@push.rocks/smartproxy 19.3.2 → 19.3.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
  3. package/dist_ts/http/index.d.ts +1 -3
  4. package/dist_ts/http/index.js +4 -10
  5. package/dist_ts/http/models/http-types.d.ts +4 -91
  6. package/dist_ts/http/models/http-types.js +5 -60
  7. package/dist_ts/http/router/proxy-router.d.ts +1 -1
  8. package/dist_ts/http/router/route-router.d.ts +1 -1
  9. package/dist_ts/index.d.ts +9 -7
  10. package/dist_ts/index.js +10 -7
  11. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
  12. package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
  13. package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
  14. package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
  15. package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
  16. package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
  17. package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
  18. package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
  19. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
  20. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
  21. package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
  22. package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
  23. package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
  24. package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
  25. package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
  26. package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
  27. package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
  28. package/dist_ts/proxies/http-proxy/index.js +12 -0
  29. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
  30. package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
  31. package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
  32. package/dist_ts/proxies/http-proxy/models/index.js +6 -0
  33. package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
  34. package/dist_ts/proxies/http-proxy/models/types.js +276 -0
  35. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
  36. package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
  37. package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
  38. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
  39. package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
  40. package/dist_ts/proxies/index.d.ts +5 -5
  41. package/dist_ts/proxies/index.js +5 -5
  42. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
  43. package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
  44. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
  45. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
  46. package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
  47. package/dist_ts/proxies/smart-proxy/index.js +4 -2
  48. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
  49. package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
  50. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
  51. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
  52. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
  53. package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
  54. package/dist_ts/routing/index.d.ts +5 -0
  55. package/dist_ts/routing/index.js +8 -0
  56. package/dist_ts/routing/models/http-types.d.ts +6 -0
  57. package/dist_ts/routing/models/http-types.js +7 -0
  58. package/dist_ts/routing/router/index.d.ts +8 -0
  59. package/dist_ts/routing/router/index.js +7 -0
  60. package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
  61. package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
  62. package/dist_ts/routing/router/route-router.d.ts +108 -0
  63. package/dist_ts/routing/router/route-router.js +393 -0
  64. package/package.json +1 -1
  65. package/readme.md +18 -35
  66. package/readme.plan.md +173 -271
  67. package/ts/00_commitinfo_data.ts +1 -1
  68. package/ts/forwarding/factory/forwarding-factory.ts +28 -0
  69. package/ts/index.ts +13 -9
  70. package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
  71. package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
  72. package/ts/proxies/http-proxy/handlers/index.ts +6 -0
  73. package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
  74. package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
  75. package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
  76. package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
  77. package/ts/proxies/http-proxy/models/http-types.ts +165 -0
  78. package/ts/proxies/http-proxy/models/index.ts +5 -0
  79. package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
  80. package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
  81. package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
  82. package/ts/proxies/index.ts +7 -7
  83. package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
  84. package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
  85. package/ts/proxies/smart-proxy/index.ts +4 -1
  86. package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
  87. package/ts/proxies/smart-proxy/port-manager.ts +2 -2
  88. package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
  89. package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
  90. package/ts/routing/index.ts +9 -0
  91. package/ts/routing/models/http-types.ts +6 -0
  92. package/ts/{http → routing}/router/proxy-router.ts +1 -1
  93. package/ts/{http → routing}/router/route-router.ts +1 -1
  94. package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
  95. package/dist_ts/certificate/acme/acme-factory.js +0 -40
  96. package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
  97. package/dist_ts/certificate/acme/challenge-handler.js +0 -92
  98. package/dist_ts/certificate/acme/index.d.ts +0 -4
  99. package/dist_ts/certificate/acme/index.js +0 -5
  100. package/dist_ts/certificate/certificate-manager.d.ts +0 -150
  101. package/dist_ts/certificate/certificate-manager.js +0 -505
  102. package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
  103. package/dist_ts/certificate/events/certificate-events.js +0 -38
  104. package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
  105. package/dist_ts/certificate/events/simplified-events.js +0 -13
  106. package/dist_ts/certificate/index.d.ts +0 -30
  107. package/dist_ts/certificate/index.js +0 -37
  108. package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
  109. package/dist_ts/certificate/models/certificate-errors.js +0 -141
  110. package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
  111. package/dist_ts/certificate/models/certificate-strategy.js +0 -73
  112. package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
  113. package/dist_ts/certificate/models/certificate-types.js +0 -2
  114. package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
  115. package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
  116. package/dist_ts/certificate/providers/index.d.ts +0 -4
  117. package/dist_ts/certificate/providers/index.js +0 -5
  118. package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
  119. package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
  120. package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
  121. package/dist_ts/certificate/storage/file-storage.js +0 -194
  122. package/dist_ts/certificate/storage/index.d.ts +0 -4
  123. package/dist_ts/certificate/storage/index.js +0 -5
  124. package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
  125. package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
  126. package/dist_ts/classes.iptablesproxy.d.ts +0 -112
  127. package/dist_ts/classes.iptablesproxy.js +0 -765
  128. package/dist_ts/classes.networkproxy.d.ts +0 -243
  129. package/dist_ts/classes.networkproxy.js +0 -1424
  130. package/dist_ts/classes.nftablesproxy.d.ts +0 -219
  131. package/dist_ts/classes.nftablesproxy.js +0 -1542
  132. package/dist_ts/classes.port80handler.d.ts +0 -215
  133. package/dist_ts/classes.port80handler.js +0 -736
  134. package/dist_ts/classes.portproxy.d.ts +0 -171
  135. package/dist_ts/classes.portproxy.js +0 -1802
  136. package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
  137. package/dist_ts/classes.pp.acmemanager.js +0 -123
  138. package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
  139. package/dist_ts/classes.pp.connectionhandler.js +0 -754
  140. package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
  141. package/dist_ts/classes.pp.connectionmanager.js +0 -378
  142. package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
  143. package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
  144. package/dist_ts/classes.pp.interfaces.d.ts +0 -133
  145. package/dist_ts/classes.pp.interfaces.js +0 -2
  146. package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
  147. package/dist_ts/classes.pp.networkproxybridge.js +0 -306
  148. package/dist_ts/classes.pp.portproxy.d.ts +0 -64
  149. package/dist_ts/classes.pp.portproxy.js +0 -567
  150. package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
  151. package/dist_ts/classes.pp.portrangemanager.js +0 -179
  152. package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
  153. package/dist_ts/classes.pp.securitymanager.js +0 -126
  154. package/dist_ts/classes.pp.snihandler.d.ts +0 -153
  155. package/dist_ts/classes.pp.snihandler.js +0 -1053
  156. package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
  157. package/dist_ts/classes.pp.timeoutmanager.js +0 -154
  158. package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
  159. package/dist_ts/classes.pp.tlsalert.js +0 -225
  160. package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
  161. package/dist_ts/classes.pp.tlsmanager.js +0 -132
  162. package/dist_ts/classes.snihandler.d.ts +0 -198
  163. package/dist_ts/classes.snihandler.js +0 -1210
  164. package/dist_ts/classes.sslredirect.d.ts +0 -8
  165. package/dist_ts/classes.sslredirect.js +0 -28
  166. package/dist_ts/common/acmeFactory.d.ts +0 -9
  167. package/dist_ts/common/acmeFactory.js +0 -20
  168. package/dist_ts/common/port80-adapter.d.ts +0 -11
  169. package/dist_ts/common/port80-adapter.js +0 -87
  170. package/dist_ts/examples/forwarding-example.d.ts +0 -1
  171. package/dist_ts/examples/forwarding-example.js +0 -96
  172. package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
  173. package/dist_ts/forwarding/config/domain-config.js +0 -12
  174. package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
  175. package/dist_ts/forwarding/config/domain-manager.js +0 -242
  176. package/dist_ts/helpers.certificates.d.ts +0 -5
  177. package/dist_ts/helpers.certificates.js +0 -23
  178. package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
  179. package/dist_ts/http/port80/acme-interfaces.js +0 -51
  180. package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
  181. package/dist_ts/http/port80/challenge-responder.js +0 -203
  182. package/dist_ts/http/port80/index.d.ts +0 -6
  183. package/dist_ts/http/port80/index.js +0 -9
  184. package/dist_ts/http/port80/port80-handler.d.ts +0 -136
  185. package/dist_ts/http/port80/port80-handler.js +0 -592
  186. package/dist_ts/http/redirects/index.d.ts +0 -4
  187. package/dist_ts/http/redirects/index.js +0 -5
  188. package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
  189. package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
  190. package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
  191. package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
  192. package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
  193. package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
  194. package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
  195. package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
  196. package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
  197. package/dist_ts/networkproxy/classes.np.types.js +0 -35
  198. package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
  199. package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
  200. package/dist_ts/networkproxy/index.d.ts +0 -1
  201. package/dist_ts/networkproxy/index.js +0 -4
  202. package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
  203. package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
  204. package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
  205. package/dist_ts/port80handler/classes.port80handler.js +0 -16
  206. package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
  207. package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
  208. package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
  209. package/dist_ts/proxies/network-proxy/index.js +0 -12
  210. package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
  211. package/dist_ts/proxies/network-proxy/models/index.js +0 -5
  212. package/dist_ts/proxies/network-proxy/models/types.js +0 -276
  213. package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
  214. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
  215. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
  216. package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
  217. package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
  218. package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
  219. package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
  220. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
  221. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
  222. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
  223. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
  224. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
  225. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
  226. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
  227. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
  228. package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
  229. package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
  230. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
  231. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
  232. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
  233. package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
  234. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
  235. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
  236. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
  237. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
  238. package/dist_ts/redirect/classes.redirect.d.ts +0 -96
  239. package/dist_ts/redirect/classes.redirect.js +0 -194
  240. package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
  241. package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
  242. package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
  243. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
  244. package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
  245. package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
  246. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
  247. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
  248. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
  249. package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
  250. package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
  251. package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
  252. package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
  253. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
  254. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
  255. package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
  256. package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
  257. package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
  258. package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
  259. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
  260. package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
  261. package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
  262. package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
  263. package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
  264. package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
  265. package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
  266. package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
  267. package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
  268. package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
  269. package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
  270. package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
  271. package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
  272. package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
  273. package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
  274. package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
  275. package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
  276. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
  277. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
  278. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
  279. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
  280. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
  281. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
  282. package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
  283. package/dist_ts/smartproxy/forwarding/index.js +0 -23
  284. package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
  285. package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
  286. package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
  287. package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
  288. package/dist_ts/smartproxy.classes.router.d.ts +0 -13
  289. package/dist_ts/smartproxy.classes.router.js +0 -33
  290. package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
  291. package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
  292. package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
  293. package/dist_ts/smartproxy.helpers.certificates.js +0 -23
  294. package/dist_ts/smartproxy.plugins.d.ts +0 -18
  295. package/dist_ts/smartproxy.plugins.js +0 -23
  296. package/dist_ts/smartproxy.portproxy.d.ts +0 -26
  297. package/dist_ts/smartproxy.portproxy.js +0 -295
  298. package/ts/http/index.ts +0 -16
  299. package/ts/http/models/http-types.ts +0 -108
  300. package/ts/http/redirects/index.ts +0 -3
  301. package/ts/proxies/network-proxy/models/index.ts +0 -4
  302. package/ts/redirect/classes.redirect.ts +0 -295
  303. /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
  304. /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
  305. /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
  306. /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
  307. /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
  308. /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
  309. /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
  310. /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
  311. /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
  312. /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
  313. /package/ts/{http → routing}/router/index.ts +0 -0
@@ -1,894 +0,0 @@
1
- import * as plugins from '../../plugins.js';
2
- import { ConnectionManager } from './connection-manager.js';
3
- import { SecurityManager } from './security-manager.js';
4
- import { DomainConfigManager } from './domain-config-manager.js';
5
- import { TlsManager } from './tls-manager.js';
6
- import { NetworkProxyBridge } from './network-proxy-bridge.js';
7
- import { TimeoutManager } from './timeout-manager.js';
8
- import { PortRangeManager } from './port-range-manager.js';
9
- /**
10
- * Handles new connection processing and setup logic
11
- */
12
- export class ConnectionHandler {
13
- constructor(settings, connectionManager, securityManager, domainConfigManager, tlsManager, networkProxyBridge, timeoutManager, portRangeManager) {
14
- this.settings = settings;
15
- this.connectionManager = connectionManager;
16
- this.securityManager = securityManager;
17
- this.domainConfigManager = domainConfigManager;
18
- this.tlsManager = tlsManager;
19
- this.networkProxyBridge = networkProxyBridge;
20
- this.timeoutManager = timeoutManager;
21
- this.portRangeManager = portRangeManager;
22
- }
23
- /**
24
- * Handle a new incoming connection
25
- */
26
- handleConnection(socket) {
27
- const remoteIP = socket.remoteAddress || '';
28
- const localPort = socket.localPort || 0;
29
- // Validate IP against rate limits and connection limits
30
- const ipValidation = this.securityManager.validateIP(remoteIP);
31
- if (!ipValidation.allowed) {
32
- console.log(`Connection rejected from ${remoteIP}: ${ipValidation.reason}`);
33
- socket.end();
34
- socket.destroy();
35
- return;
36
- }
37
- // Create a new connection record
38
- const record = this.connectionManager.createConnection(socket);
39
- const connectionId = record.id;
40
- // Apply socket optimizations
41
- socket.setNoDelay(this.settings.noDelay);
42
- // Apply keep-alive settings if enabled
43
- if (this.settings.keepAlive) {
44
- socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
45
- record.hasKeepAlive = true;
46
- // Apply enhanced TCP keep-alive options if enabled
47
- if (this.settings.enableKeepAliveProbes) {
48
- try {
49
- // These are platform-specific and may not be available
50
- if ('setKeepAliveProbes' in socket) {
51
- socket.setKeepAliveProbes(10);
52
- }
53
- if ('setKeepAliveInterval' in socket) {
54
- socket.setKeepAliveInterval(1000);
55
- }
56
- }
57
- catch (err) {
58
- // Ignore errors - these are optional enhancements
59
- if (this.settings.enableDetailedLogging) {
60
- console.log(`[${connectionId}] Enhanced TCP keep-alive settings not supported: ${err}`);
61
- }
62
- }
63
- }
64
- }
65
- if (this.settings.enableDetailedLogging) {
66
- console.log(`[${connectionId}] New connection from ${remoteIP} on port ${localPort}. ` +
67
- `Keep-Alive: ${record.hasKeepAlive ? 'Enabled' : 'Disabled'}. ` +
68
- `Active connections: ${this.connectionManager.getConnectionCount()}`);
69
- }
70
- else {
71
- console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionManager.getConnectionCount()}`);
72
- }
73
- // Check if this connection should be forwarded directly to NetworkProxy
74
- if (this.portRangeManager.shouldUseNetworkProxy(localPort)) {
75
- this.handleNetworkProxyConnection(socket, record);
76
- }
77
- else {
78
- // For non-NetworkProxy ports, proceed with normal processing
79
- this.handleStandardConnection(socket, record);
80
- }
81
- }
82
- /**
83
- * Handle a connection that should be forwarded to NetworkProxy
84
- */
85
- handleNetworkProxyConnection(socket, record) {
86
- const connectionId = record.id;
87
- let initialDataReceived = false;
88
- // Set an initial timeout for handshake data
89
- let initialTimeout = setTimeout(() => {
90
- if (!initialDataReceived) {
91
- console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${record.remoteIP}`);
92
- // Add a grace period instead of immediate termination
93
- setTimeout(() => {
94
- if (!initialDataReceived) {
95
- console.log(`[${connectionId}] Final initial data timeout after grace period`);
96
- if (record.incomingTerminationReason === null) {
97
- record.incomingTerminationReason = 'initial_timeout';
98
- this.connectionManager.incrementTerminationStat('incoming', 'initial_timeout');
99
- }
100
- socket.end();
101
- this.connectionManager.cleanupConnection(record, 'initial_timeout');
102
- }
103
- }, 30000); // 30 second grace period
104
- }
105
- }, this.settings.initialDataTimeout);
106
- // Make sure timeout doesn't keep the process alive
107
- if (initialTimeout.unref) {
108
- initialTimeout.unref();
109
- }
110
- // Set up error handler
111
- socket.on('error', this.connectionManager.handleError('incoming', record));
112
- // First data handler to capture initial TLS handshake for NetworkProxy
113
- socket.once('data', (chunk) => {
114
- // Clear the initial timeout since we've received data
115
- if (initialTimeout) {
116
- clearTimeout(initialTimeout);
117
- initialTimeout = null;
118
- }
119
- initialDataReceived = true;
120
- record.hasReceivedInitialData = true;
121
- // Block non-TLS connections on port 443
122
- const localPort = record.localPort;
123
- if (!this.tlsManager.isTlsHandshake(chunk) && localPort === 443) {
124
- console.log(`[${connectionId}] Non-TLS connection detected on port 443. ` +
125
- `Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
126
- if (record.incomingTerminationReason === null) {
127
- record.incomingTerminationReason = 'non_tls_blocked';
128
- this.connectionManager.incrementTerminationStat('incoming', 'non_tls_blocked');
129
- }
130
- socket.end();
131
- this.connectionManager.cleanupConnection(record, 'non_tls_blocked');
132
- return;
133
- }
134
- // Check if this looks like a TLS handshake
135
- if (this.tlsManager.isTlsHandshake(chunk)) {
136
- record.isTLS = true;
137
- // Check for ClientHello to extract SNI - but don't enforce it for NetworkProxy
138
- if (this.tlsManager.isClientHello(chunk)) {
139
- // Create connection info for SNI extraction
140
- const connInfo = {
141
- sourceIp: record.remoteIP,
142
- sourcePort: socket.remotePort || 0,
143
- destIp: socket.localAddress || '',
144
- destPort: socket.localPort || 0,
145
- };
146
- // Extract SNI for domain-specific forwarding if available
147
- const serverName = this.tlsManager.extractSNI(chunk, connInfo);
148
- // For NetworkProxy connections, we'll allow session tickets even without SNI
149
- // We'll only use the serverName if available to determine the specific forwarding
150
- if (serverName) {
151
- // Save domain config and SNI in connection record
152
- const domainConfig = this.domainConfigManager.findDomainConfig(serverName);
153
- record.domainConfig = domainConfig;
154
- record.lockedDomain = serverName;
155
- // If we have a domain config and it has a forwarding config
156
- if (domainConfig) {
157
- try {
158
- // Get the forwarding type for this domain
159
- const forwardingType = this.domainConfigManager.getForwardingType(domainConfig);
160
- // For TLS termination types, use NetworkProxy
161
- if (forwardingType === 'https-terminate-to-http' ||
162
- forwardingType === 'https-terminate-to-https') {
163
- const networkProxyPort = this.domainConfigManager.getNetworkProxyPort(domainConfig);
164
- if (this.settings.enableDetailedLogging) {
165
- console.log(`[${connectionId}] Using TLS termination (${forwardingType}) for ${serverName} on port ${networkProxyPort}`);
166
- }
167
- // Forward to NetworkProxy with domain-specific port
168
- this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, chunk, networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
169
- return;
170
- }
171
- // For HTTPS passthrough, use the forwarding handler directly
172
- if (forwardingType === 'https-passthrough') {
173
- const handler = this.domainConfigManager.getForwardingHandler(domainConfig);
174
- if (this.settings.enableDetailedLogging) {
175
- console.log(`[${connectionId}] Using forwarding handler for SNI passthrough to ${serverName}`);
176
- }
177
- // Handle the connection using the handler
178
- handler.handleConnection(socket);
179
- return;
180
- }
181
- // For HTTP-only, we shouldn't get TLS connections
182
- if (forwardingType === 'http-only') {
183
- console.log(`[${connectionId}] Received TLS connection for HTTP-only domain ${serverName}`);
184
- socket.end();
185
- this.connectionManager.cleanupConnection(record, 'wrong_protocol');
186
- return;
187
- }
188
- }
189
- catch (err) {
190
- console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
191
- // Fall through to default NetworkProxy handling
192
- }
193
- }
194
- }
195
- else if (this.settings.allowSessionTicket === false &&
196
- this.settings.enableDetailedLogging) {
197
- // Log that we're allowing a session resumption without SNI for NetworkProxy
198
- console.log(`[${connectionId}] Allowing session resumption without SNI for NetworkProxy forwarding`);
199
- }
200
- }
201
- // Forward directly to NetworkProxy without domain-specific settings
202
- this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, chunk, undefined, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
203
- }
204
- else {
205
- // If not TLS, handle as plain HTTP
206
- console.log(`[${connectionId}] Non-TLS connection on NetworkProxy port ${record.localPort}`);
207
- // Check if we have a domain config based on port
208
- const portBasedDomainConfig = this.domainConfigManager.findDomainConfigForPort(record.localPort);
209
- if (portBasedDomainConfig) {
210
- try {
211
- // If this domain supports HTTP via a forwarding handler, use it
212
- if (this.domainConfigManager.supportsHttp(portBasedDomainConfig)) {
213
- const handler = this.domainConfigManager.getForwardingHandler(portBasedDomainConfig);
214
- if (this.settings.enableDetailedLogging) {
215
- console.log(`[${connectionId}] Using forwarding handler for non-TLS connection to port ${record.localPort}`);
216
- }
217
- // Handle the connection using the handler
218
- handler.handleConnection(socket);
219
- return;
220
- }
221
- }
222
- catch (err) {
223
- console.log(`[${connectionId}] Error using forwarding handler for HTTP: ${err}`);
224
- // Fall through to direct connection
225
- }
226
- }
227
- // Use legacy direct connection as fallback
228
- this.setupDirectConnection(socket, record, undefined, undefined, chunk);
229
- }
230
- });
231
- }
232
- /**
233
- * Handle a standard (non-NetworkProxy) connection
234
- */
235
- handleStandardConnection(socket, record) {
236
- const connectionId = record.id;
237
- const localPort = record.localPort;
238
- // Define helpers for rejecting connections
239
- const rejectIncomingConnection = (reason, logMessage) => {
240
- console.log(`[${connectionId}] ${logMessage}`);
241
- socket.end();
242
- if (record.incomingTerminationReason === null) {
243
- record.incomingTerminationReason = reason;
244
- this.connectionManager.incrementTerminationStat('incoming', reason);
245
- }
246
- this.connectionManager.cleanupConnection(record, reason);
247
- };
248
- let initialDataReceived = false;
249
- // Set an initial timeout for SNI data if needed
250
- let initialTimeout = null;
251
- if (this.settings.sniEnabled) {
252
- initialTimeout = setTimeout(() => {
253
- if (!initialDataReceived) {
254
- console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${record.remoteIP}`);
255
- // Add a grace period instead of immediate termination
256
- setTimeout(() => {
257
- if (!initialDataReceived) {
258
- console.log(`[${connectionId}] Final initial data timeout after grace period`);
259
- if (record.incomingTerminationReason === null) {
260
- record.incomingTerminationReason = 'initial_timeout';
261
- this.connectionManager.incrementTerminationStat('incoming', 'initial_timeout');
262
- }
263
- socket.end();
264
- this.connectionManager.cleanupConnection(record, 'initial_timeout');
265
- }
266
- }, 30000); // 30 second grace period
267
- }
268
- }, this.settings.initialDataTimeout);
269
- // Make sure timeout doesn't keep the process alive
270
- if (initialTimeout.unref) {
271
- initialTimeout.unref();
272
- }
273
- }
274
- else {
275
- initialDataReceived = true;
276
- record.hasReceivedInitialData = true;
277
- }
278
- socket.on('error', this.connectionManager.handleError('incoming', record));
279
- // Track data for bytes counting
280
- socket.on('data', (chunk) => {
281
- record.bytesReceived += chunk.length;
282
- this.timeoutManager.updateActivity(record);
283
- // Check for TLS handshake if this is the first chunk
284
- if (!record.isTLS && this.tlsManager.isTlsHandshake(chunk)) {
285
- record.isTLS = true;
286
- if (this.settings.enableTlsDebugLogging) {
287
- console.log(`[${connectionId}] TLS handshake detected from ${record.remoteIP}, ${chunk.length} bytes`);
288
- }
289
- }
290
- });
291
- /**
292
- * Sets up the connection to the target host.
293
- */
294
- const setupConnection = (serverName, initialChunk, forcedDomain, overridePort) => {
295
- // Clear the initial timeout since we've received data
296
- if (initialTimeout) {
297
- clearTimeout(initialTimeout);
298
- initialTimeout = null;
299
- }
300
- // Mark that we've received initial data
301
- initialDataReceived = true;
302
- record.hasReceivedInitialData = true;
303
- // Check if this looks like a TLS handshake
304
- if (initialChunk && this.tlsManager.isTlsHandshake(initialChunk)) {
305
- record.isTLS = true;
306
- if (this.settings.enableTlsDebugLogging) {
307
- console.log(`[${connectionId}] TLS handshake detected in setup, ${initialChunk.length} bytes`);
308
- }
309
- }
310
- // If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
311
- const domainConfig = forcedDomain
312
- ? forcedDomain
313
- : serverName
314
- ? this.domainConfigManager.findDomainConfig(serverName)
315
- : undefined;
316
- // Save domain config in connection record
317
- record.domainConfig = domainConfig;
318
- // Check if this domain should use NetworkProxy (domain-specific setting)
319
- if (domainConfig &&
320
- this.domainConfigManager.shouldUseNetworkProxy(domainConfig) &&
321
- this.networkProxyBridge.getNetworkProxy()) {
322
- if (this.settings.enableDetailedLogging) {
323
- console.log(`[${connectionId}] Domain ${serverName} is configured to use NetworkProxy`);
324
- }
325
- const networkProxyPort = this.domainConfigManager.getNetworkProxyPort(domainConfig);
326
- if (initialChunk && record.isTLS) {
327
- // For TLS connections with initial chunk, forward to NetworkProxy
328
- this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, initialChunk, networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
329
- return; // Skip normal connection setup
330
- }
331
- }
332
- // IP validation
333
- if (domainConfig) {
334
- const ipRules = this.domainConfigManager.getEffectiveIPRules(domainConfig);
335
- // Perform IP validation using security rules
336
- if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
337
- return rejectIncomingConnection('rejected', `Connection rejected: IP ${record.remoteIP} not allowed for domain ${domainConfig.domains.join(', ')}`);
338
- }
339
- }
340
- else if (this.settings.defaultAllowedIPs && this.settings.defaultAllowedIPs.length > 0) {
341
- if (!this.securityManager.isIPAuthorized(record.remoteIP, this.settings.defaultAllowedIPs, this.settings.defaultBlockedIPs || [])) {
342
- return rejectIncomingConnection('rejected', `Connection rejected: IP ${record.remoteIP} not allowed by default allowed list`);
343
- }
344
- }
345
- // Save the initial SNI
346
- if (serverName) {
347
- record.lockedDomain = serverName;
348
- }
349
- // Set up the direct connection
350
- this.setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, overridePort);
351
- };
352
- // --- PORT RANGE-BASED HANDLING ---
353
- // Only apply port-based rules if the incoming port is within one of the global port ranges.
354
- if (this.portRangeManager.isPortInGlobalRanges(localPort)) {
355
- if (this.portRangeManager.shouldUseGlobalForwarding(localPort)) {
356
- // Create a virtual domain config for global forwarding with security settings
357
- const globalDomainConfig = {
358
- domains: ['global'],
359
- forwarding: {
360
- type: 'http-only',
361
- target: {
362
- host: this.settings.targetIP,
363
- port: this.settings.toPort
364
- },
365
- security: {
366
- allowedIps: this.settings.defaultAllowedIPs || [],
367
- blockedIps: this.settings.defaultBlockedIPs || []
368
- }
369
- },
370
- };
371
- // Use the same IP filtering mechanism as domain-specific configs
372
- const ipRules = this.domainConfigManager.getEffectiveIPRules(globalDomainConfig);
373
- if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
374
- console.log(`[${connectionId}] Connection from ${record.remoteIP} rejected: IP ${record.remoteIP} not allowed in global default allowed list.`);
375
- socket.end();
376
- return;
377
- }
378
- if (this.settings.enableDetailedLogging) {
379
- console.log(`[${connectionId}] Port-based connection from ${record.remoteIP} on port ${localPort} forwarded to global target IP ${this.settings.targetIP}.`);
380
- }
381
- setupConnection('', undefined, globalDomainConfig, localPort);
382
- return;
383
- }
384
- else {
385
- // Attempt to find a matching forced domain config based on the local port.
386
- const forcedDomain = this.domainConfigManager.findDomainConfigForPort(localPort);
387
- if (forcedDomain) {
388
- // Get effective IP rules from the domain config's forwarding security settings
389
- const ipRules = this.domainConfigManager.getEffectiveIPRules(forcedDomain);
390
- if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
391
- console.log(`[${connectionId}] Connection from ${record.remoteIP} rejected: IP not allowed for domain ${forcedDomain.domains.join(', ')} on port ${localPort}.`);
392
- socket.end();
393
- return;
394
- }
395
- if (this.settings.enableDetailedLogging) {
396
- console.log(`[${connectionId}] Port-based connection from ${record.remoteIP} on port ${localPort} matched domain ${forcedDomain.domains.join(', ')}.`);
397
- }
398
- setupConnection('', undefined, forcedDomain, localPort);
399
- return;
400
- }
401
- // Fall through to SNI/default handling if no forced domain config is found.
402
- }
403
- }
404
- // --- FALLBACK: SNI-BASED HANDLING (or default when SNI is disabled) ---
405
- if (this.settings.sniEnabled) {
406
- initialDataReceived = false;
407
- socket.once('data', (chunk) => {
408
- // Clear timeout immediately
409
- if (initialTimeout) {
410
- clearTimeout(initialTimeout);
411
- initialTimeout = null;
412
- }
413
- initialDataReceived = true;
414
- // Block non-TLS connections on port 443
415
- if (!this.tlsManager.isTlsHandshake(chunk) && localPort === 443) {
416
- console.log(`[${connectionId}] Non-TLS connection detected on port 443 in SNI handler. ` +
417
- `Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
418
- if (record.incomingTerminationReason === null) {
419
- record.incomingTerminationReason = 'non_tls_blocked';
420
- this.connectionManager.incrementTerminationStat('incoming', 'non_tls_blocked');
421
- }
422
- socket.end();
423
- this.connectionManager.cleanupConnection(record, 'non_tls_blocked');
424
- return;
425
- }
426
- // Try to extract SNI
427
- let serverName = '';
428
- if (this.tlsManager.isTlsHandshake(chunk)) {
429
- record.isTLS = true;
430
- if (this.settings.enableTlsDebugLogging) {
431
- console.log(`[${connectionId}] Extracting SNI from TLS handshake, ${chunk.length} bytes`);
432
- }
433
- // Create connection info object for SNI extraction
434
- const connInfo = {
435
- sourceIp: record.remoteIP,
436
- sourcePort: socket.remotePort || 0,
437
- destIp: socket.localAddress || '',
438
- destPort: socket.localPort || 0,
439
- };
440
- // Extract SNI
441
- serverName = this.tlsManager.extractSNI(chunk, connInfo) || '';
442
- // If allowSessionTicket is false and this is a ClientHello with no SNI, terminate the connection
443
- if (this.settings.allowSessionTicket === false &&
444
- this.tlsManager.isClientHello(chunk) &&
445
- !serverName) {
446
- // Missing SNI: forward to NetworkProxy if available
447
- const proxyInstance = this.networkProxyBridge.getNetworkProxy();
448
- if (proxyInstance) {
449
- if (this.settings.enableDetailedLogging) {
450
- console.log(`[${connectionId}] No SNI in ClientHello; forwarding to NetworkProxy.`);
451
- }
452
- this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, chunk, undefined, (_reason) => {
453
- // On proxy failure, send TLS unrecognized_name alert and cleanup
454
- if (record.incomingTerminationReason === null) {
455
- record.incomingTerminationReason = 'session_ticket_blocked_no_sni';
456
- this.connectionManager.incrementTerminationStat('incoming', 'session_ticket_blocked_no_sni');
457
- }
458
- const alert = Buffer.from([0x15, 0x03, 0x03, 0x00, 0x02, 0x01, 0x70]);
459
- try {
460
- socket.cork();
461
- socket.write(alert);
462
- socket.uncork();
463
- socket.end();
464
- }
465
- catch {
466
- socket.end();
467
- }
468
- this.connectionManager.initiateCleanupOnce(record, 'session_ticket_blocked_no_sni');
469
- });
470
- return;
471
- }
472
- // Fallback: send TLS unrecognized_name alert and terminate
473
- console.log(`[${connectionId}] No SNI detected and proxy unavailable; sending TLS alert.`);
474
- if (record.incomingTerminationReason === null) {
475
- record.incomingTerminationReason = 'session_ticket_blocked_no_sni';
476
- this.connectionManager.incrementTerminationStat('incoming', 'session_ticket_blocked_no_sni');
477
- }
478
- const alert = Buffer.from([0x15, 0x03, 0x03, 0x00, 0x02, 0x01, 0x70]);
479
- try {
480
- socket.cork();
481
- socket.write(alert);
482
- socket.uncork();
483
- socket.end();
484
- }
485
- catch {
486
- socket.end();
487
- }
488
- this.connectionManager.cleanupConnection(record, 'session_ticket_blocked_no_sni');
489
- return;
490
- }
491
- }
492
- // Lock the connection to the negotiated SNI.
493
- record.lockedDomain = serverName;
494
- if (this.settings.enableDetailedLogging) {
495
- console.log(`[${connectionId}] Received connection from ${record.remoteIP} with SNI: ${serverName || '(empty)'}`);
496
- }
497
- setupConnection(serverName, chunk);
498
- });
499
- }
500
- else {
501
- initialDataReceived = true;
502
- record.hasReceivedInitialData = true;
503
- // Create default security settings for non-SNI connections
504
- const defaultSecurity = {
505
- allowedIPs: this.settings.defaultAllowedIPs || [],
506
- blockedIPs: this.settings.defaultBlockedIPs || []
507
- };
508
- if (defaultSecurity.allowedIPs.length > 0 &&
509
- !this.securityManager.isIPAuthorized(record.remoteIP, defaultSecurity.allowedIPs, defaultSecurity.blockedIPs)) {
510
- return rejectIncomingConnection('rejected', `Connection rejected: IP ${record.remoteIP} not allowed for non-SNI connection`);
511
- }
512
- setupConnection('');
513
- }
514
- }
515
- /**
516
- * Sets up a direct connection to the target
517
- */
518
- setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, overridePort) {
519
- const connectionId = record.id;
520
- // If we have a domain config, try to use a forwarding handler
521
- if (domainConfig) {
522
- try {
523
- // Get the forwarding handler for this domain
524
- const forwardingHandler = this.domainConfigManager.getForwardingHandler(domainConfig);
525
- // Check the forwarding type to determine how to handle the connection
526
- const forwardingType = this.domainConfigManager.getForwardingType(domainConfig);
527
- // For TLS connections, handle differently based on forwarding type
528
- if (record.isTLS) {
529
- // For HTTP-only, we shouldn't get TLS connections
530
- if (forwardingType === 'http-only') {
531
- console.log(`[${connectionId}] Received TLS connection for HTTP-only domain ${serverName || 'unknown'}`);
532
- socket.end();
533
- this.connectionManager.initiateCleanupOnce(record, 'wrong_protocol');
534
- return;
535
- }
536
- // For HTTPS passthrough, use the handler's connection handling
537
- if (forwardingType === 'https-passthrough') {
538
- // If there's initial data, process it first
539
- if (initialChunk) {
540
- record.bytesReceived += initialChunk.length;
541
- }
542
- // Let the handler take over
543
- if (this.settings.enableDetailedLogging) {
544
- console.log(`[${connectionId}] Using forwarding handler for ${forwardingType} connection to ${serverName || 'unknown'}`);
545
- }
546
- // Pass the connection to the handler
547
- forwardingHandler.handleConnection(socket);
548
- // Set metadata fields
549
- record.usingNetworkProxy = false;
550
- // Add connection information to record
551
- if (serverName) {
552
- record.lockedDomain = serverName;
553
- }
554
- return;
555
- }
556
- // For TLS termination types, we'll fall through to the legacy connection setup
557
- // because NetworkProxy is used for termination
558
- }
559
- // For non-TLS connections, check if we support HTTP
560
- else if (!record.isTLS && this.domainConfigManager.supportsHttp(domainConfig)) {
561
- // For HTTP handling that the handler supports natively
562
- if (forwardingType === 'http-only' ||
563
- (forwardingType === 'https-terminate-to-http' || forwardingType === 'https-terminate-to-https')) {
564
- // If there's redirect to HTTPS configured and this is a normal HTTP connection
565
- if (this.domainConfigManager.shouldRedirectToHttps(domainConfig)) {
566
- // We'll let the handler deal with the HTTP request and potential redirect
567
- // Once an HTTP request arrives, it can redirect as needed
568
- }
569
- // Let the handler take over for HTTP handling
570
- if (this.settings.enableDetailedLogging) {
571
- console.log(`[${connectionId}] Using forwarding handler for HTTP connection to ${serverName || 'unknown'}`);
572
- }
573
- // Pass the connection to the handler
574
- forwardingHandler.handleConnection(socket);
575
- // Add connection information to record
576
- if (serverName) {
577
- record.lockedDomain = serverName;
578
- }
579
- return;
580
- }
581
- }
582
- }
583
- catch (err) {
584
- console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
585
- // Fall through to legacy connection handling
586
- }
587
- }
588
- // If we get here, we'll use legacy connection handling
589
- // Determine target host
590
- const targetHost = domainConfig
591
- ? this.domainConfigManager.getTargetIP(domainConfig)
592
- : this.settings.targetIP;
593
- // Determine target port - first try forwarding config, then fallback
594
- const targetPort = domainConfig
595
- ? this.domainConfigManager.getTargetPort(domainConfig, overridePort !== undefined ? overridePort : this.settings.toPort)
596
- : (overridePort !== undefined ? overridePort : this.settings.toPort);
597
- // Setup connection options
598
- const connectionOptions = {
599
- host: targetHost,
600
- port: targetPort,
601
- };
602
- // Preserve source IP if configured
603
- if (this.settings.preserveSourceIP) {
604
- connectionOptions.localAddress = record.remoteIP.replace('::ffff:', '');
605
- }
606
- // Create a safe queue for incoming data
607
- const dataQueue = [];
608
- let queueSize = 0;
609
- let processingQueue = false;
610
- let drainPending = false;
611
- let pipingEstablished = false;
612
- // Pause the incoming socket to prevent buffer overflows
613
- socket.pause();
614
- // Function to safely process the data queue without losing events
615
- const processDataQueue = () => {
616
- if (processingQueue || dataQueue.length === 0 || pipingEstablished)
617
- return;
618
- processingQueue = true;
619
- try {
620
- // Process all queued chunks with the current active handler
621
- while (dataQueue.length > 0) {
622
- const chunk = dataQueue.shift();
623
- queueSize -= chunk.length;
624
- // Once piping is established, we shouldn't get here,
625
- // but just in case, pass to the outgoing socket directly
626
- if (pipingEstablished && record.outgoing) {
627
- record.outgoing.write(chunk);
628
- continue;
629
- }
630
- // Track bytes received
631
- record.bytesReceived += chunk.length;
632
- // Check for TLS handshake
633
- if (!record.isTLS && this.tlsManager.isTlsHandshake(chunk)) {
634
- record.isTLS = true;
635
- if (this.settings.enableTlsDebugLogging) {
636
- console.log(`[${connectionId}] TLS handshake detected in tempDataHandler, ${chunk.length} bytes`);
637
- }
638
- }
639
- // Check if adding this chunk would exceed the buffer limit
640
- const newSize = record.pendingDataSize + chunk.length;
641
- if (this.settings.maxPendingDataSize && newSize > this.settings.maxPendingDataSize) {
642
- console.log(`[${connectionId}] Buffer limit exceeded for connection from ${record.remoteIP}: ${newSize} bytes > ${this.settings.maxPendingDataSize} bytes`);
643
- socket.end(); // Gracefully close the socket
644
- this.connectionManager.initiateCleanupOnce(record, 'buffer_limit_exceeded');
645
- return;
646
- }
647
- // Buffer the chunk and update the size counter
648
- record.pendingData.push(Buffer.from(chunk));
649
- record.pendingDataSize = newSize;
650
- this.timeoutManager.updateActivity(record);
651
- }
652
- }
653
- finally {
654
- processingQueue = false;
655
- // If there's a pending drain and we've processed everything,
656
- // signal we're ready for more data if we haven't established piping yet
657
- if (drainPending && dataQueue.length === 0 && !pipingEstablished) {
658
- drainPending = false;
659
- socket.resume();
660
- }
661
- }
662
- };
663
- // Unified data handler that safely queues incoming data
664
- const safeDataHandler = (chunk) => {
665
- // If piping is already established, just let the pipe handle it
666
- if (pipingEstablished)
667
- return;
668
- // Add to our queue for orderly processing
669
- dataQueue.push(Buffer.from(chunk)); // Make a copy to be safe
670
- queueSize += chunk.length;
671
- // If queue is getting large, pause socket until we catch up
672
- if (this.settings.maxPendingDataSize && queueSize > this.settings.maxPendingDataSize * 0.8) {
673
- socket.pause();
674
- drainPending = true;
675
- }
676
- // Process the queue
677
- processDataQueue();
678
- };
679
- // Add our safe data handler
680
- socket.on('data', safeDataHandler);
681
- // Add initial chunk to pending data if present
682
- if (initialChunk) {
683
- record.bytesReceived += initialChunk.length;
684
- record.pendingData.push(Buffer.from(initialChunk));
685
- record.pendingDataSize = initialChunk.length;
686
- }
687
- // Create the target socket but don't set up piping immediately
688
- const targetSocket = plugins.net.connect(connectionOptions);
689
- record.outgoing = targetSocket;
690
- record.outgoingStartTime = Date.now();
691
- // Apply socket optimizations
692
- targetSocket.setNoDelay(this.settings.noDelay);
693
- // Apply keep-alive settings to the outgoing connection as well
694
- if (this.settings.keepAlive) {
695
- targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
696
- // Apply enhanced TCP keep-alive options if enabled
697
- if (this.settings.enableKeepAliveProbes) {
698
- try {
699
- if ('setKeepAliveProbes' in targetSocket) {
700
- targetSocket.setKeepAliveProbes(10);
701
- }
702
- if ('setKeepAliveInterval' in targetSocket) {
703
- targetSocket.setKeepAliveInterval(1000);
704
- }
705
- }
706
- catch (err) {
707
- // Ignore errors - these are optional enhancements
708
- if (this.settings.enableDetailedLogging) {
709
- console.log(`[${connectionId}] Enhanced TCP keep-alive not supported for outgoing socket: ${err}`);
710
- }
711
- }
712
- }
713
- }
714
- // Setup specific error handler for connection phase
715
- targetSocket.once('error', (err) => {
716
- // This handler runs only once during the initial connection phase
717
- const code = err.code;
718
- console.log(`[${connectionId}] Connection setup error to ${targetHost}:${connectionOptions.port}: ${err.message} (${code})`);
719
- // Resume the incoming socket to prevent it from hanging
720
- socket.resume();
721
- if (code === 'ECONNREFUSED') {
722
- console.log(`[${connectionId}] Target ${targetHost}:${connectionOptions.port} refused connection`);
723
- }
724
- else if (code === 'ETIMEDOUT') {
725
- console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} timed out`);
726
- }
727
- else if (code === 'ECONNRESET') {
728
- console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} was reset`);
729
- }
730
- else if (code === 'EHOSTUNREACH') {
731
- console.log(`[${connectionId}] Host ${targetHost} is unreachable`);
732
- }
733
- // Clear any existing error handler after connection phase
734
- targetSocket.removeAllListeners('error');
735
- // Re-add the normal error handler for established connections
736
- targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
737
- if (record.outgoingTerminationReason === null) {
738
- record.outgoingTerminationReason = 'connection_failed';
739
- this.connectionManager.incrementTerminationStat('outgoing', 'connection_failed');
740
- }
741
- // If we have a forwarding handler for this domain, let it handle the error
742
- if (domainConfig) {
743
- try {
744
- const forwardingHandler = this.domainConfigManager.getForwardingHandler(domainConfig);
745
- forwardingHandler.emit('connection_error', {
746
- socket,
747
- error: err,
748
- connectionId
749
- });
750
- }
751
- catch (handlerErr) {
752
- // If getting the handler fails, just log and continue with normal cleanup
753
- console.log(`Error getting forwarding handler for error handling: ${handlerErr}`);
754
- }
755
- }
756
- // Clean up the connection
757
- this.connectionManager.initiateCleanupOnce(record, `connection_failed_${code}`);
758
- });
759
- // Setup close handler
760
- targetSocket.on('close', this.connectionManager.handleClose('outgoing', record));
761
- socket.on('close', this.connectionManager.handleClose('incoming', record));
762
- // Handle timeouts with keep-alive awareness
763
- socket.on('timeout', () => {
764
- // For keep-alive connections, just log a warning instead of closing
765
- if (record.hasKeepAlive) {
766
- console.log(`[${connectionId}] Timeout event on incoming keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
767
- return;
768
- }
769
- // For non-keep-alive connections, proceed with normal cleanup
770
- console.log(`[${connectionId}] Timeout on incoming side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
771
- if (record.incomingTerminationReason === null) {
772
- record.incomingTerminationReason = 'timeout';
773
- this.connectionManager.incrementTerminationStat('incoming', 'timeout');
774
- }
775
- this.connectionManager.initiateCleanupOnce(record, 'timeout_incoming');
776
- });
777
- targetSocket.on('timeout', () => {
778
- // For keep-alive connections, just log a warning instead of closing
779
- if (record.hasKeepAlive) {
780
- console.log(`[${connectionId}] Timeout event on outgoing keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
781
- return;
782
- }
783
- // For non-keep-alive connections, proceed with normal cleanup
784
- console.log(`[${connectionId}] Timeout on outgoing side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
785
- if (record.outgoingTerminationReason === null) {
786
- record.outgoingTerminationReason = 'timeout';
787
- this.connectionManager.incrementTerminationStat('outgoing', 'timeout');
788
- }
789
- this.connectionManager.initiateCleanupOnce(record, 'timeout_outgoing');
790
- });
791
- // Apply socket timeouts
792
- this.timeoutManager.applySocketTimeouts(record);
793
- // Track outgoing data for bytes counting
794
- targetSocket.on('data', (chunk) => {
795
- record.bytesSent += chunk.length;
796
- this.timeoutManager.updateActivity(record);
797
- });
798
- // Wait for the outgoing connection to be ready before setting up piping
799
- targetSocket.once('connect', () => {
800
- // Clear the initial connection error handler
801
- targetSocket.removeAllListeners('error');
802
- // Add the normal error handler for established connections
803
- targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
804
- // Process any remaining data in the queue before switching to piping
805
- processDataQueue();
806
- // Set up piping immediately
807
- pipingEstablished = true;
808
- // Flush all pending data to target
809
- if (record.pendingData.length > 0) {
810
- const combinedData = Buffer.concat(record.pendingData);
811
- if (this.settings.enableDetailedLogging) {
812
- console.log(`[${connectionId}] Forwarding ${combinedData.length} bytes of initial data to target`);
813
- }
814
- // Write pending data immediately
815
- targetSocket.write(combinedData, (err) => {
816
- if (err) {
817
- console.log(`[${connectionId}] Error writing pending data to target: ${err.message}`);
818
- return this.connectionManager.initiateCleanupOnce(record, 'write_error');
819
- }
820
- });
821
- // Clear the buffer now that we've processed it
822
- record.pendingData = [];
823
- record.pendingDataSize = 0;
824
- }
825
- // Setup piping in both directions without any delays
826
- socket.pipe(targetSocket);
827
- targetSocket.pipe(socket);
828
- // Resume the socket to ensure data flows
829
- socket.resume();
830
- // Process any data that might be queued in the interim
831
- if (dataQueue.length > 0) {
832
- // Write any remaining queued data directly to the target socket
833
- for (const chunk of dataQueue) {
834
- targetSocket.write(chunk);
835
- }
836
- // Clear the queue
837
- dataQueue.length = 0;
838
- queueSize = 0;
839
- }
840
- if (this.settings.enableDetailedLogging) {
841
- console.log(`[${connectionId}] Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
842
- `${serverName
843
- ? ` (SNI: ${serverName})`
844
- : domainConfig
845
- ? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
846
- : ''}` +
847
- ` TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}`);
848
- }
849
- else {
850
- console.log(`Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
851
- `${serverName
852
- ? ` (SNI: ${serverName})`
853
- : domainConfig
854
- ? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
855
- : ''}`);
856
- }
857
- // Add the renegotiation handler for SNI validation
858
- if (serverName) {
859
- // Create connection info object for the existing connection
860
- const connInfo = {
861
- sourceIp: record.remoteIP,
862
- sourcePort: record.incoming.remotePort || 0,
863
- destIp: record.incoming.localAddress || '',
864
- destPort: record.incoming.localPort || 0,
865
- };
866
- // Create a renegotiation handler function
867
- const renegotiationHandler = this.tlsManager.createRenegotiationHandler(connectionId, serverName, connInfo, (connectionId, reason) => this.connectionManager.initiateCleanupOnce(record, reason));
868
- // Store the handler in the connection record so we can remove it during cleanup
869
- record.renegotiationHandler = renegotiationHandler;
870
- // Add the handler to the socket
871
- socket.on('data', renegotiationHandler);
872
- if (this.settings.enableDetailedLogging) {
873
- console.log(`[${connectionId}] TLS renegotiation handler installed for SNI domain: ${serverName}`);
874
- if (this.settings.allowSessionTicket === false) {
875
- console.log(`[${connectionId}] Session ticket usage is disabled. Connection will be reset on reconnection attempts.`);
876
- }
877
- }
878
- }
879
- // Set connection timeout
880
- record.cleanupTimer = this.timeoutManager.setupConnectionTimeout(record, (record, reason) => {
881
- console.log(`[${connectionId}] Connection from ${record.remoteIP} exceeded max lifetime, forcing cleanup.`);
882
- this.connectionManager.initiateCleanupOnce(record, reason);
883
- });
884
- // Mark TLS handshake as complete for TLS connections
885
- if (record.isTLS) {
886
- record.tlsHandshakeComplete = true;
887
- if (this.settings.enableTlsDebugLogging) {
888
- console.log(`[${connectionId}] TLS handshake complete for connection from ${record.remoteIP}`);
889
- }
890
- }
891
- });
892
- }
893
- }
894
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"connection-handler.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/connection-handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAM5C,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACjE,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAI3D;;GAEG;AACH,MAAM,OAAO,iBAAiB;IAC5B,YACU,QAA4B,EAC5B,iBAAoC,EACpC,eAAgC,EAChC,mBAAwC,EACxC,UAAsB,EACtB,kBAAsC,EACtC,cAA8B,EAC9B,gBAAkC;QAPlC,aAAQ,GAAR,QAAQ,CAAoB;QAC5B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;QAChC,wBAAmB,GAAnB,mBAAmB,CAAqB;QACxC,eAAU,GAAV,UAAU,CAAY;QACtB,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,mBAAc,GAAd,cAAc,CAAgB;QAC9B,qBAAgB,GAAhB,gBAAgB,CAAkB;IACzC,CAAC;IAEJ;;OAEG;IACI,gBAAgB,CAAC,MAA0B;QAChD,MAAM,QAAQ,GAAG,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,IAAI,CAAC,CAAC;QAExC,wDAAwD;QACxD,MAAM,YAAY,GAAG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QAC/D,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,OAAO,CAAC,GAAG,CAAC,4BAA4B,QAAQ,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC;YAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,OAAO,EAAE,CAAC;YACjB,OAAO;QACT,CAAC;QAED,iCAAiC;QACjC,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC/D,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,6BAA6B;QAC7B,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAEzC,uCAAuC;QACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAC/D,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;YAE3B,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,uDAAuD;oBACvD,IAAI,oBAAoB,IAAI,MAAM,EAAE,CAAC;wBAClC,MAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBACzC,CAAC;oBACD,IAAI,sBAAsB,IAAI,MAAM,EAAE,CAAC;wBACpC,MAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBAC7C,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,GAAG,EAAE,CAAC,CAAC;oBAC1F,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yBAAyB,QAAQ,YAAY,SAAS,IAAI;gBACxE,eAAe,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,IAAI;gBAC/D,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CACvE,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CACT,uBAAuB,QAAQ,YAAY,SAAS,yBAAyB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CAC3H,CAAC;QACJ,CAAC;QAED,wEAAwE;QACxE,IAAI,IAAI,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,SAAS,CAAC,EAAE,CAAC;YAC3D,IAAI,CAAC,4BAA4B,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,CAAC;YACN,6DAA6D;YAC7D,IAAI,CAAC,wBAAwB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAChD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,4BAA4B,CAClC,MAA0B,EAC1B,MAAyB;QAEzB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAEhC,4CAA4C;QAC5C,IAAI,cAAc,GAA0B,UAAU,CAAC,GAAG,EAAE;YAC1D,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,MAAM,CAAC,QAAQ,EAAE,CACxH,CAAC;gBAEF,sDAAsD;gBACtD,UAAU,CAAC,GAAG,EAAE;oBACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;wBACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;wBAC/E,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;4BACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;wBACjF,CAAC;wBACD,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBACtE,CAAC;gBACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;YACtC,CAAC;QACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;QAEtC,mDAAmD;QACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;YACzB,cAAc,CAAC,KAAK,EAAE,CAAC;QACzB,CAAC;QAED,uBAAuB;QACvB,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,uEAAuE;QACvE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACpC,sDAAsD;YACtD,IAAI,cAAc,EAAE,CAAC;gBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;gBAC7B,cAAc,GAAG,IAAI,CAAC;YACxB,CAAC;YAED,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,wCAAwC;YACxC,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;YACnC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;gBAChE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C;oBAC3D,8EAA8E,CACjF,CAAC;gBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oBAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;oBACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;gBACjF,CAAC;gBACD,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;gBACpE,OAAO;YACT,CAAC;YAED,2CAA2C;YAC3C,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC1C,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,+EAA+E;gBAC/E,IAAI,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;oBACzC,4CAA4C;oBAC5C,MAAM,QAAQ,GAAG;wBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;wBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;wBACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;qBAChC,CAAC;oBAEF,0DAA0D;oBAC1D,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;oBAE/D,6EAA6E;oBAC7E,kFAAkF;oBAClF,IAAI,UAAU,EAAE,CAAC;wBACf,kDAAkD;wBAClD,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC;wBAC3E,MAAM,CAAC,YAAY,GAAG,YAAY,CAAC;wBACnC,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;wBAEjC,4DAA4D;wBAC5D,IAAI,YAAY,EAAE,CAAC;4BACjB,IAAI,CAAC;gCACH,0CAA0C;gCAC1C,MAAM,cAAc,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;gCAEhF,8CAA8C;gCAC9C,IAAI,cAAc,KAAK,yBAAyB;oCAC5C,cAAc,KAAK,0BAA0B,EAAE,CAAC;oCAClD,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;oCAEpF,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4BAA4B,cAAc,SAAS,UAAU,YAAY,gBAAgB,EAAE,CAC5G,CAAC;oCACJ,CAAC;oCAED,oDAAoD;oCACpD,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,KAAK,EACL,gBAAgB,EAChB,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;oCACF,OAAO;gCACT,CAAC;gCAED,6DAA6D;gCAC7D,IAAI,cAAc,KAAK,mBAAmB,EAAE,CAAC;oCAC3C,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;oCAE5E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qDAAqD,UAAU,EAAE,CAClF,CAAC;oCACJ,CAAC;oCAED,0CAA0C;oCAC1C,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;oCAEjC,OAAO;gCACT,CAAC;gCAED,kDAAkD;gCAClD,IAAI,cAAc,KAAK,WAAW,EAAE,CAAC;oCACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,UAAU,EAAE,CAAC,CAAC;oCAC5F,MAAM,CAAC,GAAG,EAAE,CAAC;oCACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;oCACnE,OAAO;gCACT,CAAC;4BACH,CAAC;4BAAC,OAAO,GAAG,EAAE,CAAC;gCACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;gCACxE,gDAAgD;4BAClD,CAAC;wBACH,CAAC;oBACH,CAAC;yBAAM,IACL,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK;wBAC1C,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EACnC,CAAC;wBACD,4EAA4E;wBAC5E,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,uEAAuE,CACxF,CAAC;oBACJ,CAAC;gBACH,CAAC;gBAED,oEAAoE;gBACpE,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,KAAK,EACL,SAAS,EACT,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,mCAAmC;gBACnC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C,MAAM,CAAC,SAAS,EAAE,CAChF,CAAC;gBAEF,iDAAiD;gBACjD,MAAM,qBAAqB,GAAG,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;gBAEjG,IAAI,qBAAqB,EAAE,CAAC;oBAC1B,IAAI,CAAC;wBACH,gEAAgE;wBAChE,IAAI,IAAI,CAAC,mBAAmB,CAAC,YAAY,CAAC,qBAAqB,CAAC,EAAE,CAAC;4BACjE,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,qBAAqB,CAAC,CAAC;4BAErF,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6DAA6D,MAAM,CAAC,SAAS,EAAE,CAChG,CAAC;4BACJ,CAAC;4BAED,0CAA0C;4BAC1C,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;4BAEjC,OAAO;wBACT,CAAC;oBACH,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,8CAA8C,GAAG,EAAE,CAAC,CAAC;wBACjF,oCAAoC;oBACtC,CAAC;gBACH,CAAC;gBAED,2CAA2C;gBAC3C,IAAI,CAAC,qBAAqB,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,KAAK,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,wBAAwB,CAAC,MAA0B,EAAE,MAAyB;QACpF,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QAEnC,2CAA2C;QAC3C,MAAM,wBAAwB,GAAG,CAAC,MAAc,EAAE,UAAkB,EAAE,EAAE;YACtE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,KAAK,UAAU,EAAE,CAAC,CAAC;YAC/C,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;gBAC1C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;YACtE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC3D,CAAC,CAAC;QAEF,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAEhC,gDAAgD;QAChD,IAAI,cAAc,GAA0B,IAAI,CAAC;QACjD,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;YAC7B,cAAc,GAAG,UAAU,CAAC,GAAG,EAAE;gBAC/B,IAAI,CAAC,mBAAmB,EAAE,CAAC;oBACzB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,MAAM,CAAC,QAAQ,EAAE,CACxH,CAAC;oBAEF,sDAAsD;oBACtD,UAAU,CAAC,GAAG,EAAE;wBACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;4BACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;4BAC/E,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gCAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;gCACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;4BACjF,CAAC;4BACD,MAAM,CAAC,GAAG,EAAE,CAAC;4BACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;wBACtE,CAAC;oBACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;gBACtC,CAAC;YACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;YAEtC,mDAAmD;YACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;gBACzB,cAAc,CAAC,KAAK,EAAE,CAAC;YACzB,CAAC;QACH,CAAC;aAAM,CAAC;YACN,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;QACvC,CAAC;QAED,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,gCAAgC;QAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YAClC,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;YACrC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;YAE3C,qDAAqD;YACrD,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC3D,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,iCAAiC,MAAM,CAAC,QAAQ,KAAK,KAAK,CAAC,MAAM,QAAQ,CAC1F,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;QAEH;;WAEG;QACH,MAAM,eAAe,GAAG,CACtB,UAAkB,EAClB,YAAqB,EACrB,YAA4B,EAC5B,YAAqB,EACrB,EAAE;YACF,sDAAsD;YACtD,IAAI,cAAc,EAAE,CAAC;gBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;gBAC7B,cAAc,GAAG,IAAI,CAAC;YACxB,CAAC;YAED,wCAAwC;YACxC,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,2CAA2C;YAC3C,IAAI,YAAY,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,YAAY,CAAC,EAAE,CAAC;gBACjE,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,sCAAsC,YAAY,CAAC,MAAM,QAAQ,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,+FAA+F;YAC/F,MAAM,YAAY,GAAG,YAAY;gBAC/B,CAAC,CAAC,YAAY;gBACd,CAAC,CAAC,UAAU;oBACZ,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,UAAU,CAAC;oBACvD,CAAC,CAAC,SAAS,CAAC;YAEd,0CAA0C;YAC1C,MAAM,CAAC,YAAY,GAAG,YAAY,CAAC;YAEnC,yEAAyE;YACzE,IACE,YAAY;gBACZ,IAAI,CAAC,mBAAmB,CAAC,qBAAqB,CAAC,YAAY,CAAC;gBAC5D,IAAI,CAAC,kBAAkB,CAAC,eAAe,EAAE,EACzC,CAAC;gBACD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,YAAY,UAAU,oCAAoC,CAAC,CAAC;gBAC1F,CAAC;gBAED,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;gBAEpF,IAAI,YAAY,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjC,kEAAkE;oBAClE,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAY,EACZ,gBAAgB,EAChB,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;oBACF,OAAO,CAAC,+BAA+B;gBACzC,CAAC;YACH,CAAC;YAED,gBAAgB;YAChB,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;gBAE3E,6CAA6C;gBAC7C,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,UAAU,CACnB,EACD,CAAC;oBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BACE,MAAM,CAAC,QACT,2BAA2B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAC7D,CAAC;gBACJ,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzF,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,IAAI,CAAC,QAAQ,CAAC,iBAAiB,EAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CACtC,EACD,CAAC;oBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,MAAM,CAAC,QAAQ,sCAAsC,CACjF,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,uBAAuB;YACvB,IAAI,UAAU,EAAE,CAAC;gBACf,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;YACnC,CAAC;YAED,+BAA+B;YAC/B,IAAI,CAAC,qBAAqB,CACxB,MAAM,EACN,MAAM,EACN,YAAY,EACZ,UAAU,EACV,YAAY,EACZ,YAAY,CACb,CAAC;QACJ,CAAC,CAAC;QAEF,oCAAoC;QACpC,4FAA4F;QAC5F,IAAI,IAAI,CAAC,gBAAgB,CAAC,oBAAoB,CAAC,SAAS,CAAC,EAAE,CAAC;YAC1D,IAAI,IAAI,CAAC,gBAAgB,CAAC,yBAAyB,CAAC,SAAS,CAAC,EAAE,CAAC;gBAC/D,8EAA8E;gBAC9E,MAAM,kBAAkB,GAAG;oBACzB,OAAO,EAAE,CAAC,QAAQ,CAAC;oBACnB,UAAU,EAAE;wBACV,IAAI,EAAE,WAA8B;wBACpC,MAAM,EAAE;4BACN,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAS;4BAC7B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM;yBAC3B;wBACD,QAAQ,EAAE;4BACR,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;4BACjD,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;yBAClD;qBACF;iBACF,CAAC;gBAEF,iEAAiE;gBACjE,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,kBAAkB,CAAC,CAAC;gBAEjF,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,UAAU,CACnB,EACD,CAAC;oBACD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,MAAM,CAAC,QAAQ,iBAAiB,MAAM,CAAC,QAAQ,8CAA8C,CACnI,CAAC;oBACF,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,OAAO;gBACT,CAAC;gBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCAAgC,MAAM,CAAC,QAAQ,YAAY,SAAS,kCAAkC,IAAI,CAAC,QAAQ,CAAC,QAAQ,GAAG,CAChJ,CAAC;gBACJ,CAAC;gBAED,eAAe,CAAC,EAAE,EAAE,SAAS,EAAE,kBAAkB,EAAE,SAAS,CAAC,CAAC;gBAC9D,OAAO;YACT,CAAC;iBAAM,CAAC;gBACN,2EAA2E;gBAC3E,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,CAAC,SAAS,CAAC,CAAC;gBAEjF,IAAI,YAAY,EAAE,CAAC;oBACjB,+EAA+E;oBAC/E,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;oBAE3E,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,UAAU,CACnB,EACD,CAAC;wBACD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBACd,MAAM,CAAC,QACT,wCAAwC,YAAY,CAAC,OAAO,CAAC,IAAI,CAC/D,IAAI,CACL,YAAY,SAAS,GAAG,CAC1B,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,OAAO;oBACT,CAAC;oBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCACd,MAAM,CAAC,QACT,YAAY,SAAS,mBAAmB,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAC3E,CAAC;oBACJ,CAAC;oBAED,eAAe,CAAC,EAAE,EAAE,SAAS,EAAE,YAAY,EAAE,SAAS,CAAC,CAAC;oBACxD,OAAO;gBACT,CAAC;gBACD,4EAA4E;YAC9E,CAAC;QACH,CAAC;QAED,yEAAyE;QACzE,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;YAC7B,mBAAmB,GAAG,KAAK,CAAC;YAE5B,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;gBACpC,4BAA4B;gBAC5B,IAAI,cAAc,EAAE,CAAC;oBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;oBAC7B,cAAc,GAAG,IAAI,CAAC;gBACxB,CAAC;gBAED,mBAAmB,GAAG,IAAI,CAAC;gBAE3B,wCAAwC;gBACxC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;oBAChE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D;wBAC1E,8EAA8E,CACjF,CAAC;oBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;wBAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;wBACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;oBACjF,CAAC;oBACD,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBACpE,OAAO;gBACT,CAAC;gBAED,qBAAqB;gBACrB,IAAI,UAAU,GAAG,EAAE,CAAC;gBAEpB,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;oBAC1C,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;oBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wCAAwC,KAAK,CAAC,MAAM,QAAQ,CAC7E,CAAC;oBACJ,CAAC;oBAED,mDAAmD;oBACnD,MAAM,QAAQ,GAAG;wBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;wBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;wBACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;qBAChC,CAAC;oBAEF,cAAc;oBACd,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,QAAQ,CAAC,IAAI,EAAE,CAAC;oBAE/D,iGAAiG;oBACjG,IACE,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK;wBAC1C,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC;wBACpC,CAAC,UAAU,EACX,CAAC;wBACD,oDAAoD;wBACpD,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;wBAChE,IAAI,aAAa,EAAE,CAAC;4BAClB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,sDAAsD,CACvE,CAAC;4BACJ,CAAC;4BACH,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,KAAK,EACL,SAAS,EACT,CAAC,OAAO,EAAE,EAAE;gCACV,iEAAiE;gCACjE,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCAC9C,MAAM,CAAC,yBAAyB,GAAG,+BAA+B,CAAC;oCACnE,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAC7C,UAAU,EACV,+BAA+B,CAChC,CAAC;gCACJ,CAAC;gCACD,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;gCACtE,IAAI,CAAC;oCAAC,MAAM,CAAC,IAAI,EAAE,CAAC;oCAAC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;oCAAC,MAAM,CAAC,MAAM,EAAE,CAAC;oCAAC,MAAM,CAAC,GAAG,EAAE,CAAC;gCAAC,CAAC;gCAC1E,MAAM,CAAC;oCAAC,MAAM,CAAC,GAAG,EAAE,CAAC;gCAAC,CAAC;gCACvB,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;4BACtF,CAAC,CACF,CAAC;4BACA,OAAO;wBACT,CAAC;wBACD,2DAA2D;wBAC3D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6DAA6D,CAC9E,CAAC;wBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,+BAA+B,CAAC;4BACnE,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAC7C,UAAU,EACV,+BAA+B,CAChC,CAAC;wBACJ,CAAC;wBACD,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;wBACtE,IAAI,CAAC;4BAAC,MAAM,CAAC,IAAI,EAAE,CAAC;4BAAC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;4BAAC,MAAM,CAAC,MAAM,EAAE,CAAC;4BAAC,MAAM,CAAC,GAAG,EAAE,CAAC;wBAAC,CAAC;wBAC1E,MAAM,CAAC;4BAAC,MAAM,CAAC,GAAG,EAAE,CAAC;wBAAC,CAAC;wBACvB,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;wBAClF,OAAO;oBACT,CAAC;gBACH,CAAC;gBAED,6CAA6C;gBAC7C,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;gBAEjC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,8BAA8B,MAAM,CAAC,QAAQ,cAC3D,UAAU,IAAI,SAChB,EAAE,CACH,CAAC;gBACJ,CAAC;gBAED,eAAe,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,2DAA2D;YAC3D,MAAM,eAAe,GAAG;gBACtB,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;gBACjD,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;aAClD,CAAC;YAEF,IAAI,eAAe,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC;gBACrC,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,eAAe,CAAC,UAAU,EAC1B,eAAe,CAAC,UAAU,CAC3B,EACH,CAAC;gBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,MAAM,CAAC,QAAQ,qCAAqC,CAChF,CAAC;YACJ,CAAC;YAED,eAAe,CAAC,EAAE,CAAC,CAAC;QACtB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,qBAAqB,CAC3B,MAA0B,EAC1B,MAAyB,EACzB,YAA4B,EAC5B,UAAmB,EACnB,YAAqB,EACrB,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,8DAA8D;QAC9D,IAAI,YAAY,EAAE,CAAC;YACjB,IAAI,CAAC;gBACH,6CAA6C;gBAC7C,MAAM,iBAAiB,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;gBAEtF,sEAAsE;gBACtE,MAAM,cAAc,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;gBAEhF,mEAAmE;gBACnE,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,kDAAkD;oBAClD,IAAI,cAAc,KAAK,WAAW,EAAE,CAAC;wBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;wBACzG,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;wBACrE,OAAO;oBACT,CAAC;oBAED,+DAA+D;oBAC/D,IAAI,cAAc,KAAK,mBAAmB,EAAE,CAAC;wBAC3C,4CAA4C;wBAC5C,IAAI,YAAY,EAAE,CAAC;4BACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;wBAC9C,CAAC;wBAED,4BAA4B;wBAC5B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,cAAc,kBAAkB,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;wBAC3H,CAAC;wBAED,qCAAqC;wBACrC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;wBAE3C,sBAAsB;wBACtB,MAAM,CAAC,iBAAiB,GAAG,KAAK,CAAC;wBAEjC,uCAAuC;wBACvC,IAAI,UAAU,EAAE,CAAC;4BACf,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;wBACnC,CAAC;wBAED,OAAO;oBACT,CAAC;oBAED,+EAA+E;oBAC/E,+CAA+C;gBACjD,CAAC;gBACD,oDAAoD;qBAC/C,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,mBAAmB,CAAC,YAAY,CAAC,YAAY,CAAC,EAAE,CAAC;oBAC9E,uDAAuD;oBACvD,IAAI,cAAc,KAAK,WAAW;wBAC9B,CAAC,cAAc,KAAK,yBAAyB,IAAI,cAAc,KAAK,0BAA0B,CAAC,EAAE,CAAC;wBAEpG,+EAA+E;wBAC/E,IAAI,IAAI,CAAC,mBAAmB,CAAC,qBAAqB,CAAC,YAAY,CAAC,EAAE,CAAC;4BACjE,0EAA0E;4BAC1E,0DAA0D;wBAC5D,CAAC;wBAED,8CAA8C;wBAC9C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;wBAC9G,CAAC;wBAED,qCAAqC;wBACrC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;wBAE3C,uCAAuC;wBACvC,IAAI,UAAU,EAAE,CAAC;4BACf,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;wBACnC,CAAC;wBAED,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;gBACxE,6CAA6C;YAC/C,CAAC;QACH,CAAC;QAED,uDAAuD;QAEvD,wBAAwB;QACxB,MAAM,UAAU,GAAG,YAAY;YAC7B,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,YAAY,CAAC;YACpD,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;QAE5B,qEAAqE;QACrE,MAAM,UAAU,GAAG,YAAY;YAC7B,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,YAAY,EAAE,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC;YACxH,CAAC,CAAC,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAEvE,2BAA2B;QAC3B,MAAM,iBAAiB,GAA+B;YACpD,IAAI,EAAE,UAAU;YAChB,IAAI,EAAE,UAAU;SACjB,CAAC;QAEF,mCAAmC;QACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACnC,iBAAiB,CAAC,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,wCAAwC;QACxC,MAAM,SAAS,GAAa,EAAE,CAAC;QAC/B,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,IAAI,eAAe,GAAG,KAAK,CAAC;QAC5B,IAAI,YAAY,GAAG,KAAK,CAAC;QACzB,IAAI,iBAAiB,GAAG,KAAK,CAAC;QAE9B,wDAAwD;QACxD,MAAM,CAAC,KAAK,EAAE,CAAC;QAEf,kEAAkE;QAClE,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,IAAI,eAAe,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,iBAAiB;gBAAE,OAAO;YAE3E,eAAe,GAAG,IAAI,CAAC;YAEvB,IAAI,CAAC;gBACH,4DAA4D;gBAC5D,OAAO,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,EAAG,CAAC;oBACjC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;oBAE1B,qDAAqD;oBACrD,yDAAyD;oBACzD,IAAI,iBAAiB,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACzC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBAC7B,SAAS;oBACX,CAAC;oBAED,uBAAuB;oBACvB,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAErC,0BAA0B;oBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBAC3D,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;wBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,KAAK,CAAC,MAAM,QAAQ,CACrF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,2DAA2D;oBAC3D,MAAM,OAAO,GAAG,MAAM,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC;oBAEtD,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACnF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,QAAQ,KAAK,OAAO,YAAY,IAAI,CAAC,QAAQ,CAAC,kBAAkB,QAAQ,CAC/I,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,8BAA8B;wBAC5C,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;wBAC5E,OAAO;oBACT,CAAC;oBAED,+CAA+C;oBAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;oBAC5C,MAAM,CAAC,eAAe,GAAG,OAAO,CAAC;oBACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBAC7C,CAAC;YACH,CAAC;oBAAS,CAAC;gBACT,eAAe,GAAG,KAAK,CAAC;gBAExB,6DAA6D;gBAC7D,wEAAwE;gBACxE,IAAI,YAAY,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;oBACjE,YAAY,GAAG,KAAK,CAAC;oBACrB,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,wDAAwD;QACxD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,gEAAgE;YAChE,IAAI,iBAAiB;gBAAE,OAAO;YAE9B,0CAA0C;YAC1C,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,yBAAyB;YAC7D,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YAE1B,4DAA4D;YAC5D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,GAAG,GAAG,EAAE,CAAC;gBAC3F,MAAM,CAAC,KAAK,EAAE,CAAC;gBACf,YAAY,GAAG,IAAI,CAAC;YACtB,CAAC;YAED,oBAAoB;YACpB,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC;QAEF,4BAA4B;QAC5B,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAEnC,+CAA+C;QAC/C,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;YACnD,MAAM,CAAC,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC;QAC/C,CAAC;QAED,+DAA+D;QAC/D,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;QAC5D,MAAM,CAAC,QAAQ,GAAG,YAAY,CAAC;QAC/B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEtC,6BAA6B;QAC7B,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE/C,+DAA+D;QAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,YAAY,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAErE,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,IAAI,oBAAoB,IAAI,YAAY,EAAE,CAAC;wBACxC,YAAoB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBAC/C,CAAC;oBACD,IAAI,sBAAsB,IAAI,YAAY,EAAE,CAAC;wBAC1C,YAAoB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACnD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gEAAgE,GAAG,EAAE,CACtF,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,YAAY,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YACjC,kEAAkE;YAClE,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+BAA+B,UAAU,IAAI,iBAAiB,CAAC,IAAI,KAAK,GAAG,CAAC,OAAO,KAAK,IAAI,GAAG,CAChH,CAAC;YAEF,wDAAwD;YACxD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC5B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,UAAU,IAAI,iBAAiB,CAAC,IAAI,qBAAqB,CACtF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,UAAU,UAAU,iBAAiB,CAAC,CAAC;YACrE,CAAC;YAED,0DAA0D;YAC1D,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,8DAA8D;YAC9D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,mBAAmB,CAAC;gBACvD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,mBAAmB,CAAC,CAAC;YACnF,CAAC;YAED,2EAA2E;YAC3E,IAAI,YAAY,EAAE,CAAC;gBACjB,IAAI,CAAC;oBACH,MAAM,iBAAiB,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;oBACtF,iBAAiB,CAAC,IAAI,CAAC,kBAAkB,EAAE;wBACzC,MAAM;wBACN,KAAK,EAAE,GAAG;wBACV,YAAY;qBACb,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,0EAA0E;oBAC1E,OAAO,CAAC,GAAG,CAAC,wDAAwD,UAAU,EAAE,CAAC,CAAC;gBACpF,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,qBAAqB,IAAI,EAAE,CAAC,CAAC;QAClF,CAAC,CAAC,CAAC;QAEH,sBAAsB;QACtB,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QACjF,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,4CAA4C;QAC5C,MAAM,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YACxB,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,YAAY,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC9B,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,wBAAwB;QACxB,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QAEhD,yCAAyC;QACzC,YAAY,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACxC,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QAEH,wEAAwE;QACxE,YAAY,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;YAChC,6CAA6C;YAC7C,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,2DAA2D;YAC3D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,qEAAqE;YACrE,gBAAgB,EAAE,CAAC;YAEnB,4BAA4B;YAC5B,iBAAiB,GAAG,IAAI,CAAC;YAEzB,mCAAmC;YACnC,IAAI,MAAM,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClC,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;gBAEvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gBAAgB,YAAY,CAAC,MAAM,kCAAkC,CACtF,CAAC;gBACJ,CAAC;gBAED,iCAAiC;gBACjC,YAAY,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC,GAAG,EAAE,EAAE;oBACvC,IAAI,GAAG,EAAE,CAAC;wBACR,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;wBACtF,OAAO,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;oBAC3E,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,+CAA+C;gBAC/C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;gBACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAC7B,CAAC;YAED,qDAAqD;YACrD,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YAC1B,YAAY,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAE1B,yCAAyC;YACzC,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,uDAAuD;YACvD,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzB,gEAAgE;gBAChE,KAAK,MAAM,KAAK,IAAI,SAAS,EAAE,CAAC;oBAC9B,YAAY,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;gBAC5B,CAAC;gBACD,kBAAkB;gBAClB,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;gBACrB,SAAS,GAAG,CAAC,CAAC;YAChB,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACvG,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE;oBACF,SAAS,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBAClC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE,CACL,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,2BAA2B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACrF,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE,CACL,CAAC;YACJ,CAAC;YAED,mDAAmD;YACnD,IAAI,UAAU,EAAE,CAAC;gBACf,4DAA4D;gBAC5D,MAAM,QAAQ,GAAG;oBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC;oBAC3C,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,YAAY,IAAI,EAAE;oBAC1C,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,SAAS,IAAI,CAAC;iBACzC,CAAC;gBAEF,0CAA0C;gBAC1C,MAAM,oBAAoB,GAAG,IAAI,CAAC,UAAU,CAAC,0BAA0B,CACrE,YAAY,EACZ,UAAU,EACV,QAAQ,EACR,CAAC,YAAY,EAAE,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACrF,CAAC;gBAEF,gFAAgF;gBAChF,MAAM,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;gBAEnD,gCAAgC;gBAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAExC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD,UAAU,EAAE,CACtF,CAAC;oBACF,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wFAAwF,CACzG,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;YAED,yBAAyB;YACzB,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC,cAAc,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE;gBAC1F,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,MAAM,CAAC,QAAQ,0CAA0C,CAC/F,CAAC;gBACF,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAC7D,CAAC,CAAC,CAAC;YAEH,qDAAqD;YACrD,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC;gBAEnC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;CACF"}