@push.rocks/smartproxy 23.0.0 → 23.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/changelog.md +17 -0
- package/dist_rust/{rustproxy → rustproxy_linux_amd64} +0 -0
- package/dist_rust/rustproxy_linux_arm64 +0 -0
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/plugins.d.ts +2 -1
- package/dist_ts/plugins.js +3 -2
- package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.d.ts +9 -21
- package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.js +84 -212
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +2 -3
- package/npmextra.json +3 -0
- package/package.json +13 -11
- package/readme.md +41 -11
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/plugins.ts +2 -0
- package/ts/proxies/smart-proxy/rust-proxy-bridge.ts +103 -233
- package/ts/proxies/smart-proxy/smart-proxy.ts +1 -2
- package/dist_ts/common/eventUtils.d.ts +0 -14
- package/dist_ts/common/eventUtils.js +0 -20
- package/dist_ts/common/types.d.ts +0 -82
- package/dist_ts/common/types.js +0 -15
- package/dist_ts/core/utils/event-system.d.ts +0 -200
- package/dist_ts/core/utils/event-system.js +0 -224
- package/dist_ts/core/utils/event-utils.d.ts +0 -15
- package/dist_ts/core/utils/event-utils.js +0 -11
- package/dist_ts/core/utils/route-manager.d.ts +0 -88
- package/dist_ts/core/utils/route-manager.js +0 -342
- package/dist_ts/core/utils/route-utils.d.ts +0 -28
- package/dist_ts/core/utils/route-utils.js +0 -67
- package/dist_ts/detection/detectors/http-detector-v2.d.ts +0 -33
- package/dist_ts/detection/detectors/http-detector-v2.js +0 -87
- package/dist_ts/detection/detectors/tls-detector-v2.d.ts +0 -33
- package/dist_ts/detection/detectors/tls-detector-v2.js +0 -80
- package/dist_ts/detection/protocol-detector-v2.d.ts +0 -46
- package/dist_ts/detection/protocol-detector-v2.js +0 -116
- package/dist_ts/forwarding/config/forwarding-types.d.ts +0 -42
- package/dist_ts/forwarding/config/forwarding-types.js +0 -18
- package/dist_ts/forwarding/config/index.d.ts +0 -9
- package/dist_ts/forwarding/config/index.js +0 -10
- package/dist_ts/forwarding/factory/forwarding-factory.d.ts +0 -25
- package/dist_ts/forwarding/factory/forwarding-factory.js +0 -172
- package/dist_ts/forwarding/factory/index.d.ts +0 -4
- package/dist_ts/forwarding/factory/index.js +0 -5
- package/dist_ts/forwarding/handlers/base-handler.d.ts +0 -62
- package/dist_ts/forwarding/handlers/base-handler.js +0 -121
- package/dist_ts/forwarding/handlers/http-handler.d.ts +0 -30
- package/dist_ts/forwarding/handlers/http-handler.js +0 -143
- package/dist_ts/forwarding/handlers/https-passthrough-handler.d.ts +0 -29
- package/dist_ts/forwarding/handlers/https-passthrough-handler.js +0 -156
- package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.d.ts +0 -36
- package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.js +0 -276
- package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.d.ts +0 -35
- package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.js +0 -261
- package/dist_ts/forwarding/handlers/index.d.ts +0 -8
- package/dist_ts/forwarding/handlers/index.js +0 -9
- package/dist_ts/forwarding/index.d.ts +0 -13
- package/dist_ts/forwarding/index.js +0 -16
- package/dist_ts/http/index.d.ts +0 -5
- package/dist_ts/http/index.js +0 -8
- package/dist_ts/http/models/http-types.d.ts +0 -6
- package/dist_ts/http/models/http-types.js +0 -7
- package/dist_ts/http/router/index.d.ts +0 -8
- package/dist_ts/http/router/index.js +0 -7
- package/dist_ts/http/router/proxy-router.d.ts +0 -115
- package/dist_ts/http/router/proxy-router.js +0 -325
- package/dist_ts/http/router/route-router.d.ts +0 -108
- package/dist_ts/http/router/route-router.js +0 -393
- package/dist_ts/protocols/tls/constants.d.ts +0 -122
- package/dist_ts/protocols/tls/constants.js +0 -135
- package/dist_ts/protocols/tls/parser.d.ts +0 -53
- package/dist_ts/protocols/tls/parser.js +0 -294
- package/dist_ts/protocols/tls/types.d.ts +0 -65
- package/dist_ts/protocols/tls/types.js +0 -5
- package/dist_ts/proxies/http-proxy/certificate-manager.d.ts +0 -95
- package/dist_ts/proxies/http-proxy/certificate-manager.js +0 -214
- package/dist_ts/proxies/http-proxy/connection-pool.d.ts +0 -47
- package/dist_ts/proxies/http-proxy/connection-pool.js +0 -195
- package/dist_ts/proxies/http-proxy/context-creator.d.ts +0 -34
- package/dist_ts/proxies/http-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/http-proxy/default-certificates.d.ts +0 -54
- package/dist_ts/proxies/http-proxy/default-certificates.js +0 -127
- package/dist_ts/proxies/http-proxy/function-cache.d.ts +0 -95
- package/dist_ts/proxies/http-proxy/function-cache.js +0 -215
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +0 -4
- package/dist_ts/proxies/http-proxy/handlers/index.js +0 -6
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +0 -18
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +0 -78
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +0 -19
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +0 -211
- package/dist_ts/proxies/http-proxy/http-proxy.d.ts +0 -117
- package/dist_ts/proxies/http-proxy/http-proxy.js +0 -521
- package/dist_ts/proxies/http-proxy/http-request-handler.d.ts +0 -40
- package/dist_ts/proxies/http-proxy/http-request-handler.js +0 -257
- package/dist_ts/proxies/http-proxy/http2-request-handler.d.ts +0 -24
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/http-proxy/index.d.ts +0 -14
- package/dist_ts/proxies/http-proxy/index.js +0 -16
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +0 -117
- package/dist_ts/proxies/http-proxy/models/http-types.js +0 -92
- package/dist_ts/proxies/http-proxy/models/index.d.ts +0 -5
- package/dist_ts/proxies/http-proxy/models/index.js +0 -6
- package/dist_ts/proxies/http-proxy/models/types.d.ts +0 -75
- package/dist_ts/proxies/http-proxy/models/types.js +0 -35
- package/dist_ts/proxies/http-proxy/request-handler.d.ts +0 -97
- package/dist_ts/proxies/http-proxy/request-handler.js +0 -737
- package/dist_ts/proxies/http-proxy/security-manager.d.ts +0 -98
- package/dist_ts/proxies/http-proxy/security-manager.js +0 -341
- package/dist_ts/proxies/http-proxy/websocket-handler.d.ts +0 -50
- package/dist_ts/proxies/http-proxy/websocket-handler.js +0 -505
- package/dist_ts/proxies/smart-proxy/acme-state-manager.d.ts +0 -42
- package/dist_ts/proxies/smart-proxy/acme-state-manager.js +0 -101
- package/dist_ts/proxies/smart-proxy/cert-store.d.ts +0 -10
- package/dist_ts/proxies/smart-proxy/cert-store.js +0 -72
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +0 -164
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +0 -745
- package/dist_ts/proxies/smart-proxy/connection-manager.d.ts +0 -128
- package/dist_ts/proxies/smart-proxy/connection-manager.js +0 -689
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +0 -43
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +0 -180
- package/dist_ts/proxies/smart-proxy/metrics-collector.d.ts +0 -98
- package/dist_ts/proxies/smart-proxy/metrics-collector.js +0 -355
- package/dist_ts/proxies/smart-proxy/nftables-manager.d.ts +0 -82
- package/dist_ts/proxies/smart-proxy/nftables-manager.js +0 -237
- package/dist_ts/proxies/smart-proxy/port-manager.d.ts +0 -117
- package/dist_ts/proxies/smart-proxy/port-manager.js +0 -318
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +0 -60
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +0 -1407
- package/dist_ts/proxies/smart-proxy/route-manager.d.ts +0 -112
- package/dist_ts/proxies/smart-proxy/route-manager.js +0 -453
- package/dist_ts/proxies/smart-proxy/route-orchestrator.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/route-orchestrator.js +0 -204
- package/dist_ts/proxies/smart-proxy/rust-binary-locator.d.ts +0 -23
- package/dist_ts/proxies/smart-proxy/rust-binary-locator.js +0 -104
- package/dist_ts/proxies/smart-proxy/security-manager.d.ts +0 -74
- package/dist_ts/proxies/smart-proxy/security-manager.js +0 -227
- package/dist_ts/proxies/smart-proxy/throughput-tracker.d.ts +0 -36
- package/dist_ts/proxies/smart-proxy/throughput-tracker.js +0 -115
- package/dist_ts/proxies/smart-proxy/timeout-manager.d.ts +0 -48
- package/dist_ts/proxies/smart-proxy/timeout-manager.js +0 -158
- package/dist_ts/proxies/smart-proxy/tls-manager.d.ts +0 -50
- package/dist_ts/proxies/smart-proxy/tls-manager.js +0 -110
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +0 -161
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +0 -282
- package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +0 -73
- package/dist_ts/proxies/smart-proxy/utils/route-validators.js +0 -259
- package/dist_ts/routing/router/proxy-router.d.ts +0 -115
- package/dist_ts/routing/router/proxy-router.js +0 -325
- package/dist_ts/routing/router/route-router.d.ts +0 -108
- package/dist_ts/routing/router/route-router.js +0 -393
- package/dist_ts/tls/alerts/index.d.ts +0 -4
- package/dist_ts/tls/alerts/index.js +0 -5
- package/dist_ts/tls/alerts/tls-alert.d.ts +0 -150
- package/dist_ts/tls/alerts/tls-alert.js +0 -226
- package/dist_ts/tls/sni/client-hello-parser.d.ts +0 -100
- package/dist_ts/tls/sni/client-hello-parser.js +0 -464
- package/dist_ts/tls/sni/sni-extraction.d.ts +0 -58
- package/dist_ts/tls/sni/sni-extraction.js +0 -275
- package/dist_ts/tls/utils/index.d.ts +0 -4
- package/dist_ts/tls/utils/index.js +0 -5
- package/dist_ts/tls/utils/tls-utils.d.ts +0 -49
- package/dist_ts/tls/utils/tls-utils.js +0 -75
- package/ts/proxies/smart-proxy/rust-binary-locator.ts +0 -112
|
@@ -1,1407 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import { logger } from '../../core/utils/logger.js';
|
|
3
|
-
import { connectionLogDeduplicator } from '../../core/utils/log-deduplicator.js';
|
|
4
|
-
import { cleanupSocket, setupSocketHandlers, createSocketWithErrorHandler, setupBidirectionalForwarding } from '../../core/utils/socket-utils.js';
|
|
5
|
-
import { WrappedSocket } from '../../core/models/wrapped-socket.js';
|
|
6
|
-
import { getUnderlyingSocket } from '../../core/models/socket-types.js';
|
|
7
|
-
import { ProxyProtocolParser } from '../../core/utils/proxy-protocol.js';
|
|
8
|
-
import { ProtocolDetector } from '../../detection/index.js';
|
|
9
|
-
/**
|
|
10
|
-
* Handles new connection processing and setup logic with support for route-based configuration
|
|
11
|
-
*/
|
|
12
|
-
export class RouteConnectionHandler {
|
|
13
|
-
constructor(smartProxy) {
|
|
14
|
-
this.smartProxy = smartProxy;
|
|
15
|
-
// Note: Route context caching was considered but not implemented
|
|
16
|
-
// as route contexts are lightweight and should be created fresh
|
|
17
|
-
// for each connection to ensure accurate context data
|
|
18
|
-
// RxJS Subject for new connections
|
|
19
|
-
this.newConnectionSubject = new plugins.smartrx.rxjs.Subject();
|
|
20
|
-
}
|
|
21
|
-
/**
|
|
22
|
-
* Create a route context object for port and host mapping functions
|
|
23
|
-
*/
|
|
24
|
-
createRouteContext(options) {
|
|
25
|
-
return {
|
|
26
|
-
// Connection information
|
|
27
|
-
port: options.port,
|
|
28
|
-
domain: options.domain,
|
|
29
|
-
clientIp: options.clientIp,
|
|
30
|
-
serverIp: options.serverIp,
|
|
31
|
-
path: options.path,
|
|
32
|
-
query: options.query,
|
|
33
|
-
headers: options.headers,
|
|
34
|
-
// TLS information
|
|
35
|
-
isTls: options.isTls,
|
|
36
|
-
tlsVersion: options.tlsVersion,
|
|
37
|
-
// Route information
|
|
38
|
-
routeName: options.routeName,
|
|
39
|
-
routeId: options.routeId,
|
|
40
|
-
// Additional properties
|
|
41
|
-
timestamp: Date.now(),
|
|
42
|
-
connectionId: options.connectionId,
|
|
43
|
-
};
|
|
44
|
-
}
|
|
45
|
-
/**
|
|
46
|
-
* Determines if SNI is required for routing decisions on this port.
|
|
47
|
-
*
|
|
48
|
-
* SNI is REQUIRED when:
|
|
49
|
-
* - Multiple routes exist on this port (need SNI to pick correct route)
|
|
50
|
-
* - Route has dynamic target function (needs ctx.domain)
|
|
51
|
-
* - Route has specific domain restriction (strict validation)
|
|
52
|
-
*
|
|
53
|
-
* SNI is NOT required when:
|
|
54
|
-
* - TLS termination mode (HttpProxy handles session resumption)
|
|
55
|
-
* - Single route with static target and no domain restriction (or wildcard)
|
|
56
|
-
*/
|
|
57
|
-
calculateSniRequirement(port) {
|
|
58
|
-
const routesOnPort = this.smartProxy.routeManager.getRoutesForPort(port);
|
|
59
|
-
// No routes = no SNI requirement (will fail routing anyway)
|
|
60
|
-
if (routesOnPort.length === 0)
|
|
61
|
-
return false;
|
|
62
|
-
// Check if any route terminates TLS - if so, SNI not required
|
|
63
|
-
// (HttpProxy handles session resumption internally)
|
|
64
|
-
const hasTermination = routesOnPort.some(route => route.action.tls?.mode === 'terminate' ||
|
|
65
|
-
route.action.tls?.mode === 'terminate-and-reencrypt');
|
|
66
|
-
if (hasTermination)
|
|
67
|
-
return false;
|
|
68
|
-
// Multiple routes = need SNI to pick the correct route
|
|
69
|
-
if (routesOnPort.length > 1)
|
|
70
|
-
return true;
|
|
71
|
-
// Single route - check if it needs SNI for validation or routing
|
|
72
|
-
const route = routesOnPort[0];
|
|
73
|
-
// Dynamic host selection requires SNI (function receives ctx.domain)
|
|
74
|
-
const hasDynamicTarget = route.action.targets?.some(t => typeof t.host === 'function');
|
|
75
|
-
if (hasDynamicTarget)
|
|
76
|
-
return true;
|
|
77
|
-
// Specific domain restriction requires SNI for strict validation
|
|
78
|
-
const hasSpecificDomain = route.match.domains && !this.isWildcardOnly(route.match.domains);
|
|
79
|
-
if (hasSpecificDomain)
|
|
80
|
-
return true;
|
|
81
|
-
// Single route, static target(s), no domain restriction = SNI not required
|
|
82
|
-
return false;
|
|
83
|
-
}
|
|
84
|
-
/**
|
|
85
|
-
* Check if domains config is wildcard-only (matches everything)
|
|
86
|
-
*/
|
|
87
|
-
isWildcardOnly(domains) {
|
|
88
|
-
const domainList = Array.isArray(domains) ? domains : [domains];
|
|
89
|
-
return domainList.length === 1 && domainList[0] === '*';
|
|
90
|
-
}
|
|
91
|
-
/**
|
|
92
|
-
* Handle a new incoming connection
|
|
93
|
-
*/
|
|
94
|
-
handleConnection(socket) {
|
|
95
|
-
const remoteIP = socket.remoteAddress || '';
|
|
96
|
-
const localPort = socket.localPort || 0;
|
|
97
|
-
// Always wrap the socket to prepare for potential PROXY protocol
|
|
98
|
-
const wrappedSocket = new WrappedSocket(socket);
|
|
99
|
-
// If this is from a trusted proxy, log it
|
|
100
|
-
if (this.smartProxy.settings.proxyIPs?.includes(remoteIP)) {
|
|
101
|
-
logger.log('debug', `Connection from trusted proxy ${remoteIP}, PROXY protocol parsing will be enabled`, {
|
|
102
|
-
remoteIP,
|
|
103
|
-
component: 'route-handler'
|
|
104
|
-
});
|
|
105
|
-
}
|
|
106
|
-
// Generate connection ID first for atomic IP validation and tracking
|
|
107
|
-
const connectionId = this.smartProxy.connectionManager.generateConnectionId();
|
|
108
|
-
const clientIP = wrappedSocket.remoteAddress || '';
|
|
109
|
-
// Atomically validate IP and track the connection to prevent race conditions
|
|
110
|
-
// This ensures concurrent connections from the same IP are properly limited
|
|
111
|
-
const ipValidation = this.smartProxy.securityManager.validateAndTrackIP(clientIP, connectionId);
|
|
112
|
-
if (!ipValidation.allowed) {
|
|
113
|
-
connectionLogDeduplicator.log('ip-rejected', 'warn', `Connection rejected from ${clientIP}`, { remoteIP: clientIP, reason: ipValidation.reason, component: 'route-handler' }, clientIP);
|
|
114
|
-
cleanupSocket(wrappedSocket.socket, `rejected-${ipValidation.reason}`, { immediate: true });
|
|
115
|
-
return;
|
|
116
|
-
}
|
|
117
|
-
// Create a new connection record with the wrapped socket
|
|
118
|
-
// Skip IP tracking since we already did it atomically above
|
|
119
|
-
const record = this.smartProxy.connectionManager.createConnection(wrappedSocket, {
|
|
120
|
-
connectionId,
|
|
121
|
-
skipIpTracking: true
|
|
122
|
-
});
|
|
123
|
-
if (!record) {
|
|
124
|
-
// Connection was rejected due to global limit - clean up the IP tracking we did
|
|
125
|
-
this.smartProxy.securityManager.removeConnectionByIP(clientIP, connectionId);
|
|
126
|
-
return;
|
|
127
|
-
}
|
|
128
|
-
// Emit new connection event
|
|
129
|
-
this.newConnectionSubject.next(record);
|
|
130
|
-
// Note: connectionId was already generated above for atomic IP tracking
|
|
131
|
-
// Apply socket optimizations (apply to underlying socket)
|
|
132
|
-
const underlyingSocket = wrappedSocket.socket;
|
|
133
|
-
underlyingSocket.setNoDelay(this.smartProxy.settings.noDelay);
|
|
134
|
-
// Apply keep-alive settings if enabled
|
|
135
|
-
if (this.smartProxy.settings.keepAlive) {
|
|
136
|
-
underlyingSocket.setKeepAlive(true, this.smartProxy.settings.keepAliveInitialDelay);
|
|
137
|
-
record.hasKeepAlive = true;
|
|
138
|
-
// Apply enhanced TCP keep-alive options if enabled
|
|
139
|
-
if (this.smartProxy.settings.enableKeepAliveProbes) {
|
|
140
|
-
try {
|
|
141
|
-
// These are platform-specific and may not be available
|
|
142
|
-
if ('setKeepAliveProbes' in underlyingSocket) {
|
|
143
|
-
underlyingSocket.setKeepAliveProbes(10);
|
|
144
|
-
}
|
|
145
|
-
if ('setKeepAliveInterval' in underlyingSocket) {
|
|
146
|
-
underlyingSocket.setKeepAliveInterval(1000);
|
|
147
|
-
}
|
|
148
|
-
}
|
|
149
|
-
catch (err) {
|
|
150
|
-
// Ignore errors - these are optional enhancements
|
|
151
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
152
|
-
logger.log('warn', `Enhanced TCP keep-alive settings not supported`, { connectionId, error: err, component: 'route-handler' });
|
|
153
|
-
}
|
|
154
|
-
}
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
158
|
-
logger.log('info', `New connection from ${remoteIP} on port ${localPort}. ` +
|
|
159
|
-
`Keep-Alive: ${record.hasKeepAlive ? 'Enabled' : 'Disabled'}. ` +
|
|
160
|
-
`Active connections: ${this.smartProxy.connectionManager.getConnectionCount()}`, {
|
|
161
|
-
connectionId,
|
|
162
|
-
remoteIP,
|
|
163
|
-
localPort,
|
|
164
|
-
keepAlive: record.hasKeepAlive ? 'Enabled' : 'Disabled',
|
|
165
|
-
activeConnections: this.smartProxy.connectionManager.getConnectionCount(),
|
|
166
|
-
component: 'route-handler'
|
|
167
|
-
});
|
|
168
|
-
}
|
|
169
|
-
else {
|
|
170
|
-
logger.log('info', `New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.smartProxy.connectionManager.getConnectionCount()}`, {
|
|
171
|
-
remoteIP,
|
|
172
|
-
localPort,
|
|
173
|
-
activeConnections: this.smartProxy.connectionManager.getConnectionCount(),
|
|
174
|
-
component: 'route-handler'
|
|
175
|
-
});
|
|
176
|
-
}
|
|
177
|
-
// Handle the connection - wait for initial data to determine if it's TLS
|
|
178
|
-
this.handleInitialData(wrappedSocket, record);
|
|
179
|
-
}
|
|
180
|
-
/**
|
|
181
|
-
* Handle initial data from a connection to determine routing
|
|
182
|
-
*/
|
|
183
|
-
handleInitialData(socket, record) {
|
|
184
|
-
const connectionId = record.id;
|
|
185
|
-
const localPort = record.localPort;
|
|
186
|
-
let initialDataReceived = false;
|
|
187
|
-
// Check if any routes on this port require TLS handling
|
|
188
|
-
const allRoutes = this.smartProxy.routeManager.getRoutes();
|
|
189
|
-
const needsTlsHandling = allRoutes.some(route => {
|
|
190
|
-
// Check if route matches this port
|
|
191
|
-
const matchesPort = this.smartProxy.routeManager.getRoutesForPort(localPort).includes(route);
|
|
192
|
-
return matchesPort &&
|
|
193
|
-
route.action.type === 'forward' &&
|
|
194
|
-
route.action.tls &&
|
|
195
|
-
(route.action.tls.mode === 'terminate' ||
|
|
196
|
-
route.action.tls.mode === 'passthrough');
|
|
197
|
-
});
|
|
198
|
-
// Smart SNI requirement calculation
|
|
199
|
-
// Determines if we need SNI for routing decisions on this port
|
|
200
|
-
const needsSniForRouting = this.calculateSniRequirement(localPort);
|
|
201
|
-
const allowSessionTicket = !needsSniForRouting;
|
|
202
|
-
// If no routes require TLS handling and it's not port 443, route immediately
|
|
203
|
-
if (!needsTlsHandling && localPort !== 443) {
|
|
204
|
-
// Extract underlying socket for socket-utils functions
|
|
205
|
-
const underlyingSocket = getUnderlyingSocket(socket);
|
|
206
|
-
// Set up proper socket handlers for immediate routing
|
|
207
|
-
setupSocketHandlers(underlyingSocket, (reason) => {
|
|
208
|
-
// Always cleanup when incoming socket closes
|
|
209
|
-
// This prevents connection accumulation in proxy chains
|
|
210
|
-
logger.log('debug', `Connection ${connectionId} closed during immediate routing: ${reason}`, {
|
|
211
|
-
connectionId,
|
|
212
|
-
remoteIP: record.remoteIP,
|
|
213
|
-
reason,
|
|
214
|
-
hasOutgoing: !!record.outgoing,
|
|
215
|
-
outgoingState: record.outgoing?.readyState,
|
|
216
|
-
component: 'route-handler'
|
|
217
|
-
});
|
|
218
|
-
// If there's a pending or established outgoing connection, destroy it
|
|
219
|
-
if (record.outgoing && !record.outgoing.destroyed) {
|
|
220
|
-
logger.log('debug', `Destroying outgoing connection for ${connectionId}`, {
|
|
221
|
-
connectionId,
|
|
222
|
-
outgoingState: record.outgoing.readyState,
|
|
223
|
-
component: 'route-handler'
|
|
224
|
-
});
|
|
225
|
-
record.outgoing.destroy();
|
|
226
|
-
}
|
|
227
|
-
// Always cleanup the connection record
|
|
228
|
-
this.smartProxy.connectionManager.cleanupConnection(record, reason);
|
|
229
|
-
}, undefined, // Use default timeout handler
|
|
230
|
-
'immediate-route-client');
|
|
231
|
-
// Route immediately for non-TLS connections
|
|
232
|
-
this.routeConnection(socket, record, '', undefined);
|
|
233
|
-
return;
|
|
234
|
-
}
|
|
235
|
-
// Otherwise, wait for initial data to check if it's TLS
|
|
236
|
-
// Set an initial timeout for handshake data
|
|
237
|
-
let initialTimeout = setTimeout(() => {
|
|
238
|
-
if (!initialDataReceived) {
|
|
239
|
-
logger.log('warn', `No initial data received from ${record.remoteIP} after ${this.smartProxy.settings.initialDataTimeout}ms for connection ${connectionId}`, {
|
|
240
|
-
connectionId,
|
|
241
|
-
timeout: this.smartProxy.settings.initialDataTimeout,
|
|
242
|
-
remoteIP: record.remoteIP,
|
|
243
|
-
component: 'route-handler'
|
|
244
|
-
});
|
|
245
|
-
// Add a grace period
|
|
246
|
-
setTimeout(() => {
|
|
247
|
-
if (!initialDataReceived) {
|
|
248
|
-
logger.log('warn', `Final initial data timeout after grace period for connection ${connectionId}`, {
|
|
249
|
-
connectionId,
|
|
250
|
-
component: 'route-handler'
|
|
251
|
-
});
|
|
252
|
-
if (record.incomingTerminationReason === null) {
|
|
253
|
-
record.incomingTerminationReason = 'initial_timeout';
|
|
254
|
-
this.smartProxy.connectionManager.incrementTerminationStat('incoming', 'initial_timeout');
|
|
255
|
-
}
|
|
256
|
-
socket.end();
|
|
257
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'initial_timeout');
|
|
258
|
-
}
|
|
259
|
-
}, 30000);
|
|
260
|
-
}
|
|
261
|
-
}, this.smartProxy.settings.initialDataTimeout);
|
|
262
|
-
// Make sure timeout doesn't keep the process alive
|
|
263
|
-
if (initialTimeout.unref) {
|
|
264
|
-
initialTimeout.unref();
|
|
265
|
-
}
|
|
266
|
-
// Set up error handler
|
|
267
|
-
socket.on('error', this.smartProxy.connectionManager.handleError('incoming', record));
|
|
268
|
-
// Add close/end handlers to catch immediate disconnections
|
|
269
|
-
socket.once('close', () => {
|
|
270
|
-
if (!initialDataReceived) {
|
|
271
|
-
logger.log('warn', `Connection ${connectionId} closed before sending initial data`, {
|
|
272
|
-
connectionId,
|
|
273
|
-
remoteIP: record.remoteIP,
|
|
274
|
-
component: 'route-handler'
|
|
275
|
-
});
|
|
276
|
-
if (initialTimeout) {
|
|
277
|
-
clearTimeout(initialTimeout);
|
|
278
|
-
initialTimeout = null;
|
|
279
|
-
}
|
|
280
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'closed_before_data');
|
|
281
|
-
}
|
|
282
|
-
});
|
|
283
|
-
socket.once('end', () => {
|
|
284
|
-
if (!initialDataReceived) {
|
|
285
|
-
logger.log('debug', `Connection ${connectionId} ended before sending initial data`, {
|
|
286
|
-
connectionId,
|
|
287
|
-
remoteIP: record.remoteIP,
|
|
288
|
-
component: 'route-handler'
|
|
289
|
-
});
|
|
290
|
-
if (initialTimeout) {
|
|
291
|
-
clearTimeout(initialTimeout);
|
|
292
|
-
initialTimeout = null;
|
|
293
|
-
}
|
|
294
|
-
// Don't cleanup on 'end' - wait for 'close'
|
|
295
|
-
}
|
|
296
|
-
});
|
|
297
|
-
// Handler for processing initial data (after potential PROXY protocol)
|
|
298
|
-
const processInitialData = async (chunk) => {
|
|
299
|
-
// Create connection context for protocol detection
|
|
300
|
-
const context = ProtocolDetector.createConnectionContext({
|
|
301
|
-
sourceIp: record.remoteIP,
|
|
302
|
-
sourcePort: socket.remotePort || 0,
|
|
303
|
-
destIp: socket.localAddress || '',
|
|
304
|
-
destPort: socket.localPort || 0,
|
|
305
|
-
socketId: record.id
|
|
306
|
-
});
|
|
307
|
-
const detectionResult = await ProtocolDetector.detectWithContext(chunk, context, { extractFullHeaders: false } // Only extract essential info for routing
|
|
308
|
-
);
|
|
309
|
-
// Block non-TLS connections on port 443
|
|
310
|
-
if (localPort === 443 && detectionResult.protocol !== 'tls') {
|
|
311
|
-
logger.log('warn', `Non-TLS connection ${record.id} detected on port 443. Terminating connection - only TLS traffic is allowed on standard HTTPS port.`, {
|
|
312
|
-
connectionId: record.id,
|
|
313
|
-
detectedProtocol: detectionResult.protocol,
|
|
314
|
-
message: 'Terminating connection - only TLS traffic is allowed on standard HTTPS port.',
|
|
315
|
-
component: 'route-handler'
|
|
316
|
-
});
|
|
317
|
-
if (record.incomingTerminationReason === null) {
|
|
318
|
-
record.incomingTerminationReason = 'non_tls_blocked';
|
|
319
|
-
this.smartProxy.connectionManager.incrementTerminationStat('incoming', 'non_tls_blocked');
|
|
320
|
-
}
|
|
321
|
-
socket.end();
|
|
322
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'non_tls_blocked');
|
|
323
|
-
return;
|
|
324
|
-
}
|
|
325
|
-
// Extract domain and protocol info
|
|
326
|
-
let serverName = '';
|
|
327
|
-
if (detectionResult.protocol === 'tls') {
|
|
328
|
-
record.isTLS = true;
|
|
329
|
-
serverName = detectionResult.connectionInfo.domain || '';
|
|
330
|
-
// Lock the connection to the negotiated SNI
|
|
331
|
-
record.lockedDomain = serverName;
|
|
332
|
-
// Check if we should reject connections without SNI
|
|
333
|
-
if (!serverName && allowSessionTicket === false) {
|
|
334
|
-
logger.log('warn', `No SNI detected in TLS ClientHello for connection ${record.id}; sending TLS alert`, {
|
|
335
|
-
connectionId: record.id,
|
|
336
|
-
component: 'route-handler'
|
|
337
|
-
});
|
|
338
|
-
if (record.incomingTerminationReason === null) {
|
|
339
|
-
record.incomingTerminationReason = 'session_ticket_blocked_no_sni';
|
|
340
|
-
this.smartProxy.connectionManager.incrementTerminationStat('incoming', 'session_ticket_blocked_no_sni');
|
|
341
|
-
}
|
|
342
|
-
const alert = Buffer.from([0x15, 0x03, 0x03, 0x00, 0x02, 0x01, 0x70]);
|
|
343
|
-
try {
|
|
344
|
-
// Count the alert bytes being sent
|
|
345
|
-
record.bytesSent += alert.length;
|
|
346
|
-
if (this.smartProxy.metricsCollector) {
|
|
347
|
-
this.smartProxy.metricsCollector.recordBytes(record.id, 0, alert.length);
|
|
348
|
-
}
|
|
349
|
-
socket.cork();
|
|
350
|
-
socket.write(alert);
|
|
351
|
-
socket.uncork();
|
|
352
|
-
socket.end();
|
|
353
|
-
}
|
|
354
|
-
catch {
|
|
355
|
-
socket.end();
|
|
356
|
-
}
|
|
357
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'session_ticket_blocked_no_sni');
|
|
358
|
-
return;
|
|
359
|
-
}
|
|
360
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
361
|
-
logger.log('info', `TLS connection with SNI`, {
|
|
362
|
-
connectionId: record.id,
|
|
363
|
-
serverName: serverName || '(empty)',
|
|
364
|
-
component: 'route-handler'
|
|
365
|
-
});
|
|
366
|
-
}
|
|
367
|
-
}
|
|
368
|
-
else if (detectionResult.protocol === 'http') {
|
|
369
|
-
// For HTTP, extract domain from Host header
|
|
370
|
-
serverName = detectionResult.connectionInfo.domain || '';
|
|
371
|
-
// Store HTTP-specific info for later use
|
|
372
|
-
record.httpInfo = {
|
|
373
|
-
method: detectionResult.connectionInfo.method,
|
|
374
|
-
path: detectionResult.connectionInfo.path,
|
|
375
|
-
headers: detectionResult.connectionInfo.headers
|
|
376
|
-
};
|
|
377
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
378
|
-
logger.log('info', `HTTP connection detected`, {
|
|
379
|
-
connectionId: record.id,
|
|
380
|
-
domain: serverName || '(no host header)',
|
|
381
|
-
method: detectionResult.connectionInfo.method,
|
|
382
|
-
path: detectionResult.connectionInfo.path,
|
|
383
|
-
component: 'route-handler'
|
|
384
|
-
});
|
|
385
|
-
}
|
|
386
|
-
}
|
|
387
|
-
// Find the appropriate route for this connection
|
|
388
|
-
this.routeConnection(socket, record, serverName, chunk, detectionResult);
|
|
389
|
-
};
|
|
390
|
-
// First data handler to capture initial TLS handshake or PROXY protocol
|
|
391
|
-
socket.once('data', async (chunk) => {
|
|
392
|
-
// Clear the initial timeout since we've received data
|
|
393
|
-
if (initialTimeout) {
|
|
394
|
-
clearTimeout(initialTimeout);
|
|
395
|
-
initialTimeout = null;
|
|
396
|
-
}
|
|
397
|
-
initialDataReceived = true;
|
|
398
|
-
record.hasReceivedInitialData = true;
|
|
399
|
-
// Check if this is from a trusted proxy and might have PROXY protocol
|
|
400
|
-
if (this.smartProxy.settings.proxyIPs?.includes(socket.remoteAddress || '') && this.smartProxy.settings.acceptProxyProtocol !== false) {
|
|
401
|
-
// Check if this starts with PROXY protocol
|
|
402
|
-
if (chunk.toString('ascii', 0, Math.min(6, chunk.length)).startsWith('PROXY ')) {
|
|
403
|
-
try {
|
|
404
|
-
const parseResult = ProxyProtocolParser.parse(chunk);
|
|
405
|
-
if (parseResult.proxyInfo) {
|
|
406
|
-
// Update the wrapped socket with real client info (if it's a WrappedSocket)
|
|
407
|
-
if (socket instanceof WrappedSocket) {
|
|
408
|
-
socket.setProxyInfo(parseResult.proxyInfo.sourceIP, parseResult.proxyInfo.sourcePort);
|
|
409
|
-
}
|
|
410
|
-
// Update connection record with real client info
|
|
411
|
-
record.remoteIP = parseResult.proxyInfo.sourceIP;
|
|
412
|
-
record.remotePort = parseResult.proxyInfo.sourcePort;
|
|
413
|
-
logger.log('info', `PROXY protocol parsed successfully`, {
|
|
414
|
-
connectionId,
|
|
415
|
-
realClientIP: parseResult.proxyInfo.sourceIP,
|
|
416
|
-
realClientPort: parseResult.proxyInfo.sourcePort,
|
|
417
|
-
proxyIP: socket.remoteAddress,
|
|
418
|
-
component: 'route-handler'
|
|
419
|
-
});
|
|
420
|
-
// Process remaining data if any
|
|
421
|
-
if (parseResult.remainingData.length > 0) {
|
|
422
|
-
processInitialData(parseResult.remainingData);
|
|
423
|
-
}
|
|
424
|
-
else {
|
|
425
|
-
// Wait for more data
|
|
426
|
-
socket.once('data', processInitialData);
|
|
427
|
-
}
|
|
428
|
-
return;
|
|
429
|
-
}
|
|
430
|
-
}
|
|
431
|
-
catch (error) {
|
|
432
|
-
logger.log('error', `Failed to parse PROXY protocol from trusted proxy`, {
|
|
433
|
-
connectionId,
|
|
434
|
-
error: error.message,
|
|
435
|
-
proxyIP: socket.remoteAddress,
|
|
436
|
-
component: 'route-handler'
|
|
437
|
-
});
|
|
438
|
-
// Continue processing as normal data
|
|
439
|
-
}
|
|
440
|
-
}
|
|
441
|
-
}
|
|
442
|
-
// Process as normal data (no PROXY protocol)
|
|
443
|
-
processInitialData(chunk);
|
|
444
|
-
});
|
|
445
|
-
}
|
|
446
|
-
/**
|
|
447
|
-
* Route the connection based on match criteria
|
|
448
|
-
*/
|
|
449
|
-
routeConnection(socket, record, serverName, initialChunk, detectionResult // Using any temporarily to avoid circular dependency issues
|
|
450
|
-
) {
|
|
451
|
-
const connectionId = record.id;
|
|
452
|
-
const localPort = record.localPort;
|
|
453
|
-
const remoteIP = record.remoteIP;
|
|
454
|
-
// Check if this is an HTTP proxy port
|
|
455
|
-
const isHttpProxyPort = this.smartProxy.settings.useHttpProxy?.includes(localPort);
|
|
456
|
-
// For HTTP proxy ports without TLS, skip domain check since domain info comes from HTTP headers
|
|
457
|
-
const skipDomainCheck = isHttpProxyPort && !record.isTLS;
|
|
458
|
-
// Create route context for matching
|
|
459
|
-
const routeContext = {
|
|
460
|
-
port: localPort,
|
|
461
|
-
domain: skipDomainCheck ? undefined : serverName, // Skip domain if HTTP proxy without TLS
|
|
462
|
-
clientIp: remoteIP,
|
|
463
|
-
serverIp: socket.localAddress || '',
|
|
464
|
-
path: undefined, // We don't have path info at this point
|
|
465
|
-
isTls: record.isTLS,
|
|
466
|
-
tlsVersion: undefined, // We don't extract TLS version yet
|
|
467
|
-
timestamp: Date.now(),
|
|
468
|
-
connectionId: record.id
|
|
469
|
-
};
|
|
470
|
-
// Find matching route
|
|
471
|
-
const routeMatch = this.smartProxy.routeManager.findMatchingRoute(routeContext);
|
|
472
|
-
if (!routeMatch) {
|
|
473
|
-
logger.log('warn', `No route found for ${serverName || 'connection'} on port ${localPort} (connection: ${connectionId})`, {
|
|
474
|
-
connectionId,
|
|
475
|
-
serverName: serverName || 'connection',
|
|
476
|
-
localPort,
|
|
477
|
-
component: 'route-handler'
|
|
478
|
-
});
|
|
479
|
-
// No matching route, use default/fallback handling
|
|
480
|
-
logger.log('info', `Using default route handling for connection ${connectionId}`, {
|
|
481
|
-
connectionId,
|
|
482
|
-
component: 'route-handler'
|
|
483
|
-
});
|
|
484
|
-
// Check default security settings
|
|
485
|
-
const defaultSecuritySettings = this.smartProxy.settings.defaults?.security;
|
|
486
|
-
if (defaultSecuritySettings) {
|
|
487
|
-
if (defaultSecuritySettings.ipAllowList && defaultSecuritySettings.ipAllowList.length > 0) {
|
|
488
|
-
const isAllowed = this.smartProxy.securityManager.isIPAuthorized(remoteIP, defaultSecuritySettings.ipAllowList, defaultSecuritySettings.ipBlockList || []);
|
|
489
|
-
if (!isAllowed) {
|
|
490
|
-
logger.log('warn', `IP ${remoteIP} not in default allowed list for connection ${connectionId}`, {
|
|
491
|
-
connectionId,
|
|
492
|
-
remoteIP,
|
|
493
|
-
component: 'route-handler'
|
|
494
|
-
});
|
|
495
|
-
socket.end();
|
|
496
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'ip_blocked');
|
|
497
|
-
return;
|
|
498
|
-
}
|
|
499
|
-
}
|
|
500
|
-
}
|
|
501
|
-
// Setup direct connection with default settings
|
|
502
|
-
if (this.smartProxy.settings.defaults?.target) {
|
|
503
|
-
// Use defaults from configuration
|
|
504
|
-
const targetHost = this.smartProxy.settings.defaults.target.host;
|
|
505
|
-
const targetPort = this.smartProxy.settings.defaults.target.port;
|
|
506
|
-
return this.setupDirectConnection(socket, record, serverName, initialChunk, undefined, targetHost, targetPort);
|
|
507
|
-
}
|
|
508
|
-
else {
|
|
509
|
-
// No default target available, terminate the connection
|
|
510
|
-
logger.log('warn', `No default target configured for connection ${connectionId}. Closing connection`, {
|
|
511
|
-
connectionId,
|
|
512
|
-
component: 'route-handler'
|
|
513
|
-
});
|
|
514
|
-
socket.end();
|
|
515
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'no_default_target');
|
|
516
|
-
return;
|
|
517
|
-
}
|
|
518
|
-
}
|
|
519
|
-
// A matching route was found
|
|
520
|
-
const route = routeMatch.route;
|
|
521
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
522
|
-
logger.log('info', `Route matched`, {
|
|
523
|
-
connectionId,
|
|
524
|
-
routeName: route.name || 'unnamed',
|
|
525
|
-
serverName: serverName || 'connection',
|
|
526
|
-
localPort,
|
|
527
|
-
component: 'route-handler'
|
|
528
|
-
});
|
|
529
|
-
}
|
|
530
|
-
// Apply route-specific security checks
|
|
531
|
-
if (route.security) {
|
|
532
|
-
// Check IP allow/block lists
|
|
533
|
-
if (route.security.ipAllowList || route.security.ipBlockList) {
|
|
534
|
-
const isIPAllowed = this.smartProxy.securityManager.isIPAuthorized(remoteIP, route.security.ipAllowList || [], route.security.ipBlockList || []);
|
|
535
|
-
if (!isIPAllowed) {
|
|
536
|
-
// Deduplicated logging for route IP blocks
|
|
537
|
-
connectionLogDeduplicator.log('ip-rejected', 'warn', `IP blocked by route security`, {
|
|
538
|
-
connectionId,
|
|
539
|
-
remoteIP,
|
|
540
|
-
routeName: route.name || 'unnamed',
|
|
541
|
-
reason: 'route-ip-blocked',
|
|
542
|
-
component: 'route-handler'
|
|
543
|
-
}, remoteIP);
|
|
544
|
-
socket.end();
|
|
545
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'route_ip_blocked');
|
|
546
|
-
return;
|
|
547
|
-
}
|
|
548
|
-
}
|
|
549
|
-
// Check max connections per route
|
|
550
|
-
if (route.security.maxConnections !== undefined) {
|
|
551
|
-
const routeId = route.id || route.name || 'unnamed';
|
|
552
|
-
const currentConnections = this.smartProxy.connectionManager.getConnectionCountByRoute(routeId);
|
|
553
|
-
if (currentConnections >= route.security.maxConnections) {
|
|
554
|
-
// Deduplicated logging for route connection limits
|
|
555
|
-
connectionLogDeduplicator.log('connection-rejected', 'warn', `Route connection limit reached`, {
|
|
556
|
-
connectionId,
|
|
557
|
-
routeName: route.name,
|
|
558
|
-
currentConnections,
|
|
559
|
-
maxConnections: route.security.maxConnections,
|
|
560
|
-
reason: 'route-limit',
|
|
561
|
-
component: 'route-handler'
|
|
562
|
-
}, `route-limit-${route.name}`);
|
|
563
|
-
socket.end();
|
|
564
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'route_connection_limit');
|
|
565
|
-
return;
|
|
566
|
-
}
|
|
567
|
-
}
|
|
568
|
-
// Check authentication requirements
|
|
569
|
-
if (route.security.authentication || route.security.basicAuth || route.security.jwtAuth) {
|
|
570
|
-
// Authentication checks would typically happen at the HTTP layer
|
|
571
|
-
// For non-HTTP connections or passthrough, we can't enforce authentication
|
|
572
|
-
if (route.action.type === 'forward' && route.action.tls?.mode !== 'terminate') {
|
|
573
|
-
logger.log('warn', `Route ${route.name} has authentication configured but it cannot be enforced for non-terminated connections`, {
|
|
574
|
-
connectionId,
|
|
575
|
-
routeName: route.name,
|
|
576
|
-
tlsMode: route.action.tls?.mode || 'none',
|
|
577
|
-
component: 'route-handler'
|
|
578
|
-
});
|
|
579
|
-
}
|
|
580
|
-
}
|
|
581
|
-
}
|
|
582
|
-
// Handle the route based on its action type
|
|
583
|
-
switch (route.action.type) {
|
|
584
|
-
case 'forward':
|
|
585
|
-
return this.handleForwardAction(socket, record, route, initialChunk, detectionResult);
|
|
586
|
-
case 'socket-handler':
|
|
587
|
-
logger.log('info', `Handling socket-handler action for route ${route.name}`, {
|
|
588
|
-
connectionId,
|
|
589
|
-
routeName: route.name,
|
|
590
|
-
component: 'route-handler'
|
|
591
|
-
});
|
|
592
|
-
this.handleSocketHandlerAction(socket, record, route, initialChunk);
|
|
593
|
-
return;
|
|
594
|
-
default:
|
|
595
|
-
logger.log('error', `Unknown action type '${route.action.type}' for connection ${connectionId}`, {
|
|
596
|
-
connectionId,
|
|
597
|
-
actionType: route.action.type,
|
|
598
|
-
component: 'route-handler'
|
|
599
|
-
});
|
|
600
|
-
socket.end();
|
|
601
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'unknown_action');
|
|
602
|
-
}
|
|
603
|
-
}
|
|
604
|
-
/**
|
|
605
|
-
* Select the appropriate target from the targets array based on sub-matching criteria
|
|
606
|
-
*/
|
|
607
|
-
selectTarget(targets, context) {
|
|
608
|
-
// Sort targets by priority (higher first)
|
|
609
|
-
const sortedTargets = [...targets].sort((a, b) => (b.priority || 0) - (a.priority || 0));
|
|
610
|
-
// Find the first matching target
|
|
611
|
-
for (const target of sortedTargets) {
|
|
612
|
-
if (!target.match) {
|
|
613
|
-
// No match criteria means this is a default/fallback target
|
|
614
|
-
return target;
|
|
615
|
-
}
|
|
616
|
-
// Check port match
|
|
617
|
-
if (target.match.ports && !target.match.ports.includes(context.port)) {
|
|
618
|
-
continue;
|
|
619
|
-
}
|
|
620
|
-
// Check path match (supports wildcards)
|
|
621
|
-
if (target.match.path && context.path) {
|
|
622
|
-
const pathPattern = target.match.path.replace(/\*/g, '.*');
|
|
623
|
-
const pathRegex = new RegExp(`^${pathPattern}$`);
|
|
624
|
-
if (!pathRegex.test(context.path)) {
|
|
625
|
-
continue;
|
|
626
|
-
}
|
|
627
|
-
}
|
|
628
|
-
// Check method match
|
|
629
|
-
if (target.match.method && context.method && !target.match.method.includes(context.method)) {
|
|
630
|
-
continue;
|
|
631
|
-
}
|
|
632
|
-
// Check headers match
|
|
633
|
-
if (target.match.headers && context.headers) {
|
|
634
|
-
let headersMatch = true;
|
|
635
|
-
for (const [key, pattern] of Object.entries(target.match.headers)) {
|
|
636
|
-
const headerValue = context.headers[key.toLowerCase()];
|
|
637
|
-
if (!headerValue) {
|
|
638
|
-
headersMatch = false;
|
|
639
|
-
break;
|
|
640
|
-
}
|
|
641
|
-
if (pattern instanceof RegExp) {
|
|
642
|
-
if (!pattern.test(headerValue)) {
|
|
643
|
-
headersMatch = false;
|
|
644
|
-
break;
|
|
645
|
-
}
|
|
646
|
-
}
|
|
647
|
-
else if (headerValue !== pattern) {
|
|
648
|
-
headersMatch = false;
|
|
649
|
-
break;
|
|
650
|
-
}
|
|
651
|
-
}
|
|
652
|
-
if (!headersMatch) {
|
|
653
|
-
continue;
|
|
654
|
-
}
|
|
655
|
-
}
|
|
656
|
-
// All criteria matched
|
|
657
|
-
return target;
|
|
658
|
-
}
|
|
659
|
-
// No matching target found, return the first target without match criteria (default)
|
|
660
|
-
return sortedTargets.find(t => !t.match) || null;
|
|
661
|
-
}
|
|
662
|
-
/**
|
|
663
|
-
* Handle a forward action for a route
|
|
664
|
-
*/
|
|
665
|
-
handleForwardAction(socket, record, route, initialChunk, detectionResult // Using any temporarily to avoid circular dependency issues
|
|
666
|
-
) {
|
|
667
|
-
const connectionId = record.id;
|
|
668
|
-
const action = route.action;
|
|
669
|
-
// Store the route config in the connection record for metrics and other uses
|
|
670
|
-
record.routeConfig = route;
|
|
671
|
-
record.routeId = route.id || route.name || 'unnamed';
|
|
672
|
-
// Track connection by route
|
|
673
|
-
this.smartProxy.connectionManager.trackConnectionByRoute(record.routeId, record.id);
|
|
674
|
-
// Check if this route uses NFTables for forwarding
|
|
675
|
-
if (action.forwardingEngine === 'nftables') {
|
|
676
|
-
// NFTables handles packet forwarding at the kernel level
|
|
677
|
-
// The application should NOT interfere with these connections
|
|
678
|
-
// Log the connection for monitoring purposes
|
|
679
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
680
|
-
logger.log('info', `NFTables forwarding (kernel-level)`, {
|
|
681
|
-
connectionId: record.id,
|
|
682
|
-
source: `${record.remoteIP}:${socket.remotePort}`,
|
|
683
|
-
destination: `${socket.localAddress}:${record.localPort}`,
|
|
684
|
-
routeName: route.name || 'unnamed',
|
|
685
|
-
domain: record.lockedDomain || 'n/a',
|
|
686
|
-
component: 'route-handler'
|
|
687
|
-
});
|
|
688
|
-
}
|
|
689
|
-
else {
|
|
690
|
-
logger.log('info', `NFTables forwarding`, {
|
|
691
|
-
connectionId: record.id,
|
|
692
|
-
remoteIP: record.remoteIP,
|
|
693
|
-
localPort: record.localPort,
|
|
694
|
-
routeName: route.name || 'unnamed',
|
|
695
|
-
component: 'route-handler'
|
|
696
|
-
});
|
|
697
|
-
}
|
|
698
|
-
// Additional NFTables-specific logging if configured
|
|
699
|
-
if (action.nftables) {
|
|
700
|
-
const nftConfig = action.nftables;
|
|
701
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
702
|
-
logger.log('info', `NFTables config`, {
|
|
703
|
-
connectionId: record.id,
|
|
704
|
-
protocol: nftConfig.protocol || 'tcp',
|
|
705
|
-
preserveSourceIP: nftConfig.preserveSourceIP || false,
|
|
706
|
-
priority: nftConfig.priority || 'default',
|
|
707
|
-
maxRate: nftConfig.maxRate || 'unlimited',
|
|
708
|
-
component: 'route-handler'
|
|
709
|
-
});
|
|
710
|
-
}
|
|
711
|
-
}
|
|
712
|
-
// For NFTables routes, we should still track the connection but not interfere
|
|
713
|
-
// Mark the connection as using network proxy so it's cleaned up properly
|
|
714
|
-
record.usingNetworkProxy = true;
|
|
715
|
-
// We don't close the socket - just let it remain open
|
|
716
|
-
// The kernel-level NFTables rules will handle the actual forwarding
|
|
717
|
-
// Set up cleanup when the socket eventually closes
|
|
718
|
-
socket.once('close', () => {
|
|
719
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'nftables_closed');
|
|
720
|
-
});
|
|
721
|
-
return;
|
|
722
|
-
}
|
|
723
|
-
// Select the appropriate target from the targets array
|
|
724
|
-
if (!action.targets || action.targets.length === 0) {
|
|
725
|
-
logger.log('error', `Forward action missing targets configuration for connection ${connectionId}`, {
|
|
726
|
-
connectionId,
|
|
727
|
-
component: 'route-handler'
|
|
728
|
-
});
|
|
729
|
-
socket.end();
|
|
730
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'missing_targets');
|
|
731
|
-
return;
|
|
732
|
-
}
|
|
733
|
-
// Create context for target selection
|
|
734
|
-
const targetSelectionContext = {
|
|
735
|
-
port: record.localPort,
|
|
736
|
-
path: record.httpInfo?.path,
|
|
737
|
-
headers: record.httpInfo?.headers,
|
|
738
|
-
method: record.httpInfo?.method
|
|
739
|
-
};
|
|
740
|
-
const selectedTarget = this.selectTarget(action.targets, targetSelectionContext);
|
|
741
|
-
if (!selectedTarget) {
|
|
742
|
-
logger.log('error', `No matching target found for connection ${connectionId}`, {
|
|
743
|
-
connectionId,
|
|
744
|
-
port: targetSelectionContext.port,
|
|
745
|
-
component: 'route-handler'
|
|
746
|
-
});
|
|
747
|
-
socket.end();
|
|
748
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'no_matching_target');
|
|
749
|
-
return;
|
|
750
|
-
}
|
|
751
|
-
// Create the routing context for this connection
|
|
752
|
-
const routeContext = this.createRouteContext({
|
|
753
|
-
connectionId: record.id,
|
|
754
|
-
port: record.localPort,
|
|
755
|
-
domain: record.lockedDomain,
|
|
756
|
-
clientIp: record.remoteIP,
|
|
757
|
-
serverIp: socket.localAddress || '',
|
|
758
|
-
isTls: record.isTLS || false,
|
|
759
|
-
tlsVersion: record.tlsVersion,
|
|
760
|
-
routeName: route.name,
|
|
761
|
-
routeId: route.id,
|
|
762
|
-
});
|
|
763
|
-
// Note: Route contexts are not cached to ensure fresh data for each connection
|
|
764
|
-
// Determine host using function or static value
|
|
765
|
-
let targetHost;
|
|
766
|
-
if (typeof selectedTarget.host === 'function') {
|
|
767
|
-
try {
|
|
768
|
-
targetHost = selectedTarget.host(routeContext);
|
|
769
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
770
|
-
logger.log('info', `Dynamic host resolved to ${Array.isArray(targetHost) ? targetHost.join(', ') : targetHost} for connection ${connectionId}`, {
|
|
771
|
-
connectionId,
|
|
772
|
-
targetHost: Array.isArray(targetHost) ? targetHost.join(', ') : targetHost,
|
|
773
|
-
component: 'route-handler'
|
|
774
|
-
});
|
|
775
|
-
}
|
|
776
|
-
}
|
|
777
|
-
catch (err) {
|
|
778
|
-
logger.log('error', `Error in host mapping function for connection ${connectionId}: ${err}`, {
|
|
779
|
-
connectionId,
|
|
780
|
-
error: err,
|
|
781
|
-
component: 'route-handler'
|
|
782
|
-
});
|
|
783
|
-
socket.end();
|
|
784
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'host_mapping_error');
|
|
785
|
-
return;
|
|
786
|
-
}
|
|
787
|
-
}
|
|
788
|
-
else {
|
|
789
|
-
targetHost = selectedTarget.host;
|
|
790
|
-
}
|
|
791
|
-
// If an array of hosts, select one randomly for load balancing
|
|
792
|
-
const selectedHost = Array.isArray(targetHost)
|
|
793
|
-
? targetHost[Math.floor(Math.random() * targetHost.length)]
|
|
794
|
-
: targetHost;
|
|
795
|
-
// Determine port using function or static value
|
|
796
|
-
let targetPort;
|
|
797
|
-
if (typeof selectedTarget.port === 'function') {
|
|
798
|
-
try {
|
|
799
|
-
targetPort = selectedTarget.port(routeContext);
|
|
800
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
801
|
-
logger.log('info', `Dynamic port mapping from ${record.localPort} to ${targetPort} for connection ${connectionId}`, {
|
|
802
|
-
connectionId,
|
|
803
|
-
sourcePort: record.localPort,
|
|
804
|
-
targetPort,
|
|
805
|
-
component: 'route-handler'
|
|
806
|
-
});
|
|
807
|
-
}
|
|
808
|
-
// Store the resolved target port in the context for potential future use
|
|
809
|
-
routeContext.targetPort = targetPort;
|
|
810
|
-
}
|
|
811
|
-
catch (err) {
|
|
812
|
-
logger.log('error', `Error in port mapping function for connection ${connectionId}: ${err}`, {
|
|
813
|
-
connectionId,
|
|
814
|
-
error: err,
|
|
815
|
-
component: 'route-handler'
|
|
816
|
-
});
|
|
817
|
-
socket.end();
|
|
818
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'port_mapping_error');
|
|
819
|
-
return;
|
|
820
|
-
}
|
|
821
|
-
}
|
|
822
|
-
else if (selectedTarget.port === 'preserve') {
|
|
823
|
-
// Use incoming port if port is 'preserve'
|
|
824
|
-
targetPort = record.localPort;
|
|
825
|
-
}
|
|
826
|
-
else {
|
|
827
|
-
// Use static port from configuration
|
|
828
|
-
targetPort = selectedTarget.port;
|
|
829
|
-
}
|
|
830
|
-
// Store the resolved host in the context
|
|
831
|
-
routeContext.targetHost = selectedHost;
|
|
832
|
-
// Get effective settings (target overrides route-level settings)
|
|
833
|
-
const effectiveTls = selectedTarget.tls || action.tls;
|
|
834
|
-
const effectiveWebsocket = selectedTarget.websocket || action.websocket;
|
|
835
|
-
const effectiveSendProxyProtocol = selectedTarget.sendProxyProtocol !== undefined
|
|
836
|
-
? selectedTarget.sendProxyProtocol
|
|
837
|
-
: action.sendProxyProtocol;
|
|
838
|
-
// Determine if this needs TLS handling
|
|
839
|
-
if (effectiveTls) {
|
|
840
|
-
switch (effectiveTls.mode) {
|
|
841
|
-
case 'passthrough':
|
|
842
|
-
// For TLS passthrough, just forward directly
|
|
843
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
844
|
-
logger.log('info', `Using TLS passthrough to ${selectedHost}:${targetPort} for connection ${connectionId}`, {
|
|
845
|
-
connectionId,
|
|
846
|
-
targetHost: selectedHost,
|
|
847
|
-
targetPort,
|
|
848
|
-
component: 'route-handler'
|
|
849
|
-
});
|
|
850
|
-
}
|
|
851
|
-
return this.setupDirectConnection(socket, record, record.lockedDomain, initialChunk, undefined, selectedHost, targetPort);
|
|
852
|
-
case 'terminate':
|
|
853
|
-
case 'terminate-and-reencrypt':
|
|
854
|
-
// For TLS termination, use HttpProxy
|
|
855
|
-
if (this.smartProxy.httpProxyBridge.getHttpProxy()) {
|
|
856
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
857
|
-
logger.log('info', `Using HttpProxy for TLS termination to ${Array.isArray(selectedTarget.host) ? selectedTarget.host.join(', ') : selectedTarget.host} for connection ${connectionId}`, {
|
|
858
|
-
connectionId,
|
|
859
|
-
targetHost: selectedTarget.host,
|
|
860
|
-
component: 'route-handler'
|
|
861
|
-
});
|
|
862
|
-
}
|
|
863
|
-
// If we have an initial chunk with TLS data, start processing it
|
|
864
|
-
if (initialChunk && record.isTLS) {
|
|
865
|
-
this.smartProxy.httpProxyBridge.forwardToHttpProxy(connectionId, socket, record, initialChunk, this.smartProxy.settings.httpProxyPort || 8443, (reason) => this.smartProxy.connectionManager.cleanupConnection(record, reason));
|
|
866
|
-
return;
|
|
867
|
-
}
|
|
868
|
-
// This shouldn't normally happen - we should have TLS data at this point
|
|
869
|
-
logger.log('error', `TLS termination route without TLS data for connection ${connectionId}`, {
|
|
870
|
-
connectionId,
|
|
871
|
-
component: 'route-handler'
|
|
872
|
-
});
|
|
873
|
-
socket.end();
|
|
874
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'tls_error');
|
|
875
|
-
return;
|
|
876
|
-
}
|
|
877
|
-
else {
|
|
878
|
-
logger.log('error', `HttpProxy not available for TLS termination for connection ${connectionId}`, {
|
|
879
|
-
connectionId,
|
|
880
|
-
component: 'route-handler'
|
|
881
|
-
});
|
|
882
|
-
socket.end();
|
|
883
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'no_http_proxy');
|
|
884
|
-
return;
|
|
885
|
-
}
|
|
886
|
-
}
|
|
887
|
-
}
|
|
888
|
-
else {
|
|
889
|
-
// No TLS settings - check if this port should use HttpProxy
|
|
890
|
-
const isHttpProxyPort = this.smartProxy.settings.useHttpProxy?.includes(record.localPort);
|
|
891
|
-
// Debug logging
|
|
892
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
893
|
-
logger.log('debug', `Checking HttpProxy forwarding: port=${record.localPort}, useHttpProxy=${JSON.stringify(this.smartProxy.settings.useHttpProxy)}, isHttpProxyPort=${isHttpProxyPort}, hasHttpProxy=${!!this.smartProxy.httpProxyBridge.getHttpProxy()}`, {
|
|
894
|
-
connectionId,
|
|
895
|
-
localPort: record.localPort,
|
|
896
|
-
useHttpProxy: this.smartProxy.settings.useHttpProxy,
|
|
897
|
-
isHttpProxyPort,
|
|
898
|
-
hasHttpProxy: !!this.smartProxy.httpProxyBridge.getHttpProxy(),
|
|
899
|
-
component: 'route-handler'
|
|
900
|
-
});
|
|
901
|
-
}
|
|
902
|
-
if (isHttpProxyPort && this.smartProxy.httpProxyBridge.getHttpProxy()) {
|
|
903
|
-
// Forward non-TLS connections to HttpProxy if configured
|
|
904
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
905
|
-
logger.log('info', `Using HttpProxy for non-TLS connection ${connectionId} on port ${record.localPort}`, {
|
|
906
|
-
connectionId,
|
|
907
|
-
port: record.localPort,
|
|
908
|
-
component: 'route-handler'
|
|
909
|
-
});
|
|
910
|
-
}
|
|
911
|
-
this.smartProxy.httpProxyBridge.forwardToHttpProxy(connectionId, socket, record, initialChunk, this.smartProxy.settings.httpProxyPort || 8443, (reason) => this.smartProxy.connectionManager.cleanupConnection(record, reason));
|
|
912
|
-
return;
|
|
913
|
-
}
|
|
914
|
-
else {
|
|
915
|
-
// Basic forwarding
|
|
916
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
917
|
-
logger.log('info', `Using basic forwarding to ${Array.isArray(selectedTarget.host) ? selectedTarget.host.join(', ') : selectedTarget.host}:${selectedTarget.port} for connection ${connectionId}`, {
|
|
918
|
-
connectionId,
|
|
919
|
-
targetHost: selectedTarget.host,
|
|
920
|
-
targetPort: selectedTarget.port,
|
|
921
|
-
component: 'route-handler'
|
|
922
|
-
});
|
|
923
|
-
}
|
|
924
|
-
// Get the appropriate host value
|
|
925
|
-
let targetHost;
|
|
926
|
-
if (typeof selectedTarget.host === 'function') {
|
|
927
|
-
// For function-based host, use the same routeContext created earlier
|
|
928
|
-
const hostResult = selectedTarget.host(routeContext);
|
|
929
|
-
targetHost = Array.isArray(hostResult)
|
|
930
|
-
? hostResult[Math.floor(Math.random() * hostResult.length)]
|
|
931
|
-
: hostResult;
|
|
932
|
-
}
|
|
933
|
-
else {
|
|
934
|
-
// For static host value
|
|
935
|
-
targetHost = Array.isArray(selectedTarget.host)
|
|
936
|
-
? selectedTarget.host[Math.floor(Math.random() * selectedTarget.host.length)]
|
|
937
|
-
: selectedTarget.host;
|
|
938
|
-
}
|
|
939
|
-
// Determine port - either function-based, static, or preserve incoming port
|
|
940
|
-
let targetPort;
|
|
941
|
-
if (typeof selectedTarget.port === 'function') {
|
|
942
|
-
targetPort = selectedTarget.port(routeContext);
|
|
943
|
-
}
|
|
944
|
-
else if (selectedTarget.port === 'preserve') {
|
|
945
|
-
targetPort = record.localPort;
|
|
946
|
-
}
|
|
947
|
-
else {
|
|
948
|
-
targetPort = selectedTarget.port;
|
|
949
|
-
}
|
|
950
|
-
// Update the connection record and context with resolved values
|
|
951
|
-
record.targetHost = targetHost;
|
|
952
|
-
record.targetPort = targetPort;
|
|
953
|
-
return this.setupDirectConnection(socket, record, record.lockedDomain, initialChunk, undefined, targetHost, targetPort);
|
|
954
|
-
}
|
|
955
|
-
}
|
|
956
|
-
}
|
|
957
|
-
/**
|
|
958
|
-
* Handle a socket-handler action for a route
|
|
959
|
-
*/
|
|
960
|
-
async handleSocketHandlerAction(socket, record, route, initialChunk) {
|
|
961
|
-
const connectionId = record.id;
|
|
962
|
-
// Store the route config in the connection record for metrics and other uses
|
|
963
|
-
record.routeConfig = route;
|
|
964
|
-
record.routeId = route.id || route.name || 'unnamed';
|
|
965
|
-
// Track connection by route
|
|
966
|
-
this.smartProxy.connectionManager.trackConnectionByRoute(record.routeId, record.id);
|
|
967
|
-
if (!route.action.socketHandler) {
|
|
968
|
-
logger.log('error', 'socket-handler action missing socketHandler function', {
|
|
969
|
-
connectionId,
|
|
970
|
-
routeName: route.name,
|
|
971
|
-
component: 'route-handler'
|
|
972
|
-
});
|
|
973
|
-
socket.destroy();
|
|
974
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'missing_handler');
|
|
975
|
-
return;
|
|
976
|
-
}
|
|
977
|
-
// Track event listeners added by the handler so we can clean them up
|
|
978
|
-
const originalOn = socket.on.bind(socket);
|
|
979
|
-
const originalOnce = socket.once.bind(socket);
|
|
980
|
-
const trackedListeners = [];
|
|
981
|
-
// Override socket.on to track listeners
|
|
982
|
-
socket.on = function (event, listener) {
|
|
983
|
-
trackedListeners.push({ event, listener });
|
|
984
|
-
return originalOn(event, listener);
|
|
985
|
-
};
|
|
986
|
-
// Override socket.once to track listeners
|
|
987
|
-
socket.once = function (event, listener) {
|
|
988
|
-
trackedListeners.push({ event, listener });
|
|
989
|
-
return originalOnce(event, listener);
|
|
990
|
-
};
|
|
991
|
-
// Set up automatic cleanup when socket closes
|
|
992
|
-
const cleanupHandler = () => {
|
|
993
|
-
// Remove all tracked listeners
|
|
994
|
-
for (const { event, listener } of trackedListeners) {
|
|
995
|
-
socket.removeListener(event, listener);
|
|
996
|
-
}
|
|
997
|
-
// Restore original methods
|
|
998
|
-
socket.on = originalOn;
|
|
999
|
-
socket.once = originalOnce;
|
|
1000
|
-
};
|
|
1001
|
-
// Listen for socket close to trigger cleanup
|
|
1002
|
-
originalOnce('close', cleanupHandler);
|
|
1003
|
-
originalOnce('error', cleanupHandler);
|
|
1004
|
-
// Create route context for the handler
|
|
1005
|
-
const routeContext = this.createRouteContext({
|
|
1006
|
-
connectionId: record.id,
|
|
1007
|
-
port: record.localPort,
|
|
1008
|
-
domain: record.lockedDomain,
|
|
1009
|
-
clientIp: record.remoteIP,
|
|
1010
|
-
serverIp: socket.localAddress || '',
|
|
1011
|
-
isTls: record.isTLS || false,
|
|
1012
|
-
tlsVersion: record.tlsVersion,
|
|
1013
|
-
routeName: route.name,
|
|
1014
|
-
routeId: route.id,
|
|
1015
|
-
});
|
|
1016
|
-
try {
|
|
1017
|
-
// Call the handler with the appropriate socket (extract underlying if needed)
|
|
1018
|
-
const handlerSocket = getUnderlyingSocket(socket);
|
|
1019
|
-
const result = route.action.socketHandler(handlerSocket, routeContext);
|
|
1020
|
-
// Handle async handlers properly
|
|
1021
|
-
if (result instanceof Promise) {
|
|
1022
|
-
result
|
|
1023
|
-
.then(() => {
|
|
1024
|
-
// Emit initial chunk after async handler completes
|
|
1025
|
-
if (initialChunk && initialChunk.length > 0) {
|
|
1026
|
-
socket.emit('data', initialChunk);
|
|
1027
|
-
}
|
|
1028
|
-
})
|
|
1029
|
-
.catch(error => {
|
|
1030
|
-
logger.log('error', 'Socket handler error', {
|
|
1031
|
-
connectionId,
|
|
1032
|
-
routeName: route.name,
|
|
1033
|
-
error: error.message,
|
|
1034
|
-
component: 'route-handler'
|
|
1035
|
-
});
|
|
1036
|
-
// Remove all event listeners before destroying to prevent memory leaks
|
|
1037
|
-
socket.removeAllListeners();
|
|
1038
|
-
if (!socket.destroyed) {
|
|
1039
|
-
socket.destroy();
|
|
1040
|
-
}
|
|
1041
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'handler_error');
|
|
1042
|
-
});
|
|
1043
|
-
}
|
|
1044
|
-
else {
|
|
1045
|
-
// For sync handlers, emit on next tick
|
|
1046
|
-
if (initialChunk && initialChunk.length > 0) {
|
|
1047
|
-
process.nextTick(() => {
|
|
1048
|
-
socket.emit('data', initialChunk);
|
|
1049
|
-
});
|
|
1050
|
-
}
|
|
1051
|
-
}
|
|
1052
|
-
}
|
|
1053
|
-
catch (error) {
|
|
1054
|
-
logger.log('error', 'Socket handler error', {
|
|
1055
|
-
connectionId,
|
|
1056
|
-
routeName: route.name,
|
|
1057
|
-
error: error.message,
|
|
1058
|
-
component: 'route-handler'
|
|
1059
|
-
});
|
|
1060
|
-
// Remove all event listeners before destroying to prevent memory leaks
|
|
1061
|
-
socket.removeAllListeners();
|
|
1062
|
-
if (!socket.destroyed) {
|
|
1063
|
-
socket.destroy();
|
|
1064
|
-
}
|
|
1065
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'handler_error');
|
|
1066
|
-
}
|
|
1067
|
-
}
|
|
1068
|
-
/**
|
|
1069
|
-
* Sets up a direct connection to the target
|
|
1070
|
-
*/
|
|
1071
|
-
setupDirectConnection(socket, record, serverName, initialChunk, overridePort, targetHost, targetPort) {
|
|
1072
|
-
const connectionId = record.id;
|
|
1073
|
-
// Determine target host and port if not provided
|
|
1074
|
-
const finalTargetHost = targetHost || record.targetHost || this.smartProxy.settings.defaults?.target?.host || 'localhost';
|
|
1075
|
-
// Determine target port
|
|
1076
|
-
const finalTargetPort = targetPort ||
|
|
1077
|
-
record.targetPort ||
|
|
1078
|
-
(overridePort !== undefined ? overridePort : this.smartProxy.settings.defaults?.target?.port || 443);
|
|
1079
|
-
// Update record with final target information
|
|
1080
|
-
record.targetHost = finalTargetHost;
|
|
1081
|
-
record.targetPort = finalTargetPort;
|
|
1082
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
1083
|
-
logger.log('info', `Setting up direct connection ${connectionId} to ${finalTargetHost}:${finalTargetPort}`, {
|
|
1084
|
-
connectionId,
|
|
1085
|
-
targetHost: finalTargetHost,
|
|
1086
|
-
targetPort: finalTargetPort,
|
|
1087
|
-
component: 'route-handler'
|
|
1088
|
-
});
|
|
1089
|
-
}
|
|
1090
|
-
// Setup connection options
|
|
1091
|
-
const connectionOptions = {
|
|
1092
|
-
host: finalTargetHost,
|
|
1093
|
-
port: finalTargetPort,
|
|
1094
|
-
};
|
|
1095
|
-
// Preserve source IP if configured
|
|
1096
|
-
if (this.smartProxy.settings.defaults?.preserveSourceIP || this.smartProxy.settings.preserveSourceIP) {
|
|
1097
|
-
connectionOptions.localAddress = record.remoteIP.replace('::ffff:', '');
|
|
1098
|
-
}
|
|
1099
|
-
// Store initial data if provided
|
|
1100
|
-
if (initialChunk) {
|
|
1101
|
-
// Don't count bytes here - they will be counted when actually forwarded through bidirectional forwarding
|
|
1102
|
-
record.pendingData.push(Buffer.from(initialChunk));
|
|
1103
|
-
record.pendingDataSize = initialChunk.length;
|
|
1104
|
-
}
|
|
1105
|
-
// Create the target socket with immediate error handling
|
|
1106
|
-
const targetSocket = createSocketWithErrorHandler({
|
|
1107
|
-
port: finalTargetPort,
|
|
1108
|
-
host: finalTargetHost,
|
|
1109
|
-
timeout: this.smartProxy.settings.connectionTimeout || 30000, // Connection timeout (default: 30s)
|
|
1110
|
-
onError: (error) => {
|
|
1111
|
-
// Connection failed - clean up everything immediately
|
|
1112
|
-
// Check if connection record is still valid (client might have disconnected)
|
|
1113
|
-
if (record.connectionClosed) {
|
|
1114
|
-
logger.log('debug', `Backend connection failed but client already disconnected for ${connectionId}`, {
|
|
1115
|
-
connectionId,
|
|
1116
|
-
errorCode: error.code,
|
|
1117
|
-
component: 'route-handler'
|
|
1118
|
-
});
|
|
1119
|
-
return;
|
|
1120
|
-
}
|
|
1121
|
-
logger.log('error', `Connection setup error for ${connectionId} to ${finalTargetHost}:${finalTargetPort}: ${error.message} (${error.code})`, {
|
|
1122
|
-
connectionId,
|
|
1123
|
-
targetHost: finalTargetHost,
|
|
1124
|
-
targetPort: finalTargetPort,
|
|
1125
|
-
errorMessage: error.message,
|
|
1126
|
-
errorCode: error.code,
|
|
1127
|
-
component: 'route-handler'
|
|
1128
|
-
});
|
|
1129
|
-
// Log specific error types for easier debugging
|
|
1130
|
-
if (error.code === 'ECONNREFUSED') {
|
|
1131
|
-
logger.log('error', `Connection ${connectionId}: Target ${finalTargetHost}:${finalTargetPort} refused connection. Check if the target service is running and listening on that port.`, {
|
|
1132
|
-
connectionId,
|
|
1133
|
-
targetHost: finalTargetHost,
|
|
1134
|
-
targetPort: finalTargetPort,
|
|
1135
|
-
recommendation: 'Check if the target service is running and listening on that port.',
|
|
1136
|
-
component: 'route-handler'
|
|
1137
|
-
});
|
|
1138
|
-
}
|
|
1139
|
-
// Resume the incoming socket to prevent it from hanging
|
|
1140
|
-
if (socket && !socket.destroyed) {
|
|
1141
|
-
socket.resume();
|
|
1142
|
-
}
|
|
1143
|
-
// Clean up the incoming socket
|
|
1144
|
-
if (socket && !socket.destroyed) {
|
|
1145
|
-
socket.destroy();
|
|
1146
|
-
}
|
|
1147
|
-
// Clean up the connection record - this is critical!
|
|
1148
|
-
this.smartProxy.connectionManager.cleanupConnection(record, `connection_failed_${error.code || 'unknown'}`);
|
|
1149
|
-
},
|
|
1150
|
-
onConnect: async () => {
|
|
1151
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
1152
|
-
logger.log('info', `Connection ${connectionId} established to target ${finalTargetHost}:${finalTargetPort}`, {
|
|
1153
|
-
connectionId,
|
|
1154
|
-
targetHost: finalTargetHost,
|
|
1155
|
-
targetPort: finalTargetPort,
|
|
1156
|
-
component: 'route-handler'
|
|
1157
|
-
});
|
|
1158
|
-
}
|
|
1159
|
-
// Clear any error listeners added by createSocketWithErrorHandler
|
|
1160
|
-
targetSocket.removeAllListeners('error');
|
|
1161
|
-
// Add the normal error handler for established connections
|
|
1162
|
-
targetSocket.on('error', this.smartProxy.connectionManager.handleError('outgoing', record));
|
|
1163
|
-
// Check if we should send PROXY protocol header
|
|
1164
|
-
const shouldSendProxyProtocol = record.routeConfig?.action?.sendProxyProtocol ||
|
|
1165
|
-
this.smartProxy.settings.sendProxyProtocol;
|
|
1166
|
-
if (shouldSendProxyProtocol) {
|
|
1167
|
-
try {
|
|
1168
|
-
// Generate PROXY protocol header
|
|
1169
|
-
const proxyInfo = {
|
|
1170
|
-
protocol: (record.remoteIP.includes(':') ? 'TCP6' : 'TCP4'),
|
|
1171
|
-
sourceIP: record.remoteIP,
|
|
1172
|
-
sourcePort: record.remotePort || socket.remotePort || 0,
|
|
1173
|
-
destinationIP: socket.localAddress || '',
|
|
1174
|
-
destinationPort: socket.localPort || 0
|
|
1175
|
-
};
|
|
1176
|
-
const proxyHeader = ProxyProtocolParser.generate(proxyInfo);
|
|
1177
|
-
// Note: PROXY protocol headers are sent to the backend, not to the client
|
|
1178
|
-
// They are internal protocol overhead and shouldn't be counted in client-facing metrics
|
|
1179
|
-
// Send PROXY protocol header first
|
|
1180
|
-
await new Promise((resolve, reject) => {
|
|
1181
|
-
targetSocket.write(proxyHeader, (err) => {
|
|
1182
|
-
if (err) {
|
|
1183
|
-
logger.log('error', `Failed to send PROXY protocol header`, {
|
|
1184
|
-
connectionId,
|
|
1185
|
-
error: err.message,
|
|
1186
|
-
component: 'route-handler'
|
|
1187
|
-
});
|
|
1188
|
-
reject(err);
|
|
1189
|
-
}
|
|
1190
|
-
else {
|
|
1191
|
-
logger.log('info', `PROXY protocol header sent to backend`, {
|
|
1192
|
-
connectionId,
|
|
1193
|
-
targetHost: finalTargetHost,
|
|
1194
|
-
targetPort: finalTargetPort,
|
|
1195
|
-
sourceIP: proxyInfo.sourceIP,
|
|
1196
|
-
sourcePort: proxyInfo.sourcePort,
|
|
1197
|
-
component: 'route-handler'
|
|
1198
|
-
});
|
|
1199
|
-
resolve();
|
|
1200
|
-
}
|
|
1201
|
-
});
|
|
1202
|
-
});
|
|
1203
|
-
}
|
|
1204
|
-
catch (error) {
|
|
1205
|
-
logger.log('error', `Error sending PROXY protocol header`, {
|
|
1206
|
-
connectionId,
|
|
1207
|
-
error: error.message,
|
|
1208
|
-
component: 'route-handler'
|
|
1209
|
-
});
|
|
1210
|
-
// Continue anyway - don't break the connection
|
|
1211
|
-
}
|
|
1212
|
-
}
|
|
1213
|
-
// Flush any pending data to target
|
|
1214
|
-
if (record.pendingData.length > 0) {
|
|
1215
|
-
const combinedData = Buffer.concat(record.pendingData);
|
|
1216
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
1217
|
-
console.log(`[${connectionId}] Forwarding ${combinedData.length} bytes of initial data to target`);
|
|
1218
|
-
}
|
|
1219
|
-
// Record the initial chunk bytes for metrics
|
|
1220
|
-
record.bytesReceived += combinedData.length;
|
|
1221
|
-
if (this.smartProxy.metricsCollector) {
|
|
1222
|
-
this.smartProxy.metricsCollector.recordBytes(record.id, combinedData.length, 0);
|
|
1223
|
-
}
|
|
1224
|
-
// Write pending data immediately
|
|
1225
|
-
targetSocket.write(combinedData, (err) => {
|
|
1226
|
-
if (err) {
|
|
1227
|
-
logger.log('error', `Error writing pending data to target for connection ${connectionId}: ${err.message}`, {
|
|
1228
|
-
connectionId,
|
|
1229
|
-
error: err.message,
|
|
1230
|
-
component: 'route-handler'
|
|
1231
|
-
});
|
|
1232
|
-
return this.smartProxy.connectionManager.cleanupConnection(record, 'write_error');
|
|
1233
|
-
}
|
|
1234
|
-
});
|
|
1235
|
-
// Clear the buffer now that we've processed it
|
|
1236
|
-
record.pendingData = [];
|
|
1237
|
-
record.pendingDataSize = 0;
|
|
1238
|
-
}
|
|
1239
|
-
// Use centralized bidirectional forwarding setup
|
|
1240
|
-
// Extract underlying sockets for socket-utils functions
|
|
1241
|
-
const incomingSocket = getUnderlyingSocket(socket);
|
|
1242
|
-
setupBidirectionalForwarding(incomingSocket, targetSocket, {
|
|
1243
|
-
onClientData: (chunk) => {
|
|
1244
|
-
record.bytesReceived += chunk.length;
|
|
1245
|
-
this.smartProxy.timeoutManager.updateActivity(record);
|
|
1246
|
-
// Record bytes for metrics
|
|
1247
|
-
if (this.smartProxy.metricsCollector) {
|
|
1248
|
-
this.smartProxy.metricsCollector.recordBytes(record.id, chunk.length, 0);
|
|
1249
|
-
}
|
|
1250
|
-
},
|
|
1251
|
-
onServerData: (chunk) => {
|
|
1252
|
-
record.bytesSent += chunk.length;
|
|
1253
|
-
this.smartProxy.timeoutManager.updateActivity(record);
|
|
1254
|
-
// Record bytes for metrics
|
|
1255
|
-
if (this.smartProxy.metricsCollector) {
|
|
1256
|
-
this.smartProxy.metricsCollector.recordBytes(record.id, 0, chunk.length);
|
|
1257
|
-
}
|
|
1258
|
-
},
|
|
1259
|
-
onCleanup: (reason) => {
|
|
1260
|
-
this.smartProxy.connectionManager.cleanupConnection(record, reason);
|
|
1261
|
-
},
|
|
1262
|
-
enableHalfOpen: false // Default: close both when one closes (required for proxy chains)
|
|
1263
|
-
});
|
|
1264
|
-
// Apply timeouts using TimeoutManager
|
|
1265
|
-
const timeout = this.smartProxy.timeoutManager.getEffectiveInactivityTimeout(record);
|
|
1266
|
-
// Skip timeout for immortal connections (MAX_SAFE_INTEGER would cause issues)
|
|
1267
|
-
if (timeout !== Number.MAX_SAFE_INTEGER) {
|
|
1268
|
-
const safeTimeout = this.smartProxy.timeoutManager.ensureSafeTimeout(timeout);
|
|
1269
|
-
socket.setTimeout(safeTimeout);
|
|
1270
|
-
targetSocket.setTimeout(safeTimeout);
|
|
1271
|
-
}
|
|
1272
|
-
// Log successful connection
|
|
1273
|
-
logger.log('info', `Connection established: ${record.remoteIP} -> ${finalTargetHost}:${finalTargetPort}` +
|
|
1274
|
-
`${serverName ? ` (SNI: ${serverName})` : record.lockedDomain ? ` (Domain: ${record.lockedDomain})` : ''}`, {
|
|
1275
|
-
remoteIP: record.remoteIP,
|
|
1276
|
-
targetHost: finalTargetHost,
|
|
1277
|
-
targetPort: finalTargetPort,
|
|
1278
|
-
sni: serverName || undefined,
|
|
1279
|
-
domain: !serverName && record.lockedDomain ? record.lockedDomain : undefined,
|
|
1280
|
-
component: 'route-handler'
|
|
1281
|
-
});
|
|
1282
|
-
// Add TLS renegotiation handler if needed
|
|
1283
|
-
if (serverName) {
|
|
1284
|
-
// Create connection info object for the existing connection
|
|
1285
|
-
const connInfo = {
|
|
1286
|
-
sourceIp: record.remoteIP,
|
|
1287
|
-
sourcePort: record.incoming.remotePort || 0,
|
|
1288
|
-
destIp: record.incoming.localAddress || '',
|
|
1289
|
-
destPort: record.incoming.localPort || 0,
|
|
1290
|
-
};
|
|
1291
|
-
// Create a renegotiation handler function
|
|
1292
|
-
const renegotiationHandler = this.smartProxy.tlsManager.createRenegotiationHandler(connectionId, serverName, connInfo, (_connectionId, reason) => this.smartProxy.connectionManager.cleanupConnection(record, reason));
|
|
1293
|
-
// Store the handler in the connection record so we can remove it during cleanup
|
|
1294
|
-
record.renegotiationHandler = renegotiationHandler;
|
|
1295
|
-
// Add the handler to the socket
|
|
1296
|
-
socket.on('data', renegotiationHandler);
|
|
1297
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
1298
|
-
logger.log('info', `TLS renegotiation handler installed for connection ${connectionId} with SNI ${serverName}`, {
|
|
1299
|
-
connectionId,
|
|
1300
|
-
serverName,
|
|
1301
|
-
component: 'route-handler'
|
|
1302
|
-
});
|
|
1303
|
-
}
|
|
1304
|
-
}
|
|
1305
|
-
// Set connection timeout
|
|
1306
|
-
record.cleanupTimer = this.smartProxy.timeoutManager.setupConnectionTimeout(record, (record, reason) => {
|
|
1307
|
-
logger.log('warn', `Connection ${connectionId} from ${record.remoteIP} exceeded max lifetime, forcing cleanup`, {
|
|
1308
|
-
connectionId,
|
|
1309
|
-
remoteIP: record.remoteIP,
|
|
1310
|
-
component: 'route-handler'
|
|
1311
|
-
});
|
|
1312
|
-
this.smartProxy.connectionManager.cleanupConnection(record, reason);
|
|
1313
|
-
});
|
|
1314
|
-
// Mark TLS handshake as complete for TLS connections
|
|
1315
|
-
if (record.isTLS) {
|
|
1316
|
-
record.tlsHandshakeComplete = true;
|
|
1317
|
-
}
|
|
1318
|
-
}
|
|
1319
|
-
});
|
|
1320
|
-
// Set outgoing socket immediately so it can be cleaned up if client disconnects
|
|
1321
|
-
record.outgoing = targetSocket;
|
|
1322
|
-
record.outgoingStartTime = Date.now();
|
|
1323
|
-
// Apply socket optimizations
|
|
1324
|
-
targetSocket.setNoDelay(this.smartProxy.settings.noDelay);
|
|
1325
|
-
// Apply keep-alive settings if enabled
|
|
1326
|
-
if (this.smartProxy.settings.keepAlive) {
|
|
1327
|
-
targetSocket.setKeepAlive(true, this.smartProxy.settings.keepAliveInitialDelay);
|
|
1328
|
-
// Apply enhanced TCP keep-alive options if enabled
|
|
1329
|
-
if (this.smartProxy.settings.enableKeepAliveProbes) {
|
|
1330
|
-
try {
|
|
1331
|
-
if ('setKeepAliveProbes' in targetSocket) {
|
|
1332
|
-
targetSocket.setKeepAliveProbes(10);
|
|
1333
|
-
}
|
|
1334
|
-
if ('setKeepAliveInterval' in targetSocket) {
|
|
1335
|
-
targetSocket.setKeepAliveInterval(1000);
|
|
1336
|
-
}
|
|
1337
|
-
}
|
|
1338
|
-
catch (err) {
|
|
1339
|
-
// Ignore errors - these are optional enhancements
|
|
1340
|
-
if (this.smartProxy.settings.enableDetailedLogging) {
|
|
1341
|
-
logger.log('warn', `Enhanced TCP keep-alive not supported for outgoing socket on connection ${connectionId}: ${err}`, {
|
|
1342
|
-
connectionId,
|
|
1343
|
-
error: err,
|
|
1344
|
-
component: 'route-handler'
|
|
1345
|
-
});
|
|
1346
|
-
}
|
|
1347
|
-
}
|
|
1348
|
-
}
|
|
1349
|
-
}
|
|
1350
|
-
// Setup error handlers for incoming socket
|
|
1351
|
-
socket.on('error', this.smartProxy.connectionManager.handleError('incoming', record));
|
|
1352
|
-
// Handle timeouts with keep-alive awareness
|
|
1353
|
-
socket.on('timeout', () => {
|
|
1354
|
-
// For keep-alive connections, just log a warning instead of closing
|
|
1355
|
-
if (record.hasKeepAlive) {
|
|
1356
|
-
logger.log('warn', `Timeout event on incoming keep-alive connection ${connectionId} from ${record.remoteIP} after ${plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000)}. Connection preserved.`, {
|
|
1357
|
-
connectionId,
|
|
1358
|
-
remoteIP: record.remoteIP,
|
|
1359
|
-
timeout: plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000),
|
|
1360
|
-
status: 'Connection preserved',
|
|
1361
|
-
component: 'route-handler'
|
|
1362
|
-
});
|
|
1363
|
-
return;
|
|
1364
|
-
}
|
|
1365
|
-
// For non-keep-alive connections, proceed with normal cleanup
|
|
1366
|
-
logger.log('warn', `Timeout on incoming side for connection ${connectionId} from ${record.remoteIP} after ${plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000)}`, {
|
|
1367
|
-
connectionId,
|
|
1368
|
-
remoteIP: record.remoteIP,
|
|
1369
|
-
timeout: plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000),
|
|
1370
|
-
component: 'route-handler'
|
|
1371
|
-
});
|
|
1372
|
-
if (record.incomingTerminationReason === null) {
|
|
1373
|
-
record.incomingTerminationReason = 'timeout';
|
|
1374
|
-
this.smartProxy.connectionManager.incrementTerminationStat('incoming', 'timeout');
|
|
1375
|
-
}
|
|
1376
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'timeout_incoming');
|
|
1377
|
-
});
|
|
1378
|
-
targetSocket.on('timeout', () => {
|
|
1379
|
-
// For keep-alive connections, just log a warning instead of closing
|
|
1380
|
-
if (record.hasKeepAlive) {
|
|
1381
|
-
logger.log('warn', `Timeout event on outgoing keep-alive connection ${connectionId} from ${record.remoteIP} after ${plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000)}. Connection preserved.`, {
|
|
1382
|
-
connectionId,
|
|
1383
|
-
remoteIP: record.remoteIP,
|
|
1384
|
-
timeout: plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000),
|
|
1385
|
-
status: 'Connection preserved',
|
|
1386
|
-
component: 'route-handler'
|
|
1387
|
-
});
|
|
1388
|
-
return;
|
|
1389
|
-
}
|
|
1390
|
-
// For non-keep-alive connections, proceed with normal cleanup
|
|
1391
|
-
logger.log('warn', `Timeout on outgoing side for connection ${connectionId} from ${record.remoteIP} after ${plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000)}`, {
|
|
1392
|
-
connectionId,
|
|
1393
|
-
remoteIP: record.remoteIP,
|
|
1394
|
-
timeout: plugins.prettyMs(this.smartProxy.settings.socketTimeout || 3600000),
|
|
1395
|
-
component: 'route-handler'
|
|
1396
|
-
});
|
|
1397
|
-
if (record.outgoingTerminationReason === null) {
|
|
1398
|
-
record.outgoingTerminationReason = 'timeout';
|
|
1399
|
-
this.smartProxy.connectionManager.incrementTerminationStat('outgoing', 'timeout');
|
|
1400
|
-
}
|
|
1401
|
-
this.smartProxy.connectionManager.cleanupConnection(record, 'timeout_outgoing');
|
|
1402
|
-
});
|
|
1403
|
-
// Apply socket timeouts
|
|
1404
|
-
this.smartProxy.timeoutManager.applySocketTimeouts(record);
|
|
1405
|
-
}
|
|
1406
|
-
}
|
|
1407
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"route-connection-handler.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/route-connection-handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAE5C,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AACpD,OAAO,EAAE,yBAAyB,EAAE,MAAM,sCAAsC,CAAC;AAIjF,OAAO,EAAE,aAAa,EAAE,mBAAmB,EAAE,4BAA4B,EAAE,4BAA4B,EAAE,MAAM,kCAAkC,CAAC;AAClJ,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AACpE,OAAO,EAAE,mBAAmB,EAAE,MAAM,mCAAmC,CAAC;AACxE,OAAO,EAAE,mBAAmB,EAAE,MAAM,oCAAoC,CAAC;AAEzE,OAAO,EAAE,gBAAgB,EAAE,MAAM,0BAA0B,CAAC;AAE5D;;GAEG;AACH,MAAM,OAAO,sBAAsB;IAQjC,YACU,UAAsB;QAAtB,eAAU,GAAV,UAAU,CAAY;QARhC,iEAAiE;QACjE,gEAAgE;QAChE,sDAAsD;QAEtD,mCAAmC;QAC5B,yBAAoB,GAAG,IAAI,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,EAAqB,CAAC;IAIjF,CAAC;IAGJ;;OAEG;IACK,kBAAkB,CAAC,OAa1B;QACC,OAAO;YACL,yBAAyB;YACzB,IAAI,EAAE,OAAO,CAAC,IAAI;YAClB,MAAM,EAAE,OAAO,CAAC,MAAM;YACtB,QAAQ,EAAE,OAAO,CAAC,QAAQ;YAC1B,QAAQ,EAAE,OAAO,CAAC,QAAQ;YAC1B,IAAI,EAAE,OAAO,CAAC,IAAI;YAClB,KAAK,EAAE,OAAO,CAAC,KAAK;YACpB,OAAO,EAAE,OAAO,CAAC,OAAO;YAExB,kBAAkB;YAClB,KAAK,EAAE,OAAO,CAAC,KAAK;YACpB,UAAU,EAAE,OAAO,CAAC,UAAU;YAE9B,oBAAoB;YACpB,SAAS,EAAE,OAAO,CAAC,SAAS;YAC5B,OAAO,EAAE,OAAO,CAAC,OAAO;YAExB,wBAAwB;YACxB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,YAAY,EAAE,OAAO,CAAC,YAAY;SACnC,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;OAWG;IACK,uBAAuB,CAAC,IAAY;QAC1C,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAEzE,4DAA4D;QAC5D,IAAI,YAAY,CAAC,MAAM,KAAK,CAAC;YAAE,OAAO,KAAK,CAAC;QAE5C,8DAA8D;QAC9D,oDAAoD;QACpD,MAAM,cAAc,GAAG,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAC/C,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;YACtC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,yBAAyB,CACrD,CAAC;QACF,IAAI,cAAc;YAAE,OAAO,KAAK,CAAC;QAEjC,uDAAuD;QACvD,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC;YAAE,OAAO,IAAI,CAAC;QAEzC,iEAAiE;QACjE,MAAM,KAAK,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;QAE9B,qEAAqE;QACrE,MAAM,gBAAgB,GAAG,KAAK,CAAC,MAAM,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,OAAO,CAAC,CAAC,IAAI,KAAK,UAAU,CAAC,CAAC;QACvF,IAAI,gBAAgB;YAAE,OAAO,IAAI,CAAC;QAElC,iEAAiE;QACjE,MAAM,iBAAiB,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QAC3F,IAAI,iBAAiB;YAAE,OAAO,IAAI,CAAC;QAEnC,2EAA2E;QAC3E,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,OAA0B;QAC/C,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC;QAChE,OAAO,UAAU,CAAC,MAAM,KAAK,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC;IAC1D,CAAC;IAED;;OAEG;IACI,gBAAgB,CAAC,MAA0B;QAChD,MAAM,QAAQ,GAAG,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,IAAI,CAAC,CAAC;QAExC,iEAAiE;QACjE,MAAM,aAAa,GAAG,IAAI,aAAa,CAAC,MAAM,CAAC,CAAC;QAEhD,0CAA0C;QAC1C,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC1D,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,iCAAiC,QAAQ,0CAA0C,EAAE;gBACvG,QAAQ;gBACR,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;QACL,CAAC;QAED,qEAAqE;QACrE,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,oBAAoB,EAAE,CAAC;QAC9E,MAAM,QAAQ,GAAG,aAAa,CAAC,aAAa,IAAI,EAAE,CAAC;QAEnD,6EAA6E;QAC7E,4EAA4E;QAC5E,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,kBAAkB,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC;QAChG,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;YAC1B,yBAAyB,CAAC,GAAG,CAC3B,aAAa,EACb,MAAM,EACN,4BAA4B,QAAQ,EAAE,EACtC,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,YAAY,CAAC,MAAM,EAAE,SAAS,EAAE,eAAe,EAAE,EAC/E,QAAQ,CACT,CAAC;YACF,aAAa,CAAC,aAAa,CAAC,MAAM,EAAE,YAAY,YAAY,CAAC,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;YAC5F,OAAO;QACT,CAAC;QAED,yDAAyD;QACzD,4DAA4D;QAC5D,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,aAAa,EAAE;YAC/E,YAAY;YACZ,cAAc,EAAE,IAAI;SACrB,CAAC,CAAC;QACH,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,gFAAgF;YAChF,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,oBAAoB,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC;YAC7E,OAAO;QACT,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACvC,wEAAwE;QAExE,0DAA0D;QAC1D,MAAM,gBAAgB,GAAG,aAAa,CAAC,MAAM,CAAC;QAC9C,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE9D,uCAAuC;QACvC,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YACvC,gBAAgB,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YACpF,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;YAE3B,mDAAmD;YACnD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACnD,IAAI,CAAC;oBACH,uDAAuD;oBACvD,IAAI,oBAAoB,IAAI,gBAAgB,EAAE,CAAC;wBAC5C,gBAAwB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBACnD,CAAC;oBACD,IAAI,sBAAsB,IAAI,gBAAgB,EAAE,CAAC;wBAC9C,gBAAwB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACvD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gDAAgD,EAAE,EAAE,YAAY,EAAE,KAAK,EAAE,GAAG,EAAE,SAAS,EAAE,eAAe,EAAE,CAAC,CAAC;oBACjI,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EACf,uBAAuB,QAAQ,YAAY,SAAS,IAAI;gBACxD,eAAe,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,IAAI;gBAC/D,uBAAuB,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,EAC/E;gBACE,YAAY;gBACZ,QAAQ;gBACR,SAAS;gBACT,SAAS,EAAE,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU;gBACvD,iBAAiB,EAAE,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,kBAAkB,EAAE;gBACzE,SAAS,EAAE,eAAe;aAC3B,CACF,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,CAAC,GAAG,CAAC,MAAM,EACf,uBAAuB,QAAQ,YAAY,SAAS,yBAAyB,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,kBAAkB,EAAE,EAAE,EACrI;gBACE,QAAQ;gBACR,SAAS;gBACT,iBAAiB,EAAE,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,kBAAkB,EAAE;gBACzE,SAAS,EAAE,eAAe;aAC3B,CACF,CAAC;QACJ,CAAC;QAED,yEAAyE;QACzE,IAAI,CAAC,iBAAiB,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,MAA0C,EAAE,MAAyB;QAC7F,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QACnC,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAEhC,wDAAwD;QACxD,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAC;QAC3D,MAAM,gBAAgB,GAAG,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE;YAC9C,mCAAmC;YACnC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;YAE7F,OAAO,WAAW;gBACX,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG;gBAChB,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW;oBACrC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,aAAa,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,+DAA+D;QAC/D,MAAM,kBAAkB,GAAG,IAAI,CAAC,uBAAuB,CAAC,SAAS,CAAC,CAAC;QACnE,MAAM,kBAAkB,GAAG,CAAC,kBAAkB,CAAC;QAE/C,6EAA6E;QAC7E,IAAI,CAAC,gBAAgB,IAAI,SAAS,KAAK,GAAG,EAAE,CAAC;YAC3C,uDAAuD;YACvD,MAAM,gBAAgB,GAAG,mBAAmB,CAAC,MAAM,CAAC,CAAC;YACrD,sDAAsD;YACtD,mBAAmB,CACjB,gBAAgB,EAChB,CAAC,MAAM,EAAE,EAAE;gBACT,6CAA6C;gBAC7C,wDAAwD;gBACxD,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,YAAY,qCAAqC,MAAM,EAAE,EAAE;oBAC3F,YAAY;oBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,MAAM;oBACN,WAAW,EAAE,CAAC,CAAC,MAAM,CAAC,QAAQ;oBAC9B,aAAa,EAAE,MAAM,CAAC,QAAQ,EAAE,UAAU;oBAC1C,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBAEH,sEAAsE;gBACtE,IAAI,MAAM,CAAC,QAAQ,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;oBAClD,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,sCAAsC,YAAY,EAAE,EAAE;wBACxE,YAAY;wBACZ,aAAa,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU;wBACzC,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;oBACH,MAAM,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;gBAC5B,CAAC;gBAED,uCAAuC;gBACvC,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YACtE,CAAC,EACD,SAAS,EAAE,8BAA8B;YACzC,wBAAwB,CACzB,CAAC;YAEF,4CAA4C;YAC5C,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE,EAAE,SAAS,CAAC,CAAC;YACpD,OAAO;QACT,CAAC;QAED,wDAAwD;QACxD,4CAA4C;QAC5C,IAAI,cAAc,GAA0B,UAAU,CAAC,GAAG,EAAE;YAC1D,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iCAAiC,MAAM,CAAC,QAAQ,UAAU,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,kBAAkB,qBAAqB,YAAY,EAAE,EAAE;oBAC3J,YAAY;oBACZ,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,kBAAkB;oBACpD,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBAEH,qBAAqB;gBACrB,UAAU,CAAC,GAAG,EAAE;oBACd,IAAI,CAAC,mBAAmB,EAAE,CAAC;wBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gEAAgE,YAAY,EAAE,EAAE;4BACjG,YAAY;4BACZ,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;wBACH,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;4BAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;4BACrD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;wBAC5F,CAAC;wBACD,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBACjF,CAAC;gBACH,CAAC,EAAE,KAAK,CAAC,CAAC;YACZ,CAAC;QACH,CAAC,EAAE,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,kBAAmB,CAAC,CAAC;QAEjD,mDAAmD;QACnD,IAAI,cAAc,CAAC,KAAK,EAAE,CAAC;YACzB,cAAc,CAAC,KAAK,EAAE,CAAC;QACzB,CAAC;QAED,uBAAuB;QACvB,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAEtF,2DAA2D;QAC3D,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,EAAE;YACxB,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,cAAc,YAAY,qCAAqC,EAAE;oBAClF,YAAY;oBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,IAAI,cAAc,EAAE,CAAC;oBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;oBAC7B,cAAc,GAAG,IAAI,CAAC;gBACxB,CAAC;gBACD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;YACpF,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,MAAM,CAAC,IAAI,CAAC,KAAK,EAAE,GAAG,EAAE;YACtB,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,YAAY,oCAAoC,EAAE;oBAClF,YAAY;oBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,IAAI,cAAc,EAAE,CAAC;oBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;oBAC7B,cAAc,GAAG,IAAI,CAAC;gBACxB,CAAC;gBACD,4CAA4C;YAC9C,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,uEAAuE;QACvE,MAAM,kBAAkB,GAAG,KAAK,EAAE,KAAa,EAAE,EAAE;YACjD,mDAAmD;YACnD,MAAM,OAAO,GAAG,gBAAgB,CAAC,uBAAuB,CAAC;gBACvD,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,CAAC;gBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;gBACjC,QAAQ,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;gBAC/B,QAAQ,EAAE,MAAM,CAAC,EAAE;aACpB,CAAC,CAAC;YAEH,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,iBAAiB,CAC9D,KAAK,EACL,OAAO,EACP,EAAE,kBAAkB,EAAE,KAAK,EAAE,CAAC,0CAA0C;aACzE,CAAC;YAEF,wCAAwC;YACxC,IAAI,SAAS,KAAK,GAAG,IAAI,eAAe,CAAC,QAAQ,KAAK,KAAK,EAAE,CAAC;gBAC5D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sBAAsB,MAAM,CAAC,EAAE,qGAAqG,EAAE;oBACvJ,YAAY,EAAE,MAAM,CAAC,EAAE;oBACvB,gBAAgB,EAAE,eAAe,CAAC,QAAQ;oBAC1C,OAAO,EAAE,8EAA8E;oBACvF,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;oBAC9C,MAAM,CAAC,yBAAyB,GAAG,iBAAiB,CAAC;oBACrD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;gBAC5F,CAAC;gBACD,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;gBAC/E,OAAO;YACT,CAAC;YAED,mCAAmC;YACnC,IAAI,UAAU,GAAG,EAAE,CAAC;YACpB,IAAI,eAAe,CAAC,QAAQ,KAAK,KAAK,EAAE,CAAC;gBACvC,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC;gBACpB,UAAU,GAAG,eAAe,CAAC,cAAc,CAAC,MAAM,IAAI,EAAE,CAAC;gBAEzD,4CAA4C;gBAC5C,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;gBAEjC,oDAAoD;gBACpD,IAAI,CAAC,UAAU,IAAI,kBAAkB,KAAK,KAAK,EAAE,CAAC;oBAChD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qDAAqD,MAAM,CAAC,EAAE,qBAAqB,EAAE;wBACtG,YAAY,EAAE,MAAM,CAAC,EAAE;wBACvB,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;oBACH,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;wBAC9C,MAAM,CAAC,yBAAyB,GAAG,+BAA+B,CAAC;wBACnE,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,wBAAwB,CACxD,UAAU,EACV,+BAA+B,CAChC,CAAC;oBACJ,CAAC;oBACD,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC;oBACtE,IAAI,CAAC;wBACH,mCAAmC;wBACnC,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;wBACjC,IAAI,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;4BACrC,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,EAAE,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;wBAC3E,CAAC;wBAED,MAAM,CAAC,IAAI,EAAE,CAAC;wBACd,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBACpB,MAAM,CAAC,MAAM,EAAE,CAAC;wBAChB,MAAM,CAAC,GAAG,EAAE,CAAC;oBACf,CAAC;oBAAC,MAAM,CAAC;wBACP,MAAM,CAAC,GAAG,EAAE,CAAC;oBACf,CAAC;oBACD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,+BAA+B,CAAC,CAAC;oBAC7F,OAAO;gBACT,CAAC;gBAED,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,yBAAyB,EAAE;wBAC5C,YAAY,EAAE,MAAM,CAAC,EAAE;wBACvB,UAAU,EAAE,UAAU,IAAI,SAAS;wBACnC,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;iBAAM,IAAI,eAAe,CAAC,QAAQ,KAAK,MAAM,EAAE,CAAC;gBAC/C,4CAA4C;gBAC5C,UAAU,GAAG,eAAe,CAAC,cAAc,CAAC,MAAM,IAAI,EAAE,CAAC;gBAEzD,yCAAyC;gBACzC,MAAM,CAAC,QAAQ,GAAG;oBAChB,MAAM,EAAE,eAAe,CAAC,cAAc,CAAC,MAAM;oBAC7C,IAAI,EAAE,eAAe,CAAC,cAAc,CAAC,IAAI;oBACzC,OAAO,EAAE,eAAe,CAAC,cAAc,CAAC,OAAO;iBAChD,CAAC;gBAEF,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0BAA0B,EAAE;wBAC7C,YAAY,EAAE,MAAM,CAAC,EAAE;wBACvB,MAAM,EAAE,UAAU,IAAI,kBAAkB;wBACxC,MAAM,EAAE,eAAe,CAAC,cAAc,CAAC,MAAM;wBAC7C,IAAI,EAAE,eAAe,CAAC,cAAc,CAAC,IAAI;wBACzC,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;QAC3E,CAAC,CAAC;QAEF,wEAAwE;QACxE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,KAAa,EAAE,EAAE;YAC1C,sDAAsD;YACtD,IAAI,cAAc,EAAE,CAAC;gBACnB,YAAY,CAAC,cAAc,CAAC,CAAC;gBAC7B,cAAc,GAAG,IAAI,CAAC;YACxB,CAAC;YAED,mBAAmB,GAAG,IAAI,CAAC;YAC3B,MAAM,CAAC,sBAAsB,GAAG,IAAI,CAAC;YAErC,sEAAsE;YACtE,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC,MAAM,CAAC,aAAa,IAAI,EAAE,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,mBAAmB,KAAK,KAAK,EAAE,CAAC;gBACtI,2CAA2C;gBAC3C,IAAI,KAAK,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE,CAAC;oBAC/E,IAAI,CAAC;wBACH,MAAM,WAAW,GAAG,mBAAmB,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;wBAErD,IAAI,WAAW,CAAC,SAAS,EAAE,CAAC;4BAC1B,4EAA4E;4BAC5E,IAAI,MAAM,YAAY,aAAa,EAAE,CAAC;gCACpC,MAAM,CAAC,YAAY,CAAC,WAAW,CAAC,SAAS,CAAC,QAAQ,EAAE,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC;4BACxF,CAAC;4BAED,iDAAiD;4BACjD,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC,SAAS,CAAC,QAAQ,CAAC;4BACjD,MAAM,CAAC,UAAU,GAAG,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC;4BAErD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,EAAE;gCACvD,YAAY;gCACZ,YAAY,EAAE,WAAW,CAAC,SAAS,CAAC,QAAQ;gCAC5C,cAAc,EAAE,WAAW,CAAC,SAAS,CAAC,UAAU;gCAChD,OAAO,EAAE,MAAM,CAAC,aAAa;gCAC7B,SAAS,EAAE,eAAe;6BAC3B,CAAC,CAAC;4BAEH,gCAAgC;4BAChC,IAAI,WAAW,CAAC,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gCACzC,kBAAkB,CAAC,WAAW,CAAC,aAAa,CAAC,CAAC;4BAChD,CAAC;iCAAM,CAAC;gCACN,qBAAqB;gCACrB,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;4BAC1C,CAAC;4BACD,OAAO;wBACT,CAAC;oBACH,CAAC;oBAAC,OAAO,KAAK,EAAE,CAAC;wBACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,mDAAmD,EAAE;4BACvE,YAAY;4BACZ,KAAK,EAAE,KAAK,CAAC,OAAO;4BACpB,OAAO,EAAE,MAAM,CAAC,aAAa;4BAC7B,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;wBACH,qCAAqC;oBACvC,CAAC;gBACH,CAAC;YACH,CAAC;YAED,6CAA6C;YAC7C,kBAAkB,CAAC,KAAK,CAAC,CAAC;QAC5B,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,eAAe,CACrB,MAA0C,EAC1C,MAAyB,EACzB,UAAkB,EAClB,YAAqB,EACrB,eAAqB,CAAC,4DAA4D;;QAElF,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,SAAS,GAAG,MAAM,CAAC,SAAS,CAAC;QACnC,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC;QAEjC,sCAAsC;QACtC,MAAM,eAAe,GAAG,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,YAAY,EAAE,QAAQ,CAAC,SAAS,CAAC,CAAC;QAEnF,gGAAgG;QAChG,MAAM,eAAe,GAAG,eAAe,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC;QAEzD,oCAAoC;QACpC,MAAM,YAAY,GAAkB;YAClC,IAAI,EAAE,SAAS;YACf,MAAM,EAAE,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,EAAE,wCAAwC;YAC1F,QAAQ,EAAE,QAAQ;YAClB,QAAQ,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;YACnC,IAAI,EAAE,SAAS,EAAE,wCAAwC;YACzD,KAAK,EAAE,MAAM,CAAC,KAAK;YACnB,UAAU,EAAE,SAAS,EAAE,mCAAmC;YAC1D,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,YAAY,EAAE,MAAM,CAAC,EAAE;SACxB,CAAC;QAEF,sBAAsB;QACtB,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,iBAAiB,CAAC,YAAY,CAAC,CAAC;QAEhF,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sBAAsB,UAAU,IAAI,YAAY,YAAY,SAAS,iBAAiB,YAAY,GAAG,EAAE;gBACxH,YAAY;gBACZ,UAAU,EAAE,UAAU,IAAI,YAAY;gBACtC,SAAS;gBACT,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YAEH,mDAAmD;YACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+CAA+C,YAAY,EAAE,EAAE;gBAChF,YAAY;gBACZ,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YAEH,kCAAkC;YAClC,MAAM,uBAAuB,GAAG,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC;YAC5E,IAAI,uBAAuB,EAAE,CAAC;gBAC5B,IAAI,uBAAuB,CAAC,WAAW,IAAI,uBAAuB,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC1F,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,cAAc,CAC9D,QAAQ,EACR,uBAAuB,CAAC,WAAW,EACnC,uBAAuB,CAAC,WAAW,IAAI,EAAE,CAC1C,CAAC;oBAEF,IAAI,CAAC,SAAS,EAAE,CAAC;wBACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,QAAQ,+CAA+C,YAAY,EAAE,EAAE;4BAC9F,YAAY;4BACZ,QAAQ;4BACR,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;wBACH,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;wBAC1E,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;YAED,gDAAgD;YAChD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;gBAC9C,kCAAkC;gBAClC,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC;gBACjE,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC;gBAEjE,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,UAAU,EACV,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,wDAAwD;gBACxD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,+CAA+C,YAAY,sBAAsB,EAAE;oBACpG,YAAY;oBACZ,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,mBAAmB,CAAC,CAAC;gBACjF,OAAO;YACT,CAAC;QACH,CAAC;QAED,6BAA6B;QAC7B,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;QAE/B,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,eAAe,EAAE;gBAClC,YAAY;gBACZ,SAAS,EAAE,KAAK,CAAC,IAAI,IAAI,SAAS;gBAClC,UAAU,EAAE,UAAU,IAAI,YAAY;gBACtC,SAAS;gBACT,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;QACL,CAAC;QAED,uCAAuC;QACvC,IAAI,KAAK,CAAC,QAAQ,EAAE,CAAC;YACnB,6BAA6B;YAC7B,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC7D,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,cAAc,CAChE,QAAQ,EACR,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,EAAE,EAChC,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,EAAE,CACjC,CAAC;gBAEF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,2CAA2C;oBAC3C,yBAAyB,CAAC,GAAG,CAC3B,aAAa,EACb,MAAM,EACN,8BAA8B,EAC9B;wBACE,YAAY;wBACZ,QAAQ;wBACR,SAAS,EAAE,KAAK,CAAC,IAAI,IAAI,SAAS;wBAClC,MAAM,EAAE,kBAAkB;wBAC1B,SAAS,EAAE,eAAe;qBAC3B,EACD,QAAQ,CACT,CAAC;oBACF,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;oBAChF,OAAO;gBACT,CAAC;YACH,CAAC;YAED,kCAAkC;YAClC,IAAI,KAAK,CAAC,QAAQ,CAAC,cAAc,KAAK,SAAS,EAAE,CAAC;gBAChD,MAAM,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;gBACpD,MAAM,kBAAkB,GAAG,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,yBAAyB,CAAC,OAAO,CAAC,CAAC;gBAEhG,IAAI,kBAAkB,IAAI,KAAK,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;oBACxD,mDAAmD;oBACnD,yBAAyB,CAAC,GAAG,CAC3B,qBAAqB,EACrB,MAAM,EACN,gCAAgC,EAChC;wBACE,YAAY;wBACZ,SAAS,EAAE,KAAK,CAAC,IAAI;wBACrB,kBAAkB;wBAClB,cAAc,EAAE,KAAK,CAAC,QAAQ,CAAC,cAAc;wBAC7C,MAAM,EAAE,aAAa;wBACrB,SAAS,EAAE,eAAe;qBAC3B,EACD,eAAe,KAAK,CAAC,IAAI,EAAE,CAC5B,CAAC;oBACF,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,wBAAwB,CAAC,CAAC;oBACtF,OAAO;gBACT,CAAC;YACH,CAAC;YAED,oCAAoC;YACpC,IAAI,KAAK,CAAC,QAAQ,CAAC,cAAc,IAAI,KAAK,CAAC,QAAQ,CAAC,SAAS,IAAI,KAAK,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;gBACxF,iEAAiE;gBACjE,2EAA2E;gBAC3E,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;oBAC9E,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,SAAS,KAAK,CAAC,IAAI,yFAAyF,EAAE;wBAC/H,YAAY;wBACZ,SAAS,EAAE,KAAK,CAAC,IAAI;wBACrB,OAAO,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,IAAI,MAAM;wBACzC,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;QAED,4CAA4C;QAC5C,QAAQ,KAAK,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;YAC1B,KAAK,SAAS;gBACZ,OAAO,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,YAAY,EAAE,eAAe,CAAC,CAAC;YAExF,KAAK,gBAAgB;gBACnB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4CAA4C,KAAK,CAAC,IAAI,EAAE,EAAE;oBAC3E,YAAY;oBACZ,SAAS,EAAE,KAAK,CAAC,IAAI;oBACrB,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,YAAY,CAAC,CAAC;gBACpE,OAAO;YAET;gBACE,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,wBAAyB,KAAK,CAAC,MAAc,CAAC,IAAI,oBAAoB,YAAY,EAAE,EAAE;oBACxG,YAAY;oBACZ,UAAU,EAAG,KAAK,CAAC,MAAc,CAAC,IAAI;oBACtC,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAC;QAClF,CAAC;IACH,CAAC;IAED;;OAEG;IACK,YAAY,CAClB,OAAuB,EACvB,OAKC;QAED,0CAA0C;QAC1C,MAAM,aAAa,GAAG,CAAC,GAAG,OAAO,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,IAAI,CAAC,CAAC,CAAC,CAAC;QAEzF,iCAAiC;QACjC,KAAK,MAAM,MAAM,IAAI,aAAa,EAAE,CAAC;YACnC,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,4DAA4D;gBAC5D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,mBAAmB;YACnB,IAAI,MAAM,CAAC,KAAK,CAAC,KAAK,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrE,SAAS;YACX,CAAC;YAED,wCAAwC;YACxC,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;gBACtC,MAAM,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBAC3D,MAAM,SAAS,GAAG,IAAI,MAAM,CAAC,IAAI,WAAW,GAAG,CAAC,CAAC;gBACjD,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;oBAClC,SAAS;gBACX,CAAC;YACH,CAAC;YAED,qBAAqB;YACrB,IAAI,MAAM,CAAC,KAAK,CAAC,MAAM,IAAI,OAAO,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC3F,SAAS;YACX,CAAC;YAED,sBAAsB;YACtB,IAAI,MAAM,CAAC,KAAK,CAAC,OAAO,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;gBAC5C,IAAI,YAAY,GAAG,IAAI,CAAC;gBACxB,KAAK,MAAM,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE,CAAC;oBAClE,MAAM,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;oBACvD,IAAI,CAAC,WAAW,EAAE,CAAC;wBACjB,YAAY,GAAG,KAAK,CAAC;wBACrB,MAAM;oBACR,CAAC;oBAED,IAAI,OAAO,YAAY,MAAM,EAAE,CAAC;wBAC9B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;4BAC/B,YAAY,GAAG,KAAK,CAAC;4BACrB,MAAM;wBACR,CAAC;oBACH,CAAC;yBAAM,IAAI,WAAW,KAAK,OAAO,EAAE,CAAC;wBACnC,YAAY,GAAG,KAAK,CAAC;wBACrB,MAAM;oBACR,CAAC;gBACH,CAAC;gBACD,IAAI,CAAC,YAAY,EAAE,CAAC;oBAClB,SAAS;gBACX,CAAC;YACH,CAAC;YAED,uBAAuB;YACvB,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,qFAAqF;QACrF,OAAO,aAAa,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,IAAI,CAAC;IACnD,CAAC;IAED;;OAEG;IACK,mBAAmB,CACzB,MAA0C,EAC1C,MAAyB,EACzB,KAAmB,EACnB,YAAqB,EACrB,eAAqB,CAAC,4DAA4D;;QAElF,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAC/B,MAAM,MAAM,GAAG,KAAK,CAAC,MAAsB,CAAC;QAE5C,6EAA6E;QAC7E,MAAM,CAAC,WAAW,GAAG,KAAK,CAAC;QAC3B,MAAM,CAAC,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAErD,4BAA4B;QAC5B,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC,CAAC;QAEpF,mDAAmD;QACnD,IAAI,MAAM,CAAC,gBAAgB,KAAK,UAAU,EAAE,CAAC;YAC3C,yDAAyD;YACzD,8DAA8D;YAE9D,6CAA6C;YAC7C,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAoC,EAAE;oBACvD,YAAY,EAAE,MAAM,CAAC,EAAE;oBACvB,MAAM,EAAE,GAAG,MAAM,CAAC,QAAQ,IAAI,MAAM,CAAC,UAAU,EAAE;oBACjD,WAAW,EAAE,GAAG,MAAM,CAAC,YAAY,IAAI,MAAM,CAAC,SAAS,EAAE;oBACzD,SAAS,EAAE,KAAK,CAAC,IAAI,IAAI,SAAS;oBAClC,MAAM,EAAE,MAAM,CAAC,YAAY,IAAI,KAAK;oBACpC,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qBAAqB,EAAE;oBACxC,YAAY,EAAE,MAAM,CAAC,EAAE;oBACvB,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,SAAS,EAAE,MAAM,CAAC,SAAS;oBAC3B,SAAS,EAAE,KAAK,CAAC,IAAI,IAAI,SAAS;oBAClC,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;YACL,CAAC;YAED,qDAAqD;YACrD,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;gBACpB,MAAM,SAAS,GAAG,MAAM,CAAC,QAAQ,CAAC;gBAClC,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iBAAiB,EAAE;wBACpC,YAAY,EAAE,MAAM,CAAC,EAAE;wBACvB,QAAQ,EAAE,SAAS,CAAC,QAAQ,IAAI,KAAK;wBACrC,gBAAgB,EAAE,SAAS,CAAC,gBAAgB,IAAI,KAAK;wBACrD,QAAQ,EAAE,SAAS,CAAC,QAAQ,IAAI,SAAS;wBACzC,OAAO,EAAE,SAAS,CAAC,OAAO,IAAI,WAAW;wBACzC,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,8EAA8E;YAC9E,yEAAyE;YACzE,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;YAEhC,sDAAsD;YACtD,oEAAoE;YAEpE,mDAAmD;YACnD,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,EAAE;gBACxB,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;YACjF,CAAC,CAAC,CAAC;YAEH,OAAO;QACT,CAAC;QAED,uDAAuD;QACvD,IAAI,CAAC,MAAM,CAAC,OAAO,IAAI,MAAM,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACnD,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,+DAA+D,YAAY,EAAE,EAAE;gBACjG,YAAY;gBACZ,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YACH,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;YAC/E,OAAO;QACT,CAAC;QAED,sCAAsC;QACtC,MAAM,sBAAsB,GAAG;YAC7B,IAAI,EAAE,MAAM,CAAC,SAAS;YACtB,IAAI,EAAE,MAAM,CAAC,QAAQ,EAAE,IAAI;YAC3B,OAAO,EAAE,MAAM,CAAC,QAAQ,EAAE,OAAO;YACjC,MAAM,EAAE,MAAM,CAAC,QAAQ,EAAE,MAAM;SAChC,CAAC;QAEF,MAAM,cAAc,GAAG,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,OAAO,EAAE,sBAAsB,CAAC,CAAC;QACjF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2CAA2C,YAAY,EAAE,EAAE;gBAC7E,YAAY;gBACZ,IAAI,EAAE,sBAAsB,CAAC,IAAI;gBACjC,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YACH,MAAM,CAAC,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;YAClF,OAAO;QACT,CAAC;QAED,iDAAiD;QACjD,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC;YAC3C,YAAY,EAAE,MAAM,CAAC,EAAE;YACvB,IAAI,EAAE,MAAM,CAAC,SAAS;YACtB,MAAM,EAAE,MAAM,CAAC,YAAY;YAC3B,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,QAAQ,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;YACnC,KAAK,EAAE,MAAM,CAAC,KAAK,IAAI,KAAK;YAC5B,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;YACrB,OAAO,EAAE,KAAK,CAAC,EAAE;SAClB,CAAC,CAAC;QAEH,+EAA+E;QAE/E,gDAAgD;QAChD,IAAI,UAA6B,CAAC;QAClC,IAAI,OAAO,cAAc,CAAC,IAAI,KAAK,UAAU,EAAE,CAAC;YAC9C,IAAI,CAAC;gBACH,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBAC/C,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,UAAU,mBAAmB,YAAY,EAAE,EAAE;wBAC9I,YAAY;wBACZ,UAAU,EAAE,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,UAAU;wBAC1E,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,iDAAiD,YAAY,KAAK,GAAG,EAAE,EAAE;oBAC3F,YAAY;oBACZ,KAAK,EAAE,GAAG;oBACV,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAClF,OAAO;YACT,CAAC;QACH,CAAC;aAAM,CAAC;YACN,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;QACnC,CAAC;QAED,+DAA+D;QAC/D,MAAM,YAAY,GAAG,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC;YAC5C,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;YAC3D,CAAC,CAAC,UAAU,CAAC;QAEf,gDAAgD;QAChD,IAAI,UAAkB,CAAC;QACvB,IAAI,OAAO,cAAc,CAAC,IAAI,KAAK,UAAU,EAAE,CAAC;YAC9C,IAAI,CAAC;gBACH,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBAC/C,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,MAAM,CAAC,SAAS,OAAO,UAAU,mBAAmB,YAAY,EAAE,EAAE;wBAClH,YAAY;wBACZ,UAAU,EAAE,MAAM,CAAC,SAAS;wBAC5B,UAAU;wBACV,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;gBACD,yEAAyE;gBACzE,YAAY,CAAC,UAAU,GAAG,UAAU,CAAC;YACvC,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,iDAAiD,YAAY,KAAK,GAAG,EAAE,EAAE;oBAC3F,YAAY;oBACZ,KAAK,EAAE,GAAG;oBACV,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,MAAM,CAAC,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;gBAClF,OAAO;YACT,CAAC;QACH,CAAC;aAAM,IAAI,cAAc,CAAC,IAAI,KAAK,UAAU,EAAE,CAAC;YAC9C,0CAA0C;YAC1C,UAAU,GAAG,MAAM,CAAC,SAAS,CAAC;QAChC,CAAC;aAAM,CAAC;YACN,qCAAqC;YACrC,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;QACnC,CAAC;QAED,yCAAyC;QACzC,YAAY,CAAC,UAAU,GAAG,YAAY,CAAC;QAEvC,iEAAiE;QACjE,MAAM,YAAY,GAAG,cAAc,CAAC,GAAG,IAAI,MAAM,CAAC,GAAG,CAAC;QACtD,MAAM,kBAAkB,GAAG,cAAc,CAAC,SAAS,IAAI,MAAM,CAAC,SAAS,CAAC;QACxE,MAAM,0BAA0B,GAAG,cAAc,CAAC,iBAAiB,KAAK,SAAS;YAC/E,CAAC,CAAC,cAAc,CAAC,iBAAiB;YAClC,CAAC,CAAC,MAAM,CAAC,iBAAiB,CAAC;QAE7B,uCAAuC;QACvC,IAAI,YAAY,EAAE,CAAC;YACjB,QAAQ,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC1B,KAAK,aAAa;oBAChB,6CAA6C;oBAC7C,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,YAAY,IAAI,UAAU,mBAAmB,YAAY,EAAE,EAAE;4BAC1G,YAAY;4BACZ,UAAU,EAAE,YAAY;4BACxB,UAAU;4BACV,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;oBACL,CAAC;oBAED,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,MAAM,CAAC,YAAY,EACnB,YAAY,EACZ,SAAS,EACT,YAAY,EACZ,UAAU,CACX,CAAC;gBAEJ,KAAK,WAAW,CAAC;gBACjB,KAAK,yBAAyB;oBAC5B,qCAAqC;oBACrC,IAAI,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;wBACnD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;4BACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,KAAK,CAAC,OAAO,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,cAAc,CAAC,IAAI,mBAAmB,YAAY,EAAE,EAAE;gCACvL,YAAY;gCACZ,UAAU,EAAE,cAAc,CAAC,IAAI;gCAC/B,SAAS,EAAE,eAAe;6BAC3B,CAAC,CAAC;wBACL,CAAC;wBAED,iEAAiE;wBACjE,IAAI,YAAY,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;4BACjC,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,kBAAkB,CAChD,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAY,EACZ,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,IAAI,EAC9C,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAChF,CAAC;4BACF,OAAO;wBACT,CAAC;wBAED,yEAAyE;wBACzE,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yDAAyD,YAAY,EAAE,EAAE;4BAC3F,YAAY;4BACZ,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;wBACH,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;wBACzE,OAAO;oBACT,CAAC;yBAAM,CAAC;wBACN,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,8DAA8D,YAAY,EAAE,EAAE;4BAChG,YAAY;4BACZ,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;wBACH,MAAM,CAAC,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;wBAC7E,OAAO;oBACT,CAAC;YACL,CAAC;QACH,CAAC;aAAM,CAAC;YACN,4DAA4D;YAC5D,MAAM,eAAe,GAAG,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,YAAY,EAAE,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;YAE1F,gBAAgB;YAChB,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACnD,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAuC,MAAM,CAAC,SAAS,kBAAkB,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,YAAY,CAAC,qBAAqB,eAAe,kBAAkB,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,EAAE;oBAC1P,YAAY;oBACZ,SAAS,EAAE,MAAM,CAAC,SAAS;oBAC3B,YAAY,EAAE,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,YAAY;oBACnD,eAAe;oBACf,YAAY,EAAE,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,YAAY,EAAE;oBAC9D,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;YACL,CAAC;YAED,IAAI,eAAe,IAAI,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;gBACtE,yDAAyD;gBACzD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,0CAA0C,YAAY,YAAY,MAAM,CAAC,SAAS,EAAE,EAAE;wBACvG,YAAY;wBACZ,IAAI,EAAE,MAAM,CAAC,SAAS;wBACtB,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;gBAED,IAAI,CAAC,UAAU,CAAC,eAAe,CAAC,kBAAkB,CAChD,YAAY,EACZ,MAAM,EACN,MAAM,EACN,YAAY,EACZ,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,IAAI,EAC9C,CAAC,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAChF,CAAC;gBACF,OAAO;YACT,CAAC;iBAAM,CAAC;gBACN,mBAAmB;gBACnB,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6BAA6B,KAAK,CAAC,OAAO,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,cAAc,CAAC,IAAI,IAAI,cAAc,CAAC,IAAI,mBAAmB,YAAY,EAAE,EAAE;wBACjM,YAAY;wBACZ,UAAU,EAAE,cAAc,CAAC,IAAI;wBAC/B,UAAU,EAAE,cAAc,CAAC,IAAI;wBAC/B,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;gBAED,iCAAiC;gBACjC,IAAI,UAAkB,CAAC;gBAEvB,IAAI,OAAO,cAAc,CAAC,IAAI,KAAK,UAAU,EAAE,CAAC;oBAC9C,qEAAqE;oBACrE,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;oBACrD,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC;wBACpC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;wBAC3D,CAAC,CAAC,UAAU,CAAC;gBACjB,CAAC;qBAAM,CAAC;oBACN,wBAAwB;oBACxB,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,cAAc,CAAC,IAAI,CAAC;wBAC7C,CAAC,CAAC,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;wBAC7E,CAAC,CAAC,cAAc,CAAC,IAAI,CAAC;gBAC1B,CAAC;gBAED,4EAA4E;gBAC5E,IAAI,UAAkB,CAAC;gBACvB,IAAI,OAAO,cAAc,CAAC,IAAI,KAAK,UAAU,EAAE,CAAC;oBAC9C,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBACjD,CAAC;qBAAM,IAAI,cAAc,CAAC,IAAI,KAAK,UAAU,EAAE,CAAC;oBAC9C,UAAU,GAAG,MAAM,CAAC,SAAS,CAAC;gBAChC,CAAC;qBAAM,CAAC;oBACN,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;gBACnC,CAAC;gBAED,gEAAgE;gBAChE,MAAM,CAAC,UAAU,GAAG,UAAU,CAAC;gBAC/B,MAAM,CAAC,UAAU,GAAG,UAAU,CAAC;gBAE/B,OAAO,IAAI,CAAC,qBAAqB,CAC/B,MAAM,EACN,MAAM,EACN,MAAM,CAAC,YAAY,EACnB,YAAY,EACZ,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;YACJ,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB,CACrC,MAA0C,EAC1C,MAAyB,EACzB,KAAmB,EACnB,YAAqB;QAErB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,6EAA6E;QAC7E,MAAM,CAAC,WAAW,GAAG,KAAK,CAAC;QAC3B,MAAM,CAAC,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAErD,4BAA4B;QAC5B,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,EAAE,MAAM,CAAC,EAAE,CAAC,CAAC;QAEpF,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC;YAChC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,sDAAsD,EAAE;gBAC1E,YAAY;gBACZ,SAAS,EAAE,KAAK,CAAC,IAAI;gBACrB,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YACH,MAAM,CAAC,OAAO,EAAE,CAAC;YACjB,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,iBAAiB,CAAC,CAAC;YAC/E,OAAO;QACT,CAAC;QAED,qEAAqE;QACrE,MAAM,UAAU,GAAG,MAAM,CAAC,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC1C,MAAM,YAAY,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC9C,MAAM,gBAAgB,GAA+D,EAAE,CAAC;QAExF,wCAAwC;QACxC,MAAM,CAAC,EAAE,GAAG,UAAS,KAAa,EAAE,QAAkC;YACpE,gBAAgB,CAAC,IAAI,CAAC,EAAC,KAAK,EAAE,QAAQ,EAAC,CAAC,CAAC;YACzC,OAAO,UAAU,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;QACrC,CAAQ,CAAC;QAET,0CAA0C;QAC1C,MAAM,CAAC,IAAI,GAAG,UAAS,KAAa,EAAE,QAAkC;YACtE,gBAAgB,CAAC,IAAI,CAAC,EAAC,KAAK,EAAE,QAAQ,EAAC,CAAC,CAAC;YACzC,OAAO,YAAY,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;QACvC,CAAQ,CAAC;QAET,8CAA8C;QAC9C,MAAM,cAAc,GAAG,GAAG,EAAE;YAC1B,+BAA+B;YAC/B,KAAK,MAAM,EAAC,KAAK,EAAE,QAAQ,EAAC,IAAI,gBAAgB,EAAE,CAAC;gBACjD,MAAM,CAAC,cAAc,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;YACzC,CAAC;YACD,2BAA2B;YAC3B,MAAM,CAAC,EAAE,GAAG,UAAU,CAAC;YACvB,MAAM,CAAC,IAAI,GAAG,YAAY,CAAC;QAC7B,CAAC,CAAC;QAEF,6CAA6C;QAC7C,YAAY,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;QACtC,YAAY,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;QAEtC,uCAAuC;QACvC,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC;YAC3C,YAAY,EAAE,MAAM,CAAC,EAAE;YACvB,IAAI,EAAE,MAAM,CAAC,SAAS;YACtB,MAAM,EAAE,MAAM,CAAC,YAAY;YAC3B,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,QAAQ,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;YACnC,KAAK,EAAE,MAAM,CAAC,KAAK,IAAI,KAAK;YAC5B,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;YACrB,OAAO,EAAE,KAAK,CAAC,EAAE;SAClB,CAAC,CAAC;QAEH,IAAI,CAAC;YACH,8EAA8E;YAC9E,MAAM,aAAa,GAAG,mBAAmB,CAAC,MAAM,CAAC,CAAC;YAClD,MAAM,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC;YAEvE,iCAAiC;YACjC,IAAI,MAAM,YAAY,OAAO,EAAE,CAAC;gBAC9B,MAAM;qBACH,IAAI,CAAC,GAAG,EAAE;oBACT,mDAAmD;oBACnD,IAAI,YAAY,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;wBAC5C,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;oBACpC,CAAC;gBACH,CAAC,CAAC;qBACD,KAAK,CAAC,KAAK,CAAC,EAAE;oBACb,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,sBAAsB,EAAE;wBAC1C,YAAY;wBACZ,SAAS,EAAE,KAAK,CAAC,IAAI;wBACrB,KAAK,EAAE,KAAK,CAAC,OAAO;wBACpB,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;oBACH,uEAAuE;oBACvE,MAAM,CAAC,kBAAkB,EAAE,CAAC;oBAC5B,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;wBACtB,MAAM,CAAC,OAAO,EAAE,CAAC;oBACnB,CAAC;oBACD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;gBAC/E,CAAC,CAAC,CAAC;YACP,CAAC;iBAAM,CAAC;gBACN,uCAAuC;gBACvC,IAAI,YAAY,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5C,OAAO,CAAC,QAAQ,CAAC,GAAG,EAAE;wBACpB,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,YAAY,CAAC,CAAC;oBACpC,CAAC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,sBAAsB,EAAE;gBAC1C,YAAY;gBACZ,SAAS,EAAE,KAAK,CAAC,IAAI;gBACrB,KAAK,EAAE,KAAK,CAAC,OAAO;gBACpB,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YACH,uEAAuE;YACvE,MAAM,CAAC,kBAAkB,EAAE,CAAC;YAC5B,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;gBACtB,MAAM,CAAC,OAAO,EAAE,CAAC;YACnB,CAAC;YACD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;IAGD;;OAEG;IACK,qBAAqB,CAC3B,MAA0C,EAC1C,MAAyB,EACzB,UAAmB,EACnB,YAAqB,EACrB,YAAqB,EACrB,UAAmB,EACnB,UAAmB;QAEnB,MAAM,YAAY,GAAG,MAAM,CAAC,EAAE,CAAC;QAE/B,iDAAiD;QACjD,MAAM,eAAe,GACnB,UAAU,IAAI,MAAM,CAAC,UAAU,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI,IAAI,WAAW,CAAC;QAEpG,wBAAwB;QACxB,MAAM,eAAe,GACnB,UAAU;YACV,MAAM,CAAC,UAAU;YACjB,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI,IAAI,GAAG,CAAC,CAAC;QAEvG,8CAA8C;QAC9C,MAAM,CAAC,UAAU,GAAG,eAAe,CAAC;QACpC,MAAM,CAAC,UAAU,GAAG,eAAe,CAAC;QAEpC,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,gCAAgC,YAAY,OAAO,eAAe,IAAI,eAAe,EAAE,EAAE;gBAC1G,YAAY;gBACZ,UAAU,EAAE,eAAe;gBAC3B,UAAU,EAAE,eAAe;gBAC3B,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;QACL,CAAC;QAED,2BAA2B;QAC3B,MAAM,iBAAiB,GAA+B;YACpD,IAAI,EAAE,eAAe;YACrB,IAAI,EAAE,eAAe;SACtB,CAAC;QAEF,mCAAmC;QACnC,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,EAAE,gBAAgB,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;YACrG,iBAAiB,CAAC,YAAY,GAAG,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC;QAC1E,CAAC;QAED,iCAAiC;QACjC,IAAI,YAAY,EAAE,CAAC;YACjB,yGAAyG;YACzG,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;YACnD,MAAM,CAAC,eAAe,GAAG,YAAY,CAAC,MAAM,CAAC;QAC/C,CAAC;QAED,yDAAyD;QACzD,MAAM,YAAY,GAAG,4BAA4B,CAAC;YAChD,IAAI,EAAE,eAAe;YACrB,IAAI,EAAE,eAAe;YACrB,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,iBAAiB,IAAI,KAAK,EAAE,oCAAoC;YAClG,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;gBACjB,sDAAsD;gBACtD,6EAA6E;gBAC7E,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;oBAC5B,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,iEAAiE,YAAY,EAAE,EAAE;wBACnG,YAAY;wBACZ,SAAS,EAAG,KAAa,CAAC,IAAI;wBAC9B,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;oBACH,OAAO;gBACT,CAAC;gBAED,MAAM,CAAC,GAAG,CAAC,OAAO,EAChB,8BAA8B,YAAY,OAAO,eAAe,IAAI,eAAe,KAAK,KAAK,CAAC,OAAO,KAAM,KAAa,CAAC,IAAI,GAAG,EAChI;oBACE,YAAY;oBACZ,UAAU,EAAE,eAAe;oBAC3B,UAAU,EAAE,eAAe;oBAC3B,YAAY,EAAE,KAAK,CAAC,OAAO;oBAC3B,SAAS,EAAG,KAAa,CAAC,IAAI;oBAC9B,SAAS,EAAE,eAAe;iBAC3B,CACF,CAAC;gBAEF,gDAAgD;gBAChD,IAAK,KAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC3C,MAAM,CAAC,GAAG,CAAC,OAAO,EAChB,cAAc,YAAY,YAAY,eAAe,IAAI,eAAe,yFAAyF,EACjK;wBACE,YAAY;wBACZ,UAAU,EAAE,eAAe;wBAC3B,UAAU,EAAE,eAAe;wBAC3B,cAAc,EAAE,oEAAoE;wBACpF,SAAS,EAAE,eAAe;qBAC3B,CACF,CAAC;gBACJ,CAAC;gBAED,wDAAwD;gBACxD,IAAI,MAAM,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;oBAChC,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClB,CAAC;gBAED,+BAA+B;gBAC/B,IAAI,MAAM,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;oBAChC,MAAM,CAAC,OAAO,EAAE,CAAC;gBACnB,CAAC;gBAED,qDAAqD;gBACrD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,qBAAsB,KAAa,CAAC,IAAI,IAAI,SAAS,EAAE,CAAC,CAAC;YACvH,CAAC;YACD,SAAS,EAAE,KAAK,IAAI,EAAE;gBACpB,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;oBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,cAAc,YAAY,0BAA0B,eAAe,IAAI,eAAe,EAAE,EAAE;wBAC3G,YAAY;wBACZ,UAAU,EAAE,eAAe;wBAC3B,UAAU,EAAE,eAAe;wBAC3B,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;gBACL,CAAC;gBAED,kEAAkE;gBAClE,YAAY,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;gBAEzC,2DAA2D;gBAC3D,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;gBAE5F,gDAAgD;gBAChD,MAAM,uBAAuB,GAAG,MAAM,CAAC,WAAW,EAAE,MAAM,EAAE,iBAAiB;oBAC9C,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,iBAAiB,CAAC;gBAE1E,IAAI,uBAAuB,EAAE,CAAC;oBAC5B,IAAI,CAAC;wBACH,iCAAiC;wBACjC,MAAM,SAAS,GAAG;4BAChB,QAAQ,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,MAAM,CAAoB;4BAC9E,QAAQ,EAAE,MAAM,CAAC,QAAQ;4BACzB,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,UAAU,IAAI,CAAC;4BACvD,aAAa,EAAE,MAAM,CAAC,YAAY,IAAI,EAAE;4BACxC,eAAe,EAAE,MAAM,CAAC,SAAS,IAAI,CAAC;yBACvC,CAAC;wBAEF,MAAM,WAAW,GAAG,mBAAmB,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;wBAE5D,0EAA0E;wBAC1E,wFAAwF;wBAExF,mCAAmC;wBACnC,MAAM,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;4BAC1C,YAAY,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,GAAG,EAAE,EAAE;gCACtC,IAAI,GAAG,EAAE,CAAC;oCACR,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,sCAAsC,EAAE;wCAC1D,YAAY;wCACZ,KAAK,EAAE,GAAG,CAAC,OAAO;wCAClB,SAAS,EAAE,eAAe;qCAC3B,CAAC,CAAC;oCACH,MAAM,CAAC,GAAG,CAAC,CAAC;gCACd,CAAC;qCAAM,CAAC;oCACN,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uCAAuC,EAAE;wCAC1D,YAAY;wCACZ,UAAU,EAAE,eAAe;wCAC3B,UAAU,EAAE,eAAe;wCAC3B,QAAQ,EAAE,SAAS,CAAC,QAAQ;wCAC5B,UAAU,EAAE,SAAS,CAAC,UAAU;wCAChC,SAAS,EAAE,eAAe;qCAC3B,CAAC,CAAC;oCACH,OAAO,EAAE,CAAC;gCACZ,CAAC;4BACH,CAAC,CAAC,CAAC;wBACL,CAAC,CAAC,CAAC;oBACL,CAAC;oBAAC,OAAO,KAAK,EAAE,CAAC;wBACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,qCAAqC,EAAE;4BACzD,YAAY;4BACZ,KAAK,EAAE,KAAK,CAAC,OAAO;4BACpB,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;wBACH,+CAA+C;oBACjD,CAAC;gBACH,CAAC;gBAED,mCAAmC;gBACnC,IAAI,MAAM,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAClC,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;oBAEvD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACnD,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,gBAAgB,YAAY,CAAC,MAAM,kCAAkC,CACtF,CAAC;oBACJ,CAAC;oBAED,6CAA6C;oBAC7C,MAAM,CAAC,aAAa,IAAI,YAAY,CAAC,MAAM,CAAC;oBAC5C,IAAI,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;wBACrC,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,EAAE,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;oBAClF,CAAC;oBAED,iCAAiC;oBACjC,YAAY,CAAC,KAAK,CAAC,YAAY,EAAE,CAAC,GAAG,EAAE,EAAE;wBACvC,IAAI,GAAG,EAAE,CAAC;4BACR,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uDAAuD,YAAY,KAAK,GAAG,CAAC,OAAO,EAAE,EAAE;gCACzG,YAAY;gCACZ,KAAK,EAAE,GAAG,CAAC,OAAO;gCAClB,SAAS,EAAE,eAAe;6BAC3B,CAAC,CAAC;4BACH,OAAO,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;wBACpF,CAAC;oBACH,CAAC,CAAC,CAAC;oBAEH,+CAA+C;oBAC/C,MAAM,CAAC,WAAW,GAAG,EAAE,CAAC;oBACxB,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC;gBAC7B,CAAC;gBAED,iDAAiD;gBACjD,wDAAwD;gBACxD,MAAM,cAAc,GAAG,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEnD,4BAA4B,CAAC,cAAc,EAAE,YAAY,EAAE;oBACzD,YAAY,EAAE,CAAC,KAAK,EAAE,EAAE;wBACtB,MAAM,CAAC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;wBACrC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;wBAEtD,2BAA2B;wBAC3B,IAAI,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;4BACrC,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,EAAE,KAAK,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;wBAC3E,CAAC;oBACH,CAAC;oBACD,YAAY,EAAE,CAAC,KAAK,EAAE,EAAE;wBACtB,MAAM,CAAC,SAAS,IAAI,KAAK,CAAC,MAAM,CAAC;wBACjC,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;wBAEtD,2BAA2B;wBAC3B,IAAI,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;4BACrC,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,EAAE,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;wBAC3E,CAAC;oBACH,CAAC;oBACD,SAAS,EAAE,CAAC,MAAM,EAAE,EAAE;wBACpB,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;oBACtE,CAAC;oBACD,cAAc,EAAE,KAAK,CAAC,kEAAkE;iBACzF,CAAC,CAAC;gBAEH,sCAAsC;gBACtC,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,6BAA6B,CAAC,MAAM,CAAC,CAAC;gBACrF,8EAA8E;gBAC9E,IAAI,OAAO,KAAK,MAAM,CAAC,gBAAgB,EAAE,CAAC;oBACxC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,iBAAiB,CAAC,OAAO,CAAC,CAAC;oBAC9E,MAAM,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;oBAC/B,YAAY,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;gBACvC,CAAC;gBAED,4BAA4B;gBAC5B,MAAM,CAAC,GAAG,CAAC,MAAM,EACf,2BAA2B,MAAM,CAAC,QAAQ,OAAO,eAAe,IAAI,eAAe,EAAE;oBACrF,GAAG,UAAU,CAAC,CAAC,CAAC,UAAU,UAAU,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,aAAa,MAAM,CAAC,YAAY,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,EAC1G;oBACE,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,UAAU,EAAE,eAAe;oBAC3B,UAAU,EAAE,eAAe;oBAC3B,GAAG,EAAE,UAAU,IAAI,SAAS;oBAC5B,MAAM,EAAE,CAAC,UAAU,IAAI,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS;oBAC5E,SAAS,EAAE,eAAe;iBAC3B,CACF,CAAC;gBAEF,0CAA0C;gBAC1C,IAAI,UAAU,EAAE,CAAC;oBACf,4DAA4D;oBAC5D,MAAM,QAAQ,GAAG;wBACf,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC;wBAC3C,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,YAAY,IAAI,EAAE;wBAC1C,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,SAAS,IAAI,CAAC;qBACzC,CAAC;oBAEF,0CAA0C;oBAC1C,MAAM,oBAAoB,GAAG,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,0BAA0B,CAChF,YAAY,EACZ,UAAU,EACV,QAAQ,EACR,CAAC,aAAa,EAAE,MAAM,EAAE,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAC/F,CAAC;oBAEF,gFAAgF;oBAChF,MAAM,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;oBAEnD,gCAAgC;oBAChC,MAAM,CAAC,EAAE,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;oBAExC,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sDAAsD,YAAY,aAAa,UAAU,EAAE,EAAE;4BAC9G,YAAY;4BACZ,UAAU;4BACV,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;gBAED,yBAAyB;gBACzB,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE;oBACrG,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,cAAc,YAAY,SAAS,MAAM,CAAC,QAAQ,yCAAyC,EAAE;wBAC9G,YAAY;wBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;wBACzB,SAAS,EAAE,eAAe;qBAC3B,CAAC,CAAC;oBACH,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBACtE,CAAC,CAAC,CAAC;gBAEH,qDAAqD;gBACrD,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,MAAM,CAAC,oBAAoB,GAAG,IAAI,CAAC;gBACrC,CAAC;YACH,CAAC;SACF,CAAC,CAAC;QAEH,gFAAgF;QAChF,MAAM,CAAC,QAAQ,GAAG,YAAY,CAAC;QAC/B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEtC,6BAA6B;QAC7B,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAE1D,uCAAuC;QACvC,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YACvC,YAAY,CAAC,YAAY,CAAC,IAAI,EAAE,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;YAEhF,mDAAmD;YACnD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACnD,IAAI,CAAC;oBACH,IAAI,oBAAoB,IAAI,YAAY,EAAE,CAAC;wBACxC,YAAoB,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC;oBAC/C,CAAC;oBACD,IAAI,sBAAsB,IAAI,YAAY,EAAE,CAAC;wBAC1C,YAAoB,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACnD,CAAC;gBACH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,kDAAkD;oBAClD,IAAI,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACnD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2EAA2E,YAAY,KAAK,GAAG,EAAE,EAAE;4BACpH,YAAY;4BACZ,KAAK,EAAE,GAAG;4BACV,SAAS,EAAE,eAAe;yBAC3B,CAAC,CAAC;oBACL,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,2CAA2C;QAC3C,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,WAAW,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;QAEtF,4CAA4C;QAC5C,MAAM,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YACxB,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mDAAmD,YAAY,SAAS,MAAM,CAAC,QAAQ,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,yBAAyB,EAAE;oBAChN,YAAY;oBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC;oBAC5E,MAAM,EAAE,sBAAsB;oBAC9B,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,YAAY,SAAS,MAAM,CAAC,QAAQ,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,EAAE;gBACjL,YAAY;gBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC;gBAC5E,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YACH,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACpF,CAAC;YACD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QAClF,CAAC,CAAC,CAAC;QAEH,YAAY,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC9B,oEAAoE;YACpE,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,mDAAmD,YAAY,SAAS,MAAM,CAAC,QAAQ,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,yBAAyB,EAAE;oBAChN,YAAY;oBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;oBACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC;oBAC5E,MAAM,EAAE,sBAAsB;oBAC9B,SAAS,EAAE,eAAe;iBAC3B,CAAC,CAAC;gBACH,OAAO;YACT,CAAC;YAED,8DAA8D;YAC9D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,2CAA2C,YAAY,SAAS,MAAM,CAAC,QAAQ,UAAU,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC,EAAE,EAAE;gBACjL,YAAY;gBACZ,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,aAAa,IAAI,OAAO,CAAC;gBAC5E,SAAS,EAAE,eAAe;aAC3B,CAAC,CAAC;YACH,IAAI,MAAM,CAAC,yBAAyB,KAAK,IAAI,EAAE,CAAC;gBAC9C,MAAM,CAAC,yBAAyB,GAAG,SAAS,CAAC;gBAC7C,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,wBAAwB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;YACpF,CAAC;YACD,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC;QAClF,CAAC,CAAC,CAAC;QAEH,wBAAwB;QACxB,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;IAC7D,CAAC;CACF"}
|