@push.rocks/smartproxy 5.1.0 → 6.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (78) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/classes.pp.interfaces.d.ts +23 -0
  3. package/dist_ts/classes.pp.networkproxybridge.d.ts +15 -1
  4. package/dist_ts/classes.pp.networkproxybridge.js +116 -21
  5. package/dist_ts/classes.pp.portproxy.d.ts +20 -4
  6. package/dist_ts/classes.pp.portproxy.js +321 -22
  7. package/dist_ts/index.d.ts +6 -6
  8. package/dist_ts/index.js +7 -7
  9. package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +77 -0
  10. package/dist_ts/networkproxy/classes.np.certificatemanager.js +354 -0
  11. package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +47 -0
  12. package/dist_ts/networkproxy/classes.np.connectionpool.js +210 -0
  13. package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +117 -0
  14. package/dist_ts/networkproxy/classes.np.networkproxy.js +375 -0
  15. package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +51 -0
  16. package/dist_ts/networkproxy/classes.np.requesthandler.js +210 -0
  17. package/dist_ts/networkproxy/classes.np.types.d.ts +82 -0
  18. package/dist_ts/networkproxy/classes.np.types.js +35 -0
  19. package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +38 -0
  20. package/dist_ts/networkproxy/classes.np.websockethandler.js +188 -0
  21. package/dist_ts/networkproxy/index.d.ts +6 -0
  22. package/dist_ts/networkproxy/index.js +8 -0
  23. package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +219 -0
  24. package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +1542 -0
  25. package/dist_ts/port80handler/classes.port80handler.d.ts +260 -0
  26. package/dist_ts/port80handler/classes.port80handler.js +928 -0
  27. package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +39 -0
  28. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +754 -0
  29. package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +78 -0
  30. package/dist_ts/smartproxy/classes.pp.connectionmanager.js +378 -0
  31. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +55 -0
  32. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +103 -0
  33. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +133 -0
  34. package/dist_ts/smartproxy/classes.pp.interfaces.js +2 -0
  35. package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +57 -0
  36. package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +306 -0
  37. package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +56 -0
  38. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +179 -0
  39. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +47 -0
  40. package/dist_ts/smartproxy/classes.pp.securitymanager.js +126 -0
  41. package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +153 -0
  42. package/dist_ts/smartproxy/classes.pp.snihandler.js +1053 -0
  43. package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +47 -0
  44. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +154 -0
  45. package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +149 -0
  46. package/dist_ts/smartproxy/classes.pp.tlsalert.js +225 -0
  47. package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +57 -0
  48. package/dist_ts/smartproxy/classes.pp.tlsmanager.js +132 -0
  49. package/dist_ts/smartproxy/classes.smartproxy.d.ts +64 -0
  50. package/dist_ts/smartproxy/classes.smartproxy.js +567 -0
  51. package/package.json +1 -1
  52. package/readme.md +64 -68
  53. package/ts/00_commitinfo_data.ts +1 -1
  54. package/ts/index.ts +6 -6
  55. package/ts/networkproxy/classes.np.certificatemanager.ts +398 -0
  56. package/ts/networkproxy/classes.np.connectionpool.ts +241 -0
  57. package/ts/networkproxy/classes.np.networkproxy.ts +469 -0
  58. package/ts/networkproxy/classes.np.requesthandler.ts +278 -0
  59. package/ts/networkproxy/classes.np.types.ts +123 -0
  60. package/ts/networkproxy/classes.np.websockethandler.ts +226 -0
  61. package/ts/networkproxy/index.ts +7 -0
  62. package/ts/{classes.port80handler.ts → port80handler/classes.port80handler.ts} +249 -1
  63. package/ts/{classes.pp.connectionhandler.ts → smartproxy/classes.pp.connectionhandler.ts} +1 -1
  64. package/ts/{classes.pp.connectionmanager.ts → smartproxy/classes.pp.connectionmanager.ts} +1 -1
  65. package/ts/{classes.pp.domainconfigmanager.ts → smartproxy/classes.pp.domainconfigmanager.ts} +1 -1
  66. package/ts/{classes.pp.interfaces.ts → smartproxy/classes.pp.interfaces.ts} +31 -5
  67. package/ts/{classes.pp.networkproxybridge.ts → smartproxy/classes.pp.networkproxybridge.ts} +129 -28
  68. package/ts/{classes.pp.securitymanager.ts → smartproxy/classes.pp.securitymanager.ts} +1 -1
  69. package/ts/{classes.pp.tlsmanager.ts → smartproxy/classes.pp.tlsmanager.ts} +1 -1
  70. package/ts/smartproxy/classes.smartproxy.ts +679 -0
  71. package/ts/classes.networkproxy.ts +0 -1730
  72. package/ts/classes.pp.acmemanager.ts +0 -149
  73. package/ts/classes.pp.portproxy.ts +0 -344
  74. /package/ts/{classes.nftablesproxy.ts → nfttablesproxy/classes.nftablesproxy.ts} +0 -0
  75. /package/ts/{classes.pp.portrangemanager.ts → smartproxy/classes.pp.portrangemanager.ts} +0 -0
  76. /package/ts/{classes.pp.snihandler.ts → smartproxy/classes.pp.snihandler.ts} +0 -0
  77. /package/ts/{classes.pp.timeoutmanager.ts → smartproxy/classes.pp.timeoutmanager.ts} +0 -0
  78. /package/ts/{classes.pp.tlsalert.ts → smartproxy/classes.pp.tlsalert.ts} +0 -0
@@ -0,0 +1,354 @@
1
+ import * as plugins from '../plugins.js';
2
+ import * as fs from 'fs';
3
+ import * as path from 'path';
4
+ import { fileURLToPath } from 'url';
5
+ import { createLogger } from './classes.np.types.js';
6
+ import { Port80Handler, Port80HandlerEvents } from '../port80handler/classes.port80handler.js';
7
+ /**
8
+ * Manages SSL certificates for NetworkProxy including ACME integration
9
+ */
10
+ export class CertificateManager {
11
+ constructor(options) {
12
+ this.options = options;
13
+ this.certificateCache = new Map();
14
+ this.port80Handler = null;
15
+ this.externalPort80Handler = false;
16
+ this.httpsServer = null;
17
+ this.certificateStoreDir = path.resolve(options.acme?.certificateStore || './certs');
18
+ this.logger = createLogger(options.logLevel || 'info');
19
+ // Ensure certificate store directory exists
20
+ try {
21
+ if (!fs.existsSync(this.certificateStoreDir)) {
22
+ fs.mkdirSync(this.certificateStoreDir, { recursive: true });
23
+ this.logger.info(`Created certificate store directory: ${this.certificateStoreDir}`);
24
+ }
25
+ }
26
+ catch (error) {
27
+ this.logger.warn(`Failed to create certificate store directory: ${error}`);
28
+ }
29
+ this.loadDefaultCertificates();
30
+ }
31
+ /**
32
+ * Loads default certificates from the filesystem
33
+ */
34
+ loadDefaultCertificates() {
35
+ const __dirname = path.dirname(fileURLToPath(import.meta.url));
36
+ const certPath = path.join(__dirname, '..', '..', 'assets', 'certs');
37
+ try {
38
+ this.defaultCertificates = {
39
+ key: fs.readFileSync(path.join(certPath, 'key.pem'), 'utf8'),
40
+ cert: fs.readFileSync(path.join(certPath, 'cert.pem'), 'utf8')
41
+ };
42
+ this.logger.info('Default certificates loaded successfully');
43
+ }
44
+ catch (error) {
45
+ this.logger.error('Error loading default certificates', error);
46
+ // Generate self-signed fallback certificates
47
+ try {
48
+ // This is a placeholder for actual certificate generation code
49
+ // In a real implementation, you would use a library like selfsigned to generate certs
50
+ this.defaultCertificates = {
51
+ key: "FALLBACK_KEY_CONTENT",
52
+ cert: "FALLBACK_CERT_CONTENT"
53
+ };
54
+ this.logger.warn('Using fallback self-signed certificates');
55
+ }
56
+ catch (fallbackError) {
57
+ this.logger.error('Failed to generate fallback certificates', fallbackError);
58
+ throw new Error('Could not load or generate SSL certificates');
59
+ }
60
+ }
61
+ }
62
+ /**
63
+ * Set the HTTPS server reference for context updates
64
+ */
65
+ setHttpsServer(server) {
66
+ this.httpsServer = server;
67
+ }
68
+ /**
69
+ * Get default certificates
70
+ */
71
+ getDefaultCertificates() {
72
+ return { ...this.defaultCertificates };
73
+ }
74
+ /**
75
+ * Sets an external Port80Handler for certificate management
76
+ */
77
+ setExternalPort80Handler(handler) {
78
+ if (this.port80Handler && !this.externalPort80Handler) {
79
+ this.logger.warn('Replacing existing internal Port80Handler with external handler');
80
+ // Clean up existing handler if needed
81
+ if (this.port80Handler !== handler) {
82
+ // Unregister event handlers to avoid memory leaks
83
+ this.port80Handler.removeAllListeners(Port80HandlerEvents.CERTIFICATE_ISSUED);
84
+ this.port80Handler.removeAllListeners(Port80HandlerEvents.CERTIFICATE_RENEWED);
85
+ this.port80Handler.removeAllListeners(Port80HandlerEvents.CERTIFICATE_FAILED);
86
+ this.port80Handler.removeAllListeners(Port80HandlerEvents.CERTIFICATE_EXPIRING);
87
+ }
88
+ }
89
+ // Set the external handler
90
+ this.port80Handler = handler;
91
+ this.externalPort80Handler = true;
92
+ // Register event handlers
93
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_ISSUED, this.handleCertificateIssued.bind(this));
94
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_RENEWED, this.handleCertificateIssued.bind(this));
95
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_FAILED, this.handleCertificateFailed.bind(this));
96
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_EXPIRING, (data) => {
97
+ this.logger.info(`Certificate for ${data.domain} expires in ${data.daysRemaining} days`);
98
+ });
99
+ this.logger.info('External Port80Handler connected to CertificateManager');
100
+ // Register domains with Port80Handler if we have any certificates cached
101
+ if (this.certificateCache.size > 0) {
102
+ const domains = Array.from(this.certificateCache.keys())
103
+ .filter(domain => !domain.includes('*')); // Skip wildcard domains
104
+ this.registerDomainsWithPort80Handler(domains);
105
+ }
106
+ }
107
+ /**
108
+ * Handle newly issued or renewed certificates from Port80Handler
109
+ */
110
+ handleCertificateIssued(data) {
111
+ const { domain, certificate, privateKey, expiryDate } = data;
112
+ this.logger.info(`Certificate ${this.certificateCache.has(domain) ? 'renewed' : 'issued'} for ${domain}, valid until ${expiryDate.toISOString()}`);
113
+ // Update certificate in HTTPS server
114
+ this.updateCertificateCache(domain, certificate, privateKey, expiryDate);
115
+ // Save the certificate to the filesystem if not using external handler
116
+ if (!this.externalPort80Handler && this.options.acme?.certificateStore) {
117
+ this.saveCertificateToStore(domain, certificate, privateKey);
118
+ }
119
+ }
120
+ /**
121
+ * Handle certificate issuance failures
122
+ */
123
+ handleCertificateFailed(data) {
124
+ this.logger.error(`Certificate issuance failed for ${data.domain}: ${data.error}`);
125
+ }
126
+ /**
127
+ * Saves certificate and private key to the filesystem
128
+ */
129
+ saveCertificateToStore(domain, certificate, privateKey) {
130
+ try {
131
+ const certPath = path.join(this.certificateStoreDir, `${domain}.cert.pem`);
132
+ const keyPath = path.join(this.certificateStoreDir, `${domain}.key.pem`);
133
+ fs.writeFileSync(certPath, certificate);
134
+ fs.writeFileSync(keyPath, privateKey);
135
+ // Ensure private key has restricted permissions
136
+ try {
137
+ fs.chmodSync(keyPath, 0o600);
138
+ }
139
+ catch (error) {
140
+ this.logger.warn(`Failed to set permissions on private key for ${domain}: ${error}`);
141
+ }
142
+ this.logger.info(`Saved certificate for ${domain} to ${certPath}`);
143
+ }
144
+ catch (error) {
145
+ this.logger.error(`Failed to save certificate for ${domain}: ${error}`);
146
+ }
147
+ }
148
+ /**
149
+ * Handles SNI (Server Name Indication) for TLS connections
150
+ * Used by the HTTPS server to select the correct certificate for each domain
151
+ */
152
+ handleSNI(domain, cb) {
153
+ this.logger.debug(`SNI request for domain: ${domain}`);
154
+ // Check if we have a certificate for this domain
155
+ const certs = this.certificateCache.get(domain);
156
+ if (certs) {
157
+ try {
158
+ // Create TLS context with the cached certificate
159
+ const context = plugins.tls.createSecureContext({
160
+ key: certs.key,
161
+ cert: certs.cert
162
+ });
163
+ this.logger.debug(`Using cached certificate for ${domain}`);
164
+ cb(null, context);
165
+ return;
166
+ }
167
+ catch (err) {
168
+ this.logger.error(`Error creating secure context for ${domain}:`, err);
169
+ }
170
+ }
171
+ // Check if we should trigger certificate issuance
172
+ if (this.options.acme?.enabled && this.port80Handler && !domain.includes('*')) {
173
+ // Check if this domain is already registered
174
+ const certData = this.port80Handler.getCertificate(domain);
175
+ if (!certData) {
176
+ this.logger.info(`No certificate found for ${domain}, registering for issuance`);
177
+ // Register with new domain options format
178
+ const domainOptions = {
179
+ domainName: domain,
180
+ sslRedirect: true,
181
+ acmeMaintenance: true
182
+ };
183
+ this.port80Handler.addDomain(domainOptions);
184
+ }
185
+ }
186
+ // Fall back to default certificate
187
+ try {
188
+ const context = plugins.tls.createSecureContext({
189
+ key: this.defaultCertificates.key,
190
+ cert: this.defaultCertificates.cert
191
+ });
192
+ this.logger.debug(`Using default certificate for ${domain}`);
193
+ cb(null, context);
194
+ }
195
+ catch (err) {
196
+ this.logger.error(`Error creating default secure context:`, err);
197
+ cb(new Error('Cannot create secure context'), null);
198
+ }
199
+ }
200
+ /**
201
+ * Updates certificate in cache
202
+ */
203
+ updateCertificateCache(domain, certificate, privateKey, expiryDate) {
204
+ // Update certificate context in HTTPS server if it's running
205
+ if (this.httpsServer) {
206
+ try {
207
+ this.httpsServer.addContext(domain, {
208
+ key: privateKey,
209
+ cert: certificate
210
+ });
211
+ this.logger.debug(`Updated SSL context for domain: ${domain}`);
212
+ }
213
+ catch (error) {
214
+ this.logger.error(`Error updating SSL context for domain ${domain}:`, error);
215
+ }
216
+ }
217
+ // Update certificate in cache
218
+ this.certificateCache.set(domain, {
219
+ key: privateKey,
220
+ cert: certificate,
221
+ expires: expiryDate
222
+ });
223
+ }
224
+ /**
225
+ * Gets a certificate for a domain
226
+ */
227
+ getCertificate(domain) {
228
+ return this.certificateCache.get(domain);
229
+ }
230
+ /**
231
+ * Requests a new certificate for a domain
232
+ */
233
+ async requestCertificate(domain) {
234
+ if (!this.options.acme?.enabled && !this.externalPort80Handler) {
235
+ this.logger.warn('ACME certificate management is not enabled');
236
+ return false;
237
+ }
238
+ if (!this.port80Handler) {
239
+ this.logger.error('Port80Handler is not initialized');
240
+ return false;
241
+ }
242
+ // Skip wildcard domains - can't get certs for these with HTTP-01 validation
243
+ if (domain.includes('*')) {
244
+ this.logger.error(`Cannot request certificate for wildcard domain: ${domain}`);
245
+ return false;
246
+ }
247
+ try {
248
+ // Use the new domain options format
249
+ const domainOptions = {
250
+ domainName: domain,
251
+ sslRedirect: true,
252
+ acmeMaintenance: true
253
+ };
254
+ this.port80Handler.addDomain(domainOptions);
255
+ this.logger.info(`Certificate request submitted for domain: ${domain}`);
256
+ return true;
257
+ }
258
+ catch (error) {
259
+ this.logger.error(`Error requesting certificate for domain ${domain}:`, error);
260
+ return false;
261
+ }
262
+ }
263
+ /**
264
+ * Registers domains with Port80Handler for ACME certificate management
265
+ */
266
+ registerDomainsWithPort80Handler(domains) {
267
+ if (!this.port80Handler) {
268
+ this.logger.warn('Port80Handler is not initialized');
269
+ return;
270
+ }
271
+ for (const domain of domains) {
272
+ // Skip wildcard domains - can't get certs for these with HTTP-01 validation
273
+ if (domain.includes('*')) {
274
+ this.logger.info(`Skipping wildcard domain for ACME: ${domain}`);
275
+ continue;
276
+ }
277
+ // Skip domains already with certificates if configured to do so
278
+ if (this.options.acme?.skipConfiguredCerts) {
279
+ const cachedCert = this.certificateCache.get(domain);
280
+ if (cachedCert) {
281
+ this.logger.info(`Skipping domain with existing certificate: ${domain}`);
282
+ continue;
283
+ }
284
+ }
285
+ // Register the domain for certificate issuance with new domain options format
286
+ const domainOptions = {
287
+ domainName: domain,
288
+ sslRedirect: true,
289
+ acmeMaintenance: true
290
+ };
291
+ this.port80Handler.addDomain(domainOptions);
292
+ this.logger.info(`Registered domain for ACME certificate issuance: ${domain}`);
293
+ }
294
+ }
295
+ /**
296
+ * Initialize internal Port80Handler
297
+ */
298
+ async initializePort80Handler() {
299
+ // Skip if using external handler
300
+ if (this.externalPort80Handler) {
301
+ this.logger.info('Using external Port80Handler, skipping initialization');
302
+ return this.port80Handler;
303
+ }
304
+ if (!this.options.acme?.enabled) {
305
+ return null;
306
+ }
307
+ // Create certificate manager
308
+ this.port80Handler = new Port80Handler({
309
+ port: this.options.acme.port,
310
+ contactEmail: this.options.acme.contactEmail,
311
+ useProduction: this.options.acme.useProduction,
312
+ renewThresholdDays: this.options.acme.renewThresholdDays,
313
+ httpsRedirectPort: this.options.port, // Redirect to our HTTPS port
314
+ renewCheckIntervalHours: 24, // Check daily for renewals
315
+ enabled: this.options.acme.enabled,
316
+ autoRenew: this.options.acme.autoRenew,
317
+ certificateStore: this.options.acme.certificateStore,
318
+ skipConfiguredCerts: this.options.acme.skipConfiguredCerts
319
+ });
320
+ // Register event handlers
321
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_ISSUED, this.handleCertificateIssued.bind(this));
322
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_RENEWED, this.handleCertificateIssued.bind(this));
323
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_FAILED, this.handleCertificateFailed.bind(this));
324
+ this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_EXPIRING, (data) => {
325
+ this.logger.info(`Certificate for ${data.domain} expires in ${data.daysRemaining} days`);
326
+ });
327
+ // Start the handler
328
+ try {
329
+ await this.port80Handler.start();
330
+ this.logger.info(`Port80Handler started on port ${this.options.acme.port}`);
331
+ return this.port80Handler;
332
+ }
333
+ catch (error) {
334
+ this.logger.error(`Failed to start Port80Handler: ${error}`);
335
+ this.port80Handler = null;
336
+ return null;
337
+ }
338
+ }
339
+ /**
340
+ * Stop the Port80Handler if it was internally created
341
+ */
342
+ async stopPort80Handler() {
343
+ if (this.port80Handler && !this.externalPort80Handler) {
344
+ try {
345
+ await this.port80Handler.stop();
346
+ this.logger.info('Port80Handler stopped');
347
+ }
348
+ catch (error) {
349
+ this.logger.error('Error stopping Port80Handler', error);
350
+ }
351
+ }
352
+ }
353
+ }
354
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.np.certificatemanager.js","sourceRoot":"","sources":["../../ts/networkproxy/classes.np.certificatemanager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,EAAE,aAAa,EAAE,MAAM,KAAK,CAAC;AACpC,OAAO,EAAmE,YAAY,EAAE,MAAM,uBAAuB,CAAC;AACtH,OAAO,EAAE,aAAa,EAAE,mBAAmB,EAAuB,MAAM,2CAA2C,CAAC;AAEpH;;GAEG;AACH,MAAM,OAAO,kBAAkB;IAS7B,YAAoB,OAA6B;QAA7B,YAAO,GAAP,OAAO,CAAsB;QAPzC,qBAAgB,GAAmC,IAAI,GAAG,EAAE,CAAC;QAC7D,kBAAa,GAAyB,IAAI,CAAC;QAC3C,0BAAqB,GAAY,KAAK,CAAC;QAGvC,gBAAW,GAAgC,IAAI,CAAC;QAGtD,IAAI,CAAC,mBAAmB,GAAG,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,EAAE,gBAAgB,IAAI,SAAS,CAAC,CAAC;QACrF,IAAI,CAAC,MAAM,GAAG,YAAY,CAAC,OAAO,CAAC,QAAQ,IAAI,MAAM,CAAC,CAAC;QAEvD,4CAA4C;QAC5C,IAAI,CAAC;YACH,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC;gBAC7C,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,mBAAmB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC5D,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wCAAwC,IAAI,CAAC,mBAAmB,EAAE,CAAC,CAAC;YACvF,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,iDAAiD,KAAK,EAAE,CAAC,CAAC;QAC7E,CAAC;QAED,IAAI,CAAC,uBAAuB,EAAE,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,uBAAuB;QAC5B,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,EAAE,IAAI,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;QAErE,IAAI,CAAC;YACH,IAAI,CAAC,mBAAmB,GAAG;gBACzB,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,SAAS,CAAC,EAAE,MAAM,CAAC;gBAC5D,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,UAAU,CAAC,EAAE,MAAM,CAAC;aAC/D,CAAC;YACF,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,0CAA0C,CAAC,CAAC;QAC/D,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,oCAAoC,EAAE,KAAK,CAAC,CAAC;YAE/D,6CAA6C;YAC7C,IAAI,CAAC;gBACH,+DAA+D;gBAC/D,sFAAsF;gBACtF,IAAI,CAAC,mBAAmB,GAAG;oBACzB,GAAG,EAAE,sBAAsB;oBAC3B,IAAI,EAAE,uBAAuB;iBAC9B,CAAC;gBACF,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,yCAAyC,CAAC,CAAC;YAC9D,CAAC;YAAC,OAAO,aAAa,EAAE,CAAC;gBACvB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0CAA0C,EAAE,aAAa,CAAC,CAAC;gBAC7E,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;YACjE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,cAAc,CAAC,MAA4B;QAChD,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC;IAC5B,CAAC;IAED;;OAEG;IACI,sBAAsB;QAC3B,OAAO,EAAE,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;IACzC,CAAC;IAED;;OAEG;IACI,wBAAwB,CAAC,OAAsB;QACpD,IAAI,IAAI,CAAC,aAAa,IAAI,CAAC,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACtD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,iEAAiE,CAAC,CAAC;YAEpF,sCAAsC;YACtC,IAAI,IAAI,CAAC,aAAa,KAAK,OAAO,EAAE,CAAC;gBACnC,kDAAkD;gBAClD,IAAI,CAAC,aAAa,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,kBAAkB,CAAC,CAAC;gBAC9E,IAAI,CAAC,aAAa,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,CAAC;gBAC/E,IAAI,CAAC,aAAa,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,kBAAkB,CAAC,CAAC;gBAC9E,IAAI,CAAC,aAAa,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,oBAAoB,CAAC,CAAC;YAClF,CAAC;QACH,CAAC;QAED,2BAA2B;QAC3B,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;QAC7B,IAAI,CAAC,qBAAqB,GAAG,IAAI,CAAC;QAElC,0BAA0B;QAC1B,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACxG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,oBAAoB,EAAE,CAAC,IAAI,EAAE,EAAE;YACvE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,MAAM,eAAe,IAAI,CAAC,aAAa,OAAO,CAAC,CAAC;QAC3F,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wDAAwD,CAAC,CAAC;QAE3E,yEAAyE;QACzE,IAAI,IAAI,CAAC,gBAAgB,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACnC,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,IAAI,EAAE,CAAC;iBACrD,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,wBAAwB;YAEpE,IAAI,CAAC,gCAAgC,CAAC,OAAO,CAAC,CAAC;QACjD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB,CAAC,IAAmF;QACjH,MAAM,EAAE,MAAM,EAAE,WAAW,EAAE,UAAU,EAAE,UAAU,EAAE,GAAG,IAAI,CAAC;QAE7D,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ,QAAQ,MAAM,iBAAiB,UAAU,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QAEnJ,qCAAqC;QACrC,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,UAAU,EAAE,UAAU,CAAC,CAAC;QAEzE,uEAAuE;QACvE,IAAI,CAAC,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,gBAAgB,EAAE,CAAC;YACvE,IAAI,CAAC,sBAAsB,CAAC,MAAM,EAAE,WAAW,EAAE,UAAU,CAAC,CAAC;QAC/D,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB,CAAC,IAAuC;QACrE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,mCAAmC,IAAI,CAAC,MAAM,KAAK,IAAI,CAAC,KAAK,EAAE,CAAC,CAAC;IACrF,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,MAAc,EAAE,WAAmB,EAAE,UAAkB;QACpF,IAAI,CAAC;YACH,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,GAAG,MAAM,WAAW,CAAC,CAAC;YAC3E,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,GAAG,MAAM,UAAU,CAAC,CAAC;YAEzE,EAAE,CAAC,aAAa,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;YACxC,EAAE,CAAC,aAAa,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;YAEtC,gDAAgD;YAChD,IAAI,CAAC;gBACH,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAC/B,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,gDAAgD,MAAM,KAAK,KAAK,EAAE,CAAC,CAAC;YACvF,CAAC;YAED,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,yBAAyB,MAAM,OAAO,QAAQ,EAAE,CAAC,CAAC;QACrE,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,kCAAkC,MAAM,KAAK,KAAK,EAAE,CAAC,CAAC;QAC1E,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,MAAc,EAAE,EAA+D;QAC9F,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,2BAA2B,MAAM,EAAE,CAAC,CAAC;QAEvD,iDAAiD;QACjD,MAAM,KAAK,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QAEhD,IAAI,KAAK,EAAE,CAAC;YACV,IAAI,CAAC;gBACH,iDAAiD;gBACjD,MAAM,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;oBAC9C,GAAG,EAAE,KAAK,CAAC,GAAG;oBACd,IAAI,EAAE,KAAK,CAAC,IAAI;iBACjB,CAAC,CAAC;gBAEH,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gCAAgC,MAAM,EAAE,CAAC,CAAC;gBAC5D,EAAE,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;gBAClB,OAAO;YACT,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,qCAAqC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YACzE,CAAC;QACH,CAAC;QAED,kDAAkD;QAClD,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,IAAI,IAAI,CAAC,aAAa,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC9E,6CAA6C;YAC7C,MAAM,QAAQ,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;YAE3D,IAAI,CAAC,QAAQ,EAAE,CAAC;gBACd,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,4BAA4B,MAAM,4BAA4B,CAAC,CAAC;gBAEjF,0CAA0C;gBAC1C,MAAM,aAAa,GAAmB;oBACpC,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC;gBAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;YAC9C,CAAC;QACH,CAAC;QAED,mCAAmC;QACnC,IAAI,CAAC;YACH,MAAM,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBAC9C,GAAG,EAAE,IAAI,CAAC,mBAAmB,CAAC,GAAG;gBACjC,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI;aACpC,CAAC,CAAC;YAEH,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,iCAAiC,MAAM,EAAE,CAAC,CAAC;YAC7D,EAAE,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QACpB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,wCAAwC,EAAE,GAAG,CAAC,CAAC;YACjE,EAAE,CAAC,IAAI,KAAK,CAAC,8BAA8B,CAAC,EAAE,IAAI,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAED;;OAEG;IACI,sBAAsB,CAAC,MAAc,EAAE,WAAmB,EAAE,UAAkB,EAAE,UAAiB;QACtG,6DAA6D;QAC7D,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACrB,IAAI,CAAC;gBACH,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,MAAM,EAAE;oBAClC,GAAG,EAAE,UAAU;oBACf,IAAI,EAAE,WAAW;iBAClB,CAAC,CAAC;gBACH,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,mCAAmC,MAAM,EAAE,CAAC,CAAC;YACjE,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,yCAAyC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;YAC/E,CAAC;QACH,CAAC;QAED,8BAA8B;QAC9B,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,EAAE;YAChC,GAAG,EAAE,UAAU;YACf,IAAI,EAAE,WAAW;YACjB,OAAO,EAAE,UAAU;SACpB,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,cAAc,CAAC,MAAc;QAClC,OAAO,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IAC3C,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,IAAI,CAAC,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/D,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,4CAA4C,CAAC,CAAC;YAC/D,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,kCAAkC,CAAC,CAAC;YACtD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,4EAA4E;QAC5E,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,mDAAmD,MAAM,EAAE,CAAC,CAAC;YAC/E,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,oCAAoC;YACpC,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;aACtB,CAAC;YAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;YAC5C,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,6CAA6C,MAAM,EAAE,CAAC,CAAC;YACxE,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,2CAA2C,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;YAC/E,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACI,gCAAgC,CAAC,OAAiB;QACvD,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,kCAAkC,CAAC,CAAC;YACrD,OAAO;QACT,CAAC;QAED,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;YAC7B,4EAA4E;YAC5E,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,sCAAsC,MAAM,EAAE,CAAC,CAAC;gBACjE,SAAS;YACX,CAAC;YAED,gEAAgE;YAChE,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,mBAAmB,EAAE,CAAC;gBAC3C,MAAM,UAAU,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;gBACrD,IAAI,UAAU,EAAE,CAAC;oBACf,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8CAA8C,MAAM,EAAE,CAAC,CAAC;oBACzE,SAAS;gBACX,CAAC;YACH,CAAC;YAED,8EAA8E;YAC9E,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;aACtB,CAAC;YAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;YAC5C,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,oDAAoD,MAAM,EAAE,CAAC,CAAC;QACjF,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,uBAAuB;QAClC,iCAAiC;QACjC,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,uDAAuD,CAAC,CAAC;YAC1E,OAAO,IAAI,CAAC,aAAa,CAAC;QAC5B,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YAChC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,6BAA6B;QAC7B,IAAI,CAAC,aAAa,GAAG,IAAI,aAAa,CAAC;YACrC,IAAI,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI;YAC5B,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,YAAY;YAC5C,aAAa,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa;YAC9C,kBAAkB,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,kBAAkB;YACxD,iBAAiB,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,6BAA6B;YACnE,uBAAuB,EAAE,EAAE,EAAE,2BAA2B;YACxD,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO;YAClC,SAAS,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS;YACtC,gBAAgB,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,gBAAgB;YACpD,mBAAmB,EAAE,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,mBAAmB;SAC3D,CAAC,CAAC;QAEH,0BAA0B;QAC1B,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACxG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,oBAAoB,EAAE,CAAC,IAAI,EAAE,EAAE;YACvE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,MAAM,eAAe,IAAI,CAAC,aAAa,OAAO,CAAC,CAAC;QAC3F,CAAC,CAAC,CAAC;QAEH,oBAAoB;QACpB,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,CAAC;YACjC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,iCAAiC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;YAC5E,OAAO,IAAI,CAAC,aAAa,CAAC;QAC5B,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,kCAAkC,KAAK,EAAE,CAAC,CAAC;YAC7D,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC;YAC1B,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,iBAAiB;QAC5B,IAAI,IAAI,CAAC,aAAa,IAAI,CAAC,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACtD,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC;gBAChC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC;YAC5C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,8BAA8B,EAAE,KAAK,CAAC,CAAC;YAC3D,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
@@ -0,0 +1,47 @@
1
+ import * as plugins from '../plugins.js';
2
+ import { type INetworkProxyOptions } from './classes.np.types.js';
3
+ /**
4
+ * Manages a pool of backend connections for efficient reuse
5
+ */
6
+ export declare class ConnectionPool {
7
+ private options;
8
+ private connectionPool;
9
+ private roundRobinPositions;
10
+ private logger;
11
+ constructor(options: INetworkProxyOptions);
12
+ /**
13
+ * Get a connection from the pool or create a new one
14
+ */
15
+ getConnection(host: string, port: number): Promise<plugins.net.Socket>;
16
+ /**
17
+ * Return a connection to the pool for reuse
18
+ */
19
+ returnConnection(socket: plugins.net.Socket, host: string, port: number): void;
20
+ /**
21
+ * Cleanup the connection pool by removing idle connections
22
+ * or reducing pool size if it exceeds the configured maximum
23
+ */
24
+ cleanupConnectionPool(): void;
25
+ /**
26
+ * Close all connections in the pool
27
+ */
28
+ closeAllConnections(): void;
29
+ /**
30
+ * Get load balancing target using round-robin
31
+ */
32
+ getNextTarget(targets: string[], port: number): {
33
+ host: string;
34
+ port: number;
35
+ };
36
+ /**
37
+ * Gets the connection pool status
38
+ */
39
+ getPoolStatus(): Record<string, {
40
+ total: number;
41
+ idle: number;
42
+ }>;
43
+ /**
44
+ * Setup a periodic cleanup task
45
+ */
46
+ setupPeriodicCleanup(interval?: number): NodeJS.Timeout;
47
+ }
@@ -0,0 +1,210 @@
1
+ import * as plugins from '../plugins.js';
2
+ import { createLogger } from './classes.np.types.js';
3
+ /**
4
+ * Manages a pool of backend connections for efficient reuse
5
+ */
6
+ export class ConnectionPool {
7
+ constructor(options) {
8
+ this.options = options;
9
+ this.connectionPool = new Map();
10
+ this.roundRobinPositions = new Map();
11
+ this.logger = createLogger(options.logLevel || 'info');
12
+ }
13
+ /**
14
+ * Get a connection from the pool or create a new one
15
+ */
16
+ getConnection(host, port) {
17
+ return new Promise((resolve, reject) => {
18
+ const poolKey = `${host}:${port}`;
19
+ const connectionList = this.connectionPool.get(poolKey) || [];
20
+ // Look for an idle connection
21
+ const idleConnectionIndex = connectionList.findIndex(c => c.isIdle);
22
+ if (idleConnectionIndex >= 0) {
23
+ // Get existing connection from pool
24
+ const connection = connectionList[idleConnectionIndex];
25
+ connection.isIdle = false;
26
+ connection.lastUsed = Date.now();
27
+ this.logger.debug(`Reusing connection from pool for ${poolKey}`);
28
+ // Update the pool
29
+ this.connectionPool.set(poolKey, connectionList);
30
+ resolve(connection.socket);
31
+ return;
32
+ }
33
+ // No idle connection available, create a new one if pool isn't full
34
+ const poolSize = this.options.connectionPoolSize || 50;
35
+ if (connectionList.length < poolSize) {
36
+ this.logger.debug(`Creating new connection to ${host}:${port}`);
37
+ try {
38
+ const socket = plugins.net.connect({
39
+ host,
40
+ port,
41
+ keepAlive: true,
42
+ keepAliveInitialDelay: 30000 // 30 seconds
43
+ });
44
+ socket.once('connect', () => {
45
+ // Add to connection pool
46
+ const connection = {
47
+ socket,
48
+ lastUsed: Date.now(),
49
+ isIdle: false
50
+ };
51
+ connectionList.push(connection);
52
+ this.connectionPool.set(poolKey, connectionList);
53
+ // Setup cleanup when the connection is closed
54
+ socket.once('close', () => {
55
+ const idx = connectionList.findIndex(c => c.socket === socket);
56
+ if (idx >= 0) {
57
+ connectionList.splice(idx, 1);
58
+ this.connectionPool.set(poolKey, connectionList);
59
+ this.logger.debug(`Removed closed connection from pool for ${poolKey}`);
60
+ }
61
+ });
62
+ resolve(socket);
63
+ });
64
+ socket.once('error', (err) => {
65
+ this.logger.error(`Error creating connection to ${host}:${port}`, err);
66
+ reject(err);
67
+ });
68
+ }
69
+ catch (err) {
70
+ this.logger.error(`Failed to create connection to ${host}:${port}`, err);
71
+ reject(err);
72
+ }
73
+ }
74
+ else {
75
+ // Pool is full, wait for an idle connection or reject
76
+ this.logger.warn(`Connection pool for ${poolKey} is full (${connectionList.length})`);
77
+ reject(new Error(`Connection pool for ${poolKey} is full`));
78
+ }
79
+ });
80
+ }
81
+ /**
82
+ * Return a connection to the pool for reuse
83
+ */
84
+ returnConnection(socket, host, port) {
85
+ const poolKey = `${host}:${port}`;
86
+ const connectionList = this.connectionPool.get(poolKey) || [];
87
+ // Find this connection in the pool
88
+ const connectionIndex = connectionList.findIndex(c => c.socket === socket);
89
+ if (connectionIndex >= 0) {
90
+ // Mark as idle and update last used time
91
+ connectionList[connectionIndex].isIdle = true;
92
+ connectionList[connectionIndex].lastUsed = Date.now();
93
+ this.logger.debug(`Returned connection to pool for ${poolKey}`);
94
+ }
95
+ else {
96
+ this.logger.warn(`Attempted to return unknown connection to pool for ${poolKey}`);
97
+ }
98
+ }
99
+ /**
100
+ * Cleanup the connection pool by removing idle connections
101
+ * or reducing pool size if it exceeds the configured maximum
102
+ */
103
+ cleanupConnectionPool() {
104
+ const now = Date.now();
105
+ const idleTimeout = this.options.keepAliveTimeout || 120000; // 2 minutes default
106
+ for (const [host, connections] of this.connectionPool.entries()) {
107
+ // Sort by last used time (oldest first)
108
+ connections.sort((a, b) => a.lastUsed - b.lastUsed);
109
+ // Remove idle connections older than the idle timeout
110
+ let removed = 0;
111
+ while (connections.length > 0) {
112
+ const connection = connections[0];
113
+ // Remove if idle and exceeds timeout, or if pool is too large
114
+ if ((connection.isIdle && now - connection.lastUsed > idleTimeout) ||
115
+ connections.length > (this.options.connectionPoolSize || 50)) {
116
+ try {
117
+ if (!connection.socket.destroyed) {
118
+ connection.socket.end();
119
+ connection.socket.destroy();
120
+ }
121
+ }
122
+ catch (err) {
123
+ this.logger.error(`Error destroying pooled connection to ${host}`, err);
124
+ }
125
+ connections.shift(); // Remove from pool
126
+ removed++;
127
+ }
128
+ else {
129
+ break; // Stop removing if we've reached active or recent connections
130
+ }
131
+ }
132
+ if (removed > 0) {
133
+ this.logger.debug(`Removed ${removed} idle connections from pool for ${host}, ${connections.length} remaining`);
134
+ }
135
+ // Update the pool with the remaining connections
136
+ if (connections.length === 0) {
137
+ this.connectionPool.delete(host);
138
+ }
139
+ else {
140
+ this.connectionPool.set(host, connections);
141
+ }
142
+ }
143
+ }
144
+ /**
145
+ * Close all connections in the pool
146
+ */
147
+ closeAllConnections() {
148
+ for (const [host, connections] of this.connectionPool.entries()) {
149
+ this.logger.debug(`Closing ${connections.length} connections to ${host}`);
150
+ for (const connection of connections) {
151
+ try {
152
+ if (!connection.socket.destroyed) {
153
+ connection.socket.end();
154
+ connection.socket.destroy();
155
+ }
156
+ }
157
+ catch (error) {
158
+ this.logger.error(`Error closing connection to ${host}:`, error);
159
+ }
160
+ }
161
+ }
162
+ this.connectionPool.clear();
163
+ this.roundRobinPositions.clear();
164
+ }
165
+ /**
166
+ * Get load balancing target using round-robin
167
+ */
168
+ getNextTarget(targets, port) {
169
+ const targetKey = targets.join(',');
170
+ // Initialize position if not exists
171
+ if (!this.roundRobinPositions.has(targetKey)) {
172
+ this.roundRobinPositions.set(targetKey, 0);
173
+ }
174
+ // Get current position and increment for next time
175
+ const currentPosition = this.roundRobinPositions.get(targetKey);
176
+ const nextPosition = (currentPosition + 1) % targets.length;
177
+ this.roundRobinPositions.set(targetKey, nextPosition);
178
+ // Return the selected target
179
+ return {
180
+ host: targets[currentPosition],
181
+ port
182
+ };
183
+ }
184
+ /**
185
+ * Gets the connection pool status
186
+ */
187
+ getPoolStatus() {
188
+ return Object.fromEntries(Array.from(this.connectionPool.entries()).map(([host, connections]) => [
189
+ host,
190
+ {
191
+ total: connections.length,
192
+ idle: connections.filter(c => c.isIdle).length
193
+ }
194
+ ]));
195
+ }
196
+ /**
197
+ * Setup a periodic cleanup task
198
+ */
199
+ setupPeriodicCleanup(interval = 60000) {
200
+ const timer = setInterval(() => {
201
+ this.cleanupConnectionPool();
202
+ }, interval);
203
+ // Don't prevent process exit
204
+ if (timer.unref) {
205
+ timer.unref();
206
+ }
207
+ return timer;
208
+ }
209
+ }
210
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.np.connectionpool.js","sourceRoot":"","sources":["../../ts/networkproxy/classes.np.connectionpool.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAkE,YAAY,EAAE,MAAM,uBAAuB,CAAC;AAErH;;GAEG;AACH,MAAM,OAAO,cAAc;IAKzB,YAAoB,OAA6B;QAA7B,YAAO,GAAP,OAAO,CAAsB;QAJzC,mBAAc,GAAyC,IAAI,GAAG,EAAE,CAAC;QACjE,wBAAmB,GAAwB,IAAI,GAAG,EAAE,CAAC;QAI3D,IAAI,CAAC,MAAM,GAAG,YAAY,CAAC,OAAO,CAAC,QAAQ,IAAI,MAAM,CAAC,CAAC;IACzD,CAAC;IAED;;OAEG;IACI,aAAa,CAAC,IAAY,EAAE,IAAY;QAC7C,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YACrC,MAAM,OAAO,GAAG,GAAG,IAAI,IAAI,IAAI,EAAE,CAAC;YAClC,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;YAE9D,8BAA8B;YAC9B,MAAM,mBAAmB,GAAG,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YAEpE,IAAI,mBAAmB,IAAI,CAAC,EAAE,CAAC;gBAC7B,oCAAoC;gBACpC,MAAM,UAAU,GAAG,cAAc,CAAC,mBAAmB,CAAC,CAAC;gBACvD,UAAU,CAAC,MAAM,GAAG,KAAK,CAAC;gBAC1B,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACjC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,oCAAoC,OAAO,EAAE,CAAC,CAAC;gBAEjE,kBAAkB;gBAClB,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;gBAEjD,OAAO,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBAC3B,OAAO;YACT,CAAC;YAED,oEAAoE;YACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,EAAE,CAAC;YACvD,IAAI,cAAc,CAAC,MAAM,GAAG,QAAQ,EAAE,CAAC;gBACrC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,8BAA8B,IAAI,IAAI,IAAI,EAAE,CAAC,CAAC;gBAEhE,IAAI,CAAC;oBACH,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;wBACjC,IAAI;wBACJ,IAAI;wBACJ,SAAS,EAAE,IAAI;wBACf,qBAAqB,EAAE,KAAK,CAAC,aAAa;qBAC3C,CAAC,CAAC;oBAEH,MAAM,CAAC,IAAI,CAAC,SAAS,EAAE,GAAG,EAAE;wBAC1B,yBAAyB;wBACzB,MAAM,UAAU,GAAG;4BACjB,MAAM;4BACN,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE;4BACpB,MAAM,EAAE,KAAK;yBACd,CAAC;wBAEF,cAAc,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;wBAChC,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;wBAEjD,8CAA8C;wBAC9C,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,EAAE;4BACxB,MAAM,GAAG,GAAG,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;4BAC/D,IAAI,GAAG,IAAI,CAAC,EAAE,CAAC;gCACb,cAAc,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;gCAC9B,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;gCACjD,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,2CAA2C,OAAO,EAAE,CAAC,CAAC;4BAC1E,CAAC;wBACH,CAAC,CAAC,CAAC;wBAEH,OAAO,CAAC,MAAM,CAAC,CAAC;oBAClB,CAAC,CAAC,CAAC;oBAEH,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;wBAC3B,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gCAAgC,IAAI,IAAI,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;wBACvE,MAAM,CAAC,GAAG,CAAC,CAAC;oBACd,CAAC,CAAC,CAAC;gBACL,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,kCAAkC,IAAI,IAAI,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;oBACzE,MAAM,CAAC,GAAG,CAAC,CAAC;gBACd,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,sDAAsD;gBACtD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,uBAAuB,OAAO,aAAa,cAAc,CAAC,MAAM,GAAG,CAAC,CAAC;gBACtF,MAAM,CAAC,IAAI,KAAK,CAAC,uBAAuB,OAAO,UAAU,CAAC,CAAC,CAAC;YAC9D,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,gBAAgB,CAAC,MAA0B,EAAE,IAAY,EAAE,IAAY;QAC5E,MAAM,OAAO,GAAG,GAAG,IAAI,IAAI,IAAI,EAAE,CAAC;QAClC,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;QAE9D,mCAAmC;QACnC,MAAM,eAAe,GAAG,cAAc,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;QAE3E,IAAI,eAAe,IAAI,CAAC,EAAE,CAAC;YACzB,yCAAyC;YACzC,cAAc,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,IAAI,CAAC;YAC9C,cAAc,CAAC,eAAe,CAAC,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YAEtD,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,mCAAmC,OAAO,EAAE,CAAC,CAAC;QAClE,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,sDAAsD,OAAO,EAAE,CAAC,CAAC;QACpF,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,qBAAqB;QAC1B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,gBAAgB,IAAI,MAAM,CAAC,CAAC,oBAAoB;QAEjF,KAAK,MAAM,CAAC,IAAI,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,EAAE,CAAC;YAChE,wCAAwC;YACxC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,GAAG,CAAC,CAAC,QAAQ,CAAC,CAAC;YAEpD,sDAAsD;YACtD,IAAI,OAAO,GAAG,CAAC,CAAC;YAChB,OAAO,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC9B,MAAM,UAAU,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;gBAElC,8DAA8D;gBAC9D,IAAI,CAAC,UAAU,CAAC,MAAM,IAAI,GAAG,GAAG,UAAU,CAAC,QAAQ,GAAG,WAAW,CAAC;oBAC9D,WAAW,CAAC,MAAM,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,kBAAkB,IAAI,EAAE,CAAC,EAAE,CAAC;oBAEjE,IAAI,CAAC;wBACH,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;4BACjC,UAAU,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC;4BACxB,UAAU,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;wBAC9B,CAAC;oBACH,CAAC;oBAAC,OAAO,GAAG,EAAE,CAAC;wBACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,yCAAyC,IAAI,EAAE,EAAE,GAAG,CAAC,CAAC;oBAC1E,CAAC;oBAED,WAAW,CAAC,KAAK,EAAE,CAAC,CAAC,mBAAmB;oBACxC,OAAO,EAAE,CAAC;gBACZ,CAAC;qBAAM,CAAC;oBACN,MAAM,CAAC,8DAA8D;gBACvE,CAAC;YACH,CAAC;YAED,IAAI,OAAO,GAAG,CAAC,EAAE,CAAC;gBAChB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,OAAO,mCAAmC,IAAI,KAAK,WAAW,CAAC,MAAM,YAAY,CAAC,CAAC;YAClH,CAAC;YAED,iDAAiD;YACjD,IAAI,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC7B,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;YACnC,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,EAAE,WAAW,CAAC,CAAC;YAC7C,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,mBAAmB;QACxB,KAAK,MAAM,CAAC,IAAI,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,EAAE,CAAC;YAChE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,WAAW,CAAC,MAAM,mBAAmB,IAAI,EAAE,CAAC,CAAC;YAE1E,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,CAAC;oBACH,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;wBACjC,UAAU,CAAC,MAAM,CAAC,GAAG,EAAE,CAAC;wBACxB,UAAU,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;oBAC9B,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,+BAA+B,IAAI,GAAG,EAAE,KAAK,CAAC,CAAC;gBACnE,CAAC;YACH,CAAC;QACH,CAAC;QAED,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;QAC5B,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,CAAC;IACnC,CAAC;IAED;;OAEG;IACI,aAAa,CAAC,OAAiB,EAAE,IAAY;QAClD,MAAM,SAAS,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAEpC,oCAAoC;QACpC,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,CAAC,EAAE,CAAC;YAC7C,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC;QAC7C,CAAC;QAED,mDAAmD;QACnD,MAAM,eAAe,GAAG,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,CAAE,CAAC;QACjE,MAAM,YAAY,GAAG,CAAC,eAAe,GAAG,CAAC,CAAC,GAAG,OAAO,CAAC,MAAM,CAAC;QAC5D,IAAI,CAAC,mBAAmB,CAAC,GAAG,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;QAEtD,6BAA6B;QAC7B,OAAO;YACL,IAAI,EAAE,OAAO,CAAC,eAAe,CAAC;YAC9B,IAAI;SACL,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,aAAa;QAClB,OAAO,MAAM,CAAC,WAAW,CACvB,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,IAAI,EAAE,WAAW,CAAC,EAAE,EAAE,CAAC;YACrE,IAAI;YACJ;gBACE,KAAK,EAAE,WAAW,CAAC,MAAM;gBACzB,IAAI,EAAE,WAAW,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,MAAM;aAC/C;SACF,CAAC,CACH,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,oBAAoB,CAAC,WAAmB,KAAK;QAClD,MAAM,KAAK,GAAG,WAAW,CAAC,GAAG,EAAE;YAC7B,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC/B,CAAC,EAAE,QAAQ,CAAC,CAAC;QAEb,6BAA6B;QAC7B,IAAI,KAAK,CAAC,KAAK,EAAE,CAAC;YAChB,KAAK,CAAC,KAAK,EAAE,CAAC;QAChB,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;CACF"}