@push.rocks/smartproxy 19.3.2 → 19.3.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
  3. package/dist_ts/http/index.d.ts +1 -3
  4. package/dist_ts/http/index.js +4 -10
  5. package/dist_ts/http/models/http-types.d.ts +4 -91
  6. package/dist_ts/http/models/http-types.js +5 -60
  7. package/dist_ts/http/router/proxy-router.d.ts +1 -1
  8. package/dist_ts/http/router/route-router.d.ts +1 -1
  9. package/dist_ts/index.d.ts +9 -7
  10. package/dist_ts/index.js +10 -7
  11. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
  12. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
  13. package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
  14. package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
  15. package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
  16. package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
  17. package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
  18. package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
  19. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
  20. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
  21. package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
  22. package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
  23. package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
  24. package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
  25. package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
  26. package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
  27. package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
  28. package/dist_ts/proxies/http-proxy/index.js +12 -0
  29. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
  30. package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
  31. package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
  32. package/dist_ts/proxies/http-proxy/models/index.js +6 -0
  33. package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
  34. package/dist_ts/proxies/http-proxy/models/types.js +276 -0
  35. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
  36. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
  37. package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
  38. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
  39. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
  40. package/dist_ts/proxies/index.d.ts +5 -5
  41. package/dist_ts/proxies/index.js +5 -5
  42. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
  43. package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
  44. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
  45. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
  46. package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
  47. package/dist_ts/proxies/smart-proxy/index.js +4 -2
  48. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
  49. package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
  50. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
  51. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
  52. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
  53. package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
  54. package/dist_ts/routing/index.d.ts +5 -0
  55. package/dist_ts/routing/index.js +8 -0
  56. package/dist_ts/routing/models/http-types.d.ts +6 -0
  57. package/dist_ts/routing/models/http-types.js +7 -0
  58. package/dist_ts/routing/router/index.d.ts +8 -0
  59. package/dist_ts/routing/router/index.js +7 -0
  60. package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
  61. package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
  62. package/dist_ts/routing/router/route-router.d.ts +108 -0
  63. package/dist_ts/routing/router/route-router.js +393 -0
  64. package/package.json +1 -1
  65. package/readme.md +18 -35
  66. package/readme.plan.md +173 -271
  67. package/ts/00_commitinfo_data.ts +1 -1
  68. package/ts/forwarding/factory/forwarding-factory.ts +28 -0
  69. package/ts/index.ts +13 -9
  70. package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
  71. package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
  72. package/ts/proxies/http-proxy/handlers/index.ts +6 -0
  73. package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
  74. package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
  75. package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
  76. package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
  77. package/ts/proxies/http-proxy/models/http-types.ts +165 -0
  78. package/ts/proxies/http-proxy/models/index.ts +5 -0
  79. package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
  80. package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
  81. package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
  82. package/ts/proxies/index.ts +7 -7
  83. package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
  84. package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
  85. package/ts/proxies/smart-proxy/index.ts +4 -1
  86. package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
  87. package/ts/proxies/smart-proxy/port-manager.ts +2 -2
  88. package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
  89. package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
  90. package/ts/routing/index.ts +9 -0
  91. package/ts/routing/models/http-types.ts +6 -0
  92. package/ts/{http → routing}/router/proxy-router.ts +1 -1
  93. package/ts/{http → routing}/router/route-router.ts +1 -1
  94. package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
  95. package/dist_ts/certificate/acme/acme-factory.js +0 -40
  96. package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
  97. package/dist_ts/certificate/acme/challenge-handler.js +0 -92
  98. package/dist_ts/certificate/acme/index.d.ts +0 -4
  99. package/dist_ts/certificate/acme/index.js +0 -5
  100. package/dist_ts/certificate/certificate-manager.d.ts +0 -150
  101. package/dist_ts/certificate/certificate-manager.js +0 -505
  102. package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
  103. package/dist_ts/certificate/events/certificate-events.js +0 -38
  104. package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
  105. package/dist_ts/certificate/events/simplified-events.js +0 -13
  106. package/dist_ts/certificate/index.d.ts +0 -30
  107. package/dist_ts/certificate/index.js +0 -37
  108. package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
  109. package/dist_ts/certificate/models/certificate-errors.js +0 -141
  110. package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
  111. package/dist_ts/certificate/models/certificate-strategy.js +0 -73
  112. package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
  113. package/dist_ts/certificate/models/certificate-types.js +0 -2
  114. package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
  115. package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
  116. package/dist_ts/certificate/providers/index.d.ts +0 -4
  117. package/dist_ts/certificate/providers/index.js +0 -5
  118. package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
  119. package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
  120. package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
  121. package/dist_ts/certificate/storage/file-storage.js +0 -194
  122. package/dist_ts/certificate/storage/index.d.ts +0 -4
  123. package/dist_ts/certificate/storage/index.js +0 -5
  124. package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
  125. package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
  126. package/dist_ts/classes.iptablesproxy.d.ts +0 -112
  127. package/dist_ts/classes.iptablesproxy.js +0 -765
  128. package/dist_ts/classes.networkproxy.d.ts +0 -243
  129. package/dist_ts/classes.networkproxy.js +0 -1424
  130. package/dist_ts/classes.nftablesproxy.d.ts +0 -219
  131. package/dist_ts/classes.nftablesproxy.js +0 -1542
  132. package/dist_ts/classes.port80handler.d.ts +0 -215
  133. package/dist_ts/classes.port80handler.js +0 -736
  134. package/dist_ts/classes.portproxy.d.ts +0 -171
  135. package/dist_ts/classes.portproxy.js +0 -1802
  136. package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
  137. package/dist_ts/classes.pp.acmemanager.js +0 -123
  138. package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
  139. package/dist_ts/classes.pp.connectionhandler.js +0 -754
  140. package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
  141. package/dist_ts/classes.pp.connectionmanager.js +0 -378
  142. package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
  143. package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
  144. package/dist_ts/classes.pp.interfaces.d.ts +0 -133
  145. package/dist_ts/classes.pp.interfaces.js +0 -2
  146. package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
  147. package/dist_ts/classes.pp.networkproxybridge.js +0 -306
  148. package/dist_ts/classes.pp.portproxy.d.ts +0 -64
  149. package/dist_ts/classes.pp.portproxy.js +0 -567
  150. package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
  151. package/dist_ts/classes.pp.portrangemanager.js +0 -179
  152. package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
  153. package/dist_ts/classes.pp.securitymanager.js +0 -126
  154. package/dist_ts/classes.pp.snihandler.d.ts +0 -153
  155. package/dist_ts/classes.pp.snihandler.js +0 -1053
  156. package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
  157. package/dist_ts/classes.pp.timeoutmanager.js +0 -154
  158. package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
  159. package/dist_ts/classes.pp.tlsalert.js +0 -225
  160. package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
  161. package/dist_ts/classes.pp.tlsmanager.js +0 -132
  162. package/dist_ts/classes.snihandler.d.ts +0 -198
  163. package/dist_ts/classes.snihandler.js +0 -1210
  164. package/dist_ts/classes.sslredirect.d.ts +0 -8
  165. package/dist_ts/classes.sslredirect.js +0 -28
  166. package/dist_ts/common/acmeFactory.d.ts +0 -9
  167. package/dist_ts/common/acmeFactory.js +0 -20
  168. package/dist_ts/common/port80-adapter.d.ts +0 -11
  169. package/dist_ts/common/port80-adapter.js +0 -87
  170. package/dist_ts/examples/forwarding-example.d.ts +0 -1
  171. package/dist_ts/examples/forwarding-example.js +0 -96
  172. package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
  173. package/dist_ts/forwarding/config/domain-config.js +0 -12
  174. package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
  175. package/dist_ts/forwarding/config/domain-manager.js +0 -242
  176. package/dist_ts/helpers.certificates.d.ts +0 -5
  177. package/dist_ts/helpers.certificates.js +0 -23
  178. package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
  179. package/dist_ts/http/port80/acme-interfaces.js +0 -51
  180. package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
  181. package/dist_ts/http/port80/challenge-responder.js +0 -203
  182. package/dist_ts/http/port80/index.d.ts +0 -6
  183. package/dist_ts/http/port80/index.js +0 -9
  184. package/dist_ts/http/port80/port80-handler.d.ts +0 -136
  185. package/dist_ts/http/port80/port80-handler.js +0 -592
  186. package/dist_ts/http/redirects/index.d.ts +0 -4
  187. package/dist_ts/http/redirects/index.js +0 -5
  188. package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
  189. package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
  190. package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
  191. package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
  192. package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
  193. package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
  194. package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
  195. package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
  196. package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
  197. package/dist_ts/networkproxy/classes.np.types.js +0 -35
  198. package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
  199. package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
  200. package/dist_ts/networkproxy/index.d.ts +0 -1
  201. package/dist_ts/networkproxy/index.js +0 -4
  202. package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
  203. package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
  204. package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
  205. package/dist_ts/port80handler/classes.port80handler.js +0 -16
  206. package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
  207. package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
  208. package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
  209. package/dist_ts/proxies/network-proxy/index.js +0 -12
  210. package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
  211. package/dist_ts/proxies/network-proxy/models/index.js +0 -5
  212. package/dist_ts/proxies/network-proxy/models/types.js +0 -276
  213. package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
  214. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
  215. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
  216. package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
  217. package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
  218. package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
  219. package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
  220. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
  221. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
  222. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
  223. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
  224. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
  225. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
  226. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
  227. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
  228. package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
  229. package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
  230. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
  231. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
  232. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
  233. package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
  234. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
  235. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
  236. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
  237. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
  238. package/dist_ts/redirect/classes.redirect.d.ts +0 -96
  239. package/dist_ts/redirect/classes.redirect.js +0 -194
  240. package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
  241. package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
  242. package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
  243. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
  244. package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
  245. package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
  246. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
  247. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
  248. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
  249. package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
  250. package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
  251. package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
  252. package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
  253. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
  254. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
  255. package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
  256. package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
  257. package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
  258. package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
  259. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
  260. package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
  261. package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
  262. package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
  263. package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
  264. package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
  265. package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
  266. package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
  267. package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
  268. package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
  269. package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
  270. package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
  271. package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
  272. package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
  273. package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
  274. package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
  275. package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
  276. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
  277. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
  278. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
  279. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
  280. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
  281. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
  282. package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
  283. package/dist_ts/smartproxy/forwarding/index.js +0 -23
  284. package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
  285. package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
  286. package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
  287. package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
  288. package/dist_ts/smartproxy.classes.router.d.ts +0 -13
  289. package/dist_ts/smartproxy.classes.router.js +0 -33
  290. package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
  291. package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
  292. package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
  293. package/dist_ts/smartproxy.helpers.certificates.js +0 -23
  294. package/dist_ts/smartproxy.plugins.d.ts +0 -18
  295. package/dist_ts/smartproxy.plugins.js +0 -23
  296. package/dist_ts/smartproxy.portproxy.d.ts +0 -26
  297. package/dist_ts/smartproxy.portproxy.js +0 -295
  298. package/ts/http/index.ts +0 -16
  299. package/ts/http/models/http-types.ts +0 -108
  300. package/ts/http/redirects/index.ts +0 -3
  301. package/ts/proxies/network-proxy/models/index.ts +0 -4
  302. package/ts/redirect/classes.redirect.ts +0 -295
  303. /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
  304. /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
  305. /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
  306. /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
  307. /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
  308. /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
  309. /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
  310. /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
  311. /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
  312. /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
  313. /package/ts/{http → routing}/router/index.ts +0 -0
@@ -1,1210 +0,0 @@
1
- import { Buffer } from 'buffer';
2
- /**
3
- * SNI (Server Name Indication) handler for TLS connections.
4
- * Provides robust extraction of SNI values from TLS ClientHello messages
5
- * with support for fragmented packets, TLS 1.3 resumption, Chrome-specific
6
- * connection behaviors, and tab hibernation/reactivation scenarios.
7
- */
8
- export class SniHandler {
9
- // TLS record types and constants
10
- static { this.TLS_HANDSHAKE_RECORD_TYPE = 22; }
11
- static { this.TLS_APPLICATION_DATA_TYPE = 23; } // TLS Application Data record type
12
- static { this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE = 1; }
13
- static { this.TLS_SNI_EXTENSION_TYPE = 0x0000; }
14
- static { this.TLS_SESSION_TICKET_EXTENSION_TYPE = 0x0023; }
15
- static { this.TLS_SNI_HOST_NAME_TYPE = 0; }
16
- static { this.TLS_PSK_EXTENSION_TYPE = 0x0029; } // Pre-Shared Key extension type for TLS 1.3
17
- static { this.TLS_PSK_KE_MODES_EXTENSION_TYPE = 0x002d; } // PSK Key Exchange Modes
18
- static { this.TLS_EARLY_DATA_EXTENSION_TYPE = 0x002a; } // Early Data (0-RTT) extension
19
- // Buffer for handling fragmented ClientHello messages
20
- static { this.fragmentedBuffers = new Map(); }
21
- static { this.fragmentTimeout = 1000; } // ms to wait for fragments before cleanup
22
- // Session tracking for tab reactivation scenarios
23
- static { this.sessionCache = new Map(); }
24
- // Longer timeout for session cache (24 hours by default)
25
- static { this.sessionCacheTimeout = 24 * 60 * 60 * 1000; } // 24 hours in milliseconds
26
- // Cleanup interval for session cache (run every hour)
27
- static { this.sessionCleanupInterval = null; }
28
- /**
29
- * Initialize the session cache cleanup mechanism.
30
- * This should be called during application startup.
31
- */
32
- static initSessionCacheCleanup() {
33
- if (this.sessionCleanupInterval === null) {
34
- this.sessionCleanupInterval = setInterval(() => {
35
- this.cleanupSessionCache();
36
- }, 60 * 60 * 1000); // Run every hour
37
- }
38
- }
39
- /**
40
- * Clean up expired entries from the session cache
41
- */
42
- static cleanupSessionCache() {
43
- const now = Date.now();
44
- const expiredKeys = [];
45
- this.sessionCache.forEach((session, key) => {
46
- if (now - session.timestamp > this.sessionCacheTimeout) {
47
- expiredKeys.push(key);
48
- }
49
- });
50
- expiredKeys.forEach((key) => {
51
- this.sessionCache.delete(key);
52
- });
53
- }
54
- /**
55
- * Create a client identity key for session tracking
56
- * Uses source IP and optional client random for uniqueness
57
- *
58
- * @param sourceIp - Client IP address
59
- * @param clientRandom - Optional TLS client random value
60
- * @returns A string key for the session cache
61
- */
62
- static createClientKey(sourceIp, clientRandom) {
63
- if (clientRandom) {
64
- // If we have the client random, use it for more precise tracking
65
- return `${sourceIp}:${clientRandom.toString('hex')}`;
66
- }
67
- // Fall back to just IP-based tracking
68
- return sourceIp;
69
- }
70
- /**
71
- * Store SNI information in the session cache
72
- *
73
- * @param sourceIp - Client IP address
74
- * @param sni - The extracted SNI value
75
- * @param clientRandom - Optional TLS client random value
76
- */
77
- static cacheSession(sourceIp, sni, clientRandom) {
78
- const key = this.createClientKey(sourceIp, clientRandom);
79
- this.sessionCache.set(key, {
80
- sni,
81
- timestamp: Date.now(),
82
- clientRandom,
83
- });
84
- }
85
- /**
86
- * Retrieve SNI information from the session cache
87
- *
88
- * @param sourceIp - Client IP address
89
- * @param clientRandom - Optional TLS client random value
90
- * @returns The cached SNI or undefined if not found
91
- */
92
- static getCachedSession(sourceIp, clientRandom) {
93
- // Try with client random first for precision
94
- if (clientRandom) {
95
- const preciseKey = this.createClientKey(sourceIp, clientRandom);
96
- const preciseSession = this.sessionCache.get(preciseKey);
97
- if (preciseSession) {
98
- return preciseSession.sni;
99
- }
100
- }
101
- // Fall back to IP-only lookup
102
- const ipKey = this.createClientKey(sourceIp);
103
- const session = this.sessionCache.get(ipKey);
104
- if (session) {
105
- // Update the timestamp to keep the session alive
106
- session.timestamp = Date.now();
107
- return session.sni;
108
- }
109
- return undefined;
110
- }
111
- /**
112
- * Extract the client random value from a ClientHello message
113
- *
114
- * @param buffer - The buffer containing the ClientHello
115
- * @returns The 32-byte client random or undefined if extraction fails
116
- */
117
- static extractClientRandom(buffer) {
118
- try {
119
- if (!this.isClientHello(buffer) || buffer.length < 46) {
120
- return undefined;
121
- }
122
- // In a ClientHello message, the client random starts at position 11
123
- // after record header (5 bytes), handshake type (1 byte),
124
- // handshake length (3 bytes), and client version (2 bytes)
125
- return buffer.slice(11, 11 + 32);
126
- }
127
- catch (error) {
128
- return undefined;
129
- }
130
- }
131
- /**
132
- * Checks if a buffer contains a TLS handshake message (record type 22)
133
- * @param buffer - The buffer to check
134
- * @returns true if the buffer starts with a TLS handshake record type
135
- */
136
- static isTlsHandshake(buffer) {
137
- return buffer.length > 0 && buffer[0] === this.TLS_HANDSHAKE_RECORD_TYPE;
138
- }
139
- /**
140
- * Checks if a buffer contains TLS application data (record type 23)
141
- * @param buffer - The buffer to check
142
- * @returns true if the buffer starts with a TLS application data record type
143
- */
144
- static isTlsApplicationData(buffer) {
145
- return buffer.length > 0 && buffer[0] === this.TLS_APPLICATION_DATA_TYPE;
146
- }
147
- /**
148
- * Creates a connection ID based on source/destination information
149
- * Used to track fragmented ClientHello messages across multiple packets
150
- *
151
- * @param connectionInfo - Object containing connection identifiers (IP/port)
152
- * @returns A string ID for the connection
153
- */
154
- static createConnectionId(connectionInfo) {
155
- const { sourceIp, sourcePort, destIp, destPort } = connectionInfo;
156
- return `${sourceIp}:${sourcePort}-${destIp}:${destPort}`;
157
- }
158
- /**
159
- * Handles potential fragmented ClientHello messages by buffering and reassembling
160
- * TLS record fragments that might span multiple TCP packets.
161
- *
162
- * @param buffer - The current buffer fragment
163
- * @param connectionId - Unique identifier for the connection
164
- * @param enableLogging - Whether to enable logging
165
- * @returns A complete buffer if reassembly is successful, or undefined if more fragments are needed
166
- */
167
- static handleFragmentedClientHello(buffer, connectionId, enableLogging = false) {
168
- const log = (message) => {
169
- if (enableLogging) {
170
- console.log(`[SNI Fragment] ${message}`);
171
- }
172
- };
173
- // Check if we've seen this connection before
174
- if (!this.fragmentedBuffers.has(connectionId)) {
175
- // New connection, start with this buffer
176
- this.fragmentedBuffers.set(connectionId, buffer);
177
- // Set timeout to clean up if we don't get a complete ClientHello
178
- setTimeout(() => {
179
- if (this.fragmentedBuffers.has(connectionId)) {
180
- this.fragmentedBuffers.delete(connectionId);
181
- log(`Connection ${connectionId} timed out waiting for complete ClientHello`);
182
- }
183
- }, this.fragmentTimeout);
184
- // Evaluate if this buffer already contains a complete ClientHello
185
- try {
186
- if (buffer.length >= 5) {
187
- // Get the record length from TLS header
188
- const recordLength = (buffer[3] << 8) + buffer[4] + 5; // +5 for the TLS record header itself
189
- log(`Initial buffer size: ${buffer.length}, expected record length: ${recordLength}`);
190
- // Check if this buffer already contains a complete TLS record
191
- if (buffer.length >= recordLength) {
192
- log(`Initial buffer contains complete ClientHello, length: ${buffer.length}`);
193
- return buffer;
194
- }
195
- }
196
- else {
197
- log(`Initial buffer too small (${buffer.length} bytes), needs at least 5 bytes for TLS header`);
198
- }
199
- }
200
- catch (e) {
201
- log(`Error checking initial buffer completeness: ${e}`);
202
- }
203
- log(`Started buffering connection ${connectionId}, initial size: ${buffer.length}`);
204
- return undefined; // Need more fragments
205
- }
206
- else {
207
- // Existing connection, append this buffer
208
- const existingBuffer = this.fragmentedBuffers.get(connectionId);
209
- const newBuffer = Buffer.concat([existingBuffer, buffer]);
210
- this.fragmentedBuffers.set(connectionId, newBuffer);
211
- log(`Appended to buffer for ${connectionId}, new size: ${newBuffer.length}`);
212
- // Check if we now have a complete ClientHello
213
- try {
214
- if (newBuffer.length >= 5) {
215
- // Get the record length from TLS header
216
- const recordLength = (newBuffer[3] << 8) + newBuffer[4] + 5; // +5 for the TLS record header itself
217
- log(`Reassembled buffer size: ${newBuffer.length}, expected record length: ${recordLength}`);
218
- // Check if we have a complete TLS record now
219
- if (newBuffer.length >= recordLength) {
220
- log(`Assembled complete ClientHello, length: ${newBuffer.length}, needed: ${recordLength}`);
221
- // Extract the complete TLS record (might be followed by more data)
222
- const completeRecord = newBuffer.slice(0, recordLength);
223
- // Check if this record is indeed a ClientHello (type 1) at position 5
224
- if (completeRecord.length > 5 &&
225
- completeRecord[5] === this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE) {
226
- log(`Verified record is a ClientHello handshake message`);
227
- // Complete message received, remove from tracking
228
- this.fragmentedBuffers.delete(connectionId);
229
- return completeRecord;
230
- }
231
- else {
232
- log(`Record is complete but not a ClientHello handshake, continuing to buffer`);
233
- // This might be another TLS record type preceding the ClientHello
234
- // Try checking for a ClientHello starting at the end of this record
235
- if (newBuffer.length > recordLength + 5) {
236
- const nextRecordType = newBuffer[recordLength];
237
- log(`Next record type: ${nextRecordType} (looking for ${this.TLS_HANDSHAKE_RECORD_TYPE})`);
238
- if (nextRecordType === this.TLS_HANDSHAKE_RECORD_TYPE) {
239
- const handshakeType = newBuffer[recordLength + 5];
240
- log(`Next handshake type: ${handshakeType} (looking for ${this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE})`);
241
- if (handshakeType === this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE) {
242
- // Found a ClientHello in the next record, return the entire buffer
243
- log(`Found ClientHello in subsequent record, returning full buffer`);
244
- this.fragmentedBuffers.delete(connectionId);
245
- return newBuffer;
246
- }
247
- }
248
- }
249
- }
250
- }
251
- }
252
- }
253
- catch (e) {
254
- log(`Error checking reassembled buffer completeness: ${e}`);
255
- }
256
- return undefined; // Still need more fragments
257
- }
258
- }
259
- /**
260
- * Checks if a buffer contains a TLS ClientHello message
261
- * @param buffer - The buffer to check
262
- * @returns true if the buffer appears to be a ClientHello message
263
- */
264
- static isClientHello(buffer) {
265
- // Minimum ClientHello size (TLS record header + handshake header)
266
- if (buffer.length < 9) {
267
- return false;
268
- }
269
- // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE)
270
- if (buffer[0] !== this.TLS_HANDSHAKE_RECORD_TYPE) {
271
- return false;
272
- }
273
- // Skip version and length in TLS record header (5 bytes total)
274
- // Check handshake type at byte 5 (must be CLIENT_HELLO)
275
- return buffer[5] === this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE;
276
- }
277
- /**
278
- * Checks if a ClientHello message contains session resumption indicators
279
- * such as session tickets or PSK (Pre-Shared Key) extensions.
280
- *
281
- * @param buffer - The buffer containing a ClientHello message
282
- * @param enableLogging - Whether to enable logging
283
- * @returns Object containing details about session resumption and SNI presence
284
- */
285
- static hasSessionResumption(buffer, enableLogging = false) {
286
- const log = (message) => {
287
- if (enableLogging) {
288
- console.log(`[Session Resumption] ${message}`);
289
- }
290
- };
291
- if (!this.isClientHello(buffer)) {
292
- return { isResumption: false, hasSNI: false };
293
- }
294
- try {
295
- // Check for session ID presence first
296
- let pos = 5 + 1 + 3 + 2; // Position after handshake type, length and client version
297
- pos += 32; // Skip client random
298
- if (pos + 1 > buffer.length)
299
- return { isResumption: false, hasSNI: false };
300
- const sessionIdLength = buffer[pos];
301
- let hasNonEmptySessionId = sessionIdLength > 0;
302
- if (hasNonEmptySessionId) {
303
- log(`Detected non-empty session ID (length: ${sessionIdLength})`);
304
- }
305
- // Continue to check for extensions
306
- pos += 1 + sessionIdLength;
307
- // Skip cipher suites
308
- if (pos + 2 > buffer.length)
309
- return { isResumption: false, hasSNI: false };
310
- const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
311
- pos += 2 + cipherSuitesLength;
312
- // Skip compression methods
313
- if (pos + 1 > buffer.length)
314
- return { isResumption: false, hasSNI: false };
315
- const compressionMethodsLength = buffer[pos];
316
- pos += 1 + compressionMethodsLength;
317
- // Check for extensions
318
- if (pos + 2 > buffer.length)
319
- return { isResumption: false, hasSNI: false };
320
- // Look for session resumption extensions
321
- const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
322
- pos += 2;
323
- // Extensions end position
324
- const extensionsEnd = pos + extensionsLength;
325
- if (extensionsEnd > buffer.length)
326
- return { isResumption: false, hasSNI: false };
327
- // Track resumption indicators
328
- let hasSessionTicket = false;
329
- let hasPSK = false;
330
- let hasEarlyData = false;
331
- // Iterate through extensions
332
- while (pos + 4 <= extensionsEnd) {
333
- const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
334
- pos += 2;
335
- const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
336
- pos += 2;
337
- if (extensionType === this.TLS_SESSION_TICKET_EXTENSION_TYPE) {
338
- log('Found session ticket extension');
339
- hasSessionTicket = true;
340
- // Check if session ticket has non-zero length (active ticket)
341
- if (extensionLength > 0) {
342
- log(`Session ticket has length ${extensionLength} - active ticket present`);
343
- }
344
- }
345
- else if (extensionType === this.TLS_PSK_EXTENSION_TYPE) {
346
- log('Found PSK extension (TLS 1.3 resumption mechanism)');
347
- hasPSK = true;
348
- }
349
- else if (extensionType === this.TLS_EARLY_DATA_EXTENSION_TYPE) {
350
- log('Found Early Data extension (TLS 1.3 0-RTT)');
351
- hasEarlyData = true;
352
- }
353
- // Skip extension data
354
- pos += extensionLength;
355
- }
356
- // Check if SNI is included
357
- let hasSNI = false;
358
- // Reset position and scan again for SNI extension
359
- pos = 5 + 1 + 3 + 2; // Reset to after handshake type, length and client version
360
- pos += 32; // Skip client random
361
- if (pos + 1 <= buffer.length) {
362
- const sessionIdLength = buffer[pos];
363
- pos += 1 + sessionIdLength;
364
- // Skip cipher suites
365
- if (pos + 2 <= buffer.length) {
366
- const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
367
- pos += 2 + cipherSuitesLength;
368
- // Skip compression methods
369
- if (pos + 1 <= buffer.length) {
370
- const compressionMethodsLength = buffer[pos];
371
- pos += 1 + compressionMethodsLength;
372
- // Check for extensions
373
- if (pos + 2 <= buffer.length) {
374
- const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
375
- pos += 2;
376
- // Extensions end position
377
- const extensionsEnd = pos + extensionsLength;
378
- if (extensionsEnd <= buffer.length) {
379
- // Scan for SNI extension
380
- while (pos + 4 <= extensionsEnd) {
381
- const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
382
- pos += 2;
383
- const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
384
- pos += 2;
385
- if (extensionType === this.TLS_SNI_EXTENSION_TYPE) {
386
- // Check that the SNI extension actually has content
387
- if (extensionLength > 0) {
388
- hasSNI = true;
389
- // Try to extract the actual SNI value for logging
390
- try {
391
- // Skip to server_name_list_length (2 bytes)
392
- const tempPos = pos;
393
- if (tempPos + 2 <= extensionsEnd) {
394
- const nameListLength = (buffer[tempPos] << 8) + buffer[tempPos + 1];
395
- // Skip server_name_list_length (2 bytes)
396
- if (tempPos + 2 + 1 <= extensionsEnd) {
397
- // Check name_type (should be 0 for hostname)
398
- if (buffer[tempPos + 2] === 0) {
399
- // Skip name_type (1 byte)
400
- if (tempPos + 3 + 2 <= extensionsEnd) {
401
- // Get name_length (2 bytes)
402
- const nameLength = (buffer[tempPos + 3] << 8) + buffer[tempPos + 4];
403
- // Extract the hostname
404
- if (tempPos + 5 + nameLength <= extensionsEnd) {
405
- const hostname = buffer
406
- .slice(tempPos + 5, tempPos + 5 + nameLength)
407
- .toString('utf8');
408
- log(`Found SNI extension with server_name: ${hostname}`);
409
- }
410
- }
411
- }
412
- }
413
- }
414
- }
415
- catch (e) {
416
- log(`Error extracting SNI value: ${e}`);
417
- log('Found SNI extension with length: ' + extensionLength);
418
- }
419
- }
420
- else {
421
- log('Found empty SNI extension, treating as no SNI');
422
- }
423
- break;
424
- }
425
- // Skip extension data
426
- pos += extensionLength;
427
- }
428
- }
429
- }
430
- }
431
- }
432
- }
433
- // Consider it a resumption if any resumption mechanism is present
434
- const isResumption = hasSessionTicket || hasPSK || hasEarlyData || (hasNonEmptySessionId && !hasPSK); // Legacy resumption
435
- if (isResumption) {
436
- log('Session resumption detected: ' +
437
- (hasSessionTicket ? 'session ticket, ' : '') +
438
- (hasPSK ? 'PSK, ' : '') +
439
- (hasEarlyData ? 'early data, ' : '') +
440
- (hasNonEmptySessionId ? 'session ID' : '') +
441
- (hasSNI ? ', with SNI' : ', without SNI'));
442
- }
443
- // Return an object with both flags
444
- // For clarity: connections should be blocked if they have session resumption without SNI
445
- if (isResumption) {
446
- log(`Resumption summary - hasSNI: ${hasSNI ? 'yes' : 'no'}, resumption type: ${hasSessionTicket ? 'session ticket, ' : ''}${hasPSK ? 'PSK, ' : ''}${hasEarlyData ? 'early data, ' : ''}${hasNonEmptySessionId ? 'session ID' : ''}`);
447
- }
448
- return {
449
- isResumption,
450
- hasSNI,
451
- };
452
- }
453
- catch (error) {
454
- log(`Error checking for session resumption: ${error}`);
455
- return { isResumption: false, hasSNI: false };
456
- }
457
- }
458
- /**
459
- * Detects characteristics of a tab reactivation TLS handshake
460
- * These often have specific patterns in Chrome and other browsers
461
- *
462
- * @param buffer - The buffer containing a ClientHello message
463
- * @param enableLogging - Whether to enable logging
464
- * @returns true if this appears to be a tab reactivation handshake
465
- */
466
- static isTabReactivationHandshake(buffer, enableLogging = false) {
467
- const log = (message) => {
468
- if (enableLogging) {
469
- console.log(`[Tab Reactivation] ${message}`);
470
- }
471
- };
472
- if (!this.isClientHello(buffer)) {
473
- return false;
474
- }
475
- try {
476
- // Check for session ID presence (tab reactivation often has a session ID)
477
- let pos = 5 + 1 + 3 + 2; // Position after handshake type, length and client version
478
- pos += 32; // Skip client random
479
- if (pos + 1 > buffer.length)
480
- return false;
481
- const sessionIdLength = buffer[pos];
482
- // Non-empty session ID is a good indicator
483
- if (sessionIdLength > 0) {
484
- log(`Detected non-empty session ID (length: ${sessionIdLength})`);
485
- // Skip to extensions
486
- pos += 1 + sessionIdLength;
487
- // Skip cipher suites
488
- if (pos + 2 > buffer.length)
489
- return false;
490
- const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
491
- pos += 2 + cipherSuitesLength;
492
- // Skip compression methods
493
- if (pos + 1 > buffer.length)
494
- return false;
495
- const compressionMethodsLength = buffer[pos];
496
- pos += 1 + compressionMethodsLength;
497
- // Check for extensions
498
- if (pos + 2 > buffer.length)
499
- return false;
500
- // Look for specific extensions that indicate tab reactivation
501
- const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
502
- pos += 2;
503
- // Extensions end position
504
- const extensionsEnd = pos + extensionsLength;
505
- if (extensionsEnd > buffer.length)
506
- return false;
507
- // Tab reactivation often has session tickets but no SNI
508
- let hasSessionTicket = false;
509
- let hasSNI = false;
510
- let hasPSK = false;
511
- // Iterate through extensions
512
- while (pos + 4 <= extensionsEnd) {
513
- const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
514
- pos += 2;
515
- const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
516
- pos += 2;
517
- if (extensionType === this.TLS_SESSION_TICKET_EXTENSION_TYPE) {
518
- hasSessionTicket = true;
519
- }
520
- else if (extensionType === this.TLS_SNI_EXTENSION_TYPE) {
521
- hasSNI = true;
522
- }
523
- else if (extensionType === this.TLS_PSK_EXTENSION_TYPE) {
524
- hasPSK = true;
525
- }
526
- // Skip extension data
527
- pos += extensionLength;
528
- }
529
- // Pattern for tab reactivation: session identifier + (ticket or PSK) but no SNI
530
- if ((hasSessionTicket || hasPSK) && !hasSNI) {
531
- log('Detected tab reactivation pattern: session resumption without SNI');
532
- return true;
533
- }
534
- }
535
- }
536
- catch (error) {
537
- log(`Error checking for tab reactivation: ${error}`);
538
- }
539
- return false;
540
- }
541
- /**
542
- * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
543
- * Implements robust parsing with support for session resumption edge cases.
544
- *
545
- * @param buffer - The buffer containing the TLS ClientHello message
546
- * @param enableLogging - Whether to enable detailed debug logging
547
- * @returns The extracted server name or undefined if not found
548
- */
549
- static extractSNI(buffer, enableLogging = false) {
550
- // Logging helper
551
- const log = (message) => {
552
- if (enableLogging) {
553
- console.log(`[SNI Extraction] ${message}`);
554
- }
555
- };
556
- try {
557
- // Buffer must be at least 5 bytes (TLS record header)
558
- if (buffer.length < 5) {
559
- log('Buffer too small for TLS record header');
560
- return undefined;
561
- }
562
- // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE = 22)
563
- if (buffer[0] !== this.TLS_HANDSHAKE_RECORD_TYPE) {
564
- log(`Not a TLS handshake record: ${buffer[0]}`);
565
- return undefined;
566
- }
567
- // Check TLS version
568
- const majorVersion = buffer[1];
569
- const minorVersion = buffer[2];
570
- log(`TLS version: ${majorVersion}.${minorVersion}`);
571
- // Parse record length (bytes 3-4, big-endian)
572
- const recordLength = (buffer[3] << 8) + buffer[4];
573
- log(`Record length: ${recordLength}`);
574
- // Validate record length against buffer size
575
- if (buffer.length < recordLength + 5) {
576
- log('Buffer smaller than expected record length');
577
- return undefined;
578
- }
579
- // Start of handshake message in the buffer
580
- let pos = 5;
581
- // Check handshake type (must be CLIENT_HELLO = 1)
582
- if (buffer[pos] !== this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE) {
583
- log(`Not a ClientHello message: ${buffer[pos]}`);
584
- return undefined;
585
- }
586
- // Skip handshake type (1 byte)
587
- pos += 1;
588
- // Parse handshake length (3 bytes, big-endian)
589
- const handshakeLength = (buffer[pos] << 16) + (buffer[pos + 1] << 8) + buffer[pos + 2];
590
- log(`Handshake length: ${handshakeLength}`);
591
- // Skip handshake length (3 bytes)
592
- pos += 3;
593
- // Check client version (2 bytes)
594
- const clientMajorVersion = buffer[pos];
595
- const clientMinorVersion = buffer[pos + 1];
596
- log(`Client version: ${clientMajorVersion}.${clientMinorVersion}`);
597
- // Skip client version (2 bytes)
598
- pos += 2;
599
- // Skip client random (32 bytes)
600
- pos += 32;
601
- // Parse session ID
602
- if (pos + 1 > buffer.length) {
603
- log('Buffer too small for session ID length');
604
- return undefined;
605
- }
606
- const sessionIdLength = buffer[pos];
607
- log(`Session ID length: ${sessionIdLength}`);
608
- // Skip session ID length (1 byte) and session ID
609
- pos += 1 + sessionIdLength;
610
- // Check if we have enough bytes left
611
- if (pos + 2 > buffer.length) {
612
- log('Buffer too small for cipher suites length');
613
- return undefined;
614
- }
615
- // Parse cipher suites length (2 bytes, big-endian)
616
- const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
617
- log(`Cipher suites length: ${cipherSuitesLength}`);
618
- // Skip cipher suites length (2 bytes) and cipher suites
619
- pos += 2 + cipherSuitesLength;
620
- // Check if we have enough bytes left
621
- if (pos + 1 > buffer.length) {
622
- log('Buffer too small for compression methods length');
623
- return undefined;
624
- }
625
- // Parse compression methods length (1 byte)
626
- const compressionMethodsLength = buffer[pos];
627
- log(`Compression methods length: ${compressionMethodsLength}`);
628
- // Skip compression methods length (1 byte) and compression methods
629
- pos += 1 + compressionMethodsLength;
630
- // Check if we have enough bytes for extensions length
631
- if (pos + 2 > buffer.length) {
632
- log('No extensions present or buffer too small');
633
- return undefined;
634
- }
635
- // Parse extensions length (2 bytes, big-endian)
636
- const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
637
- log(`Extensions length: ${extensionsLength}`);
638
- // Skip extensions length (2 bytes)
639
- pos += 2;
640
- // Extensions end position
641
- const extensionsEnd = pos + extensionsLength;
642
- // Check if extensions length is valid
643
- if (extensionsEnd > buffer.length) {
644
- log('Extensions length exceeds buffer size');
645
- return undefined;
646
- }
647
- // Track if we found session tickets (for improved resumption handling)
648
- let hasSessionTicket = false;
649
- let hasPskExtension = false;
650
- // Iterate through extensions
651
- while (pos + 4 <= extensionsEnd) {
652
- // Parse extension type (2 bytes, big-endian)
653
- const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
654
- log(`Extension type: 0x${extensionType.toString(16).padStart(4, '0')}`);
655
- // Skip extension type (2 bytes)
656
- pos += 2;
657
- // Parse extension length (2 bytes, big-endian)
658
- const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
659
- log(`Extension length: ${extensionLength}`);
660
- // Skip extension length (2 bytes)
661
- pos += 2;
662
- // Check if this is the SNI extension
663
- if (extensionType === this.TLS_SNI_EXTENSION_TYPE) {
664
- log('Found SNI extension');
665
- // Ensure we have enough bytes for the server name list
666
- if (pos + 2 > extensionsEnd) {
667
- log('Extension too small for server name list length');
668
- pos += extensionLength; // Skip this extension
669
- continue;
670
- }
671
- // Parse server name list length (2 bytes, big-endian)
672
- const serverNameListLength = (buffer[pos] << 8) + buffer[pos + 1];
673
- log(`Server name list length: ${serverNameListLength}`);
674
- // Skip server name list length (2 bytes)
675
- pos += 2;
676
- // Ensure server name list length is valid
677
- if (pos + serverNameListLength > extensionsEnd) {
678
- log('Server name list length exceeds extension size');
679
- break; // Exit the loop, extension parsing is broken
680
- }
681
- // End position of server name list
682
- const serverNameListEnd = pos + serverNameListLength;
683
- // Iterate through server names
684
- while (pos + 3 <= serverNameListEnd) {
685
- // Check name type (must be HOST_NAME_TYPE = 0 for hostname)
686
- const nameType = buffer[pos];
687
- log(`Name type: ${nameType}`);
688
- if (nameType !== this.TLS_SNI_HOST_NAME_TYPE) {
689
- log(`Unsupported name type: ${nameType}`);
690
- pos += 1; // Skip name type (1 byte)
691
- // Skip name length (2 bytes) and name data
692
- if (pos + 2 <= serverNameListEnd) {
693
- const nameLength = (buffer[pos] << 8) + buffer[pos + 1];
694
- pos += 2 + nameLength;
695
- }
696
- else {
697
- log('Invalid server name entry');
698
- break;
699
- }
700
- continue;
701
- }
702
- // Skip name type (1 byte)
703
- pos += 1;
704
- // Ensure we have enough bytes for name length
705
- if (pos + 2 > serverNameListEnd) {
706
- log('Server name entry too small for name length');
707
- break;
708
- }
709
- // Parse name length (2 bytes, big-endian)
710
- const nameLength = (buffer[pos] << 8) + buffer[pos + 1];
711
- log(`Name length: ${nameLength}`);
712
- // Skip name length (2 bytes)
713
- pos += 2;
714
- // Ensure we have enough bytes for the name
715
- if (pos + nameLength > serverNameListEnd) {
716
- log('Name length exceeds server name list size');
717
- break;
718
- }
719
- // Extract server name (hostname)
720
- const serverName = buffer.slice(pos, pos + nameLength).toString('utf8');
721
- log(`Extracted server name: ${serverName}`);
722
- return serverName;
723
- }
724
- }
725
- else if (extensionType === this.TLS_SESSION_TICKET_EXTENSION_TYPE) {
726
- // If we encounter a session ticket extension, mark it for later
727
- log('Found session ticket extension');
728
- hasSessionTicket = true;
729
- pos += extensionLength; // Skip this extension
730
- }
731
- else if (extensionType === this.TLS_PSK_EXTENSION_TYPE) {
732
- // TLS 1.3 PSK extension - mark for resumption support
733
- log('Found PSK extension (TLS 1.3 resumption indicator)');
734
- hasPskExtension = true;
735
- // We'll skip the extension here and process it separately if needed
736
- pos += extensionLength;
737
- }
738
- else {
739
- // Skip this extension
740
- pos += extensionLength;
741
- }
742
- }
743
- // Log if we found session resumption indicators but no SNI
744
- if (hasSessionTicket || hasPskExtension) {
745
- log('Session resumption indicators present but no SNI found');
746
- }
747
- log('No SNI extension found in ClientHello');
748
- return undefined;
749
- }
750
- catch (error) {
751
- log(`Error parsing SNI: ${error instanceof Error ? error.message : String(error)}`);
752
- return undefined;
753
- }
754
- }
755
- /**
756
- * Attempts to extract SNI from the PSK extension in a TLS 1.3 ClientHello.
757
- *
758
- * In TLS 1.3, when a client attempts to resume a session, it may include
759
- * the server name in the PSK identity hint rather than in the SNI extension.
760
- *
761
- * @param buffer - The buffer containing the TLS ClientHello message
762
- * @param enableLogging - Whether to enable detailed debug logging
763
- * @returns The extracted server name or undefined if not found
764
- */
765
- static extractSNIFromPSKExtension(buffer, enableLogging = false) {
766
- const log = (message) => {
767
- if (enableLogging) {
768
- console.log(`[PSK-SNI Extraction] ${message}`);
769
- }
770
- };
771
- try {
772
- // Ensure this is a ClientHello
773
- if (!this.isClientHello(buffer)) {
774
- log('Not a ClientHello message');
775
- return undefined;
776
- }
777
- // Find the start position of extensions
778
- let pos = 5; // Start after record header
779
- // Skip handshake type (1 byte)
780
- pos += 1;
781
- // Skip handshake length (3 bytes)
782
- pos += 3;
783
- // Skip client version (2 bytes)
784
- pos += 2;
785
- // Skip client random (32 bytes)
786
- pos += 32;
787
- // Skip session ID
788
- if (pos + 1 > buffer.length)
789
- return undefined;
790
- const sessionIdLength = buffer[pos];
791
- pos += 1 + sessionIdLength;
792
- // Skip cipher suites
793
- if (pos + 2 > buffer.length)
794
- return undefined;
795
- const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
796
- pos += 2 + cipherSuitesLength;
797
- // Skip compression methods
798
- if (pos + 1 > buffer.length)
799
- return undefined;
800
- const compressionMethodsLength = buffer[pos];
801
- pos += 1 + compressionMethodsLength;
802
- // Check if we have extensions
803
- if (pos + 2 > buffer.length) {
804
- log('No extensions present');
805
- return undefined;
806
- }
807
- // Get extensions length
808
- const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
809
- pos += 2;
810
- // Extensions end position
811
- const extensionsEnd = pos + extensionsLength;
812
- if (extensionsEnd > buffer.length)
813
- return undefined;
814
- // Look for PSK extension
815
- while (pos + 4 <= extensionsEnd) {
816
- const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
817
- pos += 2;
818
- const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
819
- pos += 2;
820
- if (extensionType === this.TLS_PSK_EXTENSION_TYPE) {
821
- log('Found PSK extension');
822
- // PSK extension structure:
823
- // 2 bytes: identities list length
824
- if (pos + 2 > extensionsEnd)
825
- break;
826
- const identitiesLength = (buffer[pos] << 8) + buffer[pos + 1];
827
- pos += 2;
828
- // End of identities list
829
- const identitiesEnd = pos + identitiesLength;
830
- if (identitiesEnd > extensionsEnd)
831
- break;
832
- // Process each PSK identity
833
- while (pos + 2 <= identitiesEnd) {
834
- // Identity length (2 bytes)
835
- if (pos + 2 > identitiesEnd)
836
- break;
837
- const identityLength = (buffer[pos] << 8) + buffer[pos + 1];
838
- pos += 2;
839
- if (pos + identityLength > identitiesEnd)
840
- break;
841
- // Try to extract hostname from identity
842
- // Chrome often embeds the hostname in the PSK identity
843
- // This is a heuristic as there's no standard format
844
- if (identityLength > 0) {
845
- const identity = buffer.slice(pos, pos + identityLength);
846
- // Skip identity bytes
847
- pos += identityLength;
848
- // Skip obfuscated ticket age (4 bytes)
849
- if (pos + 4 <= identitiesEnd) {
850
- pos += 4;
851
- }
852
- else {
853
- break;
854
- }
855
- // Try to parse the identity as UTF-8
856
- try {
857
- const identityStr = identity.toString('utf8');
858
- log(`PSK identity: ${identityStr}`);
859
- // Check if the identity contains hostname hints
860
- // Chrome often embeds the hostname in a known format
861
- // Try to extract using common patterns
862
- // Pattern 1: Look for domain name pattern
863
- const domainPattern = /([a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?\.)+[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?/i;
864
- const domainMatch = identityStr.match(domainPattern);
865
- if (domainMatch && domainMatch[0]) {
866
- log(`Found domain in PSK identity: ${domainMatch[0]}`);
867
- return domainMatch[0];
868
- }
869
- // Pattern 2: Chrome sometimes uses a specific format with delimiters
870
- // This is a heuristic approach since the format isn't standardized
871
- const parts = identityStr.split('|');
872
- if (parts.length > 1) {
873
- for (const part of parts) {
874
- if (part.includes('.') && !part.includes('/')) {
875
- const possibleDomain = part.trim();
876
- if (/^[a-z0-9.-]+$/i.test(possibleDomain)) {
877
- log(`Found possible domain in PSK delimiter format: ${possibleDomain}`);
878
- return possibleDomain;
879
- }
880
- }
881
- }
882
- }
883
- }
884
- catch (e) {
885
- log('Failed to parse PSK identity as UTF-8');
886
- }
887
- }
888
- }
889
- }
890
- else {
891
- // Skip this extension
892
- pos += extensionLength;
893
- }
894
- }
895
- log('No hostname found in PSK extension');
896
- return undefined;
897
- }
898
- catch (error) {
899
- log(`Error parsing PSK: ${error instanceof Error ? error.message : String(error)}`);
900
- return undefined;
901
- }
902
- }
903
- /**
904
- * Checks if the buffer contains TLS 1.3 early data (0-RTT)
905
- * @param buffer - The buffer to check
906
- * @param enableLogging - Whether to enable logging
907
- * @returns true if early data is detected
908
- */
909
- static hasEarlyData(buffer, enableLogging = false) {
910
- const log = (message) => {
911
- if (enableLogging) {
912
- console.log(`[Early Data] ${message}`);
913
- }
914
- };
915
- try {
916
- // Check if this is a valid ClientHello first
917
- if (!this.isClientHello(buffer)) {
918
- return false;
919
- }
920
- // Find the extensions section
921
- let pos = 5; // Start after record header
922
- // Skip handshake type (1 byte)
923
- pos += 1;
924
- // Skip handshake length (3 bytes)
925
- pos += 3;
926
- // Skip client version (2 bytes)
927
- pos += 2;
928
- // Skip client random (32 bytes)
929
- pos += 32;
930
- // Skip session ID
931
- if (pos + 1 > buffer.length)
932
- return false;
933
- const sessionIdLength = buffer[pos];
934
- pos += 1 + sessionIdLength;
935
- // Skip cipher suites
936
- if (pos + 2 > buffer.length)
937
- return false;
938
- const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
939
- pos += 2 + cipherSuitesLength;
940
- // Skip compression methods
941
- if (pos + 1 > buffer.length)
942
- return false;
943
- const compressionMethodsLength = buffer[pos];
944
- pos += 1 + compressionMethodsLength;
945
- // Check if we have extensions
946
- if (pos + 2 > buffer.length)
947
- return false;
948
- // Get extensions length
949
- const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
950
- pos += 2;
951
- // Extensions end position
952
- const extensionsEnd = pos + extensionsLength;
953
- if (extensionsEnd > buffer.length)
954
- return false;
955
- // Look for early data extension
956
- while (pos + 4 <= extensionsEnd) {
957
- const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
958
- pos += 2;
959
- const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
960
- pos += 2;
961
- if (extensionType === this.TLS_EARLY_DATA_EXTENSION_TYPE) {
962
- log('Early Data (0-RTT) extension detected');
963
- return true;
964
- }
965
- // Skip to next extension
966
- pos += extensionLength;
967
- }
968
- return false;
969
- }
970
- catch (error) {
971
- log(`Error checking for early data: ${error}`);
972
- return false;
973
- }
974
- }
975
- /**
976
- * Attempts to extract SNI from an initial ClientHello packet and handles
977
- * session resumption edge cases more robustly than the standard extraction.
978
- *
979
- * This method handles:
980
- * 1. Standard SNI extraction
981
- * 2. TLS 1.3 PSK-based resumption (Chrome, Firefox, etc.)
982
- * 3. Session ticket-based resumption
983
- * 4. Fragmented ClientHello messages
984
- * 5. TLS 1.3 Early Data (0-RTT)
985
- * 6. Chrome's connection racing behaviors
986
- * 7. Tab reactivation patterns with session cache
987
- *
988
- * @param buffer - The buffer containing the TLS ClientHello message
989
- * @param connectionInfo - Optional connection information for fragment handling
990
- * @param enableLogging - Whether to enable detailed debug logging
991
- * @returns The extracted server name or undefined if not found
992
- */
993
- static extractSNIWithResumptionSupport(buffer, connectionInfo, enableLogging = false) {
994
- const log = (message) => {
995
- if (enableLogging) {
996
- console.log(`[SNI Extraction] ${message}`);
997
- }
998
- };
999
- // Log buffer details for debugging
1000
- if (enableLogging) {
1001
- log(`Buffer size: ${buffer.length} bytes`);
1002
- log(`Buffer starts with: ${buffer.slice(0, Math.min(10, buffer.length)).toString('hex')}`);
1003
- if (buffer.length >= 5) {
1004
- const recordType = buffer[0];
1005
- const majorVersion = buffer[1];
1006
- const minorVersion = buffer[2];
1007
- const recordLength = (buffer[3] << 8) + buffer[4];
1008
- log(`TLS Record: type=${recordType}, version=${majorVersion}.${minorVersion}, length=${recordLength}`);
1009
- }
1010
- }
1011
- // Check if we need to handle fragmented packets
1012
- let processBuffer = buffer;
1013
- if (connectionInfo) {
1014
- const connectionId = this.createConnectionId(connectionInfo);
1015
- const reassembledBuffer = this.handleFragmentedClientHello(buffer, connectionId, enableLogging);
1016
- if (!reassembledBuffer) {
1017
- log(`Waiting for more fragments on connection ${connectionId}`);
1018
- return undefined; // Need more fragments to complete ClientHello
1019
- }
1020
- processBuffer = reassembledBuffer;
1021
- log(`Using reassembled buffer of length ${processBuffer.length}`);
1022
- }
1023
- // First try the standard SNI extraction
1024
- const standardSni = this.extractSNI(processBuffer, enableLogging);
1025
- if (standardSni) {
1026
- log(`Found standard SNI: ${standardSni}`);
1027
- // If we extracted a standard SNI, cache it for future use
1028
- if (connectionInfo?.sourceIp) {
1029
- const clientRandom = this.extractClientRandom(processBuffer);
1030
- this.cacheSession(connectionInfo.sourceIp, standardSni, clientRandom);
1031
- log(`Cached SNI for future reference: ${standardSni}`);
1032
- }
1033
- return standardSni;
1034
- }
1035
- // Check for session resumption when standard SNI extraction fails
1036
- // This may help in chained proxy scenarios
1037
- if (this.isClientHello(processBuffer)) {
1038
- const resumptionInfo = this.hasSessionResumption(processBuffer, enableLogging);
1039
- if (resumptionInfo.isResumption) {
1040
- log(`Detected session resumption in ClientHello without standard SNI`);
1041
- // Try to extract SNI from PSK extension
1042
- const pskSni = this.extractSNIFromPSKExtension(processBuffer, enableLogging);
1043
- if (pskSni) {
1044
- log(`Extracted SNI from PSK extension: ${pskSni}`);
1045
- // Cache this SNI
1046
- if (connectionInfo?.sourceIp) {
1047
- const clientRandom = this.extractClientRandom(processBuffer);
1048
- this.cacheSession(connectionInfo.sourceIp, pskSni, clientRandom);
1049
- }
1050
- return pskSni;
1051
- }
1052
- // If session resumption has SNI in a non-standard location,
1053
- // we need to apply heuristics
1054
- if (connectionInfo?.sourceIp) {
1055
- const cachedSni = this.getCachedSession(connectionInfo.sourceIp);
1056
- if (cachedSni) {
1057
- log(`Using cached SNI for session resumption: ${cachedSni}`);
1058
- return cachedSni;
1059
- }
1060
- }
1061
- }
1062
- }
1063
- // Try tab reactivation and other recovery methods...
1064
- // (existing code remains unchanged)
1065
- // Log detailed info about the ClientHello when SNI extraction fails
1066
- if (this.isClientHello(processBuffer) && enableLogging) {
1067
- log(`SNI extraction failed for ClientHello. Buffer details:`);
1068
- if (processBuffer.length >= 43) {
1069
- // ClientHello with at least client random
1070
- const clientRandom = processBuffer.slice(11, 11 + 32).toString('hex');
1071
- log(`Client Random: ${clientRandom}`);
1072
- // Log session ID length and presence
1073
- const sessionIdLength = processBuffer[43];
1074
- log(`Session ID length: ${sessionIdLength}`);
1075
- if (sessionIdLength > 0 && processBuffer.length >= 44 + sessionIdLength) {
1076
- const sessionId = processBuffer.slice(44, 44 + sessionIdLength).toString('hex');
1077
- log(`Session ID: ${sessionId}`);
1078
- }
1079
- }
1080
- }
1081
- // Existing code for fallback methods continues...
1082
- return undefined;
1083
- }
1084
- /**
1085
- * Main entry point for SNI extraction that handles all edge cases.
1086
- * This should be called for each TLS packet received from a client.
1087
- *
1088
- * The method uses connection tracking to handle fragmented ClientHello
1089
- * messages and various TLS 1.3 behaviors, including Chrome's connection
1090
- * racing patterns and tab reactivation behaviors.
1091
- *
1092
- * @param buffer - The buffer containing TLS data
1093
- * @param connectionInfo - Connection metadata (IPs and ports)
1094
- * @param enableLogging - Whether to enable detailed debug logging
1095
- * @param cachedSni - Optional cached SNI from previous connections (for racing detection)
1096
- * @returns The extracted server name or undefined if not found or more data needed
1097
- */
1098
- static processTlsPacket(buffer, connectionInfo, enableLogging = false, cachedSni) {
1099
- const log = (message) => {
1100
- if (enableLogging) {
1101
- console.log(`[TLS Packet] ${message}`);
1102
- }
1103
- };
1104
- // Add timestamp if not provided
1105
- if (!connectionInfo.timestamp) {
1106
- connectionInfo.timestamp = Date.now();
1107
- }
1108
- // Check if this is a TLS handshake or application data
1109
- if (!this.isTlsHandshake(buffer) && !this.isTlsApplicationData(buffer)) {
1110
- log('Not a TLS handshake or application data packet');
1111
- return undefined;
1112
- }
1113
- // Create connection ID for tracking
1114
- const connectionId = this.createConnectionId(connectionInfo);
1115
- log(`Processing TLS packet for connection ${connectionId}, buffer length: ${buffer.length}`);
1116
- // Handle application data with cached SNI (for connection racing)
1117
- if (this.isTlsApplicationData(buffer)) {
1118
- // First check if explicit cachedSni was provided
1119
- if (cachedSni) {
1120
- log(`Using provided cached SNI for application data: ${cachedSni}`);
1121
- return cachedSni;
1122
- }
1123
- // Otherwise check our session cache
1124
- const sessionCachedSni = this.getCachedSession(connectionInfo.sourceIp);
1125
- if (sessionCachedSni) {
1126
- log(`Using session-cached SNI for application data: ${sessionCachedSni}`);
1127
- return sessionCachedSni;
1128
- }
1129
- log('Application data packet without cached SNI, cannot determine hostname');
1130
- return undefined;
1131
- }
1132
- // Enhanced session resumption detection
1133
- if (this.isClientHello(buffer)) {
1134
- const resumptionInfo = this.hasSessionResumption(buffer, enableLogging);
1135
- if (resumptionInfo.isResumption) {
1136
- log(`Session resumption detected in TLS packet`);
1137
- // Always try standard SNI extraction first
1138
- const standardSni = this.extractSNI(buffer, enableLogging);
1139
- if (standardSni) {
1140
- log(`Found standard SNI in session resumption: ${standardSni}`);
1141
- // Cache this SNI
1142
- this.cacheSession(connectionInfo.sourceIp, standardSni);
1143
- return standardSni;
1144
- }
1145
- // Enhanced session resumption SNI extraction
1146
- // Try extracting from PSK identity
1147
- const pskSni = this.extractSNIFromPSKExtension(buffer, enableLogging);
1148
- if (pskSni) {
1149
- log(`Extracted SNI from PSK extension: ${pskSni}`);
1150
- this.cacheSession(connectionInfo.sourceIp, pskSni);
1151
- return pskSni;
1152
- }
1153
- // Additional check for SNI in session tickets
1154
- if (enableLogging) {
1155
- log(`Checking for session ticket information to extract server name...`);
1156
- // Log more details for debugging
1157
- try {
1158
- // Look at the raw buffer for patterns
1159
- log(`Buffer hexdump (first 100 bytes): ${buffer.slice(0, 100).toString('hex')}`);
1160
- // Try to find hostname-like patterns in the buffer
1161
- const bufferStr = buffer.toString('utf8', 0, buffer.length);
1162
- const hostnamePattern = /([a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?\.)+[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?/gi;
1163
- const hostMatches = bufferStr.match(hostnamePattern);
1164
- if (hostMatches && hostMatches.length > 0) {
1165
- log(`Possible hostnames found in buffer: ${hostMatches.join(', ')}`);
1166
- // Check if any match looks like a valid domain
1167
- for (const match of hostMatches) {
1168
- if (match.includes('.') && match.length > 3) {
1169
- log(`Potential SNI found in session data: ${match}`);
1170
- // Don't automatically use this - just log for debugging
1171
- }
1172
- }
1173
- }
1174
- }
1175
- catch (e) {
1176
- log(`Error scanning for patterns: ${e}`);
1177
- }
1178
- }
1179
- // If we still don't have SNI, check for cached sessions
1180
- const cachedSni = this.getCachedSession(connectionInfo.sourceIp);
1181
- if (cachedSni) {
1182
- log(`Using cached SNI for session resumption: ${cachedSni}`);
1183
- return cachedSni;
1184
- }
1185
- log(`Session resumption without extractable SNI`);
1186
- // If allowSessionTicket=false, should be rejected by caller
1187
- }
1188
- }
1189
- // For handshake messages, try the full extraction process
1190
- const sni = this.extractSNIWithResumptionSupport(buffer, connectionInfo, enableLogging);
1191
- if (sni) {
1192
- log(`Successfully extracted SNI: ${sni}`);
1193
- return sni;
1194
- }
1195
- // If we couldn't extract an SNI, check if this is a valid ClientHello
1196
- // If it is, but we couldn't get an SNI, it might be a fragment or
1197
- // a connection race situation
1198
- if (this.isClientHello(buffer)) {
1199
- // Check if we have a cached session for this IP
1200
- const sessionCachedSni = this.getCachedSession(connectionInfo.sourceIp);
1201
- if (sessionCachedSni) {
1202
- log(`Using session cache for ClientHello without SNI: ${sessionCachedSni}`);
1203
- return sessionCachedSni;
1204
- }
1205
- log('Valid ClientHello detected, but no SNI extracted - might need more data');
1206
- }
1207
- return undefined;
1208
- }
1209
- }
1210
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.snihandler.js","sourceRoot":"","sources":["../ts/classes.snihandler.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAEhC;;;;;GAKG;AACH,MAAM,OAAO,UAAU;IACrB,iCAAiC;aACT,8BAAyB,GAAG,EAAE,CAAC;aAC/B,8BAAyB,GAAG,EAAE,CAAC,GAAC,mCAAmC;aACnE,oCAA+B,GAAG,CAAC,CAAC;aACpC,2BAAsB,GAAG,MAAM,CAAC;aAChC,sCAAiC,GAAG,MAAM,CAAC;aAC3C,2BAAsB,GAAG,CAAC,CAAC;aAC3B,2BAAsB,GAAG,MAAM,CAAC,GAAC,4CAA4C;aAC7E,oCAA+B,GAAG,MAAM,CAAC,GAAC,yBAAyB;aACnE,kCAA6B,GAAG,MAAM,CAAC,GAAC,+BAA+B;IAE/F,sDAAsD;aACvC,sBAAiB,GAAwB,IAAI,GAAG,EAAE,CAAC;aACnD,oBAAe,GAAW,IAAI,CAAC,GAAC,0CAA0C;IAEzF,kDAAkD;aACnC,iBAAY,GAOvB,IAAI,GAAG,EAAE,CAAC;IAEd,yDAAyD;aAC1C,wBAAmB,GAAW,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,GAAC,2BAA2B;IAE7F,sDAAsD;aACvC,2BAAsB,GAA0B,IAAI,CAAC;IAEpE;;;OAGG;IACI,MAAM,CAAC,uBAAuB;QACnC,IAAI,IAAI,CAAC,sBAAsB,KAAK,IAAI,EAAE,CAAC;YACzC,IAAI,CAAC,sBAAsB,GAAG,WAAW,CAAC,GAAG,EAAE;gBAC7C,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,CAAC,EAAE,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,iBAAiB;QACvC,CAAC;IACH,CAAC;IAED;;OAEG;IACK,MAAM,CAAC,mBAAmB;QAChC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,WAAW,GAAa,EAAE,CAAC;QAEjC,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE;YACzC,IAAI,GAAG,GAAG,OAAO,CAAC,SAAS,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACvD,WAAW,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YACxB,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,WAAW,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YAC1B,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAChC,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;OAOG;IACK,MAAM,CAAC,eAAe,CAAC,QAAgB,EAAE,YAAqB;QACpE,IAAI,YAAY,EAAE,CAAC;YACjB,iEAAiE;YACjE,OAAO,GAAG,QAAQ,IAAI,YAAY,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QACvD,CAAC;QACD,sCAAsC;QACtC,OAAO,QAAQ,CAAC;IAClB,CAAC;IAED;;;;;;OAMG;IACK,MAAM,CAAC,YAAY,CAAC,QAAgB,EAAE,GAAW,EAAE,YAAqB;QAC9E,MAAM,GAAG,GAAG,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC;QACzD,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,GAAG,EAAE;YACzB,GAAG;YACH,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,YAAY;SACb,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACK,MAAM,CAAC,gBAAgB,CAAC,QAAgB,EAAE,YAAqB;QACrE,6CAA6C;QAC7C,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,UAAU,GAAG,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC;YAChE,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YACzD,IAAI,cAAc,EAAE,CAAC;gBACnB,OAAO,cAAc,CAAC,GAAG,CAAC;YAC5B,CAAC;QACH,CAAC;QAED,8BAA8B;QAC9B,MAAM,KAAK,GAAG,IAAI,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC;QAC7C,MAAM,OAAO,GAAG,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QAC7C,IAAI,OAAO,EAAE,CAAC;YACZ,iDAAiD;YACjD,OAAO,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YAC/B,OAAO,OAAO,CAAC,GAAG,CAAC;QACrB,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;;OAKG;IACK,MAAM,CAAC,mBAAmB,CAAC,MAAc;QAC/C,IAAI,CAAC;YACH,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,IAAI,MAAM,CAAC,MAAM,GAAG,EAAE,EAAE,CAAC;gBACtD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,oEAAoE;YACpE,0DAA0D;YAC1D,2DAA2D;YAC3D,OAAO,MAAM,CAAC,KAAK,CAAC,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc,CAAC,MAAc;QACzC,OAAO,MAAM,CAAC,MAAM,GAAG,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,CAAC;IAC3E,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,oBAAoB,CAAC,MAAc;QAC/C,OAAO,MAAM,CAAC,MAAM,GAAG,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,CAAC;IAC3E,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,kBAAkB,CAAC,cAKhC;QACC,MAAM,EAAE,QAAQ,EAAE,UAAU,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,cAAc,CAAC;QAClE,OAAO,GAAG,QAAQ,IAAI,UAAU,IAAI,MAAM,IAAI,QAAQ,EAAE,CAAC;IAC3D,CAAC;IAED;;;;;;;;OAQG;IACI,MAAM,CAAC,2BAA2B,CACvC,MAAc,EACd,YAAoB,EACpB,gBAAyB,KAAK;QAE9B,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,kBAAkB,OAAO,EAAE,CAAC,CAAC;YAC3C,CAAC;QACH,CAAC,CAAC;QAEF,6CAA6C;QAC7C,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAC,EAAE,CAAC;YAC9C,yCAAyC;YACzC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE,MAAM,CAAC,CAAC;YAEjD,iEAAiE;YACjE,UAAU,CAAC,GAAG,EAAE;gBACd,IAAI,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAC,EAAE,CAAC;oBAC7C,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;oBAC5C,GAAG,CAAC,cAAc,YAAY,6CAA6C,CAAC,CAAC;gBAC/E,CAAC;YACH,CAAC,EAAE,IAAI,CAAC,eAAe,CAAC,CAAC;YAEzB,kEAAkE;YAClE,IAAI,CAAC;gBACH,IAAI,MAAM,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;oBACvB,wCAAwC;oBACxC,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,sCAAsC;oBAC7F,GAAG,CAAC,wBAAwB,MAAM,CAAC,MAAM,6BAA6B,YAAY,EAAE,CAAC,CAAC;oBAEtF,8DAA8D;oBAC9D,IAAI,MAAM,CAAC,MAAM,IAAI,YAAY,EAAE,CAAC;wBAClC,GAAG,CAAC,yDAAyD,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;wBAC9E,OAAO,MAAM,CAAC;oBAChB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,GAAG,CACD,6BAA6B,MAAM,CAAC,MAAM,gDAAgD,CAC3F,CAAC;gBACJ,CAAC;YACH,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,GAAG,CAAC,+CAA+C,CAAC,EAAE,CAAC,CAAC;YAC1D,CAAC;YAED,GAAG,CAAC,gCAAgC,YAAY,mBAAmB,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC,CAAC,sBAAsB;QAC1C,CAAC;aAAM,CAAC;YACN,0CAA0C;YAC1C,MAAM,cAAc,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAE,CAAC;YACjE,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,cAAc,EAAE,MAAM,CAAC,CAAC,CAAC;YAC1D,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;YAEpD,GAAG,CAAC,0BAA0B,YAAY,eAAe,SAAS,CAAC,MAAM,EAAE,CAAC,CAAC;YAE7E,8CAA8C;YAC9C,IAAI,CAAC;gBACH,IAAI,SAAS,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;oBAC1B,wCAAwC;oBACxC,MAAM,YAAY,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,sCAAsC;oBACnG,GAAG,CACD,4BAA4B,SAAS,CAAC,MAAM,6BAA6B,YAAY,EAAE,CACxF,CAAC;oBAEF,6CAA6C;oBAC7C,IAAI,SAAS,CAAC,MAAM,IAAI,YAAY,EAAE,CAAC;wBACrC,GAAG,CACD,2CAA2C,SAAS,CAAC,MAAM,aAAa,YAAY,EAAE,CACvF,CAAC;wBAEF,mEAAmE;wBACnE,MAAM,cAAc,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC;wBAExD,sEAAsE;wBACtE,IACE,cAAc,CAAC,MAAM,GAAG,CAAC;4BACzB,cAAc,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,+BAA+B,EAC1D,CAAC;4BACD,GAAG,CAAC,oDAAoD,CAAC,CAAC;4BAE1D,kDAAkD;4BAClD,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;4BAC5C,OAAO,cAAc,CAAC;wBACxB,CAAC;6BAAM,CAAC;4BACN,GAAG,CAAC,0EAA0E,CAAC,CAAC;4BAChF,kEAAkE;4BAElE,oEAAoE;4BACpE,IAAI,SAAS,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gCACxC,MAAM,cAAc,GAAG,SAAS,CAAC,YAAY,CAAC,CAAC;gCAC/C,GAAG,CACD,qBAAqB,cAAc,iBAAiB,IAAI,CAAC,yBAAyB,GAAG,CACtF,CAAC;gCAEF,IAAI,cAAc,KAAK,IAAI,CAAC,yBAAyB,EAAE,CAAC;oCACtD,MAAM,aAAa,GAAG,SAAS,CAAC,YAAY,GAAG,CAAC,CAAC,CAAC;oCAClD,GAAG,CACD,wBAAwB,aAAa,iBAAiB,IAAI,CAAC,+BAA+B,GAAG,CAC9F,CAAC;oCAEF,IAAI,aAAa,KAAK,IAAI,CAAC,+BAA+B,EAAE,CAAC;wCAC3D,mEAAmE;wCACnE,GAAG,CAAC,+DAA+D,CAAC,CAAC;wCACrE,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;wCAC5C,OAAO,SAAS,CAAC;oCACnB,CAAC;gCACH,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,GAAG,CAAC,mDAAmD,CAAC,EAAE,CAAC,CAAC;YAC9D,CAAC;YAED,OAAO,SAAS,CAAC,CAAC,4BAA4B;QAChD,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,aAAa,CAAC,MAAc;QACxC,kEAAkE;QAClE,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACtB,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wDAAwD;QACxD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,EAAE,CAAC;YACjD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,+DAA+D;QAC/D,wDAAwD;QACxD,OAAO,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,+BAA+B,CAAC;IAC5D,CAAC;IAED;;;;;;;OAOG;IACI,MAAM,CAAC,oBAAoB,CAChC,MAAc,EACd,gBAAyB,KAAK;QAE9B,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,wBAAwB,OAAO,EAAE,CAAC,CAAC;YACjD,CAAC;QACH,CAAC,CAAC;QAEF,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAChC,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAChD,CAAC;QAED,IAAI,CAAC;YACH,sCAAsC;YACtC,IAAI,GAAG,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,2DAA2D;YACpF,GAAG,IAAI,EAAE,CAAC,CAAC,qBAAqB;YAEhC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;YAE3E,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,IAAI,oBAAoB,GAAG,eAAe,GAAG,CAAC,CAAC;YAE/C,IAAI,oBAAoB,EAAE,CAAC;gBACzB,GAAG,CAAC,0CAA0C,eAAe,GAAG,CAAC,CAAC;YACpE,CAAC;YAED,mCAAmC;YACnC,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;YAE3B,qBAAqB;YACrB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;YAC3E,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;YAE9B,2BAA2B;YAC3B,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;YAC3E,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;YAEpC,uBAAuB;YACvB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;YAE3E,yCAAyC;YACzC,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAC7C,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;YAEjF,8BAA8B;YAC9B,IAAI,gBAAgB,GAAG,KAAK,CAAC;YAC7B,IAAI,MAAM,GAAG,KAAK,CAAC;YACnB,IAAI,YAAY,GAAG,KAAK,CAAC;YAEzB,6BAA6B;YAC7B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,IAAI,CAAC,CAAC;gBAET,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,IAAI,CAAC,CAAC;gBAET,IAAI,aAAa,KAAK,IAAI,CAAC,iCAAiC,EAAE,CAAC;oBAC7D,GAAG,CAAC,gCAAgC,CAAC,CAAC;oBACtC,gBAAgB,GAAG,IAAI,CAAC;oBAExB,8DAA8D;oBAC9D,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;wBACxB,GAAG,CAAC,6BAA6B,eAAe,0BAA0B,CAAC,CAAC;oBAC9E,CAAC;gBACH,CAAC;qBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBACzD,GAAG,CAAC,oDAAoD,CAAC,CAAC;oBAC1D,MAAM,GAAG,IAAI,CAAC;gBAChB,CAAC;qBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,6BAA6B,EAAE,CAAC;oBAChE,GAAG,CAAC,4CAA4C,CAAC,CAAC;oBAClD,YAAY,GAAG,IAAI,CAAC;gBACtB,CAAC;gBAED,sBAAsB;gBACtB,GAAG,IAAI,eAAe,CAAC;YACzB,CAAC;YAED,2BAA2B;YAC3B,IAAI,MAAM,GAAG,KAAK,CAAC;YAEnB,kDAAkD;YAClD,GAAG,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,2DAA2D;YAChF,GAAG,IAAI,EAAE,CAAC,CAAC,qBAAqB;YAEhC,IAAI,GAAG,GAAG,CAAC,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC7B,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;gBACpC,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;gBAE3B,qBAAqB;gBACrB,IAAI,GAAG,GAAG,CAAC,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;oBAC7B,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAChE,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;oBAE9B,2BAA2B;oBAC3B,IAAI,GAAG,GAAG,CAAC,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;wBAC7B,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;wBAC7C,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;wBAEpC,uBAAuB;wBACvB,IAAI,GAAG,GAAG,CAAC,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;4BAC7B,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;4BAC9D,GAAG,IAAI,CAAC,CAAC;4BAET,0BAA0B;4BAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;4BAC7C,IAAI,aAAa,IAAI,MAAM,CAAC,MAAM,EAAE,CAAC;gCACnC,yBAAyB;gCACzB,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;oCAChC,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oCAC3D,GAAG,IAAI,CAAC,CAAC;oCAET,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oCAC7D,GAAG,IAAI,CAAC,CAAC;oCAET,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;wCAClD,oDAAoD;wCACpD,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;4CACxB,MAAM,GAAG,IAAI,CAAC;4CAEd,kDAAkD;4CAClD,IAAI,CAAC;gDACH,4CAA4C;gDAC5C,MAAM,OAAO,GAAG,GAAG,CAAC;gDACpB,IAAI,OAAO,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;oDACjC,MAAM,cAAc,GAAG,CAAC,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,OAAO,GAAG,CAAC,CAAC,CAAC;oDAEpE,yCAAyC;oDACzC,IAAI,OAAO,GAAG,CAAC,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;wDACrC,6CAA6C;wDAC7C,IAAI,MAAM,CAAC,OAAO,GAAG,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC;4DAC9B,0BAA0B;4DAC1B,IAAI,OAAO,GAAG,CAAC,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gEACrC,4BAA4B;gEAC5B,MAAM,UAAU,GAAG,CAAC,MAAM,CAAC,OAAO,GAAG,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,OAAO,GAAG,CAAC,CAAC,CAAC;gEAEpE,uBAAuB;gEACvB,IAAI,OAAO,GAAG,CAAC,GAAG,UAAU,IAAI,aAAa,EAAE,CAAC;oEAC9C,MAAM,QAAQ,GAAG,MAAM;yEACpB,KAAK,CAAC,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,CAAC,GAAG,UAAU,CAAC;yEAC5C,QAAQ,CAAC,MAAM,CAAC,CAAC;oEACpB,GAAG,CAAC,yCAAyC,QAAQ,EAAE,CAAC,CAAC;gEAC3D,CAAC;4DACH,CAAC;wDACH,CAAC;oDACH,CAAC;gDACH,CAAC;4CACH,CAAC;4CAAC,OAAO,CAAC,EAAE,CAAC;gDACX,GAAG,CAAC,+BAA+B,CAAC,EAAE,CAAC,CAAC;gDACxC,GAAG,CAAC,mCAAmC,GAAG,eAAe,CAAC,CAAC;4CAC7D,CAAC;wCACH,CAAC;6CAAM,CAAC;4CACN,GAAG,CAAC,+CAA+C,CAAC,CAAC;wCACvD,CAAC;wCACD,MAAM;oCACR,CAAC;oCAED,sBAAsB;oCACtB,GAAG,IAAI,eAAe,CAAC;gCACzB,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,kEAAkE;YAClE,MAAM,YAAY,GAChB,gBAAgB,IAAI,MAAM,IAAI,YAAY,IAAI,CAAC,oBAAoB,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB;YAEvG,IAAI,YAAY,EAAE,CAAC;gBACjB,GAAG,CACD,+BAA+B;oBAC7B,CAAC,gBAAgB,CAAC,CAAC,CAAC,kBAAkB,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC5C,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;oBACvB,CAAC,YAAY,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,CAAC;oBACpC,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC1C,CAAC,MAAM,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,eAAe,CAAC,CAC5C,CAAC;YACJ,CAAC;YAED,mCAAmC;YACnC,yFAAyF;YACzF,IAAI,YAAY,EAAE,CAAC;gBACjB,GAAG,CACD,gCAAgC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,sBACnD,gBAAgB,CAAC,CAAC,CAAC,kBAAkB,CAAC,CAAC,CAAC,EAC1C,GAAG,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,GAAG,YAAY,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,GAC3D,oBAAoB,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,EACxC,EAAE,CACH,CAAC;YACJ,CAAC;YAED,OAAO;gBACL,YAAY;gBACZ,MAAM;aACP,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,0CAA0C,KAAK,EAAE,CAAC,CAAC;YACvD,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAChD,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACI,MAAM,CAAC,0BAA0B,CACtC,MAAc,EACd,gBAAyB,KAAK;QAE9B,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,sBAAsB,OAAO,EAAE,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC,CAAC;QAEF,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAChC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,0EAA0E;YAC1E,IAAI,GAAG,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,2DAA2D;YACpF,GAAG,IAAI,EAAE,CAAC,CAAC,qBAAqB;YAEhC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,KAAK,CAAC;YAE1C,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAEpC,2CAA2C;YAC3C,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;gBACxB,GAAG,CAAC,0CAA0C,eAAe,GAAG,CAAC,CAAC;gBAElE,qBAAqB;gBACrB,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;gBAE3B,qBAAqB;gBACrB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;oBAAE,OAAO,KAAK,CAAC;gBAC1C,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAChE,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;gBAE9B,2BAA2B;gBAC3B,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;oBAAE,OAAO,KAAK,CAAC;gBAC1C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;gBAC7C,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;gBAEpC,uBAAuB;gBACvB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;oBAAE,OAAO,KAAK,CAAC;gBAE1C,8DAA8D;gBAC9D,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC9D,GAAG,IAAI,CAAC,CAAC;gBAET,0BAA0B;gBAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;gBAC7C,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM;oBAAE,OAAO,KAAK,CAAC;gBAEhD,wDAAwD;gBACxD,IAAI,gBAAgB,GAAG,KAAK,CAAC;gBAC7B,IAAI,MAAM,GAAG,KAAK,CAAC;gBACnB,IAAI,MAAM,GAAG,KAAK,CAAC;gBAEnB,6BAA6B;gBAC7B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;oBAChC,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAC3D,GAAG,IAAI,CAAC,CAAC;oBAET,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAC7D,GAAG,IAAI,CAAC,CAAC;oBAET,IAAI,aAAa,KAAK,IAAI,CAAC,iCAAiC,EAAE,CAAC;wBAC7D,gBAAgB,GAAG,IAAI,CAAC;oBAC1B,CAAC;yBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;wBACzD,MAAM,GAAG,IAAI,CAAC;oBAChB,CAAC;yBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;wBACzD,MAAM,GAAG,IAAI,CAAC;oBAChB,CAAC;oBAED,sBAAsB;oBACtB,GAAG,IAAI,eAAe,CAAC;gBACzB,CAAC;gBAED,gFAAgF;gBAChF,IAAI,CAAC,gBAAgB,IAAI,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;oBAC5C,GAAG,CAAC,mEAAmE,CAAC,CAAC;oBACzE,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,wCAAwC,KAAK,EAAE,CAAC,CAAC;QACvD,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;;OAOG;IACI,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,gBAAyB,KAAK;QACrE,iBAAiB;QACjB,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,oBAAoB,OAAO,EAAE,CAAC,CAAC;YAC7C,CAAC;QACH,CAAC,CAAC;QAEF,IAAI,CAAC;YACH,sDAAsD;YACtD,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtB,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBAC9C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,6DAA6D;YAC7D,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,EAAE,CAAC;gBACjD,GAAG,CAAC,+BAA+B,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;gBAChD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,oBAAoB;YACpB,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,GAAG,CAAC,gBAAgB,YAAY,IAAI,YAAY,EAAE,CAAC,CAAC;YAEpD,8CAA8C;YAC9C,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClD,GAAG,CAAC,kBAAkB,YAAY,EAAE,CAAC,CAAC;YAEtC,6CAA6C;YAC7C,IAAI,MAAM,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gBACrC,GAAG,CAAC,4CAA4C,CAAC,CAAC;gBAClD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,2CAA2C;YAC3C,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,kDAAkD;YAClD,IAAI,MAAM,CAAC,GAAG,CAAC,KAAK,IAAI,CAAC,+BAA+B,EAAE,CAAC;gBACzD,GAAG,CAAC,8BAA8B,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,+BAA+B;YAC/B,GAAG,IAAI,CAAC,CAAC;YAET,+CAA+C;YAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YACvF,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;YAE5C,kCAAkC;YAClC,GAAG,IAAI,CAAC,CAAC;YAET,iCAAiC;YACjC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC3C,GAAG,CAAC,mBAAmB,kBAAkB,IAAI,kBAAkB,EAAE,CAAC,CAAC;YAEnE,gCAAgC;YAChC,GAAG,IAAI,CAAC,CAAC;YAET,gCAAgC;YAChC,GAAG,IAAI,EAAE,CAAC;YAEV,mBAAmB;YACnB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBAC9C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,GAAG,CAAC,sBAAsB,eAAe,EAAE,CAAC,CAAC;YAE7C,iDAAiD;YACjD,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;YAE3B,qCAAqC;YACrC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,mDAAmD;YACnD,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,CAAC,yBAAyB,kBAAkB,EAAE,CAAC,CAAC;YAEnD,wDAAwD;YACxD,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;YAE9B,qCAAqC;YACrC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,iDAAiD,CAAC,CAAC;gBACvD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,4CAA4C;YAC5C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,CAAC,+BAA+B,wBAAwB,EAAE,CAAC,CAAC;YAE/D,mEAAmE;YACnE,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;YAEpC,sDAAsD;YACtD,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,gDAAgD;YAChD,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,CAAC,sBAAsB,gBAAgB,EAAE,CAAC,CAAC;YAE9C,mCAAmC;YACnC,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAE7C,sCAAsC;YACtC,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClC,GAAG,CAAC,uCAAuC,CAAC,CAAC;gBAC7C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,uEAAuE;YACvE,IAAI,gBAAgB,GAAG,KAAK,CAAC;YAC7B,IAAI,eAAe,GAAG,KAAK,CAAC;YAE5B,6BAA6B;YAC7B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,6CAA6C;gBAC7C,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,CAAC,qBAAqB,aAAa,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;gBAExE,gCAAgC;gBAChC,GAAG,IAAI,CAAC,CAAC;gBAET,+CAA+C;gBAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;gBAE5C,kCAAkC;gBAClC,GAAG,IAAI,CAAC,CAAC;gBAET,qCAAqC;gBACrC,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBAClD,GAAG,CAAC,qBAAqB,CAAC,CAAC;oBAE3B,uDAAuD;oBACvD,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa,EAAE,CAAC;wBAC5B,GAAG,CAAC,iDAAiD,CAAC,CAAC;wBACvD,GAAG,IAAI,eAAe,CAAC,CAAC,sBAAsB;wBAC9C,SAAS;oBACX,CAAC;oBAED,sDAAsD;oBACtD,MAAM,oBAAoB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAClE,GAAG,CAAC,4BAA4B,oBAAoB,EAAE,CAAC,CAAC;oBAExD,yCAAyC;oBACzC,GAAG,IAAI,CAAC,CAAC;oBAET,0CAA0C;oBAC1C,IAAI,GAAG,GAAG,oBAAoB,GAAG,aAAa,EAAE,CAAC;wBAC/C,GAAG,CAAC,gDAAgD,CAAC,CAAC;wBACtD,MAAM,CAAC,6CAA6C;oBACtD,CAAC;oBAED,mCAAmC;oBACnC,MAAM,iBAAiB,GAAG,GAAG,GAAG,oBAAoB,CAAC;oBAErD,+BAA+B;oBAC/B,OAAO,GAAG,GAAG,CAAC,IAAI,iBAAiB,EAAE,CAAC;wBACpC,4DAA4D;wBAC5D,MAAM,QAAQ,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;wBAC7B,GAAG,CAAC,cAAc,QAAQ,EAAE,CAAC,CAAC;wBAE9B,IAAI,QAAQ,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;4BAC7C,GAAG,CAAC,0BAA0B,QAAQ,EAAE,CAAC,CAAC;4BAC1C,GAAG,IAAI,CAAC,CAAC,CAAC,0BAA0B;4BAEpC,2CAA2C;4BAC3C,IAAI,GAAG,GAAG,CAAC,IAAI,iBAAiB,EAAE,CAAC;gCACjC,MAAM,UAAU,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gCACxD,GAAG,IAAI,CAAC,GAAG,UAAU,CAAC;4BACxB,CAAC;iCAAM,CAAC;gCACN,GAAG,CAAC,2BAA2B,CAAC,CAAC;gCACjC,MAAM;4BACR,CAAC;4BACD,SAAS;wBACX,CAAC;wBAED,0BAA0B;wBAC1B,GAAG,IAAI,CAAC,CAAC;wBAET,8CAA8C;wBAC9C,IAAI,GAAG,GAAG,CAAC,GAAG,iBAAiB,EAAE,CAAC;4BAChC,GAAG,CAAC,6CAA6C,CAAC,CAAC;4BACnD,MAAM;wBACR,CAAC;wBAED,0CAA0C;wBAC1C,MAAM,UAAU,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;wBACxD,GAAG,CAAC,gBAAgB,UAAU,EAAE,CAAC,CAAC;wBAElC,6BAA6B;wBAC7B,GAAG,IAAI,CAAC,CAAC;wBAET,2CAA2C;wBAC3C,IAAI,GAAG,GAAG,UAAU,GAAG,iBAAiB,EAAE,CAAC;4BACzC,GAAG,CAAC,2CAA2C,CAAC,CAAC;4BACjD,MAAM;wBACR,CAAC;wBAED,iCAAiC;wBACjC,MAAM,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,UAAU,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;wBACxE,GAAG,CAAC,0BAA0B,UAAU,EAAE,CAAC,CAAC;wBAC5C,OAAO,UAAU,CAAC;oBACpB,CAAC;gBACH,CAAC;qBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,iCAAiC,EAAE,CAAC;oBACpE,gEAAgE;oBAChE,GAAG,CAAC,gCAAgC,CAAC,CAAC;oBACtC,gBAAgB,GAAG,IAAI,CAAC;oBACxB,GAAG,IAAI,eAAe,CAAC,CAAC,sBAAsB;gBAChD,CAAC;qBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBACzD,sDAAsD;oBACtD,GAAG,CAAC,oDAAoD,CAAC,CAAC;oBAC1D,eAAe,GAAG,IAAI,CAAC;oBACvB,oEAAoE;oBACpE,GAAG,IAAI,eAAe,CAAC;gBACzB,CAAC;qBAAM,CAAC;oBACN,sBAAsB;oBACtB,GAAG,IAAI,eAAe,CAAC;gBACzB,CAAC;YACH,CAAC;YAED,2DAA2D;YAC3D,IAAI,gBAAgB,IAAI,eAAe,EAAE,CAAC;gBACxC,GAAG,CAAC,wDAAwD,CAAC,CAAC;YAChE,CAAC;YAED,GAAG,CAAC,uCAAuC,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,sBAAsB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,0BAA0B,CACtC,MAAc,EACd,gBAAyB,KAAK;QAE9B,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,wBAAwB,OAAO,EAAE,CAAC,CAAC;YACjD,CAAC;QACH,CAAC,CAAC;QAEF,IAAI,CAAC;YACH,+BAA+B;YAC/B,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;gBAChC,GAAG,CAAC,2BAA2B,CAAC,CAAC;gBACjC,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,wCAAwC;YACxC,IAAI,GAAG,GAAG,CAAC,CAAC,CAAC,4BAA4B;YAEzC,+BAA+B;YAC/B,GAAG,IAAI,CAAC,CAAC;YAET,kCAAkC;YAClC,GAAG,IAAI,CAAC,CAAC;YAET,gCAAgC;YAChC,GAAG,IAAI,CAAC,CAAC;YAET,gCAAgC;YAChC,GAAG,IAAI,EAAE,CAAC;YAEV,kBAAkB;YAClB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,SAAS,CAAC;YAC9C,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;YAE3B,qBAAqB;YACrB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,SAAS,CAAC;YAC9C,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;YAE9B,2BAA2B;YAC3B,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,SAAS,CAAC;YAC9C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;YAEpC,8BAA8B;YAC9B,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,uBAAuB,CAAC,CAAC;gBAC7B,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,wBAAwB;YACxB,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAC7C,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,SAAS,CAAC;YAEpD,yBAAyB;YACzB,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,IAAI,CAAC,CAAC;gBAET,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,IAAI,CAAC,CAAC;gBAET,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBAClD,GAAG,CAAC,qBAAqB,CAAC,CAAC;oBAE3B,2BAA2B;oBAC3B,kCAAkC;oBAClC,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa;wBAAE,MAAM;oBACnC,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAC9D,GAAG,IAAI,CAAC,CAAC;oBAET,yBAAyB;oBACzB,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;oBAC7C,IAAI,aAAa,GAAG,aAAa;wBAAE,MAAM;oBAEzC,4BAA4B;oBAC5B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;wBAChC,4BAA4B;wBAC5B,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa;4BAAE,MAAM;wBACnC,MAAM,cAAc,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;wBAC5D,GAAG,IAAI,CAAC,CAAC;wBAET,IAAI,GAAG,GAAG,cAAc,GAAG,aAAa;4BAAE,MAAM;wBAEhD,wCAAwC;wBACxC,uDAAuD;wBACvD,oDAAoD;wBACpD,IAAI,cAAc,GAAG,CAAC,EAAE,CAAC;4BACvB,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,cAAc,CAAC,CAAC;4BAEzD,sBAAsB;4BACtB,GAAG,IAAI,cAAc,CAAC;4BAEtB,uCAAuC;4BACvC,IAAI,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gCAC7B,GAAG,IAAI,CAAC,CAAC;4BACX,CAAC;iCAAM,CAAC;gCACN,MAAM;4BACR,CAAC;4BAED,qCAAqC;4BACrC,IAAI,CAAC;gCACH,MAAM,WAAW,GAAG,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gCAC9C,GAAG,CAAC,iBAAiB,WAAW,EAAE,CAAC,CAAC;gCAEpC,gDAAgD;gCAChD,qDAAqD;gCACrD,uCAAuC;gCAEvC,0CAA0C;gCAC1C,MAAM,aAAa,GACjB,4EAA4E,CAAC;gCAC/E,MAAM,WAAW,GAAG,WAAW,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;gCACrD,IAAI,WAAW,IAAI,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC;oCAClC,GAAG,CAAC,iCAAiC,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;oCACvD,OAAO,WAAW,CAAC,CAAC,CAAC,CAAC;gCACxB,CAAC;gCAED,qEAAqE;gCACrE,mEAAmE;gCACnE,MAAM,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gCACrC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oCACrB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;wCACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;4CAC9C,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;4CACnC,IAAI,gBAAgB,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;gDAC1C,GAAG,CAAC,kDAAkD,cAAc,EAAE,CAAC,CAAC;gDACxE,OAAO,cAAc,CAAC;4CACxB,CAAC;wCACH,CAAC;oCACH,CAAC;gCACH,CAAC;4BACH,CAAC;4BAAC,OAAO,CAAC,EAAE,CAAC;gCACX,GAAG,CAAC,uCAAuC,CAAC,CAAC;4BAC/C,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,sBAAsB;oBACtB,GAAG,IAAI,eAAe,CAAC;gBACzB,CAAC;YACH,CAAC;YAED,GAAG,CAAC,oCAAoC,CAAC,CAAC;YAC1C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,sBAAsB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,YAAY,CAAC,MAAc,EAAE,gBAAyB,KAAK;QACvE,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,gBAAgB,OAAO,EAAE,CAAC,CAAC;YACzC,CAAC;QACH,CAAC,CAAC;QAEF,IAAI,CAAC;YACH,6CAA6C;YAC7C,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;gBAChC,OAAO,KAAK,CAAC;YACf,CAAC;YAED,8BAA8B;YAC9B,IAAI,GAAG,GAAG,CAAC,CAAC,CAAC,4BAA4B;YAEzC,+BAA+B;YAC/B,GAAG,IAAI,CAAC,CAAC;YAET,kCAAkC;YAClC,GAAG,IAAI,CAAC,CAAC;YAET,gCAAgC;YAChC,GAAG,IAAI,CAAC,CAAC;YAET,gCAAgC;YAChC,GAAG,IAAI,EAAE,CAAC;YAEV,kBAAkB;YAClB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,KAAK,CAAC;YAC1C,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;YAE3B,qBAAqB;YACrB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,KAAK,CAAC;YAC1C,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;YAE9B,2BAA2B;YAC3B,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,KAAK,CAAC;YAC1C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;YAEpC,8BAA8B;YAC9B,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,KAAK,CAAC;YAE1C,wBAAwB;YACxB,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAC7C,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM;gBAAE,OAAO,KAAK,CAAC;YAEhD,gCAAgC;YAChC,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,IAAI,CAAC,CAAC;gBAET,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,IAAI,CAAC,CAAC;gBAET,IAAI,aAAa,KAAK,IAAI,CAAC,6BAA6B,EAAE,CAAC;oBACzD,GAAG,CAAC,uCAAuC,CAAC,CAAC;oBAC7C,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,yBAAyB;gBACzB,GAAG,IAAI,eAAe,CAAC;YACzB,CAAC;YAED,OAAO,KAAK,CAAC;QACf,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,kCAAkC,KAAK,EAAE,CAAC,CAAC;YAC/C,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;;;;;;;;;;;;;;;;OAiBG;IACI,MAAM,CAAC,+BAA+B,CAC3C,MAAc,EACd,cAKC,EACD,gBAAyB,KAAK;QAE9B,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,oBAAoB,OAAO,EAAE,CAAC,CAAC;YAC7C,CAAC;QACH,CAAC,CAAC;QAEF,mCAAmC;QACnC,IAAI,aAAa,EAAE,CAAC;YAClB,GAAG,CAAC,gBAAgB,MAAM,CAAC,MAAM,QAAQ,CAAC,CAAC;YAC3C,GAAG,CAAC,uBAAuB,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YAE3F,IAAI,MAAM,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,UAAU,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC7B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAElD,GAAG,CACD,oBAAoB,UAAU,aAAa,YAAY,IAAI,YAAY,YAAY,YAAY,EAAE,CAClG,CAAC;YACJ,CAAC;QACH,CAAC;QAED,gDAAgD;QAChD,IAAI,aAAa,GAAG,MAAM,CAAC;QAC3B,IAAI,cAAc,EAAE,CAAC;YACnB,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;YAC7D,MAAM,iBAAiB,GAAG,IAAI,CAAC,2BAA2B,CACxD,MAAM,EACN,YAAY,EACZ,aAAa,CACd,CAAC;YAEF,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,GAAG,CAAC,4CAA4C,YAAY,EAAE,CAAC,CAAC;gBAChE,OAAO,SAAS,CAAC,CAAC,8CAA8C;YAClE,CAAC;YAED,aAAa,GAAG,iBAAiB,CAAC;YAClC,GAAG,CAAC,sCAAsC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;QACpE,CAAC;QAED,wCAAwC;QACxC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,aAAa,EAAE,aAAa,CAAC,CAAC;QAClE,IAAI,WAAW,EAAE,CAAC;YAChB,GAAG,CAAC,uBAAuB,WAAW,EAAE,CAAC,CAAC;YAE1C,0DAA0D;YAC1D,IAAI,cAAc,EAAE,QAAQ,EAAE,CAAC;gBAC7B,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,CAAC;gBAC7D,IAAI,CAAC,YAAY,CAAC,cAAc,CAAC,QAAQ,EAAE,WAAW,EAAE,YAAY,CAAC,CAAC;gBACtE,GAAG,CAAC,oCAAoC,WAAW,EAAE,CAAC,CAAC;YACzD,CAAC;YAED,OAAO,WAAW,CAAC;QACrB,CAAC;QAED,kEAAkE;QAClE,2CAA2C;QAC3C,IAAI,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,EAAE,CAAC;YACtC,MAAM,cAAc,GAAG,IAAI,CAAC,oBAAoB,CAAC,aAAa,EAAE,aAAa,CAAC,CAAC;YAE/E,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,iEAAiE,CAAC,CAAC;gBAEvE,wCAAwC;gBACxC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,aAAa,EAAE,aAAa,CAAC,CAAC;gBAC7E,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBAEnD,iBAAiB;oBACjB,IAAI,cAAc,EAAE,QAAQ,EAAE,CAAC;wBAC7B,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,CAAC;wBAC7D,IAAI,CAAC,YAAY,CAAC,cAAc,CAAC,QAAQ,EAAE,MAAM,EAAE,YAAY,CAAC,CAAC;oBACnE,CAAC;oBAED,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,4DAA4D;gBAC5D,8BAA8B;gBAC9B,IAAI,cAAc,EAAE,QAAQ,EAAE,CAAC;oBAC7B,MAAM,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;oBACjE,IAAI,SAAS,EAAE,CAAC;wBACd,GAAG,CAAC,4CAA4C,SAAS,EAAE,CAAC,CAAC;wBAC7D,OAAO,SAAS,CAAC;oBACnB,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,qDAAqD;QACrD,oCAAoC;QAEpC,oEAAoE;QACpE,IAAI,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,IAAI,aAAa,EAAE,CAAC;YACvD,GAAG,CAAC,wDAAwD,CAAC,CAAC;YAE9D,IAAI,aAAa,CAAC,MAAM,IAAI,EAAE,EAAE,CAAC;gBAC/B,0CAA0C;gBAC1C,MAAM,YAAY,GAAG,aAAa,CAAC,KAAK,CAAC,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;gBACtE,GAAG,CAAC,kBAAkB,YAAY,EAAE,CAAC,CAAC;gBAEtC,qCAAqC;gBACrC,MAAM,eAAe,GAAG,aAAa,CAAC,EAAE,CAAC,CAAC;gBAC1C,GAAG,CAAC,sBAAsB,eAAe,EAAE,CAAC,CAAC;gBAE7C,IAAI,eAAe,GAAG,CAAC,IAAI,aAAa,CAAC,MAAM,IAAI,EAAE,GAAG,eAAe,EAAE,CAAC;oBACxE,MAAM,SAAS,GAAG,aAAa,CAAC,KAAK,CAAC,EAAE,EAAE,EAAE,GAAG,eAAe,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;oBAChF,GAAG,CAAC,eAAe,SAAS,EAAE,CAAC,CAAC;gBAClC,CAAC;YACH,CAAC;QACH,CAAC;QAED,kDAAkD;QAClD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;;;;;;;;;;OAaG;IAEI,MAAM,CAAC,gBAAgB,CAC5B,MAAc,EACd,cAMC,EACD,gBAAyB,KAAK,EAC9B,SAAkB;QAElB,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,gBAAgB,OAAO,EAAE,CAAC,CAAC;YACzC,CAAC;QACH,CAAC,CAAC;QAEF,gCAAgC;QAChC,IAAI,CAAC,cAAc,CAAC,SAAS,EAAE,CAAC;YAC9B,cAAc,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACxC,CAAC;QAED,uDAAuD;QACvD,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YACvE,GAAG,CAAC,gDAAgD,CAAC,CAAC;YACtD,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,oCAAoC;QACpC,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;QAC7D,GAAG,CAAC,wCAAwC,YAAY,oBAAoB,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;QAE7F,kEAAkE;QAClE,IAAI,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YACtC,iDAAiD;YACjD,IAAI,SAAS,EAAE,CAAC;gBACd,GAAG,CAAC,mDAAmD,SAAS,EAAE,CAAC,CAAC;gBACpE,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,oCAAoC;YACpC,MAAM,gBAAgB,GAAG,IAAI,CAAC,gBAAgB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YACxE,IAAI,gBAAgB,EAAE,CAAC;gBACrB,GAAG,CAAC,kDAAkD,gBAAgB,EAAE,CAAC,CAAC;gBAC1E,OAAO,gBAAgB,CAAC;YAC1B,CAAC;YAED,GAAG,CAAC,uEAAuE,CAAC,CAAC;YAC7E,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,wCAAwC;QACxC,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,MAAM,cAAc,GAAG,IAAI,CAAC,oBAAoB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;YAExE,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBAEjD,2CAA2C;gBAC3C,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;gBAC3D,IAAI,WAAW,EAAE,CAAC;oBAChB,GAAG,CAAC,6CAA6C,WAAW,EAAE,CAAC,CAAC;oBAEhE,iBAAiB;oBACjB,IAAI,CAAC,YAAY,CAAC,cAAc,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;oBACxD,OAAO,WAAW,CAAC;gBACrB,CAAC;gBAED,6CAA6C;gBAC7C,mCAAmC;gBACnC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;gBACtE,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBACnD,IAAI,CAAC,YAAY,CAAC,cAAc,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;oBACnD,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,8CAA8C;gBAC9C,IAAI,aAAa,EAAE,CAAC;oBAClB,GAAG,CAAC,mEAAmE,CAAC,CAAC;oBACzE,iCAAiC;oBACjC,IAAI,CAAC;wBACH,sCAAsC;wBACtC,GAAG,CAAC,qCAAqC,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;wBAEjF,mDAAmD;wBACnD,MAAM,SAAS,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC;wBAC5D,MAAM,eAAe,GACnB,6EAA6E,CAAC;wBAChF,MAAM,WAAW,GAAG,SAAS,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;wBAErD,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;4BAC1C,GAAG,CAAC,uCAAuC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;4BAErE,+CAA+C;4BAC/C,KAAK,MAAM,KAAK,IAAI,WAAW,EAAE,CAAC;gCAChC,IAAI,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oCAC5C,GAAG,CAAC,wCAAwC,KAAK,EAAE,CAAC,CAAC;oCACrD,wDAAwD;gCAC1D,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;oBAAC,OAAO,CAAC,EAAE,CAAC;wBACX,GAAG,CAAC,gCAAgC,CAAC,EAAE,CAAC,CAAC;oBAC3C,CAAC;gBACH,CAAC;gBAED,wDAAwD;gBACxD,MAAM,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;gBACjE,IAAI,SAAS,EAAE,CAAC;oBACd,GAAG,CAAC,4CAA4C,SAAS,EAAE,CAAC,CAAC;oBAC7D,OAAO,SAAS,CAAC;gBACnB,CAAC;gBAED,GAAG,CAAC,4CAA4C,CAAC,CAAC;gBAClD,4DAA4D;YAC9D,CAAC;QACH,CAAC;QAED,0DAA0D;QAC1D,MAAM,GAAG,GAAG,IAAI,CAAC,+BAA+B,CAAC,MAAM,EAAE,cAAc,EAAE,aAAa,CAAC,CAAC;QAExF,IAAI,GAAG,EAAE,CAAC;YACR,GAAG,CAAC,+BAA+B,GAAG,EAAE,CAAC,CAAC;YAC1C,OAAO,GAAG,CAAC;QACb,CAAC;QAED,sEAAsE;QACtE,kEAAkE;QAClE,8BAA8B;QAC9B,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,gDAAgD;YAChD,MAAM,gBAAgB,GAAG,IAAI,CAAC,gBAAgB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YACxE,IAAI,gBAAgB,EAAE,CAAC;gBACrB,GAAG,CAAC,oDAAoD,gBAAgB,EAAE,CAAC,CAAC;gBAC5E,OAAO,gBAAgB,CAAC;YAC1B,CAAC;YAED,GAAG,CAAC,yEAAyE,CAAC,CAAC;QACjF,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC"}