@push.rocks/smartproxy 19.3.2 → 19.3.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +18 -35
- package/readme.plan.md +173 -271
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,894 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../plugins.js';
|
|
2
|
-
import { ConnectionManager } from './classes.pp.connectionmanager.js';
|
|
3
|
-
import { SecurityManager } from './classes.pp.securitymanager.js';
|
|
4
|
-
import { DomainConfigManager } from './classes.pp.domainconfigmanager.js';
|
|
5
|
-
import { TlsManager } from './classes.pp.tlsmanager.js';
|
|
6
|
-
import { NetworkProxyBridge } from './classes.pp.networkproxybridge.js';
|
|
7
|
-
import { TimeoutManager } from './classes.pp.timeoutmanager.js';
|
|
8
|
-
import { PortRangeManager } from './classes.pp.portrangemanager.js';
|
|
9
|
-
/**
|
|
10
|
-
* Handles new connection processing and setup logic
|
|
11
|
-
*/
|
|
12
|
-
export class ConnectionHandler {
|
|
13
|
-
constructor(settings, connectionManager, securityManager, domainConfigManager, tlsManager, networkProxyBridge, timeoutManager, portRangeManager) {
|
|
14
|
-
this.settings = settings;
|
|
15
|
-
this.connectionManager = connectionManager;
|
|
16
|
-
this.securityManager = securityManager;
|
|
17
|
-
this.domainConfigManager = domainConfigManager;
|
|
18
|
-
this.tlsManager = tlsManager;
|
|
19
|
-
this.networkProxyBridge = networkProxyBridge;
|
|
20
|
-
this.timeoutManager = timeoutManager;
|
|
21
|
-
this.portRangeManager = portRangeManager;
|
|
22
|
-
}
|
|
23
|
-
/**
|
|
24
|
-
* Handle a new incoming connection
|
|
25
|
-
*/
|
|
26
|
-
handleConnection(socket) {
|
|
27
|
-
const remoteIP = socket.remoteAddress || '';
|
|
28
|
-
const localPort = socket.localPort || 0;
|
|
29
|
-
// Validate IP against rate limits and connection limits
|
|
30
|
-
const ipValidation = this.securityManager.validateIP(remoteIP);
|
|
31
|
-
if (!ipValidation.allowed) {
|
|
32
|
-
console.log(`Connection rejected from ${remoteIP}: ${ipValidation.reason}`);
|
|
33
|
-
socket.end();
|
|
34
|
-
socket.destroy();
|
|
35
|
-
return;
|
|
36
|
-
}
|
|
37
|
-
// Create a new connection record
|
|
38
|
-
const record = this.connectionManager.createConnection(socket);
|
|
39
|
-
const connectionId = record.id;
|
|
40
|
-
// Apply socket optimizations
|
|
41
|
-
socket.setNoDelay(this.settings.noDelay);
|
|
42
|
-
// Apply keep-alive settings if enabled
|
|
43
|
-
if (this.settings.keepAlive) {
|
|
44
|
-
socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
|
45
|
-
record.hasKeepAlive = true;
|
|
46
|
-
// Apply enhanced TCP keep-alive options if enabled
|
|
47
|
-
if (this.settings.enableKeepAliveProbes) {
|
|
48
|
-
try {
|
|
49
|
-
// These are platform-specific and may not be available
|
|
50
|
-
if ('setKeepAliveProbes' in socket) {
|
|
51
|
-
socket.setKeepAliveProbes(10);
|
|
52
|
-
}
|
|
53
|
-
if ('setKeepAliveInterval' in socket) {
|
|
54
|
-
socket.setKeepAliveInterval(1000);
|
|
55
|
-
}
|
|
56
|
-
}
|
|
57
|
-
catch (err) {
|
|
58
|
-
// Ignore errors - these are optional enhancements
|
|
59
|
-
if (this.settings.enableDetailedLogging) {
|
|
60
|
-
console.log(`[${connectionId}] Enhanced TCP keep-alive settings not supported: ${err}`);
|
|
61
|
-
}
|
|
62
|
-
}
|
|
63
|
-
}
|
|
64
|
-
}
|
|
65
|
-
if (this.settings.enableDetailedLogging) {
|
|
66
|
-
console.log(`[${connectionId}] New connection from ${remoteIP} on port ${localPort}. ` +
|
|
67
|
-
`Keep-Alive: ${record.hasKeepAlive ? 'Enabled' : 'Disabled'}. ` +
|
|
68
|
-
`Active connections: ${this.connectionManager.getConnectionCount()}`);
|
|
69
|
-
}
|
|
70
|
-
else {
|
|
71
|
-
console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionManager.getConnectionCount()}`);
|
|
72
|
-
}
|
|
73
|
-
// Check if this connection should be forwarded directly to NetworkProxy
|
|
74
|
-
if (this.portRangeManager.shouldUseNetworkProxy(localPort)) {
|
|
75
|
-
this.handleNetworkProxyConnection(socket, record);
|
|
76
|
-
}
|
|
77
|
-
else {
|
|
78
|
-
// For non-NetworkProxy ports, proceed with normal processing
|
|
79
|
-
this.handleStandardConnection(socket, record);
|
|
80
|
-
}
|
|
81
|
-
}
|
|
82
|
-
/**
|
|
83
|
-
* Handle a connection that should be forwarded to NetworkProxy
|
|
84
|
-
*/
|
|
85
|
-
handleNetworkProxyConnection(socket, record) {
|
|
86
|
-
const connectionId = record.id;
|
|
87
|
-
let initialDataReceived = false;
|
|
88
|
-
// Set an initial timeout for handshake data
|
|
89
|
-
let initialTimeout = setTimeout(() => {
|
|
90
|
-
if (!initialDataReceived) {
|
|
91
|
-
console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${record.remoteIP}`);
|
|
92
|
-
// Add a grace period instead of immediate termination
|
|
93
|
-
setTimeout(() => {
|
|
94
|
-
if (!initialDataReceived) {
|
|
95
|
-
console.log(`[${connectionId}] Final initial data timeout after grace period`);
|
|
96
|
-
if (record.incomingTerminationReason === null) {
|
|
97
|
-
record.incomingTerminationReason = 'initial_timeout';
|
|
98
|
-
this.connectionManager.incrementTerminationStat('incoming', 'initial_timeout');
|
|
99
|
-
}
|
|
100
|
-
socket.end();
|
|
101
|
-
this.connectionManager.cleanupConnection(record, 'initial_timeout');
|
|
102
|
-
}
|
|
103
|
-
}, 30000); // 30 second grace period
|
|
104
|
-
}
|
|
105
|
-
}, this.settings.initialDataTimeout);
|
|
106
|
-
// Make sure timeout doesn't keep the process alive
|
|
107
|
-
if (initialTimeout.unref) {
|
|
108
|
-
initialTimeout.unref();
|
|
109
|
-
}
|
|
110
|
-
// Set up error handler
|
|
111
|
-
socket.on('error', this.connectionManager.handleError('incoming', record));
|
|
112
|
-
// First data handler to capture initial TLS handshake for NetworkProxy
|
|
113
|
-
socket.once('data', (chunk) => {
|
|
114
|
-
// Clear the initial timeout since we've received data
|
|
115
|
-
if (initialTimeout) {
|
|
116
|
-
clearTimeout(initialTimeout);
|
|
117
|
-
initialTimeout = null;
|
|
118
|
-
}
|
|
119
|
-
initialDataReceived = true;
|
|
120
|
-
record.hasReceivedInitialData = true;
|
|
121
|
-
// Block non-TLS connections on port 443
|
|
122
|
-
const localPort = record.localPort;
|
|
123
|
-
if (!this.tlsManager.isTlsHandshake(chunk) && localPort === 443) {
|
|
124
|
-
console.log(`[${connectionId}] Non-TLS connection detected on port 443. ` +
|
|
125
|
-
`Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
|
|
126
|
-
if (record.incomingTerminationReason === null) {
|
|
127
|
-
record.incomingTerminationReason = 'non_tls_blocked';
|
|
128
|
-
this.connectionManager.incrementTerminationStat('incoming', 'non_tls_blocked');
|
|
129
|
-
}
|
|
130
|
-
socket.end();
|
|
131
|
-
this.connectionManager.cleanupConnection(record, 'non_tls_blocked');
|
|
132
|
-
return;
|
|
133
|
-
}
|
|
134
|
-
// Check if this looks like a TLS handshake
|
|
135
|
-
if (this.tlsManager.isTlsHandshake(chunk)) {
|
|
136
|
-
record.isTLS = true;
|
|
137
|
-
// Check for ClientHello to extract SNI - but don't enforce it for NetworkProxy
|
|
138
|
-
if (this.tlsManager.isClientHello(chunk)) {
|
|
139
|
-
// Create connection info for SNI extraction
|
|
140
|
-
const connInfo = {
|
|
141
|
-
sourceIp: record.remoteIP,
|
|
142
|
-
sourcePort: socket.remotePort || 0,
|
|
143
|
-
destIp: socket.localAddress || '',
|
|
144
|
-
destPort: socket.localPort || 0,
|
|
145
|
-
};
|
|
146
|
-
// Extract SNI for domain-specific forwarding if available
|
|
147
|
-
const serverName = this.tlsManager.extractSNI(chunk, connInfo);
|
|
148
|
-
// For NetworkProxy connections, we'll allow session tickets even without SNI
|
|
149
|
-
// We'll only use the serverName if available to determine the specific forwarding
|
|
150
|
-
if (serverName) {
|
|
151
|
-
// Save domain config and SNI in connection record
|
|
152
|
-
const domainConfig = this.domainConfigManager.findDomainConfig(serverName);
|
|
153
|
-
record.domainConfig = domainConfig;
|
|
154
|
-
record.lockedDomain = serverName;
|
|
155
|
-
// If we have a domain config and it has a forwarding config
|
|
156
|
-
if (domainConfig) {
|
|
157
|
-
try {
|
|
158
|
-
// Get the forwarding type for this domain
|
|
159
|
-
const forwardingType = this.domainConfigManager.getForwardingType(domainConfig);
|
|
160
|
-
// For TLS termination types, use NetworkProxy
|
|
161
|
-
if (forwardingType === 'https-terminate-to-http' ||
|
|
162
|
-
forwardingType === 'https-terminate-to-https') {
|
|
163
|
-
const networkProxyPort = this.domainConfigManager.getNetworkProxyPort(domainConfig);
|
|
164
|
-
if (this.settings.enableDetailedLogging) {
|
|
165
|
-
console.log(`[${connectionId}] Using TLS termination (${forwardingType}) for ${serverName} on port ${networkProxyPort}`);
|
|
166
|
-
}
|
|
167
|
-
// Forward to NetworkProxy with domain-specific port
|
|
168
|
-
this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, chunk, networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
|
|
169
|
-
return;
|
|
170
|
-
}
|
|
171
|
-
// For HTTPS passthrough, use the forwarding handler directly
|
|
172
|
-
if (forwardingType === 'https-passthrough') {
|
|
173
|
-
const handler = this.domainConfigManager.getForwardingHandler(domainConfig);
|
|
174
|
-
if (this.settings.enableDetailedLogging) {
|
|
175
|
-
console.log(`[${connectionId}] Using forwarding handler for SNI passthrough to ${serverName}`);
|
|
176
|
-
}
|
|
177
|
-
// Handle the connection using the handler
|
|
178
|
-
handler.handleConnection(socket);
|
|
179
|
-
return;
|
|
180
|
-
}
|
|
181
|
-
// For HTTP-only, we shouldn't get TLS connections
|
|
182
|
-
if (forwardingType === 'http-only') {
|
|
183
|
-
console.log(`[${connectionId}] Received TLS connection for HTTP-only domain ${serverName}`);
|
|
184
|
-
socket.end();
|
|
185
|
-
this.connectionManager.cleanupConnection(record, 'wrong_protocol');
|
|
186
|
-
return;
|
|
187
|
-
}
|
|
188
|
-
}
|
|
189
|
-
catch (err) {
|
|
190
|
-
console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
|
|
191
|
-
// Fall through to default NetworkProxy handling
|
|
192
|
-
}
|
|
193
|
-
}
|
|
194
|
-
}
|
|
195
|
-
else if (this.settings.allowSessionTicket === false &&
|
|
196
|
-
this.settings.enableDetailedLogging) {
|
|
197
|
-
// Log that we're allowing a session resumption without SNI for NetworkProxy
|
|
198
|
-
console.log(`[${connectionId}] Allowing session resumption without SNI for NetworkProxy forwarding`);
|
|
199
|
-
}
|
|
200
|
-
}
|
|
201
|
-
// Forward directly to NetworkProxy without domain-specific settings
|
|
202
|
-
this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, chunk, undefined, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
|
|
203
|
-
}
|
|
204
|
-
else {
|
|
205
|
-
// If not TLS, handle as plain HTTP
|
|
206
|
-
console.log(`[${connectionId}] Non-TLS connection on NetworkProxy port ${record.localPort}`);
|
|
207
|
-
// Check if we have a domain config based on port
|
|
208
|
-
const portBasedDomainConfig = this.domainConfigManager.findDomainConfigForPort(record.localPort);
|
|
209
|
-
if (portBasedDomainConfig) {
|
|
210
|
-
try {
|
|
211
|
-
// If this domain supports HTTP via a forwarding handler, use it
|
|
212
|
-
if (this.domainConfigManager.supportsHttp(portBasedDomainConfig)) {
|
|
213
|
-
const handler = this.domainConfigManager.getForwardingHandler(portBasedDomainConfig);
|
|
214
|
-
if (this.settings.enableDetailedLogging) {
|
|
215
|
-
console.log(`[${connectionId}] Using forwarding handler for non-TLS connection to port ${record.localPort}`);
|
|
216
|
-
}
|
|
217
|
-
// Handle the connection using the handler
|
|
218
|
-
handler.handleConnection(socket);
|
|
219
|
-
return;
|
|
220
|
-
}
|
|
221
|
-
}
|
|
222
|
-
catch (err) {
|
|
223
|
-
console.log(`[${connectionId}] Error using forwarding handler for HTTP: ${err}`);
|
|
224
|
-
// Fall through to direct connection
|
|
225
|
-
}
|
|
226
|
-
}
|
|
227
|
-
// Use legacy direct connection as fallback
|
|
228
|
-
this.setupDirectConnection(socket, record, undefined, undefined, chunk);
|
|
229
|
-
}
|
|
230
|
-
});
|
|
231
|
-
}
|
|
232
|
-
/**
|
|
233
|
-
* Handle a standard (non-NetworkProxy) connection
|
|
234
|
-
*/
|
|
235
|
-
handleStandardConnection(socket, record) {
|
|
236
|
-
const connectionId = record.id;
|
|
237
|
-
const localPort = record.localPort;
|
|
238
|
-
// Define helpers for rejecting connections
|
|
239
|
-
const rejectIncomingConnection = (reason, logMessage) => {
|
|
240
|
-
console.log(`[${connectionId}] ${logMessage}`);
|
|
241
|
-
socket.end();
|
|
242
|
-
if (record.incomingTerminationReason === null) {
|
|
243
|
-
record.incomingTerminationReason = reason;
|
|
244
|
-
this.connectionManager.incrementTerminationStat('incoming', reason);
|
|
245
|
-
}
|
|
246
|
-
this.connectionManager.cleanupConnection(record, reason);
|
|
247
|
-
};
|
|
248
|
-
let initialDataReceived = false;
|
|
249
|
-
// Set an initial timeout for SNI data if needed
|
|
250
|
-
let initialTimeout = null;
|
|
251
|
-
if (this.settings.sniEnabled) {
|
|
252
|
-
initialTimeout = setTimeout(() => {
|
|
253
|
-
if (!initialDataReceived) {
|
|
254
|
-
console.log(`[${connectionId}] Initial data warning (${this.settings.initialDataTimeout}ms) for connection from ${record.remoteIP}`);
|
|
255
|
-
// Add a grace period instead of immediate termination
|
|
256
|
-
setTimeout(() => {
|
|
257
|
-
if (!initialDataReceived) {
|
|
258
|
-
console.log(`[${connectionId}] Final initial data timeout after grace period`);
|
|
259
|
-
if (record.incomingTerminationReason === null) {
|
|
260
|
-
record.incomingTerminationReason = 'initial_timeout';
|
|
261
|
-
this.connectionManager.incrementTerminationStat('incoming', 'initial_timeout');
|
|
262
|
-
}
|
|
263
|
-
socket.end();
|
|
264
|
-
this.connectionManager.cleanupConnection(record, 'initial_timeout');
|
|
265
|
-
}
|
|
266
|
-
}, 30000); // 30 second grace period
|
|
267
|
-
}
|
|
268
|
-
}, this.settings.initialDataTimeout);
|
|
269
|
-
// Make sure timeout doesn't keep the process alive
|
|
270
|
-
if (initialTimeout.unref) {
|
|
271
|
-
initialTimeout.unref();
|
|
272
|
-
}
|
|
273
|
-
}
|
|
274
|
-
else {
|
|
275
|
-
initialDataReceived = true;
|
|
276
|
-
record.hasReceivedInitialData = true;
|
|
277
|
-
}
|
|
278
|
-
socket.on('error', this.connectionManager.handleError('incoming', record));
|
|
279
|
-
// Track data for bytes counting
|
|
280
|
-
socket.on('data', (chunk) => {
|
|
281
|
-
record.bytesReceived += chunk.length;
|
|
282
|
-
this.timeoutManager.updateActivity(record);
|
|
283
|
-
// Check for TLS handshake if this is the first chunk
|
|
284
|
-
if (!record.isTLS && this.tlsManager.isTlsHandshake(chunk)) {
|
|
285
|
-
record.isTLS = true;
|
|
286
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
287
|
-
console.log(`[${connectionId}] TLS handshake detected from ${record.remoteIP}, ${chunk.length} bytes`);
|
|
288
|
-
}
|
|
289
|
-
}
|
|
290
|
-
});
|
|
291
|
-
/**
|
|
292
|
-
* Sets up the connection to the target host.
|
|
293
|
-
*/
|
|
294
|
-
const setupConnection = (serverName, initialChunk, forcedDomain, overridePort) => {
|
|
295
|
-
// Clear the initial timeout since we've received data
|
|
296
|
-
if (initialTimeout) {
|
|
297
|
-
clearTimeout(initialTimeout);
|
|
298
|
-
initialTimeout = null;
|
|
299
|
-
}
|
|
300
|
-
// Mark that we've received initial data
|
|
301
|
-
initialDataReceived = true;
|
|
302
|
-
record.hasReceivedInitialData = true;
|
|
303
|
-
// Check if this looks like a TLS handshake
|
|
304
|
-
if (initialChunk && this.tlsManager.isTlsHandshake(initialChunk)) {
|
|
305
|
-
record.isTLS = true;
|
|
306
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
307
|
-
console.log(`[${connectionId}] TLS handshake detected in setup, ${initialChunk.length} bytes`);
|
|
308
|
-
}
|
|
309
|
-
}
|
|
310
|
-
// If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
|
|
311
|
-
const domainConfig = forcedDomain
|
|
312
|
-
? forcedDomain
|
|
313
|
-
: serverName
|
|
314
|
-
? this.domainConfigManager.findDomainConfig(serverName)
|
|
315
|
-
: undefined;
|
|
316
|
-
// Save domain config in connection record
|
|
317
|
-
record.domainConfig = domainConfig;
|
|
318
|
-
// Check if this domain should use NetworkProxy (domain-specific setting)
|
|
319
|
-
if (domainConfig &&
|
|
320
|
-
this.domainConfigManager.shouldUseNetworkProxy(domainConfig) &&
|
|
321
|
-
this.networkProxyBridge.getNetworkProxy()) {
|
|
322
|
-
if (this.settings.enableDetailedLogging) {
|
|
323
|
-
console.log(`[${connectionId}] Domain ${serverName} is configured to use NetworkProxy`);
|
|
324
|
-
}
|
|
325
|
-
const networkProxyPort = this.domainConfigManager.getNetworkProxyPort(domainConfig);
|
|
326
|
-
if (initialChunk && record.isTLS) {
|
|
327
|
-
// For TLS connections with initial chunk, forward to NetworkProxy
|
|
328
|
-
this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, initialChunk, networkProxyPort, (reason) => this.connectionManager.initiateCleanupOnce(record, reason));
|
|
329
|
-
return; // Skip normal connection setup
|
|
330
|
-
}
|
|
331
|
-
}
|
|
332
|
-
// IP validation
|
|
333
|
-
if (domainConfig) {
|
|
334
|
-
const ipRules = this.domainConfigManager.getEffectiveIPRules(domainConfig);
|
|
335
|
-
// Perform IP validation using security rules
|
|
336
|
-
if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
|
|
337
|
-
return rejectIncomingConnection('rejected', `Connection rejected: IP ${record.remoteIP} not allowed for domain ${domainConfig.domains.join(', ')}`);
|
|
338
|
-
}
|
|
339
|
-
}
|
|
340
|
-
else if (this.settings.defaultAllowedIPs && this.settings.defaultAllowedIPs.length > 0) {
|
|
341
|
-
if (!this.securityManager.isIPAuthorized(record.remoteIP, this.settings.defaultAllowedIPs, this.settings.defaultBlockedIPs || [])) {
|
|
342
|
-
return rejectIncomingConnection('rejected', `Connection rejected: IP ${record.remoteIP} not allowed by default allowed list`);
|
|
343
|
-
}
|
|
344
|
-
}
|
|
345
|
-
// Save the initial SNI
|
|
346
|
-
if (serverName) {
|
|
347
|
-
record.lockedDomain = serverName;
|
|
348
|
-
}
|
|
349
|
-
// Set up the direct connection
|
|
350
|
-
this.setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, overridePort);
|
|
351
|
-
};
|
|
352
|
-
// --- PORT RANGE-BASED HANDLING ---
|
|
353
|
-
// Only apply port-based rules if the incoming port is within one of the global port ranges.
|
|
354
|
-
if (this.portRangeManager.isPortInGlobalRanges(localPort)) {
|
|
355
|
-
if (this.portRangeManager.shouldUseGlobalForwarding(localPort)) {
|
|
356
|
-
// Create a virtual domain config for global forwarding with security settings
|
|
357
|
-
const globalDomainConfig = {
|
|
358
|
-
domains: ['global'],
|
|
359
|
-
forwarding: {
|
|
360
|
-
type: 'http-only',
|
|
361
|
-
target: {
|
|
362
|
-
host: this.settings.targetIP,
|
|
363
|
-
port: this.settings.toPort
|
|
364
|
-
},
|
|
365
|
-
security: {
|
|
366
|
-
allowedIps: this.settings.defaultAllowedIPs || [],
|
|
367
|
-
blockedIps: this.settings.defaultBlockedIPs || []
|
|
368
|
-
}
|
|
369
|
-
},
|
|
370
|
-
};
|
|
371
|
-
// Use the same IP filtering mechanism as domain-specific configs
|
|
372
|
-
const ipRules = this.domainConfigManager.getEffectiveIPRules(globalDomainConfig);
|
|
373
|
-
if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
|
|
374
|
-
console.log(`[${connectionId}] Connection from ${record.remoteIP} rejected: IP ${record.remoteIP} not allowed in global default allowed list.`);
|
|
375
|
-
socket.end();
|
|
376
|
-
return;
|
|
377
|
-
}
|
|
378
|
-
if (this.settings.enableDetailedLogging) {
|
|
379
|
-
console.log(`[${connectionId}] Port-based connection from ${record.remoteIP} on port ${localPort} forwarded to global target IP ${this.settings.targetIP}.`);
|
|
380
|
-
}
|
|
381
|
-
setupConnection('', undefined, globalDomainConfig, localPort);
|
|
382
|
-
return;
|
|
383
|
-
}
|
|
384
|
-
else {
|
|
385
|
-
// Attempt to find a matching forced domain config based on the local port.
|
|
386
|
-
const forcedDomain = this.domainConfigManager.findDomainConfigForPort(localPort);
|
|
387
|
-
if (forcedDomain) {
|
|
388
|
-
// Get effective IP rules from the domain config's forwarding security settings
|
|
389
|
-
const ipRules = this.domainConfigManager.getEffectiveIPRules(forcedDomain);
|
|
390
|
-
if (!this.securityManager.isIPAuthorized(record.remoteIP, ipRules.allowedIPs, ipRules.blockedIPs)) {
|
|
391
|
-
console.log(`[${connectionId}] Connection from ${record.remoteIP} rejected: IP not allowed for domain ${forcedDomain.domains.join(', ')} on port ${localPort}.`);
|
|
392
|
-
socket.end();
|
|
393
|
-
return;
|
|
394
|
-
}
|
|
395
|
-
if (this.settings.enableDetailedLogging) {
|
|
396
|
-
console.log(`[${connectionId}] Port-based connection from ${record.remoteIP} on port ${localPort} matched domain ${forcedDomain.domains.join(', ')}.`);
|
|
397
|
-
}
|
|
398
|
-
setupConnection('', undefined, forcedDomain, localPort);
|
|
399
|
-
return;
|
|
400
|
-
}
|
|
401
|
-
// Fall through to SNI/default handling if no forced domain config is found.
|
|
402
|
-
}
|
|
403
|
-
}
|
|
404
|
-
// --- FALLBACK: SNI-BASED HANDLING (or default when SNI is disabled) ---
|
|
405
|
-
if (this.settings.sniEnabled) {
|
|
406
|
-
initialDataReceived = false;
|
|
407
|
-
socket.once('data', (chunk) => {
|
|
408
|
-
// Clear timeout immediately
|
|
409
|
-
if (initialTimeout) {
|
|
410
|
-
clearTimeout(initialTimeout);
|
|
411
|
-
initialTimeout = null;
|
|
412
|
-
}
|
|
413
|
-
initialDataReceived = true;
|
|
414
|
-
// Block non-TLS connections on port 443
|
|
415
|
-
if (!this.tlsManager.isTlsHandshake(chunk) && localPort === 443) {
|
|
416
|
-
console.log(`[${connectionId}] Non-TLS connection detected on port 443 in SNI handler. ` +
|
|
417
|
-
`Terminating connection - only TLS traffic is allowed on standard HTTPS port.`);
|
|
418
|
-
if (record.incomingTerminationReason === null) {
|
|
419
|
-
record.incomingTerminationReason = 'non_tls_blocked';
|
|
420
|
-
this.connectionManager.incrementTerminationStat('incoming', 'non_tls_blocked');
|
|
421
|
-
}
|
|
422
|
-
socket.end();
|
|
423
|
-
this.connectionManager.cleanupConnection(record, 'non_tls_blocked');
|
|
424
|
-
return;
|
|
425
|
-
}
|
|
426
|
-
// Try to extract SNI
|
|
427
|
-
let serverName = '';
|
|
428
|
-
if (this.tlsManager.isTlsHandshake(chunk)) {
|
|
429
|
-
record.isTLS = true;
|
|
430
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
431
|
-
console.log(`[${connectionId}] Extracting SNI from TLS handshake, ${chunk.length} bytes`);
|
|
432
|
-
}
|
|
433
|
-
// Create connection info object for SNI extraction
|
|
434
|
-
const connInfo = {
|
|
435
|
-
sourceIp: record.remoteIP,
|
|
436
|
-
sourcePort: socket.remotePort || 0,
|
|
437
|
-
destIp: socket.localAddress || '',
|
|
438
|
-
destPort: socket.localPort || 0,
|
|
439
|
-
};
|
|
440
|
-
// Extract SNI
|
|
441
|
-
serverName = this.tlsManager.extractSNI(chunk, connInfo) || '';
|
|
442
|
-
// If allowSessionTicket is false and this is a ClientHello with no SNI, terminate the connection
|
|
443
|
-
if (this.settings.allowSessionTicket === false &&
|
|
444
|
-
this.tlsManager.isClientHello(chunk) &&
|
|
445
|
-
!serverName) {
|
|
446
|
-
// Missing SNI: forward to NetworkProxy if available
|
|
447
|
-
const proxyInstance = this.networkProxyBridge.getNetworkProxy();
|
|
448
|
-
if (proxyInstance) {
|
|
449
|
-
if (this.settings.enableDetailedLogging) {
|
|
450
|
-
console.log(`[${connectionId}] No SNI in ClientHello; forwarding to NetworkProxy.`);
|
|
451
|
-
}
|
|
452
|
-
this.networkProxyBridge.forwardToNetworkProxy(connectionId, socket, record, chunk, undefined, (_reason) => {
|
|
453
|
-
// On proxy failure, send TLS unrecognized_name alert and cleanup
|
|
454
|
-
if (record.incomingTerminationReason === null) {
|
|
455
|
-
record.incomingTerminationReason = 'session_ticket_blocked_no_sni';
|
|
456
|
-
this.connectionManager.incrementTerminationStat('incoming', 'session_ticket_blocked_no_sni');
|
|
457
|
-
}
|
|
458
|
-
const alert = Buffer.from([0x15, 0x03, 0x03, 0x00, 0x02, 0x01, 0x70]);
|
|
459
|
-
try {
|
|
460
|
-
socket.cork();
|
|
461
|
-
socket.write(alert);
|
|
462
|
-
socket.uncork();
|
|
463
|
-
socket.end();
|
|
464
|
-
}
|
|
465
|
-
catch {
|
|
466
|
-
socket.end();
|
|
467
|
-
}
|
|
468
|
-
this.connectionManager.initiateCleanupOnce(record, 'session_ticket_blocked_no_sni');
|
|
469
|
-
});
|
|
470
|
-
return;
|
|
471
|
-
}
|
|
472
|
-
// Fallback: send TLS unrecognized_name alert and terminate
|
|
473
|
-
console.log(`[${connectionId}] No SNI detected and proxy unavailable; sending TLS alert.`);
|
|
474
|
-
if (record.incomingTerminationReason === null) {
|
|
475
|
-
record.incomingTerminationReason = 'session_ticket_blocked_no_sni';
|
|
476
|
-
this.connectionManager.incrementTerminationStat('incoming', 'session_ticket_blocked_no_sni');
|
|
477
|
-
}
|
|
478
|
-
const alert = Buffer.from([0x15, 0x03, 0x03, 0x00, 0x02, 0x01, 0x70]);
|
|
479
|
-
try {
|
|
480
|
-
socket.cork();
|
|
481
|
-
socket.write(alert);
|
|
482
|
-
socket.uncork();
|
|
483
|
-
socket.end();
|
|
484
|
-
}
|
|
485
|
-
catch {
|
|
486
|
-
socket.end();
|
|
487
|
-
}
|
|
488
|
-
this.connectionManager.cleanupConnection(record, 'session_ticket_blocked_no_sni');
|
|
489
|
-
return;
|
|
490
|
-
}
|
|
491
|
-
}
|
|
492
|
-
// Lock the connection to the negotiated SNI.
|
|
493
|
-
record.lockedDomain = serverName;
|
|
494
|
-
if (this.settings.enableDetailedLogging) {
|
|
495
|
-
console.log(`[${connectionId}] Received connection from ${record.remoteIP} with SNI: ${serverName || '(empty)'}`);
|
|
496
|
-
}
|
|
497
|
-
setupConnection(serverName, chunk);
|
|
498
|
-
});
|
|
499
|
-
}
|
|
500
|
-
else {
|
|
501
|
-
initialDataReceived = true;
|
|
502
|
-
record.hasReceivedInitialData = true;
|
|
503
|
-
// Create default security settings for non-SNI connections
|
|
504
|
-
const defaultSecurity = {
|
|
505
|
-
allowedIPs: this.settings.defaultAllowedIPs || [],
|
|
506
|
-
blockedIPs: this.settings.defaultBlockedIPs || []
|
|
507
|
-
};
|
|
508
|
-
if (defaultSecurity.allowedIPs.length > 0 &&
|
|
509
|
-
!this.securityManager.isIPAuthorized(record.remoteIP, defaultSecurity.allowedIPs, defaultSecurity.blockedIPs)) {
|
|
510
|
-
return rejectIncomingConnection('rejected', `Connection rejected: IP ${record.remoteIP} not allowed for non-SNI connection`);
|
|
511
|
-
}
|
|
512
|
-
setupConnection('');
|
|
513
|
-
}
|
|
514
|
-
}
|
|
515
|
-
/**
|
|
516
|
-
* Sets up a direct connection to the target
|
|
517
|
-
*/
|
|
518
|
-
setupDirectConnection(socket, record, domainConfig, serverName, initialChunk, overridePort) {
|
|
519
|
-
const connectionId = record.id;
|
|
520
|
-
// If we have a domain config, try to use a forwarding handler
|
|
521
|
-
if (domainConfig) {
|
|
522
|
-
try {
|
|
523
|
-
// Get the forwarding handler for this domain
|
|
524
|
-
const forwardingHandler = this.domainConfigManager.getForwardingHandler(domainConfig);
|
|
525
|
-
// Check the forwarding type to determine how to handle the connection
|
|
526
|
-
const forwardingType = this.domainConfigManager.getForwardingType(domainConfig);
|
|
527
|
-
// For TLS connections, handle differently based on forwarding type
|
|
528
|
-
if (record.isTLS) {
|
|
529
|
-
// For HTTP-only, we shouldn't get TLS connections
|
|
530
|
-
if (forwardingType === 'http-only') {
|
|
531
|
-
console.log(`[${connectionId}] Received TLS connection for HTTP-only domain ${serverName || 'unknown'}`);
|
|
532
|
-
socket.end();
|
|
533
|
-
this.connectionManager.initiateCleanupOnce(record, 'wrong_protocol');
|
|
534
|
-
return;
|
|
535
|
-
}
|
|
536
|
-
// For HTTPS passthrough, use the handler's connection handling
|
|
537
|
-
if (forwardingType === 'https-passthrough') {
|
|
538
|
-
// If there's initial data, process it first
|
|
539
|
-
if (initialChunk) {
|
|
540
|
-
record.bytesReceived += initialChunk.length;
|
|
541
|
-
}
|
|
542
|
-
// Let the handler take over
|
|
543
|
-
if (this.settings.enableDetailedLogging) {
|
|
544
|
-
console.log(`[${connectionId}] Using forwarding handler for ${forwardingType} connection to ${serverName || 'unknown'}`);
|
|
545
|
-
}
|
|
546
|
-
// Pass the connection to the handler
|
|
547
|
-
forwardingHandler.handleConnection(socket);
|
|
548
|
-
// Set metadata fields
|
|
549
|
-
record.usingNetworkProxy = false;
|
|
550
|
-
// Add connection information to record
|
|
551
|
-
if (serverName) {
|
|
552
|
-
record.lockedDomain = serverName;
|
|
553
|
-
}
|
|
554
|
-
return;
|
|
555
|
-
}
|
|
556
|
-
// For TLS termination types, we'll fall through to the legacy connection setup
|
|
557
|
-
// because NetworkProxy is used for termination
|
|
558
|
-
}
|
|
559
|
-
// For non-TLS connections, check if we support HTTP
|
|
560
|
-
else if (!record.isTLS && this.domainConfigManager.supportsHttp(domainConfig)) {
|
|
561
|
-
// For HTTP handling that the handler supports natively
|
|
562
|
-
if (forwardingType === 'http-only' ||
|
|
563
|
-
(forwardingType === 'https-terminate-to-http' || forwardingType === 'https-terminate-to-https')) {
|
|
564
|
-
// If there's redirect to HTTPS configured and this is a normal HTTP connection
|
|
565
|
-
if (this.domainConfigManager.shouldRedirectToHttps(domainConfig)) {
|
|
566
|
-
// We'll let the handler deal with the HTTP request and potential redirect
|
|
567
|
-
// Once an HTTP request arrives, it can redirect as needed
|
|
568
|
-
}
|
|
569
|
-
// Let the handler take over for HTTP handling
|
|
570
|
-
if (this.settings.enableDetailedLogging) {
|
|
571
|
-
console.log(`[${connectionId}] Using forwarding handler for HTTP connection to ${serverName || 'unknown'}`);
|
|
572
|
-
}
|
|
573
|
-
// Pass the connection to the handler
|
|
574
|
-
forwardingHandler.handleConnection(socket);
|
|
575
|
-
// Add connection information to record
|
|
576
|
-
if (serverName) {
|
|
577
|
-
record.lockedDomain = serverName;
|
|
578
|
-
}
|
|
579
|
-
return;
|
|
580
|
-
}
|
|
581
|
-
}
|
|
582
|
-
}
|
|
583
|
-
catch (err) {
|
|
584
|
-
console.log(`[${connectionId}] Error using forwarding handler: ${err}`);
|
|
585
|
-
// Fall through to legacy connection handling
|
|
586
|
-
}
|
|
587
|
-
}
|
|
588
|
-
// If we get here, we'll use legacy connection handling
|
|
589
|
-
// Determine target host
|
|
590
|
-
const targetHost = domainConfig
|
|
591
|
-
? this.domainConfigManager.getTargetIP(domainConfig)
|
|
592
|
-
: this.settings.targetIP;
|
|
593
|
-
// Determine target port - first try forwarding config, then fallback
|
|
594
|
-
const targetPort = domainConfig
|
|
595
|
-
? this.domainConfigManager.getTargetPort(domainConfig, overridePort !== undefined ? overridePort : this.settings.toPort)
|
|
596
|
-
: (overridePort !== undefined ? overridePort : this.settings.toPort);
|
|
597
|
-
// Setup connection options
|
|
598
|
-
const connectionOptions = {
|
|
599
|
-
host: targetHost,
|
|
600
|
-
port: targetPort,
|
|
601
|
-
};
|
|
602
|
-
// Preserve source IP if configured
|
|
603
|
-
if (this.settings.preserveSourceIP) {
|
|
604
|
-
connectionOptions.localAddress = record.remoteIP.replace('::ffff:', '');
|
|
605
|
-
}
|
|
606
|
-
// Create a safe queue for incoming data
|
|
607
|
-
const dataQueue = [];
|
|
608
|
-
let queueSize = 0;
|
|
609
|
-
let processingQueue = false;
|
|
610
|
-
let drainPending = false;
|
|
611
|
-
let pipingEstablished = false;
|
|
612
|
-
// Pause the incoming socket to prevent buffer overflows
|
|
613
|
-
socket.pause();
|
|
614
|
-
// Function to safely process the data queue without losing events
|
|
615
|
-
const processDataQueue = () => {
|
|
616
|
-
if (processingQueue || dataQueue.length === 0 || pipingEstablished)
|
|
617
|
-
return;
|
|
618
|
-
processingQueue = true;
|
|
619
|
-
try {
|
|
620
|
-
// Process all queued chunks with the current active handler
|
|
621
|
-
while (dataQueue.length > 0) {
|
|
622
|
-
const chunk = dataQueue.shift();
|
|
623
|
-
queueSize -= chunk.length;
|
|
624
|
-
// Once piping is established, we shouldn't get here,
|
|
625
|
-
// but just in case, pass to the outgoing socket directly
|
|
626
|
-
if (pipingEstablished && record.outgoing) {
|
|
627
|
-
record.outgoing.write(chunk);
|
|
628
|
-
continue;
|
|
629
|
-
}
|
|
630
|
-
// Track bytes received
|
|
631
|
-
record.bytesReceived += chunk.length;
|
|
632
|
-
// Check for TLS handshake
|
|
633
|
-
if (!record.isTLS && this.tlsManager.isTlsHandshake(chunk)) {
|
|
634
|
-
record.isTLS = true;
|
|
635
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
636
|
-
console.log(`[${connectionId}] TLS handshake detected in tempDataHandler, ${chunk.length} bytes`);
|
|
637
|
-
}
|
|
638
|
-
}
|
|
639
|
-
// Check if adding this chunk would exceed the buffer limit
|
|
640
|
-
const newSize = record.pendingDataSize + chunk.length;
|
|
641
|
-
if (this.settings.maxPendingDataSize && newSize > this.settings.maxPendingDataSize) {
|
|
642
|
-
console.log(`[${connectionId}] Buffer limit exceeded for connection from ${record.remoteIP}: ${newSize} bytes > ${this.settings.maxPendingDataSize} bytes`);
|
|
643
|
-
socket.end(); // Gracefully close the socket
|
|
644
|
-
this.connectionManager.initiateCleanupOnce(record, 'buffer_limit_exceeded');
|
|
645
|
-
return;
|
|
646
|
-
}
|
|
647
|
-
// Buffer the chunk and update the size counter
|
|
648
|
-
record.pendingData.push(Buffer.from(chunk));
|
|
649
|
-
record.pendingDataSize = newSize;
|
|
650
|
-
this.timeoutManager.updateActivity(record);
|
|
651
|
-
}
|
|
652
|
-
}
|
|
653
|
-
finally {
|
|
654
|
-
processingQueue = false;
|
|
655
|
-
// If there's a pending drain and we've processed everything,
|
|
656
|
-
// signal we're ready for more data if we haven't established piping yet
|
|
657
|
-
if (drainPending && dataQueue.length === 0 && !pipingEstablished) {
|
|
658
|
-
drainPending = false;
|
|
659
|
-
socket.resume();
|
|
660
|
-
}
|
|
661
|
-
}
|
|
662
|
-
};
|
|
663
|
-
// Unified data handler that safely queues incoming data
|
|
664
|
-
const safeDataHandler = (chunk) => {
|
|
665
|
-
// If piping is already established, just let the pipe handle it
|
|
666
|
-
if (pipingEstablished)
|
|
667
|
-
return;
|
|
668
|
-
// Add to our queue for orderly processing
|
|
669
|
-
dataQueue.push(Buffer.from(chunk)); // Make a copy to be safe
|
|
670
|
-
queueSize += chunk.length;
|
|
671
|
-
// If queue is getting large, pause socket until we catch up
|
|
672
|
-
if (this.settings.maxPendingDataSize && queueSize > this.settings.maxPendingDataSize * 0.8) {
|
|
673
|
-
socket.pause();
|
|
674
|
-
drainPending = true;
|
|
675
|
-
}
|
|
676
|
-
// Process the queue
|
|
677
|
-
processDataQueue();
|
|
678
|
-
};
|
|
679
|
-
// Add our safe data handler
|
|
680
|
-
socket.on('data', safeDataHandler);
|
|
681
|
-
// Add initial chunk to pending data if present
|
|
682
|
-
if (initialChunk) {
|
|
683
|
-
record.bytesReceived += initialChunk.length;
|
|
684
|
-
record.pendingData.push(Buffer.from(initialChunk));
|
|
685
|
-
record.pendingDataSize = initialChunk.length;
|
|
686
|
-
}
|
|
687
|
-
// Create the target socket but don't set up piping immediately
|
|
688
|
-
const targetSocket = plugins.net.connect(connectionOptions);
|
|
689
|
-
record.outgoing = targetSocket;
|
|
690
|
-
record.outgoingStartTime = Date.now();
|
|
691
|
-
// Apply socket optimizations
|
|
692
|
-
targetSocket.setNoDelay(this.settings.noDelay);
|
|
693
|
-
// Apply keep-alive settings to the outgoing connection as well
|
|
694
|
-
if (this.settings.keepAlive) {
|
|
695
|
-
targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
|
696
|
-
// Apply enhanced TCP keep-alive options if enabled
|
|
697
|
-
if (this.settings.enableKeepAliveProbes) {
|
|
698
|
-
try {
|
|
699
|
-
if ('setKeepAliveProbes' in targetSocket) {
|
|
700
|
-
targetSocket.setKeepAliveProbes(10);
|
|
701
|
-
}
|
|
702
|
-
if ('setKeepAliveInterval' in targetSocket) {
|
|
703
|
-
targetSocket.setKeepAliveInterval(1000);
|
|
704
|
-
}
|
|
705
|
-
}
|
|
706
|
-
catch (err) {
|
|
707
|
-
// Ignore errors - these are optional enhancements
|
|
708
|
-
if (this.settings.enableDetailedLogging) {
|
|
709
|
-
console.log(`[${connectionId}] Enhanced TCP keep-alive not supported for outgoing socket: ${err}`);
|
|
710
|
-
}
|
|
711
|
-
}
|
|
712
|
-
}
|
|
713
|
-
}
|
|
714
|
-
// Setup specific error handler for connection phase
|
|
715
|
-
targetSocket.once('error', (err) => {
|
|
716
|
-
// This handler runs only once during the initial connection phase
|
|
717
|
-
const code = err.code;
|
|
718
|
-
console.log(`[${connectionId}] Connection setup error to ${targetHost}:${connectionOptions.port}: ${err.message} (${code})`);
|
|
719
|
-
// Resume the incoming socket to prevent it from hanging
|
|
720
|
-
socket.resume();
|
|
721
|
-
if (code === 'ECONNREFUSED') {
|
|
722
|
-
console.log(`[${connectionId}] Target ${targetHost}:${connectionOptions.port} refused connection`);
|
|
723
|
-
}
|
|
724
|
-
else if (code === 'ETIMEDOUT') {
|
|
725
|
-
console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} timed out`);
|
|
726
|
-
}
|
|
727
|
-
else if (code === 'ECONNRESET') {
|
|
728
|
-
console.log(`[${connectionId}] Connection to ${targetHost}:${connectionOptions.port} was reset`);
|
|
729
|
-
}
|
|
730
|
-
else if (code === 'EHOSTUNREACH') {
|
|
731
|
-
console.log(`[${connectionId}] Host ${targetHost} is unreachable`);
|
|
732
|
-
}
|
|
733
|
-
// Clear any existing error handler after connection phase
|
|
734
|
-
targetSocket.removeAllListeners('error');
|
|
735
|
-
// Re-add the normal error handler for established connections
|
|
736
|
-
targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
|
|
737
|
-
if (record.outgoingTerminationReason === null) {
|
|
738
|
-
record.outgoingTerminationReason = 'connection_failed';
|
|
739
|
-
this.connectionManager.incrementTerminationStat('outgoing', 'connection_failed');
|
|
740
|
-
}
|
|
741
|
-
// If we have a forwarding handler for this domain, let it handle the error
|
|
742
|
-
if (domainConfig) {
|
|
743
|
-
try {
|
|
744
|
-
const forwardingHandler = this.domainConfigManager.getForwardingHandler(domainConfig);
|
|
745
|
-
forwardingHandler.emit('connection_error', {
|
|
746
|
-
socket,
|
|
747
|
-
error: err,
|
|
748
|
-
connectionId
|
|
749
|
-
});
|
|
750
|
-
}
|
|
751
|
-
catch (handlerErr) {
|
|
752
|
-
// If getting the handler fails, just log and continue with normal cleanup
|
|
753
|
-
console.log(`Error getting forwarding handler for error handling: ${handlerErr}`);
|
|
754
|
-
}
|
|
755
|
-
}
|
|
756
|
-
// Clean up the connection
|
|
757
|
-
this.connectionManager.initiateCleanupOnce(record, `connection_failed_${code}`);
|
|
758
|
-
});
|
|
759
|
-
// Setup close handler
|
|
760
|
-
targetSocket.on('close', this.connectionManager.handleClose('outgoing', record));
|
|
761
|
-
socket.on('close', this.connectionManager.handleClose('incoming', record));
|
|
762
|
-
// Handle timeouts with keep-alive awareness
|
|
763
|
-
socket.on('timeout', () => {
|
|
764
|
-
// For keep-alive connections, just log a warning instead of closing
|
|
765
|
-
if (record.hasKeepAlive) {
|
|
766
|
-
console.log(`[${connectionId}] Timeout event on incoming keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
|
|
767
|
-
return;
|
|
768
|
-
}
|
|
769
|
-
// For non-keep-alive connections, proceed with normal cleanup
|
|
770
|
-
console.log(`[${connectionId}] Timeout on incoming side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
|
771
|
-
if (record.incomingTerminationReason === null) {
|
|
772
|
-
record.incomingTerminationReason = 'timeout';
|
|
773
|
-
this.connectionManager.incrementTerminationStat('incoming', 'timeout');
|
|
774
|
-
}
|
|
775
|
-
this.connectionManager.initiateCleanupOnce(record, 'timeout_incoming');
|
|
776
|
-
});
|
|
777
|
-
targetSocket.on('timeout', () => {
|
|
778
|
-
// For keep-alive connections, just log a warning instead of closing
|
|
779
|
-
if (record.hasKeepAlive) {
|
|
780
|
-
console.log(`[${connectionId}] Timeout event on outgoing keep-alive connection from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}. Connection preserved.`);
|
|
781
|
-
return;
|
|
782
|
-
}
|
|
783
|
-
// For non-keep-alive connections, proceed with normal cleanup
|
|
784
|
-
console.log(`[${connectionId}] Timeout on outgoing side from ${record.remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
|
785
|
-
if (record.outgoingTerminationReason === null) {
|
|
786
|
-
record.outgoingTerminationReason = 'timeout';
|
|
787
|
-
this.connectionManager.incrementTerminationStat('outgoing', 'timeout');
|
|
788
|
-
}
|
|
789
|
-
this.connectionManager.initiateCleanupOnce(record, 'timeout_outgoing');
|
|
790
|
-
});
|
|
791
|
-
// Apply socket timeouts
|
|
792
|
-
this.timeoutManager.applySocketTimeouts(record);
|
|
793
|
-
// Track outgoing data for bytes counting
|
|
794
|
-
targetSocket.on('data', (chunk) => {
|
|
795
|
-
record.bytesSent += chunk.length;
|
|
796
|
-
this.timeoutManager.updateActivity(record);
|
|
797
|
-
});
|
|
798
|
-
// Wait for the outgoing connection to be ready before setting up piping
|
|
799
|
-
targetSocket.once('connect', () => {
|
|
800
|
-
// Clear the initial connection error handler
|
|
801
|
-
targetSocket.removeAllListeners('error');
|
|
802
|
-
// Add the normal error handler for established connections
|
|
803
|
-
targetSocket.on('error', this.connectionManager.handleError('outgoing', record));
|
|
804
|
-
// Process any remaining data in the queue before switching to piping
|
|
805
|
-
processDataQueue();
|
|
806
|
-
// Set up piping immediately
|
|
807
|
-
pipingEstablished = true;
|
|
808
|
-
// Flush all pending data to target
|
|
809
|
-
if (record.pendingData.length > 0) {
|
|
810
|
-
const combinedData = Buffer.concat(record.pendingData);
|
|
811
|
-
if (this.settings.enableDetailedLogging) {
|
|
812
|
-
console.log(`[${connectionId}] Forwarding ${combinedData.length} bytes of initial data to target`);
|
|
813
|
-
}
|
|
814
|
-
// Write pending data immediately
|
|
815
|
-
targetSocket.write(combinedData, (err) => {
|
|
816
|
-
if (err) {
|
|
817
|
-
console.log(`[${connectionId}] Error writing pending data to target: ${err.message}`);
|
|
818
|
-
return this.connectionManager.initiateCleanupOnce(record, 'write_error');
|
|
819
|
-
}
|
|
820
|
-
});
|
|
821
|
-
// Clear the buffer now that we've processed it
|
|
822
|
-
record.pendingData = [];
|
|
823
|
-
record.pendingDataSize = 0;
|
|
824
|
-
}
|
|
825
|
-
// Setup piping in both directions without any delays
|
|
826
|
-
socket.pipe(targetSocket);
|
|
827
|
-
targetSocket.pipe(socket);
|
|
828
|
-
// Resume the socket to ensure data flows
|
|
829
|
-
socket.resume();
|
|
830
|
-
// Process any data that might be queued in the interim
|
|
831
|
-
if (dataQueue.length > 0) {
|
|
832
|
-
// Write any remaining queued data directly to the target socket
|
|
833
|
-
for (const chunk of dataQueue) {
|
|
834
|
-
targetSocket.write(chunk);
|
|
835
|
-
}
|
|
836
|
-
// Clear the queue
|
|
837
|
-
dataQueue.length = 0;
|
|
838
|
-
queueSize = 0;
|
|
839
|
-
}
|
|
840
|
-
if (this.settings.enableDetailedLogging) {
|
|
841
|
-
console.log(`[${connectionId}] Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
|
842
|
-
`${serverName
|
|
843
|
-
? ` (SNI: ${serverName})`
|
|
844
|
-
: domainConfig
|
|
845
|
-
? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
|
|
846
|
-
: ''}` +
|
|
847
|
-
` TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}`);
|
|
848
|
-
}
|
|
849
|
-
else {
|
|
850
|
-
console.log(`Connection established: ${record.remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
|
851
|
-
`${serverName
|
|
852
|
-
? ` (SNI: ${serverName})`
|
|
853
|
-
: domainConfig
|
|
854
|
-
? ` (Port-based for domain: ${domainConfig.domains.join(', ')})`
|
|
855
|
-
: ''}`);
|
|
856
|
-
}
|
|
857
|
-
// Add the renegotiation handler for SNI validation
|
|
858
|
-
if (serverName) {
|
|
859
|
-
// Create connection info object for the existing connection
|
|
860
|
-
const connInfo = {
|
|
861
|
-
sourceIp: record.remoteIP,
|
|
862
|
-
sourcePort: record.incoming.remotePort || 0,
|
|
863
|
-
destIp: record.incoming.localAddress || '',
|
|
864
|
-
destPort: record.incoming.localPort || 0,
|
|
865
|
-
};
|
|
866
|
-
// Create a renegotiation handler function
|
|
867
|
-
const renegotiationHandler = this.tlsManager.createRenegotiationHandler(connectionId, serverName, connInfo, (connectionId, reason) => this.connectionManager.initiateCleanupOnce(record, reason));
|
|
868
|
-
// Store the handler in the connection record so we can remove it during cleanup
|
|
869
|
-
record.renegotiationHandler = renegotiationHandler;
|
|
870
|
-
// Add the handler to the socket
|
|
871
|
-
socket.on('data', renegotiationHandler);
|
|
872
|
-
if (this.settings.enableDetailedLogging) {
|
|
873
|
-
console.log(`[${connectionId}] TLS renegotiation handler installed for SNI domain: ${serverName}`);
|
|
874
|
-
if (this.settings.allowSessionTicket === false) {
|
|
875
|
-
console.log(`[${connectionId}] Session ticket usage is disabled. Connection will be reset on reconnection attempts.`);
|
|
876
|
-
}
|
|
877
|
-
}
|
|
878
|
-
}
|
|
879
|
-
// Set connection timeout
|
|
880
|
-
record.cleanupTimer = this.timeoutManager.setupConnectionTimeout(record, (record, reason) => {
|
|
881
|
-
console.log(`[${connectionId}] Connection from ${record.remoteIP} exceeded max lifetime, forcing cleanup.`);
|
|
882
|
-
this.connectionManager.initiateCleanupOnce(record, reason);
|
|
883
|
-
});
|
|
884
|
-
// Mark TLS handshake as complete for TLS connections
|
|
885
|
-
if (record.isTLS) {
|
|
886
|
-
record.tlsHandshakeComplete = true;
|
|
887
|
-
if (this.settings.enableTlsDebugLogging) {
|
|
888
|
-
console.log(`[${connectionId}] TLS handshake complete for connection from ${record.remoteIP}`);
|
|
889
|
-
}
|
|
890
|
-
}
|
|
891
|
-
});
|
|
892
|
-
}
|
|
893
|
-
}
|
|
894
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.pp.connectionhandler.js","sourceRoot":"","sources":["../../ts/smartproxy/classes.pp.connectionhandler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AAMzC,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AACtE,OAAO,EAAE,eAAe,EAAE,MAAM,iCAAiC,CAAC;AAClE,OAAO,EAAE,mBAAmB,EAAE,MAAM,qCAAqC,CAAC;AAC1E,OAAO,EAAE,UAAU,EAAE,MAAM,4BAA4B,CAAC;AACxD,OAAO,EAAE,kBAAkB,EAAE,MAAM,oCAAoC,CAAC;AACxE,OAAO,EAAE,cAAc,EAAE,MAAM,gCAAgC,CAAC;AAChE,OAAO,EAAE,gBAAgB,EAAE,MAAM,kCAAkC,CAAC;AAIpE;;GAEG;AACH,MAAM,OAAO,iBAAiB;IAC5B,YACU,QAA4B,EAC5B,iBAAoC,EACpC,eAAgC,EAChC,mBAAwC,EACxC,UAAsB,EACtB,kBAAsC,EACtC,cAA8B,EAC9B,gBAAkC;QAPlC,aAAQ,GAAR,QAAQ,CAAoB;QAC5B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;QAChC,wBAAmB,GAAnB,mBAAmB,CAAqB;QACxC,eAAU,GAAV,UAAU,CAAY;QACtB,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,mBAAc,GAAd,cAAc,CAAgB;QAC9B,qBAAgB,GAAhB,gBAAgB,CAAkB;IACzC,CAAC;IAEJ;;OAEG;IACI,gBAAgB,CAAC,MAA0B;QAChD,MAAM,QAAQ,GAAG,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,IAAI,CAAC,CAAC;QAExC,wDAAwD;QACxD,MAAM,YAAY,GAAG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QAC/D,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,OAAO,CAAC,GAAG,CAAC,4BAA4B,QAAQ,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC;YAC5E,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,MAAM,CAAC,OAAO,EAAE,CAAC;YACjB,OAAO;QACT,CAAC;QAED,iCAAiC;QACjC,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC/D,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,6BAA6B;QAC7B,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAEzC,uCAAuC;QACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAC/D,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;YAE3B,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,uDAAuD;oBACvD,IAAI,oBAAoB,IAAI,MAAM,EAAE,CAAC;wBAClC,MAAc,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBACzC,CAAC;oBACD,IAAI,sBAAsB,IAAI,MAAM,EAAE,CAAC;wBACpC,MAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBAC7C,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,GAAG,EAAE,CAAC,CAAC;oBAC1F,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yBAAyB,QAAQ,YAAY,SAAS,IAAI;gBACxE,eAAe,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,IAAI;gBAC/D,uBAAuB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CACvE,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CACT,uBAAuB,QAAQ,YAAY,SAAS,yBAAyB,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,CAC3H,CAAC;QACJ,CAAC;QAED,wEAAwE;QACxE,IAAI,IAAI,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,SAAS,CAAC,EAAE,CAAC;YAC3D,IAAI,CAAC,4BAA4B,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,CAAC;YACN,6DAA6D;YAC7D,IAAI,CAAC,wBAAwB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAChD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,4BAA4B,CAClC,MAA0B,EAC1B,MAAyB;QAEzB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAEhC,4CAA4C;QAC5C,IAAI,cAAc,GAA0B,UAAU,CAAC,GAAG,EAAE;YAC1D,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,MAAM,CAAC,QAAQ,EAAE,CACxH,CAAC;gBAEF,sDAAsD;gBACtD,UAAU,CAAC,GAAG,EAAE;oBACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;wBACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;wBAC/E,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;4BACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;wBACjF,CAAC;wBACD,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBACtE,CAAC;gBACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;YACtC,CAAC;QACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;QAEtC,mDAAmD;QACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;YACzB,cAAc,CAAC,KAAK,EAAE,CAAC;QACzB,CAAC;QAED,uBAAuB;QACvB,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,uEAAuE;QACvE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACpC,sDAAsD;YACtD,IAAI,cAAc,EAAE,CAAC;gBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;gBAC7B,cAAc,GAAG,IAAI,CAAC;YACxB,CAAC;YAED,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,wCAAwC;YACxC,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;YACnC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;gBAChE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C;oBAC3D,8EAA8E,CACjF,CAAC;gBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oBAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;oBACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;gBACjF,CAAC;gBACD,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;gBACpE,OAAO;YACT,CAAC;YAED,2CAA2C;YAC3C,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC1C,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,+EAA+E;gBAC/E,IAAI,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;oBACzC,4CAA4C;oBAC5C,MAAM,QAAQ,GAAG;wBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;wBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;wBACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;qBAChC,CAAC;oBAEF,0DAA0D;oBAC1D,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;oBAE/D,6EAA6E;oBAC7E,kFAAkF;oBAClF,IAAI,UAAU,EAAE,CAAC;wBACf,kDAAkD;wBAClD,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC;wBAC3E,MAAM,CAAC,YAAY,GAAG,YAAY,CAAC;wBACnC,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;wBAEjC,4DAA4D;wBAC5D,IAAI,YAAY,EAAE,CAAC;4BACjB,IAAI,CAAC;gCACH,0CAA0C;gCAC1C,MAAM,cAAc,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;gCAEhF,8CAA8C;gCAC9C,IAAI,cAAc,KAAK,yBAAyB;oCAC5C,cAAc,KAAK,0BAA0B,EAAE,CAAC;oCAClD,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;oCAEpF,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4BAA4B,cAAc,SAAS,UAAU,YAAY,gBAAgB,EAAE,CAC5G,CAAC;oCACJ,CAAC;oCAED,oDAAoD;oCACpD,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,KAAK,EACL,gBAAgB,EAChB,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;oCACF,OAAO;gCACT,CAAC;gCAED,6DAA6D;gCAC7D,IAAI,cAAc,KAAK,mBAAmB,EAAE,CAAC;oCAC3C,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;oCAE5E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qDAAqD,UAAU,EAAE,CAClF,CAAC;oCACJ,CAAC;oCAED,0CAA0C;oCAC1C,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;oCAEjC,OAAO;gCACT,CAAC;gCAED,kDAAkD;gCAClD,IAAI,cAAc,KAAK,WAAW,EAAE,CAAC;oCACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,UAAU,EAAE,CAAC,CAAC;oCAC5F,MAAM,CAAC,GAAG,EAAE,CAAC;oCACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;oCACnE,OAAO;gCACT,CAAC;4BACH,CAAC;4BAAC,OAAO,GAAG,EAAE,CAAC;gCACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;gCACxE,gDAAgD;4BAClD,CAAC;wBACH,CAAC;oBACH,CAAC;yBAAM,IACL,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK;wBAC1C,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EACnC,CAAC;wBACD,4EAA4E;wBAC5E,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,uEAAuE,CACxF,CAAC;oBACJ,CAAC;gBACH,CAAC;gBAED,oEAAoE;gBACpE,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,KAAK,EACL,SAAS,EACT,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,mCAAmC;gBACnC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6CAA6C,MAAM,CAAC,SAAS,EAAE,CAChF,CAAC;gBAEF,iDAAiD;gBACjD,MAAM,qBAAqB,GAAG,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;gBAEjG,IAAI,qBAAqB,EAAE,CAAC;oBAC1B,IAAI,CAAC;wBACH,gEAAgE;wBAChE,IAAI,IAAI,CAAC,mBAAmB,CAAC,YAAY,CAAC,qBAAqB,CAAC,EAAE,CAAC;4BACjE,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,qBAAqB,CAAC,CAAC;4BAErF,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6DAA6D,MAAM,CAAC,SAAS,EAAE,CAChG,CAAC;4BACJ,CAAC;4BAED,0CAA0C;4BAC1C,OAAO,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;4BAEjC,OAAO;wBACT,CAAC;oBACH,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,8CAA8C,GAAG,EAAE,CAAC,CAAC;wBACjF,oCAAoC;oBACtC,CAAC;gBACH,CAAC;gBAED,2CAA2C;gBAC3C,IAAI,CAAC,qBAAqB,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,KAAK,CAAC,CAAC;YAC1E,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,wBAAwB,CAAC,MAA0B,EAAE,MAAyB;QACpF,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QAEnC,2CAA2C;QAC3C,MAAM,wBAAwB,GAAG,CAAC,MAAc,EAAE,UAAkB,EAAE,EAAE;YACtE,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,KAAK,UAAU,EAAE,CAAC,CAAC;YAC/C,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,MAAM,CAAC;gBAC1C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;YACtE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC3D,CAAC,CAAC;QAEF,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAEhC,gDAAgD;QAChD,IAAI,cAAc,GAA0B,IAAI,CAAC;QACjD,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;YAC7B,cAAc,GAAG,UAAU,CAAC,GAAG,EAAE;gBAC/B,IAAI,CAAC,mBAAmB,EAAE,CAAC;oBACzB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,2BAA2B,IAAI,CAAC,QAAQ,CAAC,kBAAkB,2BAA2B,MAAM,CAAC,QAAQ,EAAE,CACxH,CAAC;oBAEF,sDAAsD;oBACtD,UAAU,CAAC,GAAG,EAAE;wBACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;4BACzB,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,iDAAiD,CAAC,CAAC;4BAC/E,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gCAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;gCACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;4BACjF,CAAC;4BACD,MAAM,CAAC,GAAG,EAAE,CAAC;4BACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;wBACtE,CAAC;oBACH,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,yBAAyB;gBACtC,CAAC;YACH,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;YAEtC,mDAAmD;YACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;gBACzB,cAAc,CAAC,KAAK,EAAE,CAAC;YACzB,CAAC;QACH,CAAC;aAAM,CAAC;YACN,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;QACvC,CAAC;QAED,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,gCAAgC;QAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YAClC,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;YACrC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;YAE3C,qDAAqD;YACrD,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC3D,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,iCAAiC,MAAM,CAAC,QAAQ,KAAK,KAAK,CAAC,MAAM,QAAQ,CAC1F,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;QAEH;;WAEG;QACH,MAAM,eAAe,GAAG,CACtB,UAAkB,EAClB,YAAqB,EACrB,YAA4B,EAC5B,YAAqB,EACrB,EAAE;YACF,sDAAsD;YACtD,IAAI,cAAc,EAAE,CAAC;gBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;gBAC7B,cAAc,GAAG,IAAI,CAAC;YACxB,CAAC;YAED,wCAAwC;YACxC,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,2CAA2C;YAC3C,IAAI,YAAY,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,YAAY,CAAC,EAAE,CAAC;gBACjE,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,sCAAsC,YAAY,CAAC,MAAM,QAAQ,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,+FAA+F;YAC/F,MAAM,YAAY,GAAG,YAAY;gBAC/B,CAAC,CAAC,YAAY;gBACd,CAAC,CAAC,UAAU;oBACZ,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,UAAU,CAAC;oBACvD,CAAC,CAAC,SAAS,CAAC;YAEd,0CAA0C;YAC1C,MAAM,CAAC,YAAY,GAAG,YAAY,CAAC;YAEnC,yEAAyE;YACzE,IACE,YAAY;gBACZ,IAAI,CAAC,mBAAmB,CAAC,qBAAqB,CAAC,YAAY,CAAC;gBAC5D,IAAI,CAAC,kBAAkB,CAAC,eAAe,EAAE,EACzC,CAAC;gBACD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,YAAY,UAAU,oCAAoC,CAAC,CAAC;gBAC1F,CAAC;gBAED,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;gBAEpF,IAAI,YAAY,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjC,kEAAkE;oBAClE,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAY,EACZ,gBAAgB,EAChB,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACvE,CAAC;oBACF,OAAO,CAAC,+BAA+B;gBACzC,CAAC;YACH,CAAC;YAED,gBAAgB;YAChB,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;gBAE3E,6CAA6C;gBAC7C,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,UAAU,CACnB,EACD,CAAC;oBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BACE,MAAM,CAAC,QACT,2BAA2B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAC7D,CAAC;gBACJ,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzF,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,IAAI,CAAC,QAAQ,CAAC,iBAAiB,EAC/B,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE,CACtC,EACD,CAAC;oBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,MAAM,CAAC,QAAQ,sCAAsC,CACjF,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,uBAAuB;YACvB,IAAI,UAAU,EAAE,CAAC;gBACf,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;YACnC,CAAC;YAED,+BAA+B;YAC/B,IAAI,CAAC,qBAAqB,CACxB,MAAM,EACN,MAAM,EACN,YAAY,EACZ,UAAU,EACV,YAAY,EACZ,YAAY,CACb,CAAC;QACJ,CAAC,CAAC;QAEF,oCAAoC;QACpC,4FAA4F;QAC5F,IAAI,IAAI,CAAC,gBAAgB,CAAC,oBAAoB,CAAC,SAAS,CAAC,EAAE,CAAC;YAC1D,IAAI,IAAI,CAAC,gBAAgB,CAAC,yBAAyB,CAAC,SAAS,CAAC,EAAE,CAAC;gBAC/D,8EAA8E;gBAC9E,MAAM,kBAAkB,GAAG;oBACzB,OAAO,EAAE,CAAC,QAAQ,CAAC;oBACnB,UAAU,EAAE;wBACV,IAAI,EAAE,WAA6B;wBACnC,MAAM,EAAE;4BACN,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAS;4BAC7B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM;yBAC3B;wBACD,QAAQ,EAAE;4BACR,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;4BACjD,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;yBAClD;qBACF;iBACF,CAAC;gBAEF,iEAAiE;gBACjE,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,kBAAkB,CAAC,CAAC;gBAEjF,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,UAAU,CACnB,EACD,CAAC;oBACD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,MAAM,CAAC,QAAQ,iBAAiB,MAAM,CAAC,QAAQ,8CAA8C,CACnI,CAAC;oBACF,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,OAAO;gBACT,CAAC;gBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCAAgC,MAAM,CAAC,QAAQ,YAAY,SAAS,kCAAkC,IAAI,CAAC,QAAQ,CAAC,QAAQ,GAAG,CAChJ,CAAC;gBACJ,CAAC;gBAED,eAAe,CAAC,EAAE,EAAE,SAAS,EAAE,kBAAkB,EAAE,SAAS,CAAC,CAAC;gBAC9D,OAAO;YACT,CAAC;iBAAM,CAAC;gBACN,2EAA2E;gBAC3E,MAAM,YAAY,GAAG,IAAI,CAAC,mBAAmB,CAAC,uBAAuB,CAAC,SAAS,CAAC,CAAC;gBAEjF,IAAI,YAAY,EAAE,CAAC;oBACjB,+EAA+E;oBAC/E,MAAM,OAAO,GAAG,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;oBAE3E,IACE,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,OAAO,CAAC,UAAU,EAClB,OAAO,CAAC,UAAU,CACnB,EACD,CAAC;wBACD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBACd,MAAM,CAAC,QACT,wCAAwC,YAAY,CAAC,OAAO,CAAC,IAAI,CAC/D,IAAI,CACL,YAAY,SAAS,GAAG,CAC1B,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,OAAO;oBACT,CAAC;oBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gCACd,MAAM,CAAC,QACT,YAAY,SAAS,mBAAmB,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAC3E,CAAC;oBACJ,CAAC;oBAED,eAAe,CAAC,EAAE,EAAE,SAAS,EAAE,YAAY,EAAE,SAAS,CAAC,CAAC;oBACxD,OAAO;gBACT,CAAC;gBACD,4EAA4E;YAC9E,CAAC;QACH,CAAC;QAED,yEAAyE;QACzE,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,CAAC;YAC7B,mBAAmB,GAAG,KAAK,CAAC;YAE5B,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;gBACpC,4BAA4B;gBAC5B,IAAI,cAAc,EAAE,CAAC;oBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;oBAC7B,cAAc,GAAG,IAAI,CAAC;gBACxB,CAAC;gBAED,mBAAmB,GAAG,IAAI,CAAC;gBAE3B,wCAAwC;gBACxC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;oBAChE,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D;wBAC1E,8EAA8E,CACjF,CAAC;oBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;wBAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;wBACrD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;oBACjF,CAAC;oBACD,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBACpE,OAAO;gBACT,CAAC;gBAED,qBAAqB;gBACrB,IAAI,UAAU,GAAG,EAAE,CAAC;gBAEpB,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;oBAC1C,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;oBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wCAAwC,KAAK,CAAC,MAAM,QAAQ,CAC7E,CAAC;oBACJ,CAAC;oBAED,mDAAmD;oBACnD,MAAM,QAAQ,GAAG;wBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;wBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;wBACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;qBAChC,CAAC;oBAEF,cAAc;oBACd,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,KAAK,EAAE,QAAQ,CAAC,IAAI,EAAE,CAAC;oBAE/D,iGAAiG;oBACjG,IACE,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK;wBAC1C,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,CAAC;wBACpC,CAAC,UAAU,EACX,CAAC;wBACD,oDAAoD;wBACpD,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;wBAChE,IAAI,aAAa,EAAE,CAAC;4BAClB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gCACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,sDAAsD,CACvE,CAAC;4BACJ,CAAC;4BACH,IAAI,CAAC,kBAAkB,CAAC,qBAAqB,CAC3C,YAAY,EACZ,MAAM,EACN,MAAM,EACN,KAAK,EACL,SAAS,EACT,CAAC,OAAO,EAAE,EAAE;gCACV,iEAAiE;gCACjE,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oCAC9C,MAAM,CAAC,yBAAyB,GAAG,+BAA+B,CAAC;oCACnE,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAC7C,UAAU,EACV,+BAA+B,CAChC,CAAC;gCACJ,CAAC;gCACD,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;gCACtE,IAAI,CAAC;oCAAC,MAAM,CAAC,IAAI,EAAE,CAAC;oCAAC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;oCAAC,MAAM,CAAC,MAAM,EAAE,CAAC;oCAAC,MAAM,CAAC,GAAG,EAAE,CAAC;gCAAC,CAAC;gCAC1E,MAAM,CAAC;oCAAC,MAAM,CAAC,GAAG,EAAE,CAAC;gCAAC,CAAC;gCACvB,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;4BACtF,CAAC,CACF,CAAC;4BACA,OAAO;wBACT,CAAC;wBACD,2DAA2D;wBAC3D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6DAA6D,CAC9E,CAAC;wBACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,+BAA+B,CAAC;4BACnE,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAC7C,UAAU,EACV,+BAA+B,CAChC,CAAC;wBACJ,CAAC;wBACD,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;wBACtE,IAAI,CAAC;4BAAC,MAAM,CAAC,IAAI,EAAE,CAAC;4BAAC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;4BAAC,MAAM,CAAC,MAAM,EAAE,CAAC;4BAAC,MAAM,CAAC,GAAG,EAAE,CAAC;wBAAC,CAAC;wBAC1E,MAAM,CAAC;4BAAC,MAAM,CAAC,GAAG,EAAE,CAAC;wBAAC,CAAC;wBACvB,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;wBAClF,OAAO;oBACT,CAAC;gBACH,CAAC;gBAED,6CAA6C;gBAC7C,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;gBAEjC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,8BAA8B,MAAM,CAAC,QAAQ,cAC3D,UAAU,IAAI,SAChB,EAAE,CACH,CAAC;gBACJ,CAAC;gBAED,eAAe,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,2DAA2D;YAC3D,MAAM,eAAe,GAAG;gBACtB,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;gBACjD,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB,IAAI,EAAE;aAClD,CAAC;YAEF,IAAI,eAAe,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC;gBACrC,CAAC,IAAI,CAAC,eAAe,CAAC,cAAc,CAClC,MAAM,CAAC,QAAQ,EACf,eAAe,CAAC,UAAU,EAC1B,eAAe,CAAC,UAAU,CAC3B,EACH,CAAC;gBACD,OAAO,wBAAwB,CAC7B,UAAU,EACV,2BAA2B,MAAM,CAAC,QAAQ,qCAAqC,CAChF,CAAC;YACJ,CAAC;YAED,eAAe,CAAC,EAAE,CAAC,CAAC;QACtB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,qBAAqB,CAC3B,MAA0B,EAC1B,MAAyB,EACzB,YAA4B,EAC5B,UAAmB,EACnB,YAAqB,EACrB,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,8DAA8D;QAC9D,IAAI,YAAY,EAAE,CAAC;YACjB,IAAI,CAAC;gBACH,6CAA6C;gBAC7C,MAAM,iBAAiB,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;gBAEtF,sEAAsE;gBACtE,MAAM,cAAc,GAAG,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;gBAEhF,mEAAmE;gBACnE,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,kDAAkD;oBAClD,IAAI,cAAc,KAAK,WAAW,EAAE,CAAC;wBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kDAAkD,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;wBACzG,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;wBACrE,OAAO;oBACT,CAAC;oBAED,+DAA+D;oBAC/D,IAAI,cAAc,KAAK,mBAAmB,EAAE,CAAC;wBAC3C,4CAA4C;wBAC5C,IAAI,YAAY,EAAE,CAAC;4BACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;wBAC9C,CAAC;wBAED,4BAA4B;wBAC5B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,cAAc,kBAAkB,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;wBAC3H,CAAC;wBAED,qCAAqC;wBACrC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;wBAE3C,sBAAsB;wBACtB,MAAM,CAAC,iBAAiB,GAAG,KAAK,CAAC;wBAEjC,uCAAuC;wBACvC,IAAI,UAAU,EAAE,CAAC;4BACf,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;wBACnC,CAAC;wBAED,OAAO;oBACT,CAAC;oBAED,+EAA+E;oBAC/E,+CAA+C;gBACjD,CAAC;gBACD,oDAAoD;qBAC/C,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,mBAAmB,CAAC,YAAY,CAAC,YAAY,CAAC,EAAE,CAAC;oBAC9E,uDAAuD;oBACvD,IAAI,cAAc,KAAK,WAAW;wBAC9B,CAAC,cAAc,KAAK,yBAAyB,IAAI,cAAc,KAAK,0BAA0B,CAAC,EAAE,CAAC;wBAEpG,+EAA+E;wBAC/E,IAAI,IAAI,CAAC,mBAAmB,CAAC,qBAAqB,CAAC,YAAY,CAAC,EAAE,CAAC;4BACjE,0EAA0E;4BAC1E,0DAA0D;wBAC5D,CAAC;wBAED,8CAA8C;wBAC9C,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qDAAqD,UAAU,IAAI,SAAS,EAAE,CAAC,CAAC;wBAC9G,CAAC;wBAED,qCAAqC;wBACrC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;wBAE3C,uCAAuC;wBACvC,IAAI,UAAU,EAAE,CAAC;4BACf,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;wBACnC,CAAC;wBAED,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,qCAAqC,GAAG,EAAE,CAAC,CAAC;gBACxE,6CAA6C;YAC/C,CAAC;QACH,CAAC;QAED,uDAAuD;QAEvD,wBAAwB;QACxB,MAAM,UAAU,GAAG,YAAY;YAC7B,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,YAAY,CAAC;YACpD,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAS,CAAC;QAE5B,qEAAqE;QACrE,MAAM,UAAU,GAAG,YAAY;YAC7B,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,CAAC,YAAY,EAAE,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC;YACxH,CAAC,CAAC,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAEvE,2BAA2B;QAC3B,MAAM,iBAAiB,GAA+B;YACpD,IAAI,EAAE,UAAU;YAChB,IAAI,EAAE,UAAU;SACjB,CAAC;QAEF,mCAAmC;QACnC,IAAI,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACnC,iBAAiB,CAAC,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,wCAAwC;QACxC,MAAM,SAAS,GAAa,EAAE,CAAC;QAC/B,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,IAAI,eAAe,GAAG,KAAK,CAAC;QAC5B,IAAI,YAAY,GAAG,KAAK,CAAC;QACzB,IAAI,iBAAiB,GAAG,KAAK,CAAC;QAE9B,wDAAwD;QACxD,MAAM,CAAC,KAAK,EAAE,CAAC;QAEf,kEAAkE;QAClE,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,IAAI,eAAe,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,iBAAiB;gBAAE,OAAO;YAE3E,eAAe,GAAG,IAAI,CAAC;YAEvB,IAAI,CAAC;gBACH,4DAA4D;gBAC5D,OAAO,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,EAAG,CAAC;oBACjC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;oBAE1B,qDAAqD;oBACrD,yDAAyD;oBACzD,IAAI,iBAAiB,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;wBACzC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBAC7B,SAAS;oBACX,CAAC;oBAED,uBAAuB;oBACvB,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;oBAErC,0BAA0B;oBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;wBAC3D,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;wBAEpB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,KAAK,CAAC,MAAM,QAAQ,CACrF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,2DAA2D;oBAC3D,MAAM,OAAO,GAAG,MAAM,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC;oBAEtD,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;wBACnF,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+CAA+C,MAAM,CAAC,QAAQ,KAAK,OAAO,YAAY,IAAI,CAAC,QAAQ,CAAC,kBAAkB,QAAQ,CAC/I,CAAC;wBACF,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,8BAA8B;wBAC5C,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,uBAAuB,CAAC,CAAC;wBAC5E,OAAO;oBACT,CAAC;oBAED,+CAA+C;oBAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;oBAC5C,MAAM,CAAC,eAAe,GAAG,OAAO,CAAC;oBACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBAC7C,CAAC;YACH,CAAC;oBAAS,CAAC;gBACT,eAAe,GAAG,KAAK,CAAC;gBAExB,6DAA6D;gBAC7D,wEAAwE;gBACxE,IAAI,YAAY,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;oBACjE,YAAY,GAAG,KAAK,CAAC;oBACrB,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClB,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF,wDAAwD;QACxD,MAAM,eAAe,GAAG,CAAC,KAAa,EAAE,EAAE;YACxC,gEAAgE;YAChE,IAAI,iBAAiB;gBAAE,OAAO;YAE9B,0CAA0C;YAC1C,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,yBAAyB;YAC7D,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YAE1B,4DAA4D;YAC5D,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,IAAI,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,GAAG,GAAG,EAAE,CAAC;gBAC3F,MAAM,CAAC,KAAK,EAAE,CAAC;gBACf,YAAY,GAAG,IAAI,CAAC;YACtB,CAAC;YAED,oBAAoB;YACpB,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC;QAEF,4BAA4B;QAC5B,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAEnC,+CAA+C;QAC/C,IAAI,YAAY,EAAE,CAAC;YACjB,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;YACnD,MAAM,CAAC,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC;QAC/C,CAAC;QAED,+DAA+D;QAC/D,MAAM,YAAY,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;QAC5D,MAAM,CAAC,QAAQ,GAAG,YAAY,CAAC;QAC/B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEtC,6BAA6B;QAC7B,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE/C,+DAA+D;QAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,YAAY,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAErE,mDAAmD;YACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,IAAI,CAAC;oBACH,IAAI,oBAAoB,IAAI,YAAY,EAAE,CAAC;wBACxC,YAAoB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBAC/C,CAAC;oBACD,IAAI,sBAAsB,IAAI,YAAY,EAAE,CAAC;wBAC1C,YAAoB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACnD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gEAAgE,GAAG,EAAE,CACtF,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,YAAY,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YACjC,kEAAkE;YAClE,MAAM,IAAI,GAAI,GAAW,CAAC,IAAI,CAAC;YAC/B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,+BAA+B,UAAU,IAAI,iBAAiB,CAAC,IAAI,KAAK,GAAG,CAAC,OAAO,KAAK,IAAI,GAAG,CAChH,CAAC;YAEF,wDAAwD;YACxD,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC5B,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,YAAY,UAAU,IAAI,iBAAiB,CAAC,IAAI,qBAAqB,CACtF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,WAAW,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,YAAY,EAAE,CAAC;gBACjC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mBAAmB,UAAU,IAAI,iBAAiB,CAAC,IAAI,YAAY,CACpF,CAAC;YACJ,CAAC;iBAAM,IAAI,IAAI,KAAK,cAAc,EAAE,CAAC;gBACnC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,UAAU,UAAU,iBAAiB,CAAC,CAAC;YACrE,CAAC;YAED,0DAA0D;YAC1D,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,8DAA8D;YAC9D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,mBAAmB,CAAC;gBACvD,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,mBAAmB,CAAC,CAAC;YACnF,CAAC;YAED,2EAA2E;YAC3E,IAAI,YAAY,EAAE,CAAC;gBACjB,IAAI,CAAC;oBACH,MAAM,iBAAiB,GAAG,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,YAAY,CAAC,CAAC;oBACtF,iBAAiB,CAAC,IAAI,CAAC,kBAAkB,EAAE;wBACzC,MAAM;wBACN,KAAK,EAAE,GAAG;wBACV,YAAY;qBACb,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,UAAU,EAAE,CAAC;oBACpB,0EAA0E;oBAC1E,OAAO,CAAC,GAAG,CAAC,wDAAwD,UAAU,EAAE,CAAC,CAAC;gBACpF,CAAC;YACH,CAAC;YAED,0BAA0B;YAC1B,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,qBAAqB,IAAI,EAAE,CAAC,CAAC;QAClF,CAAC,CAAC,CAAC;QAEH,sBAAsB;QACtB,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QACjF,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAE3E,4CAA4C;QAC5C,MAAM,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YACxB,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,YAAY,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC9B,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,0DACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CACxB,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CACvC,yBAAyB,CAC3B,CAAC;gBACF,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,mCACd,MAAM,CAAC,QACT,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,CACrE,CAAC;YACF,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACzE,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,wBAAwB;QACxB,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QAEhD,yCAAyC;QACzC,YAAY,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAa,EAAE,EAAE;YACxC,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;YACjC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QAEH,wEAAwE;QACxE,YAAY,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;YAChC,6CAA6C;YAC7C,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;YAEzC,2DAA2D;YAC3D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;YAEjF,qEAAqE;YACrE,gBAAgB,EAAE,CAAC;YAEnB,4BAA4B;YAC5B,iBAAiB,GAAG,IAAI,CAAC;YAEzB,mCAAmC;YACnC,IAAI,MAAM,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClC,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;gBAEvD,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gBAAgB,YAAY,CAAC,MAAM,kCAAkC,CACtF,CAAC;gBACJ,CAAC;gBAED,iCAAiC;gBACjC,YAAY,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC,GAAG,EAAE,EAAE;oBACvC,IAAI,GAAG,EAAE,CAAC;wBACR,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,2CAA2C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;wBACtF,OAAO,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;oBAC3E,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,+CAA+C;gBAC/C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;gBACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;YAC7B,CAAC;YAED,qDAAqD;YACrD,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YAC1B,YAAY,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAE1B,yCAAyC;YACzC,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,uDAAuD;YACvD,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACzB,gEAAgE;gBAChE,KAAK,MAAM,KAAK,IAAI,SAAS,EAAE,CAAC;oBAC9B,YAAY,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;gBAC5B,CAAC;gBACD,kBAAkB;gBAClB,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;gBACrB,SAAS,GAAG,CAAC,CAAC;YAChB,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,6BAA6B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACvG,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE;oBACF,SAAS,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,iBAClC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAChC,EAAE,CACL,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CACT,2BAA2B,MAAM,CAAC,QAAQ,OAAO,UAAU,IAAI,iBAAiB,CAAC,IAAI,EAAE;oBACrF,GACE,UAAU;wBACR,CAAC,CAAC,UAAU,UAAU,GAAG;wBACzB,CAAC,CAAC,YAAY;4BACd,CAAC,CAAC,4BAA4B,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;4BAChE,CAAC,CAAC,EACN,EAAE,CACL,CAAC;YACJ,CAAC;YAED,mDAAmD;YACnD,IAAI,UAAU,EAAE,CAAC;gBACf,4DAA4D;gBAC5D,MAAM,QAAQ,GAAG;oBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC;oBAC3C,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,YAAY,IAAI,EAAE;oBAC1C,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,SAAS,IAAI,CAAC;iBACzC,CAAC;gBAEF,0CAA0C;gBAC1C,MAAM,oBAAoB,GAAG,IAAI,CAAC,UAAU,CAAC,0BAA0B,CACrE,YAAY,EACZ,UAAU,EACV,QAAQ,EACR,CAAC,YAAY,EAAE,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CACrF,CAAC;gBAEF,gFAAgF;gBAChF,MAAM,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;gBAEnD,gCAAgC;gBAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAExC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,yDAAyD,UAAU,EAAE,CACtF,CAAC;oBACF,IAAI,IAAI,CAAC,QAAQ,CAAC,kBAAkB,KAAK,KAAK,EAAE,CAAC;wBAC/C,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,wFAAwF,CACzG,CAAC;oBACJ,CAAC;gBACH,CAAC;YACH,CAAC;YAED,yBAAyB;YACzB,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC,cAAc,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE;gBAC1F,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,qBAAqB,MAAM,CAAC,QAAQ,0CAA0C,CAC/F,CAAC;gBACF,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAC7D,CAAC,CAAC,CAAC;YAEH,qDAAqD;YACrD,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC;gBAEnC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gDAAgD,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;CACF"}
|