@push.rocks/smartproxy 21.1.7 → 22.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (155) hide show
  1. package/changelog.md +109 -0
  2. package/dist_rust/rustproxy +0 -0
  3. package/dist_ts/00_commitinfo_data.js +1 -1
  4. package/dist_ts/core/utils/shared-security-manager.d.ts +17 -0
  5. package/dist_ts/core/utils/shared-security-manager.js +66 -1
  6. package/dist_ts/index.d.ts +1 -5
  7. package/dist_ts/index.js +3 -9
  8. package/dist_ts/protocols/common/fragment-handler.js +5 -1
  9. package/dist_ts/proxies/http-proxy/default-certificates.d.ts +54 -0
  10. package/dist_ts/proxies/http-proxy/default-certificates.js +127 -0
  11. package/dist_ts/proxies/http-proxy/http-proxy.d.ts +1 -1
  12. package/dist_ts/proxies/http-proxy/http-proxy.js +9 -14
  13. package/dist_ts/proxies/http-proxy/index.d.ts +5 -1
  14. package/dist_ts/proxies/http-proxy/index.js +6 -2
  15. package/dist_ts/proxies/http-proxy/security-manager.d.ts +4 -12
  16. package/dist_ts/proxies/http-proxy/security-manager.js +66 -99
  17. package/dist_ts/proxies/index.d.ts +1 -5
  18. package/dist_ts/proxies/index.js +2 -6
  19. package/dist_ts/proxies/nftables-proxy/index.d.ts +1 -0
  20. package/dist_ts/proxies/nftables-proxy/index.js +2 -1
  21. package/dist_ts/proxies/nftables-proxy/nftables-proxy.d.ts +4 -26
  22. package/dist_ts/proxies/nftables-proxy/nftables-proxy.js +84 -236
  23. package/dist_ts/proxies/nftables-proxy/utils/index.d.ts +9 -0
  24. package/dist_ts/proxies/nftables-proxy/utils/index.js +12 -0
  25. package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.d.ts +66 -0
  26. package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.js +131 -0
  27. package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.d.ts +39 -0
  28. package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.js +112 -0
  29. package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.d.ts +59 -0
  30. package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.js +130 -0
  31. package/dist_ts/proxies/smart-proxy/certificate-manager.js +4 -3
  32. package/dist_ts/proxies/smart-proxy/connection-manager.d.ts +13 -2
  33. package/dist_ts/proxies/smart-proxy/connection-manager.js +16 -6
  34. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +35 -10
  35. package/dist_ts/proxies/smart-proxy/index.d.ts +5 -10
  36. package/dist_ts/proxies/smart-proxy/index.js +7 -13
  37. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -3
  38. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +17 -0
  39. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +72 -9
  40. package/dist_ts/proxies/smart-proxy/route-preprocessor.d.ts +37 -0
  41. package/dist_ts/proxies/smart-proxy/route-preprocessor.js +103 -0
  42. package/dist_ts/proxies/smart-proxy/rust-binary-locator.d.ts +23 -0
  43. package/dist_ts/proxies/smart-proxy/rust-binary-locator.js +104 -0
  44. package/dist_ts/proxies/smart-proxy/rust-metrics-adapter.d.ts +74 -0
  45. package/dist_ts/proxies/smart-proxy/rust-metrics-adapter.js +146 -0
  46. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.d.ts +49 -0
  47. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.js +259 -0
  48. package/dist_ts/proxies/smart-proxy/security-manager.d.ts +14 -12
  49. package/dist_ts/proxies/smart-proxy/security-manager.js +80 -74
  50. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +39 -157
  51. package/dist_ts/proxies/smart-proxy/smart-proxy.js +224 -622
  52. package/dist_ts/proxies/smart-proxy/socket-handler-server.d.ts +45 -0
  53. package/dist_ts/proxies/smart-proxy/socket-handler-server.js +253 -0
  54. package/dist_ts/proxies/smart-proxy/tls-manager.d.ts +2 -9
  55. package/dist_ts/proxies/smart-proxy/tls-manager.js +3 -26
  56. package/dist_ts/proxies/smart-proxy/utils/index.d.ts +1 -1
  57. package/dist_ts/proxies/smart-proxy/utils/index.js +3 -4
  58. package/dist_ts/proxies/smart-proxy/utils/route-helpers/api-helpers.d.ts +49 -0
  59. package/dist_ts/proxies/smart-proxy/utils/route-helpers/api-helpers.js +108 -0
  60. package/dist_ts/proxies/smart-proxy/utils/route-helpers/dynamic-helpers.d.ts +57 -0
  61. package/dist_ts/proxies/smart-proxy/utils/route-helpers/dynamic-helpers.js +89 -0
  62. package/dist_ts/proxies/smart-proxy/utils/route-helpers/http-helpers.d.ts +17 -0
  63. package/dist_ts/proxies/smart-proxy/utils/route-helpers/http-helpers.js +32 -0
  64. package/dist_ts/proxies/smart-proxy/utils/route-helpers/https-helpers.d.ts +68 -0
  65. package/dist_ts/proxies/smart-proxy/utils/route-helpers/https-helpers.js +117 -0
  66. package/dist_ts/proxies/smart-proxy/utils/route-helpers/index.d.ts +17 -0
  67. package/dist_ts/proxies/smart-proxy/utils/route-helpers/index.js +27 -0
  68. package/dist_ts/proxies/smart-proxy/utils/route-helpers/load-balancer-helpers.d.ts +63 -0
  69. package/dist_ts/proxies/smart-proxy/utils/route-helpers/load-balancer-helpers.js +105 -0
  70. package/dist_ts/proxies/smart-proxy/utils/route-helpers/nftables-helpers.d.ts +83 -0
  71. package/dist_ts/proxies/smart-proxy/utils/route-helpers/nftables-helpers.js +126 -0
  72. package/dist_ts/proxies/smart-proxy/utils/route-helpers/security-helpers.d.ts +47 -0
  73. package/dist_ts/proxies/smart-proxy/utils/route-helpers/security-helpers.js +66 -0
  74. package/dist_ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.d.ts +70 -0
  75. package/dist_ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.js +287 -0
  76. package/dist_ts/proxies/smart-proxy/utils/route-helpers/websocket-helpers.d.ts +46 -0
  77. package/dist_ts/proxies/smart-proxy/utils/route-helpers/websocket-helpers.js +67 -0
  78. package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +4 -457
  79. package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +6 -950
  80. package/dist_ts/proxies/smart-proxy/utils/route-utils.js +2 -2
  81. package/dist_ts/proxies/smart-proxy/utils/route-validator.d.ts +67 -1
  82. package/dist_ts/proxies/smart-proxy/utils/route-validator.js +251 -3
  83. package/dist_ts/routing/index.d.ts +1 -1
  84. package/dist_ts/routing/index.js +3 -3
  85. package/dist_ts/routing/models/http-types.d.ts +119 -4
  86. package/dist_ts/routing/models/http-types.js +93 -5
  87. package/npmextra.json +12 -6
  88. package/package.json +34 -24
  89. package/readme.hints.md +184 -1
  90. package/readme.md +580 -266
  91. package/ts/00_commitinfo_data.ts +1 -1
  92. package/ts/core/utils/shared-security-manager.ts +98 -13
  93. package/ts/index.ts +4 -12
  94. package/ts/protocols/common/fragment-handler.ts +4 -0
  95. package/ts/proxies/index.ts +1 -9
  96. package/ts/proxies/nftables-proxy/index.ts +1 -0
  97. package/ts/proxies/nftables-proxy/nftables-proxy.ts +116 -290
  98. package/ts/proxies/nftables-proxy/utils/index.ts +38 -0
  99. package/ts/proxies/nftables-proxy/utils/nft-command-executor.ts +162 -0
  100. package/ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.ts +125 -0
  101. package/ts/proxies/nftables-proxy/utils/nft-rule-validator.ts +156 -0
  102. package/ts/proxies/smart-proxy/index.ts +6 -13
  103. package/ts/proxies/smart-proxy/models/interfaces.ts +6 -5
  104. package/ts/proxies/smart-proxy/route-preprocessor.ts +122 -0
  105. package/ts/proxies/smart-proxy/rust-binary-locator.ts +112 -0
  106. package/ts/proxies/smart-proxy/rust-metrics-adapter.ts +161 -0
  107. package/ts/proxies/smart-proxy/rust-proxy-bridge.ts +310 -0
  108. package/ts/proxies/smart-proxy/smart-proxy.ts +282 -800
  109. package/ts/proxies/smart-proxy/socket-handler-server.ts +279 -0
  110. package/ts/proxies/smart-proxy/utils/index.ts +3 -5
  111. package/ts/proxies/smart-proxy/utils/route-helpers/api-helpers.ts +144 -0
  112. package/ts/proxies/smart-proxy/utils/route-helpers/dynamic-helpers.ts +124 -0
  113. package/ts/proxies/smart-proxy/utils/route-helpers/http-helpers.ts +40 -0
  114. package/ts/proxies/smart-proxy/utils/route-helpers/https-helpers.ts +163 -0
  115. package/ts/proxies/smart-proxy/utils/route-helpers/index.ts +62 -0
  116. package/ts/proxies/smart-proxy/utils/route-helpers/load-balancer-helpers.ts +154 -0
  117. package/ts/proxies/smart-proxy/utils/route-helpers/nftables-helpers.ts +202 -0
  118. package/ts/proxies/smart-proxy/utils/route-helpers/security-helpers.ts +96 -0
  119. package/ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.ts +337 -0
  120. package/ts/proxies/smart-proxy/utils/route-helpers/websocket-helpers.ts +98 -0
  121. package/ts/proxies/smart-proxy/utils/route-helpers.ts +5 -1302
  122. package/ts/proxies/smart-proxy/utils/route-utils.ts +1 -1
  123. package/ts/proxies/smart-proxy/utils/route-validator.ts +274 -4
  124. package/ts/routing/index.ts +2 -2
  125. package/ts/routing/models/http-types.ts +147 -4
  126. package/ts/proxies/http-proxy/certificate-manager.ts +0 -244
  127. package/ts/proxies/http-proxy/connection-pool.ts +0 -228
  128. package/ts/proxies/http-proxy/context-creator.ts +0 -145
  129. package/ts/proxies/http-proxy/function-cache.ts +0 -279
  130. package/ts/proxies/http-proxy/handlers/index.ts +0 -5
  131. package/ts/proxies/http-proxy/http-proxy.ts +0 -675
  132. package/ts/proxies/http-proxy/http-request-handler.ts +0 -331
  133. package/ts/proxies/http-proxy/http2-request-handler.ts +0 -255
  134. package/ts/proxies/http-proxy/index.ts +0 -13
  135. package/ts/proxies/http-proxy/models/http-types.ts +0 -148
  136. package/ts/proxies/http-proxy/models/index.ts +0 -5
  137. package/ts/proxies/http-proxy/models/types.ts +0 -125
  138. package/ts/proxies/http-proxy/request-handler.ts +0 -878
  139. package/ts/proxies/http-proxy/security-manager.ts +0 -433
  140. package/ts/proxies/http-proxy/websocket-handler.ts +0 -581
  141. package/ts/proxies/smart-proxy/acme-state-manager.ts +0 -112
  142. package/ts/proxies/smart-proxy/cert-store.ts +0 -92
  143. package/ts/proxies/smart-proxy/certificate-manager.ts +0 -894
  144. package/ts/proxies/smart-proxy/connection-manager.ts +0 -796
  145. package/ts/proxies/smart-proxy/http-proxy-bridge.ts +0 -187
  146. package/ts/proxies/smart-proxy/metrics-collector.ts +0 -453
  147. package/ts/proxies/smart-proxy/nftables-manager.ts +0 -271
  148. package/ts/proxies/smart-proxy/port-manager.ts +0 -358
  149. package/ts/proxies/smart-proxy/route-connection-handler.ts +0 -1640
  150. package/ts/proxies/smart-proxy/route-orchestrator.ts +0 -297
  151. package/ts/proxies/smart-proxy/security-manager.ts +0 -257
  152. package/ts/proxies/smart-proxy/throughput-tracker.ts +0 -138
  153. package/ts/proxies/smart-proxy/timeout-manager.ts +0 -196
  154. package/ts/proxies/smart-proxy/tls-manager.ts +0 -207
  155. package/ts/proxies/smart-proxy/utils/route-validators.ts +0 -283
@@ -1,747 +1,349 @@
1
1
  import * as plugins from '../../plugins.js';
2
2
  import { logger } from '../../core/utils/logger.js';
3
- import { connectionLogDeduplicator } from '../../core/utils/log-deduplicator.js';
4
- // Importing required components
5
- import { ConnectionManager } from './connection-manager.js';
6
- import { SecurityManager } from './security-manager.js';
7
- import { TlsManager } from './tls-manager.js';
8
- import { HttpProxyBridge } from './http-proxy-bridge.js';
9
- import { TimeoutManager } from './timeout-manager.js';
10
- import { PortManager } from './port-manager.js';
3
+ // Rust bridge and helpers
4
+ import { RustProxyBridge } from './rust-proxy-bridge.js';
5
+ import { RustBinaryLocator } from './rust-binary-locator.js';
6
+ import { RoutePreprocessor } from './route-preprocessor.js';
7
+ import { SocketHandlerServer } from './socket-handler-server.js';
8
+ import { RustMetricsAdapter } from './rust-metrics-adapter.js';
9
+ // Route management
11
10
  import { SharedRouteManager as RouteManager } from '../../core/routing/route-manager.js';
12
- import { RouteConnectionHandler } from './route-connection-handler.js';
13
- import { NFTablesManager } from './nftables-manager.js';
14
- // Certificate manager
15
- import { SmartCertManager } from './certificate-manager.js';
16
- // Import mutex for route update synchronization
17
- import { Mutex } from './utils/mutex.js';
18
- // Import route validator
19
11
  import { RouteValidator } from './utils/route-validator.js';
20
- // Import route orchestrator for route management
21
- import { RouteOrchestrator } from './route-orchestrator.js';
22
- // Import ACME state manager
23
- import { AcmeStateManager } from './acme-state-manager.js';
24
- // Import metrics collector
25
- import { MetricsCollector } from './metrics-collector.js';
12
+ import { Mutex } from './utils/mutex.js';
26
13
  /**
27
- * SmartProxy - Pure route-based API
14
+ * SmartProxy - Rust-backed proxy engine with TypeScript configuration API.
28
15
  *
29
- * SmartProxy is a unified proxy system that works with routes to define connection handling behavior.
30
- * Each route contains matching criteria (ports, domains, etc.) and an action to take (forward, redirect, block).
31
- *
32
- * Configuration is provided through a set of routes, with each route defining:
33
- * - What to match (ports, domains, paths, client IPs)
34
- * - What to do with matching traffic (forward, redirect, block)
35
- * - How to handle TLS (passthrough, terminate, terminate-and-reencrypt)
36
- * - Security settings (IP restrictions, connection limits)
37
- * - Advanced options (timeout, headers, etc.)
16
+ * All networking (TCP, TLS, HTTP reverse proxy, connection management, security,
17
+ * NFTables) is handled by the Rust binary. TypeScript is only:
18
+ * - The npm module interface (types, route helpers)
19
+ * - The thin IPC wrapper (this class)
20
+ * - Socket-handler callback relay (for JS-defined handlers)
21
+ * - Certificate provisioning callbacks (certProvisionFunction)
38
22
  */
39
23
  export class SmartProxy extends plugins.EventEmitter {
40
- /**
41
- * Constructor for SmartProxy
42
- *
43
- * @param settingsArg Configuration options containing routes and other settings
44
- * Routes define how traffic is matched and handled, with each route having:
45
- * - match: criteria for matching traffic (ports, domains, paths, IPs)
46
- * - action: what to do with matched traffic (forward, redirect, block)
47
- *
48
- * Example:
49
- * ```ts
50
- * const proxy = new SmartProxy({
51
- * routes: [
52
- * {
53
- * match: {
54
- * ports: 443,
55
- * domains: ['example.com', '*.example.com']
56
- * },
57
- * action: {
58
- * type: 'forward',
59
- * target: { host: '10.0.0.1', port: 8443 },
60
- * tls: { mode: 'passthrough' }
61
- * }
62
- * }
63
- * ],
64
- * defaults: {
65
- * target: { host: 'localhost', port: 8080 },
66
- * security: { ipAllowList: ['*'] }
67
- * }
68
- * });
69
- * ```
70
- */
71
24
  constructor(settingsArg) {
72
25
  super();
73
- this.connectionLogger = null;
74
- this.isShuttingDown = false;
75
- // Certificate manager for ACME and static certificates
76
- this.certManager = null;
77
- // Global challenge route tracking
78
- this.globalChallengeRouteActive = false;
79
- // Track port usage across route updates
80
- this.portUsageMap = new Map();
81
- // Set reasonable defaults for all settings
26
+ this.socketHandlerServer = null;
27
+ this.stopping = false;
28
+ // Apply defaults
82
29
  this.settings = {
83
30
  ...settingsArg,
84
31
  initialDataTimeout: settingsArg.initialDataTimeout || 120000,
85
32
  socketTimeout: settingsArg.socketTimeout || 3600000,
86
- inactivityCheckInterval: settingsArg.inactivityCheckInterval || 60000,
87
33
  maxConnectionLifetime: settingsArg.maxConnectionLifetime || 86400000,
88
34
  inactivityTimeout: settingsArg.inactivityTimeout || 14400000,
89
35
  gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000,
90
- noDelay: settingsArg.noDelay !== undefined ? settingsArg.noDelay : true,
91
- keepAlive: settingsArg.keepAlive !== undefined ? settingsArg.keepAlive : true,
92
- keepAliveInitialDelay: settingsArg.keepAliveInitialDelay || 10000,
93
- maxPendingDataSize: settingsArg.maxPendingDataSize || 10 * 1024 * 1024,
94
- disableInactivityCheck: settingsArg.disableInactivityCheck || false,
95
- enableKeepAliveProbes: settingsArg.enableKeepAliveProbes !== undefined ? settingsArg.enableKeepAliveProbes : true,
96
- enableDetailedLogging: settingsArg.enableDetailedLogging || false,
97
- enableTlsDebugLogging: settingsArg.enableTlsDebugLogging || false,
98
- enableRandomizedTimeouts: settingsArg.enableRandomizedTimeouts || false,
99
- allowSessionTicket: settingsArg.allowSessionTicket !== undefined ? settingsArg.allowSessionTicket : true,
100
36
  maxConnectionsPerIP: settingsArg.maxConnectionsPerIP || 100,
101
37
  connectionRateLimitPerMinute: settingsArg.connectionRateLimitPerMinute || 300,
102
38
  keepAliveTreatment: settingsArg.keepAliveTreatment || 'extended',
103
39
  keepAliveInactivityMultiplier: settingsArg.keepAliveInactivityMultiplier || 6,
104
40
  extendedKeepAliveLifetime: settingsArg.extendedKeepAliveLifetime || 7 * 24 * 60 * 60 * 1000,
105
- httpProxyPort: settingsArg.httpProxyPort || 8443,
106
41
  };
107
- // Normalize ACME options if provided (support both email and accountEmail)
42
+ // Normalize ACME options
108
43
  if (this.settings.acme) {
109
- // Support both 'email' and 'accountEmail' fields
110
44
  if (this.settings.acme.accountEmail && !this.settings.acme.email) {
111
45
  this.settings.acme.email = this.settings.acme.accountEmail;
112
46
  }
113
- // Set reasonable defaults for commonly used fields
114
47
  this.settings.acme = {
115
- enabled: this.settings.acme.enabled !== false, // Enable by default if acme object exists
48
+ enabled: this.settings.acme.enabled !== false,
116
49
  port: this.settings.acme.port || 80,
117
50
  email: this.settings.acme.email,
118
51
  useProduction: this.settings.acme.useProduction || false,
119
52
  renewThresholdDays: this.settings.acme.renewThresholdDays || 30,
120
- autoRenew: this.settings.acme.autoRenew !== false, // Enable by default
53
+ autoRenew: this.settings.acme.autoRenew !== false,
121
54
  certificateStore: this.settings.acme.certificateStore || './certs',
122
55
  skipConfiguredCerts: this.settings.acme.skipConfiguredCerts || false,
123
56
  renewCheckIntervalHours: this.settings.acme.renewCheckIntervalHours || 24,
124
57
  routeForwards: this.settings.acme.routeForwards || [],
125
- ...this.settings.acme // Preserve any additional fields
58
+ ...this.settings.acme,
126
59
  };
127
60
  }
128
- // Initialize component managers
129
- this.timeoutManager = new TimeoutManager(this);
130
- this.securityManager = new SecurityManager(this);
131
- this.connectionManager = new ConnectionManager(this);
132
- // Create the route manager with SharedRouteManager API
133
- // Create a logger adapter to match ILogger interface
134
- const loggerAdapter = {
135
- debug: (message, data) => logger.log('debug', message, data),
136
- info: (message, data) => logger.log('info', message, data),
137
- warn: (message, data) => logger.log('warn', message, data),
138
- error: (message, data) => logger.log('error', message, data)
139
- };
140
- // Validate initial routes
141
- if (this.settings.routes && this.settings.routes.length > 0) {
61
+ // Validate routes
62
+ if (this.settings.routes?.length) {
142
63
  const validation = RouteValidator.validateRoutes(this.settings.routes);
143
64
  if (!validation.valid) {
144
65
  RouteValidator.logValidationErrors(validation.errors);
145
66
  throw new Error(`Initial route validation failed: ${validation.errors.size} route(s) have errors`);
146
67
  }
147
68
  }
69
+ // Create logger adapter
70
+ const loggerAdapter = {
71
+ debug: (message, data) => logger.log('debug', message, data),
72
+ info: (message, data) => logger.log('info', message, data),
73
+ warn: (message, data) => logger.log('warn', message, data),
74
+ error: (message, data) => logger.log('error', message, data),
75
+ };
76
+ // Initialize components
148
77
  this.routeManager = new RouteManager({
149
78
  logger: loggerAdapter,
150
79
  enableDetailedLogging: this.settings.enableDetailedLogging,
151
- routes: this.settings.routes
80
+ routes: this.settings.routes,
152
81
  });
153
- // Create other required components
154
- this.tlsManager = new TlsManager(this);
155
- this.httpProxyBridge = new HttpProxyBridge(this);
156
- // Initialize connection handler with route support
157
- this.routeConnectionHandler = new RouteConnectionHandler(this);
158
- // Initialize port manager
159
- this.portManager = new PortManager(this);
160
- // Initialize NFTablesManager
161
- this.nftablesManager = new NFTablesManager(this);
162
- // Initialize route update mutex for synchronization
82
+ this.bridge = new RustProxyBridge();
83
+ this.preprocessor = new RoutePreprocessor();
84
+ this.metricsAdapter = new RustMetricsAdapter(this.bridge, this.settings.metrics?.sampleIntervalMs ?? 1000);
163
85
  this.routeUpdateLock = new Mutex();
164
- // Initialize ACME state manager
165
- this.acmeStateManager = new AcmeStateManager();
166
- // Initialize metrics collector with reference to this SmartProxy instance
167
- this.metricsCollector = new MetricsCollector(this, {
168
- sampleIntervalMs: this.settings.metrics?.sampleIntervalMs,
169
- retentionSeconds: this.settings.metrics?.retentionSeconds
170
- });
171
- // Initialize route orchestrator for managing route updates
172
- this.routeOrchestrator = new RouteOrchestrator(this.portManager, this.routeManager, this.httpProxyBridge, this.nftablesManager, null, // certManager will be set later
173
- loggerAdapter);
174
- }
175
- /**
176
- * Helper method to create and configure certificate manager
177
- * This ensures consistent setup including the required ACME callback
178
- */
179
- async createCertificateManager(routes, certStore = './certs', acmeOptions, initialState) {
180
- const certManager = new SmartCertManager(routes, certStore, acmeOptions, initialState);
181
- // Always set up the route update callback for ACME challenges
182
- certManager.setUpdateRoutesCallback(async (routes) => {
183
- await this.updateRoutes(routes);
184
- });
185
- // Connect with HttpProxy if available
186
- if (this.httpProxyBridge.getHttpProxy()) {
187
- certManager.setHttpProxy(this.httpProxyBridge.getHttpProxy());
188
- }
189
- // Set the ACME state manager
190
- certManager.setAcmeStateManager(this.acmeStateManager);
191
- // Pass down the global ACME config if available
192
- if (this.settings.acme) {
193
- certManager.setGlobalAcmeDefaults(this.settings.acme);
194
- }
195
- // Pass down the custom certificate provision function if available
196
- if (this.settings.certProvisionFunction) {
197
- certManager.setCertProvisionFunction(this.settings.certProvisionFunction);
198
- }
199
- // Pass down the fallback to ACME setting
200
- if (this.settings.certProvisionFallbackToAcme !== undefined) {
201
- certManager.setCertProvisionFallbackToAcme(this.settings.certProvisionFallbackToAcme);
202
- }
203
- await certManager.initialize();
204
- return certManager;
205
- }
206
- /**
207
- * Initialize certificate manager
208
- */
209
- async initializeCertificateManager() {
210
- // Extract global ACME options if any routes use auto certificates
211
- const autoRoutes = this.settings.routes.filter(r => r.action.tls?.certificate === 'auto');
212
- if (autoRoutes.length === 0 && !this.hasStaticCertRoutes()) {
213
- logger.log('info', 'No routes require certificate management', { component: 'certificate-manager' });
214
- return;
215
- }
216
- // Prepare ACME options with priority:
217
- // 1. Use top-level ACME config if available
218
- // 2. Fall back to first auto route's ACME config
219
- // 3. Otherwise use undefined
220
- let acmeOptions;
221
- if (this.settings.acme?.email) {
222
- // Use top-level ACME config
223
- acmeOptions = {
224
- email: this.settings.acme.email,
225
- useProduction: this.settings.acme.useProduction || false,
226
- port: this.settings.acme.port || 80
227
- };
228
- logger.log('info', `Using top-level ACME configuration with email: ${acmeOptions.email}`, { component: 'certificate-manager' });
229
- }
230
- else if (autoRoutes.length > 0) {
231
- // Check for route-level ACME config
232
- const routeWithAcme = autoRoutes.find(r => r.action.tls?.acme?.email);
233
- if (routeWithAcme?.action.tls?.acme) {
234
- const routeAcme = routeWithAcme.action.tls.acme;
235
- acmeOptions = {
236
- email: routeAcme.email,
237
- useProduction: routeAcme.useProduction || false,
238
- port: routeAcme.challengePort || 80
239
- };
240
- logger.log('info', `Using route-level ACME configuration from route '${routeWithAcme.name}' with email: ${acmeOptions.email}`, { component: 'certificate-manager' });
241
- }
242
- }
243
- // Validate we have required configuration
244
- if (autoRoutes.length > 0 && !acmeOptions?.email) {
245
- throw new Error('ACME email is required for automatic certificate provisioning. ' +
246
- 'Please provide email in either:\n' +
247
- '1. Top-level "acme" configuration\n' +
248
- '2. Individual route\'s "tls.acme" configuration');
249
- }
250
- // Use the helper method to create and configure the certificate manager
251
- this.certManager = await this.createCertificateManager(this.settings.routes, this.settings.acme?.certificateStore || './certs', acmeOptions);
252
- }
253
- /**
254
- * Check if we have routes with static certificates
255
- */
256
- hasStaticCertRoutes() {
257
- return this.settings.routes.some(r => r.action.tls?.certificate &&
258
- r.action.tls.certificate !== 'auto');
259
86
  }
260
87
  /**
261
- * Start the proxy server with support for both configuration types
88
+ * Start the proxy.
89
+ * Spawns the Rust binary, configures socket relay if needed, sends routes, handles cert provisioning.
262
90
  */
263
91
  async start() {
264
- // Don't start if already shutting down
265
- if (this.isShuttingDown) {
266
- logger.log('warn', "Cannot start SmartProxy while it's in the shutdown process");
267
- return;
268
- }
269
- // Validate the route configuration
270
- const configWarnings = this.routeManager.validateConfiguration();
271
- // Also validate ACME configuration
272
- const acmeWarnings = this.validateAcmeConfiguration();
273
- const allWarnings = [...configWarnings, ...acmeWarnings];
274
- if (allWarnings.length > 0) {
275
- logger.log('warn', `${allWarnings.length} configuration warnings found`, { count: allWarnings.length });
276
- for (const warning of allWarnings) {
277
- logger.log('warn', `${warning}`);
278
- }
279
- }
280
- // Get listening ports from RouteManager
281
- const listeningPorts = this.routeManager.getListeningPorts();
282
- // Initialize port usage tracking using RouteOrchestrator
283
- this.portUsageMap = this.routeOrchestrator.updatePortUsageMap(this.settings.routes);
284
- // Log port usage for startup
285
- logger.log('info', `SmartProxy starting with ${listeningPorts.length} ports: ${listeningPorts.join(', ')}`, {
286
- portCount: listeningPorts.length,
287
- ports: listeningPorts,
288
- component: 'smart-proxy'
289
- });
290
- // Provision NFTables rules for routes that use NFTables
291
- for (const route of this.settings.routes) {
292
- if (route.action.forwardingEngine === 'nftables') {
293
- await this.nftablesManager.provisionRoute(route);
294
- }
295
- }
296
- // Initialize and start HttpProxy if needed - before port binding
297
- if (this.settings.useHttpProxy && this.settings.useHttpProxy.length > 0) {
298
- await this.httpProxyBridge.initialize();
299
- await this.httpProxyBridge.start();
300
- }
301
- // Start port listeners using the PortManager BEFORE initializing certificate manager
302
- // This ensures all required ports are bound and ready when adding ACME challenge routes
303
- await this.portManager.addPorts(listeningPorts);
304
- // Initialize certificate manager AFTER port binding is complete
305
- // This ensures the ACME challenge port is already bound and ready when needed
306
- await this.initializeCertificateManager();
307
- // Connect certificate manager with HttpProxy if both are available
308
- if (this.certManager && this.httpProxyBridge.getHttpProxy()) {
309
- this.certManager.setHttpProxy(this.httpProxyBridge.getHttpProxy());
310
- }
311
- // Now that ports are listening, provision any required certificates
312
- if (this.certManager) {
313
- logger.log('info', 'Starting certificate provisioning now that ports are ready', { component: 'certificate-manager' });
314
- await this.certManager.provisionAllCertificates();
315
- }
316
- // Start the metrics collector now that all components are initialized
317
- this.metricsCollector.start();
318
- // Set up periodic connection logging and inactivity checks
319
- this.connectionLogger = setInterval(() => {
320
- // Immediately return if shutting down
321
- if (this.isShuttingDown)
92
+ // Spawn Rust binary
93
+ const spawned = await this.bridge.spawn();
94
+ if (!spawned) {
95
+ throw new Error('RustProxy binary not found. Set SMARTPROXY_RUST_BINARY env var, install the platform package, ' +
96
+ 'or build locally with: cd rust && cargo build --release');
97
+ }
98
+ // Handle unexpected exit (only emits error if not intentionally stopping)
99
+ this.bridge.on('exit', (code, signal) => {
100
+ if (this.stopping)
322
101
  return;
323
- // Perform inactivity check
324
- this.connectionManager.performInactivityCheck();
325
- // Log connection statistics
326
- const now = Date.now();
327
- let maxIncoming = 0;
328
- let maxOutgoing = 0;
329
- let tlsConnections = 0;
330
- let nonTlsConnections = 0;
331
- let completedTlsHandshakes = 0;
332
- let pendingTlsHandshakes = 0;
333
- let keepAliveConnections = 0;
334
- let httpProxyConnections = 0;
335
- // Get connection records for analysis
336
- const connectionRecords = this.connectionManager.getConnections();
337
- // Analyze active connections
338
- for (const record of connectionRecords.values()) {
339
- // Track connection stats
340
- if (record.isTLS) {
341
- tlsConnections++;
342
- if (record.tlsHandshakeComplete) {
343
- completedTlsHandshakes++;
344
- }
345
- else {
346
- pendingTlsHandshakes++;
347
- }
348
- }
349
- else {
350
- nonTlsConnections++;
351
- }
352
- if (record.hasKeepAlive) {
353
- keepAliveConnections++;
354
- }
355
- if (record.usingNetworkProxy) {
356
- httpProxyConnections++;
357
- }
358
- maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
359
- if (record.outgoingStartTime) {
360
- maxOutgoing = Math.max(maxOutgoing, now - record.outgoingStartTime);
361
- }
362
- }
363
- // Get termination stats
364
- const terminationStats = this.connectionManager.getTerminationStats();
365
- // Log detailed stats
366
- logger.log('info', 'Connection statistics', {
367
- activeConnections: connectionRecords.size,
368
- tls: {
369
- total: tlsConnections,
370
- completed: completedTlsHandshakes,
371
- pending: pendingTlsHandshakes
372
- },
373
- nonTls: nonTlsConnections,
374
- keepAlive: keepAliveConnections,
375
- httpProxy: httpProxyConnections,
376
- longestRunning: {
377
- incoming: plugins.prettyMs(maxIncoming),
378
- outgoing: plugins.prettyMs(maxOutgoing)
379
- },
380
- terminationStats: {
381
- incoming: terminationStats.incoming,
382
- outgoing: terminationStats.outgoing
383
- },
384
- component: 'connection-manager'
385
- });
386
- }, this.settings.inactivityCheckInterval || 60000);
387
- // Make sure the interval doesn't keep the process alive
388
- if (this.connectionLogger.unref) {
389
- this.connectionLogger.unref();
390
- }
102
+ logger.log('error', `RustProxy exited unexpectedly (code=${code}, signal=${signal})`, { component: 'smart-proxy' });
103
+ this.emit('error', new Error(`RustProxy exited (code=${code}, signal=${signal})`));
104
+ });
105
+ // Check if any routes need TS-side handling (socket handlers, dynamic functions)
106
+ const hasHandlerRoutes = this.settings.routes.some((r) => (r.action.type === 'socket-handler' && r.action.socketHandler) ||
107
+ r.action.targets?.some((t) => typeof t.host === 'function' || typeof t.port === 'function'));
108
+ // Start socket handler relay server (but don't tell Rust yet - proxy not started)
109
+ if (hasHandlerRoutes) {
110
+ this.socketHandlerServer = new SocketHandlerServer(this.preprocessor);
111
+ await this.socketHandlerServer.start();
112
+ }
113
+ // Preprocess routes (strip JS functions, convert socket-handler routes)
114
+ const rustRoutes = this.preprocessor.preprocessForRust(this.settings.routes);
115
+ // Build Rust config
116
+ const config = this.buildRustConfig(rustRoutes);
117
+ // Start the Rust proxy
118
+ await this.bridge.startProxy(config);
119
+ // Now that Rust proxy is running, configure socket handler relay
120
+ if (this.socketHandlerServer) {
121
+ await this.bridge.setSocketHandlerRelay(this.socketHandlerServer.getSocketPath());
122
+ }
123
+ // Handle certProvisionFunction
124
+ await this.provisionCertificatesViaCallback();
125
+ // Start metrics polling
126
+ this.metricsAdapter.startPolling();
127
+ logger.log('info', 'SmartProxy started (Rust engine)', { component: 'smart-proxy' });
391
128
  }
392
129
  /**
393
- * Extract domain configurations from routes for certificate provisioning
394
- *
395
- * Note: This method has been removed as we now work directly with routes
396
- */
397
- /**
398
- * Stop the proxy server
130
+ * Stop the proxy.
399
131
  */
400
132
  async stop() {
401
- logger.log('info', 'SmartProxy shutting down...');
402
- this.isShuttingDown = true;
403
- this.portManager.setShuttingDown(true);
404
- // Stop certificate manager
405
- if (this.certManager) {
406
- await this.certManager.stop();
407
- logger.log('info', 'Certificate manager stopped');
408
- }
409
- // Stop NFTablesManager
410
- await this.nftablesManager.stop();
411
- logger.log('info', 'NFTablesManager stopped');
412
- // Stop the connection logger
413
- if (this.connectionLogger) {
414
- clearInterval(this.connectionLogger);
415
- this.connectionLogger = null;
416
- }
417
- // Stop all port listeners
418
- await this.portManager.closeAll();
419
- logger.log('info', 'All servers closed. Cleaning up active connections...');
420
- // Clean up all active connections
421
- await this.connectionManager.clearConnections();
422
- // Stop HttpProxy
423
- await this.httpProxyBridge.stop();
424
- // Clear ACME state manager
425
- this.acmeStateManager.clear();
426
- // Stop metrics collector
427
- this.metricsCollector.stop();
428
- // Clean up ProtocolDetector singleton
429
- const detection = await import('../../detection/index.js');
430
- detection.ProtocolDetector.destroy();
431
- // Flush any pending deduplicated logs
432
- connectionLogDeduplicator.flushAll();
433
- logger.log('info', 'SmartProxy shutdown complete.');
434
- }
435
- /**
436
- * Updates the domain configurations for the proxy
437
- *
438
- * Note: This legacy method has been removed. Use updateRoutes instead.
439
- */
440
- async updateDomainConfigs() {
441
- logger.log('warn', 'Method updateDomainConfigs() is deprecated. Use updateRoutes() instead.');
442
- throw new Error('updateDomainConfigs() is deprecated - use updateRoutes() instead');
443
- }
444
- /**
445
- * Verify the challenge route has been properly removed from routes
446
- */
447
- async verifyChallengeRouteRemoved() {
448
- const maxRetries = 10;
449
- const retryDelay = 100; // milliseconds
450
- for (let i = 0; i < maxRetries; i++) {
451
- // Check if the challenge route is still in the active routes
452
- const challengeRouteExists = this.settings.routes.some(r => r.name === 'acme-challenge');
453
- if (!challengeRouteExists) {
454
- try {
455
- logger.log('info', 'Challenge route successfully removed from routes');
456
- }
457
- catch (error) {
458
- // Silently handle logging errors
459
- console.log('[INFO] Challenge route successfully removed from routes');
460
- }
461
- return;
462
- }
463
- // Wait before retrying
464
- await plugins.smartdelay.delayFor(retryDelay);
465
- }
466
- const error = `Failed to verify challenge route removal after ${maxRetries} attempts`;
133
+ logger.log('info', 'SmartProxy shutting down...', { component: 'smart-proxy' });
134
+ this.stopping = true;
135
+ // Stop metrics polling
136
+ this.metricsAdapter.stopPolling();
137
+ // Remove exit listener before killing to avoid spurious error events
138
+ this.bridge.removeAllListeners('exit');
139
+ // Stop Rust proxy
467
140
  try {
468
- logger.log('error', error);
141
+ await this.bridge.stopProxy();
142
+ }
143
+ catch {
144
+ // Ignore if already stopped
469
145
  }
470
- catch (logError) {
471
- // Silently handle logging errors
472
- console.log(`[ERROR] ${error}`);
146
+ this.bridge.kill();
147
+ // Stop socket handler relay
148
+ if (this.socketHandlerServer) {
149
+ await this.socketHandlerServer.stop();
150
+ this.socketHandlerServer = null;
473
151
  }
474
- throw new Error(error);
152
+ logger.log('info', 'SmartProxy shutdown complete.', { component: 'smart-proxy' });
475
153
  }
476
154
  /**
477
- * Update routes with new configuration
478
- *
479
- * This method replaces the current route configuration with the provided routes.
480
- * It also provisions certificates for routes that require TLS termination and have
481
- * `certificate: 'auto'` set in their TLS configuration.
482
- *
483
- * @param newRoutes Array of route configurations to use
484
- *
485
- * Example:
486
- * ```ts
487
- * proxy.updateRoutes([
488
- * {
489
- * match: { ports: 443, domains: 'secure.example.com' },
490
- * action: {
491
- * type: 'forward',
492
- * target: { host: '10.0.0.1', port: 8443 },
493
- * tls: { mode: 'terminate', certificate: 'auto' }
494
- * }
495
- * }
496
- * ]);
497
- * ```
155
+ * Update routes atomically.
498
156
  */
499
157
  async updateRoutes(newRoutes) {
500
158
  return this.routeUpdateLock.runExclusive(async () => {
501
- try {
502
- logger.log('info', `Updating routes (${newRoutes.length} routes)`, {
503
- routeCount: newRoutes.length,
504
- component: 'smart-proxy'
505
- });
159
+ // Validate
160
+ const validation = RouteValidator.validateRoutes(newRoutes);
161
+ if (!validation.valid) {
162
+ RouteValidator.logValidationErrors(validation.errors);
163
+ throw new Error(`Route validation failed: ${validation.errors.size} route(s) have errors`);
506
164
  }
507
- catch (error) {
508
- // Silently handle logging errors
509
- console.log(`[INFO] Updating routes (${newRoutes.length} routes)`);
165
+ // Preprocess for Rust
166
+ const rustRoutes = this.preprocessor.preprocessForRust(newRoutes);
167
+ // Send to Rust
168
+ await this.bridge.updateRoutes(rustRoutes);
169
+ // Update local route manager
170
+ this.routeManager.updateRoutes(newRoutes);
171
+ // Update socket handler relay if handler routes changed
172
+ const hasHandlerRoutes = newRoutes.some((r) => (r.action.type === 'socket-handler' && r.action.socketHandler) ||
173
+ r.action.targets?.some((t) => typeof t.host === 'function' || typeof t.port === 'function'));
174
+ if (hasHandlerRoutes && !this.socketHandlerServer) {
175
+ this.socketHandlerServer = new SocketHandlerServer(this.preprocessor);
176
+ await this.socketHandlerServer.start();
177
+ await this.bridge.setSocketHandlerRelay(this.socketHandlerServer.getSocketPath());
510
178
  }
511
- // Update route orchestrator dependencies if cert manager changed
512
- if (this.certManager && !this.routeOrchestrator.getCertManager()) {
513
- this.routeOrchestrator.setCertManager(this.certManager);
179
+ else if (!hasHandlerRoutes && this.socketHandlerServer) {
180
+ await this.socketHandlerServer.stop();
181
+ this.socketHandlerServer = null;
514
182
  }
515
- // Delegate the complex route update logic to RouteOrchestrator
516
- const updateResult = await this.routeOrchestrator.updateRoutes(this.settings.routes, newRoutes, {
517
- acmePort: this.settings.acme?.port || 80,
518
- acmeOptions: this.certManager?.getAcmeOptions(),
519
- acmeState: this.certManager?.getState(),
520
- globalChallengeRouteActive: this.globalChallengeRouteActive,
521
- createCertificateManager: this.createCertificateManager.bind(this),
522
- verifyChallengeRouteRemoved: this.verifyChallengeRouteRemoved.bind(this)
523
- });
524
- // Update settings with the new routes
183
+ // Update stored routes
525
184
  this.settings.routes = newRoutes;
526
- // Update global state from orchestrator results
527
- this.globalChallengeRouteActive = updateResult.newChallengeRouteActive;
528
- // Update port usage map from orchestrator
529
- this.portUsageMap = updateResult.portUsageMap;
530
- // If certificate manager was recreated, update our reference
531
- if (updateResult.newCertManager) {
532
- this.certManager = updateResult.newCertManager;
533
- // Update the orchestrator's reference too
534
- this.routeOrchestrator.setCertManager(this.certManager);
535
- }
185
+ // Handle cert provisioning for new routes
186
+ await this.provisionCertificatesViaCallback();
187
+ logger.log('info', `Routes updated (${newRoutes.length} routes)`, { component: 'smart-proxy' });
536
188
  });
537
189
  }
538
190
  /**
539
- * Manually provision a certificate for a route
191
+ * Provision a certificate for a named route.
540
192
  */
541
193
  async provisionCertificate(routeName) {
542
- if (!this.certManager) {
543
- throw new Error('Certificate manager not initialized');
544
- }
545
- const route = this.settings.routes.find(r => r.name === routeName);
546
- if (!route) {
547
- throw new Error(`Route ${routeName} not found`);
548
- }
549
- await this.certManager.provisionCertificate(route);
194
+ await this.bridge.provisionCertificate(routeName);
550
195
  }
551
- // Port usage tracking methods moved to RouteOrchestrator
552
196
  /**
553
- * Force renewal of a certificate
197
+ * Force renewal of a certificate.
554
198
  */
555
199
  async renewCertificate(routeName) {
556
- if (!this.certManager) {
557
- throw new Error('Certificate manager not initialized');
558
- }
559
- await this.certManager.renewCertificate(routeName);
200
+ await this.bridge.renewCertificate(routeName);
560
201
  }
561
202
  /**
562
- * Get certificate status for a route
203
+ * Get certificate status for a route (async - calls Rust).
563
204
  */
564
- getCertificateStatus(routeName) {
565
- if (!this.certManager) {
566
- return undefined;
567
- }
568
- return this.certManager.getCertificateStatus(routeName);
205
+ async getCertificateStatus(routeName) {
206
+ return this.bridge.getCertificateStatus(routeName);
569
207
  }
570
208
  /**
571
- * Get proxy metrics with clean API
572
- *
573
- * @returns IMetrics interface with grouped metrics methods
209
+ * Get the metrics interface.
574
210
  */
575
211
  getMetrics() {
576
- return this.metricsCollector;
212
+ return this.metricsAdapter;
577
213
  }
578
214
  /**
579
- * Validates if a domain name is valid for certificate issuance
215
+ * Get statistics (async - calls Rust).
580
216
  */
581
- isValidDomain(domain) {
582
- // Very basic domain validation
583
- if (!domain || domain.length === 0) {
584
- return false;
585
- }
586
- // Check for wildcard domains (they can't get ACME certs)
587
- if (domain.includes('*')) {
588
- logger.log('warn', `Wildcard domains like "${domain}" are not supported for automatic ACME certificates`, { domain, component: 'certificate-manager' });
589
- return false;
590
- }
591
- // Check if domain has at least one dot and no invalid characters
592
- const validDomainRegex = /^[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(\.[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/;
593
- if (!validDomainRegex.test(domain)) {
594
- logger.log('warn', `Domain "${domain}" has invalid format for certificate issuance`, { domain, component: 'certificate-manager' });
595
- return false;
596
- }
597
- return true;
217
+ async getStatistics() {
218
+ return this.bridge.getStatistics();
598
219
  }
599
220
  /**
600
- * Add a new listening port without changing the route configuration
601
- *
602
- * This allows you to add a port listener without updating routes.
603
- * Useful for preparing to listen on a port before adding routes for it.
604
- *
605
- * @param port The port to start listening on
606
- * @returns Promise that resolves when the port is listening
221
+ * Add a listening port at runtime.
607
222
  */
608
223
  async addListeningPort(port) {
609
- return this.portManager.addPort(port);
224
+ await this.bridge.addListeningPort(port);
610
225
  }
611
226
  /**
612
- * Stop listening on a specific port without changing the route configuration
613
- *
614
- * This allows you to stop a port listener without updating routes.
615
- * Useful for temporary maintenance or port changes.
616
- *
617
- * @param port The port to stop listening on
618
- * @returns Promise that resolves when the port is closed
227
+ * Remove a listening port at runtime.
619
228
  */
620
229
  async removeListeningPort(port) {
621
- return this.portManager.removePort(port);
230
+ await this.bridge.removeListeningPort(port);
622
231
  }
623
232
  /**
624
- * Get a list of all ports currently being listened on
625
- *
626
- * @returns Array of port numbers
233
+ * Get all currently listening ports (async - calls Rust).
627
234
  */
628
- getListeningPorts() {
629
- return this.portManager.getListeningPorts();
235
+ async getListeningPorts() {
236
+ if (!this.bridge.running)
237
+ return [];
238
+ return this.bridge.getListeningPorts();
630
239
  }
631
240
  /**
632
- * Get statistics about current connections
633
- */
634
- getStatistics() {
635
- const connectionRecords = this.connectionManager.getConnections();
636
- const terminationStats = this.connectionManager.getTerminationStats();
637
- let tlsConnections = 0;
638
- let nonTlsConnections = 0;
639
- let keepAliveConnections = 0;
640
- let httpProxyConnections = 0;
641
- // Analyze active connections
642
- for (const record of connectionRecords.values()) {
643
- if (record.isTLS)
644
- tlsConnections++;
645
- else
646
- nonTlsConnections++;
647
- if (record.hasKeepAlive)
648
- keepAliveConnections++;
649
- if (record.usingNetworkProxy)
650
- httpProxyConnections++;
651
- }
652
- return {
653
- activeConnections: connectionRecords.size,
654
- tlsConnections,
655
- nonTlsConnections,
656
- keepAliveConnections,
657
- httpProxyConnections,
658
- terminationStats,
659
- acmeEnabled: !!this.certManager,
660
- port80HandlerPort: this.certManager ? 80 : null,
661
- routeCount: this.settings.routes.length,
662
- activePorts: this.portManager.getListeningPorts().length,
663
- listeningPorts: this.portManager.getListeningPorts()
664
- };
665
- }
666
- /**
667
- * Get a list of eligible domains for ACME certificates
241
+ * Get eligible domains for ACME certificates (sync - reads local routes).
668
242
  */
669
243
  getEligibleDomainsForCertificates() {
670
244
  const domains = [];
671
- // Get domains from routes
672
- const routes = this.settings.routes || [];
673
- for (const route of routes) {
245
+ for (const route of this.settings.routes || []) {
674
246
  if (!route.match.domains)
675
247
  continue;
676
- // Skip routes without TLS termination or auto certificates
677
248
  if (route.action.type !== 'forward' ||
678
249
  !route.action.tls ||
679
250
  route.action.tls.mode === 'passthrough' ||
680
251
  route.action.tls.certificate !== 'auto')
681
252
  continue;
682
- const routeDomains = Array.isArray(route.match.domains)
683
- ? route.match.domains
684
- : [route.match.domains];
685
- // Skip domains that can't be used with ACME
686
- const eligibleDomains = routeDomains.filter(domain => !domain.includes('*') && this.isValidDomain(domain));
687
- domains.push(...eligibleDomains);
253
+ const routeDomains = Array.isArray(route.match.domains) ? route.match.domains : [route.match.domains];
254
+ const eligible = routeDomains.filter((d) => !d.includes('*') && this.isValidDomain(d));
255
+ domains.push(...eligible);
688
256
  }
689
- // Legacy mode is no longer supported
690
257
  return domains;
691
258
  }
692
259
  /**
693
- * Get NFTables status
260
+ * Get NFTables status (async - calls Rust).
694
261
  */
695
262
  async getNfTablesStatus() {
696
- return this.nftablesManager.getStatus();
263
+ return this.bridge.getNftablesStatus();
697
264
  }
265
+ // --- Private helpers ---
698
266
  /**
699
- * Validate ACME configuration
267
+ * Build the Rust configuration object from TS settings.
700
268
  */
701
- validateAcmeConfiguration() {
702
- const warnings = [];
703
- // Check for routes with certificate: 'auto'
704
- const autoRoutes = this.settings.routes.filter(r => r.action.tls?.certificate === 'auto');
705
- if (autoRoutes.length === 0) {
706
- return warnings;
707
- }
708
- // Check if we have ACME email configuration
709
- const hasTopLevelEmail = this.settings.acme?.email;
710
- const routesWithEmail = autoRoutes.filter(r => r.action.tls?.acme?.email);
711
- if (!hasTopLevelEmail && routesWithEmail.length === 0) {
712
- warnings.push('Routes with certificate: "auto" require ACME email configuration. ' +
713
- 'Add email to either top-level "acme" config or individual route\'s "tls.acme" config.');
714
- }
715
- // Check for port 80 availability for challenges
716
- if (autoRoutes.length > 0) {
717
- const challengePort = this.settings.acme?.port || 80;
718
- const portsInUse = this.routeManager.getListeningPorts();
719
- if (!portsInUse.includes(challengePort)) {
720
- warnings.push(`Port ${challengePort} is not configured for any routes but is needed for ACME challenges. ` +
721
- `Add a route listening on port ${challengePort} or ensure it's accessible for HTTP-01 challenges.`);
722
- }
723
- }
724
- // Check for mismatched environments
725
- if (this.settings.acme?.useProduction) {
726
- const stagingRoutes = autoRoutes.filter(r => r.action.tls?.acme?.useProduction === false);
727
- if (stagingRoutes.length > 0) {
728
- warnings.push('Top-level ACME uses production but some routes use staging. ' +
729
- 'Consider aligning environments to avoid certificate issues.');
730
- }
731
- }
732
- // Check for wildcard domains with auto certificates
733
- for (const route of autoRoutes) {
734
- const domains = Array.isArray(route.match.domains)
735
- ? route.match.domains
736
- : [route.match.domains];
737
- const wildcardDomains = domains.filter(d => d?.includes('*'));
738
- if (wildcardDomains.length > 0) {
739
- warnings.push(`Route "${route.name}" has wildcard domain(s) ${wildcardDomains.join(', ')} ` +
740
- 'with certificate: "auto". Wildcard certificates require DNS-01 challenges, ' +
741
- 'which are not currently supported. Use static certificates instead.');
269
+ buildRustConfig(routes) {
270
+ return {
271
+ routes,
272
+ defaults: this.settings.defaults,
273
+ acme: this.settings.acme
274
+ ? {
275
+ enabled: this.settings.acme.enabled,
276
+ email: this.settings.acme.email,
277
+ useProduction: this.settings.acme.useProduction,
278
+ port: this.settings.acme.port,
279
+ renewThresholdDays: this.settings.acme.renewThresholdDays,
280
+ autoRenew: this.settings.acme.autoRenew,
281
+ certificateStore: this.settings.acme.certificateStore,
282
+ renewCheckIntervalHours: this.settings.acme.renewCheckIntervalHours,
283
+ }
284
+ : undefined,
285
+ connectionTimeout: this.settings.connectionTimeout,
286
+ initialDataTimeout: this.settings.initialDataTimeout,
287
+ socketTimeout: this.settings.socketTimeout,
288
+ maxConnectionLifetime: this.settings.maxConnectionLifetime,
289
+ gracefulShutdownTimeout: this.settings.gracefulShutdownTimeout,
290
+ maxConnectionsPerIp: this.settings.maxConnectionsPerIP,
291
+ connectionRateLimitPerMinute: this.settings.connectionRateLimitPerMinute,
292
+ keepAliveTreatment: this.settings.keepAliveTreatment,
293
+ keepAliveInactivityMultiplier: this.settings.keepAliveInactivityMultiplier,
294
+ extendedKeepAliveLifetime: this.settings.extendedKeepAliveLifetime,
295
+ acceptProxyProtocol: this.settings.acceptProxyProtocol,
296
+ sendProxyProtocol: this.settings.sendProxyProtocol,
297
+ };
298
+ }
299
+ /**
300
+ * For routes with certificate: 'auto', call certProvisionFunction if set.
301
+ * If the callback returns a cert object, load it into Rust.
302
+ * If it returns 'http01', let Rust handle ACME.
303
+ */
304
+ async provisionCertificatesViaCallback() {
305
+ const provisionFn = this.settings.certProvisionFunction;
306
+ if (!provisionFn)
307
+ return;
308
+ for (const route of this.settings.routes) {
309
+ if (route.action.tls?.certificate !== 'auto')
310
+ continue;
311
+ if (!route.match.domains)
312
+ continue;
313
+ const domains = Array.isArray(route.match.domains) ? route.match.domains : [route.match.domains];
314
+ for (const domain of domains) {
315
+ if (domain.includes('*'))
316
+ continue;
317
+ try {
318
+ const result = await provisionFn(domain);
319
+ if (result === 'http01') {
320
+ // Rust handles ACME for this domain
321
+ continue;
322
+ }
323
+ // Got a static cert object - load it into Rust
324
+ if (result && typeof result === 'object') {
325
+ const certObj = result;
326
+ await this.bridge.loadCertificate(domain, certObj.publicKey, certObj.privateKey);
327
+ logger.log('info', `Certificate loaded via provision function for ${domain}`, { component: 'smart-proxy' });
328
+ }
329
+ }
330
+ catch (err) {
331
+ logger.log('warn', `certProvisionFunction failed for ${domain}: ${err.message}`, { component: 'smart-proxy' });
332
+ // Fallback to ACME if enabled
333
+ if (this.settings.certProvisionFallbackToAcme !== false) {
334
+ logger.log('info', `Falling back to ACME for ${domain}`, { component: 'smart-proxy' });
335
+ }
336
+ }
742
337
  }
743
338
  }
744
- return warnings;
339
+ }
340
+ isValidDomain(domain) {
341
+ if (!domain || domain.length === 0)
342
+ return false;
343
+ if (domain.includes('*'))
344
+ return false;
345
+ const validDomainRegex = /^[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(\.[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/;
346
+ return validDomainRegex.test(domain);
745
347
  }
746
348
  }
747
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"smart-proxy.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/smart-proxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AACpD,OAAO,EAAE,yBAAyB,EAAE,MAAM,sCAAsC,CAAC;AAEjF,gCAAgC;AAChC,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAChD,OAAO,EAAE,kBAAkB,IAAI,YAAY,EAAE,MAAM,qCAAqC,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAExD,sBAAsB;AACtB,OAAO,EAAE,gBAAgB,EAAoB,MAAM,0BAA0B,CAAC;AAQ9E,gDAAgD;AAChD,OAAO,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAEzC,yBAAyB;AACzB,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAE5D,iDAAiD;AACjD,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAE5D,4BAA4B;AAC5B,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAE3D,2BAA2B;AAC3B,OAAO,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAG1D;;;;;;;;;;;;GAYG;AACH,MAAM,OAAO,UAAW,SAAQ,OAAO,CAAC,YAAY;IAiClD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACH,YAAY,WAA+B;QACzC,KAAK,EAAE,CAAC;QA9DF,qBAAgB,GAA0B,IAAI,CAAC;QAC/C,mBAAc,GAAY,KAAK,CAAC;QAYxC,uDAAuD;QAChD,gBAAW,GAA4B,IAAI,CAAC;QAEnD,kCAAkC;QAC1B,+BAA0B,GAAY,KAAK,CAAC;QAUpD,wCAAwC;QAChC,iBAAY,GAA6B,IAAI,GAAG,EAAE,CAAC;QAoCzD,2CAA2C;QAC3C,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,WAAW;YACd,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,MAAM;YAC5D,aAAa,EAAE,WAAW,CAAC,aAAa,IAAI,OAAO;YACnD,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,QAAQ;YACpE,iBAAiB,EAAE,WAAW,CAAC,iBAAiB,IAAI,QAAQ;YAC5D,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,OAAO,EAAE,WAAW,CAAC,OAAO,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI;YACvE,SAAS,EAAE,WAAW,CAAC,SAAS,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YAC7E,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,EAAE,GAAG,IAAI,GAAG,IAAI;YACtE,sBAAsB,EAAE,WAAW,CAAC,sBAAsB,IAAI,KAAK;YACnE,qBAAqB,EACnB,WAAW,CAAC,qBAAqB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,qBAAqB,CAAC,CAAC,CAAC,IAAI;YAC5F,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,wBAAwB,EAAE,WAAW,CAAC,wBAAwB,IAAI,KAAK;YACvE,kBAAkB,EAChB,WAAW,CAAC,kBAAkB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,kBAAkB,CAAC,CAAC,CAAC,IAAI;YACtF,mBAAmB,EAAE,WAAW,CAAC,mBAAmB,IAAI,GAAG;YAC3D,4BAA4B,EAAE,WAAW,CAAC,4BAA4B,IAAI,GAAG;YAC7E,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,UAAU;YAChE,6BAA6B,EAAE,WAAW,CAAC,6BAA6B,IAAI,CAAC;YAC7E,yBAAyB,EAAE,WAAW,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI;YAC3F,aAAa,EAAE,WAAW,CAAC,aAAa,IAAI,IAAI;SACjD,CAAC;QAEF,2EAA2E;QAC3E,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvB,iDAAiD;YACjD,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACjE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC;YAC7D,CAAC;YAED,mDAAmD;YACnD,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG;gBACnB,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,KAAK,KAAK,EAAE,0CAA0C;gBACzF,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,IAAI,EAAE;gBACnC,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;gBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,KAAK;gBACxD,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,EAAE;gBAC/D,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,KAAK,KAAK,EAAE,oBAAoB;gBACvE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,SAAS;gBAClE,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,mBAAmB,IAAI,KAAK;gBACpE,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAuB,IAAI,EAAE;gBACzE,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,EAAE;gBACrD,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,iCAAiC;aACxD,CAAC;QACJ,CAAC;QAED,gCAAgC;QAChC,IAAI,CAAC,cAAc,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC/C,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CAAC,IAAI,CAAC,CAAC;QACjD,IAAI,CAAC,iBAAiB,GAAG,IAAI,iBAAiB,CAAC,IAAI,CAAC,CAAC;QAErD,uDAAuD;QACvD,qDAAqD;QACrD,MAAM,aAAa,GAAG;YACpB,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;YAC1E,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;SAC3E,CAAC;QAEF,0BAA0B;QAC1B,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC5D,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,oCAAoC,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YACrG,CAAC;QACH,CAAC;QAED,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC;YACnC,MAAM,EAAE,aAAa;YACrB,qBAAqB,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB;YAC1D,MAAM,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM;SAC7B,CAAC,CAAC;QAGH,mCAAmC;QACnC,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;QACvC,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CAAC,IAAI,CAAC,CAAC;QAEjD,mDAAmD;QACnD,IAAI,CAAC,sBAAsB,GAAG,IAAI,sBAAsB,CAAC,IAAI,CAAC,CAAC;QAE/D,0BAA0B;QAC1B,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAAC,IAAI,CAAC,CAAC;QAEzC,6BAA6B;QAC7B,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CAAC,IAAI,CAAC,CAAC;QAEjD,oDAAoD;QACpD,IAAI,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;QAEnC,gCAAgC;QAChC,IAAI,CAAC,gBAAgB,GAAG,IAAI,gBAAgB,EAAE,CAAC;QAE/C,0EAA0E;QAC1E,IAAI,CAAC,gBAAgB,GAAG,IAAI,gBAAgB,CAAC,IAAI,EAAE;YACjD,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,gBAAgB;YACzD,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,gBAAgB;SAC1D,CAAC,CAAC;QAEH,2DAA2D;QAC3D,IAAI,CAAC,iBAAiB,GAAG,IAAI,iBAAiB,CAC5C,IAAI,CAAC,WAAW,EAChB,IAAI,CAAC,YAAY,EACjB,IAAI,CAAC,eAAe,EACpB,IAAI,CAAC,eAAe,EACpB,IAAI,EAAE,gCAAgC;QACtC,aAAa,CACd,CAAC;IACJ,CAAC;IAOD;;;OAGG;IACK,KAAK,CAAC,wBAAwB,CACpC,MAAsB,EACtB,YAAoB,SAAS,EAC7B,WAAiB,EACjB,YAAiD;QAEjD,MAAM,WAAW,GAAG,IAAI,gBAAgB,CAAC,MAAM,EAAE,SAAS,EAAE,WAAW,EAAE,YAAY,CAAC,CAAC;QAEvF,8DAA8D;QAC9D,WAAW,CAAC,uBAAuB,CAAC,KAAK,EAAE,MAAM,EAAE,EAAE;YACnD,MAAM,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;QAClC,CAAC,CAAC,CAAC;QAEH,sCAAsC;QACtC,IAAI,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;YACxC,WAAW,CAAC,YAAY,CAAC,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,CAAC,CAAC;QAChE,CAAC;QAED,6BAA6B;QAC7B,WAAW,CAAC,mBAAmB,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;QAEvD,gDAAgD;QAChD,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvB,WAAW,CAAC,qBAAqB,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;QACxD,CAAC;QAED,mEAAmE;QACnE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,WAAW,CAAC,wBAAwB,CAAC,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;QAC5E,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,QAAQ,CAAC,2BAA2B,KAAK,SAAS,EAAE,CAAC;YAC5D,WAAW,CAAC,8BAA8B,CAAC,IAAI,CAAC,QAAQ,CAAC,2BAA2B,CAAC,CAAC;QACxF,CAAC;QAED,MAAM,WAAW,CAAC,UAAU,EAAE,CAAC;QAC/B,OAAO,WAAW,CAAC;IACrB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B;QACxC,kEAAkE;QAClE,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACjD,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,CACrC,CAAC;QAEF,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,EAAE,CAAC;YAC3D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACrG,OAAO;QACT,CAAC;QAED,sCAAsC;QACtC,4CAA4C;QAC5C,iDAAiD;QACjD,6BAA6B;QAC7B,IAAI,WAAmF,CAAC;QAExF,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,KAAK,EAAE,CAAC;YAC9B,4BAA4B;YAC5B,WAAW,GAAG;gBACZ,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;gBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,KAAK;gBACxD,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,IAAI,EAAE;aACpC,CAAC;YACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kDAAkD,WAAW,CAAC,KAAK,EAAE,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;QAClI,CAAC;aAAM,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACjC,oCAAoC;YACpC,MAAM,aAAa,GAAG,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC;YACtE,IAAI,aAAa,EAAE,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,CAAC;gBACpC,MAAM,SAAS,GAAG,aAAa,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC;gBAChD,WAAW,GAAG;oBACZ,KAAK,EAAE,SAAS,CAAC,KAAK;oBACtB,aAAa,EAAE,SAAS,CAAC,aAAa,IAAI,KAAK;oBAC/C,IAAI,EAAE,SAAS,CAAC,aAAa,IAAI,EAAE;iBACpC,CAAC;gBACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oDAAoD,aAAa,CAAC,IAAI,iBAAiB,WAAW,CAAC,KAAK,EAAE,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACvK,CAAC;QACH,CAAC;QAED,0CAA0C;QAC1C,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CACb,iEAAiE;gBACjE,mCAAmC;gBACnC,qCAAqC;gBACrC,iDAAiD,CAClD,CAAC;QACJ,CAAC;QAED,wEAAwE;QACxE,IAAI,CAAC,WAAW,GAAG,MAAM,IAAI,CAAC,wBAAwB,CACpD,IAAI,CAAC,QAAQ,CAAC,MAAM,EACpB,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,gBAAgB,IAAI,SAAS,EACjD,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,mBAAmB;QACzB,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CACnC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW;YACzB,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,WAAW,KAAK,MAAM,CACpC,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,uCAAuC;QACvC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4DAA4D,CAAC,CAAC;YACjF,OAAO;QACT,CAAC;QAED,mCAAmC;QACnC,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,qBAAqB,EAAE,CAAC;QAEjE,mCAAmC;QACnC,MAAM,YAAY,GAAG,IAAI,CAAC,yBAAyB,EAAE,CAAC;QACtD,MAAM,WAAW,GAAG,CAAC,GAAG,cAAc,EAAE,GAAG,YAAY,CAAC,CAAC;QAEzD,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC3B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,GAAG,WAAW,CAAC,MAAM,+BAA+B,EAAE,EAAE,KAAK,EAAE,WAAW,CAAC,MAAM,EAAE,CAAC,CAAC;YACxG,KAAK,MAAM,OAAO,IAAI,WAAW,EAAE,CAAC;gBAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;YACnC,CAAC;QACH,CAAC;QAED,wCAAwC;QACxC,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,EAAE,CAAC;QAE7D,yDAAyD;QACzD,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAEpF,6BAA6B;QAC7B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,cAAc,CAAC,MAAM,WAAW,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,EAAE;YAC1G,SAAS,EAAE,cAAc,CAAC,MAAM;YAChC,KAAK,EAAE,cAAc;YACrB,SAAS,EAAE,aAAa;SACzB,CAAC,CAAC;QAEH,wDAAwD;QACxD,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;YACzC,IAAI,KAAK,CAAC,MAAM,CAAC,gBAAgB,KAAK,UAAU,EAAE,CAAC;gBACjD,MAAM,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YACnD,CAAC;QACH,CAAC;QAED,iEAAiE;QACjE,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,MAAM,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE,CAAC;YACxC,MAAM,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;QACrC,CAAC;QAED,qFAAqF;QACrF,wFAAwF;QACxF,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC;QAEhD,gEAAgE;QAChE,8EAA8E;QAC9E,MAAM,IAAI,CAAC,4BAA4B,EAAE,CAAC;QAE1C,mEAAmE;QACnE,IAAI,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;YAC5D,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,CAAC,CAAC;QACrE,CAAC;QAED,oEAAoE;QACpE,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4DAA4D,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACvH,MAAM,IAAI,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC;QACpD,CAAC;QAED,sEAAsE;QACtE,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAE9B,2DAA2D;QAC3D,IAAI,CAAC,gBAAgB,GAAG,WAAW,CAAC,GAAG,EAAE;YACvC,sCAAsC;YACtC,IAAI,IAAI,CAAC,cAAc;gBAAE,OAAO;YAEhC,2BAA2B;YAC3B,IAAI,CAAC,iBAAiB,CAAC,sBAAsB,EAAE,CAAC;YAEhD,4BAA4B;YAC5B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,cAAc,GAAG,CAAC,CAAC;YACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;YAC1B,IAAI,sBAAsB,GAAG,CAAC,CAAC;YAC/B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAE7B,sCAAsC;YACtC,MAAM,iBAAiB,GAAG,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,CAAC;YAElE,6BAA6B;YAC7B,KAAK,MAAM,MAAM,IAAI,iBAAiB,CAAC,MAAM,EAAE,EAAE,CAAC;gBAChD,yBAAyB;gBACzB,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,cAAc,EAAE,CAAC;oBACjB,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;wBAChC,sBAAsB,EAAE,CAAC;oBAC3B,CAAC;yBAAM,CAAC;wBACN,oBAAoB,EAAE,CAAC;oBACzB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,iBAAiB,EAAE,CAAC;gBACtB,CAAC;gBAED,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;oBACxB,oBAAoB,EAAE,CAAC;gBACzB,CAAC;gBAED,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,oBAAoB,EAAE,CAAC;gBACzB,CAAC;gBAED,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACpE,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACtE,CAAC;YACH,CAAC;YAED,wBAAwB;YACxB,MAAM,gBAAgB,GAAG,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,CAAC;YAEtE,qBAAqB;YACrB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,EAAE;gBAC1C,iBAAiB,EAAE,iBAAiB,CAAC,IAAI;gBACzC,GAAG,EAAE;oBACH,KAAK,EAAE,cAAc;oBACrB,SAAS,EAAE,sBAAsB;oBACjC,OAAO,EAAE,oBAAoB;iBAC9B;gBACD,MAAM,EAAE,iBAAiB;gBACzB,SAAS,EAAE,oBAAoB;gBAC/B,SAAS,EAAE,oBAAoB;gBAC/B,cAAc,EAAE;oBACd,QAAQ,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC;oBACvC,QAAQ,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC;iBACxC;gBACD,gBAAgB,EAAE;oBAChB,QAAQ,EAAE,gBAAgB,CAAC,QAAQ;oBACnC,QAAQ,EAAE,gBAAgB,CAAC,QAAQ;iBACpC;gBACD,SAAS,EAAE,oBAAoB;aAChC,CAAC,CAAC;QACL,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,uBAAuB,IAAI,KAAK,CAAC,CAAC;QAEnD,wDAAwD;QACxD,IAAI,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;YAChC,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;;;OAIG;IAEH;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,CAAC,CAAC;QAClD,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAC3B,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;QAEvC,2BAA2B;QAC3B,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;YAC9B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,CAAC,CAAC;QACpD,CAAC;QAED,uBAAuB;QACvB,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,EAAE,CAAC;QAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,CAAC,CAAC;QAE9C,6BAA6B;QAC7B,IAAI,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAC1B,aAAa,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACrC,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC;QAC/B,CAAC;QAED,0BAA0B;QAC1B,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,EAAE,CAAC;QAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uDAAuD,CAAC,CAAC;QAE5E,kCAAkC;QAClC,MAAM,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,CAAC;QAEhD,iBAAiB;QACjB,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,EAAE,CAAC;QAElC,2BAA2B;QAC3B,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAE9B,yBAAyB;QACzB,IAAI,CAAC,gBAAgB,CAAC,IAAI,EAAE,CAAC;QAE7B,sCAAsC;QACtC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,0BAA0B,CAAC,CAAC;QAC3D,SAAS,CAAC,gBAAgB,CAAC,OAAO,EAAE,CAAC;QAErC,sCAAsC;QACtC,yBAAyB,CAAC,QAAQ,EAAE,CAAC;QAErC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;IACtD,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,mBAAmB;QAC9B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yEAAyE,CAAC,CAAC;QAC9F,MAAM,IAAI,KAAK,CAAC,kEAAkE,CAAC,CAAC;IACtF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,2BAA2B;QACvC,MAAM,UAAU,GAAG,EAAE,CAAC;QACtB,MAAM,UAAU,GAAG,GAAG,CAAC,CAAC,eAAe;QAEvC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,CAAC,EAAE,EAAE,CAAC;YACpC,6DAA6D;YAC7D,MAAM,oBAAoB,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,gBAAgB,CAAC,CAAC;YAEzF,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC1B,IAAI,CAAC;oBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kDAAkD,CAAC,CAAC;gBACzE,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,iCAAiC;oBACjC,OAAO,CAAC,GAAG,CAAC,yDAAyD,CAAC,CAAC;gBACzE,CAAC;gBACD,OAAO;YACT,CAAC;YAED,uBAAuB;YACvB,MAAM,OAAO,CAAC,UAAU,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;QAChD,CAAC;QAED,MAAM,KAAK,GAAG,kDAAkD,UAAU,WAAW,CAAC;QACtF,IAAI,CAAC;YACH,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;QAC7B,CAAC;QAAC,OAAO,QAAQ,EAAE,CAAC;YAClB,iCAAiC;YACjC,OAAO,CAAC,GAAG,CAAC,WAAW,KAAK,EAAE,CAAC,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC;IACzB,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACI,KAAK,CAAC,YAAY,CAAC,SAAyB;QACjD,OAAO,IAAI,CAAC,eAAe,CAAC,YAAY,CAAC,KAAK,IAAI,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oBAAoB,SAAS,CAAC,MAAM,UAAU,EAAE;oBACjE,UAAU,EAAE,SAAS,CAAC,MAAM;oBAC5B,SAAS,EAAE,aAAa;iBACzB,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,2BAA2B,SAAS,CAAC,MAAM,UAAU,CAAC,CAAC;YACrE,CAAC;YAED,iEAAiE;YACjE,IAAI,IAAI,CAAC,WAAW,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,EAAE,CAAC;gBACjE,IAAI,CAAC,iBAAiB,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YAC1D,CAAC;YAED,+DAA+D;YAC/D,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,YAAY,CAC5D,IAAI,CAAC,QAAQ,CAAC,MAAM,EACpB,SAAS,EACT;gBACE,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,IAAI,EAAE;gBACxC,WAAW,EAAE,IAAI,CAAC,WAAW,EAAE,cAAc,EAAE;gBAC/C,SAAS,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,EAAE;gBACvC,0BAA0B,EAAE,IAAI,CAAC,0BAA0B;gBAC3D,wBAAwB,EAAE,IAAI,CAAC,wBAAwB,CAAC,IAAI,CAAC,IAAI,CAAC;gBAClE,2BAA2B,EAAE,IAAI,CAAC,2BAA2B,CAAC,IAAI,CAAC,IAAI,CAAC;aACzE,CACF,CAAC;YAEF,sCAAsC;YACtC,IAAI,CAAC,QAAQ,CAAC,MAAM,GAAG,SAAS,CAAC;YAEjC,gDAAgD;YAChD,IAAI,CAAC,0BAA0B,GAAG,YAAY,CAAC,uBAAuB,CAAC;YAEvE,0CAA0C;YAC1C,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC,YAAY,CAAC;YAE9C,6DAA6D;YAC7D,IAAI,YAAY,CAAC,cAAc,EAAE,CAAC;gBAChC,IAAI,CAAC,WAAW,GAAG,YAAY,CAAC,cAAc,CAAC;gBAC/C,0CAA0C;gBAC1C,IAAI,CAAC,iBAAiB,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,SAAiB;QACjD,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;QACnE,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,SAAS,SAAS,YAAY,CAAC,CAAC;QAClD,CAAC;QAED,MAAM,IAAI,CAAC,WAAW,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;IACrD,CAAC;IAED,yDAAyD;IAEzD;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,SAAiB;QAC7C,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,MAAM,IAAI,CAAC,WAAW,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAED;;OAEG;IACI,oBAAoB,CAAC,SAAiB;QAC3C,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACtB,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,OAAO,IAAI,CAAC,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IAC1D,CAAC;IAED;;;;OAIG;IACI,UAAU;QACf,OAAO,IAAI,CAAC,gBAAgB,CAAC;IAC/B,CAAC;IAED;;OAEG;IACK,aAAa,CAAC,MAAc;QAClC,+BAA+B;QAC/B,IAAI,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACnC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,yDAAyD;QACzD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,MAAM,qDAAqD,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACxJ,OAAO,KAAK,CAAC;QACf,CAAC;QAED,iEAAiE;QACjE,MAAM,gBAAgB,GAAG,+FAA+F,CAAC;QACzH,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,WAAW,MAAM,+CAA+C,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACnI,OAAO,KAAK,CAAC;QACf,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;OAQG;IACI,KAAK,CAAC,gBAAgB,CAAC,IAAY;QACxC,OAAO,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;IACxC,CAAC;IAED;;;;;;;;OAQG;IACI,KAAK,CAAC,mBAAmB,CAAC,IAAY;QAC3C,OAAO,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;;;OAIG;IACI,iBAAiB;QACtB,OAAO,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE,CAAC;IAC9C,CAAC;IAED;;OAEG;IACI,aAAa;QAClB,MAAM,iBAAiB,GAAG,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,CAAC;QAClE,MAAM,gBAAgB,GAAG,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,CAAC;QAEtE,IAAI,cAAc,GAAG,CAAC,CAAC;QACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;QAC1B,IAAI,oBAAoB,GAAG,CAAC,CAAC;QAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;QAE7B,6BAA6B;QAC7B,KAAK,MAAM,MAAM,IAAI,iBAAiB,CAAC,MAAM,EAAE,EAAE,CAAC;YAChD,IAAI,MAAM,CAAC,KAAK;gBAAE,cAAc,EAAE,CAAC;;gBAC9B,iBAAiB,EAAE,CAAC;YACzB,IAAI,MAAM,CAAC,YAAY;gBAAE,oBAAoB,EAAE,CAAC;YAChD,IAAI,MAAM,CAAC,iBAAiB;gBAAE,oBAAoB,EAAE,CAAC;QACvD,CAAC;QAED,OAAO;YACL,iBAAiB,EAAE,iBAAiB,CAAC,IAAI;YACzC,cAAc;YACd,iBAAiB;YACjB,oBAAoB;YACpB,oBAAoB;YACpB,gBAAgB;YAChB,WAAW,EAAE,CAAC,CAAC,IAAI,CAAC,WAAW;YAC/B,iBAAiB,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI;YAC/C,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM;YACvC,WAAW,EAAE,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE,CAAC,MAAM;YACxD,cAAc,EAAE,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE;SACrD,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,iCAAiC;QACtC,MAAM,OAAO,GAAa,EAAE,CAAC;QAE7B,0BAA0B;QAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,EAAE,CAAC;QAE1C,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBAAE,SAAS;YAEnC,2DAA2D;YAC3D,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG;gBACjB,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,aAAa;gBACvC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,WAAW,KAAK,MAAM;gBAAE,SAAS;YAEtD,MAAM,YAAY,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;gBACrD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YAE1B,4CAA4C;YAC5C,MAAM,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CACnD,CAAC,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CACpD,CAAC;YAEF,OAAO,CAAC,IAAI,CAAC,GAAG,eAAe,CAAC,CAAC;QACnC,CAAC;QAED,qCAAqC;QAErC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB;QAC5B,OAAO,IAAI,CAAC,eAAe,CAAC,SAAS,EAAE,CAAC;IAC1C,CAAC;IAED;;OAEG;IACK,yBAAyB;QAC/B,MAAM,QAAQ,GAAa,EAAE,CAAC;QAE9B,4CAA4C;QAC5C,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACjD,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,CACrC,CAAC;QAEF,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,OAAO,QAAQ,CAAC;QAClB,CAAC;QAED,4CAA4C;QAC5C,MAAM,gBAAgB,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,KAAK,CAAC;QACnD,MAAM,eAAe,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC;QAE1E,IAAI,CAAC,gBAAgB,IAAI,eAAe,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtD,QAAQ,CAAC,IAAI,CACX,oEAAoE;gBACpE,uFAAuF,CACxF,CAAC;QACJ,CAAC;QAED,gDAAgD;QAChD,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,aAAa,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,IAAI,EAAE,CAAC;YACrD,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,EAAE,CAAC;YAEzD,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;gBACxC,QAAQ,CAAC,IAAI,CACX,QAAQ,aAAa,uEAAuE;oBAC5F,iCAAiC,aAAa,oDAAoD,CACnG,CAAC;YACJ,CAAC;QACH,CAAC;QAED,oCAAoC;QACpC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,aAAa,EAAE,CAAC;YACtC,MAAM,aAAa,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAC1C,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,aAAa,KAAK,KAAK,CAC5C,CAAC;YACF,IAAI,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC7B,QAAQ,CAAC,IAAI,CACX,8DAA8D;oBAC9D,6DAA6D,CAC9D,CAAC;YACJ,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;YAC/B,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;gBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YAE1B,MAAM,eAAe,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC;YAC9D,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC/B,QAAQ,CAAC,IAAI,CACX,UAAU,KAAK,CAAC,IAAI,4BAA4B,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;oBAC7E,6EAA6E;oBAC7E,qEAAqE,CACtE,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAEF"}
349
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"smart-proxy.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/smart-proxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AAEpD,0BAA0B;AAC1B,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAE,iBAAiB,EAAE,MAAM,0BAA0B,CAAC;AAC7D,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACjE,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAE/D,mBAAmB;AACnB,OAAO,EAAE,kBAAkB,IAAI,YAAY,EAAE,MAAM,qCAAqC,CAAC;AACzF,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAC5D,OAAO,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAOzC;;;;;;;;;GASG;AACH,MAAM,OAAO,UAAW,SAAQ,OAAO,CAAC,YAAY;IAWlD,YAAY,WAA+B;QACzC,KAAK,EAAE,CAAC;QANF,wBAAmB,GAA+B,IAAI,CAAC;QAGvD,aAAQ,GAAG,KAAK,CAAC;QAKvB,iBAAiB;QACjB,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,WAAW;YACd,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,MAAM;YAC5D,aAAa,EAAE,WAAW,CAAC,aAAa,IAAI,OAAO;YACnD,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,QAAQ;YACpE,iBAAiB,EAAE,WAAW,CAAC,iBAAiB,IAAI,QAAQ;YAC5D,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,mBAAmB,EAAE,WAAW,CAAC,mBAAmB,IAAI,GAAG;YAC3D,4BAA4B,EAAE,WAAW,CAAC,4BAA4B,IAAI,GAAG;YAC7E,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,UAAU;YAChE,6BAA6B,EAAE,WAAW,CAAC,6BAA6B,IAAI,CAAC;YAC7E,yBAAyB,EAAE,WAAW,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI;SAC5F,CAAC;QAEF,yBAAyB;QACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACjE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC;YAC7D,CAAC;YACD,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG;gBACnB,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,KAAK,KAAK;gBAC7C,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,IAAI,EAAE;gBACnC,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;gBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,KAAK;gBACxD,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,EAAE;gBAC/D,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,KAAK,KAAK;gBACjD,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,SAAS;gBAClE,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,mBAAmB,IAAI,KAAK;gBACpE,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAuB,IAAI,EAAE;gBACzE,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,EAAE;gBACrD,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI;aACtB,CAAC;QACJ,CAAC;QAED,kBAAkB;QAClB,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC;YACjC,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,oCAAoC,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YACrG,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,MAAM,aAAa,GAAG;YACpB,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;YAC1E,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;SAC3E,CAAC;QAEF,wBAAwB;QACxB,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC;YACnC,MAAM,EAAE,aAAa;YACrB,qBAAqB,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB;YAC1D,MAAM,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM;SAC7B,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,GAAG,IAAI,eAAe,EAAE,CAAC;QACpC,IAAI,CAAC,YAAY,GAAG,IAAI,iBAAiB,EAAE,CAAC;QAC5C,IAAI,CAAC,cAAc,GAAG,IAAI,kBAAkB,CAC1C,IAAI,CAAC,MAAM,EACX,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,gBAAgB,IAAI,IAAI,CAChD,CAAC;QACF,IAAI,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;IACrC,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,KAAK;QAChB,oBAAoB;QACpB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;QAC1C,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CACb,gGAAgG;gBAChG,yDAAyD,CAC1D,CAAC;QACJ,CAAC;QAED,0EAA0E;QAC1E,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAmB,EAAE,MAAqB,EAAE,EAAE;YACpE,IAAI,IAAI,CAAC,QAAQ;gBAAE,OAAO;YAC1B,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,IAAI,YAAY,MAAM,GAAG,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;YACpH,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,IAAI,KAAK,CAAC,0BAA0B,IAAI,YAAY,MAAM,GAAG,CAAC,CAAC,CAAC;QACrF,CAAC,CAAC,CAAC;QAEH,iFAAiF;QACjF,MAAM,gBAAgB,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAChD,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,KAAK,gBAAgB,IAAI,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC;YAC9D,CAAC,CAAC,MAAM,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,IAAI,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,CAAC,CAC9F,CAAC;QAEF,kFAAkF;QAClF,IAAI,gBAAgB,EAAE,CAAC;YACrB,IAAI,CAAC,mBAAmB,GAAG,IAAI,mBAAmB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACtE,MAAM,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;QACzC,CAAC;QAED,wEAAwE;QACxE,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE7E,oBAAoB;QACpB,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;QAEhD,uBAAuB;QACvB,MAAM,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;QAErC,iEAAiE;QACjE,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,EAAE,CAAC,CAAC;QACpF,CAAC;QAED,+BAA+B;QAC/B,MAAM,IAAI,CAAC,gCAAgC,EAAE,CAAC;QAE9C,wBAAwB;QACxB,IAAI,CAAC,cAAc,CAAC,YAAY,EAAE,CAAC;QAEnC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;IACvF,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;QAChF,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC;QAErB,uBAAuB;QACvB,IAAI,CAAC,cAAc,CAAC,WAAW,EAAE,CAAC;QAElC,qEAAqE;QACrE,IAAI,CAAC,MAAM,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAEvC,kBAAkB;QAClB,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;QAChC,CAAC;QAAC,MAAM,CAAC;YACP,4BAA4B;QAC9B,CAAC;QACD,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;QAEnB,4BAA4B;QAC5B,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,mBAAmB,CAAC,IAAI,EAAE,CAAC;YACtC,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC;QAClC,CAAC;QAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;IACpF,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,SAAyB;QACjD,OAAO,IAAI,CAAC,eAAe,CAAC,YAAY,CAAC,KAAK,IAAI,EAAE;YAClD,WAAW;YACX,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC5D,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,4BAA4B,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YAC7F,CAAC;YAED,sBAAsB;YACtB,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAElE,eAAe;YACf,MAAM,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,UAAU,CAAC,CAAC;YAE3C,6BAA6B;YAC7B,IAAI,CAAC,YAAY,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;YAE1C,wDAAwD;YACxD,MAAM,gBAAgB,GAAG,SAAS,CAAC,IAAI,CACrC,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,KAAK,gBAAgB,IAAI,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC;gBAC9D,CAAC,CAAC,MAAM,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,IAAI,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,CAAC,CAC9F,CAAC;YAEF,IAAI,gBAAgB,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBAClD,IAAI,CAAC,mBAAmB,GAAG,IAAI,mBAAmB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBACtE,MAAM,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;gBACvC,MAAM,IAAI,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,EAAE,CAAC,CAAC;YACpF,CAAC;iBAAM,IAAI,CAAC,gBAAgB,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzD,MAAM,IAAI,CAAC,mBAAmB,CAAC,IAAI,EAAE,CAAC;gBACtC,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC;YAClC,CAAC;YAED,uBAAuB;YACvB,IAAI,CAAC,QAAQ,CAAC,MAAM,GAAG,SAAS,CAAC;YAEjC,0CAA0C;YAC1C,MAAM,IAAI,CAAC,gCAAgC,EAAE,CAAC;YAE9C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mBAAmB,SAAS,CAAC,MAAM,UAAU,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;QAClG,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,SAAiB;QACjD,MAAM,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACpD,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,SAAiB;QAC7C,MAAM,IAAI,CAAC,MAAM,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,SAAiB;QACjD,OAAO,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAED;;OAEG;IACI,UAAU;QACf,OAAO,IAAI,CAAC,cAAc,CAAC;IAC7B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,aAAa;QACxB,OAAO,IAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,IAAY;QACxC,MAAM,IAAI,CAAC,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,mBAAmB,CAAC,IAAY;QAC3C,MAAM,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;IAC9C,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB;QAC5B,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO;YAAE,OAAO,EAAE,CAAC;QACpC,OAAO,IAAI,CAAC,MAAM,CAAC,iBAAiB,EAAE,CAAC;IACzC,CAAC;IAED;;OAEG;IACI,iCAAiC;QACtC,MAAM,OAAO,GAAa,EAAE,CAAC;QAC7B,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,EAAE,EAAE,CAAC;YAC/C,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBAAE,SAAS;YACnC,IACE,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG;gBACjB,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,aAAa;gBACvC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,WAAW,KAAK,MAAM;gBAEvC,SAAS;YAEX,MAAM,YAAY,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YACtG,MAAM,QAAQ,GAAG,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;YACvF,OAAO,CAAC,IAAI,CAAC,GAAG,QAAQ,CAAC,CAAC;QAC5B,CAAC;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB;QAC5B,OAAO,IAAI,CAAC,MAAM,CAAC,iBAAiB,EAAE,CAAC;IACzC,CAAC;IAED,0BAA0B;IAE1B;;OAEG;IACK,eAAe,CAAC,MAAsB;QAC5C,OAAO;YACL,MAAM;YACN,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ;YAChC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI;gBACtB,CAAC,CAAC;oBACE,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO;oBACnC,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;oBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa;oBAC/C,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI;oBAC7B,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,kBAAkB;oBACzD,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS;oBACvC,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,gBAAgB;oBACrD,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAuB;iBACpE;gBACH,CAAC,CAAC,SAAS;YACb,iBAAiB,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;YAClD,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAkB;YACpD,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,aAAa;YAC1C,qBAAqB,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB;YAC1D,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,uBAAuB;YAC9D,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,mBAAmB;YACtD,4BAA4B,EAAE,IAAI,CAAC,QAAQ,CAAC,4BAA4B;YACxE,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAkB;YACpD,6BAA6B,EAAE,IAAI,CAAC,QAAQ,CAAC,6BAA6B;YAC1E,yBAAyB,EAAE,IAAI,CAAC,QAAQ,CAAC,yBAAyB;YAClE,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,mBAAmB;YACtD,iBAAiB,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;SACnD,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,gCAAgC;QAC5C,MAAM,WAAW,GAAG,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC;QACxD,IAAI,CAAC,WAAW;YAAE,OAAO;QAEzB,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;YACzC,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM;gBAAE,SAAS;YACvD,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBAAE,SAAS;YAEnC,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YAEjG,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;gBAC7B,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC;oBAAE,SAAS;gBAEnC,IAAI,CAAC;oBACH,MAAM,MAAM,GAAmC,MAAM,WAAW,CAAC,MAAM,CAAC,CAAC;oBAEzE,IAAI,MAAM,KAAK,QAAQ,EAAE,CAAC;wBACxB,oCAAoC;wBACpC,SAAS;oBACX,CAAC;oBAED,+CAA+C;oBAC/C,IAAI,MAAM,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;wBACzC,MAAM,OAAO,GAAG,MAAuC,CAAC;wBACxD,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAC/B,MAAM,EACN,OAAO,CAAC,SAAS,EACjB,OAAO,CAAC,UAAU,CACnB,CAAC;wBACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iDAAiD,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;oBAC9G,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAQ,EAAE,CAAC;oBAClB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,MAAM,KAAK,GAAG,CAAC,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;oBAE/G,8BAA8B;oBAC9B,IAAI,IAAI,CAAC,QAAQ,CAAC,2BAA2B,KAAK,KAAK,EAAE,CAAC;wBACxD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;oBACzF,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAEO,aAAa,CAAC,MAAc;QAClC,IAAI,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC;YAAE,OAAO,KAAK,CAAC;QACjD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC;YAAE,OAAO,KAAK,CAAC;QACvC,MAAM,gBAAgB,GACpB,+FAA+F,CAAC;QAClG,OAAO,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IACvC,CAAC;CACF"}