@push.rocks/smartproxy 23.0.0 → 23.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (161) hide show
  1. package/changelog.md +17 -0
  2. package/dist_rust/{rustproxy → rustproxy_linux_amd64} +0 -0
  3. package/dist_rust/rustproxy_linux_arm64 +0 -0
  4. package/dist_ts/00_commitinfo_data.js +1 -1
  5. package/dist_ts/plugins.d.ts +2 -1
  6. package/dist_ts/plugins.js +3 -2
  7. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.d.ts +9 -21
  8. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.js +84 -212
  9. package/dist_ts/proxies/smart-proxy/smart-proxy.js +2 -3
  10. package/npmextra.json +3 -0
  11. package/package.json +13 -11
  12. package/readme.md +41 -11
  13. package/ts/00_commitinfo_data.ts +1 -1
  14. package/ts/plugins.ts +2 -0
  15. package/ts/proxies/smart-proxy/rust-proxy-bridge.ts +103 -233
  16. package/ts/proxies/smart-proxy/smart-proxy.ts +1 -2
  17. package/dist_ts/common/eventUtils.d.ts +0 -14
  18. package/dist_ts/common/eventUtils.js +0 -20
  19. package/dist_ts/common/types.d.ts +0 -82
  20. package/dist_ts/common/types.js +0 -15
  21. package/dist_ts/core/utils/event-system.d.ts +0 -200
  22. package/dist_ts/core/utils/event-system.js +0 -224
  23. package/dist_ts/core/utils/event-utils.d.ts +0 -15
  24. package/dist_ts/core/utils/event-utils.js +0 -11
  25. package/dist_ts/core/utils/route-manager.d.ts +0 -88
  26. package/dist_ts/core/utils/route-manager.js +0 -342
  27. package/dist_ts/core/utils/route-utils.d.ts +0 -28
  28. package/dist_ts/core/utils/route-utils.js +0 -67
  29. package/dist_ts/detection/detectors/http-detector-v2.d.ts +0 -33
  30. package/dist_ts/detection/detectors/http-detector-v2.js +0 -87
  31. package/dist_ts/detection/detectors/tls-detector-v2.d.ts +0 -33
  32. package/dist_ts/detection/detectors/tls-detector-v2.js +0 -80
  33. package/dist_ts/detection/protocol-detector-v2.d.ts +0 -46
  34. package/dist_ts/detection/protocol-detector-v2.js +0 -116
  35. package/dist_ts/forwarding/config/forwarding-types.d.ts +0 -42
  36. package/dist_ts/forwarding/config/forwarding-types.js +0 -18
  37. package/dist_ts/forwarding/config/index.d.ts +0 -9
  38. package/dist_ts/forwarding/config/index.js +0 -10
  39. package/dist_ts/forwarding/factory/forwarding-factory.d.ts +0 -25
  40. package/dist_ts/forwarding/factory/forwarding-factory.js +0 -172
  41. package/dist_ts/forwarding/factory/index.d.ts +0 -4
  42. package/dist_ts/forwarding/factory/index.js +0 -5
  43. package/dist_ts/forwarding/handlers/base-handler.d.ts +0 -62
  44. package/dist_ts/forwarding/handlers/base-handler.js +0 -121
  45. package/dist_ts/forwarding/handlers/http-handler.d.ts +0 -30
  46. package/dist_ts/forwarding/handlers/http-handler.js +0 -143
  47. package/dist_ts/forwarding/handlers/https-passthrough-handler.d.ts +0 -29
  48. package/dist_ts/forwarding/handlers/https-passthrough-handler.js +0 -156
  49. package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.d.ts +0 -36
  50. package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.js +0 -276
  51. package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.d.ts +0 -35
  52. package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.js +0 -261
  53. package/dist_ts/forwarding/handlers/index.d.ts +0 -8
  54. package/dist_ts/forwarding/handlers/index.js +0 -9
  55. package/dist_ts/forwarding/index.d.ts +0 -13
  56. package/dist_ts/forwarding/index.js +0 -16
  57. package/dist_ts/http/index.d.ts +0 -5
  58. package/dist_ts/http/index.js +0 -8
  59. package/dist_ts/http/models/http-types.d.ts +0 -6
  60. package/dist_ts/http/models/http-types.js +0 -7
  61. package/dist_ts/http/router/index.d.ts +0 -8
  62. package/dist_ts/http/router/index.js +0 -7
  63. package/dist_ts/http/router/proxy-router.d.ts +0 -115
  64. package/dist_ts/http/router/proxy-router.js +0 -325
  65. package/dist_ts/http/router/route-router.d.ts +0 -108
  66. package/dist_ts/http/router/route-router.js +0 -393
  67. package/dist_ts/protocols/tls/constants.d.ts +0 -122
  68. package/dist_ts/protocols/tls/constants.js +0 -135
  69. package/dist_ts/protocols/tls/parser.d.ts +0 -53
  70. package/dist_ts/protocols/tls/parser.js +0 -294
  71. package/dist_ts/protocols/tls/types.d.ts +0 -65
  72. package/dist_ts/protocols/tls/types.js +0 -5
  73. package/dist_ts/proxies/http-proxy/certificate-manager.d.ts +0 -95
  74. package/dist_ts/proxies/http-proxy/certificate-manager.js +0 -214
  75. package/dist_ts/proxies/http-proxy/connection-pool.d.ts +0 -47
  76. package/dist_ts/proxies/http-proxy/connection-pool.js +0 -195
  77. package/dist_ts/proxies/http-proxy/context-creator.d.ts +0 -34
  78. package/dist_ts/proxies/http-proxy/context-creator.js +0 -108
  79. package/dist_ts/proxies/http-proxy/default-certificates.d.ts +0 -54
  80. package/dist_ts/proxies/http-proxy/default-certificates.js +0 -127
  81. package/dist_ts/proxies/http-proxy/function-cache.d.ts +0 -95
  82. package/dist_ts/proxies/http-proxy/function-cache.js +0 -215
  83. package/dist_ts/proxies/http-proxy/handlers/index.d.ts +0 -4
  84. package/dist_ts/proxies/http-proxy/handlers/index.js +0 -6
  85. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +0 -18
  86. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +0 -78
  87. package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +0 -19
  88. package/dist_ts/proxies/http-proxy/handlers/static-handler.js +0 -211
  89. package/dist_ts/proxies/http-proxy/http-proxy.d.ts +0 -117
  90. package/dist_ts/proxies/http-proxy/http-proxy.js +0 -521
  91. package/dist_ts/proxies/http-proxy/http-request-handler.d.ts +0 -40
  92. package/dist_ts/proxies/http-proxy/http-request-handler.js +0 -257
  93. package/dist_ts/proxies/http-proxy/http2-request-handler.d.ts +0 -24
  94. package/dist_ts/proxies/http-proxy/http2-request-handler.js +0 -201
  95. package/dist_ts/proxies/http-proxy/index.d.ts +0 -14
  96. package/dist_ts/proxies/http-proxy/index.js +0 -16
  97. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +0 -117
  98. package/dist_ts/proxies/http-proxy/models/http-types.js +0 -92
  99. package/dist_ts/proxies/http-proxy/models/index.d.ts +0 -5
  100. package/dist_ts/proxies/http-proxy/models/index.js +0 -6
  101. package/dist_ts/proxies/http-proxy/models/types.d.ts +0 -75
  102. package/dist_ts/proxies/http-proxy/models/types.js +0 -35
  103. package/dist_ts/proxies/http-proxy/request-handler.d.ts +0 -97
  104. package/dist_ts/proxies/http-proxy/request-handler.js +0 -737
  105. package/dist_ts/proxies/http-proxy/security-manager.d.ts +0 -98
  106. package/dist_ts/proxies/http-proxy/security-manager.js +0 -341
  107. package/dist_ts/proxies/http-proxy/websocket-handler.d.ts +0 -50
  108. package/dist_ts/proxies/http-proxy/websocket-handler.js +0 -505
  109. package/dist_ts/proxies/smart-proxy/acme-state-manager.d.ts +0 -42
  110. package/dist_ts/proxies/smart-proxy/acme-state-manager.js +0 -101
  111. package/dist_ts/proxies/smart-proxy/cert-store.d.ts +0 -10
  112. package/dist_ts/proxies/smart-proxy/cert-store.js +0 -72
  113. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +0 -164
  114. package/dist_ts/proxies/smart-proxy/certificate-manager.js +0 -745
  115. package/dist_ts/proxies/smart-proxy/connection-manager.d.ts +0 -128
  116. package/dist_ts/proxies/smart-proxy/connection-manager.js +0 -689
  117. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +0 -43
  118. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +0 -180
  119. package/dist_ts/proxies/smart-proxy/metrics-collector.d.ts +0 -98
  120. package/dist_ts/proxies/smart-proxy/metrics-collector.js +0 -355
  121. package/dist_ts/proxies/smart-proxy/nftables-manager.d.ts +0 -82
  122. package/dist_ts/proxies/smart-proxy/nftables-manager.js +0 -237
  123. package/dist_ts/proxies/smart-proxy/port-manager.d.ts +0 -117
  124. package/dist_ts/proxies/smart-proxy/port-manager.js +0 -318
  125. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +0 -60
  126. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +0 -1407
  127. package/dist_ts/proxies/smart-proxy/route-manager.d.ts +0 -112
  128. package/dist_ts/proxies/smart-proxy/route-manager.js +0 -453
  129. package/dist_ts/proxies/smart-proxy/route-orchestrator.d.ts +0 -56
  130. package/dist_ts/proxies/smart-proxy/route-orchestrator.js +0 -204
  131. package/dist_ts/proxies/smart-proxy/rust-binary-locator.d.ts +0 -23
  132. package/dist_ts/proxies/smart-proxy/rust-binary-locator.js +0 -104
  133. package/dist_ts/proxies/smart-proxy/security-manager.d.ts +0 -74
  134. package/dist_ts/proxies/smart-proxy/security-manager.js +0 -227
  135. package/dist_ts/proxies/smart-proxy/throughput-tracker.d.ts +0 -36
  136. package/dist_ts/proxies/smart-proxy/throughput-tracker.js +0 -115
  137. package/dist_ts/proxies/smart-proxy/timeout-manager.d.ts +0 -48
  138. package/dist_ts/proxies/smart-proxy/timeout-manager.js +0 -158
  139. package/dist_ts/proxies/smart-proxy/tls-manager.d.ts +0 -50
  140. package/dist_ts/proxies/smart-proxy/tls-manager.js +0 -110
  141. package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +0 -161
  142. package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +0 -282
  143. package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +0 -73
  144. package/dist_ts/proxies/smart-proxy/utils/route-validators.js +0 -259
  145. package/dist_ts/routing/router/proxy-router.d.ts +0 -115
  146. package/dist_ts/routing/router/proxy-router.js +0 -325
  147. package/dist_ts/routing/router/route-router.d.ts +0 -108
  148. package/dist_ts/routing/router/route-router.js +0 -393
  149. package/dist_ts/tls/alerts/index.d.ts +0 -4
  150. package/dist_ts/tls/alerts/index.js +0 -5
  151. package/dist_ts/tls/alerts/tls-alert.d.ts +0 -150
  152. package/dist_ts/tls/alerts/tls-alert.js +0 -226
  153. package/dist_ts/tls/sni/client-hello-parser.d.ts +0 -100
  154. package/dist_ts/tls/sni/client-hello-parser.js +0 -464
  155. package/dist_ts/tls/sni/sni-extraction.d.ts +0 -58
  156. package/dist_ts/tls/sni/sni-extraction.js +0 -275
  157. package/dist_ts/tls/utils/index.d.ts +0 -4
  158. package/dist_ts/tls/utils/index.js +0 -5
  159. package/dist_ts/tls/utils/tls-utils.d.ts +0 -49
  160. package/dist_ts/tls/utils/tls-utils.js +0 -75
  161. package/ts/proxies/smart-proxy/rust-binary-locator.ts +0 -112
@@ -1,745 +0,0 @@
1
- import * as plugins from '../../plugins.js';
2
- import { HttpProxy } from '../http-proxy/index.js';
3
- import { CertStore } from './cert-store.js';
4
- import { logger } from '../../core/utils/logger.js';
5
- import { SocketHandlers } from './utils/route-helpers.js';
6
- export class SmartCertManager {
7
- constructor(routes, certDir = './certs', acmeOptions, initialState) {
8
- this.routes = routes;
9
- this.certDir = certDir;
10
- this.acmeOptions = acmeOptions;
11
- this.initialState = initialState;
12
- this.smartAcme = null;
13
- this.httpProxy = null;
14
- this.renewalTimer = null;
15
- this.pendingChallenges = new Map();
16
- this.challengeRoute = null;
17
- // Track certificate status by route name
18
- this.certStatus = new Map();
19
- // Global ACME defaults from top-level configuration
20
- this.globalAcmeDefaults = null;
21
- // Flag to track if challenge route is currently active
22
- this.challengeRouteActive = false;
23
- // Flag to track if provisioning is in progress
24
- this.isProvisioning = false;
25
- // ACME state manager reference
26
- this.acmeStateManager = null;
27
- // Whether to fallback to ACME if custom provision fails
28
- this.certProvisionFallbackToAcme = true;
29
- this.certStore = new CertStore(certDir);
30
- // Apply initial state if provided
31
- if (initialState) {
32
- this.challengeRouteActive = initialState.challengeRouteActive || false;
33
- }
34
- }
35
- setHttpProxy(httpProxy) {
36
- this.httpProxy = httpProxy;
37
- }
38
- /**
39
- * Set the ACME state manager
40
- */
41
- setAcmeStateManager(stateManager) {
42
- this.acmeStateManager = stateManager;
43
- }
44
- /**
45
- * Set global ACME defaults from top-level configuration
46
- */
47
- setGlobalAcmeDefaults(defaults) {
48
- this.globalAcmeDefaults = defaults;
49
- }
50
- /**
51
- * Set custom certificate provision function
52
- */
53
- setCertProvisionFunction(fn) {
54
- this.certProvisionFunction = fn;
55
- }
56
- /**
57
- * Set whether to fallback to ACME if custom provision fails
58
- */
59
- setCertProvisionFallbackToAcme(fallback) {
60
- this.certProvisionFallbackToAcme = fallback;
61
- }
62
- /**
63
- * Update the routes array to keep it in sync with SmartProxy
64
- * This prevents stale route data when adding/removing challenge routes
65
- */
66
- setRoutes(routes) {
67
- this.routes = routes;
68
- }
69
- /**
70
- * Set callback for updating routes (used for challenge routes)
71
- */
72
- setUpdateRoutesCallback(callback) {
73
- this.updateRoutesCallback = callback;
74
- try {
75
- logger.log('debug', 'Route update callback set successfully', { component: 'certificate-manager' });
76
- }
77
- catch (error) {
78
- // Silently handle logging errors
79
- console.log('[DEBUG] Route update callback set successfully');
80
- }
81
- }
82
- /**
83
- * Initialize certificate manager and provision certificates for all routes
84
- */
85
- async initialize() {
86
- // Create certificate directory if it doesn't exist
87
- await this.certStore.initialize();
88
- // Initialize SmartAcme if we have any ACME routes
89
- const hasAcmeRoutes = this.routes.some(r => r.action.tls?.certificate === 'auto');
90
- if (hasAcmeRoutes && this.acmeOptions?.email) {
91
- // Create HTTP-01 challenge handler
92
- const http01Handler = new plugins.smartacme.handlers.Http01MemoryHandler();
93
- // Set up challenge handler integration with our routing
94
- this.setupChallengeHandler(http01Handler);
95
- // Create SmartAcme instance with built-in MemoryCertManager and HTTP-01 handler
96
- this.smartAcme = new plugins.smartacme.SmartAcme({
97
- accountEmail: this.acmeOptions.email,
98
- environment: this.acmeOptions.useProduction ? 'production' : 'integration',
99
- certManager: new plugins.smartacme.certmanagers.MemoryCertManager(),
100
- challengeHandlers: [http01Handler]
101
- });
102
- await this.smartAcme.start();
103
- // Add challenge route once at initialization if not already active
104
- if (!this.challengeRouteActive) {
105
- logger.log('info', 'Adding ACME challenge route during initialization', { component: 'certificate-manager' });
106
- await this.addChallengeRoute();
107
- }
108
- else {
109
- logger.log('info', 'Challenge route already active from previous instance', { component: 'certificate-manager' });
110
- }
111
- }
112
- // Skip automatic certificate provisioning during initialization
113
- // This will be called later after ports are listening
114
- logger.log('info', 'Certificate manager initialized. Deferring certificate provisioning until after ports are listening.', { component: 'certificate-manager' });
115
- // Start renewal timer
116
- this.startRenewalTimer();
117
- }
118
- /**
119
- * Provision certificates for all routes that need them
120
- */
121
- async provisionAllCertificates() {
122
- const certRoutes = this.routes.filter(r => r.action.tls?.mode === 'terminate' ||
123
- r.action.tls?.mode === 'terminate-and-reencrypt');
124
- // Set provisioning flag to prevent concurrent operations
125
- this.isProvisioning = true;
126
- try {
127
- for (const route of certRoutes) {
128
- try {
129
- await this.provisionCertificate(route, true); // Allow concurrent since we're managing it here
130
- }
131
- catch (error) {
132
- logger.log('error', `Failed to provision certificate for route ${route.name}`, { routeName: route.name, error, component: 'certificate-manager' });
133
- }
134
- }
135
- }
136
- finally {
137
- this.isProvisioning = false;
138
- }
139
- }
140
- /**
141
- * Provision certificate for a single route
142
- */
143
- async provisionCertificate(route, allowConcurrent = false) {
144
- const tls = route.action.tls;
145
- if (!tls || (tls.mode !== 'terminate' && tls.mode !== 'terminate-and-reencrypt')) {
146
- return;
147
- }
148
- // Check if provisioning is already in progress (prevent concurrent provisioning)
149
- if (!allowConcurrent && this.isProvisioning) {
150
- logger.log('info', `Certificate provisioning already in progress, skipping ${route.name}`, { routeName: route.name, component: 'certificate-manager' });
151
- return;
152
- }
153
- const domains = this.extractDomainsFromRoute(route);
154
- if (domains.length === 0) {
155
- logger.log('warn', `Route ${route.name} has TLS termination but no domains`, { routeName: route.name, component: 'certificate-manager' });
156
- return;
157
- }
158
- const primaryDomain = domains[0];
159
- if (tls.certificate === 'auto') {
160
- // ACME certificate
161
- await this.provisionAcmeCertificate(route, domains);
162
- }
163
- else if (typeof tls.certificate === 'object') {
164
- // Static certificate
165
- await this.provisionStaticCertificate(route, primaryDomain, tls.certificate);
166
- }
167
- }
168
- /**
169
- * Provision ACME certificate
170
- */
171
- async provisionAcmeCertificate(route, domains) {
172
- const primaryDomain = domains[0];
173
- const routeName = route.name || primaryDomain;
174
- // Check if we already have a valid certificate
175
- const existingCert = await this.certStore.getCertificate(routeName);
176
- if (existingCert && this.isCertificateValid(existingCert)) {
177
- logger.log('info', `Using existing valid certificate for ${primaryDomain}`, { domain: primaryDomain, component: 'certificate-manager' });
178
- await this.applyCertificate(primaryDomain, existingCert);
179
- this.updateCertStatus(routeName, 'valid', existingCert.source || 'acme', existingCert);
180
- return;
181
- }
182
- // Check for custom provision function first
183
- if (this.certProvisionFunction) {
184
- try {
185
- logger.log('info', `Attempting custom certificate provision for ${primaryDomain}`, { domain: primaryDomain, component: 'certificate-manager' });
186
- const result = await this.certProvisionFunction(primaryDomain);
187
- if (result === 'http01') {
188
- logger.log('info', `Custom function returned 'http01', falling back to Let's Encrypt for ${primaryDomain}`, { domain: primaryDomain, component: 'certificate-manager' });
189
- // Continue with existing ACME logic below
190
- }
191
- else {
192
- // Use custom certificate
193
- const customCert = result;
194
- // Convert to internal certificate format
195
- const certData = {
196
- cert: customCert.publicKey,
197
- key: customCert.privateKey,
198
- ca: '',
199
- issueDate: new Date(),
200
- expiryDate: this.extractExpiryDate(customCert.publicKey),
201
- source: 'custom'
202
- };
203
- // Store and apply certificate
204
- await this.certStore.saveCertificate(routeName, certData);
205
- await this.applyCertificate(primaryDomain, certData);
206
- this.updateCertStatus(routeName, 'valid', 'custom', certData);
207
- logger.log('info', `Custom certificate applied for ${primaryDomain}`, {
208
- domain: primaryDomain,
209
- expiryDate: certData.expiryDate,
210
- component: 'certificate-manager'
211
- });
212
- return;
213
- }
214
- }
215
- catch (error) {
216
- logger.log('error', `Custom cert provision failed for ${primaryDomain}: ${error.message}`, {
217
- domain: primaryDomain,
218
- error: error.message,
219
- component: 'certificate-manager'
220
- });
221
- // Check if we should fallback to ACME
222
- if (!this.certProvisionFallbackToAcme) {
223
- throw error;
224
- }
225
- logger.log('info', `Falling back to Let's Encrypt for ${primaryDomain}`, { domain: primaryDomain, component: 'certificate-manager' });
226
- }
227
- }
228
- if (!this.smartAcme) {
229
- throw new Error('SmartAcme not initialized. This usually means no ACME email was provided. ' +
230
- 'Please ensure you have configured ACME with an email address either:\n' +
231
- '1. In the top-level "acme" configuration\n' +
232
- '2. In the route\'s "tls.acme" configuration');
233
- }
234
- // Apply renewal threshold from global defaults or route config
235
- const renewThreshold = route.action.tls?.acme?.renewBeforeDays ||
236
- this.globalAcmeDefaults?.renewThresholdDays ||
237
- 30;
238
- logger.log('info', `Requesting ACME certificate for ${domains.join(', ')} (renew ${renewThreshold} days before expiry)`, { domains: domains.join(', '), renewThreshold, component: 'certificate-manager' });
239
- this.updateCertStatus(routeName, 'pending', 'acme');
240
- try {
241
- // Challenge route should already be active from initialization
242
- // No need to add it for each certificate
243
- // Determine if we should request a wildcard certificate
244
- // Only request wildcards if:
245
- // 1. The primary domain is not already a wildcard
246
- // 2. The domain has multiple parts (can have subdomains)
247
- // 3. We have DNS-01 challenge support (required for wildcards)
248
- const hasDnsChallenge = this.smartAcme.challengeHandlers?.some((handler) => handler.getSupportedTypes && handler.getSupportedTypes().includes('dns-01'));
249
- const shouldIncludeWildcard = !primaryDomain.startsWith('*.') &&
250
- primaryDomain.includes('.') &&
251
- primaryDomain.split('.').length >= 2 &&
252
- hasDnsChallenge;
253
- if (shouldIncludeWildcard) {
254
- logger.log('info', `Requesting wildcard certificate for ${primaryDomain} (DNS-01 available)`, { domain: primaryDomain, challengeType: 'DNS-01', component: 'certificate-manager' });
255
- }
256
- // Use smartacme to get certificate with optional wildcard
257
- const cert = await this.smartAcme.getCertificateForDomain(primaryDomain, shouldIncludeWildcard ? { includeWildcard: true } : undefined);
258
- // SmartAcme's Cert object has these properties:
259
- // - publicKey: The certificate PEM string
260
- // - privateKey: The private key PEM string
261
- // - csr: Certificate signing request
262
- // - validUntil: Timestamp in milliseconds
263
- // - domainName: The domain name
264
- const certData = {
265
- cert: cert.publicKey,
266
- key: cert.privateKey,
267
- ca: cert.publicKey, // Use same as cert for now
268
- expiryDate: new Date(cert.validUntil),
269
- issueDate: new Date(cert.created),
270
- source: 'acme'
271
- };
272
- await this.certStore.saveCertificate(routeName, certData);
273
- await this.applyCertificate(primaryDomain, certData);
274
- this.updateCertStatus(routeName, 'valid', 'acme', certData);
275
- logger.log('info', `Successfully provisioned ACME certificate for ${primaryDomain}`, { domain: primaryDomain, component: 'certificate-manager' });
276
- }
277
- catch (error) {
278
- logger.log('error', `Failed to provision ACME certificate for ${primaryDomain}: ${error.message}`, { domain: primaryDomain, error: error.message, component: 'certificate-manager' });
279
- this.updateCertStatus(routeName, 'error', 'acme', undefined, error.message);
280
- throw error;
281
- }
282
- }
283
- /**
284
- * Provision static certificate
285
- */
286
- async provisionStaticCertificate(route, domain, certConfig) {
287
- const routeName = route.name || domain;
288
- try {
289
- let key = certConfig.key;
290
- let cert = certConfig.cert;
291
- // Load from files if paths are provided
292
- const smartFileFactory = plugins.smartfile.SmartFileFactory.nodeFs();
293
- if (certConfig.keyFile) {
294
- const keyFile = await smartFileFactory.fromFilePath(certConfig.keyFile);
295
- key = keyFile.contents.toString();
296
- }
297
- if (certConfig.certFile) {
298
- const certFile = await smartFileFactory.fromFilePath(certConfig.certFile);
299
- cert = certFile.contents.toString();
300
- }
301
- // Parse certificate to get dates
302
- const expiryDate = this.extractExpiryDate(cert);
303
- const issueDate = new Date(); // Current date as issue date
304
- const certData = {
305
- cert,
306
- key,
307
- expiryDate,
308
- issueDate,
309
- source: 'static'
310
- };
311
- // Save to store for consistency
312
- await this.certStore.saveCertificate(routeName, certData);
313
- await this.applyCertificate(domain, certData);
314
- this.updateCertStatus(routeName, 'valid', 'static', certData);
315
- logger.log('info', `Successfully loaded static certificate for ${domain}`, { domain, component: 'certificate-manager' });
316
- }
317
- catch (error) {
318
- logger.log('error', `Failed to provision static certificate for ${domain}: ${error.message}`, { domain, error: error.message, component: 'certificate-manager' });
319
- this.updateCertStatus(routeName, 'error', 'static', undefined, error.message);
320
- throw error;
321
- }
322
- }
323
- /**
324
- * Apply certificate to HttpProxy
325
- */
326
- async applyCertificate(domain, certData) {
327
- if (!this.httpProxy) {
328
- logger.log('warn', `HttpProxy not set, cannot apply certificate for domain ${domain}`, { domain, component: 'certificate-manager' });
329
- return;
330
- }
331
- // Apply certificate to HttpProxy
332
- this.httpProxy.updateCertificate(domain, certData.cert, certData.key);
333
- // Also apply for wildcard if it's a subdomain
334
- if (domain.includes('.') && !domain.startsWith('*.')) {
335
- const parts = domain.split('.');
336
- if (parts.length >= 2) {
337
- const wildcardDomain = `*.${parts.slice(-2).join('.')}`;
338
- this.httpProxy.updateCertificate(wildcardDomain, certData.cert, certData.key);
339
- }
340
- }
341
- }
342
- /**
343
- * Extract domains from route configuration
344
- */
345
- extractDomainsFromRoute(route) {
346
- if (!route.match.domains) {
347
- return [];
348
- }
349
- const domains = Array.isArray(route.match.domains)
350
- ? route.match.domains
351
- : [route.match.domains];
352
- // Filter out wildcards and patterns
353
- return domains.filter(d => !d.includes('*') &&
354
- !d.includes('{') &&
355
- d.includes('.'));
356
- }
357
- /**
358
- * Check if certificate is valid
359
- */
360
- isCertificateValid(cert) {
361
- const now = new Date();
362
- // Use renewal threshold from global defaults or fallback to 30 days
363
- const renewThresholdDays = this.globalAcmeDefaults?.renewThresholdDays || 30;
364
- const expiryThreshold = new Date(now.getTime() + renewThresholdDays * 24 * 60 * 60 * 1000);
365
- return cert.expiryDate > expiryThreshold;
366
- }
367
- /**
368
- * Extract expiry date from a PEM certificate
369
- */
370
- extractExpiryDate(_certPem) {
371
- // For now, we'll default to 90 days for custom certificates
372
- // In production, you might want to use a proper X.509 parser
373
- // or require the custom cert provider to include expiry info
374
- logger.log('info', 'Using default 90-day expiry for custom certificate', {
375
- component: 'certificate-manager'
376
- });
377
- return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000);
378
- }
379
- /**
380
- * Add challenge route to SmartProxy
381
- *
382
- * This method adds a special route for ACME HTTP-01 challenges, which typically uses port 80.
383
- * Since we may already be listening on port 80 for regular routes, we need to be
384
- * careful about how we add this route to avoid binding conflicts.
385
- */
386
- async addChallengeRoute() {
387
- // Check with state manager first - avoid duplication
388
- if (this.acmeStateManager && this.acmeStateManager.isChallengeRouteActive()) {
389
- try {
390
- logger.log('info', 'Challenge route already active in global state, skipping', { component: 'certificate-manager' });
391
- }
392
- catch (error) {
393
- // Silently handle logging errors
394
- console.log('[INFO] Challenge route already active in global state, skipping');
395
- }
396
- this.challengeRouteActive = true;
397
- return;
398
- }
399
- if (this.challengeRouteActive) {
400
- try {
401
- logger.log('info', 'Challenge route already active locally, skipping', { component: 'certificate-manager' });
402
- }
403
- catch (error) {
404
- // Silently handle logging errors
405
- console.log('[INFO] Challenge route already active locally, skipping');
406
- }
407
- return;
408
- }
409
- if (!this.updateRoutesCallback) {
410
- throw new Error('No route update callback set');
411
- }
412
- if (!this.challengeRoute) {
413
- throw new Error('Challenge route not initialized');
414
- }
415
- // Get the challenge port
416
- const challengePort = this.globalAcmeDefaults?.port || 80;
417
- // Check if any existing routes are already using this port
418
- // This helps us determine if we need to create a new binding or can reuse existing one
419
- const portInUseByRoutes = this.routes.some(route => {
420
- const routePorts = Array.isArray(route.match.ports) ? route.match.ports : [route.match.ports];
421
- return routePorts.some(p => {
422
- // Handle both number and port range objects
423
- if (typeof p === 'number') {
424
- return p === challengePort;
425
- }
426
- else if (typeof p === 'object' && 'from' in p && 'to' in p) {
427
- // Port range case - check if challengePort is in range
428
- return challengePort >= p.from && challengePort <= p.to;
429
- }
430
- return false;
431
- });
432
- });
433
- try {
434
- // Log whether port is already in use by other routes
435
- if (portInUseByRoutes) {
436
- try {
437
- logger.log('info', `Port ${challengePort} is already used by another route, merging ACME challenge route`, {
438
- port: challengePort,
439
- component: 'certificate-manager'
440
- });
441
- }
442
- catch (error) {
443
- // Silently handle logging errors
444
- console.log(`[INFO] Port ${challengePort} is already used by another route, merging ACME challenge route`);
445
- }
446
- }
447
- else {
448
- try {
449
- logger.log('info', `Adding new ACME challenge route on port ${challengePort}`, {
450
- port: challengePort,
451
- component: 'certificate-manager'
452
- });
453
- }
454
- catch (error) {
455
- // Silently handle logging errors
456
- console.log(`[INFO] Adding new ACME challenge route on port ${challengePort}`);
457
- }
458
- }
459
- // Add the challenge route to the existing routes
460
- const challengeRoute = this.challengeRoute;
461
- const updatedRoutes = [...this.routes, challengeRoute];
462
- // With the re-ordering of start(), port binding should already be done
463
- // This updateRoutes call should just add the route without binding again
464
- await this.updateRoutesCallback(updatedRoutes);
465
- // Keep local routes in sync after updating
466
- this.routes = updatedRoutes;
467
- this.challengeRouteActive = true;
468
- // Register with state manager
469
- if (this.acmeStateManager) {
470
- this.acmeStateManager.addChallengeRoute(challengeRoute);
471
- }
472
- try {
473
- logger.log('info', 'ACME challenge route successfully added', { component: 'certificate-manager' });
474
- }
475
- catch (error) {
476
- // Silently handle logging errors
477
- console.log('[INFO] ACME challenge route successfully added');
478
- }
479
- }
480
- catch (error) {
481
- // Enhanced error handling based on error type
482
- if (error.code === 'EADDRINUSE') {
483
- try {
484
- logger.log('warn', `Challenge port ${challengePort} is unavailable - it's already in use by another process. Consider configuring a different ACME port.`, {
485
- port: challengePort,
486
- error: error.message,
487
- component: 'certificate-manager'
488
- });
489
- }
490
- catch (logError) {
491
- // Silently handle logging errors
492
- console.log(`[WARN] Challenge port ${challengePort} is unavailable - it's already in use by another process. Consider configuring a different ACME port.`);
493
- }
494
- // Provide a more informative and actionable error message
495
- throw new Error(`ACME HTTP-01 challenge port ${challengePort} is already in use by another process. ` +
496
- `Please configure a different port using the acme.port setting (e.g., 8080).`);
497
- }
498
- else if (error.message && error.message.includes('EADDRINUSE')) {
499
- // Some Node.js versions embed the error code in the message rather than the code property
500
- try {
501
- logger.log('warn', `Port ${challengePort} conflict detected: ${error.message}`, {
502
- port: challengePort,
503
- component: 'certificate-manager'
504
- });
505
- }
506
- catch (logError) {
507
- // Silently handle logging errors
508
- console.log(`[WARN] Port ${challengePort} conflict detected: ${error.message}`);
509
- }
510
- // More detailed error message with suggestions
511
- throw new Error(`ACME HTTP challenge port ${challengePort} conflict detected. ` +
512
- `To resolve this issue, try one of these approaches:\n` +
513
- `1. Configure a different port in ACME settings (acme.port)\n` +
514
- `2. Add a regular route that uses port ${challengePort} before initializing the certificate manager\n` +
515
- `3. Stop any other services that might be using port ${challengePort}`);
516
- }
517
- // Log and rethrow other types of errors
518
- try {
519
- logger.log('error', `Failed to add challenge route: ${error.message}`, {
520
- error: error.message,
521
- component: 'certificate-manager'
522
- });
523
- }
524
- catch (logError) {
525
- // Silently handle logging errors
526
- console.log(`[ERROR] Failed to add challenge route: ${error.message}`);
527
- }
528
- throw error;
529
- }
530
- }
531
- /**
532
- * Remove challenge route from SmartProxy
533
- */
534
- async removeChallengeRoute() {
535
- if (!this.challengeRouteActive) {
536
- try {
537
- logger.log('info', 'Challenge route not active, skipping removal', { component: 'certificate-manager' });
538
- }
539
- catch (error) {
540
- // Silently handle logging errors
541
- console.log('[INFO] Challenge route not active, skipping removal');
542
- }
543
- return;
544
- }
545
- if (!this.updateRoutesCallback) {
546
- return;
547
- }
548
- try {
549
- const filteredRoutes = this.routes.filter(r => r.name !== 'acme-challenge');
550
- await this.updateRoutesCallback(filteredRoutes);
551
- // Keep local routes in sync after updating
552
- this.routes = filteredRoutes;
553
- this.challengeRouteActive = false;
554
- // Remove from state manager
555
- if (this.acmeStateManager) {
556
- this.acmeStateManager.removeChallengeRoute('acme-challenge');
557
- }
558
- try {
559
- logger.log('info', 'ACME challenge route successfully removed', { component: 'certificate-manager' });
560
- }
561
- catch (error) {
562
- // Silently handle logging errors
563
- console.log('[INFO] ACME challenge route successfully removed');
564
- }
565
- }
566
- catch (error) {
567
- try {
568
- logger.log('error', `Failed to remove challenge route: ${error.message}`, { error: error.message, component: 'certificate-manager' });
569
- }
570
- catch (logError) {
571
- // Silently handle logging errors
572
- console.log(`[ERROR] Failed to remove challenge route: ${error.message}`);
573
- }
574
- // Reset the flag even on error to avoid getting stuck
575
- this.challengeRouteActive = false;
576
- throw error;
577
- }
578
- }
579
- /**
580
- * Start renewal timer
581
- */
582
- startRenewalTimer() {
583
- // Check for renewals every 12 hours
584
- this.renewalTimer = setInterval(() => {
585
- this.checkAndRenewCertificates();
586
- }, 12 * 60 * 60 * 1000);
587
- // Unref the timer so it doesn't keep the process alive
588
- if (this.renewalTimer.unref) {
589
- this.renewalTimer.unref();
590
- }
591
- // Also do an immediate check
592
- this.checkAndRenewCertificates();
593
- }
594
- /**
595
- * Check and renew certificates that are expiring
596
- */
597
- async checkAndRenewCertificates() {
598
- for (const route of this.routes) {
599
- if (route.action.tls?.certificate === 'auto') {
600
- const routeName = route.name || this.extractDomainsFromRoute(route)[0];
601
- const cert = await this.certStore.getCertificate(routeName);
602
- if (cert && !this.isCertificateValid(cert)) {
603
- logger.log('info', `Certificate for ${routeName} needs renewal`, { routeName, component: 'certificate-manager' });
604
- try {
605
- await this.provisionCertificate(route);
606
- }
607
- catch (error) {
608
- logger.log('error', `Failed to renew certificate for ${routeName}: ${error.message}`, { routeName, error: error.message, component: 'certificate-manager' });
609
- }
610
- }
611
- }
612
- }
613
- }
614
- /**
615
- * Update certificate status
616
- */
617
- updateCertStatus(routeName, status, source, certData, error) {
618
- this.certStatus.set(routeName, {
619
- domain: routeName,
620
- status,
621
- source,
622
- expiryDate: certData?.expiryDate,
623
- issueDate: certData?.issueDate,
624
- error
625
- });
626
- }
627
- /**
628
- * Get certificate status for a route
629
- */
630
- getCertificateStatus(routeName) {
631
- return this.certStatus.get(routeName);
632
- }
633
- /**
634
- * Force renewal of a certificate
635
- */
636
- async renewCertificate(routeName) {
637
- const route = this.routes.find(r => r.name === routeName);
638
- if (!route) {
639
- throw new Error(`Route ${routeName} not found`);
640
- }
641
- // Remove existing certificate to force renewal
642
- await this.certStore.deleteCertificate(routeName);
643
- await this.provisionCertificate(route);
644
- }
645
- /**
646
- * Setup challenge handler integration with SmartProxy routing
647
- */
648
- setupChallengeHandler(http01Handler) {
649
- // Use challenge port from global config or default to 80
650
- const challengePort = this.globalAcmeDefaults?.port || 80;
651
- // Create a challenge route that delegates to SmartAcme's HTTP-01 handler
652
- const challengeRoute = {
653
- name: 'acme-challenge',
654
- priority: 1000, // High priority
655
- match: {
656
- ports: challengePort,
657
- path: '/.well-known/acme-challenge/*'
658
- },
659
- action: {
660
- type: 'socket-handler',
661
- socketHandler: SocketHandlers.httpServer((req, res) => {
662
- // Extract the token from the path
663
- const token = req.url?.split('/').pop();
664
- if (!token) {
665
- res.status(404);
666
- res.send('Not found');
667
- return;
668
- }
669
- // Create mock request/response objects for SmartAcme
670
- let responseData = null;
671
- const mockReq = {
672
- url: req.url,
673
- method: req.method,
674
- headers: req.headers
675
- };
676
- const mockRes = {
677
- statusCode: 200,
678
- setHeader: (name, value) => { },
679
- end: (data) => {
680
- responseData = data;
681
- }
682
- };
683
- // Use SmartAcme's handler
684
- const handleAcme = () => {
685
- http01Handler.handleRequest(mockReq, mockRes, () => {
686
- // Not handled by ACME
687
- res.status(404);
688
- res.send('Not found');
689
- });
690
- // Give it a moment to process, then send response
691
- setTimeout(() => {
692
- if (responseData) {
693
- res.header('Content-Type', 'text/plain');
694
- res.send(String(responseData));
695
- }
696
- else {
697
- res.status(404);
698
- res.send('Not found');
699
- }
700
- }, 100);
701
- };
702
- handleAcme();
703
- })
704
- }
705
- };
706
- // Store the challenge route to add it when needed
707
- this.challengeRoute = challengeRoute;
708
- }
709
- /**
710
- * Stop certificate manager
711
- */
712
- async stop() {
713
- if (this.renewalTimer) {
714
- clearInterval(this.renewalTimer);
715
- this.renewalTimer = null;
716
- }
717
- // Always remove challenge route on shutdown
718
- if (this.challengeRoute) {
719
- logger.log('info', 'Removing ACME challenge route during shutdown', { component: 'certificate-manager' });
720
- await this.removeChallengeRoute();
721
- }
722
- if (this.smartAcme) {
723
- await this.smartAcme.stop();
724
- }
725
- // Clear any pending challenges
726
- if (this.pendingChallenges.size > 0) {
727
- this.pendingChallenges.clear();
728
- }
729
- }
730
- /**
731
- * Get ACME options (for recreating after route updates)
732
- */
733
- getAcmeOptions() {
734
- return this.acmeOptions;
735
- }
736
- /**
737
- * Get certificate manager state
738
- */
739
- getState() {
740
- return {
741
- challengeRouteActive: this.challengeRouteActive
742
- };
743
- }
744
- }
745
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate-manager.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,SAAS,EAAE,MAAM,wBAAwB,CAAC;AAGnD,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,MAAM,0BAA0B,CAAC;AAoB1D,MAAM,OAAO,gBAAgB;IAgC3B,YACU,MAAsB,EACtB,UAAkB,SAAS,EAC3B,WAIP,EACO,YAEP;QATO,WAAM,GAAN,MAAM,CAAgB;QACtB,YAAO,GAAP,OAAO,CAAoB;QAC3B,gBAAW,GAAX,WAAW,CAIlB;QACO,iBAAY,GAAZ,YAAY,CAEnB;QAxCK,cAAS,GAAuC,IAAI,CAAC;QACrD,cAAS,GAAqB,IAAI,CAAC;QACnC,iBAAY,GAA0B,IAAI,CAAC;QAC3C,sBAAiB,GAAwB,IAAI,GAAG,EAAE,CAAC;QACnD,mBAAc,GAAwB,IAAI,CAAC;QAEnD,yCAAyC;QACjC,eAAU,GAA6B,IAAI,GAAG,EAAE,CAAC;QAEzD,oDAAoD;QAC5C,uBAAkB,GAAwB,IAAI,CAAC;QAKvD,uDAAuD;QAC/C,yBAAoB,GAAY,KAAK,CAAC;QAE9C,+CAA+C;QACvC,mBAAc,GAAY,KAAK,CAAC;QAExC,+BAA+B;QACvB,qBAAgB,GAA4B,IAAI,CAAC;QAKzD,wDAAwD;QAChD,gCAA2B,GAAY,IAAI,CAAC;QAclD,IAAI,CAAC,SAAS,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,CAAC;QAExC,kCAAkC;QAClC,IAAI,YAAY,EAAE,CAAC;YACjB,IAAI,CAAC,oBAAoB,GAAG,YAAY,CAAC,oBAAoB,IAAI,KAAK,CAAC;QACzE,CAAC;IACH,CAAC;IAEM,YAAY,CAAC,SAAoB;QACtC,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAGD;;OAEG;IACI,mBAAmB,CAAC,YAA8B;QACvD,IAAI,CAAC,gBAAgB,GAAG,YAAY,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,qBAAqB,CAAC,QAAsB;QACjD,IAAI,CAAC,kBAAkB,GAAG,QAAQ,CAAC;IACrC,CAAC;IAED;;OAEG;IACI,wBAAwB,CAAC,EAAyE;QACvG,IAAI,CAAC,qBAAqB,GAAG,EAAE,CAAC;IAClC,CAAC;IAED;;OAEG;IACI,8BAA8B,CAAC,QAAiB;QACrD,IAAI,CAAC,2BAA2B,GAAG,QAAQ,CAAC;IAC9C,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,MAAsB;QACrC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;IACvB,CAAC;IAED;;OAEG;IACI,uBAAuB,CAAC,QAAmD;QAChF,IAAI,CAAC,oBAAoB,GAAG,QAAQ,CAAC;QACrC,IAAI,CAAC;YACH,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,wCAAwC,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;QACtG,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,iCAAiC;YACjC,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,mDAAmD;QACnD,MAAM,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;QAElC,kDAAkD;QAClD,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CACzC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,CACrC,CAAC;QAEF,IAAI,aAAa,IAAI,IAAI,CAAC,WAAW,EAAE,KAAK,EAAE,CAAC;YAC7C,mCAAmC;YACnC,MAAM,aAAa,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,mBAAmB,EAAE,CAAC;YAE3E,wDAAwD;YACxD,IAAI,CAAC,qBAAqB,CAAC,aAAa,CAAC,CAAC;YAE1C,gFAAgF;YAChF,IAAI,CAAC,SAAS,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC;gBAC/C,YAAY,EAAE,IAAI,CAAC,WAAW,CAAC,KAAK;gBACpC,WAAW,EAAE,IAAI,CAAC,WAAW,CAAC,aAAa,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,aAAa;gBAC1E,WAAW,EAAE,IAAI,OAAO,CAAC,SAAS,CAAC,YAAY,CAAC,iBAAiB,EAAE;gBACnE,iBAAiB,EAAE,CAAC,aAAa,CAAC;aACnC,CAAC,CAAC;YAEH,MAAM,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,CAAC;YAE7B,mEAAmE;YACnE,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;gBAC/B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mDAAmD,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;gBAC9G,MAAM,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACjC,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uDAAuD,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACpH,CAAC;QACH,CAAC;QAED,gEAAgE;QAChE,sDAAsD;QACtD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sGAAsG,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;QAEjK,sBAAsB;QACtB,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,wBAAwB;QACnC,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACxC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;YAClC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,yBAAyB,CACjD,CAAC;QAEF,yDAAyD;QACzD,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAE3B,IAAI,CAAC;YACH,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;gBAC/B,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC,gDAAgD;gBAChG,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,6CAA6C,KAAK,CAAC,IAAI,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;gBACrJ,CAAC;YACH,CAAC;QACH,CAAC;gBAAS,CAAC;YACT,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;QAC9B,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,KAAmB,EAAE,kBAA2B,KAAK;QACrF,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC;QAC7B,IAAI,CAAC,GAAG,IAAI,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC,EAAE,CAAC;YACjF,OAAO;QACT,CAAC;QAED,iFAAiF;QACjF,IAAI,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YAC5C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0DAA0D,KAAK,CAAC,IAAI,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK,CAAC,IAAI,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACxJ,OAAO;QACT,CAAC;QAED,MAAM,OAAO,GAAG,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC;QACpD,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,SAAS,KAAK,CAAC,IAAI,qCAAqC,EAAE,EAAE,SAAS,EAAE,KAAK,CAAC,IAAI,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YAC1I,OAAO;QACT,CAAC;QAED,MAAM,aAAa,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;QAEjC,IAAI,GAAG,CAAC,WAAW,KAAK,MAAM,EAAE,CAAC;YAC/B,mBAAmB;YACnB,MAAM,IAAI,CAAC,wBAAwB,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACtD,CAAC;aAAM,IAAI,OAAO,GAAG,CAAC,WAAW,KAAK,QAAQ,EAAE,CAAC;YAC/C,qBAAqB;YACrB,MAAM,IAAI,CAAC,0BAA0B,CAAC,KAAK,EAAE,aAAa,EAAE,GAAG,CAAC,WAAW,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB,CACpC,KAAmB,EACnB,OAAiB;QAEjB,MAAM,aAAa,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;QACjC,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,aAAa,CAAC;QAE9C,+CAA+C;QAC/C,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QACpE,IAAI,YAAY,IAAI,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,EAAE,CAAC;YAC1D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,wCAAwC,aAAa,EAAE,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACzI,MAAM,IAAI,CAAC,gBAAgB,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC;YACzD,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,YAAY,CAAC,MAAM,IAAI,MAAM,EAAE,YAAY,CAAC,CAAC;YACvF,OAAO;QACT,CAAC;QAED,4CAA4C;QAC5C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+CAA+C,aAAa,EAAE,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;gBAChJ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,aAAa,CAAC,CAAC;gBAE/D,IAAI,MAAM,KAAK,QAAQ,EAAE,CAAC;oBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,wEAAwE,aAAa,EAAE,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;oBACzK,0CAA0C;gBAC5C,CAAC;qBAAM,CAAC;oBACN,yBAAyB;oBACzB,MAAM,UAAU,GAAG,MAAuC,CAAC;oBAE3D,yCAAyC;oBACzC,MAAM,QAAQ,GAAqB;wBACjC,IAAI,EAAE,UAAU,CAAC,SAAS;wBAC1B,GAAG,EAAE,UAAU,CAAC,UAAU;wBAC1B,EAAE,EAAE,EAAE;wBACN,SAAS,EAAE,IAAI,IAAI,EAAE;wBACrB,UAAU,EAAE,IAAI,CAAC,iBAAiB,CAAC,UAAU,CAAC,SAAS,CAAC;wBACxD,MAAM,EAAE,QAAQ;qBACjB,CAAC;oBAEF,8BAA8B;oBAC9B,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;oBAC1D,MAAM,IAAI,CAAC,gBAAgB,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;oBACrD,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,CAAC,CAAC;oBAE9D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kCAAkC,aAAa,EAAE,EAAE;wBACpE,MAAM,EAAE,aAAa;wBACrB,UAAU,EAAE,QAAQ,CAAC,UAAU;wBAC/B,SAAS,EAAE,qBAAqB;qBACjC,CAAC,CAAC;oBACH,OAAO;gBACT,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,oCAAoC,aAAa,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE;oBACzF,MAAM,EAAE,aAAa;oBACrB,KAAK,EAAE,KAAK,CAAC,OAAO;oBACpB,SAAS,EAAE,qBAAqB;iBACjC,CAAC,CAAC;gBACH,sCAAsC;gBACtC,IAAI,CAAC,IAAI,CAAC,2BAA2B,EAAE,CAAC;oBACtC,MAAM,KAAK,CAAC;gBACd,CAAC;gBACD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qCAAqC,aAAa,EAAE,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACxI,CAAC;QACH,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,MAAM,IAAI,KAAK,CACb,4EAA4E;gBAC5E,wEAAwE;gBACxE,4CAA4C;gBAC5C,6CAA6C,CAC9C,CAAC;QACJ,CAAC;QAED,+DAA+D;QAC/D,MAAM,cAAc,GAAG,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,EAAE,eAAe;YACzC,IAAI,CAAC,kBAAkB,EAAE,kBAAkB;YAC3C,EAAE,CAAC;QAExB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mCAAmC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,cAAc,sBAAsB,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,cAAc,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;QAC5M,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;QAEpD,IAAI,CAAC;YACH,+DAA+D;YAC/D,yCAAyC;YAEzC,wDAAwD;YACxD,6BAA6B;YAC7B,kDAAkD;YAClD,yDAAyD;YACzD,+DAA+D;YAC/D,MAAM,eAAe,GAAI,IAAI,CAAC,SAAiB,CAAC,iBAAiB,EAAE,IAAI,CAAC,CAAC,OAAY,EAAE,EAAE,CACvF,OAAO,CAAC,iBAAiB,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAC5E,CAAC;YAEF,MAAM,qBAAqB,GAAG,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC;gBAC/B,aAAa,CAAC,QAAQ,CAAC,GAAG,CAAC;gBAC3B,aAAa,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,MAAM,IAAI,CAAC;gBACpC,eAAe,CAAC;YAE9C,IAAI,qBAAqB,EAAE,CAAC;gBAC1B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uCAAuC,aAAa,qBAAqB,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,QAAQ,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACtL,CAAC;YAED,0DAA0D;YAC1D,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,uBAAuB,CACvD,aAAa,EACb,qBAAqB,CAAC,CAAC,CAAC,EAAE,eAAe,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,SAAS,CAC9D,CAAC;YAEF,gDAAgD;YAChD,4CAA4C;YAC5C,2CAA2C;YAC3C,qCAAqC;YACrC,0CAA0C;YAC1C,gCAAgC;YAChC,MAAM,QAAQ,GAAqB;gBACjC,IAAI,EAAE,IAAI,CAAC,SAAS;gBACpB,GAAG,EAAE,IAAI,CAAC,UAAU;gBACpB,EAAE,EAAE,IAAI,CAAC,SAAS,EAAE,2BAA2B;gBAC/C,UAAU,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC;gBACrC,SAAS,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;gBACjC,MAAM,EAAE,MAAM;aACf,CAAC;YAEF,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;YAC1D,MAAM,IAAI,CAAC,gBAAgB,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;YACrD,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,QAAQ,CAAC,CAAC;YAE5D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iDAAiD,aAAa,EAAE,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;QACpJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,4CAA4C,aAAa,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,EAAE,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,KAAK,CAAC,OAAO,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACtL,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;YAC5E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,0BAA0B,CACtC,KAAmB,EACnB,MAAc,EACd,UAA8E;QAE9E,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,MAAM,CAAC;QAEvC,IAAI,CAAC;YACH,IAAI,GAAG,GAAW,UAAU,CAAC,GAAG,CAAC;YACjC,IAAI,IAAI,GAAW,UAAU,CAAC,IAAI,CAAC;YAEnC,wCAAwC;YACxC,MAAM,gBAAgB,GAAG,OAAO,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC;YACrE,IAAI,UAAU,CAAC,OAAO,EAAE,CAAC;gBACvB,MAAM,OAAO,GAAG,MAAM,gBAAgB,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;gBACxE,GAAG,GAAG,OAAO,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;YACpC,CAAC;YACD,IAAI,UAAU,CAAC,QAAQ,EAAE,CAAC;gBACxB,MAAM,QAAQ,GAAG,MAAM,gBAAgB,CAAC,YAAY,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;gBAC1E,IAAI,GAAG,QAAQ,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;YACtC,CAAC;YAED,iCAAiC;YACjC,MAAM,UAAU,GAAG,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;YAChD,MAAM,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC,CAAC,6BAA6B;YAE3D,MAAM,QAAQ,GAAqB;gBACjC,IAAI;gBACJ,GAAG;gBACH,UAAU;gBACV,SAAS;gBACT,MAAM,EAAE,QAAQ;aACjB,CAAC;YAEF,gCAAgC;YAChC,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;YAC1D,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YAC9C,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,CAAC,CAAC;YAE9D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8CAA8C,MAAM,EAAE,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;QAC3H,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,8CAA8C,MAAM,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,KAAK,CAAC,OAAO,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YAClK,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;YAC9E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,MAAc,EAAE,QAA0B;QACvE,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0DAA0D,MAAM,EAAE,EAAE,EAAE,MAAM,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACrI,OAAO;QACT,CAAC;QAED,iCAAiC;QACjC,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,MAAM,EAAE,QAAQ,CAAC,IAAI,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC;QAEtE,8CAA8C;QAC9C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;YACrD,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAChC,IAAI,KAAK,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBACtB,MAAM,cAAc,GAAG,KAAK,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;gBACxD,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,cAAc,EAAE,QAAQ,CAAC,IAAI,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC;YAChF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB,CAAC,KAAmB;QACjD,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YACzB,OAAO,EAAE,CAAC;QACZ,CAAC;QAED,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;YAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;YACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QAE1B,oCAAoC;QACpC,OAAO,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACxB,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC;YAChB,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC;YAChB,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,CAChB,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,IAAsB;QAC/C,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QAEvB,oEAAoE;QACpE,MAAM,kBAAkB,GAAG,IAAI,CAAC,kBAAkB,EAAE,kBAAkB,IAAI,EAAE,CAAC;QAC7E,MAAM,eAAe,GAAG,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,kBAAkB,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAE3F,OAAO,IAAI,CAAC,UAAU,GAAG,eAAe,CAAC;IAC3C,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,QAAgB;QACxC,4DAA4D;QAC5D,6DAA6D;QAC7D,6DAA6D;QAC7D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oDAAoD,EAAE;YACvE,SAAS,EAAE,qBAAqB;SACjC,CAAC,CAAC;QACH,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;IACzD,CAAC;IAGD;;;;;;OAMG;IACK,KAAK,CAAC,iBAAiB;QAC7B,qDAAqD;QACrD,IAAI,IAAI,CAAC,gBAAgB,IAAI,IAAI,CAAC,gBAAgB,CAAC,sBAAsB,EAAE,EAAE,CAAC;YAC5E,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0DAA0D,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACvH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,iEAAiE,CAAC,CAAC;YACjF,CAAC;YACD,IAAI,CAAC,oBAAoB,GAAG,IAAI,CAAC;YACjC,OAAO;QACT,CAAC;QAED,IAAI,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC9B,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kDAAkD,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YAC/G,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,yDAAyD,CAAC,CAAC;YACzE,CAAC;YACD,OAAO;QACT,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC/B,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;QACrD,CAAC;QAED,yBAAyB;QACzB,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,EAAE,IAAI,IAAI,EAAE,CAAC;QAE1D,2DAA2D;QAC3D,uFAAuF;QACvF,MAAM,iBAAiB,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE;YACjD,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YAC9F,OAAO,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE;gBACzB,4CAA4C;gBAC5C,IAAI,OAAO,CAAC,KAAK,QAAQ,EAAE,CAAC;oBAC1B,OAAO,CAAC,KAAK,aAAa,CAAC;gBAC7B,CAAC;qBAAM,IAAI,OAAO,CAAC,KAAK,QAAQ,IAAI,MAAM,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,EAAE,CAAC;oBAC7D,uDAAuD;oBACvD,OAAO,aAAa,IAAI,CAAC,CAAC,IAAI,IAAI,aAAa,IAAI,CAAC,CAAC,EAAE,CAAC;gBAC1D,CAAC;gBACD,OAAO,KAAK,CAAC;YACf,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC;YACH,qDAAqD;YACrD,IAAI,iBAAiB,EAAE,CAAC;gBACtB,IAAI,CAAC;oBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,QAAQ,aAAa,iEAAiE,EAAE;wBACzG,IAAI,EAAE,aAAa;wBACnB,SAAS,EAAE,qBAAqB;qBACjC,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,iCAAiC;oBACjC,OAAO,CAAC,GAAG,CAAC,eAAe,aAAa,iEAAiE,CAAC,CAAC;gBAC7G,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC;oBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,aAAa,EAAE,EAAE;wBAC7E,IAAI,EAAE,aAAa;wBACnB,SAAS,EAAE,qBAAqB;qBACjC,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,iCAAiC;oBACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,aAAa,EAAE,CAAC,CAAC;gBACjF,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;YAC3C,MAAM,aAAa,GAAG,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;YAEvD,uEAAuE;YACvE,yEAAyE;YACzE,MAAM,IAAI,CAAC,oBAAoB,CAAC,aAAa,CAAC,CAAC;YAC/C,2CAA2C;YAC3C,IAAI,CAAC,MAAM,GAAG,aAAa,CAAC;YAC5B,IAAI,CAAC,oBAAoB,GAAG,IAAI,CAAC;YAEjC,8BAA8B;YAC9B,IAAI,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBAC1B,IAAI,CAAC,gBAAgB,CAAC,iBAAiB,CAAC,cAAc,CAAC,CAAC;YAC1D,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yCAAyC,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACtG,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,8CAA8C;YAC9C,IAAK,KAAa,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;gBACzC,IAAI,CAAC;oBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,kBAAkB,aAAa,uGAAuG,EAAE;wBACzJ,IAAI,EAAE,aAAa;wBACnB,KAAK,EAAG,KAAe,CAAC,OAAO;wBAC/B,SAAS,EAAE,qBAAqB;qBACjC,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,QAAQ,EAAE,CAAC;oBAClB,iCAAiC;oBACjC,OAAO,CAAC,GAAG,CAAC,yBAAyB,aAAa,uGAAuG,CAAC,CAAC;gBAC7J,CAAC;gBAED,0DAA0D;gBAC1D,MAAM,IAAI,KAAK,CACb,+BAA+B,aAAa,yCAAyC;oBACrF,6EAA6E,CAC9E,CAAC;YACJ,CAAC;iBAAM,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAC,EAAE,CAAC;gBACjE,0FAA0F;gBAC1F,IAAI,CAAC;oBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,QAAQ,aAAa,uBAAuB,KAAK,CAAC,OAAO,EAAE,EAAE;wBAC9E,IAAI,EAAE,aAAa;wBACnB,SAAS,EAAE,qBAAqB;qBACjC,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,QAAQ,EAAE,CAAC;oBAClB,iCAAiC;oBACjC,OAAO,CAAC,GAAG,CAAC,eAAe,aAAa,uBAAuB,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;gBAClF,CAAC;gBAED,+CAA+C;gBAC/C,MAAM,IAAI,KAAK,CACb,4BAA4B,aAAa,sBAAsB;oBAC/D,uDAAuD;oBACvD,8DAA8D;oBAC9D,yCAAyC,aAAa,gDAAgD;oBACtG,uDAAuD,aAAa,EAAE,CACvE,CAAC;YACJ,CAAC;YAED,wCAAwC;YACxC,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,kCAAmC,KAAe,CAAC,OAAO,EAAE,EAAE;oBAChF,KAAK,EAAG,KAAe,CAAC,OAAO;oBAC/B,SAAS,EAAE,qBAAqB;iBACjC,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,QAAQ,EAAE,CAAC;gBAClB,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,0CAA2C,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;YACpF,CAAC;YACD,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB;QAChC,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8CAA8C,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YAC3G,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,qDAAqD,CAAC,CAAC;YACrE,CAAC;YACD,OAAO;QACT,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,MAAM,cAAc,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,gBAAgB,CAAC,CAAC;YAC5E,MAAM,IAAI,CAAC,oBAAoB,CAAC,cAAc,CAAC,CAAC;YAChD,2CAA2C;YAC3C,IAAI,CAAC,MAAM,GAAG,cAAc,CAAC;YAC7B,IAAI,CAAC,oBAAoB,GAAG,KAAK,CAAC;YAElC,4BAA4B;YAC5B,IAAI,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBAC1B,IAAI,CAAC,gBAAgB,CAAC,oBAAoB,CAAC,gBAAgB,CAAC,CAAC;YAC/D,CAAC;YAED,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACxG,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAClE,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC;gBACH,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,qCAAqC,KAAK,CAAC,OAAO,EAAE,EAAE,EAAE,KAAK,EAAE,KAAK,CAAC,OAAO,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YACxI,CAAC;YAAC,OAAO,QAAQ,EAAE,CAAC;gBAClB,iCAAiC;gBACjC,OAAO,CAAC,GAAG,CAAC,6CAA6C,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC5E,CAAC;YACD,sDAAsD;YACtD,IAAI,CAAC,oBAAoB,GAAG,KAAK,CAAC;YAClC,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,oCAAoC;QACpC,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE;YACnC,IAAI,CAAC,yBAAyB,EAAE,CAAC;QACnC,CAAC,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAExB,uDAAuD;QACvD,IAAI,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAC5B,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;QAC5B,CAAC;QAED,6BAA6B;QAC7B,IAAI,CAAC,yBAAyB,EAAE,CAAC;IACnC,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB;QACrC,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChC,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,EAAE,CAAC;gBAC7C,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;gBACvE,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;gBAE5D,IAAI,IAAI,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC3C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mBAAmB,SAAS,gBAAgB,EAAE,EAAE,SAAS,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;oBAClH,IAAI,CAAC;wBACH,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;oBACzC,CAAC;oBAAC,OAAO,KAAK,EAAE,CAAC;wBACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,mCAAmC,SAAS,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK,EAAE,KAAK,CAAC,OAAO,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;oBAC/J,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB,CACtB,SAAiB,EACjB,MAA6B,EAC7B,MAA6B,EAC7B,QAA2B,EAC3B,KAAc;QAEd,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,EAAE;YAC7B,MAAM,EAAE,SAAS;YACjB,MAAM;YACN,MAAM;YACN,UAAU,EAAE,QAAQ,EAAE,UAAU;YAChC,SAAS,EAAE,QAAQ,EAAE,SAAS;YAC9B,KAAK;SACN,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,oBAAoB,CAAC,SAAiB;QAC3C,OAAO,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;IACxC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,SAAiB;QAC7C,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;QAC1D,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,SAAS,SAAS,YAAY,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;QAClD,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACK,qBAAqB,CAAC,aAA6D;QACzF,yDAAyD;QACzD,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,EAAE,IAAI,IAAI,EAAE,CAAC;QAE1D,yEAAyE;QACzE,MAAM,cAAc,GAAiB;YACnC,IAAI,EAAE,gBAAgB;YACtB,QAAQ,EAAE,IAAI,EAAG,gBAAgB;YACjC,KAAK,EAAE;gBACL,KAAK,EAAE,aAAa;gBACpB,IAAI,EAAE,+BAA+B;aACtC;YACD,MAAM,EAAE;gBACN,IAAI,EAAE,gBAAgB;gBACtB,aAAa,EAAE,cAAc,CAAC,UAAU,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;oBACpD,kCAAkC;oBAClC,MAAM,KAAK,GAAG,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;oBACxC,IAAI,CAAC,KAAK,EAAE,CAAC;wBACX,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;wBAChB,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;wBACtB,OAAO;oBACT,CAAC;oBAED,qDAAqD;oBACrD,IAAI,YAAY,GAAQ,IAAI,CAAC;oBAC7B,MAAM,OAAO,GAAG;wBACd,GAAG,EAAE,GAAG,CAAC,GAAG;wBACZ,MAAM,EAAE,GAAG,CAAC,MAAM;wBAClB,OAAO,EAAE,GAAG,CAAC,OAAO;qBACrB,CAAC;oBAEF,MAAM,OAAO,GAAG;wBACd,UAAU,EAAE,GAAG;wBACf,SAAS,EAAE,CAAC,IAAY,EAAE,KAAa,EAAE,EAAE,GAAE,CAAC;wBAC9C,GAAG,EAAE,CAAC,IAAS,EAAE,EAAE;4BACjB,YAAY,GAAG,IAAI,CAAC;wBACtB,CAAC;qBACF,CAAC;oBAEF,0BAA0B;oBAC1B,MAAM,UAAU,GAAG,GAAG,EAAE;wBACtB,aAAa,CAAC,aAAa,CAAC,OAAc,EAAE,OAAc,EAAE,GAAG,EAAE;4BAC/D,sBAAsB;4BACtB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;4BAChB,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;wBACxB,CAAC,CAAC,CAAC;wBAEH,kDAAkD;wBAClD,UAAU,CAAC,GAAG,EAAE;4BACd,IAAI,YAAY,EAAE,CAAC;gCACjB,GAAG,CAAC,MAAM,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC;gCACzC,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC;4BACjC,CAAC;iCAAM,CAAC;gCACN,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;gCAChB,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;4BACxB,CAAC;wBACH,CAAC,EAAE,GAAG,CAAC,CAAC;oBACV,CAAC,CAAC;oBAEF,UAAU,EAAE,CAAC;gBACf,CAAC,CAAC;aACH;SACF,CAAC;QAEF,kDAAkD;QAClD,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;QAC3B,CAAC;QAED,4CAA4C;QAC5C,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+CAA+C,EAAE,EAAE,SAAS,EAAE,qBAAqB,EAAE,CAAC,CAAC;YAC1G,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACpC,CAAC;QAED,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,MAAM,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;QAC9B,CAAC;QAED,+BAA+B;QAC/B,IAAI,IAAI,CAAC,iBAAiB,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACpC,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,CAAC;QACjC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,QAAQ;QACb,OAAO;YACL,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;SAChD,CAAC;IACJ,CAAC;CACF"}