@push.rocks/smartproxy 5.0.0 → 6.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (78) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/classes.pp.interfaces.d.ts +23 -0
  3. package/dist_ts/classes.pp.networkproxybridge.d.ts +15 -1
  4. package/dist_ts/classes.pp.networkproxybridge.js +116 -21
  5. package/dist_ts/classes.pp.portproxy.d.ts +20 -4
  6. package/dist_ts/classes.pp.portproxy.js +321 -22
  7. package/dist_ts/index.d.ts +6 -6
  8. package/dist_ts/index.js +7 -7
  9. package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +77 -0
  10. package/dist_ts/networkproxy/classes.np.certificatemanager.js +354 -0
  11. package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +47 -0
  12. package/dist_ts/networkproxy/classes.np.connectionpool.js +210 -0
  13. package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +117 -0
  14. package/dist_ts/networkproxy/classes.np.networkproxy.js +375 -0
  15. package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +51 -0
  16. package/dist_ts/networkproxy/classes.np.requesthandler.js +210 -0
  17. package/dist_ts/networkproxy/classes.np.types.d.ts +82 -0
  18. package/dist_ts/networkproxy/classes.np.types.js +35 -0
  19. package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +38 -0
  20. package/dist_ts/networkproxy/classes.np.websockethandler.js +188 -0
  21. package/dist_ts/networkproxy/index.d.ts +6 -0
  22. package/dist_ts/networkproxy/index.js +8 -0
  23. package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +219 -0
  24. package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +1542 -0
  25. package/dist_ts/port80handler/classes.port80handler.d.ts +260 -0
  26. package/dist_ts/port80handler/classes.port80handler.js +928 -0
  27. package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +39 -0
  28. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +754 -0
  29. package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +78 -0
  30. package/dist_ts/smartproxy/classes.pp.connectionmanager.js +378 -0
  31. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +55 -0
  32. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +103 -0
  33. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +133 -0
  34. package/dist_ts/smartproxy/classes.pp.interfaces.js +2 -0
  35. package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +57 -0
  36. package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +306 -0
  37. package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +56 -0
  38. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +179 -0
  39. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +47 -0
  40. package/dist_ts/smartproxy/classes.pp.securitymanager.js +126 -0
  41. package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +153 -0
  42. package/dist_ts/smartproxy/classes.pp.snihandler.js +1053 -0
  43. package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +47 -0
  44. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +154 -0
  45. package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +149 -0
  46. package/dist_ts/smartproxy/classes.pp.tlsalert.js +225 -0
  47. package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +57 -0
  48. package/dist_ts/smartproxy/classes.pp.tlsmanager.js +132 -0
  49. package/dist_ts/smartproxy/classes.smartproxy.d.ts +64 -0
  50. package/dist_ts/smartproxy/classes.smartproxy.js +567 -0
  51. package/package.json +1 -1
  52. package/readme.md +77 -27
  53. package/ts/00_commitinfo_data.ts +1 -1
  54. package/ts/index.ts +6 -6
  55. package/ts/networkproxy/classes.np.certificatemanager.ts +398 -0
  56. package/ts/networkproxy/classes.np.connectionpool.ts +241 -0
  57. package/ts/networkproxy/classes.np.networkproxy.ts +469 -0
  58. package/ts/networkproxy/classes.np.requesthandler.ts +278 -0
  59. package/ts/networkproxy/classes.np.types.ts +123 -0
  60. package/ts/networkproxy/classes.np.websockethandler.ts +226 -0
  61. package/ts/networkproxy/index.ts +7 -0
  62. package/ts/{classes.port80handler.ts → port80handler/classes.port80handler.ts} +249 -1
  63. package/ts/{classes.pp.connectionhandler.ts → smartproxy/classes.pp.connectionhandler.ts} +1 -1
  64. package/ts/{classes.pp.connectionmanager.ts → smartproxy/classes.pp.connectionmanager.ts} +1 -1
  65. package/ts/{classes.pp.domainconfigmanager.ts → smartproxy/classes.pp.domainconfigmanager.ts} +1 -1
  66. package/ts/{classes.pp.interfaces.ts → smartproxy/classes.pp.interfaces.ts} +31 -5
  67. package/ts/{classes.pp.networkproxybridge.ts → smartproxy/classes.pp.networkproxybridge.ts} +129 -28
  68. package/ts/{classes.pp.securitymanager.ts → smartproxy/classes.pp.securitymanager.ts} +1 -1
  69. package/ts/{classes.pp.tlsmanager.ts → smartproxy/classes.pp.tlsmanager.ts} +1 -1
  70. package/ts/smartproxy/classes.smartproxy.ts +679 -0
  71. package/ts/classes.networkproxy.ts +0 -1730
  72. package/ts/classes.pp.acmemanager.ts +0 -149
  73. package/ts/classes.pp.portproxy.ts +0 -344
  74. /package/ts/{classes.nftablesproxy.ts → nfttablesproxy/classes.nftablesproxy.ts} +0 -0
  75. /package/ts/{classes.pp.portrangemanager.ts → smartproxy/classes.pp.portrangemanager.ts} +0 -0
  76. /package/ts/{classes.pp.snihandler.ts → smartproxy/classes.pp.snihandler.ts} +0 -0
  77. /package/ts/{classes.pp.timeoutmanager.ts → smartproxy/classes.pp.timeoutmanager.ts} +0 -0
  78. /package/ts/{classes.pp.tlsalert.ts → smartproxy/classes.pp.tlsalert.ts} +0 -0
@@ -0,0 +1,928 @@
1
+ import * as plugins from '../plugins.js';
2
+ import { IncomingMessage, ServerResponse } from 'http';
3
+ import * as fs from 'fs';
4
+ import * as path from 'path';
5
+ /**
6
+ * Custom error classes for better error handling
7
+ */
8
+ export class Port80HandlerError extends Error {
9
+ constructor(message) {
10
+ super(message);
11
+ this.name = 'Port80HandlerError';
12
+ }
13
+ }
14
+ export class CertificateError extends Port80HandlerError {
15
+ constructor(message, domain, isRenewal = false) {
16
+ super(`${message} for domain ${domain}${isRenewal ? ' (renewal)' : ''}`);
17
+ this.domain = domain;
18
+ this.isRenewal = isRenewal;
19
+ this.name = 'CertificateError';
20
+ }
21
+ }
22
+ export class ServerError extends Port80HandlerError {
23
+ constructor(message, code) {
24
+ super(message);
25
+ this.code = code;
26
+ this.name = 'ServerError';
27
+ }
28
+ }
29
+ /**
30
+ * Events emitted by the Port80Handler
31
+ */
32
+ export var Port80HandlerEvents;
33
+ (function (Port80HandlerEvents) {
34
+ Port80HandlerEvents["CERTIFICATE_ISSUED"] = "certificate-issued";
35
+ Port80HandlerEvents["CERTIFICATE_RENEWED"] = "certificate-renewed";
36
+ Port80HandlerEvents["CERTIFICATE_FAILED"] = "certificate-failed";
37
+ Port80HandlerEvents["CERTIFICATE_EXPIRING"] = "certificate-expiring";
38
+ Port80HandlerEvents["MANAGER_STARTED"] = "manager-started";
39
+ Port80HandlerEvents["MANAGER_STOPPED"] = "manager-stopped";
40
+ Port80HandlerEvents["REQUEST_FORWARDED"] = "request-forwarded";
41
+ })(Port80HandlerEvents || (Port80HandlerEvents = {}));
42
+ /**
43
+ * Port80Handler with ACME certificate management and request forwarding capabilities
44
+ * Now with glob pattern support for domain matching
45
+ */
46
+ export class Port80Handler extends plugins.EventEmitter {
47
+ /**
48
+ * Creates a new Port80Handler
49
+ * @param options Configuration options
50
+ */
51
+ constructor(options = {}) {
52
+ super();
53
+ this.server = null;
54
+ this.acmeClient = null;
55
+ this.accountKey = null;
56
+ this.renewalTimer = null;
57
+ this.isShuttingDown = false;
58
+ this.domainCertificates = new Map();
59
+ // Default options
60
+ this.options = {
61
+ port: options.port ?? 80,
62
+ contactEmail: options.contactEmail ?? 'admin@example.com',
63
+ useProduction: options.useProduction ?? false, // Safer default: staging
64
+ renewThresholdDays: options.renewThresholdDays ?? 10, // Changed to 10 days as per requirements
65
+ httpsRedirectPort: options.httpsRedirectPort ?? 443,
66
+ renewCheckIntervalHours: options.renewCheckIntervalHours ?? 24,
67
+ enabled: options.enabled ?? true, // Enable by default
68
+ autoRenew: options.autoRenew ?? true, // Auto-renew by default
69
+ certificateStore: options.certificateStore ?? './certs', // Default store location
70
+ skipConfiguredCerts: options.skipConfiguredCerts ?? false
71
+ };
72
+ }
73
+ /**
74
+ * Starts the HTTP server for ACME challenges
75
+ */
76
+ async start() {
77
+ if (this.server) {
78
+ throw new ServerError('Server is already running');
79
+ }
80
+ if (this.isShuttingDown) {
81
+ throw new ServerError('Server is shutting down');
82
+ }
83
+ // Skip if disabled
84
+ if (this.options.enabled === false) {
85
+ console.log('Port80Handler is disabled, skipping start');
86
+ return;
87
+ }
88
+ return new Promise((resolve, reject) => {
89
+ try {
90
+ // Load certificates from store if enabled
91
+ if (this.options.certificateStore) {
92
+ this.loadCertificatesFromStore();
93
+ }
94
+ this.server = plugins.http.createServer((req, res) => this.handleRequest(req, res));
95
+ this.server.on('error', (error) => {
96
+ if (error.code === 'EACCES') {
97
+ reject(new ServerError(`Permission denied to bind to port ${this.options.port}. Try running with elevated privileges or use a port > 1024.`, error.code));
98
+ }
99
+ else if (error.code === 'EADDRINUSE') {
100
+ reject(new ServerError(`Port ${this.options.port} is already in use.`, error.code));
101
+ }
102
+ else {
103
+ reject(new ServerError(error.message, error.code));
104
+ }
105
+ });
106
+ this.server.listen(this.options.port, () => {
107
+ console.log(`Port80Handler is listening on port ${this.options.port}`);
108
+ this.startRenewalTimer();
109
+ this.emit(Port80HandlerEvents.MANAGER_STARTED, this.options.port);
110
+ // Start certificate process for domains with acmeMaintenance enabled
111
+ for (const [domain, domainInfo] of this.domainCertificates.entries()) {
112
+ // Skip glob patterns for certificate issuance
113
+ if (this.isGlobPattern(domain)) {
114
+ console.log(`Skipping initial certificate for glob pattern: ${domain}`);
115
+ continue;
116
+ }
117
+ if (domainInfo.options.acmeMaintenance && !domainInfo.certObtained && !domainInfo.obtainingInProgress) {
118
+ this.obtainCertificate(domain).catch(err => {
119
+ console.error(`Error obtaining initial certificate for ${domain}:`, err);
120
+ });
121
+ }
122
+ }
123
+ resolve();
124
+ });
125
+ }
126
+ catch (error) {
127
+ const message = error instanceof Error ? error.message : 'Unknown error starting server';
128
+ reject(new ServerError(message));
129
+ }
130
+ });
131
+ }
132
+ /**
133
+ * Stops the HTTP server and renewal timer
134
+ */
135
+ async stop() {
136
+ if (!this.server) {
137
+ return;
138
+ }
139
+ this.isShuttingDown = true;
140
+ // Stop the renewal timer
141
+ if (this.renewalTimer) {
142
+ clearInterval(this.renewalTimer);
143
+ this.renewalTimer = null;
144
+ }
145
+ return new Promise((resolve) => {
146
+ if (this.server) {
147
+ this.server.close(() => {
148
+ this.server = null;
149
+ this.isShuttingDown = false;
150
+ this.emit(Port80HandlerEvents.MANAGER_STOPPED);
151
+ resolve();
152
+ });
153
+ }
154
+ else {
155
+ this.isShuttingDown = false;
156
+ resolve();
157
+ }
158
+ });
159
+ }
160
+ /**
161
+ * Adds a domain with configuration options
162
+ * @param options Domain configuration options
163
+ */
164
+ addDomain(options) {
165
+ if (!options.domainName || typeof options.domainName !== 'string') {
166
+ throw new Port80HandlerError('Invalid domain name');
167
+ }
168
+ const domainName = options.domainName;
169
+ if (!this.domainCertificates.has(domainName)) {
170
+ this.domainCertificates.set(domainName, {
171
+ options,
172
+ certObtained: false,
173
+ obtainingInProgress: false
174
+ });
175
+ console.log(`Domain added: ${domainName} with configuration:`, {
176
+ sslRedirect: options.sslRedirect,
177
+ acmeMaintenance: options.acmeMaintenance,
178
+ hasForward: !!options.forward,
179
+ hasAcmeForward: !!options.acmeForward
180
+ });
181
+ // If acmeMaintenance is enabled and not a glob pattern, start certificate process immediately
182
+ if (options.acmeMaintenance && this.server && !this.isGlobPattern(domainName)) {
183
+ this.obtainCertificate(domainName).catch(err => {
184
+ console.error(`Error obtaining initial certificate for ${domainName}:`, err);
185
+ });
186
+ }
187
+ }
188
+ else {
189
+ // Update existing domain with new options
190
+ const existing = this.domainCertificates.get(domainName);
191
+ existing.options = options;
192
+ console.log(`Domain ${domainName} configuration updated`);
193
+ }
194
+ }
195
+ /**
196
+ * Removes a domain from management
197
+ * @param domain The domain to remove
198
+ */
199
+ removeDomain(domain) {
200
+ if (this.domainCertificates.delete(domain)) {
201
+ console.log(`Domain removed: ${domain}`);
202
+ }
203
+ }
204
+ /**
205
+ * Sets a certificate for a domain directly (for externally obtained certificates)
206
+ * @param domain The domain for the certificate
207
+ * @param certificate The certificate (PEM format)
208
+ * @param privateKey The private key (PEM format)
209
+ * @param expiryDate Optional expiry date
210
+ */
211
+ setCertificate(domain, certificate, privateKey, expiryDate) {
212
+ if (!domain || !certificate || !privateKey) {
213
+ throw new Port80HandlerError('Domain, certificate and privateKey are required');
214
+ }
215
+ // Don't allow setting certificates for glob patterns
216
+ if (this.isGlobPattern(domain)) {
217
+ throw new Port80HandlerError('Cannot set certificate for glob pattern domains');
218
+ }
219
+ let domainInfo = this.domainCertificates.get(domain);
220
+ if (!domainInfo) {
221
+ // Create default domain options if not already configured
222
+ const defaultOptions = {
223
+ domainName: domain,
224
+ sslRedirect: true,
225
+ acmeMaintenance: true
226
+ };
227
+ domainInfo = {
228
+ options: defaultOptions,
229
+ certObtained: false,
230
+ obtainingInProgress: false
231
+ };
232
+ this.domainCertificates.set(domain, domainInfo);
233
+ }
234
+ domainInfo.certificate = certificate;
235
+ domainInfo.privateKey = privateKey;
236
+ domainInfo.certObtained = true;
237
+ domainInfo.obtainingInProgress = false;
238
+ if (expiryDate) {
239
+ domainInfo.expiryDate = expiryDate;
240
+ }
241
+ else {
242
+ // Extract expiry date from certificate
243
+ domainInfo.expiryDate = this.extractExpiryDateFromCertificate(certificate, domain);
244
+ }
245
+ console.log(`Certificate set for ${domain}`);
246
+ // Save certificate to store if enabled
247
+ if (this.options.certificateStore) {
248
+ this.saveCertificateToStore(domain, certificate, privateKey);
249
+ }
250
+ // Emit certificate event
251
+ this.emitCertificateEvent(Port80HandlerEvents.CERTIFICATE_ISSUED, {
252
+ domain,
253
+ certificate,
254
+ privateKey,
255
+ expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate()
256
+ });
257
+ }
258
+ /**
259
+ * Gets the certificate for a domain if it exists
260
+ * @param domain The domain to get the certificate for
261
+ */
262
+ getCertificate(domain) {
263
+ // Can't get certificates for glob patterns
264
+ if (this.isGlobPattern(domain)) {
265
+ return null;
266
+ }
267
+ const domainInfo = this.domainCertificates.get(domain);
268
+ if (!domainInfo || !domainInfo.certObtained || !domainInfo.certificate || !domainInfo.privateKey) {
269
+ return null;
270
+ }
271
+ return {
272
+ domain,
273
+ certificate: domainInfo.certificate,
274
+ privateKey: domainInfo.privateKey,
275
+ expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate()
276
+ };
277
+ }
278
+ /**
279
+ * Saves a certificate to the filesystem store
280
+ * @param domain The domain for the certificate
281
+ * @param certificate The certificate (PEM format)
282
+ * @param privateKey The private key (PEM format)
283
+ * @private
284
+ */
285
+ saveCertificateToStore(domain, certificate, privateKey) {
286
+ // Skip if certificate store is not enabled
287
+ if (!this.options.certificateStore)
288
+ return;
289
+ try {
290
+ const storePath = this.options.certificateStore;
291
+ // Ensure the directory exists
292
+ if (!fs.existsSync(storePath)) {
293
+ fs.mkdirSync(storePath, { recursive: true });
294
+ console.log(`Created certificate store directory: ${storePath}`);
295
+ }
296
+ const certPath = path.join(storePath, `${domain}.cert.pem`);
297
+ const keyPath = path.join(storePath, `${domain}.key.pem`);
298
+ // Write certificate and private key files
299
+ fs.writeFileSync(certPath, certificate);
300
+ fs.writeFileSync(keyPath, privateKey);
301
+ // Set secure permissions for private key
302
+ try {
303
+ fs.chmodSync(keyPath, 0o600);
304
+ }
305
+ catch (err) {
306
+ console.log(`Warning: Could not set secure permissions on ${keyPath}`);
307
+ }
308
+ console.log(`Saved certificate for ${domain} to ${certPath}`);
309
+ }
310
+ catch (err) {
311
+ console.error(`Error saving certificate for ${domain}:`, err);
312
+ }
313
+ }
314
+ /**
315
+ * Loads certificates from the certificate store
316
+ * @private
317
+ */
318
+ loadCertificatesFromStore() {
319
+ if (!this.options.certificateStore)
320
+ return;
321
+ try {
322
+ const storePath = this.options.certificateStore;
323
+ // Ensure the directory exists
324
+ if (!fs.existsSync(storePath)) {
325
+ fs.mkdirSync(storePath, { recursive: true });
326
+ console.log(`Created certificate store directory: ${storePath}`);
327
+ return;
328
+ }
329
+ // Get list of certificate files
330
+ const files = fs.readdirSync(storePath);
331
+ const certFiles = files.filter(file => file.endsWith('.cert.pem'));
332
+ // Load each certificate
333
+ for (const certFile of certFiles) {
334
+ const domain = certFile.replace('.cert.pem', '');
335
+ const keyFile = `${domain}.key.pem`;
336
+ // Skip if key file doesn't exist
337
+ if (!files.includes(keyFile)) {
338
+ console.log(`Warning: Found certificate for ${domain} but no key file`);
339
+ continue;
340
+ }
341
+ // Skip if we should skip configured certs
342
+ if (this.options.skipConfiguredCerts) {
343
+ const domainInfo = this.domainCertificates.get(domain);
344
+ if (domainInfo && domainInfo.certObtained) {
345
+ console.log(`Skipping already configured certificate for ${domain}`);
346
+ continue;
347
+ }
348
+ }
349
+ // Load certificate and key
350
+ try {
351
+ const certificate = fs.readFileSync(path.join(storePath, certFile), 'utf8');
352
+ const privateKey = fs.readFileSync(path.join(storePath, keyFile), 'utf8');
353
+ // Extract expiry date
354
+ let expiryDate;
355
+ try {
356
+ const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
357
+ if (matches && matches[1]) {
358
+ expiryDate = new Date(matches[1]);
359
+ }
360
+ }
361
+ catch (err) {
362
+ console.log(`Warning: Could not extract expiry date from certificate for ${domain}`);
363
+ }
364
+ // Check if domain is already registered
365
+ let domainInfo = this.domainCertificates.get(domain);
366
+ if (!domainInfo) {
367
+ // Register domain if not already registered
368
+ domainInfo = {
369
+ options: {
370
+ domainName: domain,
371
+ sslRedirect: true,
372
+ acmeMaintenance: true
373
+ },
374
+ certObtained: false,
375
+ obtainingInProgress: false
376
+ };
377
+ this.domainCertificates.set(domain, domainInfo);
378
+ }
379
+ // Set certificate
380
+ domainInfo.certificate = certificate;
381
+ domainInfo.privateKey = privateKey;
382
+ domainInfo.certObtained = true;
383
+ domainInfo.expiryDate = expiryDate;
384
+ console.log(`Loaded certificate for ${domain} from store, valid until ${expiryDate?.toISOString() || 'unknown'}`);
385
+ }
386
+ catch (err) {
387
+ console.error(`Error loading certificate for ${domain}:`, err);
388
+ }
389
+ }
390
+ }
391
+ catch (err) {
392
+ console.error('Error loading certificates from store:', err);
393
+ }
394
+ }
395
+ /**
396
+ * Check if a domain is a glob pattern
397
+ * @param domain Domain to check
398
+ * @returns True if the domain is a glob pattern
399
+ */
400
+ isGlobPattern(domain) {
401
+ return domain.includes('*');
402
+ }
403
+ /**
404
+ * Get domain info for a specific domain, using glob pattern matching if needed
405
+ * @param requestDomain The actual domain from the request
406
+ * @returns The domain info or null if not found
407
+ */
408
+ getDomainInfoForRequest(requestDomain) {
409
+ // Try direct match first
410
+ if (this.domainCertificates.has(requestDomain)) {
411
+ return {
412
+ domainInfo: this.domainCertificates.get(requestDomain),
413
+ pattern: requestDomain
414
+ };
415
+ }
416
+ // Then try glob patterns
417
+ for (const [pattern, domainInfo] of this.domainCertificates.entries()) {
418
+ if (this.isGlobPattern(pattern) && this.domainMatchesPattern(requestDomain, pattern)) {
419
+ return { domainInfo, pattern };
420
+ }
421
+ }
422
+ return null;
423
+ }
424
+ /**
425
+ * Check if a domain matches a glob pattern
426
+ * @param domain The domain to check
427
+ * @param pattern The pattern to match against
428
+ * @returns True if the domain matches the pattern
429
+ */
430
+ domainMatchesPattern(domain, pattern) {
431
+ // Handle different glob pattern styles
432
+ if (pattern.startsWith('*.')) {
433
+ // *.example.com matches any subdomain
434
+ const suffix = pattern.substring(2);
435
+ return domain.endsWith(suffix) && domain.includes('.') && domain !== suffix;
436
+ }
437
+ else if (pattern.endsWith('.*')) {
438
+ // example.* matches any TLD
439
+ const prefix = pattern.substring(0, pattern.length - 2);
440
+ const domainParts = domain.split('.');
441
+ return domain.startsWith(prefix + '.') && domainParts.length >= 2;
442
+ }
443
+ else if (pattern === '*') {
444
+ // Wildcard matches everything
445
+ return true;
446
+ }
447
+ else {
448
+ // Exact match (shouldn't reach here as we check exact matches first)
449
+ return domain === pattern;
450
+ }
451
+ }
452
+ /**
453
+ * Lazy initialization of the ACME client
454
+ * @returns An ACME client instance
455
+ */
456
+ async getAcmeClient() {
457
+ if (this.acmeClient) {
458
+ return this.acmeClient;
459
+ }
460
+ try {
461
+ // Generate a new account key
462
+ this.accountKey = (await plugins.acme.forge.createPrivateKey()).toString();
463
+ this.acmeClient = new plugins.acme.Client({
464
+ directoryUrl: this.options.useProduction
465
+ ? plugins.acme.directory.letsencrypt.production
466
+ : plugins.acme.directory.letsencrypt.staging,
467
+ accountKey: this.accountKey,
468
+ });
469
+ // Create a new account
470
+ await this.acmeClient.createAccount({
471
+ termsOfServiceAgreed: true,
472
+ contact: [`mailto:${this.options.contactEmail}`],
473
+ });
474
+ return this.acmeClient;
475
+ }
476
+ catch (error) {
477
+ const message = error instanceof Error ? error.message : 'Unknown error initializing ACME client';
478
+ throw new Port80HandlerError(`Failed to initialize ACME client: ${message}`);
479
+ }
480
+ }
481
+ /**
482
+ * Handles incoming HTTP requests
483
+ * @param req The HTTP request
484
+ * @param res The HTTP response
485
+ */
486
+ handleRequest(req, res) {
487
+ const hostHeader = req.headers.host;
488
+ if (!hostHeader) {
489
+ res.statusCode = 400;
490
+ res.end('Bad Request: Host header is missing');
491
+ return;
492
+ }
493
+ // Extract domain (ignoring any port in the Host header)
494
+ const domain = hostHeader.split(':')[0];
495
+ // Get domain config, using glob pattern matching if needed
496
+ const domainMatch = this.getDomainInfoForRequest(domain);
497
+ if (!domainMatch) {
498
+ res.statusCode = 404;
499
+ res.end('Domain not configured');
500
+ return;
501
+ }
502
+ const { domainInfo, pattern } = domainMatch;
503
+ const options = domainInfo.options;
504
+ // If the request is for an ACME HTTP-01 challenge, handle it
505
+ if (req.url && req.url.startsWith('/.well-known/acme-challenge/') && (options.acmeMaintenance || options.acmeForward)) {
506
+ // Check if we should forward ACME requests
507
+ if (options.acmeForward) {
508
+ this.forwardRequest(req, res, options.acmeForward, 'ACME challenge');
509
+ return;
510
+ }
511
+ // Only handle ACME challenges for non-glob patterns
512
+ if (!this.isGlobPattern(pattern)) {
513
+ this.handleAcmeChallenge(req, res, domain);
514
+ return;
515
+ }
516
+ }
517
+ // Check if we should forward non-ACME requests
518
+ if (options.forward) {
519
+ this.forwardRequest(req, res, options.forward, 'HTTP');
520
+ return;
521
+ }
522
+ // If certificate exists and sslRedirect is enabled, redirect to HTTPS
523
+ // (Skip for glob patterns as they won't have certificates)
524
+ if (!this.isGlobPattern(pattern) && domainInfo.certObtained && options.sslRedirect) {
525
+ const httpsPort = this.options.httpsRedirectPort;
526
+ const portSuffix = httpsPort === 443 ? '' : `:${httpsPort}`;
527
+ const redirectUrl = `https://${domain}${portSuffix}${req.url || '/'}`;
528
+ res.statusCode = 301;
529
+ res.setHeader('Location', redirectUrl);
530
+ res.end(`Redirecting to ${redirectUrl}`);
531
+ return;
532
+ }
533
+ // Handle case where certificate maintenance is enabled but not yet obtained
534
+ // (Skip for glob patterns as they can't have certificates)
535
+ if (!this.isGlobPattern(pattern) && options.acmeMaintenance && !domainInfo.certObtained) {
536
+ // Trigger certificate issuance if not already running
537
+ if (!domainInfo.obtainingInProgress) {
538
+ this.obtainCertificate(domain).catch(err => {
539
+ const errorMessage = err instanceof Error ? err.message : 'Unknown error';
540
+ this.emit(Port80HandlerEvents.CERTIFICATE_FAILED, {
541
+ domain,
542
+ error: errorMessage,
543
+ isRenewal: false
544
+ });
545
+ console.error(`Error obtaining certificate for ${domain}:`, err);
546
+ });
547
+ }
548
+ res.statusCode = 503;
549
+ res.end('Certificate issuance in progress, please try again later.');
550
+ return;
551
+ }
552
+ // Default response for unhandled request
553
+ res.statusCode = 404;
554
+ res.end('No handlers configured for this request');
555
+ }
556
+ /**
557
+ * Forwards an HTTP request to the specified target
558
+ * @param req The original request
559
+ * @param res The response object
560
+ * @param target The forwarding target (IP and port)
561
+ * @param requestType Type of request for logging
562
+ */
563
+ forwardRequest(req, res, target, requestType) {
564
+ const options = {
565
+ hostname: target.ip,
566
+ port: target.port,
567
+ path: req.url,
568
+ method: req.method,
569
+ headers: { ...req.headers }
570
+ };
571
+ const domain = req.headers.host?.split(':')[0] || 'unknown';
572
+ console.log(`Forwarding ${requestType} request for ${domain} to ${target.ip}:${target.port}`);
573
+ const proxyReq = plugins.http.request(options, (proxyRes) => {
574
+ // Copy status code
575
+ res.statusCode = proxyRes.statusCode || 500;
576
+ // Copy headers
577
+ for (const [key, value] of Object.entries(proxyRes.headers)) {
578
+ if (value)
579
+ res.setHeader(key, value);
580
+ }
581
+ // Pipe response data
582
+ proxyRes.pipe(res);
583
+ this.emit(Port80HandlerEvents.REQUEST_FORWARDED, {
584
+ domain,
585
+ requestType,
586
+ target: `${target.ip}:${target.port}`,
587
+ statusCode: proxyRes.statusCode
588
+ });
589
+ });
590
+ proxyReq.on('error', (error) => {
591
+ console.error(`Error forwarding request to ${target.ip}:${target.port}:`, error);
592
+ if (!res.headersSent) {
593
+ res.statusCode = 502;
594
+ res.end(`Proxy error: ${error.message}`);
595
+ }
596
+ else {
597
+ res.end();
598
+ }
599
+ });
600
+ // Pipe original request to proxy request
601
+ if (req.readable) {
602
+ req.pipe(proxyReq);
603
+ }
604
+ else {
605
+ proxyReq.end();
606
+ }
607
+ }
608
+ /**
609
+ * Serves the ACME HTTP-01 challenge response
610
+ * @param req The HTTP request
611
+ * @param res The HTTP response
612
+ * @param domain The domain for the challenge
613
+ */
614
+ handleAcmeChallenge(req, res, domain) {
615
+ const domainInfo = this.domainCertificates.get(domain);
616
+ if (!domainInfo) {
617
+ res.statusCode = 404;
618
+ res.end('Domain not configured');
619
+ return;
620
+ }
621
+ // The token is the last part of the URL
622
+ const urlParts = req.url?.split('/');
623
+ const token = urlParts ? urlParts[urlParts.length - 1] : '';
624
+ if (domainInfo.challengeToken === token && domainInfo.challengeKeyAuthorization) {
625
+ res.statusCode = 200;
626
+ res.setHeader('Content-Type', 'text/plain');
627
+ res.end(domainInfo.challengeKeyAuthorization);
628
+ console.log(`Served ACME challenge response for ${domain}`);
629
+ }
630
+ else {
631
+ res.statusCode = 404;
632
+ res.end('Challenge token not found');
633
+ }
634
+ }
635
+ /**
636
+ * Obtains a certificate for a domain using ACME HTTP-01 challenge
637
+ * @param domain The domain to obtain a certificate for
638
+ * @param isRenewal Whether this is a renewal attempt
639
+ */
640
+ async obtainCertificate(domain, isRenewal = false) {
641
+ // Don't allow certificate issuance for glob patterns
642
+ if (this.isGlobPattern(domain)) {
643
+ throw new CertificateError('Cannot obtain certificates for glob pattern domains', domain, isRenewal);
644
+ }
645
+ // Get the domain info
646
+ const domainInfo = this.domainCertificates.get(domain);
647
+ if (!domainInfo) {
648
+ throw new CertificateError('Domain not found', domain, isRenewal);
649
+ }
650
+ // Verify that acmeMaintenance is enabled
651
+ if (!domainInfo.options.acmeMaintenance) {
652
+ console.log(`Skipping certificate issuance for ${domain} - acmeMaintenance is disabled`);
653
+ return;
654
+ }
655
+ // Prevent concurrent certificate issuance
656
+ if (domainInfo.obtainingInProgress) {
657
+ console.log(`Certificate issuance already in progress for ${domain}`);
658
+ return;
659
+ }
660
+ domainInfo.obtainingInProgress = true;
661
+ domainInfo.lastRenewalAttempt = new Date();
662
+ try {
663
+ const client = await this.getAcmeClient();
664
+ // Create a new order for the domain
665
+ const order = await client.createOrder({
666
+ identifiers: [{ type: 'dns', value: domain }],
667
+ });
668
+ // Get the authorizations for the order
669
+ const authorizations = await client.getAuthorizations(order);
670
+ // Process each authorization
671
+ await this.processAuthorizations(client, domain, authorizations);
672
+ // Generate a CSR and private key
673
+ const [csrBuffer, privateKeyBuffer] = await plugins.acme.forge.createCsr({
674
+ commonName: domain,
675
+ });
676
+ const csr = csrBuffer.toString();
677
+ const privateKey = privateKeyBuffer.toString();
678
+ // Finalize the order with our CSR
679
+ await client.finalizeOrder(order, csr);
680
+ // Get the certificate with the full chain
681
+ const certificate = await client.getCertificate(order);
682
+ // Store the certificate and key
683
+ domainInfo.certificate = certificate;
684
+ domainInfo.privateKey = privateKey;
685
+ domainInfo.certObtained = true;
686
+ // Clear challenge data
687
+ delete domainInfo.challengeToken;
688
+ delete domainInfo.challengeKeyAuthorization;
689
+ // Extract expiry date from certificate
690
+ domainInfo.expiryDate = this.extractExpiryDateFromCertificate(certificate, domain);
691
+ console.log(`Certificate ${isRenewal ? 'renewed' : 'obtained'} for ${domain}`);
692
+ // Save the certificate to the store if enabled
693
+ if (this.options.certificateStore) {
694
+ this.saveCertificateToStore(domain, certificate, privateKey);
695
+ }
696
+ // Emit the appropriate event
697
+ const eventType = isRenewal
698
+ ? Port80HandlerEvents.CERTIFICATE_RENEWED
699
+ : Port80HandlerEvents.CERTIFICATE_ISSUED;
700
+ this.emitCertificateEvent(eventType, {
701
+ domain,
702
+ certificate,
703
+ privateKey,
704
+ expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate()
705
+ });
706
+ }
707
+ catch (error) {
708
+ // Check for rate limit errors
709
+ if (error.message && (error.message.includes('rateLimited') ||
710
+ error.message.includes('too many certificates') ||
711
+ error.message.includes('rate limit'))) {
712
+ console.error(`Rate limit reached for ${domain}. Waiting before retry.`);
713
+ }
714
+ else {
715
+ console.error(`Error during certificate issuance for ${domain}:`, error);
716
+ }
717
+ // Emit failure event
718
+ this.emit(Port80HandlerEvents.CERTIFICATE_FAILED, {
719
+ domain,
720
+ error: error.message || 'Unknown error',
721
+ isRenewal
722
+ });
723
+ throw new CertificateError(error.message || 'Certificate issuance failed', domain, isRenewal);
724
+ }
725
+ finally {
726
+ // Reset flag whether successful or not
727
+ domainInfo.obtainingInProgress = false;
728
+ }
729
+ }
730
+ /**
731
+ * Process ACME authorizations by verifying and completing challenges
732
+ * @param client ACME client
733
+ * @param domain Domain name
734
+ * @param authorizations Authorizations to process
735
+ */
736
+ async processAuthorizations(client, domain, authorizations) {
737
+ const domainInfo = this.domainCertificates.get(domain);
738
+ if (!domainInfo) {
739
+ throw new CertificateError('Domain not found during authorization', domain);
740
+ }
741
+ for (const authz of authorizations) {
742
+ const challenge = authz.challenges.find(ch => ch.type === 'http-01');
743
+ if (!challenge) {
744
+ throw new CertificateError('HTTP-01 challenge not found', domain);
745
+ }
746
+ // Get the key authorization for the challenge
747
+ const keyAuthorization = await client.getChallengeKeyAuthorization(challenge);
748
+ // Store the challenge data
749
+ domainInfo.challengeToken = challenge.token;
750
+ domainInfo.challengeKeyAuthorization = keyAuthorization;
751
+ // ACME client type definition workaround - use compatible approach
752
+ // First check if challenge verification is needed
753
+ const authzUrl = authz.url;
754
+ try {
755
+ // Check if authzUrl exists and perform verification
756
+ if (authzUrl) {
757
+ await client.verifyChallenge(authz, challenge);
758
+ }
759
+ // Complete the challenge
760
+ await client.completeChallenge(challenge);
761
+ // Wait for validation
762
+ await client.waitForValidStatus(challenge);
763
+ console.log(`HTTP-01 challenge completed for ${domain}`);
764
+ }
765
+ catch (error) {
766
+ const errorMessage = error instanceof Error ? error.message : 'Unknown challenge error';
767
+ console.error(`Challenge error for ${domain}:`, error);
768
+ throw new CertificateError(`Challenge verification failed: ${errorMessage}`, domain);
769
+ }
770
+ }
771
+ }
772
+ /**
773
+ * Starts the certificate renewal timer
774
+ */
775
+ startRenewalTimer() {
776
+ if (this.renewalTimer) {
777
+ clearInterval(this.renewalTimer);
778
+ }
779
+ // Convert hours to milliseconds
780
+ const checkInterval = this.options.renewCheckIntervalHours * 60 * 60 * 1000;
781
+ this.renewalTimer = setInterval(() => this.checkForRenewals(), checkInterval);
782
+ // Prevent the timer from keeping the process alive
783
+ if (this.renewalTimer.unref) {
784
+ this.renewalTimer.unref();
785
+ }
786
+ console.log(`Certificate renewal check scheduled every ${this.options.renewCheckIntervalHours} hours`);
787
+ }
788
+ /**
789
+ * Checks for certificates that need renewal
790
+ */
791
+ checkForRenewals() {
792
+ if (this.isShuttingDown) {
793
+ return;
794
+ }
795
+ // Skip renewal if auto-renewal is disabled
796
+ if (this.options.autoRenew === false) {
797
+ console.log('Auto-renewal is disabled, skipping certificate renewal check');
798
+ return;
799
+ }
800
+ console.log('Checking for certificates that need renewal...');
801
+ const now = new Date();
802
+ const renewThresholdMs = this.options.renewThresholdDays * 24 * 60 * 60 * 1000;
803
+ for (const [domain, domainInfo] of this.domainCertificates.entries()) {
804
+ // Skip glob patterns
805
+ if (this.isGlobPattern(domain)) {
806
+ continue;
807
+ }
808
+ // Skip domains with acmeMaintenance disabled
809
+ if (!domainInfo.options.acmeMaintenance) {
810
+ continue;
811
+ }
812
+ // Skip domains without certificates or already in renewal
813
+ if (!domainInfo.certObtained || domainInfo.obtainingInProgress) {
814
+ continue;
815
+ }
816
+ // Skip domains without expiry dates
817
+ if (!domainInfo.expiryDate) {
818
+ continue;
819
+ }
820
+ const timeUntilExpiry = domainInfo.expiryDate.getTime() - now.getTime();
821
+ // Check if certificate is near expiry
822
+ if (timeUntilExpiry <= renewThresholdMs) {
823
+ console.log(`Certificate for ${domain} expires soon, renewing...`);
824
+ const daysRemaining = Math.ceil(timeUntilExpiry / (24 * 60 * 60 * 1000));
825
+ this.emit(Port80HandlerEvents.CERTIFICATE_EXPIRING, {
826
+ domain,
827
+ expiryDate: domainInfo.expiryDate,
828
+ daysRemaining
829
+ });
830
+ // Start renewal process
831
+ this.obtainCertificate(domain, true).catch(err => {
832
+ const errorMessage = err instanceof Error ? err.message : 'Unknown error';
833
+ console.error(`Error renewing certificate for ${domain}:`, errorMessage);
834
+ });
835
+ }
836
+ }
837
+ }
838
+ /**
839
+ * Extract expiry date from certificate using a more robust approach
840
+ * @param certificate Certificate PEM string
841
+ * @param domain Domain for logging
842
+ * @returns Extracted expiry date or default
843
+ */
844
+ extractExpiryDateFromCertificate(certificate, domain) {
845
+ try {
846
+ // This is still using regex, but in a real implementation you would use
847
+ // a library like node-forge or x509 to properly parse the certificate
848
+ const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
849
+ if (matches && matches[1]) {
850
+ const expiryDate = new Date(matches[1]);
851
+ // Validate that we got a valid date
852
+ if (!isNaN(expiryDate.getTime())) {
853
+ console.log(`Certificate for ${domain} will expire on ${expiryDate.toISOString()}`);
854
+ return expiryDate;
855
+ }
856
+ }
857
+ console.warn(`Could not extract valid expiry date from certificate for ${domain}, using default`);
858
+ return this.getDefaultExpiryDate();
859
+ }
860
+ catch (error) {
861
+ console.warn(`Failed to extract expiry date from certificate for ${domain}, using default`);
862
+ return this.getDefaultExpiryDate();
863
+ }
864
+ }
865
+ /**
866
+ * Get a default expiry date (90 days from now)
867
+ * @returns Default expiry date
868
+ */
869
+ getDefaultExpiryDate() {
870
+ return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days default
871
+ }
872
+ /**
873
+ * Emits a certificate event with the certificate data
874
+ * @param eventType The event type to emit
875
+ * @param data The certificate data
876
+ */
877
+ emitCertificateEvent(eventType, data) {
878
+ this.emit(eventType, data);
879
+ }
880
+ /**
881
+ * Gets all domains and their certificate status
882
+ * @returns Map of domains to certificate status
883
+ */
884
+ getDomainCertificateStatus() {
885
+ const result = new Map();
886
+ const now = new Date();
887
+ for (const [domain, domainInfo] of this.domainCertificates.entries()) {
888
+ // Skip glob patterns
889
+ if (this.isGlobPattern(domain))
890
+ continue;
891
+ const status = {
892
+ certObtained: domainInfo.certObtained,
893
+ expiryDate: domainInfo.expiryDate,
894
+ obtainingInProgress: domainInfo.obtainingInProgress,
895
+ lastRenewalAttempt: domainInfo.lastRenewalAttempt
896
+ };
897
+ // Calculate days remaining if expiry date is available
898
+ if (domainInfo.expiryDate) {
899
+ const daysRemaining = Math.ceil((domainInfo.expiryDate.getTime() - now.getTime()) / (24 * 60 * 60 * 1000));
900
+ status.daysRemaining = daysRemaining;
901
+ }
902
+ result.set(domain, status);
903
+ }
904
+ return result;
905
+ }
906
+ /**
907
+ * Gets information about managed domains
908
+ * @returns Array of domain information
909
+ */
910
+ getManagedDomains() {
911
+ return Array.from(this.domainCertificates.entries()).map(([domain, info]) => ({
912
+ domain,
913
+ isGlobPattern: this.isGlobPattern(domain),
914
+ hasCertificate: info.certObtained,
915
+ hasForwarding: !!info.options.forward,
916
+ sslRedirect: info.options.sslRedirect,
917
+ acmeMaintenance: info.options.acmeMaintenance
918
+ }));
919
+ }
920
+ /**
921
+ * Gets configuration details
922
+ * @returns Current configuration
923
+ */
924
+ getConfig() {
925
+ return { ...this.options };
926
+ }
927
+ }
928
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.port80handler.js","sourceRoot":"","sources":["../../ts/port80handler/classes.port80handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,eAAe,EAAE,cAAc,EAAE,MAAM,MAAM,CAAC;AACvD,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAE7B;;GAEG;AACH,MAAM,OAAO,kBAAmB,SAAQ,KAAK;IAC3C,YAAY,OAAe;QACzB,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,oBAAoB,CAAC;IACnC,CAAC;CACF;AAED,MAAM,OAAO,gBAAiB,SAAQ,kBAAkB;IACtD,YACE,OAAe,EACC,MAAc,EACd,YAAqB,KAAK;QAE1C,KAAK,CAAC,GAAG,OAAO,eAAe,MAAM,GAAG,SAAS,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAHzD,WAAM,GAAN,MAAM,CAAQ;QACd,cAAS,GAAT,SAAS,CAAiB;QAG1C,IAAI,CAAC,IAAI,GAAG,kBAAkB,CAAC;IACjC,CAAC;CACF;AAED,MAAM,OAAO,WAAY,SAAQ,kBAAkB;IACjD,YAAY,OAAe,EAAkB,IAAa;QACxD,KAAK,CAAC,OAAO,CAAC,CAAC;QAD4B,SAAI,GAAJ,IAAI,CAAS;QAExD,IAAI,CAAC,IAAI,GAAG,aAAa,CAAC;IAC5B,CAAC;CACF;AA8DD;;GAEG;AACH,MAAM,CAAN,IAAY,mBAQX;AARD,WAAY,mBAAmB;IAC7B,gEAAyC,CAAA;IACzC,kEAA2C,CAAA;IAC3C,gEAAyC,CAAA;IACzC,oEAA6C,CAAA;IAC7C,0DAAmC,CAAA;IACnC,0DAAmC,CAAA;IACnC,8DAAuC,CAAA;AACzC,CAAC,EARW,mBAAmB,KAAnB,mBAAmB,QAQ9B;AAoBD;;;GAGG;AACH,MAAM,OAAO,aAAc,SAAQ,OAAO,CAAC,YAAY;IASrD;;;OAGG;IACH,YAAY,UAAiC,EAAE;QAC7C,KAAK,EAAE,CAAC;QAZF,WAAM,GAA+B,IAAI,CAAC;QAC1C,eAAU,GAA+B,IAAI,CAAC;QAC9C,eAAU,GAAkB,IAAI,CAAC;QACjC,iBAAY,GAA0B,IAAI,CAAC;QAC3C,mBAAc,GAAY,KAAK,CAAC;QAStC,IAAI,CAAC,kBAAkB,GAAG,IAAI,GAAG,EAA8B,CAAC;QAEhE,kBAAkB;QAClB,IAAI,CAAC,OAAO,GAAG;YACb,IAAI,EAAE,OAAO,CAAC,IAAI,IAAI,EAAE;YACxB,YAAY,EAAE,OAAO,CAAC,YAAY,IAAI,mBAAmB;YACzD,aAAa,EAAE,OAAO,CAAC,aAAa,IAAI,KAAK,EAAE,yBAAyB;YACxE,kBAAkB,EAAE,OAAO,CAAC,kBAAkB,IAAI,EAAE,EAAE,yCAAyC;YAC/F,iBAAiB,EAAE,OAAO,CAAC,iBAAiB,IAAI,GAAG;YACnD,uBAAuB,EAAE,OAAO,CAAC,uBAAuB,IAAI,EAAE;YAC9D,OAAO,EAAE,OAAO,CAAC,OAAO,IAAI,IAAI,EAAE,oBAAoB;YACtD,SAAS,EAAE,OAAO,CAAC,SAAS,IAAI,IAAI,EAAE,wBAAwB;YAC9D,gBAAgB,EAAE,OAAO,CAAC,gBAAgB,IAAI,SAAS,EAAE,yBAAyB;YAClF,mBAAmB,EAAE,OAAO,CAAC,mBAAmB,IAAI,KAAK;SAC1D,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChB,MAAM,IAAI,WAAW,CAAC,2BAA2B,CAAC,CAAC;QACrD,CAAC;QAED,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,MAAM,IAAI,WAAW,CAAC,yBAAyB,CAAC,CAAC;QACnD,CAAC;QAED,mBAAmB;QACnB,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,KAAK,KAAK,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,2CAA2C,CAAC,CAAC;YACzD,OAAO;QACT,CAAC;QAED,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YACrC,IAAI,CAAC;gBACH,0CAA0C;gBAC1C,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;oBAClC,IAAI,CAAC,yBAAyB,EAAE,CAAC;gBACnC,CAAC;gBAED,IAAI,CAAC,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;gBAEpF,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAA4B,EAAE,EAAE;oBACvD,IAAI,KAAK,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;wBAC5B,MAAM,CAAC,IAAI,WAAW,CAAC,qCAAqC,IAAI,CAAC,OAAO,CAAC,IAAI,8DAA8D,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC5J,CAAC;yBAAM,IAAI,KAAK,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;wBACvC,MAAM,CAAC,IAAI,WAAW,CAAC,QAAQ,IAAI,CAAC,OAAO,CAAC,IAAI,qBAAqB,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;oBACtF,CAAC;yBAAM,CAAC;wBACN,MAAM,CAAC,IAAI,WAAW,CAAC,KAAK,CAAC,OAAO,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;oBACrD,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,EAAE;oBACzC,OAAO,CAAC,GAAG,CAAC,sCAAsC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;oBACvE,IAAI,CAAC,iBAAiB,EAAE,CAAC;oBACzB,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;oBAElE,qEAAqE;oBACrE,KAAK,MAAM,CAAC,MAAM,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;wBACrE,8CAA8C;wBAC9C,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;4BAC/B,OAAO,CAAC,GAAG,CAAC,kDAAkD,MAAM,EAAE,CAAC,CAAC;4BACxE,SAAS;wBACX,CAAC;wBAED,IAAI,UAAU,CAAC,OAAO,CAAC,eAAe,IAAI,CAAC,UAAU,CAAC,YAAY,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;4BACtG,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;gCACzC,OAAO,CAAC,KAAK,CAAC,2CAA2C,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;4BAC3E,CAAC,CAAC,CAAC;wBACL,CAAC;oBACH,CAAC;oBAED,OAAO,EAAE,CAAC;gBACZ,CAAC,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,OAAO,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,+BAA+B,CAAC;gBACzF,MAAM,CAAC,IAAI,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC;YACnC,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;YACjB,OAAO;QACT,CAAC;QAED,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAE3B,yBAAyB;QACzB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;QAC3B,CAAC;QAED,OAAO,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;YACnC,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;gBAChB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE;oBACrB,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC;oBACnB,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;oBAC5B,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,eAAe,CAAC,CAAC;oBAC/C,OAAO,EAAE,CAAC;gBACZ,CAAC,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC;gBAC5B,OAAO,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,OAAuB;QACtC,IAAI,CAAC,OAAO,CAAC,UAAU,IAAI,OAAO,OAAO,CAAC,UAAU,KAAK,QAAQ,EAAE,CAAC;YAClE,MAAM,IAAI,kBAAkB,CAAC,qBAAqB,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;QAEtC,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,UAAU,CAAC,EAAE,CAAC;YAC7C,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,UAAU,EAAE;gBACtC,OAAO;gBACP,YAAY,EAAE,KAAK;gBACnB,mBAAmB,EAAE,KAAK;aAC3B,CAAC,CAAC;YAEH,OAAO,CAAC,GAAG,CAAC,iBAAiB,UAAU,sBAAsB,EAAE;gBAC7D,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,eAAe,EAAE,OAAO,CAAC,eAAe;gBACxC,UAAU,EAAE,CAAC,CAAC,OAAO,CAAC,OAAO;gBAC7B,cAAc,EAAE,CAAC,CAAC,OAAO,CAAC,WAAW;aACtC,CAAC,CAAC;YAEH,8FAA8F;YAC9F,IAAI,OAAO,CAAC,eAAe,IAAI,IAAI,CAAC,MAAM,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,EAAE,CAAC;gBAC9E,IAAI,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;oBAC7C,OAAO,CAAC,KAAK,CAAC,2CAA2C,UAAU,GAAG,EAAE,GAAG,CAAC,CAAC;gBAC/E,CAAC,CAAC,CAAC;YACL,CAAC;QACH,CAAC;aAAM,CAAC;YACN,0CAA0C;YAC1C,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,UAAU,CAAE,CAAC;YAC1D,QAAQ,CAAC,OAAO,GAAG,OAAO,CAAC;YAC3B,OAAO,CAAC,GAAG,CAAC,UAAU,UAAU,wBAAwB,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,YAAY,CAAC,MAAc;QAChC,IAAI,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;YAC3C,OAAO,CAAC,GAAG,CAAC,mBAAmB,MAAM,EAAE,CAAC,CAAC;QAC3C,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACI,cAAc,CAAC,MAAc,EAAE,WAAmB,EAAE,UAAkB,EAAE,UAAiB;QAC9F,IAAI,CAAC,MAAM,IAAI,CAAC,WAAW,IAAI,CAAC,UAAU,EAAE,CAAC;YAC3C,MAAM,IAAI,kBAAkB,CAAC,iDAAiD,CAAC,CAAC;QAClF,CAAC;QAED,qDAAqD;QACrD,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,MAAM,IAAI,kBAAkB,CAAC,iDAAiD,CAAC,CAAC;QAClF,CAAC;QAED,IAAI,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QAErD,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,0DAA0D;YAC1D,MAAM,cAAc,GAAmB;gBACrC,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;aACtB,CAAC;YAEF,UAAU,GAAG;gBACX,OAAO,EAAE,cAAc;gBACvB,YAAY,EAAE,KAAK;gBACnB,mBAAmB,EAAE,KAAK;aAC3B,CAAC;YACF,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,CAAC,CAAC;QAClD,CAAC;QAED,UAAU,CAAC,WAAW,GAAG,WAAW,CAAC;QACrC,UAAU,CAAC,UAAU,GAAG,UAAU,CAAC;QACnC,UAAU,CAAC,YAAY,GAAG,IAAI,CAAC;QAC/B,UAAU,CAAC,mBAAmB,GAAG,KAAK,CAAC;QAEvC,IAAI,UAAU,EAAE,CAAC;YACf,UAAU,CAAC,UAAU,GAAG,UAAU,CAAC;QACrC,CAAC;aAAM,CAAC;YACN,uCAAuC;YACvC,UAAU,CAAC,UAAU,GAAG,IAAI,CAAC,gCAAgC,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;QACrF,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,uBAAuB,MAAM,EAAE,CAAC,CAAC;QAE7C,uCAAuC;QACvC,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;YAClC,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,UAAU,CAAC,CAAC;QAC/D,CAAC;QAED,yBAAyB;QACzB,IAAI,CAAC,oBAAoB,CAAC,mBAAmB,CAAC,kBAAkB,EAAE;YAChE,MAAM;YACN,WAAW;YACX,UAAU;YACV,UAAU,EAAE,UAAU,CAAC,UAAU,IAAI,IAAI,CAAC,oBAAoB,EAAE;SACjE,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACI,cAAc,CAAC,MAAc;QAClC,2CAA2C;QAC3C,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QAEvD,IAAI,CAAC,UAAU,IAAI,CAAC,UAAU,CAAC,YAAY,IAAI,CAAC,UAAU,CAAC,WAAW,IAAI,CAAC,UAAU,CAAC,UAAU,EAAE,CAAC;YACjG,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO;YACL,MAAM;YACN,WAAW,EAAE,UAAU,CAAC,WAAW;YACnC,UAAU,EAAE,UAAU,CAAC,UAAU;YACjC,UAAU,EAAE,UAAU,CAAC,UAAU,IAAI,IAAI,CAAC,oBAAoB,EAAE;SACjE,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACK,sBAAsB,CAAC,MAAc,EAAE,WAAmB,EAAE,UAAkB;QACpF,2CAA2C;QAC3C,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,gBAAgB;YAAE,OAAO;QAE3C,IAAI,CAAC;YACH,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAAC;YAEhD,8BAA8B;YAC9B,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;gBAC9B,EAAE,CAAC,SAAS,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC7C,OAAO,CAAC,GAAG,CAAC,wCAAwC,SAAS,EAAE,CAAC,CAAC;YACnE,CAAC;YAED,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,MAAM,WAAW,CAAC,CAAC;YAC5D,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,MAAM,UAAU,CAAC,CAAC;YAE1D,0CAA0C;YAC1C,EAAE,CAAC,aAAa,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;YACxC,EAAE,CAAC,aAAa,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;YAEtC,yCAAyC;YACzC,IAAI,CAAC;gBACH,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAC/B,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gDAAgD,OAAO,EAAE,CAAC,CAAC;YACzE,CAAC;YAED,OAAO,CAAC,GAAG,CAAC,yBAAyB,MAAM,OAAO,QAAQ,EAAE,CAAC,CAAC;QAChE,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,gCAAgC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,yBAAyB;QAC/B,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,gBAAgB;YAAE,OAAO;QAE3C,IAAI,CAAC;YACH,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAAC;YAEhD,8BAA8B;YAC9B,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;gBAC9B,EAAE,CAAC,SAAS,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC7C,OAAO,CAAC,GAAG,CAAC,wCAAwC,SAAS,EAAE,CAAC,CAAC;gBACjE,OAAO;YACT,CAAC;YAED,gCAAgC;YAChC,MAAM,KAAK,GAAG,EAAE,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC;YACxC,MAAM,SAAS,GAAG,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,CAAC;YAEnE,wBAAwB;YACxB,KAAK,MAAM,QAAQ,IAAI,SAAS,EAAE,CAAC;gBACjC,MAAM,MAAM,GAAG,QAAQ,CAAC,OAAO,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;gBACjD,MAAM,OAAO,GAAG,GAAG,MAAM,UAAU,CAAC;gBAEpC,iCAAiC;gBACjC,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC7B,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,kBAAkB,CAAC,CAAC;oBACxE,SAAS;gBACX,CAAC;gBAED,0CAA0C;gBAC1C,IAAI,IAAI,CAAC,OAAO,CAAC,mBAAmB,EAAE,CAAC;oBACrC,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;oBACvD,IAAI,UAAU,IAAI,UAAU,CAAC,YAAY,EAAE,CAAC;wBAC1C,OAAO,CAAC,GAAG,CAAC,+CAA+C,MAAM,EAAE,CAAC,CAAC;wBACrE,SAAS;oBACX,CAAC;gBACH,CAAC;gBAED,2BAA2B;gBAC3B,IAAI,CAAC;oBACH,MAAM,WAAW,GAAG,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,QAAQ,CAAC,EAAE,MAAM,CAAC,CAAC;oBAC5E,MAAM,UAAU,GAAG,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,OAAO,CAAC,EAAE,MAAM,CAAC,CAAC;oBAE1E,sBAAsB;oBACtB,IAAI,UAA4B,CAAC;oBACjC,IAAI,CAAC;wBACH,MAAM,OAAO,GAAG,WAAW,CAAC,KAAK,CAAC,gCAAgC,CAAC,CAAC;wBACpE,IAAI,OAAO,IAAI,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;4BAC1B,UAAU,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;wBACpC,CAAC;oBACH,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,OAAO,CAAC,GAAG,CAAC,+DAA+D,MAAM,EAAE,CAAC,CAAC;oBACvF,CAAC;oBAED,wCAAwC;oBACxC,IAAI,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;oBACrD,IAAI,CAAC,UAAU,EAAE,CAAC;wBAChB,4CAA4C;wBAC5C,UAAU,GAAG;4BACX,OAAO,EAAE;gCACP,UAAU,EAAE,MAAM;gCAClB,WAAW,EAAE,IAAI;gCACjB,eAAe,EAAE,IAAI;6BACtB;4BACD,YAAY,EAAE,KAAK;4BACnB,mBAAmB,EAAE,KAAK;yBAC3B,CAAC;wBACF,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,CAAC,CAAC;oBAClD,CAAC;oBAED,kBAAkB;oBAClB,UAAU,CAAC,WAAW,GAAG,WAAW,CAAC;oBACrC,UAAU,CAAC,UAAU,GAAG,UAAU,CAAC;oBACnC,UAAU,CAAC,YAAY,GAAG,IAAI,CAAC;oBAC/B,UAAU,CAAC,UAAU,GAAG,UAAU,CAAC;oBAEnC,OAAO,CAAC,GAAG,CAAC,0BAA0B,MAAM,4BAA4B,UAAU,EAAE,WAAW,EAAE,IAAI,SAAS,EAAE,CAAC,CAAC;gBACpH,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,OAAO,CAAC,KAAK,CAAC,iCAAiC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;gBACjE,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,KAAK,CAAC,wCAAwC,EAAE,GAAG,CAAC,CAAC;QAC/D,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,aAAa,CAAC,MAAc;QAClC,OAAO,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACK,uBAAuB,CAAC,aAAqB;QACnD,yBAAyB;QACzB,IAAI,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,aAAa,CAAC,EAAE,CAAC;YAC/C,OAAO;gBACL,UAAU,EAAE,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,aAAa,CAAE;gBACvD,OAAO,EAAE,aAAa;aACvB,CAAC;QACJ,CAAC;QAED,yBAAyB;QACzB,KAAK,MAAM,CAAC,OAAO,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;YACtE,IAAI,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,oBAAoB,CAAC,aAAa,EAAE,OAAO,CAAC,EAAE,CAAC;gBACrF,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE,CAAC;YACjC,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;OAKG;IACK,oBAAoB,CAAC,MAAc,EAAE,OAAe;QAC1D,uCAAuC;QACvC,IAAI,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;YAC7B,sCAAsC;YACtC,MAAM,MAAM,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;YACpC,OAAO,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,MAAM,KAAK,MAAM,CAAC;QAC9E,CAAC;aAAM,IAAI,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;YAClC,4BAA4B;YAC5B,MAAM,MAAM,GAAG,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE,OAAO,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;YACxD,MAAM,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACtC,OAAO,MAAM,CAAC,UAAU,CAAC,MAAM,GAAG,GAAG,CAAC,IAAI,WAAW,CAAC,MAAM,IAAI,CAAC,CAAC;QACpE,CAAC;aAAM,IAAI,OAAO,KAAK,GAAG,EAAE,CAAC;YAC3B,8BAA8B;YAC9B,OAAO,IAAI,CAAC;QACd,CAAC;aAAM,CAAC;YACN,qEAAqE;YACrE,OAAO,MAAM,KAAK,OAAO,CAAC;QAC5B,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,aAAa;QACzB,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,UAAU,CAAC;QACzB,CAAC;QAED,IAAI,CAAC;YACH,6BAA6B;YAC7B,IAAI,CAAC,UAAU,GAAG,CAAC,MAAM,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;YAE3E,IAAI,CAAC,UAAU,GAAG,IAAI,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC;gBACxC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,aAAa;oBACtC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,UAAU;oBAC/C,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,OAAO;gBAC9C,UAAU,EAAE,IAAI,CAAC,UAAU;aAC5B,CAAC,CAAC;YAEH,uBAAuB;YACvB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC;gBAClC,oBAAoB,EAAE,IAAI;gBAC1B,OAAO,EAAE,CAAC,UAAU,IAAI,CAAC,OAAO,CAAC,YAAY,EAAE,CAAC;aACjD,CAAC,CAAC;YAEH,OAAO,IAAI,CAAC,UAAU,CAAC;QACzB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,OAAO,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,wCAAwC,CAAC;YAClG,MAAM,IAAI,kBAAkB,CAAC,qCAAqC,OAAO,EAAE,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,aAAa,CAAC,GAAiC,EAAE,GAAgC;QACvF,MAAM,UAAU,GAAG,GAAG,CAAC,OAAO,CAAC,IAAI,CAAC;QACpC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;YACrB,GAAG,CAAC,GAAG,CAAC,qCAAqC,CAAC,CAAC;YAC/C,OAAO;QACT,CAAC;QAED,wDAAwD;QACxD,MAAM,MAAM,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAExC,2DAA2D;QAC3D,MAAM,WAAW,GAAG,IAAI,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;QAEzD,IAAI,CAAC,WAAW,EAAE,CAAC;YACjB,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;YACrB,GAAG,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;YACjC,OAAO;QACT,CAAC;QAED,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,GAAG,WAAW,CAAC;QAC5C,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC;QAEnC,6DAA6D;QAC7D,IAAI,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,GAAG,CAAC,UAAU,CAAC,8BAA8B,CAAC,IAAI,CAAC,OAAO,CAAC,eAAe,IAAI,OAAO,CAAC,WAAW,CAAC,EAAE,CAAC;YACtH,2CAA2C;YAC3C,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;gBACxB,IAAI,CAAC,cAAc,CAAC,GAAG,EAAE,GAAG,EAAE,OAAO,CAAC,WAAW,EAAE,gBAAgB,CAAC,CAAC;gBACrE,OAAO;YACT,CAAC;YAED,oDAAoD;YACpD,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,EAAE,CAAC;gBACjC,IAAI,CAAC,mBAAmB,CAAC,GAAG,EAAE,GAAG,EAAE,MAAM,CAAC,CAAC;gBAC3C,OAAO;YACT,CAAC;QACH,CAAC;QAED,+CAA+C;QAC/C,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACpB,IAAI,CAAC,cAAc,CAAC,GAAG,EAAE,GAAG,EAAE,OAAO,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;YACvD,OAAO;QACT,CAAC;QAED,sEAAsE;QACtE,2DAA2D;QAC3D,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,YAAY,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;YACnF,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;YACjD,MAAM,UAAU,GAAG,SAAS,KAAK,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,SAAS,EAAE,CAAC;YAC5D,MAAM,WAAW,GAAG,WAAW,MAAM,GAAG,UAAU,GAAG,GAAG,CAAC,GAAG,IAAI,GAAG,EAAE,CAAC;YAEtE,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;YACrB,GAAG,CAAC,SAAS,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC;YACvC,GAAG,CAAC,GAAG,CAAC,kBAAkB,WAAW,EAAE,CAAC,CAAC;YACzC,OAAO;QACT,CAAC;QAED,4EAA4E;QAC5E,2DAA2D;QAC3D,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,OAAO,CAAC,eAAe,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACxF,sDAAsD;YACtD,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;gBACpC,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;oBACzC,MAAM,YAAY,GAAG,GAAG,YAAY,KAAK,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,eAAe,CAAC;oBAC1E,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,kBAAkB,EAAE;wBAChD,MAAM;wBACN,KAAK,EAAE,YAAY;wBACnB,SAAS,EAAE,KAAK;qBACjB,CAAC,CAAC;oBACH,OAAO,CAAC,KAAK,CAAC,mCAAmC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;gBACnE,CAAC,CAAC,CAAC;YACL,CAAC;YAED,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;YACrB,GAAG,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACrE,OAAO;QACT,CAAC;QAED,yCAAyC;QACzC,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;QACrB,GAAG,CAAC,GAAG,CAAC,yCAAyC,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;OAMG;IACK,cAAc,CACpB,GAAiC,EACjC,GAAgC,EAChC,MAAsB,EACtB,WAAmB;QAEnB,MAAM,OAAO,GAAG;YACd,QAAQ,EAAE,MAAM,CAAC,EAAE;YACnB,IAAI,EAAE,MAAM,CAAC,IAAI;YACjB,IAAI,EAAE,GAAG,CAAC,GAAG;YACb,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,OAAO,EAAE,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE;SAC5B,CAAC;QAEF,MAAM,MAAM,GAAG,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,SAAS,CAAC;QAC5D,OAAO,CAAC,GAAG,CAAC,cAAc,WAAW,gBAAgB,MAAM,OAAO,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QAE9F,MAAM,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;YAC1D,mBAAmB;YACnB,GAAG,CAAC,UAAU,GAAG,QAAQ,CAAC,UAAU,IAAI,GAAG,CAAC;YAE5C,eAAe;YACf,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC5D,IAAI,KAAK;oBAAE,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YACvC,CAAC;YAED,qBAAqB;YACrB,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAEnB,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,EAAE;gBAC/C,MAAM;gBACN,WAAW;gBACX,MAAM,EAAE,GAAG,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,IAAI,EAAE;gBACrC,UAAU,EAAE,QAAQ,CAAC,UAAU;aAChC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC7B,OAAO,CAAC,KAAK,CAAC,+BAA+B,MAAM,CAAC,EAAE,IAAI,MAAM,CAAC,IAAI,GAAG,EAAE,KAAK,CAAC,CAAC;YACjF,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC;gBACrB,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;gBACrB,GAAG,CAAC,GAAG,CAAC,gBAAgB,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC3C,CAAC;iBAAM,CAAC;gBACN,GAAG,CAAC,GAAG,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,yCAAyC;QACzC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;YACjB,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,QAAQ,CAAC,GAAG,EAAE,CAAC;QACjB,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,mBAAmB,CAAC,GAAiC,EAAE,GAAgC,EAAE,MAAc;QAC7G,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACvD,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;YACrB,GAAG,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;YACjC,OAAO;QACT,CAAC;QAED,wCAAwC;QACxC,MAAM,QAAQ,GAAG,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC;QACrC,MAAM,KAAK,GAAG,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAE5D,IAAI,UAAU,CAAC,cAAc,KAAK,KAAK,IAAI,UAAU,CAAC,yBAAyB,EAAE,CAAC;YAChF,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;YACrB,GAAG,CAAC,SAAS,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC;YAC5C,GAAG,CAAC,GAAG,CAAC,UAAU,CAAC,yBAAyB,CAAC,CAAC;YAC9C,OAAO,CAAC,GAAG,CAAC,sCAAsC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;aAAM,CAAC;YACN,GAAG,CAAC,UAAU,GAAG,GAAG,CAAC;YACrB,GAAG,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;QACvC,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,iBAAiB,CAAC,MAAc,EAAE,YAAqB,KAAK;QACxE,qDAAqD;QACrD,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,MAAM,IAAI,gBAAgB,CAAC,qDAAqD,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QACvG,CAAC;QAED,sBAAsB;QACtB,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACvD,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,gBAAgB,CAAC,kBAAkB,EAAE,MAAM,EAAE,SAAS,CAAC,CAAC;QACpE,CAAC;QAED,yCAAyC;QACzC,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CAAC,qCAAqC,MAAM,gCAAgC,CAAC,CAAC;YACzF,OAAO;QACT,CAAC;QAED,0CAA0C;QAC1C,IAAI,UAAU,CAAC,mBAAmB,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,gDAAgD,MAAM,EAAE,CAAC,CAAC;YACtE,OAAO;QACT,CAAC;QAED,UAAU,CAAC,mBAAmB,GAAG,IAAI,CAAC;QACtC,UAAU,CAAC,kBAAkB,GAAG,IAAI,IAAI,EAAE,CAAC;QAE3C,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,aAAa,EAAE,CAAC;YAE1C,oCAAoC;YACpC,MAAM,KAAK,GAAG,MAAM,MAAM,CAAC,WAAW,CAAC;gBACrC,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,uCAAuC;YACvC,MAAM,cAAc,GAAG,MAAM,MAAM,CAAC,iBAAiB,CAAC,KAAK,CAAC,CAAC;YAE7D,6BAA6B;YAC7B,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,EAAE,MAAM,EAAE,cAAc,CAAC,CAAC;YAEjE,iCAAiC;YACjC,MAAM,CAAC,SAAS,EAAE,gBAAgB,CAAC,GAAG,MAAM,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC;gBACvE,UAAU,EAAE,MAAM;aACnB,CAAC,CAAC;YAEH,MAAM,GAAG,GAAG,SAAS,CAAC,QAAQ,EAAE,CAAC;YACjC,MAAM,UAAU,GAAG,gBAAgB,CAAC,QAAQ,EAAE,CAAC;YAE/C,kCAAkC;YAClC,MAAM,MAAM,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAEvC,0CAA0C;YAC1C,MAAM,WAAW,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEvD,gCAAgC;YAChC,UAAU,CAAC,WAAW,GAAG,WAAW,CAAC;YACrC,UAAU,CAAC,UAAU,GAAG,UAAU,CAAC;YACnC,UAAU,CAAC,YAAY,GAAG,IAAI,CAAC;YAE/B,uBAAuB;YACvB,OAAO,UAAU,CAAC,cAAc,CAAC;YACjC,OAAO,UAAU,CAAC,yBAAyB,CAAC;YAE5C,uCAAuC;YACvC,UAAU,CAAC,UAAU,GAAG,IAAI,CAAC,gCAAgC,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;YAEnF,OAAO,CAAC,GAAG,CAAC,eAAe,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,UAAU,QAAQ,MAAM,EAAE,CAAC,CAAC;YAE/E,+CAA+C;YAC/C,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;gBAClC,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,UAAU,CAAC,CAAC;YAC/D,CAAC;YAED,6BAA6B;YAC7B,MAAM,SAAS,GAAG,SAAS;gBACzB,CAAC,CAAC,mBAAmB,CAAC,mBAAmB;gBACzC,CAAC,CAAC,mBAAmB,CAAC,kBAAkB,CAAC;YAE3C,IAAI,CAAC,oBAAoB,CAAC,SAAS,EAAE;gBACnC,MAAM;gBACN,WAAW;gBACX,UAAU;gBACV,UAAU,EAAE,UAAU,CAAC,UAAU,IAAI,IAAI,CAAC,oBAAoB,EAAE;aACjE,CAAC,CAAC;QAEL,CAAC;QAAC,OAAO,KAAU,EAAE,CAAC;YACpB,8BAA8B;YAC9B,IAAI,KAAK,CAAC,OAAO,IAAI,CACnB,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC;gBACrC,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,uBAAuB,CAAC;gBAC/C,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAC,CACrC,EAAE,CAAC;gBACF,OAAO,CAAC,KAAK,CAAC,0BAA0B,MAAM,yBAAyB,CAAC,CAAC;YAC3E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,KAAK,CAAC,yCAAyC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;YAC3E,CAAC;YAED,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,kBAAkB,EAAE;gBAChD,MAAM;gBACN,KAAK,EAAE,KAAK,CAAC,OAAO,IAAI,eAAe;gBACvC,SAAS;aACa,CAAC,CAAC;YAE1B,MAAM,IAAI,gBAAgB,CACxB,KAAK,CAAC,OAAO,IAAI,6BAA6B,EAC9C,MAAM,EACN,SAAS,CACV,CAAC;QACJ,CAAC;gBAAS,CAAC;YACT,uCAAuC;YACvC,UAAU,CAAC,mBAAmB,GAAG,KAAK,CAAC;QACzC,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,qBAAqB,CACjC,MAA2B,EAC3B,MAAc,EACd,cAA4C;QAE5C,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACvD,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,gBAAgB,CAAC,uCAAuC,EAAE,MAAM,CAAC,CAAC;QAC9E,CAAC;QAED,KAAK,MAAM,KAAK,IAAI,cAAc,EAAE,CAAC;YACnC,MAAM,SAAS,GAAG,KAAK,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;YACrE,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,gBAAgB,CAAC,6BAA6B,EAAE,MAAM,CAAC,CAAC;YACpE,CAAC;YAED,8CAA8C;YAC9C,MAAM,gBAAgB,GAAG,MAAM,MAAM,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YAE9E,2BAA2B;YAC3B,UAAU,CAAC,cAAc,GAAG,SAAS,CAAC,KAAK,CAAC;YAC5C,UAAU,CAAC,yBAAyB,GAAG,gBAAgB,CAAC;YAExD,mEAAmE;YACnE,kDAAkD;YAClD,MAAM,QAAQ,GAAG,KAAK,CAAC,GAAG,CAAC;YAE3B,IAAI,CAAC;gBACH,oDAAoD;gBACpD,IAAI,QAAQ,EAAE,CAAC;oBACb,MAAM,MAAM,CAAC,eAAe,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;gBACjD,CAAC;gBAED,yBAAyB;gBACzB,MAAM,MAAM,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;gBAE1C,sBAAsB;gBACtB,MAAM,MAAM,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;gBAC3C,OAAO,CAAC,GAAG,CAAC,mCAAmC,MAAM,EAAE,CAAC,CAAC;YAC3D,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,YAAY,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,yBAAyB,CAAC;gBACxF,OAAO,CAAC,KAAK,CAAC,uBAAuB,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;gBACvD,MAAM,IAAI,gBAAgB,CAAC,kCAAkC,YAAY,EAAE,EAAE,MAAM,CAAC,CAAC;YACvF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;QACnC,CAAC;QAED,gCAAgC;QAChC,MAAM,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,uBAAuB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;QAE5E,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,gBAAgB,EAAE,EAAE,aAAa,CAAC,CAAC;QAE9E,mDAAmD;QACnD,IAAI,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAC5B,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;QAC5B,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,6CAA6C,IAAI,CAAC,OAAO,CAAC,uBAAuB,QAAQ,CAAC,CAAC;IACzG,CAAC;IAED;;OAEG;IACK,gBAAgB;QACtB,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,OAAO;QACT,CAAC;QAED,2CAA2C;QAC3C,IAAI,IAAI,CAAC,OAAO,CAAC,SAAS,KAAK,KAAK,EAAE,CAAC;YACrC,OAAO,CAAC,GAAG,CAAC,8DAA8D,CAAC,CAAC;YAC5E,OAAO;QACT,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;QAE9D,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,gBAAgB,GAAG,IAAI,CAAC,OAAO,CAAC,kBAAkB,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;QAE/E,KAAK,MAAM,CAAC,MAAM,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;YACrE,qBAAqB;YACrB,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC/B,SAAS;YACX,CAAC;YAED,6CAA6C;YAC7C,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;gBACxC,SAAS;YACX,CAAC;YAED,0DAA0D;YAC1D,IAAI,CAAC,UAAU,CAAC,YAAY,IAAI,UAAU,CAAC,mBAAmB,EAAE,CAAC;gBAC/D,SAAS;YACX,CAAC;YAED,oCAAoC;YACpC,IAAI,CAAC,UAAU,CAAC,UAAU,EAAE,CAAC;gBAC3B,SAAS;YACX,CAAC;YAED,MAAM,eAAe,GAAG,UAAU,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;YAExE,sCAAsC;YACtC,IAAI,eAAe,IAAI,gBAAgB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,mBAAmB,MAAM,4BAA4B,CAAC,CAAC;gBAEnE,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,eAAe,GAAG,CAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC;gBAEzE,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,oBAAoB,EAAE;oBAClD,MAAM;oBACN,UAAU,EAAE,UAAU,CAAC,UAAU;oBACjC,aAAa;iBACU,CAAC,CAAC;gBAE3B,wBAAwB;gBACxB,IAAI,CAAC,iBAAiB,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;oBAC/C,MAAM,YAAY,GAAG,GAAG,YAAY,KAAK,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,eAAe,CAAC;oBAC1E,OAAO,CAAC,KAAK,CAAC,kCAAkC,MAAM,GAAG,EAAE,YAAY,CAAC,CAAC;gBAC3E,CAAC,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,gCAAgC,CAAC,WAAmB,EAAE,MAAc;QAC1E,IAAI,CAAC;YACH,wEAAwE;YACxE,sEAAsE;YACtE,MAAM,OAAO,GAAG,WAAW,CAAC,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACpE,IAAI,OAAO,IAAI,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC1B,MAAM,UAAU,GAAG,IAAI,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;gBAExC,oCAAoC;gBACpC,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC,EAAE,CAAC;oBACjC,OAAO,CAAC,GAAG,CAAC,mBAAmB,MAAM,mBAAmB,UAAU,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;oBACpF,OAAO,UAAU,CAAC;gBACpB,CAAC;YACH,CAAC;YAED,OAAO,CAAC,IAAI,CAAC,4DAA4D,MAAM,iBAAiB,CAAC,CAAC;YAClG,OAAO,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACrC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,IAAI,CAAC,sDAAsD,MAAM,iBAAiB,CAAC,CAAC;YAC5F,OAAO,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACrC,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,oBAAoB;QAC1B,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,kBAAkB;IAC5E,CAAC;IAED;;;;OAIG;IACK,oBAAoB,CAAC,SAA8B,EAAE,IAAsB;QACjF,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IAC7B,CAAC;IAED;;;OAGG;IACI,0BAA0B;QAO/B,MAAM,MAAM,GAAG,IAAI,GAAG,EAMlB,CAAC;QAEL,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QAEvB,KAAK,MAAM,CAAC,MAAM,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;YACrE,qBAAqB;YACrB,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC;gBAAE,SAAS;YAEzC,MAAM,MAAM,GAMR;gBACF,YAAY,EAAE,UAAU,CAAC,YAAY;gBACrC,UAAU,EAAE,UAAU,CAAC,UAAU;gBACjC,mBAAmB,EAAE,UAAU,CAAC,mBAAmB;gBACnD,kBAAkB,EAAE,UAAU,CAAC,kBAAkB;aAClD,CAAC;YAEF,uDAAuD;YACvD,IAAI,UAAU,CAAC,UAAU,EAAE,CAAC;gBAC1B,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAC7B,CAAC,UAAU,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC,GAAG,CAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAC1E,CAAC;gBACF,MAAM,CAAC,aAAa,GAAG,aAAa,CAAC;YACvC,CAAC;YAED,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC7B,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;;OAGG;IACI,iBAAiB;QAQtB,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;YAC5E,MAAM;YACN,aAAa,EAAE,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC;YACzC,cAAc,EAAE,IAAI,CAAC,YAAY;YACjC,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO;YACrC,WAAW,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACrC,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,eAAe;SAC9C,CAAC,CAAC,CAAC;IACN,CAAC;IAED;;;OAGG;IACI,SAAS;QACd,OAAO,EAAE,GAAG,IAAI,CAAC,OAAO,EAAE,CAAC;IAC7B,CAAC;CACF"}