@serve.zone/dcrouter 11.0.35 → 11.0.37
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_serve/bundle.js +1 -1
- package/dist_ts_web/00_commitinfo_data.js +1 -1
- package/package.json +1 -1
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts_web/00_commitinfo_data.ts +1 -1
- package/dist_ts/00_commitinfo_data.d.ts +0 -8
- package/dist_ts/00_commitinfo_data.js +0 -9
- package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
- package/dist_ts/cache/classes.cache.cleaner.js +0 -130
- package/dist_ts/cache/classes.cached.document.d.ts +0 -76
- package/dist_ts/cache/classes.cached.document.js +0 -100
- package/dist_ts/cache/classes.cachedb.d.ts +0 -60
- package/dist_ts/cache/classes.cachedb.js +0 -126
- package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
- package/dist_ts/cache/documents/classes.cached.email.js +0 -337
- package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
- package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
- package/dist_ts/cache/documents/index.d.ts +0 -2
- package/dist_ts/cache/documents/index.js +0 -3
- package/dist_ts/cache/index.d.ts +0 -4
- package/dist_ts/cache/index.js +0 -7
- package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -53
- package/dist_ts/classes.cert-provision-scheduler.js +0 -110
- package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
- package/dist_ts/classes.storage-cert-manager.js +0 -43
- package/dist_ts/errors/base.errors.js +0 -320
- package/dist_ts/errors/error.codes.d.ts +0 -115
- package/dist_ts/errors/error.codes.js +0 -136
- package/dist_ts/logger.d.ts +0 -21
- package/dist_ts/logger.js +0 -81
- package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
- package/dist_ts/monitoring/classes.metricscache.js +0 -63
- package/dist_ts/monitoring/classes.metricsmanager.d.ts +0 -178
- package/dist_ts/monitoring/classes.metricsmanager.js +0 -642
- package/dist_ts/monitoring/index.d.ts +0 -1
- package/dist_ts/monitoring/index.js +0 -2
- package/dist_ts/opsserver/classes.opsserver.d.ts +0 -37
- package/dist_ts/opsserver/classes.opsserver.js +0 -85
- package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
- package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
- package/dist_ts/opsserver/handlers/api-token.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/api-token.handler.js +0 -62
- package/dist_ts/opsserver/handlers/certificate.handler.d.ts +0 -32
- package/dist_ts/opsserver/handlers/certificate.handler.js +0 -421
- package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
- package/dist_ts/opsserver/handlers/config.handler.js +0 -192
- package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +0 -30
- package/dist_ts/opsserver/handlers/email-ops.handler.js +0 -227
- package/dist_ts/opsserver/handlers/index.d.ts +0 -11
- package/dist_ts/opsserver/handlers/index.js +0 -12
- package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
- package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
- package/dist_ts/opsserver/handlers/radius.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/radius.handler.js +0 -295
- package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/remoteingress.handler.js +0 -156
- package/dist_ts/opsserver/handlers/route-management.handler.d.ts +0 -14
- package/dist_ts/opsserver/handlers/route-management.handler.js +0 -117
- package/dist_ts/opsserver/handlers/security.handler.d.ts +0 -9
- package/dist_ts/opsserver/handlers/security.handler.js +0 -231
- package/dist_ts/opsserver/handlers/stats.handler.d.ts +0 -11
- package/dist_ts/opsserver/handlers/stats.handler.js +0 -399
- package/dist_ts/opsserver/helpers/guards.d.ts +0 -27
- package/dist_ts/opsserver/helpers/guards.js +0 -43
- package/dist_ts/opsserver/index.d.ts +0 -1
- package/dist_ts/opsserver/index.js +0 -2
- package/dist_ts/paths.d.ts +0 -26
- package/dist_ts/paths.js +0 -45
- package/dist_ts/plugins.d.ts +0 -79
- package/dist_ts/plugins.js +0 -113
- package/dist_ts/radius/classes.accounting.manager.d.ts +0 -218
- package/dist_ts/radius/classes.accounting.manager.js +0 -417
- package/dist_ts/radius/classes.radius.server.d.ts +0 -171
- package/dist_ts/radius/classes.radius.server.js +0 -385
- package/dist_ts/radius/classes.vlan.manager.d.ts +0 -128
- package/dist_ts/radius/classes.vlan.manager.js +0 -279
- package/dist_ts/radius/index.d.ts +0 -13
- package/dist_ts/radius/index.js +0 -14
- package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +0 -82
- package/dist_ts/remoteingress/classes.remoteingress-manager.js +0 -227
- package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +0 -59
- package/dist_ts/remoteingress/classes.tunnel-manager.js +0 -165
- package/dist_ts/remoteingress/index.d.ts +0 -2
- package/dist_ts/remoteingress/index.js +0 -3
- package/dist_ts/security/classes.securitylogger.d.ts +0 -144
- package/dist_ts/security/classes.securitylogger.js +0 -233
- package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
- package/dist_ts/storage/classes.storagemanager.js +0 -350
- package/dist_ts/storage/index.d.ts +0 -1
- package/dist_ts/storage/index.js +0 -3
|
@@ -1,59 +0,0 @@
|
|
|
1
|
-
import type { IRemoteIngressStatus } from '../../dist_ts_interfaces/data/remoteingress.js';
|
|
2
|
-
import type { RemoteIngressManager } from './classes.remoteingress-manager.js';
|
|
3
|
-
export interface ITunnelManagerConfig {
|
|
4
|
-
tunnelPort?: number;
|
|
5
|
-
targetHost?: string;
|
|
6
|
-
tls?: {
|
|
7
|
-
certPem?: string;
|
|
8
|
-
keyPem?: string;
|
|
9
|
-
};
|
|
10
|
-
}
|
|
11
|
-
/**
|
|
12
|
-
* Manages the RemoteIngressHub instance and tracks connected edge statuses.
|
|
13
|
-
*/
|
|
14
|
-
export declare class TunnelManager {
|
|
15
|
-
private hub;
|
|
16
|
-
private manager;
|
|
17
|
-
private config;
|
|
18
|
-
private edgeStatuses;
|
|
19
|
-
private reconcileInterval;
|
|
20
|
-
constructor(manager: RemoteIngressManager, config?: ITunnelManagerConfig);
|
|
21
|
-
/**
|
|
22
|
-
* Start the tunnel hub and load allowed edges.
|
|
23
|
-
*/
|
|
24
|
-
start(): Promise<void>;
|
|
25
|
-
/**
|
|
26
|
-
* Stop the tunnel hub.
|
|
27
|
-
*/
|
|
28
|
-
stop(): Promise<void>;
|
|
29
|
-
/**
|
|
30
|
-
* Reconcile TS-side edge statuses with the authoritative Rust hub status.
|
|
31
|
-
* Overwrites event-derived activeTunnels with the real activeStreams count.
|
|
32
|
-
*/
|
|
33
|
-
private reconcile;
|
|
34
|
-
/**
|
|
35
|
-
* Sync allowed edges from the manager to the hub.
|
|
36
|
-
* Call this after creating/deleting/updating edges.
|
|
37
|
-
*/
|
|
38
|
-
syncAllowedEdges(): Promise<void>;
|
|
39
|
-
/**
|
|
40
|
-
* Get runtime statuses for all known edges.
|
|
41
|
-
*/
|
|
42
|
-
getEdgeStatuses(): IRemoteIngressStatus[];
|
|
43
|
-
/**
|
|
44
|
-
* Get status for a specific edge.
|
|
45
|
-
*/
|
|
46
|
-
getEdgeStatus(edgeId: string): IRemoteIngressStatus | undefined;
|
|
47
|
-
/**
|
|
48
|
-
* Get the count of connected edges.
|
|
49
|
-
*/
|
|
50
|
-
getConnectedCount(): number;
|
|
51
|
-
/**
|
|
52
|
-
* Get the public IPs of all connected edges.
|
|
53
|
-
*/
|
|
54
|
-
getConnectedEdgeIps(): string[];
|
|
55
|
-
/**
|
|
56
|
-
* Get the total number of active tunnels across all edges.
|
|
57
|
-
*/
|
|
58
|
-
getTotalActiveTunnels(): number;
|
|
59
|
-
}
|
|
@@ -1,165 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../plugins.js';
|
|
2
|
-
/**
|
|
3
|
-
* Manages the RemoteIngressHub instance and tracks connected edge statuses.
|
|
4
|
-
*/
|
|
5
|
-
export class TunnelManager {
|
|
6
|
-
hub;
|
|
7
|
-
manager;
|
|
8
|
-
config;
|
|
9
|
-
edgeStatuses = new Map();
|
|
10
|
-
reconcileInterval = null;
|
|
11
|
-
constructor(manager, config = {}) {
|
|
12
|
-
this.manager = manager;
|
|
13
|
-
this.config = config;
|
|
14
|
-
this.hub = new plugins.remoteingress.RemoteIngressHub();
|
|
15
|
-
// Listen for edge connect/disconnect events
|
|
16
|
-
this.hub.on('edgeConnected', (data) => {
|
|
17
|
-
this.edgeStatuses.set(data.edgeId, {
|
|
18
|
-
edgeId: data.edgeId,
|
|
19
|
-
connected: true,
|
|
20
|
-
publicIp: data.peerAddr || null,
|
|
21
|
-
activeTunnels: 0,
|
|
22
|
-
lastHeartbeat: Date.now(),
|
|
23
|
-
connectedAt: Date.now(),
|
|
24
|
-
});
|
|
25
|
-
});
|
|
26
|
-
this.hub.on('edgeDisconnected', (data) => {
|
|
27
|
-
this.edgeStatuses.delete(data.edgeId);
|
|
28
|
-
});
|
|
29
|
-
this.hub.on('streamOpened', (data) => {
|
|
30
|
-
const existing = this.edgeStatuses.get(data.edgeId);
|
|
31
|
-
if (existing) {
|
|
32
|
-
existing.activeTunnels++;
|
|
33
|
-
existing.lastHeartbeat = Date.now();
|
|
34
|
-
}
|
|
35
|
-
});
|
|
36
|
-
this.hub.on('streamClosed', (data) => {
|
|
37
|
-
const existing = this.edgeStatuses.get(data.edgeId);
|
|
38
|
-
if (existing && existing.activeTunnels > 0) {
|
|
39
|
-
existing.activeTunnels--;
|
|
40
|
-
}
|
|
41
|
-
});
|
|
42
|
-
}
|
|
43
|
-
/**
|
|
44
|
-
* Start the tunnel hub and load allowed edges.
|
|
45
|
-
*/
|
|
46
|
-
async start() {
|
|
47
|
-
await this.hub.start({
|
|
48
|
-
tunnelPort: this.config.tunnelPort ?? 8443,
|
|
49
|
-
targetHost: this.config.targetHost ?? '127.0.0.1',
|
|
50
|
-
tls: this.config.tls,
|
|
51
|
-
});
|
|
52
|
-
// Send allowed edges to the hub
|
|
53
|
-
await this.syncAllowedEdges();
|
|
54
|
-
// Periodically reconcile with authoritative Rust hub status
|
|
55
|
-
this.reconcileInterval = setInterval(() => {
|
|
56
|
-
this.reconcile().catch(() => { });
|
|
57
|
-
}, 15_000);
|
|
58
|
-
}
|
|
59
|
-
/**
|
|
60
|
-
* Stop the tunnel hub.
|
|
61
|
-
*/
|
|
62
|
-
async stop() {
|
|
63
|
-
if (this.reconcileInterval) {
|
|
64
|
-
clearInterval(this.reconcileInterval);
|
|
65
|
-
this.reconcileInterval = null;
|
|
66
|
-
}
|
|
67
|
-
// Remove event listeners before stopping to prevent leaks
|
|
68
|
-
this.hub.removeAllListeners();
|
|
69
|
-
await this.hub.stop();
|
|
70
|
-
this.edgeStatuses.clear();
|
|
71
|
-
}
|
|
72
|
-
/**
|
|
73
|
-
* Reconcile TS-side edge statuses with the authoritative Rust hub status.
|
|
74
|
-
* Overwrites event-derived activeTunnels with the real activeStreams count.
|
|
75
|
-
*/
|
|
76
|
-
async reconcile() {
|
|
77
|
-
const hubStatus = await this.hub.getStatus();
|
|
78
|
-
if (!hubStatus || !hubStatus.connectedEdges)
|
|
79
|
-
return;
|
|
80
|
-
const rustEdgeIds = new Set();
|
|
81
|
-
for (const rustEdge of hubStatus.connectedEdges) {
|
|
82
|
-
rustEdgeIds.add(rustEdge.edgeId);
|
|
83
|
-
const existing = this.edgeStatuses.get(rustEdge.edgeId);
|
|
84
|
-
if (existing) {
|
|
85
|
-
existing.activeTunnels = rustEdge.activeStreams;
|
|
86
|
-
existing.lastHeartbeat = Date.now();
|
|
87
|
-
// Update peer address if available from Rust hub
|
|
88
|
-
if (rustEdge.peerAddr) {
|
|
89
|
-
existing.publicIp = rustEdge.peerAddr;
|
|
90
|
-
}
|
|
91
|
-
}
|
|
92
|
-
else {
|
|
93
|
-
// Missed edgeConnected event — add entry
|
|
94
|
-
this.edgeStatuses.set(rustEdge.edgeId, {
|
|
95
|
-
edgeId: rustEdge.edgeId,
|
|
96
|
-
connected: true,
|
|
97
|
-
publicIp: rustEdge.peerAddr || null,
|
|
98
|
-
activeTunnels: rustEdge.activeStreams,
|
|
99
|
-
lastHeartbeat: Date.now(),
|
|
100
|
-
connectedAt: rustEdge.connectedAt * 1000,
|
|
101
|
-
});
|
|
102
|
-
}
|
|
103
|
-
}
|
|
104
|
-
// Remove entries for edges no longer connected in Rust (missed edgeDisconnected)
|
|
105
|
-
for (const edgeId of this.edgeStatuses.keys()) {
|
|
106
|
-
if (!rustEdgeIds.has(edgeId)) {
|
|
107
|
-
this.edgeStatuses.delete(edgeId);
|
|
108
|
-
}
|
|
109
|
-
}
|
|
110
|
-
}
|
|
111
|
-
/**
|
|
112
|
-
* Sync allowed edges from the manager to the hub.
|
|
113
|
-
* Call this after creating/deleting/updating edges.
|
|
114
|
-
*/
|
|
115
|
-
async syncAllowedEdges() {
|
|
116
|
-
const edges = this.manager.getAllowedEdges();
|
|
117
|
-
await this.hub.updateAllowedEdges(edges);
|
|
118
|
-
}
|
|
119
|
-
/**
|
|
120
|
-
* Get runtime statuses for all known edges.
|
|
121
|
-
*/
|
|
122
|
-
getEdgeStatuses() {
|
|
123
|
-
return Array.from(this.edgeStatuses.values());
|
|
124
|
-
}
|
|
125
|
-
/**
|
|
126
|
-
* Get status for a specific edge.
|
|
127
|
-
*/
|
|
128
|
-
getEdgeStatus(edgeId) {
|
|
129
|
-
return this.edgeStatuses.get(edgeId);
|
|
130
|
-
}
|
|
131
|
-
/**
|
|
132
|
-
* Get the count of connected edges.
|
|
133
|
-
*/
|
|
134
|
-
getConnectedCount() {
|
|
135
|
-
let count = 0;
|
|
136
|
-
for (const status of this.edgeStatuses.values()) {
|
|
137
|
-
if (status.connected)
|
|
138
|
-
count++;
|
|
139
|
-
}
|
|
140
|
-
return count;
|
|
141
|
-
}
|
|
142
|
-
/**
|
|
143
|
-
* Get the public IPs of all connected edges.
|
|
144
|
-
*/
|
|
145
|
-
getConnectedEdgeIps() {
|
|
146
|
-
const ips = [];
|
|
147
|
-
for (const status of this.edgeStatuses.values()) {
|
|
148
|
-
if (status.connected && status.publicIp) {
|
|
149
|
-
ips.push(status.publicIp);
|
|
150
|
-
}
|
|
151
|
-
}
|
|
152
|
-
return ips;
|
|
153
|
-
}
|
|
154
|
-
/**
|
|
155
|
-
* Get the total number of active tunnels across all edges.
|
|
156
|
-
*/
|
|
157
|
-
getTotalActiveTunnels() {
|
|
158
|
-
let total = 0;
|
|
159
|
-
for (const status of this.edgeStatuses.values()) {
|
|
160
|
-
total += status.activeTunnels;
|
|
161
|
-
}
|
|
162
|
-
return total;
|
|
163
|
-
}
|
|
164
|
-
}
|
|
165
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
export * from './classes.remoteingress-manager.js';
|
|
2
|
-
export * from './classes.tunnel-manager.js';
|
|
3
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9yZW1vdGVpbmdyZXNzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLGNBQWMsb0NBQW9DLENBQUM7QUFDbkQsY0FBYyw2QkFBNkIsQ0FBQyJ9
|
|
@@ -1,144 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Log level for security events
|
|
3
|
-
*/
|
|
4
|
-
export declare enum SecurityLogLevel {
|
|
5
|
-
INFO = "info",
|
|
6
|
-
WARN = "warn",
|
|
7
|
-
ERROR = "error",
|
|
8
|
-
CRITICAL = "critical"
|
|
9
|
-
}
|
|
10
|
-
/**
|
|
11
|
-
* Security event types for categorization
|
|
12
|
-
*/
|
|
13
|
-
export declare enum SecurityEventType {
|
|
14
|
-
AUTHENTICATION = "authentication",
|
|
15
|
-
ACCESS_CONTROL = "access_control",
|
|
16
|
-
EMAIL_VALIDATION = "email_validation",
|
|
17
|
-
EMAIL_PROCESSING = "email_processing",
|
|
18
|
-
EMAIL_FORWARDING = "email_forwarding",
|
|
19
|
-
EMAIL_DELIVERY = "email_delivery",
|
|
20
|
-
DKIM = "dkim",
|
|
21
|
-
SPF = "spf",
|
|
22
|
-
DMARC = "dmarc",
|
|
23
|
-
RATE_LIMIT = "rate_limit",
|
|
24
|
-
RATE_LIMITING = "rate_limiting",
|
|
25
|
-
SPAM = "spam",
|
|
26
|
-
MALWARE = "malware",
|
|
27
|
-
CONNECTION = "connection",
|
|
28
|
-
DATA_EXPOSURE = "data_exposure",
|
|
29
|
-
CONFIGURATION = "configuration",
|
|
30
|
-
IP_REPUTATION = "ip_reputation",
|
|
31
|
-
REJECTED_CONNECTION = "rejected_connection"
|
|
32
|
-
}
|
|
33
|
-
/**
|
|
34
|
-
* Security event interface
|
|
35
|
-
*/
|
|
36
|
-
export interface ISecurityEvent {
|
|
37
|
-
timestamp: number;
|
|
38
|
-
level: SecurityLogLevel;
|
|
39
|
-
type: SecurityEventType;
|
|
40
|
-
message: string;
|
|
41
|
-
details?: any;
|
|
42
|
-
ipAddress?: string;
|
|
43
|
-
userId?: string;
|
|
44
|
-
sessionId?: string;
|
|
45
|
-
emailId?: string;
|
|
46
|
-
domain?: string;
|
|
47
|
-
action?: string;
|
|
48
|
-
result?: string;
|
|
49
|
-
success?: boolean;
|
|
50
|
-
}
|
|
51
|
-
/**
|
|
52
|
-
* Security logger for enhanced security monitoring
|
|
53
|
-
*/
|
|
54
|
-
export declare class SecurityLogger {
|
|
55
|
-
private static instance;
|
|
56
|
-
private securityEvents;
|
|
57
|
-
private maxEventHistory;
|
|
58
|
-
private enableNotifications;
|
|
59
|
-
private constructor();
|
|
60
|
-
/**
|
|
61
|
-
* Get singleton instance
|
|
62
|
-
*/
|
|
63
|
-
static getInstance(options?: {
|
|
64
|
-
maxEventHistory?: number;
|
|
65
|
-
enableNotifications?: boolean;
|
|
66
|
-
}): SecurityLogger;
|
|
67
|
-
/**
|
|
68
|
-
* Reset the singleton instance (for shutdown/testing)
|
|
69
|
-
*/
|
|
70
|
-
static resetInstance(): void;
|
|
71
|
-
/**
|
|
72
|
-
* Log a security event
|
|
73
|
-
* @param event The security event to log
|
|
74
|
-
*/
|
|
75
|
-
logEvent(event: Omit<ISecurityEvent, 'timestamp'>): void;
|
|
76
|
-
/**
|
|
77
|
-
* Get recent security events
|
|
78
|
-
* @param limit Maximum number of events to return
|
|
79
|
-
* @param filter Filter for specific event types
|
|
80
|
-
* @returns Recent security events
|
|
81
|
-
*/
|
|
82
|
-
getRecentEvents(limit?: number, filter?: {
|
|
83
|
-
level?: SecurityLogLevel;
|
|
84
|
-
type?: SecurityEventType;
|
|
85
|
-
fromTimestamp?: number;
|
|
86
|
-
toTimestamp?: number;
|
|
87
|
-
}): ISecurityEvent[];
|
|
88
|
-
/**
|
|
89
|
-
* Get events by security level
|
|
90
|
-
* @param level The security level to filter by
|
|
91
|
-
* @param limit Maximum number of events to return
|
|
92
|
-
* @returns Security events matching the level
|
|
93
|
-
*/
|
|
94
|
-
getEventsByLevel(level: SecurityLogLevel, limit?: number): ISecurityEvent[];
|
|
95
|
-
/**
|
|
96
|
-
* Get events by security type
|
|
97
|
-
* @param type The event type to filter by
|
|
98
|
-
* @param limit Maximum number of events to return
|
|
99
|
-
* @returns Security events matching the type
|
|
100
|
-
*/
|
|
101
|
-
getEventsByType(type: SecurityEventType, limit?: number): ISecurityEvent[];
|
|
102
|
-
/**
|
|
103
|
-
* Get security events for a specific IP address
|
|
104
|
-
* @param ipAddress The IP address to filter by
|
|
105
|
-
* @param limit Maximum number of events to return
|
|
106
|
-
* @returns Security events for the IP address
|
|
107
|
-
*/
|
|
108
|
-
getEventsByIP(ipAddress: string, limit?: number): ISecurityEvent[];
|
|
109
|
-
/**
|
|
110
|
-
* Get security events for a specific domain
|
|
111
|
-
* @param domain The domain to filter by
|
|
112
|
-
* @param limit Maximum number of events to return
|
|
113
|
-
* @returns Security events for the domain
|
|
114
|
-
*/
|
|
115
|
-
getEventsByDomain(domain: string, limit?: number): ISecurityEvent[];
|
|
116
|
-
/**
|
|
117
|
-
* Send a notification for critical security events
|
|
118
|
-
* @param event The security event to notify about
|
|
119
|
-
* @private
|
|
120
|
-
*/
|
|
121
|
-
private sendNotification;
|
|
122
|
-
/**
|
|
123
|
-
* Clear event history
|
|
124
|
-
*/
|
|
125
|
-
clearEvents(): void;
|
|
126
|
-
/**
|
|
127
|
-
* Get statistical summary of security events
|
|
128
|
-
* @param timeWindow Optional time window in milliseconds
|
|
129
|
-
* @returns Summary of security events
|
|
130
|
-
*/
|
|
131
|
-
getEventsSummary(timeWindow?: number): {
|
|
132
|
-
total: number;
|
|
133
|
-
byLevel: Record<SecurityLogLevel, number>;
|
|
134
|
-
byType: Record<SecurityEventType, number>;
|
|
135
|
-
topIPs: Array<{
|
|
136
|
-
ip: string;
|
|
137
|
-
count: number;
|
|
138
|
-
}>;
|
|
139
|
-
topDomains: Array<{
|
|
140
|
-
domain: string;
|
|
141
|
-
count: number;
|
|
142
|
-
}>;
|
|
143
|
-
};
|
|
144
|
-
}
|
|
@@ -1,233 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../plugins.js';
|
|
2
|
-
import { logger } from '../logger.js';
|
|
3
|
-
/**
|
|
4
|
-
* Log level for security events
|
|
5
|
-
*/
|
|
6
|
-
export var SecurityLogLevel;
|
|
7
|
-
(function (SecurityLogLevel) {
|
|
8
|
-
SecurityLogLevel["INFO"] = "info";
|
|
9
|
-
SecurityLogLevel["WARN"] = "warn";
|
|
10
|
-
SecurityLogLevel["ERROR"] = "error";
|
|
11
|
-
SecurityLogLevel["CRITICAL"] = "critical";
|
|
12
|
-
})(SecurityLogLevel || (SecurityLogLevel = {}));
|
|
13
|
-
/**
|
|
14
|
-
* Security event types for categorization
|
|
15
|
-
*/
|
|
16
|
-
export var SecurityEventType;
|
|
17
|
-
(function (SecurityEventType) {
|
|
18
|
-
SecurityEventType["AUTHENTICATION"] = "authentication";
|
|
19
|
-
SecurityEventType["ACCESS_CONTROL"] = "access_control";
|
|
20
|
-
SecurityEventType["EMAIL_VALIDATION"] = "email_validation";
|
|
21
|
-
SecurityEventType["EMAIL_PROCESSING"] = "email_processing";
|
|
22
|
-
SecurityEventType["EMAIL_FORWARDING"] = "email_forwarding";
|
|
23
|
-
SecurityEventType["EMAIL_DELIVERY"] = "email_delivery";
|
|
24
|
-
SecurityEventType["DKIM"] = "dkim";
|
|
25
|
-
SecurityEventType["SPF"] = "spf";
|
|
26
|
-
SecurityEventType["DMARC"] = "dmarc";
|
|
27
|
-
SecurityEventType["RATE_LIMIT"] = "rate_limit";
|
|
28
|
-
SecurityEventType["RATE_LIMITING"] = "rate_limiting";
|
|
29
|
-
SecurityEventType["SPAM"] = "spam";
|
|
30
|
-
SecurityEventType["MALWARE"] = "malware";
|
|
31
|
-
SecurityEventType["CONNECTION"] = "connection";
|
|
32
|
-
SecurityEventType["DATA_EXPOSURE"] = "data_exposure";
|
|
33
|
-
SecurityEventType["CONFIGURATION"] = "configuration";
|
|
34
|
-
SecurityEventType["IP_REPUTATION"] = "ip_reputation";
|
|
35
|
-
SecurityEventType["REJECTED_CONNECTION"] = "rejected_connection";
|
|
36
|
-
})(SecurityEventType || (SecurityEventType = {}));
|
|
37
|
-
/**
|
|
38
|
-
* Security logger for enhanced security monitoring
|
|
39
|
-
*/
|
|
40
|
-
export class SecurityLogger {
|
|
41
|
-
static instance;
|
|
42
|
-
securityEvents = [];
|
|
43
|
-
maxEventHistory;
|
|
44
|
-
enableNotifications;
|
|
45
|
-
constructor(options) {
|
|
46
|
-
this.maxEventHistory = options?.maxEventHistory || 1000;
|
|
47
|
-
this.enableNotifications = options?.enableNotifications || false;
|
|
48
|
-
}
|
|
49
|
-
/**
|
|
50
|
-
* Get singleton instance
|
|
51
|
-
*/
|
|
52
|
-
static getInstance(options) {
|
|
53
|
-
if (!SecurityLogger.instance) {
|
|
54
|
-
SecurityLogger.instance = new SecurityLogger(options);
|
|
55
|
-
}
|
|
56
|
-
return SecurityLogger.instance;
|
|
57
|
-
}
|
|
58
|
-
/**
|
|
59
|
-
* Reset the singleton instance (for shutdown/testing)
|
|
60
|
-
*/
|
|
61
|
-
static resetInstance() {
|
|
62
|
-
SecurityLogger.instance = undefined;
|
|
63
|
-
}
|
|
64
|
-
/**
|
|
65
|
-
* Log a security event
|
|
66
|
-
* @param event The security event to log
|
|
67
|
-
*/
|
|
68
|
-
logEvent(event) {
|
|
69
|
-
const fullEvent = {
|
|
70
|
-
...event,
|
|
71
|
-
timestamp: Date.now()
|
|
72
|
-
};
|
|
73
|
-
// Store in memory buffer
|
|
74
|
-
this.securityEvents.push(fullEvent);
|
|
75
|
-
// Trim history if needed
|
|
76
|
-
if (this.securityEvents.length > this.maxEventHistory) {
|
|
77
|
-
this.securityEvents.shift();
|
|
78
|
-
}
|
|
79
|
-
// Log to regular logger with appropriate level
|
|
80
|
-
switch (event.level) {
|
|
81
|
-
case SecurityLogLevel.INFO:
|
|
82
|
-
logger.log('info', `[SECURITY:${event.type}] ${event.message}`, event.details);
|
|
83
|
-
break;
|
|
84
|
-
case SecurityLogLevel.WARN:
|
|
85
|
-
logger.log('warn', `[SECURITY:${event.type}] ${event.message}`, event.details);
|
|
86
|
-
break;
|
|
87
|
-
case SecurityLogLevel.ERROR:
|
|
88
|
-
case SecurityLogLevel.CRITICAL:
|
|
89
|
-
logger.log('error', `[SECURITY:${event.type}] ${event.message}`, event.details);
|
|
90
|
-
// Send notification for critical events if enabled
|
|
91
|
-
if (event.level === SecurityLogLevel.CRITICAL && this.enableNotifications) {
|
|
92
|
-
this.sendNotification(fullEvent);
|
|
93
|
-
}
|
|
94
|
-
break;
|
|
95
|
-
}
|
|
96
|
-
}
|
|
97
|
-
/**
|
|
98
|
-
* Get recent security events
|
|
99
|
-
* @param limit Maximum number of events to return
|
|
100
|
-
* @param filter Filter for specific event types
|
|
101
|
-
* @returns Recent security events
|
|
102
|
-
*/
|
|
103
|
-
getRecentEvents(limit = 100, filter) {
|
|
104
|
-
let filteredEvents = this.securityEvents;
|
|
105
|
-
// Apply filters
|
|
106
|
-
if (filter) {
|
|
107
|
-
if (filter.level) {
|
|
108
|
-
filteredEvents = filteredEvents.filter(event => event.level === filter.level);
|
|
109
|
-
}
|
|
110
|
-
if (filter.type) {
|
|
111
|
-
filteredEvents = filteredEvents.filter(event => event.type === filter.type);
|
|
112
|
-
}
|
|
113
|
-
if (filter.fromTimestamp) {
|
|
114
|
-
filteredEvents = filteredEvents.filter(event => event.timestamp >= filter.fromTimestamp);
|
|
115
|
-
}
|
|
116
|
-
if (filter.toTimestamp) {
|
|
117
|
-
filteredEvents = filteredEvents.filter(event => event.timestamp <= filter.toTimestamp);
|
|
118
|
-
}
|
|
119
|
-
}
|
|
120
|
-
// Return most recent events up to limit (slice first to avoid mutating source)
|
|
121
|
-
return filteredEvents
|
|
122
|
-
.slice()
|
|
123
|
-
.sort((a, b) => b.timestamp - a.timestamp)
|
|
124
|
-
.slice(0, limit);
|
|
125
|
-
}
|
|
126
|
-
/**
|
|
127
|
-
* Get events by security level
|
|
128
|
-
* @param level The security level to filter by
|
|
129
|
-
* @param limit Maximum number of events to return
|
|
130
|
-
* @returns Security events matching the level
|
|
131
|
-
*/
|
|
132
|
-
getEventsByLevel(level, limit = 100) {
|
|
133
|
-
return this.getRecentEvents(limit, { level });
|
|
134
|
-
}
|
|
135
|
-
/**
|
|
136
|
-
* Get events by security type
|
|
137
|
-
* @param type The event type to filter by
|
|
138
|
-
* @param limit Maximum number of events to return
|
|
139
|
-
* @returns Security events matching the type
|
|
140
|
-
*/
|
|
141
|
-
getEventsByType(type, limit = 100) {
|
|
142
|
-
return this.getRecentEvents(limit, { type });
|
|
143
|
-
}
|
|
144
|
-
/**
|
|
145
|
-
* Get security events for a specific IP address
|
|
146
|
-
* @param ipAddress The IP address to filter by
|
|
147
|
-
* @param limit Maximum number of events to return
|
|
148
|
-
* @returns Security events for the IP address
|
|
149
|
-
*/
|
|
150
|
-
getEventsByIP(ipAddress, limit = 100) {
|
|
151
|
-
return this.securityEvents
|
|
152
|
-
.filter(event => event.ipAddress === ipAddress)
|
|
153
|
-
.sort((a, b) => b.timestamp - a.timestamp)
|
|
154
|
-
.slice(0, limit);
|
|
155
|
-
}
|
|
156
|
-
/**
|
|
157
|
-
* Get security events for a specific domain
|
|
158
|
-
* @param domain The domain to filter by
|
|
159
|
-
* @param limit Maximum number of events to return
|
|
160
|
-
* @returns Security events for the domain
|
|
161
|
-
*/
|
|
162
|
-
getEventsByDomain(domain, limit = 100) {
|
|
163
|
-
return this.securityEvents
|
|
164
|
-
.filter(event => event.domain === domain)
|
|
165
|
-
.sort((a, b) => b.timestamp - a.timestamp)
|
|
166
|
-
.slice(0, limit);
|
|
167
|
-
}
|
|
168
|
-
/**
|
|
169
|
-
* Send a notification for critical security events
|
|
170
|
-
* @param event The security event to notify about
|
|
171
|
-
* @private
|
|
172
|
-
*/
|
|
173
|
-
sendNotification(event) {
|
|
174
|
-
// In a production environment, this would integrate with a notification service
|
|
175
|
-
// For now, we'll just log that we would send a notification
|
|
176
|
-
logger.log('error', `[SECURITY NOTIFICATION] ${event.message}`, {
|
|
177
|
-
...event,
|
|
178
|
-
notificationSent: true
|
|
179
|
-
});
|
|
180
|
-
// Future integration with alerting systems would go here
|
|
181
|
-
}
|
|
182
|
-
/**
|
|
183
|
-
* Clear event history
|
|
184
|
-
*/
|
|
185
|
-
clearEvents() {
|
|
186
|
-
this.securityEvents = [];
|
|
187
|
-
}
|
|
188
|
-
/**
|
|
189
|
-
* Get statistical summary of security events
|
|
190
|
-
* @param timeWindow Optional time window in milliseconds
|
|
191
|
-
* @returns Summary of security events
|
|
192
|
-
*/
|
|
193
|
-
getEventsSummary(timeWindow) {
|
|
194
|
-
const cutoff = timeWindow ? Date.now() - timeWindow : 0;
|
|
195
|
-
// Initialize counters
|
|
196
|
-
const byLevel = {};
|
|
197
|
-
for (const level of Object.values(SecurityLogLevel)) {
|
|
198
|
-
byLevel[level] = 0;
|
|
199
|
-
}
|
|
200
|
-
const byType = {};
|
|
201
|
-
for (const type of Object.values(SecurityEventType)) {
|
|
202
|
-
byType[type] = 0;
|
|
203
|
-
}
|
|
204
|
-
const ipCounts = new Map();
|
|
205
|
-
const domainCounts = new Map();
|
|
206
|
-
// Single pass over all events
|
|
207
|
-
let total = 0;
|
|
208
|
-
for (const e of this.securityEvents) {
|
|
209
|
-
if (cutoff && e.timestamp < cutoff)
|
|
210
|
-
continue;
|
|
211
|
-
total++;
|
|
212
|
-
byLevel[e.level]++;
|
|
213
|
-
byType[e.type]++;
|
|
214
|
-
if (e.ipAddress) {
|
|
215
|
-
ipCounts.set(e.ipAddress, (ipCounts.get(e.ipAddress) || 0) + 1);
|
|
216
|
-
}
|
|
217
|
-
if (e.domain) {
|
|
218
|
-
domainCounts.set(e.domain, (domainCounts.get(e.domain) || 0) + 1);
|
|
219
|
-
}
|
|
220
|
-
}
|
|
221
|
-
// Sort and limit top entries
|
|
222
|
-
const topIPs = Array.from(ipCounts.entries())
|
|
223
|
-
.map(([ip, count]) => ({ ip, count }))
|
|
224
|
-
.sort((a, b) => b.count - a.count)
|
|
225
|
-
.slice(0, 10);
|
|
226
|
-
const topDomains = Array.from(domainCounts.entries())
|
|
227
|
-
.map(([domain, count]) => ({ domain, count }))
|
|
228
|
-
.sort((a, b) => b.count - a.count)
|
|
229
|
-
.slice(0, 10);
|
|
230
|
-
return { total, byLevel, byType, topIPs, topDomains };
|
|
231
|
-
}
|
|
232
|
-
}
|
|
233
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.securitylogger.js","sourceRoot":"","sources":["../../../ts/security/classes.securitylogger.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AAEtC;;GAEG;AACH,MAAM,CAAN,IAAY,gBAKX;AALD,WAAY,gBAAgB;IAC1B,iCAAa,CAAA;IACb,iCAAa,CAAA;IACb,mCAAe,CAAA;IACf,yCAAqB,CAAA;AACvB,CAAC,EALW,gBAAgB,KAAhB,gBAAgB,QAK3B;AAED;;GAEG;AACH,MAAM,CAAN,IAAY,iBAmBX;AAnBD,WAAY,iBAAiB;IAC3B,sDAAiC,CAAA;IACjC,sDAAiC,CAAA;IACjC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,sDAAiC,CAAA;IACjC,kCAAa,CAAA;IACb,gCAAW,CAAA;IACX,oCAAe,CAAA;IACf,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,kCAAa,CAAA;IACb,wCAAmB,CAAA;IACnB,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,gEAA2C,CAAA;AAC7C,CAAC,EAnBW,iBAAiB,KAAjB,iBAAiB,QAmB5B;AAqBD;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,cAAc,GAAqB,EAAE,CAAC;IACtC,eAAe,CAAS;IACxB,mBAAmB,CAAU;IAErC,YAAoB,OAGnB;QACC,IAAI,CAAC,eAAe,GAAG,OAAO,EAAE,eAAe,IAAI,IAAI,CAAC;QACxD,IAAI,CAAC,mBAAmB,GAAG,OAAO,EAAE,mBAAmB,IAAI,KAAK,CAAC;IACnE,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,WAAW,CAAC,OAGzB;QACC,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,aAAa;QACzB,cAAc,CAAC,QAAQ,GAAG,SAAS,CAAC;IACtC,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,KAAwC;QACtD,MAAM,SAAS,GAAmB;YAChC,GAAG,KAAK;YACR,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACtB,CAAC;QAEF,yBAAyB;QACzB,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAEpC,yBAAyB;QACzB,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;YACtD,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;QAC9B,CAAC;QAED,+CAA+C;QAC/C,QAAQ,KAAK,CAAC,KAAK,EAAE,CAAC;YACpB,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,KAAK,CAAC;YAC5B,KAAK,gBAAgB,CAAC,QAAQ;gBAC5B,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAEhF,mDAAmD;gBACnD,IAAI,KAAK,CAAC,KAAK,KAAK,gBAAgB,CAAC,QAAQ,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;oBAC1E,IAAI,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;gBACnC,CAAC;gBACD,MAAM;QACV,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,QAAgB,GAAG,EAAE,MAK3C;QACC,IAAI,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;QAEzC,gBAAgB;QAChB,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,KAAK,MAAM,CAAC,KAAK,CAAC,CAAC;YAChF,CAAC;YAED,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC;gBAChB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC;YAC9E,CAAC;YAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;gBACzB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,aAAa,CAAC,CAAC;YAC3F,CAAC;YAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;gBACvB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,WAAW,CAAC,CAAC;YACzF,CAAC;QACH,CAAC;QAED,+EAA+E;QAC/E,OAAO,cAAc;aAClB,KAAK,EAAE;aACP,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,gBAAgB,CAAC,KAAuB,EAAE,QAAgB,GAAG;QAClE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAChD,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,IAAuB,EAAE,QAAgB,GAAG;QACjE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,IAAI,EAAE,CAAC,CAAC;IAC/C,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,SAAiB,EAAE,QAAgB,GAAG;QACzD,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,KAAK,SAAS,CAAC;aAC9C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,iBAAiB,CAAC,MAAc,EAAE,QAAgB,GAAG;QAC1D,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,MAAM,KAAK,MAAM,CAAC;aACxC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAqB;QAC5C,gFAAgF;QAChF,4DAA4D;QAC5D,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,KAAK,CAAC,OAAO,EAAE,EAAE;YAC9D,GAAG,KAAK;YACR,gBAAgB,EAAE,IAAI;SACvB,CAAC,CAAC;QAEH,yDAAyD;IAC3D,CAAC;IAED;;OAEG;IACI,WAAW;QAChB,IAAI,CAAC,cAAc,GAAG,EAAE,CAAC;IAC3B,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,UAAmB;QAOzC,MAAM,MAAM,GAAG,UAAU,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC;QAExD,sBAAsB;QACtB,MAAM,OAAO,GAAG,EAAsC,CAAC;QACvD,KAAK,MAAM,KAAK,IAAI,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,EAAE,CAAC;YACpD,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACrB,CAAC;QACD,MAAM,MAAM,GAAG,EAAuC,CAAC;QACvD,KAAK,MAAM,IAAI,IAAI,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACpD,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACnB,CAAC;QACD,MAAM,QAAQ,GAAG,IAAI,GAAG,EAAkB,CAAC;QAC3C,MAAM,YAAY,GAAG,IAAI,GAAG,EAAkB,CAAC;QAE/C,8BAA8B;QAC9B,IAAI,KAAK,GAAG,CAAC,CAAC;QACd,KAAK,MAAM,CAAC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACpC,IAAI,MAAM,IAAI,CAAC,CAAC,SAAS,GAAG,MAAM;gBAAE,SAAS;YAC7C,KAAK,EAAE,CAAC;YACR,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC;YACnB,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC;YACjB,IAAI,CAAC,CAAC,SAAS,EAAE,CAAC;gBAChB,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YAClE,CAAC;YACD,IAAI,CAAC,CAAC,MAAM,EAAE,CAAC;gBACb,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YACpE,CAAC;QACH,CAAC;QAED,6BAA6B;QAC7B,MAAM,MAAM,GAAG,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;aAC1C,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;aACrC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,MAAM,UAAU,GAAG,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;aAClD,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC,CAAC;aAC7C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;IACxD,CAAC;CACF"}
|