@push.rocks/smartproxy 22.6.0 → 23.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/changelog.md +8 -0
  2. package/dist_ts/00_commitinfo_data.js +1 -1
  3. package/dist_ts/index.d.ts +0 -1
  4. package/dist_ts/index.js +1 -3
  5. package/dist_ts/proxies/index.d.ts +0 -1
  6. package/dist_ts/proxies/index.js +1 -3
  7. package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
  8. package/package.json +1 -1
  9. package/readme.md +0 -26
  10. package/ts/00_commitinfo_data.ts +1 -1
  11. package/ts/index.ts +0 -3
  12. package/ts/proxies/index.ts +0 -3
  13. package/ts/proxies/smart-proxy/models/route-types.ts +0 -2
  14. package/dist_ts/proxies/nftables-proxy/index.d.ts +0 -6
  15. package/dist_ts/proxies/nftables-proxy/index.js +0 -7
  16. package/dist_ts/proxies/nftables-proxy/models/errors.d.ts +0 -15
  17. package/dist_ts/proxies/nftables-proxy/models/errors.js +0 -28
  18. package/dist_ts/proxies/nftables-proxy/models/index.d.ts +0 -5
  19. package/dist_ts/proxies/nftables-proxy/models/index.js +0 -6
  20. package/dist_ts/proxies/nftables-proxy/models/interfaces.d.ts +0 -75
  21. package/dist_ts/proxies/nftables-proxy/models/interfaces.js +0 -5
  22. package/dist_ts/proxies/nftables-proxy/nftables-proxy.d.ts +0 -124
  23. package/dist_ts/proxies/nftables-proxy/nftables-proxy.js +0 -1374
  24. package/dist_ts/proxies/nftables-proxy/utils/index.d.ts +0 -9
  25. package/dist_ts/proxies/nftables-proxy/utils/index.js +0 -12
  26. package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.d.ts +0 -66
  27. package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.js +0 -131
  28. package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.d.ts +0 -39
  29. package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.js +0 -112
  30. package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.d.ts +0 -59
  31. package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.js +0 -130
  32. package/ts/proxies/nftables-proxy/index.ts +0 -6
  33. package/ts/proxies/nftables-proxy/models/errors.ts +0 -30
  34. package/ts/proxies/nftables-proxy/models/index.ts +0 -5
  35. package/ts/proxies/nftables-proxy/models/interfaces.ts +0 -94
  36. package/ts/proxies/nftables-proxy/nftables-proxy.ts +0 -1754
  37. package/ts/proxies/nftables-proxy/utils/index.ts +0 -38
  38. package/ts/proxies/nftables-proxy/utils/nft-command-executor.ts +0 -162
  39. package/ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.ts +0 -125
  40. package/ts/proxies/nftables-proxy/utils/nft-rule-validator.ts +0 -156
@@ -1,1374 +0,0 @@
1
- import { exec, execSync } from 'child_process';
2
- import { promisify } from 'util';
3
- import * as fs from 'fs';
4
- import * as path from 'path';
5
- import * as os from 'os';
6
- import { AsyncFileSystem } from '../../core/utils/fs-utils.js';
7
- import { NftValidationError, NftExecutionError, NftResourceError } from './models/index.js';
8
- import { NftCommandExecutor, normalizePortSpec, validateSettings, filterIPsByFamily } from './utils/index.js';
9
- const execAsync = promisify(exec);
10
- /**
11
- * NfTablesProxy sets up nftables NAT rules to forward TCP traffic.
12
- * Enhanced with multi-port support, IPv6, connection tracking, metrics,
13
- * and more advanced features.
14
- */
15
- export class NfTablesProxy {
16
- static { this.NFT_CMD = 'nft'; }
17
- constructor(settings) {
18
- this.rules = [];
19
- this.ipSets = new Map(); // Store IP sets for tracking
20
- // Validate inputs to prevent command injection
21
- validateSettings(settings);
22
- // Set default settings
23
- this.settings = {
24
- ...settings,
25
- toHost: settings.toHost || 'localhost',
26
- protocol: settings.protocol || 'tcp',
27
- enableLogging: settings.enableLogging !== undefined ? settings.enableLogging : false,
28
- ipv6Support: settings.ipv6Support !== undefined ? settings.ipv6Support : false,
29
- tableName: settings.tableName || 'portproxy',
30
- logFormat: settings.logFormat || 'plain',
31
- useIPSets: settings.useIPSets !== undefined ? settings.useIPSets : true,
32
- maxRetries: settings.maxRetries || 3,
33
- retryDelayMs: settings.retryDelayMs || 1000,
34
- useAdvancedNAT: settings.useAdvancedNAT !== undefined ? settings.useAdvancedNAT : false,
35
- };
36
- // Generate a unique identifier for the rules added by this instance
37
- this.ruleTag = `NfTablesProxy:${Date.now()}:${Math.random().toString(36).substr(2, 5)}`;
38
- // Set table name
39
- this.tableName = this.settings.tableName || 'portproxy';
40
- // Create a temp file path for batch operations
41
- this.tempFilePath = path.join(os.tmpdir(), `nft-rules-${Date.now()}.nft`);
42
- // Create the command executor
43
- this.executor = new NftCommandExecutor((level, message, data) => this.log(level, message, data), {
44
- maxRetries: this.settings.maxRetries,
45
- retryDelayMs: this.settings.retryDelayMs,
46
- tempFilePath: this.tempFilePath
47
- });
48
- // Register cleanup handlers if deleteOnExit is true
49
- if (this.settings.deleteOnExit) {
50
- // Synchronous cleanup for 'exit' event (only sync code runs here)
51
- const syncCleanup = () => {
52
- try {
53
- this.stopSync();
54
- }
55
- catch (err) {
56
- this.log('error', 'Error cleaning nftables rules on exit:', { error: err.message });
57
- }
58
- };
59
- // Async cleanup for signal handlers (preferred, non-blocking)
60
- const asyncCleanup = async () => {
61
- try {
62
- await this.stop();
63
- }
64
- catch (err) {
65
- this.log('error', 'Error cleaning nftables rules on signal:', { error: err.message });
66
- }
67
- };
68
- process.on('exit', syncCleanup);
69
- process.on('SIGINT', () => {
70
- asyncCleanup().finally(() => process.exit());
71
- });
72
- process.on('SIGTERM', () => {
73
- asyncCleanup().finally(() => process.exit());
74
- });
75
- }
76
- }
77
- /**
78
- * Checks if nftables is available and the required modules are loaded
79
- */
80
- async checkNftablesAvailability() {
81
- const available = await this.executor.checkAvailability();
82
- if (available && this.settings.useAdvancedNAT) {
83
- await this.executor.checkConntrackModules();
84
- }
85
- return available;
86
- }
87
- /**
88
- * Creates the necessary tables and chains
89
- */
90
- async setupTablesAndChains(isIpv6 = false) {
91
- const family = isIpv6 ? 'ip6' : 'ip';
92
- try {
93
- // Check if the table already exists
94
- const stdout = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list tables ${family}`, this.settings.maxRetries, this.settings.retryDelayMs);
95
- const tableExists = stdout.includes(`table ${family} ${this.tableName}`);
96
- if (!tableExists) {
97
- // Create the table
98
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
99
- this.log('info', `Created table ${family} ${this.tableName}`);
100
- // Create the nat chain for the prerouting hook
101
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} nat_prerouting { type nat hook prerouting priority -100 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
102
- this.log('info', `Created nat_prerouting chain in ${family} ${this.tableName}`);
103
- // Create the nat chain for the postrouting hook if not preserving source IP
104
- if (!this.settings.preserveSourceIP) {
105
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} nat_postrouting { type nat hook postrouting priority 100 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
106
- this.log('info', `Created nat_postrouting chain in ${family} ${this.tableName}`);
107
- }
108
- // Create the chain for NetworkProxy integration if needed
109
- if (this.settings.netProxyIntegration?.enabled && this.settings.netProxyIntegration.redirectLocalhost) {
110
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} nat_output { type nat hook output priority 0 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
111
- this.log('info', `Created nat_output chain in ${family} ${this.tableName}`);
112
- }
113
- // Create the QoS chain if needed
114
- if (this.settings.qos?.enabled) {
115
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add chain ${family} ${this.tableName} qos_forward { type filter hook forward priority 0 ; }`, this.settings.maxRetries, this.settings.retryDelayMs);
116
- this.log('info', `Created QoS forward chain in ${family} ${this.tableName}`);
117
- }
118
- }
119
- else {
120
- this.log('info', `Table ${family} ${this.tableName} already exists, using existing table`);
121
- }
122
- return true;
123
- }
124
- catch (err) {
125
- this.log('error', `Failed to set up tables and chains: ${err.message}`);
126
- return false;
127
- }
128
- }
129
- /**
130
- * Creates IP sets for efficient filtering of large IP lists
131
- */
132
- async createIPSet(family, setName, ips, setType = 'ipv4_addr') {
133
- try {
134
- // Filter IPs based on family
135
- const filteredIPs = filterIPsByFamily(ips, family);
136
- if (filteredIPs.length === 0) {
137
- this.log('info', `No IP addresses of type ${setType} to add to set ${setName}`);
138
- return true;
139
- }
140
- // Check if set already exists
141
- try {
142
- const sets = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list sets ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
143
- if (sets.includes(`set ${setName} {`)) {
144
- this.log('info', `IP set ${setName} already exists, will add elements`);
145
- }
146
- else {
147
- // Create the set
148
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add set ${family} ${this.tableName} ${setName} { type ${setType}; }`, this.settings.maxRetries, this.settings.retryDelayMs);
149
- this.log('info', `Created IP set ${setName} for ${family} with type ${setType}`);
150
- }
151
- }
152
- catch (err) {
153
- // Set might not exist yet, create it
154
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add set ${family} ${this.tableName} ${setName} { type ${setType}; }`, this.settings.maxRetries, this.settings.retryDelayMs);
155
- this.log('info', `Created IP set ${setName} for ${family} with type ${setType}`);
156
- }
157
- // Add IPs to the set in batches to avoid command line length limitations
158
- const batchSize = 100;
159
- for (let i = 0; i < filteredIPs.length; i += batchSize) {
160
- const batch = filteredIPs.slice(i, i + batchSize);
161
- const elements = batch.join(', ');
162
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} add element ${family} ${this.tableName} ${setName} { ${elements} }`, this.settings.maxRetries, this.settings.retryDelayMs);
163
- this.log('info', `Added batch of ${batch.length} IPs to set ${setName}`);
164
- }
165
- // Track the IP set
166
- this.ipSets.set(`${family}:${setName}`, filteredIPs);
167
- return true;
168
- }
169
- catch (err) {
170
- this.log('error', `Failed to create IP set ${setName}: ${err.message}`);
171
- return false;
172
- }
173
- }
174
- /**
175
- * Adds source IP filtering rules, potentially using IP sets for efficiency
176
- */
177
- async addSourceIPFilters(isIpv6 = false) {
178
- if (!this.settings.ipAllowList && !this.settings.ipBlockList) {
179
- return true; // Nothing to do
180
- }
181
- const family = isIpv6 ? 'ip6' : 'ip';
182
- const chain = 'nat_prerouting';
183
- const setType = isIpv6 ? 'ipv6_addr' : 'ipv4_addr';
184
- try {
185
- // Start building the ruleset file content
186
- let rulesetContent = '';
187
- // Using IP sets for more efficient rule processing with large IP lists
188
- if (this.settings.useIPSets) {
189
- // Create sets for banned and allowed IPs if needed
190
- if (this.settings.ipBlockList && this.settings.ipBlockList.length > 0) {
191
- const setName = 'banned_ips';
192
- await this.createIPSet(family, setName, this.settings.ipBlockList, setType);
193
- // Add rule to drop traffic from banned IPs
194
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr @${setName} drop comment "${this.ruleTag}:BANNED_SET"`;
195
- rulesetContent += `${rule}\n`;
196
- this.rules.push({
197
- tableFamily: family,
198
- tableName: this.tableName,
199
- chainName: chain,
200
- ruleContents: rule,
201
- added: false
202
- });
203
- }
204
- if (this.settings.ipAllowList && this.settings.ipAllowList.length > 0) {
205
- const setName = 'allowed_ips';
206
- await this.createIPSet(family, setName, this.settings.ipAllowList, setType);
207
- // Add rule to allow traffic from allowed IPs
208
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr @${setName} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED_SET"`;
209
- rulesetContent += `${rule}\n`;
210
- this.rules.push({
211
- tableFamily: family,
212
- tableName: this.tableName,
213
- chainName: chain,
214
- ruleContents: rule,
215
- added: false
216
- });
217
- // Add default deny rule for unlisted IPs
218
- const denyRule = `add rule ${family} ${this.tableName} ${chain} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`;
219
- rulesetContent += `${denyRule}\n`;
220
- this.rules.push({
221
- tableFamily: family,
222
- tableName: this.tableName,
223
- chainName: chain,
224
- ruleContents: denyRule,
225
- added: false
226
- });
227
- }
228
- }
229
- else {
230
- // Traditional approach without IP sets - less efficient for large IP lists
231
- // Ban specific IPs first
232
- if (this.settings.ipBlockList && this.settings.ipBlockList.length > 0) {
233
- for (const ip of this.settings.ipBlockList) {
234
- // Skip IPv4 addresses for IPv6 rules and vice versa
235
- if (isIpv6 && ip.includes('.'))
236
- continue;
237
- if (!isIpv6 && ip.includes(':'))
238
- continue;
239
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr ${ip} drop comment "${this.ruleTag}:BANNED"`;
240
- rulesetContent += `${rule}\n`;
241
- this.rules.push({
242
- tableFamily: family,
243
- tableName: this.tableName,
244
- chainName: chain,
245
- ruleContents: rule,
246
- added: false
247
- });
248
- }
249
- }
250
- // Allow specific IPs
251
- if (this.settings.ipAllowList && this.settings.ipAllowList.length > 0) {
252
- // Add rules to allow specific IPs
253
- for (const ip of this.settings.ipAllowList) {
254
- // Skip IPv4 addresses for IPv6 rules and vice versa
255
- if (isIpv6 && ip.includes('.'))
256
- continue;
257
- if (!isIpv6 && ip.includes(':'))
258
- continue;
259
- const rule = `add rule ${family} ${this.tableName} ${chain} ip${isIpv6 ? '6' : ''} saddr ${ip} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED"`;
260
- rulesetContent += `${rule}\n`;
261
- this.rules.push({
262
- tableFamily: family,
263
- tableName: this.tableName,
264
- chainName: chain,
265
- ruleContents: rule,
266
- added: false
267
- });
268
- }
269
- // Add default deny rule for unlisted IPs
270
- const denyRule = `add rule ${family} ${this.tableName} ${chain} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`;
271
- rulesetContent += `${denyRule}\n`;
272
- this.rules.push({
273
- tableFamily: family,
274
- tableName: this.tableName,
275
- chainName: chain,
276
- ruleContents: denyRule,
277
- added: false
278
- });
279
- }
280
- }
281
- // Only write and apply if we have rules to add
282
- if (rulesetContent) {
283
- // Apply the ruleset using the helper
284
- await this.executor.executeWithTempFile(rulesetContent);
285
- this.log('info', `Added source IP filter rules for ${family}`);
286
- // Mark rules as added
287
- for (const rule of this.rules) {
288
- if (rule.tableFamily === family && !rule.added) {
289
- rule.added = true;
290
- // Verify the rule was applied
291
- await this.verifyRuleApplication(rule);
292
- }
293
- }
294
- }
295
- return true;
296
- }
297
- catch (err) {
298
- this.log('error', `Failed to add source IP filter rules: ${err.message}`);
299
- // Try to clean up any rules that might have been added
300
- this.rollbackRules();
301
- return false;
302
- }
303
- }
304
- /**
305
- * Gets a comma-separated list of all ports from a port specification
306
- */
307
- getAllPorts(portSpec) {
308
- const portRanges = normalizePortSpec(portSpec);
309
- const ports = [];
310
- for (const range of portRanges) {
311
- if (range.from === range.to) {
312
- ports.push(range.from.toString());
313
- }
314
- else {
315
- ports.push(`${range.from}-${range.to}`);
316
- }
317
- }
318
- return ports.join(', ');
319
- }
320
- /**
321
- * Configures advanced NAT with connection tracking
322
- */
323
- async setupAdvancedNAT(isIpv6 = false) {
324
- if (!this.settings.useAdvancedNAT) {
325
- return true; // Skip if not using advanced NAT
326
- }
327
- const family = isIpv6 ? 'ip6' : 'ip';
328
- const preroutingChain = 'nat_prerouting';
329
- try {
330
- // Get the port ranges
331
- const fromPortRanges = normalizePortSpec(this.settings.fromPort);
332
- const toPortRanges = normalizePortSpec(this.settings.toPort);
333
- let rulesetContent = '';
334
- // Simple case - one-to-one mapping with connection tracking
335
- if (fromPortRanges.length === 1 && toPortRanges.length === 1) {
336
- const fromRange = fromPortRanges[0];
337
- const toRange = toPortRanges[0];
338
- // Single port to single port with connection tracking
339
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
340
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from} ct state new dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT_CT"`;
341
- rulesetContent += `${rule}\n`;
342
- this.rules.push({
343
- tableFamily: family,
344
- tableName: this.tableName,
345
- chainName: preroutingChain,
346
- ruleContents: rule,
347
- added: false
348
- });
349
- }
350
- // Port range with same size
351
- else if ((fromRange.to - fromRange.from) === (toRange.to - toRange.from)) {
352
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} ct state new dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE_CT"`;
353
- rulesetContent += `${rule}\n`;
354
- this.rules.push({
355
- tableFamily: family,
356
- tableName: this.tableName,
357
- chainName: preroutingChain,
358
- ruleContents: rule,
359
- added: false
360
- });
361
- }
362
- // Add related and established connection rule for efficient connection handling
363
- const ctRule = `add rule ${family} ${this.tableName} ${preroutingChain} ct state established,related accept comment "${this.ruleTag}:CT_ESTABLISHED"`;
364
- rulesetContent += `${ctRule}\n`;
365
- this.rules.push({
366
- tableFamily: family,
367
- tableName: this.tableName,
368
- chainName: preroutingChain,
369
- ruleContents: ctRule,
370
- added: false
371
- });
372
- // Apply the rules if we have any
373
- if (rulesetContent) {
374
- await this.executor.executeWithTempFile(rulesetContent);
375
- this.log('info', `Added advanced NAT rules for ${family}`);
376
- // Mark rules as added
377
- for (const rule of this.rules) {
378
- if (rule.tableFamily === family && !rule.added) {
379
- rule.added = true;
380
- // Verify the rule was applied
381
- await this.verifyRuleApplication(rule);
382
- }
383
- }
384
- }
385
- }
386
- return true;
387
- }
388
- catch (err) {
389
- this.log('error', `Failed to set up advanced NAT: ${err.message}`);
390
- return false;
391
- }
392
- }
393
- /**
394
- * Adds port forwarding rules
395
- */
396
- async addPortForwardingRules(isIpv6 = false) {
397
- // Skip if using advanced NAT as that already handles the port forwarding
398
- if (this.settings.useAdvancedNAT) {
399
- return true;
400
- }
401
- const family = isIpv6 ? 'ip6' : 'ip';
402
- const preroutingChain = 'nat_prerouting';
403
- const postroutingChain = 'nat_postrouting';
404
- try {
405
- // Normalize port specifications
406
- const fromPortRanges = normalizePortSpec(this.settings.fromPort);
407
- const toPortRanges = normalizePortSpec(this.settings.toPort);
408
- // Handle the case where fromPort and toPort counts don't match
409
- if (fromPortRanges.length !== toPortRanges.length) {
410
- if (toPortRanges.length === 1) {
411
- // If there's only one toPort, use it for all fromPorts
412
- const singleToRange = toPortRanges[0];
413
- return await this.addPortMappings(family, preroutingChain, postroutingChain, fromPortRanges, singleToRange);
414
- }
415
- else {
416
- throw new NftValidationError('Mismatched port counts: fromPort and toPort arrays must have equal length or toPort must be a single value');
417
- }
418
- }
419
- else {
420
- // Add port mapping rules for each port pair
421
- return await this.addPortPairMappings(family, preroutingChain, postroutingChain, fromPortRanges, toPortRanges);
422
- }
423
- }
424
- catch (err) {
425
- this.log('error', `Failed to add port forwarding rules: ${err.message}`);
426
- return false;
427
- }
428
- }
429
- /**
430
- * Adds port forwarding rules for the case where one toPortRange maps to multiple fromPortRanges
431
- */
432
- async addPortMappings(family, preroutingChain, postroutingChain, fromPortRanges, toPortRange) {
433
- try {
434
- let rulesetContent = '';
435
- // For each from port range, create a mapping to the single to port range
436
- for (const fromRange of fromPortRanges) {
437
- // Simple case: single port to single port
438
- if (fromRange.from === fromRange.to && toPortRange.from === toPortRange.to) {
439
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from} dnat to ${this.settings.toHost}:${toPortRange.from} comment "${this.ruleTag}:DNAT"`;
440
- rulesetContent += `${rule}\n`;
441
- this.rules.push({
442
- tableFamily: family,
443
- tableName: this.tableName,
444
- chainName: preroutingChain,
445
- ruleContents: rule,
446
- added: false
447
- });
448
- }
449
- // Multiple ports in from range, but only one port in to range
450
- else if (toPortRange.from === toPortRange.to) {
451
- // Map each port in from range to the single to port
452
- for (let p = fromRange.from; p <= fromRange.to; p++) {
453
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${p} dnat to ${this.settings.toHost}:${toPortRange.from} comment "${this.ruleTag}:DNAT"`;
454
- rulesetContent += `${rule}\n`;
455
- this.rules.push({
456
- tableFamily: family,
457
- tableName: this.tableName,
458
- chainName: preroutingChain,
459
- ruleContents: rule,
460
- added: false
461
- });
462
- }
463
- }
464
- // Port range to port range mapping with modulo distribution
465
- else {
466
- const toRangeSize = toPortRange.to - toPortRange.from + 1;
467
- for (let p = fromRange.from; p <= fromRange.to; p++) {
468
- const offset = (p - fromRange.from) % toRangeSize;
469
- const targetPort = toPortRange.from + offset;
470
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${p} dnat to ${this.settings.toHost}:${targetPort} comment "${this.ruleTag}:DNAT"`;
471
- rulesetContent += `${rule}\n`;
472
- this.rules.push({
473
- tableFamily: family,
474
- tableName: this.tableName,
475
- chainName: preroutingChain,
476
- ruleContents: rule,
477
- added: false
478
- });
479
- }
480
- }
481
- }
482
- // Add masquerade rule for source NAT if not preserving source IP
483
- if (!this.settings.preserveSourceIP) {
484
- const ports = this.getAllPorts(this.settings.toPort);
485
- const masqRule = `add rule ${family} ${this.tableName} ${postroutingChain} ${this.settings.protocol} daddr ${this.settings.toHost} dport {${ports}} masquerade comment "${this.ruleTag}:MASQ"`;
486
- rulesetContent += `${masqRule}\n`;
487
- this.rules.push({
488
- tableFamily: family,
489
- tableName: this.tableName,
490
- chainName: postroutingChain,
491
- ruleContents: masqRule,
492
- added: false
493
- });
494
- }
495
- // Apply the ruleset if we have any rules
496
- if (rulesetContent) {
497
- // Apply the ruleset using the helper
498
- await this.executor.executeWithTempFile(rulesetContent);
499
- this.log('info', `Added port forwarding rules for ${family}`);
500
- // Mark rules as added
501
- for (const rule of this.rules) {
502
- if (rule.tableFamily === family && !rule.added) {
503
- rule.added = true;
504
- // Verify the rule was applied
505
- await this.verifyRuleApplication(rule);
506
- }
507
- }
508
- }
509
- return true;
510
- }
511
- catch (err) {
512
- this.log('error', `Failed to add port mappings: ${err.message}`);
513
- return false;
514
- }
515
- }
516
- /**
517
- * Adds port forwarding rules for pairs of fromPortRanges and toPortRanges
518
- */
519
- async addPortPairMappings(family, preroutingChain, postroutingChain, fromPortRanges, toPortRanges) {
520
- try {
521
- let rulesetContent = '';
522
- // Process each fromPort and toPort pair
523
- for (let i = 0; i < fromPortRanges.length; i++) {
524
- const fromRange = fromPortRanges[i];
525
- const toRange = toPortRanges[i];
526
- // Simple case: single port to single port
527
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
528
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from} dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT"`;
529
- rulesetContent += `${rule}\n`;
530
- this.rules.push({
531
- tableFamily: family,
532
- tableName: this.tableName,
533
- chainName: preroutingChain,
534
- ruleContents: rule,
535
- added: false
536
- });
537
- }
538
- // Port range with equal size - can use direct mapping
539
- else if ((fromRange.to - fromRange.from) === (toRange.to - toRange.from)) {
540
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE"`;
541
- rulesetContent += `${rule}\n`;
542
- this.rules.push({
543
- tableFamily: family,
544
- tableName: this.tableName,
545
- chainName: preroutingChain,
546
- ruleContents: rule,
547
- added: false
548
- });
549
- }
550
- // Unequal port ranges - need to map individually
551
- else {
552
- const toRangeSize = toRange.to - toRange.from + 1;
553
- for (let p = fromRange.from; p <= fromRange.to; p++) {
554
- const offset = (p - fromRange.from) % toRangeSize;
555
- const targetPort = toRange.from + offset;
556
- const rule = `add rule ${family} ${this.tableName} ${preroutingChain} ${this.settings.protocol} dport ${p} dnat to ${this.settings.toHost}:${targetPort} comment "${this.ruleTag}:DNAT_INDIVIDUAL"`;
557
- rulesetContent += `${rule}\n`;
558
- this.rules.push({
559
- tableFamily: family,
560
- tableName: this.tableName,
561
- chainName: preroutingChain,
562
- ruleContents: rule,
563
- added: false
564
- });
565
- }
566
- }
567
- // Add masquerade rule for this port range if not preserving source IP
568
- if (!this.settings.preserveSourceIP) {
569
- const masqRule = `add rule ${family} ${this.tableName} ${postroutingChain} ${this.settings.protocol} daddr ${this.settings.toHost} dport ${toRange.from}-${toRange.to} masquerade comment "${this.ruleTag}:MASQ"`;
570
- rulesetContent += `${masqRule}\n`;
571
- this.rules.push({
572
- tableFamily: family,
573
- tableName: this.tableName,
574
- chainName: postroutingChain,
575
- ruleContents: masqRule,
576
- added: false
577
- });
578
- }
579
- }
580
- // Apply the ruleset if we have any rules
581
- if (rulesetContent) {
582
- await this.executor.executeWithTempFile(rulesetContent);
583
- this.log('info', `Added port forwarding rules for ${family}`);
584
- // Mark rules as added
585
- for (const rule of this.rules) {
586
- if (rule.tableFamily === family && !rule.added) {
587
- rule.added = true;
588
- // Verify the rule was applied
589
- await this.verifyRuleApplication(rule);
590
- }
591
- }
592
- }
593
- return true;
594
- }
595
- catch (err) {
596
- this.log('error', `Failed to add port pair mappings: ${err.message}`);
597
- return false;
598
- }
599
- }
600
- /**
601
- * Setup quality of service rules
602
- */
603
- async addTrafficShaping(isIpv6 = false) {
604
- if (!this.settings.qos?.enabled) {
605
- return true;
606
- }
607
- const family = isIpv6 ? 'ip6' : 'ip';
608
- const qosChain = 'qos_forward';
609
- try {
610
- let rulesetContent = '';
611
- // Add rate limiting rule if specified
612
- if (this.settings.qos.maxRate) {
613
- const ruleContent = `add rule ${family} ${this.tableName} ${qosChain} ip daddr ${this.settings.toHost} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.toPort)}} limit rate over ${this.settings.qos.maxRate} drop comment "${this.ruleTag}:QOS_RATE"`;
614
- rulesetContent += `${ruleContent}\n`;
615
- this.rules.push({
616
- tableFamily: family,
617
- tableName: this.tableName,
618
- chainName: qosChain,
619
- ruleContents: ruleContent,
620
- added: false
621
- });
622
- }
623
- // Add priority marking if specified
624
- if (this.settings.qos.priority !== undefined) {
625
- // Check if the chain exists
626
- const chainsOutput = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list chains ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
627
- // Check if we need to create priority queues
628
- const hasPrioChain = chainsOutput.includes(`chain prio${this.settings.qos.priority}`);
629
- if (!hasPrioChain) {
630
- // Create priority chain
631
- const prioChainRule = `add chain ${family} ${this.tableName} prio${this.settings.qos.priority} { type filter hook forward priority ${this.settings.qos.priority * 10}; }`;
632
- rulesetContent += `${prioChainRule}\n`;
633
- }
634
- // Add the rules to mark packets with this priority
635
- for (const range of normalizePortSpec(this.settings.toPort)) {
636
- const markRule = `add rule ${family} ${this.tableName} ${qosChain} ${this.settings.protocol} dport ${range.from}-${range.to} counter goto prio${this.settings.qos.priority} comment "${this.ruleTag}:QOS_PRIORITY"`;
637
- rulesetContent += `${markRule}\n`;
638
- this.rules.push({
639
- tableFamily: family,
640
- tableName: this.tableName,
641
- chainName: qosChain,
642
- ruleContents: markRule,
643
- added: false
644
- });
645
- }
646
- }
647
- // Apply the ruleset if we have any rules
648
- if (rulesetContent) {
649
- // Apply the ruleset using the helper
650
- await this.executor.executeWithTempFile(rulesetContent);
651
- this.log('info', `Added QoS rules for ${family}`);
652
- // Mark rules as added
653
- for (const rule of this.rules) {
654
- if (rule.tableFamily === family && !rule.added) {
655
- rule.added = true;
656
- // Verify the rule was applied
657
- await this.verifyRuleApplication(rule);
658
- }
659
- }
660
- }
661
- return true;
662
- }
663
- catch (err) {
664
- this.log('error', `Failed to add traffic shaping: ${err.message}`);
665
- return false;
666
- }
667
- }
668
- /**
669
- * Setup NetworkProxy integration rules
670
- */
671
- async setupNetworkProxyIntegration(isIpv6 = false) {
672
- if (!this.settings.netProxyIntegration?.enabled) {
673
- return true;
674
- }
675
- const netProxyConfig = this.settings.netProxyIntegration;
676
- const family = isIpv6 ? 'ip6' : 'ip';
677
- const outputChain = 'nat_output';
678
- try {
679
- // Only proceed if we're redirecting localhost and have a port
680
- if (netProxyConfig.redirectLocalhost && netProxyConfig.sslTerminationPort) {
681
- const localhost = isIpv6 ? '::1' : '127.0.0.1';
682
- // Create the redirect rule
683
- const rule = `add rule ${family} ${this.tableName} ${outputChain} ${this.settings.protocol} daddr ${localhost} redirect to :${netProxyConfig.sslTerminationPort} comment "${this.ruleTag}:NETPROXY_REDIRECT"`;
684
- // Apply the rule
685
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} ${rule}`, this.settings.maxRetries, this.settings.retryDelayMs);
686
- this.log('info', `Added NetworkProxy redirection rule for ${family}`);
687
- const newRule = {
688
- tableFamily: family,
689
- tableName: this.tableName,
690
- chainName: outputChain,
691
- ruleContents: rule,
692
- added: true
693
- };
694
- this.rules.push(newRule);
695
- // Verify the rule was actually applied
696
- await this.verifyRuleApplication(newRule);
697
- }
698
- return true;
699
- }
700
- catch (err) {
701
- this.log('error', `Failed to set up NetworkProxy integration: ${err.message}`);
702
- return false;
703
- }
704
- }
705
- /**
706
- * Verify that a rule was successfully applied
707
- */
708
- async verifyRuleApplication(rule) {
709
- try {
710
- const { tableFamily, tableName, chainName, ruleContents } = rule;
711
- // Extract the distinctive parts of the rule to create a search pattern
712
- const commentMatch = ruleContents.match(/comment "([^"]+)"/);
713
- if (!commentMatch)
714
- return false;
715
- const commentTag = commentMatch[1];
716
- // List the chain to check if our rule is there
717
- const stdout = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list chain ${tableFamily} ${tableName} ${chainName}`, this.settings.maxRetries, this.settings.retryDelayMs);
718
- // Check if the comment appears in the output
719
- const isApplied = stdout.includes(commentTag);
720
- rule.verified = isApplied;
721
- if (!isApplied) {
722
- this.log('warn', `Rule verification failed: ${commentTag} not found in chain ${chainName}`);
723
- }
724
- else {
725
- this.log('debug', `Rule verified: ${commentTag} found in chain ${chainName}`);
726
- }
727
- return isApplied;
728
- }
729
- catch (err) {
730
- this.log('error', `Failed to verify rule application: ${err.message}`);
731
- return false;
732
- }
733
- }
734
- /**
735
- * Rolls back rules in case of error during setup
736
- */
737
- async rollbackRules() {
738
- // Process rules in reverse order (LIFO)
739
- for (let i = this.rules.length - 1; i >= 0; i--) {
740
- const rule = this.rules[i];
741
- if (rule.added) {
742
- try {
743
- // For nftables, create a delete rule by replacing 'add' with 'delete'
744
- const deleteRule = rule.ruleContents.replace('add rule', 'delete rule');
745
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} ${deleteRule}`, this.settings.maxRetries, this.settings.retryDelayMs);
746
- this.log('info', `Rolled back rule: ${deleteRule}`);
747
- rule.added = false;
748
- rule.verified = false;
749
- }
750
- catch (err) {
751
- this.log('error', `Failed to roll back rule: ${err.message}`);
752
- }
753
- }
754
- }
755
- }
756
- /**
757
- * Checks if nftables table exists
758
- */
759
- async tableExists(family, tableName) {
760
- try {
761
- const stdout = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list tables ${family}`, this.settings.maxRetries, this.settings.retryDelayMs);
762
- return stdout.includes(`table ${family} ${tableName}`);
763
- }
764
- catch (err) {
765
- return false;
766
- }
767
- }
768
- /**
769
- * Get system metrics like connection counts
770
- */
771
- async getSystemMetrics() {
772
- const metrics = {};
773
- try {
774
- // Try to get connection metrics if conntrack is available
775
- try {
776
- const stdout = await this.executor.executeWithRetry('conntrack -C', this.settings.maxRetries, this.settings.retryDelayMs);
777
- metrics.activeConnections = parseInt(stdout.trim(), 10);
778
- }
779
- catch (err) {
780
- // conntrack not available, skip this metric
781
- }
782
- // Try to get forwarded connections count from nftables counters
783
- try {
784
- // Look for counters in our rules
785
- const stdout = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list table ip ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
786
- // Parse counter information from the output
787
- const counterMatches = stdout.matchAll(/counter packets (\d+) bytes (\d+)/g);
788
- let totalPackets = 0;
789
- let totalBytes = 0;
790
- for (const match of counterMatches) {
791
- totalPackets += parseInt(match[1], 10);
792
- totalBytes += parseInt(match[2], 10);
793
- }
794
- if (totalPackets > 0) {
795
- metrics.forwardedConnections = totalPackets;
796
- metrics.bytesForwarded = {
797
- sent: totalBytes,
798
- received: 0 // We can't easily determine this without additional rules
799
- };
800
- }
801
- }
802
- catch (err) {
803
- // Failed to get counter info, skip this metric
804
- }
805
- return metrics;
806
- }
807
- catch (err) {
808
- this.log('error', `Failed to get system metrics: ${err.message}`);
809
- return metrics;
810
- }
811
- }
812
- /**
813
- * Get status of IP sets
814
- */
815
- async getIPSetStatus() {
816
- const result = [];
817
- try {
818
- for (const family of ['ip', 'ip6']) {
819
- try {
820
- const stdout = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list sets ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
821
- const setMatches = stdout.matchAll(/set (\w+) {\s*type (\w+)/g);
822
- for (const match of setMatches) {
823
- const setName = match[1];
824
- const setType = match[2];
825
- // Get element count from tracking map
826
- const setKey = `${family}:${setName}`;
827
- const elements = this.ipSets.get(setKey) || [];
828
- result.push({
829
- name: setName,
830
- elementCount: elements.length,
831
- type: setType
832
- });
833
- }
834
- }
835
- catch (err) {
836
- // No sets for this family, or table doesn't exist
837
- }
838
- }
839
- return result;
840
- }
841
- catch (err) {
842
- this.log('error', `Failed to get IP set status: ${err.message}`);
843
- return result;
844
- }
845
- }
846
- /**
847
- * Get detailed status about the current state of the proxy
848
- */
849
- async getStatus() {
850
- const result = {
851
- active: this.rules.some(r => r.added),
852
- ruleCount: {
853
- total: this.rules.length,
854
- added: this.rules.filter(r => r.added).length,
855
- verified: this.rules.filter(r => r.verified).length
856
- },
857
- tablesConfigured: [],
858
- metrics: {},
859
- qosEnabled: this.settings.qos?.enabled || false
860
- };
861
- try {
862
- // Get list of configured tables
863
- const stdout = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list tables`, this.settings.maxRetries, this.settings.retryDelayMs);
864
- const tableRegex = /table (ip|ip6) (\w+)/g;
865
- let match;
866
- while ((match = tableRegex.exec(stdout)) !== null) {
867
- const [, family, name] = match;
868
- if (name === this.tableName) {
869
- result.tablesConfigured.push({ family, tableName: name });
870
- }
871
- }
872
- // Get system metrics
873
- result.metrics = await this.getSystemMetrics();
874
- // Get IP set status if using IP sets
875
- if (this.settings.useIPSets) {
876
- result.ipSetsConfigured = await this.getIPSetStatus();
877
- }
878
- return result;
879
- }
880
- catch (err) {
881
- this.log('error', `Failed to get status: ${err.message}`);
882
- return result;
883
- }
884
- }
885
- /**
886
- * Performs a dry run to see what commands would be executed without actually applying them
887
- */
888
- async dryRun() {
889
- const commands = [];
890
- // Simulate all the necessary setup steps and collect commands
891
- // Tables and chains
892
- commands.push(`add table ip ${this.tableName}`);
893
- commands.push(`add chain ip ${this.tableName} nat_prerouting { type nat hook prerouting priority -100; }`);
894
- if (!this.settings.preserveSourceIP) {
895
- commands.push(`add chain ip ${this.tableName} nat_postrouting { type nat hook postrouting priority 100; }`);
896
- }
897
- if (this.settings.netProxyIntegration?.enabled && this.settings.netProxyIntegration.redirectLocalhost) {
898
- commands.push(`add chain ip ${this.tableName} nat_output { type nat hook output priority 0; }`);
899
- }
900
- if (this.settings.qos?.enabled) {
901
- commands.push(`add chain ip ${this.tableName} qos_forward { type filter hook forward priority 0; }`);
902
- }
903
- // Add IPv6 tables if enabled
904
- if (this.settings.ipv6Support) {
905
- commands.push(`add table ip6 ${this.tableName}`);
906
- commands.push(`add chain ip6 ${this.tableName} nat_prerouting { type nat hook prerouting priority -100; }`);
907
- if (!this.settings.preserveSourceIP) {
908
- commands.push(`add chain ip6 ${this.tableName} nat_postrouting { type nat hook postrouting priority 100; }`);
909
- }
910
- if (this.settings.netProxyIntegration?.enabled && this.settings.netProxyIntegration.redirectLocalhost) {
911
- commands.push(`add chain ip6 ${this.tableName} nat_output { type nat hook output priority 0; }`);
912
- }
913
- if (this.settings.qos?.enabled) {
914
- commands.push(`add chain ip6 ${this.tableName} qos_forward { type filter hook forward priority 0; }`);
915
- }
916
- }
917
- // Source IP filters
918
- if (this.settings.useIPSets) {
919
- if (this.settings.ipBlockList?.length) {
920
- commands.push(`add set ip ${this.tableName} banned_ips { type ipv4_addr; }`);
921
- commands.push(`add element ip ${this.tableName} banned_ips { ${this.settings.ipBlockList.join(', ')} }`);
922
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr @banned_ips drop comment "${this.ruleTag}:BANNED_SET"`);
923
- }
924
- if (this.settings.ipAllowList?.length) {
925
- commands.push(`add set ip ${this.tableName} allowed_ips { type ipv4_addr; }`);
926
- commands.push(`add element ip ${this.tableName} allowed_ips { ${this.settings.ipAllowList.join(', ')} }`);
927
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr @allowed_ips ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED_SET"`);
928
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`);
929
- }
930
- }
931
- else if (this.settings.ipBlockList?.length || this.settings.ipAllowList?.length) {
932
- // Traditional approach without IP sets
933
- if (this.settings.ipBlockList?.length) {
934
- for (const ip of this.settings.ipBlockList) {
935
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr ${ip} drop comment "${this.ruleTag}:BANNED"`);
936
- }
937
- }
938
- if (this.settings.ipAllowList?.length) {
939
- for (const ip of this.settings.ipAllowList) {
940
- commands.push(`add rule ip ${this.tableName} nat_prerouting ip saddr ${ip} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} accept comment "${this.ruleTag}:ALLOWED"`);
941
- }
942
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport {${this.getAllPorts(this.settings.fromPort)}} drop comment "${this.ruleTag}:DENY_ALL"`);
943
- }
944
- }
945
- // Port forwarding rules
946
- if (this.settings.useAdvancedNAT) {
947
- // Advanced NAT with connection tracking
948
- const fromPortRanges = normalizePortSpec(this.settings.fromPort);
949
- const toPortRanges = normalizePortSpec(this.settings.toPort);
950
- if (fromPortRanges.length === 1 && toPortRanges.length === 1) {
951
- const fromRange = fromPortRanges[0];
952
- const toRange = toPortRanges[0];
953
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
954
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from} ct state new dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT_CT"`);
955
- }
956
- else if ((fromRange.to - fromRange.from) === (toRange.to - toRange.from)) {
957
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} ct state new dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE_CT"`);
958
- }
959
- commands.push(`add rule ip ${this.tableName} nat_prerouting ct state established,related accept comment "${this.ruleTag}:CT_ESTABLISHED"`);
960
- }
961
- }
962
- else {
963
- // Standard NAT rules
964
- const fromRanges = normalizePortSpec(this.settings.fromPort);
965
- const toRanges = normalizePortSpec(this.settings.toPort);
966
- if (fromRanges.length === 1 && toRanges.length === 1) {
967
- const fromRange = fromRanges[0];
968
- const toRange = toRanges[0];
969
- if (fromRange.from === fromRange.to && toRange.from === toRange.to) {
970
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from} dnat to ${this.settings.toHost}:${toRange.from} comment "${this.ruleTag}:DNAT"`);
971
- }
972
- else {
973
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} dnat to ${this.settings.toHost}:${toRange.from}-${toRange.to} comment "${this.ruleTag}:DNAT_RANGE"`);
974
- }
975
- }
976
- else if (toRanges.length === 1) {
977
- // One-to-many mapping
978
- for (const fromRange of fromRanges) {
979
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRange.from}-${fromRange.to} dnat to ${this.settings.toHost}:${toRanges[0].from}-${toRanges[0].to} comment "${this.ruleTag}:DNAT_RANGE"`);
980
- }
981
- }
982
- else {
983
- // One-to-one mapping of multiple ranges
984
- for (let i = 0; i < fromRanges.length; i++) {
985
- commands.push(`add rule ip ${this.tableName} nat_prerouting ${this.settings.protocol} dport ${fromRanges[i].from}-${fromRanges[i].to} dnat to ${this.settings.toHost}:${toRanges[i].from}-${toRanges[i].to} comment "${this.ruleTag}:DNAT_RANGE"`);
986
- }
987
- }
988
- }
989
- // Masquerade rules if not preserving source IP
990
- if (!this.settings.preserveSourceIP) {
991
- commands.push(`add rule ip ${this.tableName} nat_postrouting ${this.settings.protocol} daddr ${this.settings.toHost} dport {${this.getAllPorts(this.settings.toPort)}} masquerade comment "${this.ruleTag}:MASQ"`);
992
- }
993
- // NetworkProxy integration
994
- if (this.settings.netProxyIntegration?.enabled &&
995
- this.settings.netProxyIntegration.redirectLocalhost &&
996
- this.settings.netProxyIntegration.sslTerminationPort) {
997
- commands.push(`add rule ip ${this.tableName} nat_output ${this.settings.protocol} daddr 127.0.0.1 redirect to :${this.settings.netProxyIntegration.sslTerminationPort} comment "${this.ruleTag}:NETPROXY_REDIRECT"`);
998
- }
999
- // QoS rules
1000
- if (this.settings.qos?.enabled) {
1001
- if (this.settings.qos.maxRate) {
1002
- commands.push(`add rule ip ${this.tableName} qos_forward ip daddr ${this.settings.toHost} ${this.settings.protocol} dport {${this.getAllPorts(this.settings.toPort)}} limit rate over ${this.settings.qos.maxRate} drop comment "${this.ruleTag}:QOS_RATE"`);
1003
- }
1004
- if (this.settings.qos.priority !== undefined) {
1005
- commands.push(`add chain ip ${this.tableName} prio${this.settings.qos.priority} { type filter hook forward priority ${this.settings.qos.priority * 10}; }`);
1006
- for (const range of normalizePortSpec(this.settings.toPort)) {
1007
- commands.push(`add rule ip ${this.tableName} qos_forward ${this.settings.protocol} dport ${range.from}-${range.to} counter goto prio${this.settings.qos.priority} comment "${this.ruleTag}:QOS_PRIORITY"`);
1008
- }
1009
- }
1010
- }
1011
- return commands;
1012
- }
1013
- /**
1014
- * Starts the proxy by setting up all nftables rules
1015
- */
1016
- async start() {
1017
- // Check if nftables is available
1018
- const nftablesAvailable = await this.checkNftablesAvailability();
1019
- if (!nftablesAvailable) {
1020
- throw new NftResourceError('nftables is not available or not properly configured');
1021
- }
1022
- // Optionally clean slate first
1023
- if (this.settings.forceCleanSlate) {
1024
- await NfTablesProxy.cleanSlate();
1025
- }
1026
- // Set up tables and chains for IPv4
1027
- const setupSuccess = await this.setupTablesAndChains();
1028
- if (!setupSuccess) {
1029
- throw new NftExecutionError('Failed to set up nftables tables and chains');
1030
- }
1031
- // Set up IPv6 tables and chains if enabled
1032
- if (this.settings.ipv6Support) {
1033
- const setupIPv6Success = await this.setupTablesAndChains(true);
1034
- if (!setupIPv6Success) {
1035
- this.log('warn', 'Failed to set up IPv6 tables and chains, continuing with IPv4 only');
1036
- }
1037
- }
1038
- // Add source IP filters
1039
- await this.addSourceIPFilters();
1040
- if (this.settings.ipv6Support) {
1041
- await this.addSourceIPFilters(true);
1042
- }
1043
- // Set up advanced NAT with connection tracking if enabled
1044
- if (this.settings.useAdvancedNAT) {
1045
- const advancedNatSuccess = await this.setupAdvancedNAT();
1046
- if (!advancedNatSuccess) {
1047
- this.log('warn', 'Failed to set up advanced NAT, falling back to standard NAT');
1048
- this.settings.useAdvancedNAT = false;
1049
- }
1050
- else if (this.settings.ipv6Support) {
1051
- await this.setupAdvancedNAT(true);
1052
- }
1053
- }
1054
- // Add port forwarding rules (skip if using advanced NAT)
1055
- if (!this.settings.useAdvancedNAT) {
1056
- const forwardingSuccess = await this.addPortForwardingRules();
1057
- if (!forwardingSuccess) {
1058
- throw new NftExecutionError('Failed to add port forwarding rules');
1059
- }
1060
- // Add IPv6 port forwarding rules if enabled
1061
- if (this.settings.ipv6Support) {
1062
- const forwardingIPv6Success = await this.addPortForwardingRules(true);
1063
- if (!forwardingIPv6Success) {
1064
- this.log('warn', 'Failed to add IPv6 port forwarding rules');
1065
- }
1066
- }
1067
- }
1068
- // Set up QoS if enabled
1069
- if (this.settings.qos?.enabled) {
1070
- const qosSuccess = await this.addTrafficShaping();
1071
- if (!qosSuccess) {
1072
- this.log('warn', 'Failed to set up QoS rules, continuing without traffic shaping');
1073
- }
1074
- else if (this.settings.ipv6Support) {
1075
- await this.addTrafficShaping(true);
1076
- }
1077
- }
1078
- // Set up NetworkProxy integration if enabled
1079
- if (this.settings.netProxyIntegration?.enabled) {
1080
- const netProxySetupSuccess = await this.setupNetworkProxyIntegration();
1081
- if (!netProxySetupSuccess) {
1082
- this.log('warn', 'Failed to set up NetworkProxy integration');
1083
- }
1084
- if (this.settings.ipv6Support) {
1085
- await this.setupNetworkProxyIntegration(true);
1086
- }
1087
- }
1088
- // Final check - ensure we have at least one rule added
1089
- if (this.rules.filter(r => r.added).length === 0) {
1090
- throw new NftExecutionError('No rules were added');
1091
- }
1092
- this.log('info', 'NfTablesProxy started successfully');
1093
- }
1094
- /**
1095
- * Stops the proxy by removing all added rules
1096
- */
1097
- async stop() {
1098
- try {
1099
- let rulesetContent = '';
1100
- // Process rules in reverse order (LIFO)
1101
- for (let i = this.rules.length - 1; i >= 0; i--) {
1102
- const rule = this.rules[i];
1103
- if (rule.added) {
1104
- // Create delete rules by replacing 'add' with 'delete'
1105
- const deleteRule = rule.ruleContents.replace('add rule', 'delete rule');
1106
- rulesetContent += `${deleteRule}\n`;
1107
- }
1108
- }
1109
- // Apply the ruleset if we have any rules to delete
1110
- if (rulesetContent) {
1111
- // Write to temporary file
1112
- await AsyncFileSystem.writeFile(this.tempFilePath, rulesetContent);
1113
- try {
1114
- // Apply the ruleset
1115
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`, this.settings.maxRetries, this.settings.retryDelayMs);
1116
- this.log('info', 'Removed all added rules');
1117
- // Mark all rules as removed
1118
- this.rules.forEach(rule => {
1119
- rule.added = false;
1120
- rule.verified = false;
1121
- });
1122
- }
1123
- finally {
1124
- // Remove temporary file
1125
- await AsyncFileSystem.remove(this.tempFilePath);
1126
- }
1127
- }
1128
- // Clean up IP sets if we created any
1129
- if (this.settings.useIPSets && this.ipSets.size > 0) {
1130
- for (const [key, _] of this.ipSets) {
1131
- const [family, setName] = key.split(':');
1132
- try {
1133
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} delete set ${family} ${this.tableName} ${setName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1134
- this.log('info', `Removed IP set ${setName} from ${family} ${this.tableName}`);
1135
- }
1136
- catch (err) {
1137
- this.log('warn', `Failed to remove IP set ${setName}: ${err.message}`);
1138
- }
1139
- }
1140
- this.ipSets.clear();
1141
- }
1142
- // Optionally clean up tables if they're empty
1143
- await this.cleanupEmptyTables();
1144
- this.log('info', 'NfTablesProxy stopped successfully');
1145
- }
1146
- catch (err) {
1147
- this.log('error', `Error stopping NfTablesProxy: ${err.message}`);
1148
- throw err;
1149
- }
1150
- }
1151
- /**
1152
- * Synchronous version of stop, for use in exit handlers only.
1153
- * Uses single-attempt commands without retry (process is exiting anyway).
1154
- */
1155
- stopSync() {
1156
- try {
1157
- let rulesetContent = '';
1158
- // Process rules in reverse order (LIFO)
1159
- for (let i = this.rules.length - 1; i >= 0; i--) {
1160
- const rule = this.rules[i];
1161
- if (rule.added) {
1162
- // Create delete rules by replacing 'add' with 'delete'
1163
- const deleteRule = rule.ruleContents.replace('add rule', 'delete rule');
1164
- rulesetContent += `${deleteRule}\n`;
1165
- }
1166
- }
1167
- // Apply the ruleset if we have any rules to delete
1168
- if (rulesetContent) {
1169
- // Write to temporary file
1170
- fs.writeFileSync(this.tempFilePath, rulesetContent);
1171
- // Apply the ruleset (single attempt, no retry - process is exiting)
1172
- this.executor.executeSync(`${NfTablesProxy.NFT_CMD} -f ${this.tempFilePath}`);
1173
- this.log('info', 'Removed all added rules');
1174
- // Mark all rules as removed
1175
- this.rules.forEach(rule => {
1176
- rule.added = false;
1177
- rule.verified = false;
1178
- });
1179
- // Remove temporary file
1180
- try {
1181
- fs.unlinkSync(this.tempFilePath);
1182
- }
1183
- catch {
1184
- // Ignore - process is exiting
1185
- }
1186
- }
1187
- // Clean up IP sets if we created any
1188
- if (this.settings.useIPSets && this.ipSets.size > 0) {
1189
- for (const [key, _] of this.ipSets) {
1190
- const [family, setName] = key.split(':');
1191
- try {
1192
- this.executor.executeSync(`${NfTablesProxy.NFT_CMD} delete set ${family} ${this.tableName} ${setName}`);
1193
- }
1194
- catch {
1195
- // Non-critical error, continue
1196
- }
1197
- }
1198
- }
1199
- // Optionally clean up tables if they're empty (sync version)
1200
- this.cleanupEmptyTablesSync();
1201
- this.log('info', 'NfTablesProxy stopped successfully');
1202
- }
1203
- catch (err) {
1204
- this.log('error', `Error stopping NfTablesProxy: ${err.message}`);
1205
- }
1206
- }
1207
- /**
1208
- * Cleans up empty tables
1209
- */
1210
- async cleanupEmptyTables() {
1211
- // Check if tables are empty, and if so, delete them
1212
- for (const family of ['ip', 'ip6']) {
1213
- // Skip IPv6 if not enabled
1214
- if (family === 'ip6' && !this.settings.ipv6Support) {
1215
- continue;
1216
- }
1217
- try {
1218
- // Check if table exists
1219
- const tableExists = await this.tableExists(family, this.tableName);
1220
- if (!tableExists) {
1221
- continue;
1222
- }
1223
- // Check if the table has any rules
1224
- const stdout = await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} list table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1225
- const hasRules = stdout.includes('rule');
1226
- if (!hasRules) {
1227
- // Table is empty, delete it
1228
- await this.executor.executeWithRetry(`${NfTablesProxy.NFT_CMD} delete table ${family} ${this.tableName}`, this.settings.maxRetries, this.settings.retryDelayMs);
1229
- this.log('info', `Deleted empty table ${family} ${this.tableName}`);
1230
- }
1231
- }
1232
- catch (err) {
1233
- this.log('error', `Error cleaning up tables: ${err.message}`);
1234
- }
1235
- }
1236
- }
1237
- /**
1238
- * Synchronous version of cleanupEmptyTables (for exit handlers only)
1239
- */
1240
- cleanupEmptyTablesSync() {
1241
- // Check if tables are empty, and if so, delete them
1242
- for (const family of ['ip', 'ip6']) {
1243
- // Skip IPv6 if not enabled
1244
- if (family === 'ip6' && !this.settings.ipv6Support) {
1245
- continue;
1246
- }
1247
- try {
1248
- // Check if table exists
1249
- const tableExistsOutput = this.executor.executeSync(`${NfTablesProxy.NFT_CMD} list tables ${family}`);
1250
- const tableExists = tableExistsOutput.includes(`table ${family} ${this.tableName}`);
1251
- if (!tableExists) {
1252
- continue;
1253
- }
1254
- // Check if the table has any rules
1255
- const stdout = this.executor.executeSync(`${NfTablesProxy.NFT_CMD} list table ${family} ${this.tableName}`);
1256
- const hasRules = stdout.includes('rule');
1257
- if (!hasRules) {
1258
- // Table is empty, delete it
1259
- this.executor.executeSync(`${NfTablesProxy.NFT_CMD} delete table ${family} ${this.tableName}`);
1260
- this.log('info', `Deleted empty table ${family} ${this.tableName}`);
1261
- }
1262
- }
1263
- catch (err) {
1264
- this.log('error', `Error cleaning up tables: ${err.message}`);
1265
- }
1266
- }
1267
- }
1268
- /**
1269
- * Removes all nftables rules created by this module
1270
- */
1271
- static async cleanSlate() {
1272
- try {
1273
- // Check for rules with our comment pattern
1274
- const stdout = await execAsync(`${NfTablesProxy.NFT_CMD} list ruleset`);
1275
- // Extract our tables
1276
- const tableMatches = stdout.stdout.match(/table (ip|ip6) (\w+) {[^}]*NfTablesProxy:[^}]*}/g);
1277
- if (tableMatches) {
1278
- for (const tableMatch of tableMatches) {
1279
- // Extract table family and name
1280
- const familyMatch = tableMatch.match(/table (ip|ip6) (\w+)/);
1281
- if (familyMatch) {
1282
- const family = familyMatch[1];
1283
- const tableName = familyMatch[2];
1284
- // Delete the table
1285
- await execAsync(`${NfTablesProxy.NFT_CMD} delete table ${family} ${tableName}`);
1286
- console.log(`Deleted table ${family} ${tableName} containing NfTablesProxy rules`);
1287
- }
1288
- }
1289
- }
1290
- else {
1291
- console.log('No NfTablesProxy rules found to clean up');
1292
- }
1293
- }
1294
- catch (err) {
1295
- console.error(`Error in cleanSlate: ${err}`);
1296
- }
1297
- }
1298
- /**
1299
- * Synchronous version of cleanSlate
1300
- * @deprecated This method blocks the event loop and should be avoided. Use cleanSlate() instead.
1301
- * WARNING: This method uses execSync which blocks the entire Node.js event loop!
1302
- */
1303
- static cleanSlateSync() {
1304
- console.warn('[DEPRECATION WARNING] cleanSlateSync blocks the event loop and should not be used. Consider using the async cleanSlate() method instead.');
1305
- try {
1306
- // Check for rules with our comment pattern
1307
- const stdout = execSync(`${NfTablesProxy.NFT_CMD} list ruleset`).toString();
1308
- // Extract our tables
1309
- const tableMatches = stdout.match(/table (ip|ip6) (\w+) {[^}]*NfTablesProxy:[^}]*}/g);
1310
- if (tableMatches) {
1311
- for (const tableMatch of tableMatches) {
1312
- // Extract table family and name
1313
- const familyMatch = tableMatch.match(/table (ip|ip6) (\w+)/);
1314
- if (familyMatch) {
1315
- const family = familyMatch[1];
1316
- const tableName = familyMatch[2];
1317
- // Delete the table
1318
- execSync(`${NfTablesProxy.NFT_CMD} delete table ${family} ${tableName}`);
1319
- console.log(`Deleted table ${family} ${tableName} containing NfTablesProxy rules`);
1320
- }
1321
- }
1322
- }
1323
- else {
1324
- console.log('No NfTablesProxy rules found to clean up');
1325
- }
1326
- }
1327
- catch (err) {
1328
- console.error(`Error in cleanSlateSync: ${err}`);
1329
- }
1330
- }
1331
- /**
1332
- * Improved logging with structured output
1333
- */
1334
- log(level, message, meta) {
1335
- if (!this.settings.enableLogging && (level === 'info' || level === 'debug')) {
1336
- return;
1337
- }
1338
- const timestamp = new Date().toISOString();
1339
- const logData = {
1340
- timestamp,
1341
- level: level.toUpperCase(),
1342
- message,
1343
- ...meta,
1344
- context: {
1345
- instance: this.ruleTag,
1346
- table: this.tableName
1347
- }
1348
- };
1349
- // Determine if output should be JSON or plain text based on settings
1350
- const useJson = this.settings.logFormat === 'json';
1351
- if (useJson) {
1352
- const logOutput = JSON.stringify(logData);
1353
- console.log(logOutput);
1354
- return;
1355
- }
1356
- // Plain text format
1357
- const metaStr = meta ? ` ${JSON.stringify(meta)}` : '';
1358
- switch (level) {
1359
- case 'info':
1360
- console.log(`[${timestamp}] [INFO] ${message}${metaStr}`);
1361
- break;
1362
- case 'warn':
1363
- console.warn(`[${timestamp}] [WARN] ${message}${metaStr}`);
1364
- break;
1365
- case 'error':
1366
- console.error(`[${timestamp}] [ERROR] ${message}${metaStr}`);
1367
- break;
1368
- case 'debug':
1369
- console.log(`[${timestamp}] [DEBUG] ${message}${metaStr}`);
1370
- break;
1371
- }
1372
- }
1373
- }
1374
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"nftables-proxy.js","sourceRoot":"","sources":["../../../ts/proxies/nftables-proxy/nftables-proxy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AAC/C,OAAO,EAAE,SAAS,EAAE,MAAM,MAAM,CAAC;AACjC,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,EAAE,eAAe,EAAE,MAAM,8BAA8B,CAAC;AAC/D,OAAO,EACL,kBAAkB,EAClB,iBAAiB,EACjB,gBAAgB,EACjB,MAAM,mBAAmB,CAAC;AAM3B,OAAO,EACL,kBAAkB,EAClB,iBAAiB,EACjB,gBAAgB,EAChB,iBAAiB,EAClB,MAAM,kBAAkB,CAAC;AAE1B,MAAM,SAAS,GAAG,SAAS,CAAC,IAAI,CAAC,CAAC;AAelC;;;;GAIG;AACH,MAAM,OAAO,aAAa;aAQT,YAAO,GAAG,KAAK,AAAR,CAAS;IAE/B,YAAY,QAA6B;QARjC,UAAK,GAAmB,EAAE,CAAC;QAC3B,WAAM,GAA0B,IAAI,GAAG,EAAE,CAAC,CAAC,6BAA6B;QAQ9E,+CAA+C;QAC/C,gBAAgB,CAAC,QAAQ,CAAC,CAAC;QAE3B,uBAAuB;QACvB,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,QAAQ;YACX,MAAM,EAAE,QAAQ,CAAC,MAAM,IAAI,WAAW;YACtC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,IAAI,KAAK;YACpC,aAAa,EAAE,QAAQ,CAAC,aAAa,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK;YACpF,WAAW,EAAE,QAAQ,CAAC,WAAW,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,CAAC,KAAK;YAC9E,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,WAAW;YAC5C,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,OAAO;YACxC,SAAS,EAAE,QAAQ,CAAC,SAAS,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YACvE,UAAU,EAAE,QAAQ,CAAC,UAAU,IAAI,CAAC;YACpC,YAAY,EAAE,QAAQ,CAAC,YAAY,IAAI,IAAI;YAC3C,cAAc,EAAE,QAAQ,CAAC,cAAc,KAAK,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC,CAAC,KAAK;SACxF,CAAC;QAEF,oEAAoE;QACpE,IAAI,CAAC,OAAO,GAAG,iBAAiB,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;QAExF,iBAAiB;QACjB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,SAAS,IAAI,WAAW,CAAC;QAExD,+CAA+C;QAC/C,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,aAAa,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;QAE1E,8BAA8B;QAC9B,IAAI,CAAC,QAAQ,GAAG,IAAI,kBAAkB,CACpC,CAAC,KAAK,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,OAAO,EAAE,IAAI,CAAC,EACxD;YACE,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,UAAU;YACpC,YAAY,EAAE,IAAI,CAAC,QAAQ,CAAC,YAAY;YACxC,YAAY,EAAE,IAAI,CAAC,YAAY;SAChC,CACF,CAAC;QAEF,oDAAoD;QACpD,IAAI,IAAI,CAAC,QAAQ,CAAC,YAAY,EAAE,CAAC;YAC/B,kEAAkE;YAClE,MAAM,WAAW,GAAG,GAAG,EAAE;gBACvB,IAAI,CAAC;oBACH,IAAI,CAAC,QAAQ,EAAE,CAAC;gBAClB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAwC,EAAE,EAAE,KAAK,EAAE,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACtF,CAAC;YACH,CAAC,CAAC;YAEF,8DAA8D;YAC9D,MAAM,YAAY,GAAG,KAAK,IAAI,EAAE;gBAC9B,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,IAAI,EAAE,CAAC;gBACpB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,0CAA0C,EAAE,EAAE,KAAK,EAAE,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACxF,CAAC;YACH,CAAC,CAAC;YAEF,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;YAChC,OAAO,CAAC,EAAE,CAAC,QAAQ,EAAE,GAAG,EAAE;gBACxB,YAAY,EAAE,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;YAC/C,CAAC,CAAC,CAAC;YACH,OAAO,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBACzB,YAAY,EAAE,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;YAC/C,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB;QACrC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,iBAAiB,EAAE,CAAC;QAE1D,IAAI,SAAS,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YAC9C,MAAM,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;QAC9C,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,SAAkB,KAAK;QACxD,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QAErC,IAAI,CAAC;YACH,oCAAoC;YACpC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACjD,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,EAAE,EAChD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,MAAM,WAAW,GAAG,MAAM,CAAC,QAAQ,CAAC,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;YAEzE,IAAI,CAAC,WAAW,EAAE,CAAC;gBACjB,mBAAmB;gBACnB,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAChE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAE9D,+CAA+C;gBAC/C,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,8DAA8D,EAC5H,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAEhF,4EAA4E;gBAC5E,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;oBACpC,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,+DAA+D,EAC7H,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBACnF,CAAC;gBAED,0DAA0D;gBAC1D,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;oBACtG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,mDAAmD,EACjH,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,+BAA+B,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAC9E,CAAC;gBAED,iCAAiC;gBACjC,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;oBAC/B,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,wDAAwD,EACtH,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAC/E,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC;YAC7F,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACxE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CACvB,MAAc,EACd,OAAe,EACf,GAAa,EACb,UAAqC,WAAW;QAEhD,IAAI,CAAC;YACH,6BAA6B;YAC7B,MAAM,WAAW,GAAG,iBAAiB,CAAC,GAAG,EAAE,MAAsB,CAAC,CAAC;YAEnE,IAAI,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2BAA2B,OAAO,kBAAkB,OAAO,EAAE,CAAC,CAAC;gBAChF,OAAO,IAAI,CAAC;YACd,CAAC;YAED,8BAA8B;YAC9B,IAAI,CAAC;gBACH,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAC/C,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAChE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,IAAI,CAAC,QAAQ,CAAC,OAAO,OAAO,IAAI,CAAC,EAAE,CAAC;oBACtC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,OAAO,oCAAoC,CAAC,CAAC;gBAC1E,CAAC;qBAAM,CAAC;oBACN,iBAAiB;oBACjB,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,WAAW,OAAO,KAAK,EAC9F,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,OAAO,QAAQ,MAAM,cAAc,OAAO,EAAE,CAAC,CAAC;gBACnF,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,qCAAqC;gBACrC,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,WAAW,OAAO,KAAK,EAC9F,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,OAAO,QAAQ,MAAM,cAAc,OAAO,EAAE,CAAC,CAAC;YACnF,CAAC;YAED,yEAAyE;YACzE,MAAM,SAAS,GAAG,GAAG,CAAC;YACtB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,WAAW,CAAC,MAAM,EAAE,CAAC,IAAI,SAAS,EAAE,CAAC;gBACvD,MAAM,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,CAAC;gBAClD,MAAM,QAAQ,GAAG,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAElC,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,MAAM,QAAQ,IAAI,EAC7F,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,KAAK,CAAC,MAAM,eAAe,OAAO,EAAE,CAAC,CAAC;YAC3E,CAAC;YAED,mBAAmB;YACnB,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,MAAM,IAAI,OAAO,EAAE,EAAE,WAAW,CAAC,CAAC;YAErD,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,OAAO,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACxE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,SAAkB,KAAK;QACtD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC7D,OAAO,IAAI,CAAC,CAAC,gBAAgB;QAC/B,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,KAAK,GAAG,gBAAgB,CAAC;QAC/B,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,WAAW,CAAC;QAEnD,IAAI,CAAC;YACH,0CAA0C;YAC1C,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,uEAAuE;YACvE,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gBAC5B,mDAAmD;gBACnD,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACtE,MAAM,OAAO,GAAG,YAAY,CAAC;oBAC7B,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,OAAc,CAAC,CAAC;oBAEnF,2CAA2C;oBAC3C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,WAAW,OAAO,kBAAkB,IAAI,CAAC,OAAO,cAAc,CAAC;oBAChJ,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBAED,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACtE,MAAM,OAAO,GAAG,aAAa,CAAC;oBAC9B,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,OAAc,CAAC,CAAC;oBAEnF,6CAA6C;oBAC7C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,WAAW,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,eAAe,CAAC;oBACjO,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;oBAEH,yCAAyC;oBACzC,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC;oBACvL,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,2EAA2E;gBAE3E,yBAAyB;gBACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACtE,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;wBAC3C,oDAAoD;wBACpD,IAAI,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBACzC,IAAI,CAAC,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBAE1C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,UAAU,EAAE,kBAAkB,IAAI,CAAC,OAAO,UAAU,CAAC;wBACtI,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,KAAK;4BAChB,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAED,qBAAqB;gBACrB,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACtE,kCAAkC;oBAClC,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;wBAC3C,oDAAoD;wBACpD,IAAI,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBACzC,IAAI,CAAC,MAAM,IAAI,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC;4BAAE,SAAS;wBAE1C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,MAAM,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,WAAW,CAAC;wBACvN,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,KAAK;4BAChB,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;oBAED,yCAAyC;oBACzC,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,KAAK,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC;oBACvL,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,KAAK;wBAChB,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,+CAA+C;YAC/C,IAAI,cAAc,EAAE,CAAC;gBACnB,qCAAqC;gBACrC,MAAM,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,cAAc,CAAC,CAAC;gBAExD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,MAAM,EAAE,CAAC,CAAC;gBAE/D,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yCAAyC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAE1E,uDAAuD;YACvD,IAAI,CAAC,aAAa,EAAE,CAAC;YAErB,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,QAAwD;QAC1E,MAAM,UAAU,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC/C,MAAM,KAAK,GAAa,EAAE,CAAC;QAE3B,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;YAC/B,IAAI,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,EAAE,EAAE,CAAC;gBAC5B,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC;YACpC,CAAC;iBAAM,CAAC;gBACN,KAAK,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;YAC1C,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,SAAkB,KAAK;QACpD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YAClC,OAAO,IAAI,CAAC,CAAC,iCAAiC;QAChD,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,eAAe,GAAG,gBAAgB,CAAC;QAEzC,IAAI,CAAC;YACH,sBAAsB;YACtB,MAAM,cAAc,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YACjE,MAAM,YAAY,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAE7D,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,4DAA4D;YAC5D,IAAI,cAAc,CAAC,MAAM,KAAK,CAAC,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7D,MAAM,SAAS,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;gBACpC,MAAM,OAAO,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;gBAEhC,sDAAsD;gBACtD,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,WAAW,CAAC;oBACxN,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,4BAA4B;qBACvB,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;oBACzE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,iBAAiB,CAAC;oBAC5P,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,gFAAgF;gBAChF,MAAM,MAAM,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,iDAAiD,IAAI,CAAC,OAAO,kBAAkB,CAAC;gBACtJ,cAAc,IAAI,GAAG,MAAM,IAAI,CAAC;gBAEhC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,eAAe;oBAC1B,YAAY,EAAE,MAAM;oBACpB,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;gBAEH,iCAAiC;gBACjC,IAAI,cAAc,EAAE,CAAC;oBACnB,MAAM,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,cAAc,CAAC,CAAC;oBAExD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,MAAM,EAAE,CAAC,CAAC;oBAE3D,sBAAsB;oBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;4BAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;4BAElB,8BAA8B;4BAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;wBACzC,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACnE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB,CAAC,SAAkB,KAAK;QAC1D,yEAAyE;QACzE,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YACjC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,eAAe,GAAG,gBAAgB,CAAC;QACzC,MAAM,gBAAgB,GAAG,iBAAiB,CAAC;QAE3C,IAAI,CAAC;YACH,gCAAgC;YAChC,MAAM,cAAc,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YACjE,MAAM,YAAY,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAE7D,+DAA+D;YAC/D,IAAI,cAAc,CAAC,MAAM,KAAK,YAAY,CAAC,MAAM,EAAE,CAAC;gBAClD,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;oBAC9B,uDAAuD;oBACvD,MAAM,aAAa,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;oBAEtC,OAAO,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,eAAe,EAAE,gBAAgB,EAAE,cAAc,EAAE,aAAa,CAAC,CAAC;gBAC9G,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,kBAAkB,CAAC,4GAA4G,CAAC,CAAC;gBAC7I,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,4CAA4C;gBAC5C,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,eAAe,EAAE,gBAAgB,EAAE,cAAc,EAAE,YAAY,CAAC,CAAC;YACjH,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAwC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe,CAC3B,MAAc,EACd,eAAuB,EACvB,gBAAwB,EACxB,cAA2B,EAC3B,WAAsB;QAEtB,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,yEAAyE;YACzE,KAAK,MAAM,SAAS,IAAI,cAAc,EAAE,CAAC;gBACvC,0CAA0C;gBAC1C,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,WAAW,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,EAAE,CAAC;oBAC3E,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;oBAC5M,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,8DAA8D;qBACzD,IAAI,WAAW,CAAC,IAAI,KAAK,WAAW,CAAC,EAAE,EAAE,CAAC;oBAC7C,oDAAoD;oBACpD,KAAK,IAAI,CAAC,GAAG,SAAS,CAAC,IAAI,EAAE,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACpD,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,CAAC,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,WAAW,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;wBAC/L,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,eAAe;4BAC1B,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBACD,4DAA4D;qBACvD,CAAC;oBACJ,MAAM,WAAW,GAAG,WAAW,CAAC,EAAE,GAAG,WAAW,CAAC,IAAI,GAAG,CAAC,CAAC;oBAE1D,KAAK,IAAI,CAAC,GAAG,SAAS,CAAC,IAAI,EAAE,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACpD,MAAM,MAAM,GAAG,CAAC,CAAC,GAAG,SAAS,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC;wBAClD,MAAM,UAAU,GAAG,WAAW,CAAC,IAAI,GAAG,MAAM,CAAC;wBAE7C,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,CAAC,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,UAAU,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;wBACzL,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,eAAe;4BAC1B,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;YACH,CAAC;YAED,iEAAiE;YACjE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACpC,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gBACrD,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,IAAI,CAAC,QAAQ,CAAC,MAAM,WAAW,KAAK,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC;gBAC/L,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;gBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,gBAAgB;oBAC3B,YAAY,EAAE,QAAQ;oBACtB,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YACL,CAAC;YAED,yCAAyC;YACzC,IAAI,cAAc,EAAE,CAAC;gBACnB,qCAAqC;gBACrC,MAAM,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,cAAc,CAAC,CAAC;gBAExD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,MAAM,EAAE,CAAC,CAAC;gBAE9D,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACjE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,mBAAmB,CAC/B,MAAc,EACd,eAAuB,EACvB,gBAAwB,EACxB,cAA2B,EAC3B,YAAyB;QAEzB,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,wCAAwC;YACxC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,cAAc,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAC/C,MAAM,SAAS,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;gBACpC,MAAM,OAAO,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;gBAEhC,0CAA0C;gBAC1C,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC;oBACxM,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,sDAAsD;qBACjD,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;oBACzE,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC;oBAC5O,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;oBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,eAAe;wBAC1B,YAAY,EAAE,IAAI;wBAClB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;gBACD,iDAAiD;qBAC5C,CAAC;oBACJ,MAAM,WAAW,GAAG,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,GAAG,CAAC,CAAC;oBAElD,KAAK,IAAI,CAAC,GAAG,SAAS,CAAC,IAAI,EAAE,CAAC,IAAI,SAAS,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACpD,MAAM,MAAM,GAAG,CAAC,CAAC,GAAG,SAAS,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC;wBAClD,MAAM,UAAU,GAAG,OAAO,CAAC,IAAI,GAAG,MAAM,CAAC;wBAEzC,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,CAAC,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,UAAU,aAAa,IAAI,CAAC,OAAO,mBAAmB,CAAC;wBACpM,cAAc,IAAI,GAAG,IAAI,IAAI,CAAC;wBAE9B,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;4BACd,WAAW,EAAE,MAAM;4BACnB,SAAS,EAAE,IAAI,CAAC,SAAS;4BACzB,SAAS,EAAE,eAAe;4BAC1B,YAAY,EAAE,IAAI;4BAClB,KAAK,EAAE,KAAK;yBACb,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAED,sEAAsE;gBACtE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;oBACpC,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,gBAAgB,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,IAAI,CAAC,QAAQ,CAAC,MAAM,UAAU,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,wBAAwB,IAAI,CAAC,OAAO,QAAQ,CAAC;oBAClN,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,gBAAgB;wBAC3B,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,yCAAyC;YACzC,IAAI,cAAc,EAAE,CAAC;gBACnB,MAAM,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,cAAc,CAAC,CAAC;gBAExD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,MAAM,EAAE,CAAC,CAAC;gBAE9D,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,qCAAqC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACtE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,SAAkB,KAAK;QACrD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAChC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,QAAQ,GAAG,aAAa,CAAC;QAE/B,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,sCAAsC;YACtC,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;gBAC9B,MAAM,WAAW,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,QAAQ,aAAa,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,kBAAkB,IAAI,CAAC,OAAO,YAAY,CAAC;gBACzQ,cAAc,IAAI,GAAG,WAAW,IAAI,CAAC;gBAErC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,QAAQ;oBACnB,YAAY,EAAE,WAAW;oBACzB,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YACL,CAAC;YAED,oCAAoC;YACpC,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,KAAK,SAAS,EAAE,CAAC;gBAC7C,4BAA4B;gBAC5B,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACvD,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAClE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,6CAA6C;gBAC7C,MAAM,YAAY,GAAG,YAAY,CAAC,QAAQ,CAAC,aAAa,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;gBAEtF,IAAI,CAAC,YAAY,EAAE,CAAC;oBAClB,wBAAwB;oBACxB,MAAM,aAAa,GAAG,aAAa,MAAM,IAAI,IAAI,CAAC,SAAS,QAAQ,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,wCAAwC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,GAAG,EAAE,KAAK,CAAC;oBAC1K,cAAc,IAAI,GAAG,aAAa,IAAI,CAAC;gBACzC,CAAC;gBAED,mDAAmD;gBACnD,KAAK,MAAM,KAAK,IAAI,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;oBAC5D,MAAM,QAAQ,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,QAAQ,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,aAAa,IAAI,CAAC,OAAO,gBAAgB,CAAC;oBACpN,cAAc,IAAI,GAAG,QAAQ,IAAI,CAAC;oBAElC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC;wBACd,WAAW,EAAE,MAAM;wBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,SAAS,EAAE,QAAQ;wBACnB,YAAY,EAAE,QAAQ;wBACtB,KAAK,EAAE,KAAK;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,yCAAyC;YACzC,IAAI,cAAc,EAAE,CAAC;gBACnB,qCAAqC;gBACrC,MAAM,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,cAAc,CAAC,CAAC;gBAExD,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,MAAM,EAAE,CAAC,CAAC;gBAElD,sBAAsB;gBACtB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBAC9B,IAAI,IAAI,CAAC,WAAW,KAAK,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;wBAC/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;wBAElB,8BAA8B;wBAC9B,MAAM,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;oBACzC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAkC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACnE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,SAAkB,KAAK;QAChE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAChD,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,cAAc,GAAG,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACzD,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC;QACrC,MAAM,WAAW,GAAG,YAAY,CAAC;QAEjC,IAAI,CAAC;YACH,8DAA8D;YAC9D,IAAI,cAAc,CAAC,iBAAiB,IAAI,cAAc,CAAC,kBAAkB,EAAE,CAAC;gBAC1E,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,WAAW,CAAC;gBAE/C,2BAA2B;gBAC3B,MAAM,IAAI,GAAG,YAAY,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,WAAW,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,iBAAiB,cAAc,CAAC,kBAAkB,aAAa,IAAI,CAAC,OAAO,qBAAqB,CAAC;gBAE9M,iBAAiB;gBACjB,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,IAAI,IAAI,EAAE,EAClC,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,MAAM,EAAE,CAAC,CAAC;gBAEtE,MAAM,OAAO,GAAG;oBACd,WAAW,EAAE,MAAM;oBACnB,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,SAAS,EAAE,WAAW;oBACtB,YAAY,EAAE,IAAI;oBAClB,KAAK,EAAE,IAAI;iBACZ,CAAC;gBAEF,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;gBAEzB,uCAAuC;gBACvC,MAAM,IAAI,CAAC,qBAAqB,CAAC,OAAO,CAAC,CAAC;YAC5C,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,8CAA8C,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC/E,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB,CAAC,IAAkB;QACpD,IAAI,CAAC;YACH,MAAM,EAAE,WAAW,EAAE,SAAS,EAAE,SAAS,EAAE,YAAY,EAAE,GAAG,IAAI,CAAC;YAEjE,uEAAuE;YACvE,MAAM,YAAY,GAAG,YAAY,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC;YAC7D,IAAI,CAAC,YAAY;gBAAE,OAAO,KAAK,CAAC;YAEhC,MAAM,UAAU,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;YAEnC,+CAA+C;YAC/C,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACjD,GAAG,aAAa,CAAC,OAAO,eAAe,WAAW,IAAI,SAAS,IAAI,SAAS,EAAE,EAC9E,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,6CAA6C;YAC7C,MAAM,SAAS,GAAG,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;YAE9C,IAAI,CAAC,QAAQ,GAAG,SAAS,CAAC;YAE1B,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,UAAU,uBAAuB,SAAS,EAAE,CAAC,CAAC;YAC9F,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,kBAAkB,UAAU,mBAAmB,SAAS,EAAE,CAAC,CAAC;YAChF,CAAC;YAED,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,sCAAsC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACvE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,aAAa;QACzB,wCAAwC;QACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC;oBACH,sEAAsE;oBACtE,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;oBACxE,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,IAAI,UAAU,EAAE,EACxC,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,qBAAqB,UAAU,EAAE,CAAC,CAAC;oBAEpD,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;oBACnB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;gBACxB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,SAAiB;QACzD,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACjD,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,EAAE,EAChD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,OAAO,MAAM,CAAC,QAAQ,CAAC,SAAS,MAAM,IAAI,SAAS,EAAE,CAAC,CAAC;QACzD,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAK5B,MAAM,OAAO,GAIT,EAAE,CAAC;QAEP,IAAI,CAAC;YACH,0DAA0D;YAC1D,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,cAAc,EAAE,IAAI,CAAC,QAAQ,CAAC,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;gBAC1H,OAAO,CAAC,iBAAiB,GAAG,QAAQ,CAAC,MAAM,CAAC,IAAI,EAAE,EAAE,EAAE,CAAC,CAAC;YAC1D,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,4CAA4C;YAC9C,CAAC;YAED,gEAAgE;YAChE,IAAI,CAAC;gBACH,iCAAiC;gBACjC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACjD,GAAG,aAAa,CAAC,OAAO,kBAAkB,IAAI,CAAC,SAAS,EAAE,EAC1D,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,4CAA4C;gBAC5C,MAAM,cAAc,GAAG,MAAM,CAAC,QAAQ,CAAC,oCAAoC,CAAC,CAAC;gBAC7E,IAAI,YAAY,GAAG,CAAC,CAAC;gBACrB,IAAI,UAAU,GAAG,CAAC,CAAC;gBAEnB,KAAK,MAAM,KAAK,IAAI,cAAc,EAAE,CAAC;oBACnC,YAAY,IAAI,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;oBACvC,UAAU,IAAI,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;gBACvC,CAAC;gBAED,IAAI,YAAY,GAAG,CAAC,EAAE,CAAC;oBACrB,OAAO,CAAC,oBAAoB,GAAG,YAAY,CAAC;oBAC5C,OAAO,CAAC,cAAc,GAAG;wBACvB,IAAI,EAAE,UAAU;wBAChB,QAAQ,EAAE,CAAC,CAAE,0DAA0D;qBACxE,CAAC;gBACJ,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,+CAA+C;YACjD,CAAC;YAED,OAAO,OAAO,CAAC;QACjB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClE,OAAO,OAAO,CAAC;QACjB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,cAAc;QAK1B,MAAM,MAAM,GAIN,EAAE,CAAC;QAET,IAAI,CAAC;YACH,KAAK,MAAM,MAAM,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,EAAE,CAAC;gBACnC,IAAI,CAAC;oBACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACjD,GAAG,aAAa,CAAC,OAAO,cAAc,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EAChE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,2BAA2B,CAAC,CAAC;oBAEhE,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;wBAC/B,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;wBACzB,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;wBAEzB,sCAAsC;wBACtC,MAAM,MAAM,GAAG,GAAG,MAAM,IAAI,OAAO,EAAE,CAAC;wBACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;wBAE/C,MAAM,CAAC,IAAI,CAAC;4BACV,IAAI,EAAE,OAAO;4BACb,YAAY,EAAE,QAAQ,CAAC,MAAM;4BAC7B,IAAI,EAAE,OAAO;yBACd,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;gBACpD,CAAC;YACH,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,gCAAgC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACjE,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,SAAS;QACpB,MAAM,MAAM,GAAmB;YAC7B,MAAM,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC;YACrC,SAAS,EAAE;gBACT,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,MAAM;gBACxB,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM;gBAC7C,QAAQ,EAAE,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,MAAM;aACpD;YACD,gBAAgB,EAAE,EAAE;YACpB,OAAO,EAAE,EAAE;YACX,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,IAAI,KAAK;SAChD,CAAC;QAEF,IAAI,CAAC;YACH,gCAAgC;YAChC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACjD,GAAG,aAAa,CAAC,OAAO,cAAc,EACtC,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;YAEF,MAAM,UAAU,GAAG,uBAAuB,CAAC;YAC3C,IAAI,KAAK,CAAC;YAEV,OAAO,CAAC,KAAK,GAAG,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;gBAClD,MAAM,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,GAAG,KAAK,CAAC;gBAC/B,IAAI,IAAI,KAAK,IAAI,CAAC,SAAS,EAAE,CAAC;oBAC5B,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC5D,CAAC;YACH,CAAC;YAED,qBAAqB;YACrB,MAAM,CAAC,OAAO,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAE/C,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;gBAC5B,MAAM,CAAC,gBAAgB,GAAG,MAAM,IAAI,CAAC,cAAc,EAAE,CAAC;YACxD,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC1D,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,MAAM;QACjB,MAAM,QAAQ,GAAa,EAAE,CAAC;QAE9B,8DAA8D;QAE9D,oBAAoB;QACpB,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;QAChD,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC;QAE3G,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACpC,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC;QAC9G,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;YACtG,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC;QAClG,CAAC;QAED,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAC/B,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC;QACvG,CAAC;QAED,6BAA6B;QAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;YACjD,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC;YAE5G,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBACpC,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC;YAC/G,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,CAAC;gBACtG,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC;YACnG,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;gBAC/B,QAAQ,CAAC,IAAI,CAAC,iBAAiB,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC;YACxG,CAAC;QACH,CAAC;QAED,oBAAoB;QACpB,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YAC5B,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,CAAC;gBACtC,QAAQ,CAAC,IAAI,CAAC,cAAc,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC;gBAC7E,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,CAAC,SAAS,iBAAiB,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBACzG,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,sDAAsD,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;YAC/H,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,CAAC;gBACtC,QAAQ,CAAC,IAAI,CAAC,cAAc,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC;gBAC9E,QAAQ,CAAC,IAAI,CAAC,kBAAkB,IAAI,CAAC,SAAS,kBAAkB,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAC1G,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,yCAAyC,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,eAAe,CAAC,CAAC;gBAC/M,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC,CAAC;YACtL,CAAC;QACH,CAAC;aAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,CAAC;YAClF,uCAAuC;YACvC,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,CAAC;gBACtC,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC3C,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,4BAA4B,EAAE,kBAAkB,IAAI,CAAC,OAAO,UAAU,CAAC,CAAC;gBACrH,CAAC;YACH,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,CAAC;gBACtC,KAAK,MAAM,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;oBAC3C,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,4BAA4B,EAAE,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,qBAAqB,IAAI,CAAC,OAAO,WAAW,CAAC,CAAC;gBACtM,CAAC;gBACD,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,mBAAmB,IAAI,CAAC,OAAO,YAAY,CAAC,CAAC;YACtL,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YACjC,wCAAwC;YACxC,MAAM,cAAc,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YACjE,MAAM,YAAY,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAE7D,IAAI,cAAc,CAAC,MAAM,KAAK,CAAC,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7D,MAAM,SAAS,GAAG,cAAc,CAAC,CAAC,CAAC,CAAC;gBACpC,MAAM,OAAO,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;gBAEhC,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,WAAW,CAAC,CAAC;gBACjN,CAAC;qBAAM,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,GAAG,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC3E,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,iBAAiB,CAAC,CAAC;gBACrP,CAAC;gBAED,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,gEAAgE,IAAI,CAAC,OAAO,kBAAkB,CAAC,CAAC;YAC7I,CAAC;QACH,CAAC;aAAM,CAAC;YACN,qBAAqB;YACrB,MAAM,UAAU,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YAC7D,MAAM,QAAQ,GAAG,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAEzD,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACrD,MAAM,SAAS,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;gBAChC,MAAM,OAAO,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAC;gBAE5B,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,EAAE,IAAI,OAAO,CAAC,IAAI,KAAK,OAAO,CAAC,EAAE,EAAE,CAAC;oBACnE,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,aAAa,IAAI,CAAC,OAAO,QAAQ,CAAC,CAAC;gBACjM,CAAC;qBAAM,CAAC;oBACN,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,OAAO,CAAC,IAAI,IAAI,OAAO,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;gBACrO,CAAC;YACH,CAAC;iBAAM,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACjC,sBAAsB;gBACtB,KAAK,MAAM,SAAS,IAAI,UAAU,EAAE,CAAC;oBACnC,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,SAAS,CAAC,IAAI,IAAI,SAAS,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,IAAI,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;gBAC7O,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,wCAAwC;gBACxC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;oBAC3C,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,mBAAmB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,UAAU,CAAC,CAAC,CAAC,CAAC,IAAI,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC,EAAE,YAAY,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,IAAI,IAAI,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,aAAa,IAAI,CAAC,OAAO,cAAc,CAAC,CAAC;gBACrP,CAAC;YACH,CAAC;QACH,CAAC;QAED,+CAA+C;QAC/C,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACpC,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,oBAAoB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,IAAI,CAAC,QAAQ,CAAC,MAAM,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,yBAAyB,IAAI,CAAC,OAAO,QAAQ,CAAC,CAAC;QACrN,CAAC;QAED,2BAA2B;QAC3B,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO;YAC1C,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,iBAAiB;YACnD,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC;YAEzD,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,eAAe,IAAI,CAAC,QAAQ,CAAC,QAAQ,iCAAiC,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,kBAAkB,aAAa,IAAI,CAAC,OAAO,qBAAqB,CAAC,CAAC;QACvN,CAAC;QAED,YAAY;QACZ,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;gBAC9B,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,yBAAyB,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ,WAAW,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,kBAAkB,IAAI,CAAC,OAAO,YAAY,CAAC,CAAC;YAC/P,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,KAAK,SAAS,EAAE,CAAC;gBAC7C,QAAQ,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,SAAS,QAAQ,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,wCAAwC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,GAAG,EAAE,KAAK,CAAC,CAAC;gBAE5J,KAAK,MAAM,KAAK,IAAI,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;oBAC5D,QAAQ,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,SAAS,gBAAgB,IAAI,CAAC,QAAQ,CAAC,QAAQ,UAAU,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,qBAAqB,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,aAAa,IAAI,CAAC,OAAO,gBAAgB,CAAC,CAAC;gBAC7M,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,iCAAiC;QACjC,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,yBAAyB,EAAE,CAAC;QACjE,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,MAAM,IAAI,gBAAgB,CAAC,sDAAsD,CAAC,CAAC;QACrF,CAAC;QAED,+BAA+B;QAC/B,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,CAAC;YAClC,MAAM,aAAa,CAAC,UAAU,EAAE,CAAC;QACnC,CAAC;QAED,oCAAoC;QACpC,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACvD,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,iBAAiB,CAAC,6CAA6C,CAAC,CAAC;QAC7E,CAAC;QAED,2CAA2C;QAC3C,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;YAC/D,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBACtB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oEAAoE,CAAC,CAAC;YACzF,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,MAAM,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAChC,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;QACtC,CAAC;QAED,0DAA0D;QAC1D,IAAI,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YACjC,MAAM,kBAAkB,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,CAAC;YACzD,IAAI,CAAC,kBAAkB,EAAE,CAAC;gBACxB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,6DAA6D,CAAC,CAAC;gBAChF,IAAI,CAAC,QAAQ,CAAC,cAAc,GAAG,KAAK,CAAC;YACvC,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACrC,MAAM,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;YACpC,CAAC;QACH,CAAC;QAED,yDAAyD;QACzD,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;YAClC,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;YAC9D,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,MAAM,IAAI,iBAAiB,CAAC,qCAAqC,CAAC,CAAC;YACrE,CAAC;YAED,4CAA4C;YAC5C,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,qBAAqB,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;gBACtE,IAAI,CAAC,qBAAqB,EAAE,CAAC;oBAC3B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC;QACH,CAAC;QAED,wBAAwB;QACxB,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,OAAO,EAAE,CAAC;YAC/B,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAClD,IAAI,CAAC,UAAU,EAAE,CAAC;gBAChB,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,gEAAgE,CAAC,CAAC;YACrF,CAAC;iBAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACrC,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;YACrC,CAAC;QACH,CAAC;QAED,6CAA6C;QAC7C,IAAI,IAAI,CAAC,QAAQ,CAAC,mBAAmB,EAAE,OAAO,EAAE,CAAC;YAC/C,MAAM,oBAAoB,GAAG,MAAM,IAAI,CAAC,4BAA4B,EAAE,CAAC;YACvE,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC1B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,CAAC,CAAC;YAChE,CAAC;YAED,IAAI,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC9B,MAAM,IAAI,CAAC,4BAA4B,CAAC,IAAI,CAAC,CAAC;YAChD,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjD,MAAM,IAAI,iBAAiB,CAAC,qBAAqB,CAAC,CAAC;QACrD,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;IACzD,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,wCAAwC;YACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;gBAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;gBAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBACf,uDAAuD;oBACvD,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;oBACxE,cAAc,IAAI,GAAG,UAAU,IAAI,CAAC;gBACtC,CAAC;YACH,CAAC;YAED,mDAAmD;YACnD,IAAI,cAAc,EAAE,CAAC;gBACnB,0BAA0B;gBAC1B,MAAM,eAAe,CAAC,SAAS,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEnE,IAAI,CAAC;oBACH,oBAAoB;oBACpB,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,EAClD,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,CAAC,CAAC;oBAE5C,4BAA4B;oBAC5B,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE;wBACxB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;wBACnB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;oBACxB,CAAC,CAAC,CAAC;gBACL,CAAC;wBAAS,CAAC;oBACT,wBAAwB;oBACxB,MAAM,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBAClD,CAAC;YACH,CAAC;YAED,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;gBACpD,KAAK,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;oBACnC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBAEzC,IAAI,CAAC;wBACH,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,EAAE,EAC5E,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;wBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,OAAO,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;oBACjF,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,2BAA2B,OAAO,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;oBACzE,CAAC;gBACH,CAAC;gBAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YACtB,CAAC;YAED,8CAA8C;YAC9C,MAAM,IAAI,CAAC,kBAAkB,EAAE,CAAC;YAEhC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;QACzD,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClE,MAAM,GAAG,CAAC;QACZ,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,QAAQ;QACb,IAAI,CAAC;YACH,IAAI,cAAc,GAAG,EAAE,CAAC;YAExB,wCAAwC;YACxC,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC;gBAChD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;gBAE3B,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;oBACf,uDAAuD;oBACvD,MAAM,UAAU,GAAG,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;oBACxE,cAAc,IAAI,GAAG,UAAU,IAAI,CAAC;gBACtC,CAAC;YACH,CAAC;YAED,mDAAmD;YACnD,IAAI,cAAc,EAAE,CAAC;gBACnB,0BAA0B;gBAC1B,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,YAAY,EAAE,cAAc,CAAC,CAAC;gBAEpD,oEAAoE;gBACpE,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,GAAG,aAAa,CAAC,OAAO,OAAO,IAAI,CAAC,YAAY,EAAE,CAAC,CAAC;gBAE9E,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,CAAC,CAAC;gBAE5C,4BAA4B;gBAC5B,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE;oBACxB,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;oBACnB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;gBACxB,CAAC,CAAC,CAAC;gBAEH,wBAAwB;gBACxB,IAAI,CAAC;oBACH,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBACnC,CAAC;gBAAC,MAAM,CAAC;oBACP,8BAA8B;gBAChC,CAAC;YACH,CAAC;YAED,qCAAqC;YACrC,IAAI,IAAI,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;gBACpD,KAAK,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;oBACnC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBAEzC,IAAI,CAAC;wBACH,IAAI,CAAC,QAAQ,CAAC,WAAW,CACvB,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,OAAO,EAAE,CAC7E,CAAC;oBACJ,CAAC;oBAAC,MAAM,CAAC;wBACP,+BAA+B;oBACjC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,6DAA6D;YAC7D,IAAI,CAAC,sBAAsB,EAAE,CAAC;YAE9B,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,CAAC,CAAC;QACzD,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB;QAC9B,oDAAoD;QACpD,KAAK,MAAM,MAAM,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,EAAE,CAAC;YACnC,2BAA2B;YAC3B,IAAI,MAAM,KAAK,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACnD,SAAS;YACX,CAAC;YAED,IAAI,CAAC;gBACH,wBAAwB;gBACxB,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;gBACnE,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,SAAS;gBACX,CAAC;gBAED,mCAAmC;gBACnC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CACjD,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EACjE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;gBAEF,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gBAEzC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,4BAA4B;oBAC5B,MAAM,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAClC,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,EACnE,IAAI,CAAC,QAAQ,CAAC,UAAU,EACxB,IAAI,CAAC,QAAQ,CAAC,YAAY,CAC3B,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBACtE,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,oDAAoD;QACpD,KAAK,MAAM,MAAM,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,EAAE,CAAC;YACnC,2BAA2B;YAC3B,IAAI,MAAM,KAAK,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBACnD,SAAS;YACX,CAAC;YAED,IAAI,CAAC;gBACH,wBAAwB;gBACxB,MAAM,iBAAiB,GAAG,IAAI,CAAC,QAAQ,CAAC,WAAW,CACjD,GAAG,aAAa,CAAC,OAAO,gBAAgB,MAAM,EAAE,CACjD,CAAC;gBAEF,MAAM,WAAW,GAAG,iBAAiB,CAAC,QAAQ,CAAC,SAAS,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBAEpF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,SAAS;gBACX,CAAC;gBAED,mCAAmC;gBACnC,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAC,WAAW,CACtC,GAAG,aAAa,CAAC,OAAO,eAAe,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAClE,CAAC;gBAEF,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gBAEzC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,4BAA4B;oBAC5B,IAAI,CAAC,QAAQ,CAAC,WAAW,CACvB,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CACpE,CAAC;oBAEF,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,uBAAuB,MAAM,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;gBACtE,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,KAAK,CAAC,UAAU;QAC5B,IAAI,CAAC;YACH,2CAA2C;YAC3C,MAAM,MAAM,GAAG,MAAM,SAAS,CAAC,GAAG,aAAa,CAAC,OAAO,eAAe,CAAC,CAAC;YAExE,qBAAqB;YACrB,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,kDAAkD,CAAC,CAAC;YAE7F,IAAI,YAAY,EAAE,CAAC;gBACjB,KAAK,MAAM,UAAU,IAAI,YAAY,EAAE,CAAC;oBACtC,gCAAgC;oBAChC,MAAM,WAAW,GAAG,UAAU,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC;oBAC7D,IAAI,WAAW,EAAE,CAAC;wBAChB,MAAM,MAAM,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAC9B,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAEjC,mBAAmB;wBACnB,MAAM,SAAS,CAAC,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,SAAS,EAAE,CAAC,CAAC;wBAChF,OAAO,CAAC,GAAG,CAAC,iBAAiB,MAAM,IAAI,SAAS,iCAAiC,CAAC,CAAC;oBACrF,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,0CAA0C,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,wBAAwB,GAAG,EAAE,CAAC,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc;QAC1B,OAAO,CAAC,IAAI,CAAC,0IAA0I,CAAC,CAAC;QAEzJ,IAAI,CAAC;YACH,2CAA2C;YAC3C,MAAM,MAAM,GAAG,QAAQ,CAAC,GAAG,aAAa,CAAC,OAAO,eAAe,CAAC,CAAC,QAAQ,EAAE,CAAC;YAE5E,qBAAqB;YACrB,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,kDAAkD,CAAC,CAAC;YAEtF,IAAI,YAAY,EAAE,CAAC;gBACjB,KAAK,MAAM,UAAU,IAAI,YAAY,EAAE,CAAC;oBACtC,gCAAgC;oBAChC,MAAM,WAAW,GAAG,UAAU,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC;oBAC7D,IAAI,WAAW,EAAE,CAAC;wBAChB,MAAM,MAAM,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAC9B,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;wBAEjC,mBAAmB;wBACnB,QAAQ,CAAC,GAAG,aAAa,CAAC,OAAO,iBAAiB,MAAM,IAAI,SAAS,EAAE,CAAC,CAAC;wBACzE,OAAO,CAAC,GAAG,CAAC,iBAAiB,MAAM,IAAI,SAAS,iCAAiC,CAAC,CAAC;oBACrF,CAAC;gBACH,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,0CAA0C,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,4BAA4B,GAAG,EAAE,CAAC,CAAC;QACnD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,GAAG,CAAC,KAA0C,EAAE,OAAe,EAAE,IAA0B;QACjG,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,IAAI,CAAC,KAAK,KAAK,MAAM,IAAI,KAAK,KAAK,OAAO,CAAC,EAAE,CAAC;YAC5E,OAAO;QACT,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAE3C,MAAM,OAAO,GAAG;YACd,SAAS;YACT,KAAK,EAAE,KAAK,CAAC,WAAW,EAAE;YAC1B,OAAO;YACP,GAAG,IAAI;YACP,OAAO,EAAE;gBACP,QAAQ,EAAE,IAAI,CAAC,OAAO;gBACtB,KAAK,EAAE,IAAI,CAAC,SAAS;aACtB;SACF,CAAC;QAEF,qEAAqE;QACrE,MAAM,OAAO,GAAG,IAAI,CAAC,QAAQ,CAAC,SAAS,KAAK,MAAM,CAAC;QAEnD,IAAI,OAAO,EAAE,CAAC;YACZ,MAAM,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;YAC1C,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACvB,OAAO;QACT,CAAC;QAED,oBAAoB;QACpB,MAAM,OAAO,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;QAEvD,QAAQ,KAAK,EAAE,CAAC;YACd,KAAK,MAAM;gBACT,OAAO,CAAC,GAAG,CAAC,IAAI,SAAS,YAAY,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC1D,MAAM;YACR,KAAK,MAAM;gBACT,OAAO,CAAC,IAAI,CAAC,IAAI,SAAS,YAAY,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC3D,MAAM;YACR,KAAK,OAAO;gBACV,OAAO,CAAC,KAAK,CAAC,IAAI,SAAS,aAAa,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC7D,MAAM;YACR,KAAK,OAAO;gBACV,OAAO,CAAC,GAAG,CAAC,IAAI,SAAS,aAAa,OAAO,GAAG,OAAO,EAAE,CAAC,CAAC;gBAC3D,MAAM;QACV,CAAC;IACH,CAAC"}