG,EAAE,CAAC,CAAC;gCAC5D,CAAC;4BACH,CAAC;wBACH,CAAC;6BAAM,CAAC;4BACN,4DAA4D;4BAC5D,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,sDAAsD,MAAM,CAAC,QAAQ,GAAG;gCAC5E,OAAO,OAAO,CAAC,QAAQ,CAAC,cAAc,CAAC,GAAG;gCAC1C,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,oCAAoC,CAAC,CAAC,CAAC,EAAE,CAAC,CACpE,CAAC;4BACF,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;wBAC/C,CAAC;oBACH,CAAC;yBAAM,IAAI,cAAc,IAAI,gBAAgB,IAAI,MAAM,CAAC,uBAAuB,EAAE,CAAC;wBAChF,wDAAwD;wBACxD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,EAAE,4EAA4E,CACnF,CAAC;wBACJ,CAAC;wBACD,MAAM,CAAC,uBAAuB,GAAG,KAAK,CAAC;oBACzC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,kCAAkC;YAClC,OAAO,CAAC,GAAG,CACT,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,IAAI,IAAI;gBACpD,cAAc,cAAc,eAAe,sBAAsB,aAAa,oBAAoB,KAAK;gBACvG,WAAW,iBAAiB,eAAe,oBAAoB,kBAAkB,uBAAuB,IAAI;gBAC5G,kBAAkB,yBAAyB,IAAI;gBAC/C,uBAAuB,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,SAAS,OAAO,CAAC,QAAQ,CAC3E,WAAW,CACZ,IAAI;gBACL,sBAAsB,IAAI,CAAC,SAAS,CAAC;oBACnC,EAAE,EAAE,IAAI,CAAC,gBAAgB,CAAC,QAAQ;oBAClC,GAAG,EAAE,IAAI,CAAC,gBAAgB,CAAC,QAAQ;iBACpC,CAAC,EAAE,CACP,CAAC;QACJ,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,uBAAuB,IAAI,KAAK,CAAC,CAAC;QAEnD,wDAAwD;QACxD,IAAI,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;YAChC,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,OAAO,CAAC,GAAG,CAAC,4BAA4B,CAAC,CAAC;QAC1C,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAE3B,iCAAiC;QACjC,MAAM,mBAAmB,GAAoB,IAAI,CAAC,UAAU,CAAC,GAAG,CAC9D,CAAC,MAAM,EAAE,EAAE,CACT,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;YAC5B,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;gBACtB,OAAO,EAAE,CAAC;gBACV,OAAO;YACT,CAAC;YACD,MAAM,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;gBACnB,IAAI,GAAG,EAAE,CAAC;oBACR,OAAO,CAAC,GAAG,CAAC,yBAAyB,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACtD,CAAC;gBACD,OAAO,EAAE,CAAC;YACZ,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CACL,CAAC;QAEF,6BAA6B;QAC7B,IAAI,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAC1B,aAAa,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACrC,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC;QAC/B,CAAC;QAED,4BAA4B;QAC5B,MAAM,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;QACvC,OAAO,CAAC,GAAG,CAAC,uDAAuD,CAAC,CAAC;QAErE,mDAAmD;QACnD,MAAM,aAAa,GAAG,CAAC,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,CAAC,CAAC;QACzD,OAAO,CAAC,GAAG,CAAC,eAAe,aAAa,CAAC,MAAM,wBAAwB,CAAC,CAAC;QAEzE,6CAA6C;QAC7C,KAAK,MAAM,EAAE,IAAI,aAAa,EAAE,CAAC;YAC/B,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;YAC9C,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,CAAC;oBACH,mBAAmB;oBACnB,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;wBACxB,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;wBAClC,MAAM,CAAC,YAAY,GAAG,SAAS,CAAC;oBAClC,CAAC;oBAED,yBAAyB;oBACzB,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACxB,CAAC;oBAED,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;wBAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;oBACxB,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,GAAG,CAAC,4CAA4C,EAAE,KAAK,GAAG,EAAE,CAAC,CAAC;gBACxE,CAAC;YACH,CAAC;QACH,CAAC;QAED,gDAAgD;QAChD,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC,CAAC;QAEzD,wCAAwC;QACxC,KAAK,MAAM,EAAE,IAAI,aAAa,EAAE,CAAC;YAC/B,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;YAC9C,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,CAAC;oBACH,+CAA+C;oBAC/C,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACpB,MAAM,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACrC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;4BAC/B,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;wBAC5B,CAAC;oBACH,CAAC;oBAED,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACpB,MAAM,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACrC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;4BAC/B,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;wBAC5B,CAAC;oBACH,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,GAAG,CAAC,kDAAkD,EAAE,KAAK,GAAG,EAAE,CAAC,CAAC;gBAC9E,CAAC;YACH,CAAC;QACH,CAAC;QAED,sEAAsE;QACtE,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC/B,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;gBAEjD,sCAAsC;gBACtC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;oBAChC,OAAO,CAAC,GAAG,CAAC,kCAAkC,CAAC,CAAC;gBAClD,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;QAED,0BAA0B;QAC1B,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,CAAC;QAC/B,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;QACjC,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;QAC7B,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,CAAC;QAChC,IAAI,CAAC,UAAU,GAAG,EAAE,CAAC;QAErB,0BAA0B;QAC1B,IAAI,CAAC,gBAAgB,GAAG;YACtB,QAAQ,EAAE,EAAE;YACZ,QAAQ,EAAE,EAAE;SACb,CAAC;QAEF,OAAO,CAAC,GAAG,CAAC,8BAA8B,CAAC,CAAC;IAC9C,CAAC;CACF"}
|