@push.rocks/smartproxy 22.4.2 → 23.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (101) hide show
  1. package/changelog.md +36 -0
  2. package/dist_rust/rustproxy +0 -0
  3. package/dist_ts/00_commitinfo_data.js +1 -1
  4. package/dist_ts/index.d.ts +1 -6
  5. package/dist_ts/index.js +3 -11
  6. package/dist_ts/protocols/common/fragment-handler.js +5 -1
  7. package/dist_ts/proxies/index.d.ts +1 -6
  8. package/dist_ts/proxies/index.js +2 -8
  9. package/dist_ts/proxies/smart-proxy/index.d.ts +5 -10
  10. package/dist_ts/proxies/smart-proxy/index.js +7 -13
  11. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -2
  12. package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
  13. package/dist_ts/proxies/smart-proxy/route-preprocessor.d.ts +37 -0
  14. package/dist_ts/proxies/smart-proxy/route-preprocessor.js +103 -0
  15. package/dist_ts/proxies/smart-proxy/rust-binary-locator.d.ts +23 -0
  16. package/dist_ts/proxies/smart-proxy/rust-binary-locator.js +104 -0
  17. package/dist_ts/proxies/smart-proxy/rust-metrics-adapter.d.ts +74 -0
  18. package/dist_ts/proxies/smart-proxy/rust-metrics-adapter.js +146 -0
  19. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.d.ts +49 -0
  20. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.js +259 -0
  21. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +39 -157
  22. package/dist_ts/proxies/smart-proxy/smart-proxy.js +224 -621
  23. package/dist_ts/proxies/smart-proxy/socket-handler-server.d.ts +45 -0
  24. package/dist_ts/proxies/smart-proxy/socket-handler-server.js +253 -0
  25. package/dist_ts/routing/index.d.ts +1 -1
  26. package/dist_ts/routing/index.js +3 -3
  27. package/dist_ts/routing/models/http-types.d.ts +119 -4
  28. package/dist_ts/routing/models/http-types.js +93 -5
  29. package/package.json +1 -1
  30. package/readme.md +444 -219
  31. package/ts/00_commitinfo_data.ts +1 -1
  32. package/ts/index.ts +4 -15
  33. package/ts/protocols/common/fragment-handler.ts +4 -0
  34. package/ts/proxies/index.ts +1 -12
  35. package/ts/proxies/smart-proxy/index.ts +6 -13
  36. package/ts/proxies/smart-proxy/models/interfaces.ts +6 -4
  37. package/ts/proxies/smart-proxy/models/route-types.ts +0 -2
  38. package/ts/proxies/smart-proxy/route-preprocessor.ts +122 -0
  39. package/ts/proxies/smart-proxy/rust-binary-locator.ts +112 -0
  40. package/ts/proxies/smart-proxy/rust-metrics-adapter.ts +161 -0
  41. package/ts/proxies/smart-proxy/rust-proxy-bridge.ts +310 -0
  42. package/ts/proxies/smart-proxy/smart-proxy.ts +282 -798
  43. package/ts/proxies/smart-proxy/socket-handler-server.ts +279 -0
  44. package/ts/routing/index.ts +2 -2
  45. package/ts/routing/models/http-types.ts +147 -4
  46. package/dist_ts/proxies/nftables-proxy/index.d.ts +0 -6
  47. package/dist_ts/proxies/nftables-proxy/index.js +0 -7
  48. package/dist_ts/proxies/nftables-proxy/models/errors.d.ts +0 -15
  49. package/dist_ts/proxies/nftables-proxy/models/errors.js +0 -28
  50. package/dist_ts/proxies/nftables-proxy/models/index.d.ts +0 -5
  51. package/dist_ts/proxies/nftables-proxy/models/index.js +0 -6
  52. package/dist_ts/proxies/nftables-proxy/models/interfaces.d.ts +0 -75
  53. package/dist_ts/proxies/nftables-proxy/models/interfaces.js +0 -5
  54. package/dist_ts/proxies/nftables-proxy/nftables-proxy.d.ts +0 -124
  55. package/dist_ts/proxies/nftables-proxy/nftables-proxy.js +0 -1374
  56. package/dist_ts/proxies/nftables-proxy/utils/index.d.ts +0 -9
  57. package/dist_ts/proxies/nftables-proxy/utils/index.js +0 -12
  58. package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.d.ts +0 -66
  59. package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.js +0 -131
  60. package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.d.ts +0 -39
  61. package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.js +0 -112
  62. package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.d.ts +0 -59
  63. package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.js +0 -130
  64. package/ts/proxies/http-proxy/connection-pool.ts +0 -228
  65. package/ts/proxies/http-proxy/context-creator.ts +0 -145
  66. package/ts/proxies/http-proxy/default-certificates.ts +0 -150
  67. package/ts/proxies/http-proxy/function-cache.ts +0 -279
  68. package/ts/proxies/http-proxy/handlers/index.ts +0 -5
  69. package/ts/proxies/http-proxy/http-proxy.ts +0 -669
  70. package/ts/proxies/http-proxy/http-request-handler.ts +0 -331
  71. package/ts/proxies/http-proxy/http2-request-handler.ts +0 -255
  72. package/ts/proxies/http-proxy/index.ts +0 -18
  73. package/ts/proxies/http-proxy/models/http-types.ts +0 -148
  74. package/ts/proxies/http-proxy/models/index.ts +0 -5
  75. package/ts/proxies/http-proxy/models/types.ts +0 -125
  76. package/ts/proxies/http-proxy/request-handler.ts +0 -878
  77. package/ts/proxies/http-proxy/security-manager.ts +0 -413
  78. package/ts/proxies/http-proxy/websocket-handler.ts +0 -581
  79. package/ts/proxies/nftables-proxy/index.ts +0 -6
  80. package/ts/proxies/nftables-proxy/models/errors.ts +0 -30
  81. package/ts/proxies/nftables-proxy/models/index.ts +0 -5
  82. package/ts/proxies/nftables-proxy/models/interfaces.ts +0 -94
  83. package/ts/proxies/nftables-proxy/nftables-proxy.ts +0 -1754
  84. package/ts/proxies/nftables-proxy/utils/index.ts +0 -38
  85. package/ts/proxies/nftables-proxy/utils/nft-command-executor.ts +0 -162
  86. package/ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.ts +0 -125
  87. package/ts/proxies/nftables-proxy/utils/nft-rule-validator.ts +0 -156
  88. package/ts/proxies/smart-proxy/acme-state-manager.ts +0 -112
  89. package/ts/proxies/smart-proxy/cert-store.ts +0 -92
  90. package/ts/proxies/smart-proxy/certificate-manager.ts +0 -895
  91. package/ts/proxies/smart-proxy/connection-manager.ts +0 -809
  92. package/ts/proxies/smart-proxy/http-proxy-bridge.ts +0 -213
  93. package/ts/proxies/smart-proxy/metrics-collector.ts +0 -453
  94. package/ts/proxies/smart-proxy/nftables-manager.ts +0 -271
  95. package/ts/proxies/smart-proxy/port-manager.ts +0 -358
  96. package/ts/proxies/smart-proxy/route-connection-handler.ts +0 -1712
  97. package/ts/proxies/smart-proxy/route-orchestrator.ts +0 -297
  98. package/ts/proxies/smart-proxy/security-manager.ts +0 -269
  99. package/ts/proxies/smart-proxy/throughput-tracker.ts +0 -138
  100. package/ts/proxies/smart-proxy/timeout-manager.ts +0 -196
  101. package/ts/proxies/smart-proxy/tls-manager.ts +0 -171
@@ -1,746 +1,349 @@
1
1
  import * as plugins from '../../plugins.js';
2
2
  import { logger } from '../../core/utils/logger.js';
3
- import { connectionLogDeduplicator } from '../../core/utils/log-deduplicator.js';
4
- // Importing required components
5
- import { ConnectionManager } from './connection-manager.js';
6
- import { SecurityManager } from './security-manager.js';
7
- import { TlsManager } from './tls-manager.js';
8
- import { HttpProxyBridge } from './http-proxy-bridge.js';
9
- import { TimeoutManager } from './timeout-manager.js';
10
- import { PortManager } from './port-manager.js';
3
+ // Rust bridge and helpers
4
+ import { RustProxyBridge } from './rust-proxy-bridge.js';
5
+ import { RustBinaryLocator } from './rust-binary-locator.js';
6
+ import { RoutePreprocessor } from './route-preprocessor.js';
7
+ import { SocketHandlerServer } from './socket-handler-server.js';
8
+ import { RustMetricsAdapter } from './rust-metrics-adapter.js';
9
+ // Route management
11
10
  import { SharedRouteManager as RouteManager } from '../../core/routing/route-manager.js';
12
- import { RouteConnectionHandler } from './route-connection-handler.js';
13
- import { NFTablesManager } from './nftables-manager.js';
14
- // Certificate manager
15
- import { SmartCertManager } from './certificate-manager.js';
16
- // Import mutex for route update synchronization
17
- import { Mutex } from './utils/mutex.js';
18
- // Import route validator
19
11
  import { RouteValidator } from './utils/route-validator.js';
20
- // Import route orchestrator for route management
21
- import { RouteOrchestrator } from './route-orchestrator.js';
22
- // Import ACME state manager
23
- import { AcmeStateManager } from './acme-state-manager.js';
24
- // Import metrics collector
25
- import { MetricsCollector } from './metrics-collector.js';
12
+ import { Mutex } from './utils/mutex.js';
26
13
  /**
27
- * SmartProxy - Pure route-based API
14
+ * SmartProxy - Rust-backed proxy engine with TypeScript configuration API.
28
15
  *
29
- * SmartProxy is a unified proxy system that works with routes to define connection handling behavior.
30
- * Each route contains matching criteria (ports, domains, etc.) and an action to take (forward, redirect, block).
31
- *
32
- * Configuration is provided through a set of routes, with each route defining:
33
- * - What to match (ports, domains, paths, client IPs)
34
- * - What to do with matching traffic (forward, redirect, block)
35
- * - How to handle TLS (passthrough, terminate, terminate-and-reencrypt)
36
- * - Security settings (IP restrictions, connection limits)
37
- * - Advanced options (timeout, headers, etc.)
16
+ * All networking (TCP, TLS, HTTP reverse proxy, connection management, security,
17
+ * NFTables) is handled by the Rust binary. TypeScript is only:
18
+ * - The npm module interface (types, route helpers)
19
+ * - The thin IPC wrapper (this class)
20
+ * - Socket-handler callback relay (for JS-defined handlers)
21
+ * - Certificate provisioning callbacks (certProvisionFunction)
38
22
  */
39
23
  export class SmartProxy extends plugins.EventEmitter {
40
- /**
41
- * Constructor for SmartProxy
42
- *
43
- * @param settingsArg Configuration options containing routes and other settings
44
- * Routes define how traffic is matched and handled, with each route having:
45
- * - match: criteria for matching traffic (ports, domains, paths, IPs)
46
- * - action: what to do with matched traffic (forward, redirect, block)
47
- *
48
- * Example:
49
- * ```ts
50
- * const proxy = new SmartProxy({
51
- * routes: [
52
- * {
53
- * match: {
54
- * ports: 443,
55
- * domains: ['example.com', '*.example.com']
56
- * },
57
- * action: {
58
- * type: 'forward',
59
- * target: { host: '10.0.0.1', port: 8443 },
60
- * tls: { mode: 'passthrough' }
61
- * }
62
- * }
63
- * ],
64
- * defaults: {
65
- * target: { host: 'localhost', port: 8080 },
66
- * security: { ipAllowList: ['*'] }
67
- * }
68
- * });
69
- * ```
70
- */
71
24
  constructor(settingsArg) {
72
25
  super();
73
- this.connectionLogger = null;
74
- this.isShuttingDown = false;
75
- // Certificate manager for ACME and static certificates
76
- this.certManager = null;
77
- // Global challenge route tracking
78
- this.globalChallengeRouteActive = false;
79
- // Track port usage across route updates
80
- this.portUsageMap = new Map();
81
- // Set reasonable defaults for all settings
26
+ this.socketHandlerServer = null;
27
+ this.stopping = false;
28
+ // Apply defaults
82
29
  this.settings = {
83
30
  ...settingsArg,
84
31
  initialDataTimeout: settingsArg.initialDataTimeout || 120000,
85
32
  socketTimeout: settingsArg.socketTimeout || 3600000,
86
- inactivityCheckInterval: settingsArg.inactivityCheckInterval || 60000,
87
33
  maxConnectionLifetime: settingsArg.maxConnectionLifetime || 86400000,
88
34
  inactivityTimeout: settingsArg.inactivityTimeout || 14400000,
89
35
  gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000,
90
- noDelay: settingsArg.noDelay !== undefined ? settingsArg.noDelay : true,
91
- keepAlive: settingsArg.keepAlive !== undefined ? settingsArg.keepAlive : true,
92
- keepAliveInitialDelay: settingsArg.keepAliveInitialDelay || 10000,
93
- maxPendingDataSize: settingsArg.maxPendingDataSize || 10 * 1024 * 1024,
94
- disableInactivityCheck: settingsArg.disableInactivityCheck || false,
95
- enableKeepAliveProbes: settingsArg.enableKeepAliveProbes !== undefined ? settingsArg.enableKeepAliveProbes : true,
96
- enableDetailedLogging: settingsArg.enableDetailedLogging || false,
97
- enableTlsDebugLogging: settingsArg.enableTlsDebugLogging || false,
98
- enableRandomizedTimeouts: settingsArg.enableRandomizedTimeouts || false,
99
36
  maxConnectionsPerIP: settingsArg.maxConnectionsPerIP || 100,
100
37
  connectionRateLimitPerMinute: settingsArg.connectionRateLimitPerMinute || 300,
101
38
  keepAliveTreatment: settingsArg.keepAliveTreatment || 'extended',
102
39
  keepAliveInactivityMultiplier: settingsArg.keepAliveInactivityMultiplier || 6,
103
40
  extendedKeepAliveLifetime: settingsArg.extendedKeepAliveLifetime || 7 * 24 * 60 * 60 * 1000,
104
- httpProxyPort: settingsArg.httpProxyPort || 8443,
105
41
  };
106
- // Normalize ACME options if provided (support both email and accountEmail)
42
+ // Normalize ACME options
107
43
  if (this.settings.acme) {
108
- // Support both 'email' and 'accountEmail' fields
109
44
  if (this.settings.acme.accountEmail && !this.settings.acme.email) {
110
45
  this.settings.acme.email = this.settings.acme.accountEmail;
111
46
  }
112
- // Set reasonable defaults for commonly used fields
113
47
  this.settings.acme = {
114
- enabled: this.settings.acme.enabled !== false, // Enable by default if acme object exists
48
+ enabled: this.settings.acme.enabled !== false,
115
49
  port: this.settings.acme.port || 80,
116
50
  email: this.settings.acme.email,
117
51
  useProduction: this.settings.acme.useProduction || false,
118
52
  renewThresholdDays: this.settings.acme.renewThresholdDays || 30,
119
- autoRenew: this.settings.acme.autoRenew !== false, // Enable by default
53
+ autoRenew: this.settings.acme.autoRenew !== false,
120
54
  certificateStore: this.settings.acme.certificateStore || './certs',
121
55
  skipConfiguredCerts: this.settings.acme.skipConfiguredCerts || false,
122
56
  renewCheckIntervalHours: this.settings.acme.renewCheckIntervalHours || 24,
123
57
  routeForwards: this.settings.acme.routeForwards || [],
124
- ...this.settings.acme // Preserve any additional fields
58
+ ...this.settings.acme,
125
59
  };
126
60
  }
127
- // Initialize component managers
128
- this.timeoutManager = new TimeoutManager(this);
129
- this.securityManager = new SecurityManager(this);
130
- this.connectionManager = new ConnectionManager(this);
131
- // Create the route manager with SharedRouteManager API
132
- // Create a logger adapter to match ILogger interface
133
- const loggerAdapter = {
134
- debug: (message, data) => logger.log('debug', message, data),
135
- info: (message, data) => logger.log('info', message, data),
136
- warn: (message, data) => logger.log('warn', message, data),
137
- error: (message, data) => logger.log('error', message, data)
138
- };
139
- // Validate initial routes
140
- if (this.settings.routes && this.settings.routes.length > 0) {
61
+ // Validate routes
62
+ if (this.settings.routes?.length) {
141
63
  const validation = RouteValidator.validateRoutes(this.settings.routes);
142
64
  if (!validation.valid) {
143
65
  RouteValidator.logValidationErrors(validation.errors);
144
66
  throw new Error(`Initial route validation failed: ${validation.errors.size} route(s) have errors`);
145
67
  }
146
68
  }
69
+ // Create logger adapter
70
+ const loggerAdapter = {
71
+ debug: (message, data) => logger.log('debug', message, data),
72
+ info: (message, data) => logger.log('info', message, data),
73
+ warn: (message, data) => logger.log('warn', message, data),
74
+ error: (message, data) => logger.log('error', message, data),
75
+ };
76
+ // Initialize components
147
77
  this.routeManager = new RouteManager({
148
78
  logger: loggerAdapter,
149
79
  enableDetailedLogging: this.settings.enableDetailedLogging,
150
- routes: this.settings.routes
80
+ routes: this.settings.routes,
151
81
  });
152
- // Create other required components
153
- this.tlsManager = new TlsManager(this);
154
- this.httpProxyBridge = new HttpProxyBridge(this);
155
- // Initialize connection handler with route support
156
- this.routeConnectionHandler = new RouteConnectionHandler(this);
157
- // Initialize port manager
158
- this.portManager = new PortManager(this);
159
- // Initialize NFTablesManager
160
- this.nftablesManager = new NFTablesManager(this);
161
- // Initialize route update mutex for synchronization
82
+ this.bridge = new RustProxyBridge();
83
+ this.preprocessor = new RoutePreprocessor();
84
+ this.metricsAdapter = new RustMetricsAdapter(this.bridge, this.settings.metrics?.sampleIntervalMs ?? 1000);
162
85
  this.routeUpdateLock = new Mutex();
163
- // Initialize ACME state manager
164
- this.acmeStateManager = new AcmeStateManager();
165
- // Initialize metrics collector with reference to this SmartProxy instance
166
- this.metricsCollector = new MetricsCollector(this, {
167
- sampleIntervalMs: this.settings.metrics?.sampleIntervalMs,
168
- retentionSeconds: this.settings.metrics?.retentionSeconds
169
- });
170
- // Initialize route orchestrator for managing route updates
171
- this.routeOrchestrator = new RouteOrchestrator(this.portManager, this.routeManager, this.httpProxyBridge, this.nftablesManager, null, // certManager will be set later
172
- loggerAdapter);
173
- }
174
- /**
175
- * Helper method to create and configure certificate manager
176
- * This ensures consistent setup including the required ACME callback
177
- */
178
- async createCertificateManager(routes, certStore = './certs', acmeOptions, initialState) {
179
- const certManager = new SmartCertManager(routes, certStore, acmeOptions, initialState);
180
- // Always set up the route update callback for ACME challenges
181
- certManager.setUpdateRoutesCallback(async (routes) => {
182
- await this.updateRoutes(routes);
183
- });
184
- // Connect with HttpProxy if available
185
- if (this.httpProxyBridge.getHttpProxy()) {
186
- certManager.setHttpProxy(this.httpProxyBridge.getHttpProxy());
187
- }
188
- // Set the ACME state manager
189
- certManager.setAcmeStateManager(this.acmeStateManager);
190
- // Pass down the global ACME config if available
191
- if (this.settings.acme) {
192
- certManager.setGlobalAcmeDefaults(this.settings.acme);
193
- }
194
- // Pass down the custom certificate provision function if available
195
- if (this.settings.certProvisionFunction) {
196
- certManager.setCertProvisionFunction(this.settings.certProvisionFunction);
197
- }
198
- // Pass down the fallback to ACME setting
199
- if (this.settings.certProvisionFallbackToAcme !== undefined) {
200
- certManager.setCertProvisionFallbackToAcme(this.settings.certProvisionFallbackToAcme);
201
- }
202
- await certManager.initialize();
203
- return certManager;
204
- }
205
- /**
206
- * Initialize certificate manager
207
- */
208
- async initializeCertificateManager() {
209
- // Extract global ACME options if any routes use auto certificates
210
- const autoRoutes = this.settings.routes.filter(r => r.action.tls?.certificate === 'auto');
211
- if (autoRoutes.length === 0 && !this.hasStaticCertRoutes()) {
212
- logger.log('info', 'No routes require certificate management', { component: 'certificate-manager' });
213
- return;
214
- }
215
- // Prepare ACME options with priority:
216
- // 1. Use top-level ACME config if available
217
- // 2. Fall back to first auto route's ACME config
218
- // 3. Otherwise use undefined
219
- let acmeOptions;
220
- if (this.settings.acme?.email) {
221
- // Use top-level ACME config
222
- acmeOptions = {
223
- email: this.settings.acme.email,
224
- useProduction: this.settings.acme.useProduction || false,
225
- port: this.settings.acme.port || 80
226
- };
227
- logger.log('info', `Using top-level ACME configuration with email: ${acmeOptions.email}`, { component: 'certificate-manager' });
228
- }
229
- else if (autoRoutes.length > 0) {
230
- // Check for route-level ACME config
231
- const routeWithAcme = autoRoutes.find(r => r.action.tls?.acme?.email);
232
- if (routeWithAcme?.action.tls?.acme) {
233
- const routeAcme = routeWithAcme.action.tls.acme;
234
- acmeOptions = {
235
- email: routeAcme.email,
236
- useProduction: routeAcme.useProduction || false,
237
- port: routeAcme.challengePort || 80
238
- };
239
- logger.log('info', `Using route-level ACME configuration from route '${routeWithAcme.name}' with email: ${acmeOptions.email}`, { component: 'certificate-manager' });
240
- }
241
- }
242
- // Validate we have required configuration
243
- if (autoRoutes.length > 0 && !acmeOptions?.email) {
244
- throw new Error('ACME email is required for automatic certificate provisioning. ' +
245
- 'Please provide email in either:\n' +
246
- '1. Top-level "acme" configuration\n' +
247
- '2. Individual route\'s "tls.acme" configuration');
248
- }
249
- // Use the helper method to create and configure the certificate manager
250
- this.certManager = await this.createCertificateManager(this.settings.routes, this.settings.acme?.certificateStore || './certs', acmeOptions);
251
- }
252
- /**
253
- * Check if we have routes with static certificates
254
- */
255
- hasStaticCertRoutes() {
256
- return this.settings.routes.some(r => r.action.tls?.certificate &&
257
- r.action.tls.certificate !== 'auto');
258
86
  }
259
87
  /**
260
- * Start the proxy server with support for both configuration types
88
+ * Start the proxy.
89
+ * Spawns the Rust binary, configures socket relay if needed, sends routes, handles cert provisioning.
261
90
  */
262
91
  async start() {
263
- // Don't start if already shutting down
264
- if (this.isShuttingDown) {
265
- logger.log('warn', "Cannot start SmartProxy while it's in the shutdown process");
266
- return;
267
- }
268
- // Validate the route configuration
269
- const configWarnings = this.routeManager.validateConfiguration();
270
- // Also validate ACME configuration
271
- const acmeWarnings = this.validateAcmeConfiguration();
272
- const allWarnings = [...configWarnings, ...acmeWarnings];
273
- if (allWarnings.length > 0) {
274
- logger.log('warn', `${allWarnings.length} configuration warnings found`, { count: allWarnings.length });
275
- for (const warning of allWarnings) {
276
- logger.log('warn', `${warning}`);
277
- }
278
- }
279
- // Get listening ports from RouteManager
280
- const listeningPorts = this.routeManager.getListeningPorts();
281
- // Initialize port usage tracking using RouteOrchestrator
282
- this.portUsageMap = this.routeOrchestrator.updatePortUsageMap(this.settings.routes);
283
- // Log port usage for startup
284
- logger.log('info', `SmartProxy starting with ${listeningPorts.length} ports: ${listeningPorts.join(', ')}`, {
285
- portCount: listeningPorts.length,
286
- ports: listeningPorts,
287
- component: 'smart-proxy'
288
- });
289
- // Provision NFTables rules for routes that use NFTables
290
- for (const route of this.settings.routes) {
291
- if (route.action.forwardingEngine === 'nftables') {
292
- await this.nftablesManager.provisionRoute(route);
293
- }
294
- }
295
- // Initialize and start HttpProxy if needed - before port binding
296
- if (this.settings.useHttpProxy && this.settings.useHttpProxy.length > 0) {
297
- await this.httpProxyBridge.initialize();
298
- await this.httpProxyBridge.start();
299
- }
300
- // Start port listeners using the PortManager BEFORE initializing certificate manager
301
- // This ensures all required ports are bound and ready when adding ACME challenge routes
302
- await this.portManager.addPorts(listeningPorts);
303
- // Initialize certificate manager AFTER port binding is complete
304
- // This ensures the ACME challenge port is already bound and ready when needed
305
- await this.initializeCertificateManager();
306
- // Connect certificate manager with HttpProxy if both are available
307
- if (this.certManager && this.httpProxyBridge.getHttpProxy()) {
308
- this.certManager.setHttpProxy(this.httpProxyBridge.getHttpProxy());
309
- }
310
- // Now that ports are listening, provision any required certificates
311
- if (this.certManager) {
312
- logger.log('info', 'Starting certificate provisioning now that ports are ready', { component: 'certificate-manager' });
313
- await this.certManager.provisionAllCertificates();
314
- }
315
- // Start the metrics collector now that all components are initialized
316
- this.metricsCollector.start();
317
- // Set up periodic connection logging and inactivity checks
318
- this.connectionLogger = setInterval(() => {
319
- // Immediately return if shutting down
320
- if (this.isShuttingDown)
92
+ // Spawn Rust binary
93
+ const spawned = await this.bridge.spawn();
94
+ if (!spawned) {
95
+ throw new Error('RustProxy binary not found. Set SMARTPROXY_RUST_BINARY env var, install the platform package, ' +
96
+ 'or build locally with: cd rust && cargo build --release');
97
+ }
98
+ // Handle unexpected exit (only emits error if not intentionally stopping)
99
+ this.bridge.on('exit', (code, signal) => {
100
+ if (this.stopping)
321
101
  return;
322
- // Perform inactivity check
323
- this.connectionManager.performInactivityCheck();
324
- // Log connection statistics
325
- const now = Date.now();
326
- let maxIncoming = 0;
327
- let maxOutgoing = 0;
328
- let tlsConnections = 0;
329
- let nonTlsConnections = 0;
330
- let completedTlsHandshakes = 0;
331
- let pendingTlsHandshakes = 0;
332
- let keepAliveConnections = 0;
333
- let httpProxyConnections = 0;
334
- // Get connection records for analysis
335
- const connectionRecords = this.connectionManager.getConnections();
336
- // Analyze active connections
337
- for (const record of connectionRecords.values()) {
338
- // Track connection stats
339
- if (record.isTLS) {
340
- tlsConnections++;
341
- if (record.tlsHandshakeComplete) {
342
- completedTlsHandshakes++;
343
- }
344
- else {
345
- pendingTlsHandshakes++;
346
- }
347
- }
348
- else {
349
- nonTlsConnections++;
350
- }
351
- if (record.hasKeepAlive) {
352
- keepAliveConnections++;
353
- }
354
- if (record.usingNetworkProxy) {
355
- httpProxyConnections++;
356
- }
357
- maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
358
- if (record.outgoingStartTime) {
359
- maxOutgoing = Math.max(maxOutgoing, now - record.outgoingStartTime);
360
- }
361
- }
362
- // Get termination stats
363
- const terminationStats = this.connectionManager.getTerminationStats();
364
- // Log detailed stats
365
- logger.log('info', 'Connection statistics', {
366
- activeConnections: connectionRecords.size,
367
- tls: {
368
- total: tlsConnections,
369
- completed: completedTlsHandshakes,
370
- pending: pendingTlsHandshakes
371
- },
372
- nonTls: nonTlsConnections,
373
- keepAlive: keepAliveConnections,
374
- httpProxy: httpProxyConnections,
375
- longestRunning: {
376
- incoming: plugins.prettyMs(maxIncoming),
377
- outgoing: plugins.prettyMs(maxOutgoing)
378
- },
379
- terminationStats: {
380
- incoming: terminationStats.incoming,
381
- outgoing: terminationStats.outgoing
382
- },
383
- component: 'connection-manager'
384
- });
385
- }, this.settings.inactivityCheckInterval || 60000);
386
- // Make sure the interval doesn't keep the process alive
387
- if (this.connectionLogger.unref) {
388
- this.connectionLogger.unref();
389
- }
102
+ logger.log('error', `RustProxy exited unexpectedly (code=${code}, signal=${signal})`, { component: 'smart-proxy' });
103
+ this.emit('error', new Error(`RustProxy exited (code=${code}, signal=${signal})`));
104
+ });
105
+ // Check if any routes need TS-side handling (socket handlers, dynamic functions)
106
+ const hasHandlerRoutes = this.settings.routes.some((r) => (r.action.type === 'socket-handler' && r.action.socketHandler) ||
107
+ r.action.targets?.some((t) => typeof t.host === 'function' || typeof t.port === 'function'));
108
+ // Start socket handler relay server (but don't tell Rust yet - proxy not started)
109
+ if (hasHandlerRoutes) {
110
+ this.socketHandlerServer = new SocketHandlerServer(this.preprocessor);
111
+ await this.socketHandlerServer.start();
112
+ }
113
+ // Preprocess routes (strip JS functions, convert socket-handler routes)
114
+ const rustRoutes = this.preprocessor.preprocessForRust(this.settings.routes);
115
+ // Build Rust config
116
+ const config = this.buildRustConfig(rustRoutes);
117
+ // Start the Rust proxy
118
+ await this.bridge.startProxy(config);
119
+ // Now that Rust proxy is running, configure socket handler relay
120
+ if (this.socketHandlerServer) {
121
+ await this.bridge.setSocketHandlerRelay(this.socketHandlerServer.getSocketPath());
122
+ }
123
+ // Handle certProvisionFunction
124
+ await this.provisionCertificatesViaCallback();
125
+ // Start metrics polling
126
+ this.metricsAdapter.startPolling();
127
+ logger.log('info', 'SmartProxy started (Rust engine)', { component: 'smart-proxy' });
390
128
  }
391
129
  /**
392
- * Extract domain configurations from routes for certificate provisioning
393
- *
394
- * Note: This method has been removed as we now work directly with routes
395
- */
396
- /**
397
- * Stop the proxy server
130
+ * Stop the proxy.
398
131
  */
399
132
  async stop() {
400
- logger.log('info', 'SmartProxy shutting down...');
401
- this.isShuttingDown = true;
402
- this.portManager.setShuttingDown(true);
403
- // Stop certificate manager
404
- if (this.certManager) {
405
- await this.certManager.stop();
406
- logger.log('info', 'Certificate manager stopped');
407
- }
408
- // Stop NFTablesManager
409
- await this.nftablesManager.stop();
410
- logger.log('info', 'NFTablesManager stopped');
411
- // Stop the connection logger
412
- if (this.connectionLogger) {
413
- clearInterval(this.connectionLogger);
414
- this.connectionLogger = null;
415
- }
416
- // Stop all port listeners
417
- await this.portManager.closeAll();
418
- logger.log('info', 'All servers closed. Cleaning up active connections...');
419
- // Clean up all active connections
420
- await this.connectionManager.clearConnections();
421
- // Stop HttpProxy
422
- await this.httpProxyBridge.stop();
423
- // Clear ACME state manager
424
- this.acmeStateManager.clear();
425
- // Stop metrics collector
426
- this.metricsCollector.stop();
427
- // Clean up ProtocolDetector singleton
428
- const detection = await import('../../detection/index.js');
429
- detection.ProtocolDetector.destroy();
430
- // Flush any pending deduplicated logs
431
- connectionLogDeduplicator.flushAll();
432
- logger.log('info', 'SmartProxy shutdown complete.');
433
- }
434
- /**
435
- * Updates the domain configurations for the proxy
436
- *
437
- * Note: This legacy method has been removed. Use updateRoutes instead.
438
- */
439
- async updateDomainConfigs() {
440
- logger.log('warn', 'Method updateDomainConfigs() is deprecated. Use updateRoutes() instead.');
441
- throw new Error('updateDomainConfigs() is deprecated - use updateRoutes() instead');
442
- }
443
- /**
444
- * Verify the challenge route has been properly removed from routes
445
- */
446
- async verifyChallengeRouteRemoved() {
447
- const maxRetries = 10;
448
- const retryDelay = 100; // milliseconds
449
- for (let i = 0; i < maxRetries; i++) {
450
- // Check if the challenge route is still in the active routes
451
- const challengeRouteExists = this.settings.routes.some(r => r.name === 'acme-challenge');
452
- if (!challengeRouteExists) {
453
- try {
454
- logger.log('info', 'Challenge route successfully removed from routes');
455
- }
456
- catch (error) {
457
- // Silently handle logging errors
458
- console.log('[INFO] Challenge route successfully removed from routes');
459
- }
460
- return;
461
- }
462
- // Wait before retrying
463
- await plugins.smartdelay.delayFor(retryDelay);
464
- }
465
- const error = `Failed to verify challenge route removal after ${maxRetries} attempts`;
133
+ logger.log('info', 'SmartProxy shutting down...', { component: 'smart-proxy' });
134
+ this.stopping = true;
135
+ // Stop metrics polling
136
+ this.metricsAdapter.stopPolling();
137
+ // Remove exit listener before killing to avoid spurious error events
138
+ this.bridge.removeAllListeners('exit');
139
+ // Stop Rust proxy
466
140
  try {
467
- logger.log('error', error);
141
+ await this.bridge.stopProxy();
142
+ }
143
+ catch {
144
+ // Ignore if already stopped
468
145
  }
469
- catch (logError) {
470
- // Silently handle logging errors
471
- console.log(`[ERROR] ${error}`);
146
+ this.bridge.kill();
147
+ // Stop socket handler relay
148
+ if (this.socketHandlerServer) {
149
+ await this.socketHandlerServer.stop();
150
+ this.socketHandlerServer = null;
472
151
  }
473
- throw new Error(error);
152
+ logger.log('info', 'SmartProxy shutdown complete.', { component: 'smart-proxy' });
474
153
  }
475
154
  /**
476
- * Update routes with new configuration
477
- *
478
- * This method replaces the current route configuration with the provided routes.
479
- * It also provisions certificates for routes that require TLS termination and have
480
- * `certificate: 'auto'` set in their TLS configuration.
481
- *
482
- * @param newRoutes Array of route configurations to use
483
- *
484
- * Example:
485
- * ```ts
486
- * proxy.updateRoutes([
487
- * {
488
- * match: { ports: 443, domains: 'secure.example.com' },
489
- * action: {
490
- * type: 'forward',
491
- * target: { host: '10.0.0.1', port: 8443 },
492
- * tls: { mode: 'terminate', certificate: 'auto' }
493
- * }
494
- * }
495
- * ]);
496
- * ```
155
+ * Update routes atomically.
497
156
  */
498
157
  async updateRoutes(newRoutes) {
499
158
  return this.routeUpdateLock.runExclusive(async () => {
500
- try {
501
- logger.log('info', `Updating routes (${newRoutes.length} routes)`, {
502
- routeCount: newRoutes.length,
503
- component: 'smart-proxy'
504
- });
159
+ // Validate
160
+ const validation = RouteValidator.validateRoutes(newRoutes);
161
+ if (!validation.valid) {
162
+ RouteValidator.logValidationErrors(validation.errors);
163
+ throw new Error(`Route validation failed: ${validation.errors.size} route(s) have errors`);
505
164
  }
506
- catch (error) {
507
- // Silently handle logging errors
508
- console.log(`[INFO] Updating routes (${newRoutes.length} routes)`);
165
+ // Preprocess for Rust
166
+ const rustRoutes = this.preprocessor.preprocessForRust(newRoutes);
167
+ // Send to Rust
168
+ await this.bridge.updateRoutes(rustRoutes);
169
+ // Update local route manager
170
+ this.routeManager.updateRoutes(newRoutes);
171
+ // Update socket handler relay if handler routes changed
172
+ const hasHandlerRoutes = newRoutes.some((r) => (r.action.type === 'socket-handler' && r.action.socketHandler) ||
173
+ r.action.targets?.some((t) => typeof t.host === 'function' || typeof t.port === 'function'));
174
+ if (hasHandlerRoutes && !this.socketHandlerServer) {
175
+ this.socketHandlerServer = new SocketHandlerServer(this.preprocessor);
176
+ await this.socketHandlerServer.start();
177
+ await this.bridge.setSocketHandlerRelay(this.socketHandlerServer.getSocketPath());
509
178
  }
510
- // Update route orchestrator dependencies if cert manager changed
511
- if (this.certManager && !this.routeOrchestrator.getCertManager()) {
512
- this.routeOrchestrator.setCertManager(this.certManager);
179
+ else if (!hasHandlerRoutes && this.socketHandlerServer) {
180
+ await this.socketHandlerServer.stop();
181
+ this.socketHandlerServer = null;
513
182
  }
514
- // Delegate the complex route update logic to RouteOrchestrator
515
- const updateResult = await this.routeOrchestrator.updateRoutes(this.settings.routes, newRoutes, {
516
- acmePort: this.settings.acme?.port || 80,
517
- acmeOptions: this.certManager?.getAcmeOptions(),
518
- acmeState: this.certManager?.getState(),
519
- globalChallengeRouteActive: this.globalChallengeRouteActive,
520
- createCertificateManager: this.createCertificateManager.bind(this),
521
- verifyChallengeRouteRemoved: this.verifyChallengeRouteRemoved.bind(this)
522
- });
523
- // Update settings with the new routes
183
+ // Update stored routes
524
184
  this.settings.routes = newRoutes;
525
- // Update global state from orchestrator results
526
- this.globalChallengeRouteActive = updateResult.newChallengeRouteActive;
527
- // Update port usage map from orchestrator
528
- this.portUsageMap = updateResult.portUsageMap;
529
- // If certificate manager was recreated, update our reference
530
- if (updateResult.newCertManager) {
531
- this.certManager = updateResult.newCertManager;
532
- // Update the orchestrator's reference too
533
- this.routeOrchestrator.setCertManager(this.certManager);
534
- }
185
+ // Handle cert provisioning for new routes
186
+ await this.provisionCertificatesViaCallback();
187
+ logger.log('info', `Routes updated (${newRoutes.length} routes)`, { component: 'smart-proxy' });
535
188
  });
536
189
  }
537
190
  /**
538
- * Manually provision a certificate for a route
191
+ * Provision a certificate for a named route.
539
192
  */
540
193
  async provisionCertificate(routeName) {
541
- if (!this.certManager) {
542
- throw new Error('Certificate manager not initialized');
543
- }
544
- const route = this.settings.routes.find(r => r.name === routeName);
545
- if (!route) {
546
- throw new Error(`Route ${routeName} not found`);
547
- }
548
- await this.certManager.provisionCertificate(route);
194
+ await this.bridge.provisionCertificate(routeName);
549
195
  }
550
- // Port usage tracking methods moved to RouteOrchestrator
551
196
  /**
552
- * Force renewal of a certificate
197
+ * Force renewal of a certificate.
553
198
  */
554
199
  async renewCertificate(routeName) {
555
- if (!this.certManager) {
556
- throw new Error('Certificate manager not initialized');
557
- }
558
- await this.certManager.renewCertificate(routeName);
200
+ await this.bridge.renewCertificate(routeName);
559
201
  }
560
202
  /**
561
- * Get certificate status for a route
203
+ * Get certificate status for a route (async - calls Rust).
562
204
  */
563
- getCertificateStatus(routeName) {
564
- if (!this.certManager) {
565
- return undefined;
566
- }
567
- return this.certManager.getCertificateStatus(routeName);
205
+ async getCertificateStatus(routeName) {
206
+ return this.bridge.getCertificateStatus(routeName);
568
207
  }
569
208
  /**
570
- * Get proxy metrics with clean API
571
- *
572
- * @returns IMetrics interface with grouped metrics methods
209
+ * Get the metrics interface.
573
210
  */
574
211
  getMetrics() {
575
- return this.metricsCollector;
212
+ return this.metricsAdapter;
576
213
  }
577
214
  /**
578
- * Validates if a domain name is valid for certificate issuance
215
+ * Get statistics (async - calls Rust).
579
216
  */
580
- isValidDomain(domain) {
581
- // Very basic domain validation
582
- if (!domain || domain.length === 0) {
583
- return false;
584
- }
585
- // Check for wildcard domains (they can't get ACME certs)
586
- if (domain.includes('*')) {
587
- logger.log('warn', `Wildcard domains like "${domain}" are not supported for automatic ACME certificates`, { domain, component: 'certificate-manager' });
588
- return false;
589
- }
590
- // Check if domain has at least one dot and no invalid characters
591
- const validDomainRegex = /^[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(\.[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/;
592
- if (!validDomainRegex.test(domain)) {
593
- logger.log('warn', `Domain "${domain}" has invalid format for certificate issuance`, { domain, component: 'certificate-manager' });
594
- return false;
595
- }
596
- return true;
217
+ async getStatistics() {
218
+ return this.bridge.getStatistics();
597
219
  }
598
220
  /**
599
- * Add a new listening port without changing the route configuration
600
- *
601
- * This allows you to add a port listener without updating routes.
602
- * Useful for preparing to listen on a port before adding routes for it.
603
- *
604
- * @param port The port to start listening on
605
- * @returns Promise that resolves when the port is listening
221
+ * Add a listening port at runtime.
606
222
  */
607
223
  async addListeningPort(port) {
608
- return this.portManager.addPort(port);
224
+ await this.bridge.addListeningPort(port);
609
225
  }
610
226
  /**
611
- * Stop listening on a specific port without changing the route configuration
612
- *
613
- * This allows you to stop a port listener without updating routes.
614
- * Useful for temporary maintenance or port changes.
615
- *
616
- * @param port The port to stop listening on
617
- * @returns Promise that resolves when the port is closed
227
+ * Remove a listening port at runtime.
618
228
  */
619
229
  async removeListeningPort(port) {
620
- return this.portManager.removePort(port);
230
+ await this.bridge.removeListeningPort(port);
621
231
  }
622
232
  /**
623
- * Get a list of all ports currently being listened on
624
- *
625
- * @returns Array of port numbers
233
+ * Get all currently listening ports (async - calls Rust).
626
234
  */
627
- getListeningPorts() {
628
- return this.portManager.getListeningPorts();
235
+ async getListeningPorts() {
236
+ if (!this.bridge.running)
237
+ return [];
238
+ return this.bridge.getListeningPorts();
629
239
  }
630
240
  /**
631
- * Get statistics about current connections
632
- */
633
- getStatistics() {
634
- const connectionRecords = this.connectionManager.getConnections();
635
- const terminationStats = this.connectionManager.getTerminationStats();
636
- let tlsConnections = 0;
637
- let nonTlsConnections = 0;
638
- let keepAliveConnections = 0;
639
- let httpProxyConnections = 0;
640
- // Analyze active connections
641
- for (const record of connectionRecords.values()) {
642
- if (record.isTLS)
643
- tlsConnections++;
644
- else
645
- nonTlsConnections++;
646
- if (record.hasKeepAlive)
647
- keepAliveConnections++;
648
- if (record.usingNetworkProxy)
649
- httpProxyConnections++;
650
- }
651
- return {
652
- activeConnections: connectionRecords.size,
653
- tlsConnections,
654
- nonTlsConnections,
655
- keepAliveConnections,
656
- httpProxyConnections,
657
- terminationStats,
658
- acmeEnabled: !!this.certManager,
659
- port80HandlerPort: this.certManager ? 80 : null,
660
- routeCount: this.settings.routes.length,
661
- activePorts: this.portManager.getListeningPorts().length,
662
- listeningPorts: this.portManager.getListeningPorts()
663
- };
664
- }
665
- /**
666
- * Get a list of eligible domains for ACME certificates
241
+ * Get eligible domains for ACME certificates (sync - reads local routes).
667
242
  */
668
243
  getEligibleDomainsForCertificates() {
669
244
  const domains = [];
670
- // Get domains from routes
671
- const routes = this.settings.routes || [];
672
- for (const route of routes) {
245
+ for (const route of this.settings.routes || []) {
673
246
  if (!route.match.domains)
674
247
  continue;
675
- // Skip routes without TLS termination or auto certificates
676
248
  if (route.action.type !== 'forward' ||
677
249
  !route.action.tls ||
678
250
  route.action.tls.mode === 'passthrough' ||
679
251
  route.action.tls.certificate !== 'auto')
680
252
  continue;
681
- const routeDomains = Array.isArray(route.match.domains)
682
- ? route.match.domains
683
- : [route.match.domains];
684
- // Skip domains that can't be used with ACME
685
- const eligibleDomains = routeDomains.filter(domain => !domain.includes('*') && this.isValidDomain(domain));
686
- domains.push(...eligibleDomains);
253
+ const routeDomains = Array.isArray(route.match.domains) ? route.match.domains : [route.match.domains];
254
+ const eligible = routeDomains.filter((d) => !d.includes('*') && this.isValidDomain(d));
255
+ domains.push(...eligible);
687
256
  }
688
- // Legacy mode is no longer supported
689
257
  return domains;
690
258
  }
691
259
  /**
692
- * Get NFTables status
260
+ * Get NFTables status (async - calls Rust).
693
261
  */
694
262
  async getNfTablesStatus() {
695
- return this.nftablesManager.getStatus();
263
+ return this.bridge.getNftablesStatus();
696
264
  }
265
+ // --- Private helpers ---
697
266
  /**
698
- * Validate ACME configuration
267
+ * Build the Rust configuration object from TS settings.
699
268
  */
700
- validateAcmeConfiguration() {
701
- const warnings = [];
702
- // Check for routes with certificate: 'auto'
703
- const autoRoutes = this.settings.routes.filter(r => r.action.tls?.certificate === 'auto');
704
- if (autoRoutes.length === 0) {
705
- return warnings;
706
- }
707
- // Check if we have ACME email configuration
708
- const hasTopLevelEmail = this.settings.acme?.email;
709
- const routesWithEmail = autoRoutes.filter(r => r.action.tls?.acme?.email);
710
- if (!hasTopLevelEmail && routesWithEmail.length === 0) {
711
- warnings.push('Routes with certificate: "auto" require ACME email configuration. ' +
712
- 'Add email to either top-level "acme" config or individual route\'s "tls.acme" config.');
713
- }
714
- // Check for port 80 availability for challenges
715
- if (autoRoutes.length > 0) {
716
- const challengePort = this.settings.acme?.port || 80;
717
- const portsInUse = this.routeManager.getListeningPorts();
718
- if (!portsInUse.includes(challengePort)) {
719
- warnings.push(`Port ${challengePort} is not configured for any routes but is needed for ACME challenges. ` +
720
- `Add a route listening on port ${challengePort} or ensure it's accessible for HTTP-01 challenges.`);
721
- }
722
- }
723
- // Check for mismatched environments
724
- if (this.settings.acme?.useProduction) {
725
- const stagingRoutes = autoRoutes.filter(r => r.action.tls?.acme?.useProduction === false);
726
- if (stagingRoutes.length > 0) {
727
- warnings.push('Top-level ACME uses production but some routes use staging. ' +
728
- 'Consider aligning environments to avoid certificate issues.');
729
- }
730
- }
731
- // Check for wildcard domains with auto certificates
732
- for (const route of autoRoutes) {
733
- const domains = Array.isArray(route.match.domains)
734
- ? route.match.domains
735
- : [route.match.domains];
736
- const wildcardDomains = domains.filter(d => d?.includes('*'));
737
- if (wildcardDomains.length > 0) {
738
- warnings.push(`Route "${route.name}" has wildcard domain(s) ${wildcardDomains.join(', ')} ` +
739
- 'with certificate: "auto". Wildcard certificates require DNS-01 challenges, ' +
740
- 'which are not currently supported. Use static certificates instead.');
269
+ buildRustConfig(routes) {
270
+ return {
271
+ routes,
272
+ defaults: this.settings.defaults,
273
+ acme: this.settings.acme
274
+ ? {
275
+ enabled: this.settings.acme.enabled,
276
+ email: this.settings.acme.email,
277
+ useProduction: this.settings.acme.useProduction,
278
+ port: this.settings.acme.port,
279
+ renewThresholdDays: this.settings.acme.renewThresholdDays,
280
+ autoRenew: this.settings.acme.autoRenew,
281
+ certificateStore: this.settings.acme.certificateStore,
282
+ renewCheckIntervalHours: this.settings.acme.renewCheckIntervalHours,
283
+ }
284
+ : undefined,
285
+ connectionTimeout: this.settings.connectionTimeout,
286
+ initialDataTimeout: this.settings.initialDataTimeout,
287
+ socketTimeout: this.settings.socketTimeout,
288
+ maxConnectionLifetime: this.settings.maxConnectionLifetime,
289
+ gracefulShutdownTimeout: this.settings.gracefulShutdownTimeout,
290
+ maxConnectionsPerIp: this.settings.maxConnectionsPerIP,
291
+ connectionRateLimitPerMinute: this.settings.connectionRateLimitPerMinute,
292
+ keepAliveTreatment: this.settings.keepAliveTreatment,
293
+ keepAliveInactivityMultiplier: this.settings.keepAliveInactivityMultiplier,
294
+ extendedKeepAliveLifetime: this.settings.extendedKeepAliveLifetime,
295
+ acceptProxyProtocol: this.settings.acceptProxyProtocol,
296
+ sendProxyProtocol: this.settings.sendProxyProtocol,
297
+ };
298
+ }
299
+ /**
300
+ * For routes with certificate: 'auto', call certProvisionFunction if set.
301
+ * If the callback returns a cert object, load it into Rust.
302
+ * If it returns 'http01', let Rust handle ACME.
303
+ */
304
+ async provisionCertificatesViaCallback() {
305
+ const provisionFn = this.settings.certProvisionFunction;
306
+ if (!provisionFn)
307
+ return;
308
+ for (const route of this.settings.routes) {
309
+ if (route.action.tls?.certificate !== 'auto')
310
+ continue;
311
+ if (!route.match.domains)
312
+ continue;
313
+ const domains = Array.isArray(route.match.domains) ? route.match.domains : [route.match.domains];
314
+ for (const domain of domains) {
315
+ if (domain.includes('*'))
316
+ continue;
317
+ try {
318
+ const result = await provisionFn(domain);
319
+ if (result === 'http01') {
320
+ // Rust handles ACME for this domain
321
+ continue;
322
+ }
323
+ // Got a static cert object - load it into Rust
324
+ if (result && typeof result === 'object') {
325
+ const certObj = result;
326
+ await this.bridge.loadCertificate(domain, certObj.publicKey, certObj.privateKey);
327
+ logger.log('info', `Certificate loaded via provision function for ${domain}`, { component: 'smart-proxy' });
328
+ }
329
+ }
330
+ catch (err) {
331
+ logger.log('warn', `certProvisionFunction failed for ${domain}: ${err.message}`, { component: 'smart-proxy' });
332
+ // Fallback to ACME if enabled
333
+ if (this.settings.certProvisionFallbackToAcme !== false) {
334
+ logger.log('info', `Falling back to ACME for ${domain}`, { component: 'smart-proxy' });
335
+ }
336
+ }
741
337
  }
742
338
  }
743
- return warnings;
339
+ }
340
+ isValidDomain(domain) {
341
+ if (!domain || domain.length === 0)
342
+ return false;
343
+ if (domain.includes('*'))
344
+ return false;
345
+ const validDomainRegex = /^[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(\.[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/;
346
+ return validDomainRegex.test(domain);
744
347
  }
745
348
  }
746
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"smart-proxy.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/smart-proxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AACpD,OAAO,EAAE,yBAAyB,EAAE,MAAM,sCAAsC,CAAC;AAEjF,gCAAgC;AAChC,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAChD,OAAO,EAAE,kBAAkB,IAAI,YAAY,EAAE,MAAM,qCAAqC,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAExD,sBAAsB;AACtB,OAAO,EAAE,gBAAgB,EAAoB,MAAM,0BAA0B,CAAC;AAQ9E,gDAAgD;AAChD,OAAO,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAEzC,yBAAyB;AACzB,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAE5D,iDAAiD;AACjD,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAE5D,4BAA4B;AAC5B,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAE3D,2BAA2B;AAC3B,OAAO,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAG1D;;;;;;;;;;;;GAYG;AACH,MAAM,OAAO,UAAW,SAAQ,OAAO,CAAC,YAAY;IAiClD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACH,YAAY,WAA+B;QACzC,KAAK,EAAE,CAAC;QA9DF,qBAAgB,GAA0B,IAAI,CAAC;QAC/C,mBAAc,GAAY,KAAK,CAAC;QAYxC,uDAAuD;QAChD,gBAAW,GAA4B,IAAI,CAAC;QAEnD,kCAAkC;QAC1B,+BAA0B,GAAY,KAAK,CAAC;QAUpD,wCAAwC;QAChC,iBAAY,GAA6B,IAAI,GAAG,EAAE,CAAC;QAoCzD,2CAA2C;QAC3C,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,WAAW;YACd,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,MAAM;YAC5D,aAAa,EAAE,WAAW,CAAC,aAAa,IAAI,OAAO;YACnD,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,QAAQ;YACpE,iBAAiB,EAAE,WAAW,CAAC,iBAAiB,IAAI,QAAQ;YAC5D,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,OAAO,EAAE,WAAW,CAAC,OAAO,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI;YACvE,SAAS,EAAE,WAAW,CAAC,SAAS,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YAC7E,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,EAAE,GAAG,IAAI,GAAG,IAAI;YACtE,sBAAsB,EAAE,WAAW,CAAC,sBAAsB,IAAI,KAAK;YACnE,qBAAqB,EACnB,WAAW,CAAC,qBAAqB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,qBAAqB,CAAC,CAAC,CAAC,IAAI;YAC5F,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,wBAAwB,EAAE,WAAW,CAAC,wBAAwB,IAAI,KAAK;YACvE,mBAAmB,EAAE,WAAW,CAAC,mBAAmB,IAAI,GAAG;YAC3D,4BAA4B,EAAE,WAAW,CAAC,4BAA4B,IAAI,GAAG;YAC7E,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,UAAU;YAChE,6BAA6B,EAAE,WAAW,CAAC,6BAA6B,IAAI,CAAC;YAC7E,yBAAyB,EAAE,WAAW,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI;YAC3F,aAAa,EAAE,WAAW,CAAC,aAAa,IAAI,IAAI;SACjD,CAAC;QAEF,2EAA2E;QAC3E,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvB,iDAAiD;YACjD,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACjE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC;YAC7D,CAAC;YAED,mDAAmD;YACnD,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG;gBACnB,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,KAAK,KAAK,EAAE,0CAA0C;gBACzF,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,IAAI,EAAE;gBACnC,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;gBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,KAAK;gBACxD,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,EAAE;gBAC/D,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,KAAK,KAAK,EAAE,oBAAoB;gBACvE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,SAAS;gBAClE,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,mBAAmB,IAAI,KAAK;gBACpE,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAuB,IAAI,EAAE;gBACzE,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,EAAE;gBACrD,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,iCAAiC;aACxD,CAAC;QACJ,CAAC;QAED,gCAAgC;QAChC,IAAI,CAAC,cAAc,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC/C,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CAAC,IAAI,CAAC,CAAC;QACjD,IAAI,CAAC,iBAAiB,GAAG,IAAI,iBAAiB,CAAC,IAAI,CAAC,CAAC;QAErD,uDAAuD;QACvD,qDAAqD;QACrD,MAAM,aAAa,GAAG;YACpB,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;YAC1E,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;SAC3E,CAAC;QAEF,0BAA0B;QAC1B,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC5D,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,oCAAoC,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YACrG,CAAC;QACH,CAAC;QAED,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC;YACnC,MAAM,EAAE,aAAa;YACrB,qBAAqB,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB;YAC1D,MAAM,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM;SAC7B,CAAC,CAAC;QAGH,mCAAmC;QACnC,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;QACvC,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CAAC,IAAI,CAAC,CAAC;QAEjD,mDAAmD;QACnD,IAAI,CAAC,sBAAsB,GAAG,IAAI,sBAAsB,CAAC,IAAI,CAAC,CAAC;QAE/D,0BAA0B;QAC1B,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAAC,IAAI,CAAC,CAAC;QAEzC,6BAA6B;QAC7B,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CAAC,IAAI,CAAC,CAAC;QAEjD,oDAAoD;QACpD,IAAI,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;QAEnC,gCAAgC;QAChC,IAAI,CAAC,gBAAgB,GAAG,IAAI,gBAAgB,EAAE,CAAC;QAE/C,0EAA0E;QAC1E,IAAI,CAAC,gBAAgB,GAAG,IAAI,gBAAgB,CAAC,IAAI,EAAE;YACjD,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,gBAAgB;YACzD,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,gBAAgB;SAC1D,CAAC,CAAC;QAEH,2DAA2D;QAC3D,IAAI,CAAC,iBAAiB,GAAG,IAAI,iBAAiB,CAC5C,IAAI,CAAC,WAAW,EAChB,IAAI,CAAC,YAAY,EACjB,IAAI,CAAC,eAAe,EACpB,IAAI,CAAC,eAAe,EACpB,IAAI,EAAE,gCAAgC;QACtC,aAAa,CACd,CAAC;IACJ,CAAC;IAOD;;;OAGG;IACK,KAAK,CAAC,wBAAwB,CACpC,MAAsB,EACtB,YAAoB,SAAS,EAC7B,WAAiB,EACjB,YAAiD;QAEjD,MAAM,WAAW,GAAG,IAAI,gBAAgB,CAAC,MAAM,EAAE,SAAS,EAAE,WAAW,EAAE,YAAY,CAAC,CAAC;QAEvF,8DAA8D;QAC9D,WAAW,CAAC,uBAAuB,CAAC,KAAK,EAAE,MAAM,EAAE,EAAE;YACnD,MAAM,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;QAClC,CAAC,CAAC,CAAC;QAEH,sCAAsC;QACtC,IAAI,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;YACxC,WAAW,CAAC,YAAY,CAAC,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,CAAC,CAAC;QAChE,CAAC;QAED,6BAA6B;QAC7B,WAAW,CAAC,mBAAmB,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;QAEvD,gDAAgD;QAChD,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvB,WAAW,CAAC,qBAAqB,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;QACxD,CAAC;QAED,mEAAmE;QACnE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,WAAW,CAAC,wBAAwB,CAAC,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;QAC5E,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,QAAQ,CAAC,2BAA2B,KAAK,SAAS,EAAE,CAAC;YAC5D,WAAW,CAAC,8BAA8B,CAAC,IAAI,CAAC,QAAQ,CAAC,2BAA2B,CAAC,CAAC;QACxF,CAAC;QAED,MAAM,WAAW,CAAC,UAAU,EAAE,CAAC;QAC/B,OAAO,WAAW,CAAC;IACrB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B;QACxC,kEAAkE;QAClE,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACjD,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,CACrC,CAAC;QAEF,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,EAAE,CAAC;YAC3D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACrG,OAAO;QACT,CAAC;QAED,sCAAsC;QACtC,4CAA4C;QAC5C,iDAAiD;QACjD,6BAA6B;QAC7B,IAAI,WAAmF,CAAC;QAExF,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,KAAK,EAAE,CAAC;YAC9B,4BAA4B;YAC5B,WAAW,GAAG;gBACZ,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;gBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,KAAK;gBACxD,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,IAAI,EAAE;aACpC,CAAC;YACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kDAAkD,WAAW,CAAC,KAAK,EAAE,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;QAClI,CAAC;aAAM,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACjC,oCAAoC;YACpC,MAAM,aAAa,GAAG,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC;YACtE,IAAI,aAAa,EAAE,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,CAAC;gBACpC,MAAM,SAAS,GAAG,aAAa,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC;gBAChD,WAAW,GAAG;oBACZ,KAAK,EAAE,SAAS,CAAC,KAAK;oBACtB,aAAa,EAAE,SAAS,CAAC,aAAa,IAAI,KAAK;oBAC/C,IAAI,EAAE,SAAS,CAAC,aAAa,IAAI,EAAE;iBACpC,CAAC;gBACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oDAAoD,aAAa,CAAC,IAAI,iBAAiB,WAAW,CAAC,KAAK,EAAE,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACvK,CAAC;QACH,CAAC;QAED,0CAA0C;QAC1C,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CACb,iEAAiE;gBACjE,mCAAmC;gBACnC,qCAAqC;gBACrC,iDAAiD,CAClD,CAAC;QACJ,CAAC;QAED,wEAAwE;QACxE,IAAI,CAAC,WAAW,GAAG,MAAM,IAAI,CAAC,wBAAwB,CACpD,IAAI,CAAC,QAAQ,CAAC,MAAM,EACpB,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,gBAAgB,IAAI,SAAS,EACjD,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,mBAAmB;QACzB,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CACnC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW;YACzB,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,WAAW,KAAK,MAAM,CACpC,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,uCAAuC;QACvC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4DAA4D,CAAC,CAAC;YACjF,OAAO;QACT,CAAC;QAED,mCAAmC;QACnC,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,qBAAqB,EAAE,CAAC;QAEjE,mCAAmC;QACnC,MAAM,YAAY,GAAG,IAAI,CAAC,yBAAyB,EAAE,CAAC;QACtD,MAAM,WAAW,GAAG,CAAC,GAAG,cAAc,EAAE,GAAG,YAAY,CAAC,CAAC;QAEzD,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC3B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,GAAG,WAAW,CAAC,MAAM,+BAA+B,EAAE,EAAE,KAAK,EAAE,WAAW,CAAC,MAAM,EAAE,CAAC,CAAC;YACxG,KAAK,MAAM,OAAO,IAAI,WAAW,EAAE,CAAC;gBAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;YACnC,CAAC;QACH,CAAC;QAED,wCAAwC;QACxC,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,EAAE,CAAC;QAE7D,yDAAyD;QACzD,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,kBAAkB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAEpF,6BAA6B;QAC7B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,cAAc,CAAC,MAAM,WAAW,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,EAAE;YAC1G,SAAS,EAAE,cAAc,CAAC,MAAM;YAChC,KAAK,EAAE,cAAc;YACrB,SAAS,EAAE,aAAa;SACzB,CAAC,CAAC;QAEH,wDAAwD;QACxD,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;YACzC,IAAI,KAAK,CAAC,MAAM,CAAC,gBAAgB,KAAK,UAAU,EAAE,CAAC;gBACjD,MAAM,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YACnD,CAAC;QACH,CAAC;QAED,iEAAiE;QACjE,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,MAAM,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE,CAAC;YACxC,MAAM,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;QACrC,CAAC;QAED,qFAAqF;QACrF,wFAAwF;QACxF,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC;QAEhD,gEAAgE;QAChE,8EAA8E;QAC9E,MAAM,IAAI,CAAC,4BAA4B,EAAE,CAAC;QAE1C,mEAAmE;QACnE,IAAI,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;YAC5D,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,CAAC,CAAC;QACrE,CAAC;QAED,oEAAoE;QACpE,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4DAA4D,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACvH,MAAM,IAAI,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC;QACpD,CAAC;QAED,sEAAsE;QACtE,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAE9B,2DAA2D;QAC3D,IAAI,CAAC,gBAAgB,GAAG,WAAW,CAAC,GAAG,EAAE;YACvC,sCAAsC;YACtC,IAAI,IAAI,CAAC,cAAc;gBAAE,OAAO;YAEhC,2BAA2B;YAC3B,IAAI,CAAC,iBAAiB,CAAC,sBAAsB,EAAE,CAAC;YAEhD,4BAA4B;YAC5B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,cAAc,GAAG,CAAC,CAAC;YACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;YAC1B,IAAI,sBAAsB,GAAG,CAAC,CAAC;YAC/B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAE7B,sCAAsC;YACtC,MAAM,iBAAiB,GAAG,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,CAAC;YAElE,6BAA6B;YAC7B,KAAK,MAAM,MAAM,IAAI,iBAAiB,CAAC,MAAM,EAAE,EAAE,CAAC;gBAChD,yBAAyB;gBACzB,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,cAAc,EAAE,CAAC;oBACjB,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;wBAChC,sBAAsB,EAAE,CAAC;oBAC3B,CAAC;yBAAM,CAAC;wBACN,oBAAoB,EAAE,CAAC;oBACzB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,iBAAiB,EAAE,CAAC;gBACtB,CAAC;gBAED,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;oBACxB,oBAAoB,EAAE,CAAC;gBACzB,CAAC;gBAED,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,oBAAoB,EAAE,CAAC;gBACzB,CAAC;gBAED,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACpE,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACtE,CAAC;YACH,CAAC;YAED,wBAAwB;YACxB,MAAM,gBAAgB,GAAG,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,CAAC;YAEtE,qBAAqB;YACrB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,EAAE;gBAC1C,iBAAiB,EAAE,iBAAiB,CAAC,IAAI;gBACzC,GAAG,EAAE;oBACH,KAAK,EAAE,cAAc;oBACrB,SAAS,EAAE,sBAAsB;oBACjC,OAAO,EAAE,oBAAoB;iBAC9B;gBACD,MAAM,EAAE,iBAAiB;gBACzB,SAAS,EAAE,oBAAoB;gBAC/B,SAAS,EAAE,oBAAoB;gBAC/B,cAAc,EAAE;oBACd,QAAQ,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC;oBACvC,QAAQ,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC;iBACxC;gBACD,gBAAgB,EAAE;oBAChB,QAAQ,EAAE,gBAAgB,CAAC,QAAQ;oBACnC,QAAQ,EAAE,gBAAgB,CAAC,QAAQ;iBACpC;gBACD,SAAS,EAAE,oBAAoB;aAChC,CAAC,CAAC;QACL,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,uBAAuB,IAAI,KAAK,CAAC,CAAC;QAEnD,wDAAwD;QACxD,IAAI,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;YAChC,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;;;OAIG;IAEH;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,CAAC,CAAC;QAClD,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAC3B,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;QAEvC,2BAA2B;QAC3B,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;YAC9B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,CAAC,CAAC;QACpD,CAAC;QAED,uBAAuB;QACvB,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,EAAE,CAAC;QAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,CAAC,CAAC;QAE9C,6BAA6B;QAC7B,IAAI,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAC1B,aAAa,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACrC,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC;QAC/B,CAAC;QAED,0BAA0B;QAC1B,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,EAAE,CAAC;QAClC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uDAAuD,CAAC,CAAC;QAE5E,kCAAkC;QAClC,MAAM,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,CAAC;QAEhD,iBAAiB;QACjB,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,EAAE,CAAC;QAElC,2BAA2B;QAC3B,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAE9B,yBAAyB;QACzB,IAAI,CAAC,gBAAgB,CAAC,IAAI,EAAE,CAAC;QAE7B,sCAAsC;QACtC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,0BAA0B,CAAC,CAAC;QAC3D,SAAS,CAAC,gBAAgB,CAAC,OAAO,EAAE,CAAC;QAErC,sCAAsC;QACtC,yBAAyB,CAAC,QAAQ,EAAE,CAAC;QAErC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;IACtD,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,mBAAmB;QAC9B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yEAAyE,CAAC,CAAC;QAC9F,MAAM,IAAI,KAAK,CAAC,kEAAkE,CAAC,CAAC;IACtF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,2BAA2B;QACvC,MAAM,UAAU,GAAG,EAAE,CAAC;QACtB,MAAM,UAAU,GAAG,GAAG,CAAC,CAAC,eAAe;QAEvC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,CAAC,EAAE,EAAE,CAAC;YACpC,6DAA6D;YAC7D,MAAM,oBAAoB,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,gBAAgB,CAAC,CAAC;YAEzF,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC1B,IAAI,CAAC;oBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kDAAkD,CAAC,CAAC;gBACzE,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,iCAAiC;oBACjC,OAAO,CAAC,GAAG,CAAC,yDAAyD,CAAC,CAAC;gBACzE,CAAC;gBACD,OAAO;YACT,CAAC;YAED,uBAAuB;YACvB,MAAM,OAAO,CAAC,UAAU,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;QAChD,CAAC;QAED,MAAM,KAAK,GAAG,kDAAkD,UAAU,WAAW,CAAC;QACtF,IAAI,CAAC;YACH,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;QAC7B,CAAC;QAAC,OAAO,QAAQ,EAAE,CAAC;YAClB,iCAAiC;YACjC,OAAO,CAAC,GAAG,CAAC,WAAW,KAAK,EAAE,CAAC,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC;IACzB,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACI,KAAK,CAAC,YAAY,CAAC,SAAyB;QACjD,OAAO,IAAI,CAAC,eAAe,CAAC,YAAY,CAAC,KAAK,IAAI,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oBAAoB,SAAS,CAAC,MAAM,UAAU,EAAE;oBACjE,UAAU,EAAE,SAAS,CAAC,MAAM;oBAC5B,SAAS,EAAE,aAAa;iBACzB,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,2BAA2B,SAAS,CAAC,MAAM,UAAU,CAAC,CAAC;YACrE,CAAC;YAED,iEAAiE;YACjE,IAAI,IAAI,CAAC,WAAW,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,EAAE,CAAC;gBACjE,IAAI,CAAC,iBAAiB,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YAC1D,CAAC;YAED,+DAA+D;YAC/D,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,YAAY,CAC5D,IAAI,CAAC,QAAQ,CAAC,MAAM,EACpB,SAAS,EACT;gBACE,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,IAAI,EAAE;gBACxC,WAAW,EAAE,IAAI,CAAC,WAAW,EAAE,cAAc,EAAE;gBAC/C,SAAS,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,EAAE;gBACvC,0BAA0B,EAAE,IAAI,CAAC,0BAA0B;gBAC3D,wBAAwB,EAAE,IAAI,CAAC,wBAAwB,CAAC,IAAI,CAAC,IAAI,CAAC;gBAClE,2BAA2B,EAAE,IAAI,CAAC,2BAA2B,CAAC,IAAI,CAAC,IAAI,CAAC;aACzE,CACF,CAAC;YAEF,sCAAsC;YACtC,IAAI,CAAC,QAAQ,CAAC,MAAM,GAAG,SAAS,CAAC;YAEjC,gDAAgD;YAChD,IAAI,CAAC,0BAA0B,GAAG,YAAY,CAAC,uBAAuB,CAAC;YAEvE,0CAA0C;YAC1C,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC,YAAY,CAAC;YAE9C,6DAA6D;YAC7D,IAAI,YAAY,CAAC,cAAc,EAAE,CAAC;gBAChC,IAAI,CAAC,WAAW,GAAG,YAAY,CAAC,cAAc,CAAC;gBAC/C,0CAA0C;gBAC1C,IAAI,CAAC,iBAAiB,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,SAAiB;QACjD,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;QACnE,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,SAAS,SAAS,YAAY,CAAC,CAAC;QAClD,CAAC;QAED,MAAM,IAAI,CAAC,WAAW,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;IACrD,CAAC;IAED,yDAAyD;IAEzD;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,SAAiB;QAC7C,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,MAAM,IAAI,CAAC,WAAW,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAED;;OAEG;IACI,oBAAoB,CAAC,SAAiB;QAC3C,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACtB,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,OAAO,IAAI,CAAC,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IAC1D,CAAC;IAED;;;;OAIG;IACI,UAAU;QACf,OAAO,IAAI,CAAC,gBAAgB,CAAC;IAC/B,CAAC;IAED;;OAEG;IACK,aAAa,CAAC,MAAc;QAClC,+BAA+B;QAC/B,IAAI,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACnC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,yDAAyD;QACzD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,MAAM,qDAAqD,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACxJ,OAAO,KAAK,CAAC;QACf,CAAC;QAED,iEAAiE;QACjE,MAAM,gBAAgB,GAAG,+FAA+F,CAAC;QACzH,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,WAAW,MAAM,+CAA+C,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACnI,OAAO,KAAK,CAAC;QACf,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;OAQG;IACI,KAAK,CAAC,gBAAgB,CAAC,IAAY;QACxC,OAAO,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;IACxC,CAAC;IAED;;;;;;;;OAQG;IACI,KAAK,CAAC,mBAAmB,CAAC,IAAY;QAC3C,OAAO,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;;;OAIG;IACI,iBAAiB;QACtB,OAAO,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE,CAAC;IAC9C,CAAC;IAED;;OAEG;IACI,aAAa;QAClB,MAAM,iBAAiB,GAAG,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,CAAC;QAClE,MAAM,gBAAgB,GAAG,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,CAAC;QAEtE,IAAI,cAAc,GAAG,CAAC,CAAC;QACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;QAC1B,IAAI,oBAAoB,GAAG,CAAC,CAAC;QAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;QAE7B,6BAA6B;QAC7B,KAAK,MAAM,MAAM,IAAI,iBAAiB,CAAC,MAAM,EAAE,EAAE,CAAC;YAChD,IAAI,MAAM,CAAC,KAAK;gBAAE,cAAc,EAAE,CAAC;;gBAC9B,iBAAiB,EAAE,CAAC;YACzB,IAAI,MAAM,CAAC,YAAY;gBAAE,oBAAoB,EAAE,CAAC;YAChD,IAAI,MAAM,CAAC,iBAAiB;gBAAE,oBAAoB,EAAE,CAAC;QACvD,CAAC;QAED,OAAO;YACL,iBAAiB,EAAE,iBAAiB,CAAC,IAAI;YACzC,cAAc;YACd,iBAAiB;YACjB,oBAAoB;YACpB,oBAAoB;YACpB,gBAAgB;YAChB,WAAW,EAAE,CAAC,CAAC,IAAI,CAAC,WAAW;YAC/B,iBAAiB,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI;YAC/C,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM;YACvC,WAAW,EAAE,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE,CAAC,MAAM;YACxD,cAAc,EAAE,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE;SACrD,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,iCAAiC;QACtC,MAAM,OAAO,GAAa,EAAE,CAAC;QAE7B,0BAA0B;QAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,EAAE,CAAC;QAE1C,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBAAE,SAAS;YAEnC,2DAA2D;YAC3D,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG;gBACjB,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,aAAa;gBACvC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,WAAW,KAAK,MAAM;gBAAE,SAAS;YAEtD,MAAM,YAAY,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;gBACrD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YAE1B,4CAA4C;YAC5C,MAAM,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CACnD,CAAC,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CACpD,CAAC;YAEF,OAAO,CAAC,IAAI,CAAC,GAAG,eAAe,CAAC,CAAC;QACnC,CAAC;QAED,qCAAqC;QAErC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB;QAC5B,OAAO,IAAI,CAAC,eAAe,CAAC,SAAS,EAAE,CAAC;IAC1C,CAAC;IAED;;OAEG;IACK,yBAAyB;QAC/B,MAAM,QAAQ,GAAa,EAAE,CAAC;QAE9B,4CAA4C;QAC5C,MAAM,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACjD,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,CACrC,CAAC;QAEF,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,OAAO,QAAQ,CAAC;QAClB,CAAC;QAED,4CAA4C;QAC5C,MAAM,gBAAgB,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,KAAK,CAAC;QACnD,MAAM,eAAe,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC;QAE1E,IAAI,CAAC,gBAAgB,IAAI,eAAe,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtD,QAAQ,CAAC,IAAI,CACX,oEAAoE;gBACpE,uFAAuF,CACxF,CAAC;QACJ,CAAC;QAED,gDAAgD;QAChD,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,aAAa,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,IAAI,EAAE,CAAC;YACrD,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,EAAE,CAAC;YAEzD,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;gBACxC,QAAQ,CAAC,IAAI,CACX,QAAQ,aAAa,uEAAuE;oBAC5F,iCAAiC,aAAa,oDAAoD,CACnG,CAAC;YACJ,CAAC;QACH,CAAC;QAED,oCAAoC;QACpC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,aAAa,EAAE,CAAC;YACtC,MAAM,aAAa,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAC1C,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,aAAa,KAAK,KAAK,CAC5C,CAAC;YACF,IAAI,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC7B,QAAQ,CAAC,IAAI,CACX,8DAA8D;oBAC9D,6DAA6D,CAC9D,CAAC;YACJ,CAAC;QACH,CAAC;QAED,oDAAoD;QACpD,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;YAC/B,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;gBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YAE1B,MAAM,eAAe,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC;YAC9D,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC/B,QAAQ,CAAC,IAAI,CACX,UAAU,KAAK,CAAC,IAAI,4BAA4B,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG;oBAC7E,6EAA6E;oBAC7E,qEAAqE,CACtE,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;CAEF"}
349
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"smart-proxy.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/smart-proxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AAEpD,0BAA0B;AAC1B,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAE,iBAAiB,EAAE,MAAM,0BAA0B,CAAC;AAC7D,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACjE,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAE/D,mBAAmB;AACnB,OAAO,EAAE,kBAAkB,IAAI,YAAY,EAAE,MAAM,qCAAqC,CAAC;AACzF,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAC5D,OAAO,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAOzC;;;;;;;;;GASG;AACH,MAAM,OAAO,UAAW,SAAQ,OAAO,CAAC,YAAY;IAWlD,YAAY,WAA+B;QACzC,KAAK,EAAE,CAAC;QANF,wBAAmB,GAA+B,IAAI,CAAC;QAGvD,aAAQ,GAAG,KAAK,CAAC;QAKvB,iBAAiB;QACjB,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,WAAW;YACd,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,MAAM;YAC5D,aAAa,EAAE,WAAW,CAAC,aAAa,IAAI,OAAO;YACnD,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,QAAQ;YACpE,iBAAiB,EAAE,WAAW,CAAC,iBAAiB,IAAI,QAAQ;YAC5D,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,mBAAmB,EAAE,WAAW,CAAC,mBAAmB,IAAI,GAAG;YAC3D,4BAA4B,EAAE,WAAW,CAAC,4BAA4B,IAAI,GAAG;YAC7E,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,UAAU;YAChE,6BAA6B,EAAE,WAAW,CAAC,6BAA6B,IAAI,CAAC;YAC7E,yBAAyB,EAAE,WAAW,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI;SAC5F,CAAC;QAEF,yBAAyB;QACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACjE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC;YAC7D,CAAC;YACD,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG;gBACnB,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,KAAK,KAAK;gBAC7C,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,IAAI,EAAE;gBACnC,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;gBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,KAAK;gBACxD,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,EAAE;gBAC/D,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,KAAK,KAAK;gBACjD,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,SAAS;gBAClE,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,mBAAmB,IAAI,KAAK;gBACpE,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAuB,IAAI,EAAE;gBACzE,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,IAAI,EAAE;gBACrD,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI;aACtB,CAAC;QACJ,CAAC;QAED,kBAAkB;QAClB,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC;YACjC,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,oCAAoC,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YACrG,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,MAAM,aAAa,GAAG;YACpB,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;YAC1E,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC;YACxE,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE,CAAC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,CAAC;SAC3E,CAAC;QAEF,wBAAwB;QACxB,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC;YACnC,MAAM,EAAE,aAAa;YACrB,qBAAqB,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB;YAC1D,MAAM,EAAE,IAAI,CAAC,QAAQ,CAAC,MAAM;SAC7B,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,GAAG,IAAI,eAAe,EAAE,CAAC;QACpC,IAAI,CAAC,YAAY,GAAG,IAAI,iBAAiB,EAAE,CAAC;QAC5C,IAAI,CAAC,cAAc,GAAG,IAAI,kBAAkB,CAC1C,IAAI,CAAC,MAAM,EACX,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,gBAAgB,IAAI,IAAI,CAChD,CAAC;QACF,IAAI,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;IACrC,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,KAAK;QAChB,oBAAoB;QACpB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;QAC1C,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CACb,gGAAgG;gBAChG,yDAAyD,CAC1D,CAAC;QACJ,CAAC;QAED,0EAA0E;QAC1E,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAmB,EAAE,MAAqB,EAAE,EAAE;YACpE,IAAI,IAAI,CAAC,QAAQ;gBAAE,OAAO;YAC1B,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,IAAI,YAAY,MAAM,GAAG,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;YACpH,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE,IAAI,KAAK,CAAC,0BAA0B,IAAI,YAAY,MAAM,GAAG,CAAC,CAAC,CAAC;QACrF,CAAC,CAAC,CAAC;QAEH,iFAAiF;QACjF,MAAM,gBAAgB,GAAG,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAChD,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,KAAK,gBAAgB,IAAI,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC;YAC9D,CAAC,CAAC,MAAM,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,IAAI,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,CAAC,CAC9F,CAAC;QAEF,kFAAkF;QAClF,IAAI,gBAAgB,EAAE,CAAC;YACrB,IAAI,CAAC,mBAAmB,GAAG,IAAI,mBAAmB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACtE,MAAM,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;QACzC,CAAC;QAED,wEAAwE;QACxE,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAE7E,oBAAoB;QACpB,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;QAEhD,uBAAuB;QACvB,MAAM,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;QAErC,iEAAiE;QACjE,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,EAAE,CAAC,CAAC;QACpF,CAAC;QAED,+BAA+B;QAC/B,MAAM,IAAI,CAAC,gCAAgC,EAAE,CAAC;QAE9C,wBAAwB;QACxB,IAAI,CAAC,cAAc,CAAC,YAAY,EAAE,CAAC;QAEnC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;IACvF,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;QAChF,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC;QAErB,uBAAuB;QACvB,IAAI,CAAC,cAAc,CAAC,WAAW,EAAE,CAAC;QAElC,qEAAqE;QACrE,IAAI,CAAC,MAAM,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAEvC,kBAAkB;QAClB,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;QAChC,CAAC;QAAC,MAAM,CAAC;YACP,4BAA4B;QAC9B,CAAC;QACD,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;QAEnB,4BAA4B;QAC5B,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,mBAAmB,CAAC,IAAI,EAAE,CAAC;YACtC,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC;QAClC,CAAC;QAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;IACpF,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,SAAyB;QACjD,OAAO,IAAI,CAAC,eAAe,CAAC,YAAY,CAAC,KAAK,IAAI,EAAE;YAClD,WAAW;YACX,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC5D,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,4BAA4B,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YAC7F,CAAC;YAED,sBAAsB;YACtB,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAElE,eAAe;YACf,MAAM,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,UAAU,CAAC,CAAC;YAE3C,6BAA6B;YAC7B,IAAI,CAAC,YAAY,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;YAE1C,wDAAwD;YACxD,MAAM,gBAAgB,GAAG,SAAS,CAAC,IAAI,CACrC,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,KAAK,gBAAgB,IAAI,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC;gBAC9D,CAAC,CAAC,MAAM,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,IAAI,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,CAAC,CAC9F,CAAC;YAEF,IAAI,gBAAgB,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBAClD,IAAI,CAAC,mBAAmB,GAAG,IAAI,mBAAmB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBACtE,MAAM,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;gBACvC,MAAM,IAAI,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,CAAC,mBAAmB,CAAC,aAAa,EAAE,CAAC,CAAC;YACpF,CAAC;iBAAM,IAAI,CAAC,gBAAgB,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzD,MAAM,IAAI,CAAC,mBAAmB,CAAC,IAAI,EAAE,CAAC;gBACtC,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC;YAClC,CAAC;YAED,uBAAuB;YACvB,IAAI,CAAC,QAAQ,CAAC,MAAM,GAAG,SAAS,CAAC;YAEjC,0CAA0C;YAC1C,MAAM,IAAI,CAAC,gCAAgC,EAAE,CAAC;YAE9C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mBAAmB,SAAS,CAAC,MAAM,UAAU,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;QAClG,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,SAAiB;QACjD,MAAM,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACpD,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,SAAiB;QAC7C,MAAM,IAAI,CAAC,MAAM,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,SAAiB;QACjD,OAAO,IAAI,CAAC,MAAM,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAED;;OAEG;IACI,UAAU;QACf,OAAO,IAAI,CAAC,cAAc,CAAC;IAC7B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,aAAa;QACxB,OAAO,IAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,IAAY;QACxC,MAAM,IAAI,CAAC,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,mBAAmB,CAAC,IAAY;QAC3C,MAAM,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;IAC9C,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB;QAC5B,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO;YAAE,OAAO,EAAE,CAAC;QACpC,OAAO,IAAI,CAAC,MAAM,CAAC,iBAAiB,EAAE,CAAC;IACzC,CAAC;IAED;;OAEG;IACI,iCAAiC;QACtC,MAAM,OAAO,GAAa,EAAE,CAAC;QAC7B,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,EAAE,EAAE,CAAC;YAC/C,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBAAE,SAAS;YACnC,IACE,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG;gBACjB,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,aAAa;gBACvC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,WAAW,KAAK,MAAM;gBAEvC,SAAS;YAEX,MAAM,YAAY,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YACtG,MAAM,QAAQ,GAAG,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC;YACvF,OAAO,CAAC,IAAI,CAAC,GAAG,QAAQ,CAAC,CAAC;QAC5B,CAAC;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB;QAC5B,OAAO,IAAI,CAAC,MAAM,CAAC,iBAAiB,EAAE,CAAC;IACzC,CAAC;IAED,0BAA0B;IAE1B;;OAEG;IACK,eAAe,CAAC,MAAsB;QAC5C,OAAO;YACL,MAAM;YACN,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ;YAChC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI;gBACtB,CAAC,CAAC;oBACE,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO;oBACnC,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK;oBAC/B,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa;oBAC/C,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI;oBAC7B,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,kBAAkB;oBACzD,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS;oBACvC,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,gBAAgB;oBACrD,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,uBAAuB;iBACpE;gBACH,CAAC,CAAC,SAAS;YACb,iBAAiB,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;YAClD,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAkB;YACpD,aAAa,EAAE,IAAI,CAAC,QAAQ,CAAC,aAAa;YAC1C,qBAAqB,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB;YAC1D,uBAAuB,EAAE,IAAI,CAAC,QAAQ,CAAC,uBAAuB;YAC9D,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,mBAAmB;YACtD,4BAA4B,EAAE,IAAI,CAAC,QAAQ,CAAC,4BAA4B;YACxE,kBAAkB,EAAE,IAAI,CAAC,QAAQ,CAAC,kBAAkB;YACpD,6BAA6B,EAAE,IAAI,CAAC,QAAQ,CAAC,6BAA6B;YAC1E,yBAAyB,EAAE,IAAI,CAAC,QAAQ,CAAC,yBAAyB;YAClE,mBAAmB,EAAE,IAAI,CAAC,QAAQ,CAAC,mBAAmB;YACtD,iBAAiB,EAAE,IAAI,CAAC,QAAQ,CAAC,iBAAiB;SACnD,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,gCAAgC;QAC5C,MAAM,WAAW,GAAG,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC;QACxD,IAAI,CAAC,WAAW;YAAE,OAAO;QAEzB,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;YACzC,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM;gBAAE,SAAS;YACvD,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBAAE,SAAS;YAEnC,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YAEjG,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;gBAC7B,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC;oBAAE,SAAS;gBAEnC,IAAI,CAAC;oBACH,MAAM,MAAM,GAAmC,MAAM,WAAW,CAAC,MAAM,CAAC,CAAC;oBAEzE,IAAI,MAAM,KAAK,QAAQ,EAAE,CAAC;wBACxB,oCAAoC;wBACpC,SAAS;oBACX,CAAC;oBAED,+CAA+C;oBAC/C,IAAI,MAAM,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;wBACzC,MAAM,OAAO,GAAG,MAAuC,CAAC;wBACxD,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAC/B,MAAM,EACN,OAAO,CAAC,SAAS,EACjB,OAAO,CAAC,UAAU,CACnB,CAAC;wBACF,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iDAAiD,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;oBAC9G,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAQ,EAAE,CAAC;oBAClB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,MAAM,KAAK,GAAG,CAAC,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;oBAE/G,8BAA8B;oBAC9B,IAAI,IAAI,CAAC,QAAQ,CAAC,2BAA2B,KAAK,KAAK,EAAE,CAAC;wBACxD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,CAAC;oBACzF,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAEO,aAAa,CAAC,MAAc;QAClC,IAAI,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC;YAAE,OAAO,KAAK,CAAC;QACjD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC;YAAE,OAAO,KAAK,CAAC;QACvC,MAAM,gBAAgB,GACpB,+FAA+F,CAAC;QAClG,OAAO,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IACvC,CAAC;CACF"}