@push.rocks/smartproxy 19.3.2 → 19.3.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +18 -35
- package/readme.plan.md +173 -271
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,592 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import { IncomingMessage, ServerResponse } from 'http';
|
|
3
|
-
import { CertificateEvents } from '../../certificate/events/certificate-events.js';
|
|
4
|
-
import { HttpEvents, HttpStatus, HttpError, CertificateError, ServerError, } from '../models/http-types.js';
|
|
5
|
-
import { ChallengeResponder } from './challenge-responder.js';
|
|
6
|
-
import { extractPort80RoutesFromRoutes } from './acme-interfaces.js';
|
|
7
|
-
// Re-export for backward compatibility
|
|
8
|
-
export { HttpError as Port80HandlerError, CertificateError, ServerError };
|
|
9
|
-
// Port80Handler events enum for backward compatibility
|
|
10
|
-
export const Port80HandlerEvents = CertificateEvents;
|
|
11
|
-
/**
|
|
12
|
-
* Configuration options for the Port80Handler
|
|
13
|
-
*/
|
|
14
|
-
// Port80Handler options moved to common types
|
|
15
|
-
/**
|
|
16
|
-
* Port80Handler with ACME certificate management and request forwarding capabilities
|
|
17
|
-
* Now with glob pattern support for domain matching
|
|
18
|
-
*/
|
|
19
|
-
export class Port80Handler extends plugins.EventEmitter {
|
|
20
|
-
/**
|
|
21
|
-
* Creates a new Port80Handler
|
|
22
|
-
* @param options Configuration options
|
|
23
|
-
*/
|
|
24
|
-
constructor(options = {}) {
|
|
25
|
-
super();
|
|
26
|
-
this.challengeResponder = null;
|
|
27
|
-
this.server = null;
|
|
28
|
-
// Renewal scheduling is handled externally by SmartProxy
|
|
29
|
-
this.isShuttingDown = false;
|
|
30
|
-
this.domainCertificates = new Map();
|
|
31
|
-
// Default options
|
|
32
|
-
this.options = {
|
|
33
|
-
port: options.port ?? 80,
|
|
34
|
-
accountEmail: options.accountEmail ?? 'admin@example.com',
|
|
35
|
-
useProduction: options.useProduction ?? false, // Safer default: staging
|
|
36
|
-
httpsRedirectPort: options.httpsRedirectPort ?? 443,
|
|
37
|
-
enabled: options.enabled ?? true, // Enable by default
|
|
38
|
-
certificateStore: options.certificateStore ?? './certs',
|
|
39
|
-
skipConfiguredCerts: options.skipConfiguredCerts ?? false,
|
|
40
|
-
renewThresholdDays: options.renewThresholdDays ?? 30,
|
|
41
|
-
renewCheckIntervalHours: options.renewCheckIntervalHours ?? 24,
|
|
42
|
-
autoRenew: options.autoRenew ?? true,
|
|
43
|
-
routeForwards: options.routeForwards ?? []
|
|
44
|
-
};
|
|
45
|
-
// Initialize challenge responder
|
|
46
|
-
if (this.options.enabled) {
|
|
47
|
-
this.challengeResponder = new ChallengeResponder(this.options.useProduction, this.options.accountEmail, this.options.certificateStore);
|
|
48
|
-
// Forward certificate events from the challenge responder
|
|
49
|
-
this.challengeResponder.on(CertificateEvents.CERTIFICATE_ISSUED, (data) => {
|
|
50
|
-
this.emit(CertificateEvents.CERTIFICATE_ISSUED, data);
|
|
51
|
-
});
|
|
52
|
-
this.challengeResponder.on(CertificateEvents.CERTIFICATE_RENEWED, (data) => {
|
|
53
|
-
this.emit(CertificateEvents.CERTIFICATE_RENEWED, data);
|
|
54
|
-
});
|
|
55
|
-
this.challengeResponder.on(CertificateEvents.CERTIFICATE_FAILED, (error) => {
|
|
56
|
-
this.emit(CertificateEvents.CERTIFICATE_FAILED, error);
|
|
57
|
-
});
|
|
58
|
-
this.challengeResponder.on(CertificateEvents.CERTIFICATE_EXPIRING, (expiry) => {
|
|
59
|
-
this.emit(CertificateEvents.CERTIFICATE_EXPIRING, expiry);
|
|
60
|
-
});
|
|
61
|
-
}
|
|
62
|
-
}
|
|
63
|
-
/**
|
|
64
|
-
* Starts the HTTP server for ACME challenges
|
|
65
|
-
*/
|
|
66
|
-
async start() {
|
|
67
|
-
if (this.server) {
|
|
68
|
-
throw new ServerError('Server is already running');
|
|
69
|
-
}
|
|
70
|
-
if (this.isShuttingDown) {
|
|
71
|
-
throw new ServerError('Server is shutting down');
|
|
72
|
-
}
|
|
73
|
-
// Skip if disabled
|
|
74
|
-
if (this.options.enabled === false) {
|
|
75
|
-
console.log('Port80Handler is disabled, skipping start');
|
|
76
|
-
return;
|
|
77
|
-
}
|
|
78
|
-
// Initialize the challenge responder if enabled
|
|
79
|
-
if (this.options.enabled && this.challengeResponder) {
|
|
80
|
-
try {
|
|
81
|
-
await this.challengeResponder.initialize();
|
|
82
|
-
}
|
|
83
|
-
catch (error) {
|
|
84
|
-
throw new ServerError(`Failed to initialize challenge responder: ${error instanceof Error ? error.message : String(error)}`);
|
|
85
|
-
}
|
|
86
|
-
}
|
|
87
|
-
return new Promise((resolve, reject) => {
|
|
88
|
-
try {
|
|
89
|
-
this.server = plugins.http.createServer((req, res) => this.handleRequest(req, res));
|
|
90
|
-
this.server.on('error', (error) => {
|
|
91
|
-
if (error.code === 'EACCES') {
|
|
92
|
-
reject(new ServerError(`Permission denied to bind to port ${this.options.port}. Try running with elevated privileges or use a port > 1024.`, error.code));
|
|
93
|
-
}
|
|
94
|
-
else if (error.code === 'EADDRINUSE') {
|
|
95
|
-
reject(new ServerError(`Port ${this.options.port} is already in use.`, error.code));
|
|
96
|
-
}
|
|
97
|
-
else {
|
|
98
|
-
reject(new ServerError(error.message, error.code));
|
|
99
|
-
}
|
|
100
|
-
});
|
|
101
|
-
this.server.listen(this.options.port, () => {
|
|
102
|
-
console.log(`Port80Handler is listening on port ${this.options.port}`);
|
|
103
|
-
this.emit(CertificateEvents.MANAGER_STARTED, this.options.port);
|
|
104
|
-
// Start certificate process for domains with acmeMaintenance enabled
|
|
105
|
-
for (const [domain, domainInfo] of this.domainCertificates.entries()) {
|
|
106
|
-
// Skip glob patterns for certificate issuance
|
|
107
|
-
if (this.isGlobPattern(domain)) {
|
|
108
|
-
console.log(`Skipping initial certificate for glob pattern: ${domain}`);
|
|
109
|
-
continue;
|
|
110
|
-
}
|
|
111
|
-
if (domainInfo.options.acmeMaintenance && !domainInfo.certObtained && !domainInfo.obtainingInProgress) {
|
|
112
|
-
this.obtainCertificate(domain).catch(err => {
|
|
113
|
-
console.error(`Error obtaining initial certificate for ${domain}:`, err);
|
|
114
|
-
});
|
|
115
|
-
}
|
|
116
|
-
}
|
|
117
|
-
resolve();
|
|
118
|
-
});
|
|
119
|
-
}
|
|
120
|
-
catch (error) {
|
|
121
|
-
const message = error instanceof Error ? error.message : 'Unknown error starting server';
|
|
122
|
-
reject(new ServerError(message));
|
|
123
|
-
}
|
|
124
|
-
});
|
|
125
|
-
}
|
|
126
|
-
/**
|
|
127
|
-
* Stops the HTTP server and cleanup resources
|
|
128
|
-
*/
|
|
129
|
-
async stop() {
|
|
130
|
-
if (!this.server) {
|
|
131
|
-
return;
|
|
132
|
-
}
|
|
133
|
-
this.isShuttingDown = true;
|
|
134
|
-
return new Promise((resolve) => {
|
|
135
|
-
if (this.server) {
|
|
136
|
-
this.server.close(() => {
|
|
137
|
-
this.server = null;
|
|
138
|
-
this.isShuttingDown = false;
|
|
139
|
-
this.emit(CertificateEvents.MANAGER_STOPPED);
|
|
140
|
-
resolve();
|
|
141
|
-
});
|
|
142
|
-
}
|
|
143
|
-
else {
|
|
144
|
-
this.isShuttingDown = false;
|
|
145
|
-
resolve();
|
|
146
|
-
}
|
|
147
|
-
});
|
|
148
|
-
}
|
|
149
|
-
/**
|
|
150
|
-
* Adds a domain with configuration options
|
|
151
|
-
* @param options Domain configuration options
|
|
152
|
-
*/
|
|
153
|
-
addDomain(options) {
|
|
154
|
-
// Normalize options format (handle both IDomainOptions and IPort80RouteOptions)
|
|
155
|
-
const normalizedOptions = this.normalizeOptions(options);
|
|
156
|
-
if (!normalizedOptions.domainName || typeof normalizedOptions.domainName !== 'string') {
|
|
157
|
-
throw new HttpError('Invalid domain name');
|
|
158
|
-
}
|
|
159
|
-
const domainName = normalizedOptions.domainName;
|
|
160
|
-
if (!this.domainCertificates.has(domainName)) {
|
|
161
|
-
this.domainCertificates.set(domainName, {
|
|
162
|
-
options: normalizedOptions,
|
|
163
|
-
certObtained: false,
|
|
164
|
-
obtainingInProgress: false
|
|
165
|
-
});
|
|
166
|
-
console.log(`Domain added: ${domainName} with configuration:`, {
|
|
167
|
-
sslRedirect: normalizedOptions.sslRedirect,
|
|
168
|
-
acmeMaintenance: normalizedOptions.acmeMaintenance,
|
|
169
|
-
hasForward: !!normalizedOptions.forward,
|
|
170
|
-
hasAcmeForward: !!normalizedOptions.acmeForward,
|
|
171
|
-
routeReference: normalizedOptions.routeReference
|
|
172
|
-
});
|
|
173
|
-
// If acmeMaintenance is enabled and not a glob pattern, start certificate process immediately
|
|
174
|
-
if (normalizedOptions.acmeMaintenance && this.server && !this.isGlobPattern(domainName)) {
|
|
175
|
-
this.obtainCertificate(domainName).catch(err => {
|
|
176
|
-
console.error(`Error obtaining initial certificate for ${domainName}:`, err);
|
|
177
|
-
});
|
|
178
|
-
}
|
|
179
|
-
}
|
|
180
|
-
else {
|
|
181
|
-
// Update existing domain with new options
|
|
182
|
-
const existing = this.domainCertificates.get(domainName);
|
|
183
|
-
existing.options = normalizedOptions;
|
|
184
|
-
console.log(`Domain ${domainName} configuration updated`);
|
|
185
|
-
}
|
|
186
|
-
}
|
|
187
|
-
/**
|
|
188
|
-
* Add domains from route configurations
|
|
189
|
-
* @param routes Array of route configurations
|
|
190
|
-
*/
|
|
191
|
-
addDomainsFromRoutes(routes) {
|
|
192
|
-
// Extract Port80RouteOptions from routes
|
|
193
|
-
const routeOptions = extractPort80RoutesFromRoutes(routes);
|
|
194
|
-
// Add each domain
|
|
195
|
-
for (const options of routeOptions) {
|
|
196
|
-
this.addDomain(options);
|
|
197
|
-
}
|
|
198
|
-
console.log(`Added ${routeOptions.length} domains from routes for certificate management`);
|
|
199
|
-
}
|
|
200
|
-
/**
|
|
201
|
-
* Normalize options from either IDomainOptions or IPort80RouteOptions
|
|
202
|
-
* @param options Options to normalize
|
|
203
|
-
* @returns Normalized IDomainOptions
|
|
204
|
-
* @private
|
|
205
|
-
*/
|
|
206
|
-
normalizeOptions(options) {
|
|
207
|
-
// Handle IPort80RouteOptions format
|
|
208
|
-
if ('domain' in options) {
|
|
209
|
-
return {
|
|
210
|
-
domainName: options.domain,
|
|
211
|
-
sslRedirect: options.sslRedirect,
|
|
212
|
-
acmeMaintenance: options.acmeMaintenance,
|
|
213
|
-
forward: options.forward,
|
|
214
|
-
acmeForward: options.acmeForward,
|
|
215
|
-
routeReference: options.routeReference
|
|
216
|
-
};
|
|
217
|
-
}
|
|
218
|
-
// Already in IDomainOptions format
|
|
219
|
-
return options;
|
|
220
|
-
}
|
|
221
|
-
/**
|
|
222
|
-
* Removes a domain from management
|
|
223
|
-
* @param domain The domain to remove
|
|
224
|
-
*/
|
|
225
|
-
removeDomain(domain) {
|
|
226
|
-
if (this.domainCertificates.delete(domain)) {
|
|
227
|
-
console.log(`Domain removed: ${domain}`);
|
|
228
|
-
}
|
|
229
|
-
}
|
|
230
|
-
/**
|
|
231
|
-
* Gets the certificate for a domain if it exists
|
|
232
|
-
* @param domain The domain to get the certificate for
|
|
233
|
-
*/
|
|
234
|
-
getCertificate(domain) {
|
|
235
|
-
// Can't get certificates for glob patterns
|
|
236
|
-
if (this.isGlobPattern(domain)) {
|
|
237
|
-
return null;
|
|
238
|
-
}
|
|
239
|
-
const domainInfo = this.domainCertificates.get(domain);
|
|
240
|
-
if (!domainInfo || !domainInfo.certObtained || !domainInfo.certificate || !domainInfo.privateKey) {
|
|
241
|
-
return null;
|
|
242
|
-
}
|
|
243
|
-
return {
|
|
244
|
-
domain,
|
|
245
|
-
certificate: domainInfo.certificate,
|
|
246
|
-
privateKey: domainInfo.privateKey,
|
|
247
|
-
expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate()
|
|
248
|
-
};
|
|
249
|
-
}
|
|
250
|
-
/**
|
|
251
|
-
* Check if a domain is a glob pattern
|
|
252
|
-
* @param domain Domain to check
|
|
253
|
-
* @returns True if the domain is a glob pattern
|
|
254
|
-
*/
|
|
255
|
-
isGlobPattern(domain) {
|
|
256
|
-
return domain.includes('*');
|
|
257
|
-
}
|
|
258
|
-
/**
|
|
259
|
-
* Get domain info for a specific domain, using glob pattern matching if needed
|
|
260
|
-
* @param requestDomain The actual domain from the request
|
|
261
|
-
* @returns The domain info or null if not found
|
|
262
|
-
*/
|
|
263
|
-
getDomainInfoForRequest(requestDomain) {
|
|
264
|
-
// Try direct match first
|
|
265
|
-
if (this.domainCertificates.has(requestDomain)) {
|
|
266
|
-
return {
|
|
267
|
-
domainInfo: this.domainCertificates.get(requestDomain),
|
|
268
|
-
pattern: requestDomain
|
|
269
|
-
};
|
|
270
|
-
}
|
|
271
|
-
// Then try glob patterns
|
|
272
|
-
for (const [pattern, domainInfo] of this.domainCertificates.entries()) {
|
|
273
|
-
if (this.isGlobPattern(pattern) && this.domainMatchesPattern(requestDomain, pattern)) {
|
|
274
|
-
return { domainInfo, pattern };
|
|
275
|
-
}
|
|
276
|
-
}
|
|
277
|
-
return null;
|
|
278
|
-
}
|
|
279
|
-
/**
|
|
280
|
-
* Check if a domain matches a glob pattern
|
|
281
|
-
* @param domain The domain to check
|
|
282
|
-
* @param pattern The pattern to match against
|
|
283
|
-
* @returns True if the domain matches the pattern
|
|
284
|
-
*/
|
|
285
|
-
domainMatchesPattern(domain, pattern) {
|
|
286
|
-
// Handle different glob pattern styles
|
|
287
|
-
if (pattern.startsWith('*.')) {
|
|
288
|
-
// *.example.com matches any subdomain
|
|
289
|
-
const suffix = pattern.substring(2);
|
|
290
|
-
return domain.endsWith(suffix) && domain.includes('.') && domain !== suffix;
|
|
291
|
-
}
|
|
292
|
-
else if (pattern.endsWith('.*')) {
|
|
293
|
-
// example.* matches any TLD
|
|
294
|
-
const prefix = pattern.substring(0, pattern.length - 2);
|
|
295
|
-
const domainParts = domain.split('.');
|
|
296
|
-
return domain.startsWith(prefix + '.') && domainParts.length >= 2;
|
|
297
|
-
}
|
|
298
|
-
else if (pattern === '*') {
|
|
299
|
-
// Wildcard matches everything
|
|
300
|
-
return true;
|
|
301
|
-
}
|
|
302
|
-
else {
|
|
303
|
-
// Exact match (shouldn't reach here as we check exact matches first)
|
|
304
|
-
return domain === pattern;
|
|
305
|
-
}
|
|
306
|
-
}
|
|
307
|
-
/**
|
|
308
|
-
* Handles incoming HTTP requests
|
|
309
|
-
* @param req The HTTP request
|
|
310
|
-
* @param res The HTTP response
|
|
311
|
-
*/
|
|
312
|
-
handleRequest(req, res) {
|
|
313
|
-
// Emit request received event with basic info
|
|
314
|
-
this.emit(HttpEvents.REQUEST_RECEIVED, {
|
|
315
|
-
url: req.url,
|
|
316
|
-
method: req.method,
|
|
317
|
-
headers: req.headers
|
|
318
|
-
});
|
|
319
|
-
const hostHeader = req.headers.host;
|
|
320
|
-
if (!hostHeader) {
|
|
321
|
-
res.statusCode = HttpStatus.BAD_REQUEST;
|
|
322
|
-
res.end('Bad Request: Host header is missing');
|
|
323
|
-
return;
|
|
324
|
-
}
|
|
325
|
-
// Extract domain (ignoring any port in the Host header)
|
|
326
|
-
const domain = hostHeader.split(':')[0];
|
|
327
|
-
// Check if this is an ACME challenge request that our ChallengeResponder can handle
|
|
328
|
-
if (this.challengeResponder && req.url?.startsWith('/.well-known/acme-challenge/')) {
|
|
329
|
-
// Handle ACME HTTP-01 challenge with the challenge responder
|
|
330
|
-
const domainMatch = this.getDomainInfoForRequest(domain);
|
|
331
|
-
// If there's a specific ACME forwarding config for this domain, use that instead
|
|
332
|
-
if (domainMatch?.domainInfo.options.acmeForward) {
|
|
333
|
-
this.forwardRequest(req, res, domainMatch.domainInfo.options.acmeForward, 'ACME challenge');
|
|
334
|
-
return;
|
|
335
|
-
}
|
|
336
|
-
// If domain exists and has acmeMaintenance enabled, or we don't have the domain yet
|
|
337
|
-
// (for auto-provisioning), try to handle the ACME challenge
|
|
338
|
-
if (!domainMatch || domainMatch.domainInfo.options.acmeMaintenance) {
|
|
339
|
-
// Let the challenge responder try to handle this request
|
|
340
|
-
if (this.challengeResponder.handleRequest(req, res)) {
|
|
341
|
-
// Challenge was handled
|
|
342
|
-
return;
|
|
343
|
-
}
|
|
344
|
-
}
|
|
345
|
-
}
|
|
346
|
-
// Dynamic provisioning: if domain not yet managed, register for ACME and return 503
|
|
347
|
-
if (!this.domainCertificates.has(domain)) {
|
|
348
|
-
try {
|
|
349
|
-
this.addDomain({ domainName: domain, sslRedirect: false, acmeMaintenance: true });
|
|
350
|
-
}
|
|
351
|
-
catch (err) {
|
|
352
|
-
console.error(`Error registering domain for on-demand provisioning: ${err}`);
|
|
353
|
-
}
|
|
354
|
-
res.statusCode = HttpStatus.SERVICE_UNAVAILABLE;
|
|
355
|
-
res.end('Certificate issuance in progress');
|
|
356
|
-
return;
|
|
357
|
-
}
|
|
358
|
-
// Get domain config, using glob pattern matching if needed
|
|
359
|
-
const domainMatch = this.getDomainInfoForRequest(domain);
|
|
360
|
-
if (!domainMatch) {
|
|
361
|
-
res.statusCode = HttpStatus.NOT_FOUND;
|
|
362
|
-
res.end('Domain not configured');
|
|
363
|
-
return;
|
|
364
|
-
}
|
|
365
|
-
const { domainInfo, pattern } = domainMatch;
|
|
366
|
-
const options = domainInfo.options;
|
|
367
|
-
// Check if we should forward non-ACME requests
|
|
368
|
-
if (options.forward) {
|
|
369
|
-
this.forwardRequest(req, res, options.forward, 'HTTP');
|
|
370
|
-
return;
|
|
371
|
-
}
|
|
372
|
-
// If certificate exists and sslRedirect is enabled, redirect to HTTPS
|
|
373
|
-
// (Skip for glob patterns as they won't have certificates)
|
|
374
|
-
if (!this.isGlobPattern(pattern) && domainInfo.certObtained && options.sslRedirect) {
|
|
375
|
-
const httpsPort = this.options.httpsRedirectPort;
|
|
376
|
-
const portSuffix = httpsPort === 443 ? '' : `:${httpsPort}`;
|
|
377
|
-
const redirectUrl = `https://${domain}${portSuffix}${req.url || '/'}`;
|
|
378
|
-
res.statusCode = HttpStatus.MOVED_PERMANENTLY;
|
|
379
|
-
res.setHeader('Location', redirectUrl);
|
|
380
|
-
res.end(`Redirecting to ${redirectUrl}`);
|
|
381
|
-
return;
|
|
382
|
-
}
|
|
383
|
-
// Handle case where certificate maintenance is enabled but not yet obtained
|
|
384
|
-
// (Skip for glob patterns as they can't have certificates)
|
|
385
|
-
if (!this.isGlobPattern(pattern) && options.acmeMaintenance && !domainInfo.certObtained) {
|
|
386
|
-
// Trigger certificate issuance if not already running
|
|
387
|
-
if (!domainInfo.obtainingInProgress) {
|
|
388
|
-
this.obtainCertificate(domain).catch(err => {
|
|
389
|
-
const errorMessage = err instanceof Error ? err.message : 'Unknown error';
|
|
390
|
-
this.emit(CertificateEvents.CERTIFICATE_FAILED, {
|
|
391
|
-
domain,
|
|
392
|
-
error: errorMessage,
|
|
393
|
-
isRenewal: false
|
|
394
|
-
});
|
|
395
|
-
console.error(`Error obtaining certificate for ${domain}:`, err);
|
|
396
|
-
});
|
|
397
|
-
}
|
|
398
|
-
res.statusCode = HttpStatus.SERVICE_UNAVAILABLE;
|
|
399
|
-
res.end('Certificate issuance in progress, please try again later.');
|
|
400
|
-
return;
|
|
401
|
-
}
|
|
402
|
-
// Default response for unhandled request
|
|
403
|
-
res.statusCode = HttpStatus.NOT_FOUND;
|
|
404
|
-
res.end('No handlers configured for this request');
|
|
405
|
-
// Emit request handled event
|
|
406
|
-
this.emit(HttpEvents.REQUEST_HANDLED, {
|
|
407
|
-
domain,
|
|
408
|
-
url: req.url,
|
|
409
|
-
statusCode: res.statusCode
|
|
410
|
-
});
|
|
411
|
-
}
|
|
412
|
-
/**
|
|
413
|
-
* Forwards an HTTP request to the specified target
|
|
414
|
-
* @param req The original request
|
|
415
|
-
* @param res The response object
|
|
416
|
-
* @param target The forwarding target (IP and port)
|
|
417
|
-
* @param requestType Type of request for logging
|
|
418
|
-
*/
|
|
419
|
-
forwardRequest(req, res, target, requestType) {
|
|
420
|
-
const options = {
|
|
421
|
-
hostname: target.ip,
|
|
422
|
-
port: target.port,
|
|
423
|
-
path: req.url,
|
|
424
|
-
method: req.method,
|
|
425
|
-
headers: { ...req.headers }
|
|
426
|
-
};
|
|
427
|
-
const domain = req.headers.host?.split(':')[0] || 'unknown';
|
|
428
|
-
console.log(`Forwarding ${requestType} request for ${domain} to ${target.ip}:${target.port}`);
|
|
429
|
-
const proxyReq = plugins.http.request(options, (proxyRes) => {
|
|
430
|
-
// Copy status code
|
|
431
|
-
res.statusCode = proxyRes.statusCode || HttpStatus.INTERNAL_SERVER_ERROR;
|
|
432
|
-
// Copy headers
|
|
433
|
-
for (const [key, value] of Object.entries(proxyRes.headers)) {
|
|
434
|
-
if (value)
|
|
435
|
-
res.setHeader(key, value);
|
|
436
|
-
}
|
|
437
|
-
// Pipe response data
|
|
438
|
-
proxyRes.pipe(res);
|
|
439
|
-
this.emit(HttpEvents.REQUEST_FORWARDED, {
|
|
440
|
-
domain,
|
|
441
|
-
requestType,
|
|
442
|
-
target: `${target.ip}:${target.port}`,
|
|
443
|
-
statusCode: proxyRes.statusCode
|
|
444
|
-
});
|
|
445
|
-
});
|
|
446
|
-
proxyReq.on('error', (error) => {
|
|
447
|
-
console.error(`Error forwarding request to ${target.ip}:${target.port}:`, error);
|
|
448
|
-
this.emit(HttpEvents.REQUEST_ERROR, {
|
|
449
|
-
domain,
|
|
450
|
-
error: error.message,
|
|
451
|
-
target: `${target.ip}:${target.port}`
|
|
452
|
-
});
|
|
453
|
-
if (!res.headersSent) {
|
|
454
|
-
res.statusCode = HttpStatus.INTERNAL_SERVER_ERROR;
|
|
455
|
-
res.end(`Proxy error: ${error.message}`);
|
|
456
|
-
}
|
|
457
|
-
else {
|
|
458
|
-
res.end();
|
|
459
|
-
}
|
|
460
|
-
});
|
|
461
|
-
// Pipe original request to proxy request
|
|
462
|
-
if (req.readable) {
|
|
463
|
-
req.pipe(proxyReq);
|
|
464
|
-
}
|
|
465
|
-
else {
|
|
466
|
-
proxyReq.end();
|
|
467
|
-
}
|
|
468
|
-
}
|
|
469
|
-
/**
|
|
470
|
-
* Obtains a certificate for a domain using ACME HTTP-01 challenge
|
|
471
|
-
* @param domain The domain to obtain a certificate for
|
|
472
|
-
* @param isRenewal Whether this is a renewal attempt
|
|
473
|
-
*/
|
|
474
|
-
async obtainCertificate(domain, isRenewal = false) {
|
|
475
|
-
if (this.isGlobPattern(domain)) {
|
|
476
|
-
throw new CertificateError('Cannot obtain certificates for glob pattern domains', domain, isRenewal);
|
|
477
|
-
}
|
|
478
|
-
const domainInfo = this.domainCertificates.get(domain);
|
|
479
|
-
if (!domainInfo.options.acmeMaintenance) {
|
|
480
|
-
console.log(`Skipping certificate issuance for ${domain} - acmeMaintenance is disabled`);
|
|
481
|
-
return;
|
|
482
|
-
}
|
|
483
|
-
if (domainInfo.obtainingInProgress) {
|
|
484
|
-
console.log(`Certificate issuance already in progress for ${domain}`);
|
|
485
|
-
return;
|
|
486
|
-
}
|
|
487
|
-
if (!this.challengeResponder) {
|
|
488
|
-
throw new HttpError('Challenge responder is not initialized');
|
|
489
|
-
}
|
|
490
|
-
domainInfo.obtainingInProgress = true;
|
|
491
|
-
domainInfo.lastRenewalAttempt = new Date();
|
|
492
|
-
try {
|
|
493
|
-
// Request certificate via ChallengeResponder
|
|
494
|
-
// The ChallengeResponder handles all ACME client interactions and will emit events
|
|
495
|
-
const certData = await this.challengeResponder.requestCertificate(domain, isRenewal);
|
|
496
|
-
// Update domain info with certificate data
|
|
497
|
-
domainInfo.certificate = certData.certificate;
|
|
498
|
-
domainInfo.privateKey = certData.privateKey;
|
|
499
|
-
domainInfo.certObtained = true;
|
|
500
|
-
domainInfo.expiryDate = certData.expiryDate;
|
|
501
|
-
console.log(`Certificate ${isRenewal ? 'renewed' : 'obtained'} for ${domain}`);
|
|
502
|
-
}
|
|
503
|
-
catch (error) {
|
|
504
|
-
const errorMsg = error instanceof Error ? error.message : String(error);
|
|
505
|
-
console.error(`Error during certificate issuance for ${domain}:`, error);
|
|
506
|
-
throw new CertificateError(errorMsg, domain, isRenewal);
|
|
507
|
-
}
|
|
508
|
-
finally {
|
|
509
|
-
domainInfo.obtainingInProgress = false;
|
|
510
|
-
}
|
|
511
|
-
}
|
|
512
|
-
/**
|
|
513
|
-
* Extract expiry date from certificate using a more robust approach
|
|
514
|
-
* @param certificate Certificate PEM string
|
|
515
|
-
* @param domain Domain for logging
|
|
516
|
-
* @returns Extracted expiry date or default
|
|
517
|
-
*/
|
|
518
|
-
extractExpiryDateFromCertificate(certificate, domain) {
|
|
519
|
-
try {
|
|
520
|
-
// This is still using regex, but in a real implementation you would use
|
|
521
|
-
// a library like node-forge or x509 to properly parse the certificate
|
|
522
|
-
const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
|
|
523
|
-
if (matches && matches[1]) {
|
|
524
|
-
const expiryDate = new Date(matches[1]);
|
|
525
|
-
// Validate that we got a valid date
|
|
526
|
-
if (!isNaN(expiryDate.getTime())) {
|
|
527
|
-
console.log(`Certificate for ${domain} will expire on ${expiryDate.toISOString()}`);
|
|
528
|
-
return expiryDate;
|
|
529
|
-
}
|
|
530
|
-
}
|
|
531
|
-
console.warn(`Could not extract valid expiry date from certificate for ${domain}, using default`);
|
|
532
|
-
return this.getDefaultExpiryDate();
|
|
533
|
-
}
|
|
534
|
-
catch (error) {
|
|
535
|
-
console.warn(`Failed to extract expiry date from certificate for ${domain}, using default`);
|
|
536
|
-
return this.getDefaultExpiryDate();
|
|
537
|
-
}
|
|
538
|
-
}
|
|
539
|
-
/**
|
|
540
|
-
* Get a default expiry date (90 days from now)
|
|
541
|
-
* @returns Default expiry date
|
|
542
|
-
*/
|
|
543
|
-
getDefaultExpiryDate() {
|
|
544
|
-
return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days default
|
|
545
|
-
}
|
|
546
|
-
/**
|
|
547
|
-
* Emits a certificate event with the certificate data
|
|
548
|
-
* @param eventType The event type to emit
|
|
549
|
-
* @param data The certificate data
|
|
550
|
-
*/
|
|
551
|
-
emitCertificateEvent(eventType, data) {
|
|
552
|
-
this.emit(eventType, data);
|
|
553
|
-
}
|
|
554
|
-
/**
|
|
555
|
-
* Gets all domains and their certificate status
|
|
556
|
-
* @returns Map of domains to certificate status
|
|
557
|
-
*/
|
|
558
|
-
getDomainCertificateStatus() {
|
|
559
|
-
const result = new Map();
|
|
560
|
-
const now = new Date();
|
|
561
|
-
for (const [domain, domainInfo] of this.domainCertificates.entries()) {
|
|
562
|
-
// Skip glob patterns
|
|
563
|
-
if (this.isGlobPattern(domain))
|
|
564
|
-
continue;
|
|
565
|
-
const status = {
|
|
566
|
-
certObtained: domainInfo.certObtained,
|
|
567
|
-
expiryDate: domainInfo.expiryDate,
|
|
568
|
-
obtainingInProgress: domainInfo.obtainingInProgress,
|
|
569
|
-
lastRenewalAttempt: domainInfo.lastRenewalAttempt
|
|
570
|
-
};
|
|
571
|
-
// Calculate days remaining if expiry date is available
|
|
572
|
-
if (domainInfo.expiryDate) {
|
|
573
|
-
const daysRemaining = Math.ceil((domainInfo.expiryDate.getTime() - now.getTime()) / (24 * 60 * 60 * 1000));
|
|
574
|
-
status.daysRemaining = daysRemaining;
|
|
575
|
-
}
|
|
576
|
-
result.set(domain, status);
|
|
577
|
-
}
|
|
578
|
-
return result;
|
|
579
|
-
}
|
|
580
|
-
/**
|
|
581
|
-
* Request a certificate renewal for a specific domain.
|
|
582
|
-
* @param domain The domain to renew.
|
|
583
|
-
*/
|
|
584
|
-
async renewCertificate(domain) {
|
|
585
|
-
if (!this.domainCertificates.has(domain)) {
|
|
586
|
-
throw new HttpError(`Domain not managed: ${domain}`);
|
|
587
|
-
}
|
|
588
|
-
// Trigger renewal via ACME
|
|
589
|
-
await this.obtainCertificate(domain, true);
|
|
590
|
-
}
|
|
591
|
-
}
|
|
592
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"port80-handler.js","sourceRoot":"","sources":["../../../ts/http/port80/port80-handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,eAAe,EAAE,cAAc,EAAE,MAAM,MAAM,CAAC;AACvD,OAAO,EAAE,iBAAiB,EAAE,MAAM,gDAAgD,CAAC;AASnF,OAAO,EACL,UAAU,EACV,UAAU,EACV,SAAS,EACT,gBAAgB,EAChB,WAAW,GACZ,MAAM,yBAAyB,CAAC;AAEjC,OAAO,EAAE,kBAAkB,EAAE,MAAM,0BAA0B,CAAC;AAC9D,OAAO,EAAE,6BAA6B,EAAE,MAAM,sBAAsB,CAAC;AAIrE,uCAAuC;AACvC,OAAO,EACL,SAAS,IAAI,kBAAkB,EAC/B,gBAAgB,EAChB,WAAW,EACZ,CAAA;AAED,uDAAuD;AACvD,MAAM,CAAC,MAAM,mBAAmB,GAAG,iBAAiB,CAAC;AAErD;;GAEG;AACH,8CAA8C;AAG9C;;;GAGG;AACH,MAAM,OAAO,aAAc,SAAQ,OAAO,CAAC,YAAY;IASrD;;;OAGG;IACH,YAAY,UAAwB,EAAE;QACpC,KAAK,EAAE,CAAC;QAZF,uBAAkB,GAA8B,IAAI,CAAC;QACrD,WAAM,GAA+B,IAAI,CAAC;QAElD,yDAAyD;QACjD,mBAAc,GAAY,KAAK,CAAC;QAStC,IAAI,CAAC,kBAAkB,GAAG,IAAI,GAAG,EAA8B,CAAC;QAEhE,kBAAkB;QAClB,IAAI,CAAC,OAAO,GAAG;YACb,IAAI,EAAE,OAAO,CAAC,IAAI,IAAI,EAAE;YACxB,YAAY,EAAE,OAAO,CAAC,YAAY,IAAI,mBAAmB;YACzD,aAAa,EAAE,OAAO,CAAC,aAAa,IAAI,KAAK,EAAE,yBAAyB;YACxE,iBAAiB,EAAE,OAAO,CAAC,iBAAiB,IAAI,GAAG;YACnD,OAAO,EAAE,OAAO,CAAC,OAAO,IAAI,IAAI,EAAE,oBAAoB;YACtD,gBAAgB,EAAE,OAAO,CAAC,gBAAgB,IAAI,SAAS;YACvD,mBAAmB,EAAE,OAAO,CAAC,mBAAmB,IAAI,KAAK;YACzD,kBAAkB,EAAE,OAAO,CAAC,kBAAkB,IAAI,EAAE;YACpD,uBAAuB,EAAE,OAAO,CAAC,uBAAuB,IAAI,EAAE;YAC9D,SAAS,EAAE,OAAO,CAAC,SAAS,IAAI,IAAI;YACpC,aAAa,EAAE,OAAO,CAAC,aAAa,IAAI,EAAE;SAC3C,CAAC;QAEF,iCAAiC;QACjC,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;YACzB,IAAI,CAAC,kBAAkB,GAAG,IAAI,kBAAkB,CAC9C,IAAI,CAAC,OAAO,CAAC,aAAa,EAC1B,IAAI,CAAC,OAAO,CAAC,YAAY,EACzB,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAC9B,CAAC;YAEF,0DAA0D;YAC1D,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,CAAC,IAAsB,EAAE,EAAE;gBAC1F,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,IAAI,CAAC,CAAC;YACxD,CAAC,CAAC,CAAC;YAEH,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,CAAC,IAAsB,EAAE,EAAE;gBAC3F,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,IAAI,CAAC,CAAC;YACzD,CAAC,CAAC,CAAC;YAEH,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,CAAC,KAA0B,EAAE,EAAE;gBAC9F,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;YACzD,CAAC,CAAC,CAAC;YAEH,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAC,iBAAiB,CAAC,oBAAoB,EAAE,CAAC,MAA4B,EAAE,EAAE;gBAClG,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,oBAAoB,EAAE,MAAM,CAAC,CAAC;YAC5D,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChB,MAAM,IAAI,WAAW,CAAC,2BAA2B,CAAC,CAAC;QACrD,CAAC;QAED,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,MAAM,IAAI,WAAW,CAAC,yBAAyB,CAAC,CAAC;QACnD,CAAC;QAED,mBAAmB;QACnB,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,KAAK,KAAK,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,2CAA2C,CAAC,CAAC;YACzD,OAAO;QACT,CAAC;QAED,gDAAgD;QAChD,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,IAAI,IAAI,CAAC,kBAAkB,EAAE,CAAC;YACpD,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,kBAAkB,CAAC,UAAU,EAAE,CAAC;YAC7C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,WAAW,CAAC,6CACpB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CACvD,EAAE,CAAC,CAAC;YACN,CAAC;QACH,CAAC;QAED,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YACrC,IAAI,CAAC;gBACH,IAAI,CAAC,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;gBAEpF,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAA4B,EAAE,EAAE;oBACvD,IAAI,KAAK,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;wBAC5B,MAAM,CAAC,IAAI,WAAW,CAAC,qCAAqC,IAAI,CAAC,OAAO,CAAC,IAAI,8DAA8D,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC5J,CAAC;yBAAM,IAAI,KAAK,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;wBACvC,MAAM,CAAC,IAAI,WAAW,CAAC,QAAQ,IAAI,CAAC,OAAO,CAAC,IAAI,qBAAqB,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;oBACtF,CAAC;yBAAM,CAAC;wBACN,MAAM,CAAC,IAAI,WAAW,CAAC,KAAK,CAAC,OAAO,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;oBACrD,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,EAAE;oBACzC,OAAO,CAAC,GAAG,CAAC,sCAAsC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;oBACvE,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;oBAEhE,qEAAqE;oBACrE,KAAK,MAAM,CAAC,MAAM,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;wBACrE,8CAA8C;wBAC9C,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;4BAC/B,OAAO,CAAC,GAAG,CAAC,kDAAkD,MAAM,EAAE,CAAC,CAAC;4BACxE,SAAS;wBACX,CAAC;wBAED,IAAI,UAAU,CAAC,OAAO,CAAC,eAAe,IAAI,CAAC,UAAU,CAAC,YAAY,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;4BACtG,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;gCACzC,OAAO,CAAC,KAAK,CAAC,2CAA2C,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;4BAC3E,CAAC,CAAC,CAAC;wBACL,CAAC;oBACH,CAAC;oBAED,OAAO,EAAE,CAAC;gBACZ,CAAC,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,OAAO,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,+BAA+B,CAAC;gBACzF,MAAM,CAAC,IAAI,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC;YACnC,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;YACjB,OAAO;QACT,CAAC;QAED,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAE3B,OAAO,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;YACnC,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;gBAChB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE;oBACrB,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC;oBACnB,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;oBAC5B,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,CAAC;oBAC7C,OAAO,EAAE,CAAC;gBACZ,CAAC,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;gBAC5B,OAAO,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,OAA6C;QAC5D,gFAAgF;QAChF,MAAM,iBAAiB,GAAmB,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC;QAEzE,IAAI,CAAC,iBAAiB,CAAC,UAAU,IAAI,OAAO,iBAAiB,CAAC,UAAU,KAAK,QAAQ,EAAE,CAAC;YACtF,MAAM,IAAI,SAAS,CAAC,qBAAqB,CAAC,CAAC;QAC7C,CAAC;QAED,MAAM,UAAU,GAAG,iBAAiB,CAAC,UAAU,CAAC;QAEhD,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,UAAU,CAAC,EAAE,CAAC;YAC7C,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,UAAU,EAAE;gBACtC,OAAO,EAAE,iBAAiB;gBAC1B,YAAY,EAAE,KAAK;gBACnB,mBAAmB,EAAE,KAAK;aAC3B,CAAC,CAAC;YAEH,OAAO,CAAC,GAAG,CAAC,iBAAiB,UAAU,sBAAsB,EAAE;gBAC7D,WAAW,EAAE,iBAAiB,CAAC,WAAW;gBAC1C,eAAe,EAAE,iBAAiB,CAAC,eAAe;gBAClD,UAAU,EAAE,CAAC,CAAC,iBAAiB,CAAC,OAAO;gBACvC,cAAc,EAAE,CAAC,CAAC,iBAAiB,CAAC,WAAW;gBAC/C,cAAc,EAAE,iBAAiB,CAAC,cAAc;aACjD,CAAC,CAAC;YAEH,8FAA8F;YAC9F,IAAI,iBAAiB,CAAC,eAAe,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,EAAE,CAAC;gBACxF,IAAI,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;oBAC7C,OAAO,CAAC,KAAK,CAAC,2CAA2C,UAAU,GAAG,EAAE,GAAG,CAAC,CAAC;gBAC/E,CAAC,CAAC,CAAC;YACL,CAAC;QACH,CAAC;aAAM,CAAC;YACN,0CAA0C;YAC1C,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,UAAU,CAAE,CAAC;YAC1D,QAAQ,CAAC,OAAO,GAAG,iBAAiB,CAAC;YACrC,OAAO,CAAC,GAAG,CAAC,UAAU,UAAU,wBAAwB,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,oBAAoB,CAAC,MAAsB;QAChD,yCAAyC;QACzC,MAAM,YAAY,GAAG,6BAA6B,CAAC,MAAM,CAAC,CAAC;QAE3D,kBAAkB;QAClB,KAAK,MAAM,OAAO,IAAI,YAAY,EAAE,CAAC;YACnC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAC1B,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,SAAS,YAAY,CAAC,MAAM,iDAAiD,CAAC,CAAC;IAC7F,CAAC;IAED;;;;;OAKG;IACK,gBAAgB,CAAC,OAA6C;QACpE,oCAAoC;QACpC,IAAI,QAAQ,IAAI,OAAO,EAAE,CAAC;YACxB,OAAO;gBACL,UAAU,EAAE,OAAO,CAAC,MAAM;gBAC1B,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,eAAe,EAAE,OAAO,CAAC,eAAe;gBACxC,OAAO,EAAE,OAAO,CAAC,OAAO;gBACxB,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;aACvC,CAAC;QACJ,CAAC;QAED,mCAAmC;QACnC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;;OAGG;IACI,YAAY,CAAC,MAAc;QAChC,IAAI,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;YAC3C,OAAO,CAAC,GAAG,CAAC,mBAAmB,MAAM,EAAE,CAAC,CAAC;QAC3C,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,cAAc,CAAC,MAAc;QAClC,2CAA2C;QAC3C,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QAEvD,IAAI,CAAC,UAAU,IAAI,CAAC,UAAU,CAAC,YAAY,IAAI,CAAC,UAAU,CAAC,WAAW,IAAI,CAAC,UAAU,CAAC,UAAU,EAAE,CAAC;YACjG,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO;YACL,MAAM;YACN,WAAW,EAAE,UAAU,CAAC,WAAW;YACnC,UAAU,EAAE,UAAU,CAAC,UAAU;YACjC,UAAU,EAAE,UAAU,CAAC,UAAU,IAAI,IAAI,CAAC,oBAAoB,EAAE;SACjE,CAAC;IACJ,CAAC;IAID;;;;OAIG;IACK,aAAa,CAAC,MAAc;QAClC,OAAO,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACK,uBAAuB,CAAC,aAAqB;QACnD,yBAAyB;QACzB,IAAI,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,aAAa,CAAC,EAAE,CAAC;YAC/C,OAAO;gBACL,UAAU,EAAE,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,aAAa,CAAE;gBACvD,OAAO,EAAE,aAAa;aACvB,CAAC;QACJ,CAAC;QAED,yBAAyB;QACzB,KAAK,MAAM,CAAC,OAAO,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;YACtE,IAAI,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,oBAAoB,CAAC,aAAa,EAAE,OAAO,CAAC,EAAE,CAAC;gBACrF,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE,CAAC;YACjC,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;OAKG;IACK,oBAAoB,CAAC,MAAc,EAAE,OAAe;QAC1D,uCAAuC;QACvC,IAAI,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;YAC7B,sCAAsC;YACtC,MAAM,MAAM,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;YACpC,OAAO,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,MAAM,KAAK,MAAM,CAAC;QAC9E,CAAC;aAAM,IAAI,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;YAClC,4BAA4B;YAC5B,MAAM,MAAM,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE,OAAO,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;YACxD,MAAM,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACtC,OAAO,MAAM,CAAC,UAAU,CAAC,MAAM,GAAG,GAAG,CAAC,IAAI,WAAW,CAAC,MAAM,IAAI,CAAC,CAAC;QACpE,CAAC;aAAM,IAAI,OAAO,KAAK,GAAG,EAAE,CAAC;YAC3B,8BAA8B;YAC9B,OAAO,IAAI,CAAC;QACd,CAAC;aAAM,CAAC;YACN,qEAAqE;YACrE,OAAO,MAAM,KAAK,OAAO,CAAC;QAC5B,CAAC;IACH,CAAC;IAGD;;;;OAIG;IACK,aAAa,CAAC,GAAiC,EAAE,GAAgC;QACvF,8CAA8C;QAC9C,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE;YACrC,GAAG,EAAE,GAAG,CAAC,GAAG;YACZ,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,OAAO,EAAE,GAAG,CAAC,OAAO;SACrB,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,GAAG,CAAC,OAAO,CAAC,IAAI,CAAC;QACpC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,GAAG,CAAC,UAAU,GAAG,UAAU,CAAC,WAAW,CAAC;YACxC,GAAG,CAAC,GAAG,CAAC,qCAAqC,CAAC,CAAC;YAC/C,OAAO;QACT,CAAC;QAED,wDAAwD;QACxD,MAAM,MAAM,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAExC,oFAAoF;QACpF,IAAI,IAAI,CAAC,kBAAkB,IAAI,GAAG,CAAC,GAAG,EAAE,UAAU,CAAC,8BAA8B,CAAC,EAAE,CAAC;YACnF,6DAA6D;YAC7D,MAAM,WAAW,GAAG,IAAI,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;YAEzD,iFAAiF;YACjF,IAAI,WAAW,EAAE,UAAU,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;gBAChD,IAAI,CAAC,cAAc,CAAC,GAAG,EAAE,GAAG,EAAE,WAAW,CAAC,UAAU,CAAC,OAAO,CAAC,WAAW,EAAE,gBAAgB,CAAC,CAAC;gBAC5F,OAAO;YACT,CAAC;YAED,oFAAoF;YACpF,4DAA4D;YAC5D,IAAI,CAAC,WAAW,IAAI,WAAW,CAAC,UAAU,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;gBACnE,yDAAyD;gBACzD,IAAI,IAAI,CAAC,kBAAkB,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,EAAE,CAAC;oBACpD,wBAAwB;oBACxB,OAAO;gBACT,CAAC;YACH,CAAC;QACH,CAAC;QAED,oFAAoF;QACpF,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC;YACzC,IAAI,CAAC;gBACH,IAAI,CAAC,SAAS,CAAC,EAAE,UAAU,EAAE,MAAM,EAAE,WAAW,EAAE,KAAK,EAAE,eAAe,EAAE,IAAI,EAAE,CAAC,CAAC;YACpF,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,wDAAwD,GAAG,EAAE,CAAC,CAAC;YAC/E,CAAC;YACD,GAAG,CAAC,UAAU,GAAG,UAAU,CAAC,mBAAmB,CAAC;YAChD,GAAG,CAAC,GAAG,CAAC,kCAAkC,CAAC,CAAC;YAC5C,OAAO;QACT,CAAC;QAED,2DAA2D;QAC3D,MAAM,WAAW,GAAG,IAAI,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;QACzD,IAAI,CAAC,WAAW,EAAE,CAAC;YACjB,GAAG,CAAC,UAAU,GAAG,UAAU,CAAC,SAAS,CAAC;YACtC,GAAG,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;YACjC,OAAO;QACT,CAAC;QAED,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,GAAG,WAAW,CAAC;QAC5C,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC;QAEnC,+CAA+C;QAC/C,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACpB,IAAI,CAAC,cAAc,CAAC,GAAG,EAAE,GAAG,EAAE,OAAO,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;YACvD,OAAO;QACT,CAAC;QAED,sEAAsE;QACtE,2DAA2D;QAC3D,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,YAAY,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;YACnF,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;YACjD,MAAM,UAAU,GAAG,SAAS,KAAK,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,SAAS,EAAE,CAAC;YAC5D,MAAM,WAAW,GAAG,WAAW,MAAM,GAAG,UAAU,GAAG,GAAG,CAAC,GAAG,IAAI,GAAG,EAAE,CAAC;YAEtE,GAAG,CAAC,UAAU,GAAG,UAAU,CAAC,iBAAiB,CAAC;YAC9C,GAAG,CAAC,SAAS,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC;YACvC,GAAG,CAAC,GAAG,CAAC,kBAAkB,WAAW,EAAE,CAAC,CAAC;YACzC,OAAO;QACT,CAAC;QAED,4EAA4E;QAC5E,2DAA2D;QAC3D,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,OAAO,CAAC,eAAe,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACxF,sDAAsD;YACtD,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;gBACpC,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;oBACzC,MAAM,YAAY,GAAG,GAAG,YAAY,KAAK,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,eAAe,CAAC;oBAC1E,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE;wBAC9C,MAAM;wBACN,KAAK,EAAE,YAAY;wBACnB,SAAS,EAAE,KAAK;qBACjB,CAAC,CAAC;oBACH,OAAO,CAAC,KAAK,CAAC,mCAAmC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;gBACnE,CAAC,CAAC,CAAC;YACL,CAAC;YAED,GAAG,CAAC,UAAU,GAAG,UAAU,CAAC,mBAAmB,CAAC;YAChD,GAAG,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACrE,OAAO;QACT,CAAC;QAED,yCAAyC;QACzC,GAAG,CAAC,UAAU,GAAG,UAAU,CAAC,SAAS,CAAC;QACtC,GAAG,CAAC,GAAG,CAAC,yCAAyC,CAAC,CAAC;QAEnD,6BAA6B;QAC7B,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE;YACpC,MAAM;YACN,GAAG,EAAE,GAAG,CAAC,GAAG;YACZ,UAAU,EAAE,GAAG,CAAC,UAAU;SAC3B,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACK,cAAc,CACpB,GAAiC,EACjC,GAAgC,EAChC,MAAoC,EACpC,WAAmB;QAEnB,MAAM,OAAO,GAAG;YACd,QAAQ,EAAE,MAAM,CAAC,EAAE;YACnB,IAAI,EAAE,MAAM,CAAC,IAAI;YACjB,IAAI,EAAE,GAAG,CAAC,GAAG;YACb,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,OAAO,EAAE,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE;SAC5B,CAAC;QAEF,MAAM,MAAM,GAAG,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,SAAS,CAAC;QAC5D,OAAO,CAAC,GAAG,CAAC,cAAc,WAAW,gBAAgB,MAAM,OAAO,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QAE9F,MAAM,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;YAC1D,mBAAmB;YACnB,GAAG,CAAC,UAAU,GAAG,QAAQ,CAAC,UAAU,IAAI,UAAU,CAAC,qBAAqB,CAAC;YAEzE,eAAe;YACf,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC5D,IAAI,KAAK;oBAAE,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YACvC,CAAC;YAED,qBAAqB;YACrB,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAEnB,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,iBAAiB,EAAE;gBACtC,MAAM;gBACN,WAAW;gBACX,MAAM,EAAE,GAAG,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,IAAI,EAAE;gBACrC,UAAU,EAAE,QAAQ,CAAC,UAAU;aAChC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC7B,OAAO,CAAC,KAAK,CAAC,+BAA+B,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,IAAI,GAAG,EAAE,KAAK,CAAC,CAAC;YAEjF,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,aAAa,EAAE;gBAClC,MAAM;gBACN,KAAK,EAAE,KAAK,CAAC,OAAO;gBACpB,MAAM,EAAE,GAAG,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,IAAI,EAAE;aACtC,CAAC,CAAC;YAEH,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC;gBACrB,GAAG,CAAC,UAAU,GAAG,UAAU,CAAC,qBAAqB,CAAC;gBAClD,GAAG,CAAC,GAAG,CAAC,gBAAgB,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC3C,CAAC;iBAAM,CAAC;gBACN,GAAG,CAAC,GAAG,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,yCAAyC;QACzC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;YACjB,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,QAAQ,CAAC,GAAG,EAAE,CAAC;QACjB,CAAC;IACH,CAAC;IAGD;;;;OAIG;IACK,KAAK,CAAC,iBAAiB,CAAC,MAAc,EAAE,YAAqB,KAAK;QACxE,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,MAAM,IAAI,gBAAgB,CAAC,qDAAqD,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QACvG,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAE,CAAC;QAExD,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CAAC,qCAAqC,MAAM,gCAAgC,CAAC,CAAC;YACzF,OAAO;QACT,CAAC;QAED,IAAI,UAAU,CAAC,mBAAmB,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,gDAAgD,MAAM,EAAE,CAAC,CAAC;YACtE,OAAO;QACT,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,CAAC;YAC7B,MAAM,IAAI,SAAS,CAAC,wCAAwC,CAAC,CAAC;QAChE,CAAC;QAED,UAAU,CAAC,mBAAmB,GAAG,IAAI,CAAC;QACtC,UAAU,CAAC,kBAAkB,GAAG,IAAI,IAAI,EAAE,CAAC;QAE3C,IAAI,CAAC;YACH,6CAA6C;YAC7C,mFAAmF;YACnF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;YAErF,2CAA2C;YAC3C,UAAU,CAAC,WAAW,GAAG,QAAQ,CAAC,WAAW,CAAC;YAC9C,UAAU,CAAC,UAAU,GAAG,QAAQ,CAAC,UAAU,CAAC;YAC5C,UAAU,CAAC,YAAY,GAAG,IAAI,CAAC;YAC/B,UAAU,CAAC,UAAU,GAAG,QAAQ,CAAC,UAAU,CAAC;YAE5C,OAAO,CAAC,GAAG,CAAC,eAAe,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,QAAQ,MAAM,EAAE,CAAC,CAAC;QACjF,CAAC;QAAC,OAAO,KAAU,EAAE,CAAC;YACpB,MAAM,QAAQ,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YACxE,OAAO,CAAC,KAAK,CAAC,yCAAyC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;YACzE,MAAM,IAAI,gBAAgB,CAAC,QAAQ,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QAC1D,CAAC;gBAAS,CAAC;YACT,UAAU,CAAC,mBAAmB,GAAG,KAAK,CAAC;QACzC,CAAC;IACH,CAAC;IAGD;;;;;OAKG;IACK,gCAAgC,CAAC,WAAmB,EAAE,MAAc;QAC1E,IAAI,CAAC;YACH,wEAAwE;YACxE,sEAAsE;YACtE,MAAM,OAAO,GAAG,WAAW,CAAC,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACpE,IAAI,OAAO,IAAI,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC1B,MAAM,UAAU,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;gBAExC,oCAAoC;gBACpC,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC,EAAE,CAAC;oBACjC,OAAO,CAAC,GAAG,CAAC,mBAAmB,MAAM,mBAAmB,UAAU,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;oBACpF,OAAO,UAAU,CAAC;gBACpB,CAAC;YACH,CAAC;YAED,OAAO,CAAC,IAAI,CAAC,4DAA4D,MAAM,iBAAiB,CAAC,CAAC;YAClG,OAAO,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACrC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,IAAI,CAAC,sDAAsD,MAAM,iBAAiB,CAAC,CAAC;YAC5F,OAAO,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACrC,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,oBAAoB;QAC1B,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,kBAAkB;IAC5E,CAAC;IAED;;;;OAIG;IACK,oBAAoB,CAAC,SAA4B,EAAE,IAAsB;QAC/E,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IAC7B,CAAC;IAED;;;OAGG;IACI,0BAA0B;QAO/B,MAAM,MAAM,GAAG,IAAI,GAAG,EAMlB,CAAC;QAEL,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QAEvB,KAAK,MAAM,CAAC,MAAM,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;YACrE,qBAAqB;YACrB,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC;gBAAE,SAAS;YAEzC,MAAM,MAAM,GAMR;gBACF,YAAY,EAAE,UAAU,CAAC,YAAY;gBACrC,UAAU,EAAE,UAAU,CAAC,UAAU;gBACjC,mBAAmB,EAAE,UAAU,CAAC,mBAAmB;gBACnD,kBAAkB,EAAE,UAAU,CAAC,kBAAkB;aAClD,CAAC;YAEF,uDAAuD;YACvD,IAAI,UAAU,CAAC,UAAU,EAAE,CAAC;gBAC1B,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAC7B,CAAC,UAAU,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC,GAAG,CAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAC1E,CAAC;gBACF,MAAM,CAAC,aAAa,GAAG,aAAa,CAAC;YACvC,CAAC;YAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC7B,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,SAAS,CAAC,uBAAuB,MAAM,EAAE,CAAC,CAAC;QACvD,CAAC;QACD,2BAA2B;QAC3B,MAAM,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;IAC7C,CAAC;CACF"}
|
|
@@ -1,5 +0,0 @@
|
|
|
1
|
-
export {};
|
|
2
|
-
/**
|
|
3
|
-
* HTTP redirects
|
|
4
|
-
*/
|
|
5
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9odHRwL3JlZGlyZWN0cy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiO0FBQUE7O0dBRUcifQ==
|