@serve.zone/dcrouter 11.0.38 → 11.0.40

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/dist_serve/bundle.js +1 -1
  2. package/dist_ts_web/00_commitinfo_data.js +1 -1
  3. package/package.json +2 -2
  4. package/ts/00_commitinfo_data.ts +1 -1
  5. package/ts_web/00_commitinfo_data.ts +1 -1
  6. package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
  7. package/dist_ts/cache/classes.cache.cleaner.js +0 -130
  8. package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
  9. package/dist_ts/cache/documents/classes.cached.email.js +0 -337
  10. package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
  11. package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
  12. package/dist_ts/cache/documents/index.d.ts +0 -2
  13. package/dist_ts/cache/documents/index.js +0 -3
  14. package/dist_ts/cache/index.d.ts +0 -4
  15. package/dist_ts/cache/index.js +0 -7
  16. package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -53
  17. package/dist_ts/classes.cert-provision-scheduler.js +0 -110
  18. package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
  19. package/dist_ts/classes.storage-cert-manager.js +0 -43
  20. package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
  21. package/dist_ts/monitoring/classes.metricscache.js +0 -63
  22. package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
  23. package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
  24. package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
  25. package/dist_ts/opsserver/handlers/config.handler.js +0 -192
  26. package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
  27. package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
  28. package/dist_ts/security/classes.securitylogger.d.ts +0 -144
  29. package/dist_ts/security/classes.securitylogger.js +0 -233
  30. package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
  31. package/dist_ts/storage/classes.storagemanager.js +0 -350
  32. package/dist_ts/storage/index.d.ts +0 -1
  33. package/dist_ts/storage/index.js +0 -3
@@ -1,256 +0,0 @@
1
- import * as plugins from '../../plugins.js';
2
- import * as interfaces from '../../../dist_ts_interfaces/index.js';
3
- import { logBuffer, baseLogger } from '../../logger.js';
4
- // Module-level singleton: the log push destination is added once and reuses
5
- // the current OpsServer reference so it survives OpsServer restarts without
6
- // accumulating duplicate destinations.
7
- let logPushDestinationInstalled = false;
8
- let currentOpsServerRef = null;
9
- export class LogsHandler {
10
- opsServerRef;
11
- activeStreamStops = new Set();
12
- constructor(opsServerRef) {
13
- this.opsServerRef = opsServerRef;
14
- this.registerHandlers();
15
- this.setupLogPushDestination();
16
- }
17
- /**
18
- * Clean up all active log streams and deactivate the push destination.
19
- * Called when OpsServer stops.
20
- */
21
- cleanup() {
22
- // Stop all active follow-mode log streams
23
- for (const stop of this.activeStreamStops) {
24
- stop();
25
- }
26
- this.activeStreamStops.clear();
27
- // Deactivate the push destination (it stays registered but becomes a no-op)
28
- currentOpsServerRef = null;
29
- }
30
- registerHandlers() {
31
- // All log endpoints register directly on viewRouter (valid identity required via middleware)
32
- const router = this.opsServerRef.viewRouter;
33
- // Get Recent Logs Handler
34
- router.addTypedHandler(new plugins.typedrequest.TypedHandler('getRecentLogs', async (dataArg, toolsArg) => {
35
- const logs = await this.getRecentLogs(dataArg.level, dataArg.category, dataArg.limit || 100, dataArg.offset || 0, dataArg.search, dataArg.timeRange);
36
- return {
37
- logs,
38
- total: logs.length,
39
- hasMore: false,
40
- };
41
- }));
42
- // Get Log Stream Handler
43
- router.addTypedHandler(new plugins.typedrequest.TypedHandler('getLogStream', async (dataArg, toolsArg) => {
44
- // Create a virtual stream for log streaming
45
- const virtualStream = new plugins.typedrequest.VirtualStream();
46
- // Set up log streaming
47
- const streamLogs = this.setupLogStream(virtualStream, dataArg.filters?.level, dataArg.filters?.category, dataArg.follow);
48
- // Start streaming
49
- streamLogs.start();
50
- // Track the stop function so we can clean up on shutdown
51
- this.activeStreamStops.add(streamLogs.stop);
52
- return {
53
- logStream: virtualStream,
54
- };
55
- }));
56
- }
57
- static mapLogLevel(smartlogLevel) {
58
- switch (smartlogLevel) {
59
- case 'silly':
60
- case 'debug':
61
- return 'debug';
62
- case 'warn':
63
- return 'warn';
64
- case 'error':
65
- return 'error';
66
- default:
67
- return 'info';
68
- }
69
- }
70
- static deriveCategory(zone, message) {
71
- const msg = (message || '').toLowerCase();
72
- if (msg.includes('[security:') || msg.includes('security'))
73
- return 'security';
74
- if (zone === 'email' || msg.includes('email') || msg.includes('smtp') || msg.includes('mta'))
75
- return 'email';
76
- if (zone === 'dns' || msg.includes('dns'))
77
- return 'dns';
78
- if (msg.includes('smtp'))
79
- return 'smtp';
80
- return 'system';
81
- }
82
- async getRecentLogs(level, category, limit = 100, offset = 0, search, timeRange) {
83
- // Compute a timestamp cutoff from timeRange
84
- let since;
85
- if (timeRange) {
86
- const rangeMs = {
87
- '1h': 3600000,
88
- '6h': 21600000,
89
- '24h': 86400000,
90
- '7d': 604800000,
91
- '30d': 2592000000,
92
- };
93
- since = Date.now() - (rangeMs[timeRange] || 86400000);
94
- }
95
- // Map the UI level to smartlog levels for filtering
96
- const smartlogLevels = level
97
- ? level === 'debug'
98
- ? ['debug', 'silly']
99
- : level === 'info'
100
- ? ['info', 'ok', 'success', 'note', 'lifecycle']
101
- : [level]
102
- : undefined;
103
- // Fetch a larger batch from buffer, then apply category filter client-side
104
- const rawEntries = logBuffer.getEntries({
105
- level: smartlogLevels,
106
- search,
107
- since,
108
- limit: limit * 3, // over-fetch to compensate for category filtering
109
- offset: 0,
110
- });
111
- // Map ILogPackage → UI log format and apply category filter
112
- const mapped = [];
113
- for (const pkg of rawEntries) {
114
- const uiLevel = LogsHandler.mapLogLevel(pkg.level);
115
- const uiCategory = LogsHandler.deriveCategory(pkg.context?.zone, pkg.message);
116
- if (category && uiCategory !== category)
117
- continue;
118
- mapped.push({
119
- timestamp: pkg.timestamp,
120
- level: uiLevel,
121
- category: uiCategory,
122
- message: pkg.message,
123
- metadata: pkg.data,
124
- });
125
- if (mapped.length >= limit)
126
- break;
127
- }
128
- return mapped;
129
- }
130
- /**
131
- * Add a log destination to the base logger that pushes entries
132
- * to all connected ops_dashboard TypedSocket clients.
133
- *
134
- * Uses a module-level singleton so the destination is added only once,
135
- * even across OpsServer restart cycles. The destination reads
136
- * `currentOpsServerRef` dynamically so it always uses the active server.
137
- */
138
- setupLogPushDestination() {
139
- // Update the module-level reference so the existing destination uses the new server
140
- currentOpsServerRef = this.opsServerRef;
141
- if (logPushDestinationInstalled) {
142
- return; // destination already registered — just updated the ref
143
- }
144
- logPushDestinationInstalled = true;
145
- baseLogger.addLogDestination({
146
- async handleLog(logPackage) {
147
- const opsServer = currentOpsServerRef;
148
- if (!opsServer)
149
- return;
150
- const typedsocket = opsServer.server?.typedserver?.typedsocket;
151
- if (!typedsocket)
152
- return;
153
- let connections;
154
- try {
155
- connections = await typedsocket.findAllTargetConnectionsByTag('role', 'ops_dashboard');
156
- }
157
- catch {
158
- return;
159
- }
160
- if (connections.length === 0)
161
- return;
162
- const entry = {
163
- timestamp: logPackage.timestamp || Date.now(),
164
- level: LogsHandler.mapLogLevel(logPackage.level),
165
- category: LogsHandler.deriveCategory(logPackage.context?.zone, logPackage.message),
166
- message: logPackage.message,
167
- metadata: logPackage.data,
168
- };
169
- for (const conn of connections) {
170
- try {
171
- const push = typedsocket.createTypedRequest('pushLogEntry', conn);
172
- push.fire({ entry }).catch(() => { }); // fire-and-forget
173
- }
174
- catch {
175
- // connection may have closed
176
- }
177
- }
178
- },
179
- });
180
- }
181
- setupLogStream(virtualStream, levelFilter, categoryFilter, follow = true) {
182
- let intervalId = null;
183
- let stopped = false;
184
- let logIndex = 0;
185
- const stop = () => {
186
- stopped = true;
187
- if (intervalId) {
188
- clearInterval(intervalId);
189
- intervalId = null;
190
- }
191
- this.activeStreamStops.delete(stop);
192
- };
193
- const start = () => {
194
- if (!follow) {
195
- // Send existing logs and close
196
- this.getRecentLogs(levelFilter?.[0], categoryFilter?.[0], 100, 0).then(logs => {
197
- logs.forEach(log => {
198
- const logData = JSON.stringify(log);
199
- const encoder = new TextEncoder();
200
- virtualStream.sendData(encoder.encode(logData));
201
- });
202
- });
203
- return;
204
- }
205
- // For follow mode, simulate real-time log streaming
206
- intervalId = setInterval(async () => {
207
- if (stopped) {
208
- // Guard: clear interval if stop() was called between ticks
209
- clearInterval(intervalId);
210
- intervalId = null;
211
- return;
212
- }
213
- const categories = ['smtp', 'dns', 'security', 'system', 'email'];
214
- const levels = ['info', 'warn', 'error', 'debug'];
215
- const mockCategory = categories[Math.floor(Math.random() * categories.length)];
216
- const mockLevel = levels[Math.floor(Math.random() * levels.length)];
217
- // Filter by requested criteria
218
- if (levelFilter && !levelFilter.includes(mockLevel))
219
- return;
220
- if (categoryFilter && !categoryFilter.includes(mockCategory))
221
- return;
222
- const logEntry = {
223
- timestamp: Date.now(),
224
- level: mockLevel,
225
- category: mockCategory,
226
- message: `Real-time log ${logIndex++} from ${mockCategory}`,
227
- metadata: {
228
- requestId: plugins.uuid.v4(),
229
- },
230
- };
231
- const logData = JSON.stringify(logEntry);
232
- const encoder = new TextEncoder();
233
- try {
234
- // Use a timeout to detect hung streams (sendData can hang if the
235
- // VirtualStream's keepAlive loop has ended)
236
- let timeoutHandle;
237
- await Promise.race([
238
- virtualStream.sendData(encoder.encode(logData)).then((result) => {
239
- clearTimeout(timeoutHandle);
240
- return result;
241
- }),
242
- new Promise((_, reject) => {
243
- timeoutHandle = setTimeout(() => reject(new Error('stream send timeout')), 10_000);
244
- }),
245
- ]);
246
- }
247
- catch {
248
- // Stream closed, errored, or timed out — clean up
249
- stop();
250
- }
251
- }, 2000);
252
- };
253
- return { start, stop };
254
- }
255
- }
256
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"logs.handler.js","sourceRoot":"","sources":["../../../../ts/opsserver/handlers/logs.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAE5C,OAAO,KAAK,UAAU,MAAM,iCAAiC,CAAC;AAC9D,OAAO,EAAE,SAAS,EAAE,UAAU,EAAE,MAAM,iBAAiB,CAAC;AAExD,4EAA4E;AAC5E,4EAA4E;AAC5E,uCAAuC;AACvC,IAAI,2BAA2B,GAAG,KAAK,CAAC;AACxC,IAAI,mBAAmB,GAAqB,IAAI,CAAC;AAEjD,MAAM,OAAO,WAAW;IAGF;IAFZ,iBAAiB,GAAoB,IAAI,GAAG,EAAE,CAAC;IAEvD,YAAoB,YAAuB;QAAvB,iBAAY,GAAZ,YAAY,CAAW;QACzC,IAAI,CAAC,gBAAgB,EAAE,CAAC;QACxB,IAAI,CAAC,uBAAuB,EAAE,CAAC;IACjC,CAAC;IAED;;;OAGG;IACI,OAAO;QACZ,0CAA0C;QAC1C,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAC1C,IAAI,EAAE,CAAC;QACT,CAAC;QACD,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,CAAC;QAC/B,4EAA4E;QAC5E,mBAAmB,GAAG,IAAI,CAAC;IAC7B,CAAC;IAEO,gBAAgB;QACtB,6FAA6F;QAC7F,MAAM,MAAM,GAAG,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC;QAE5C,0BAA0B;QAC1B,MAAM,CAAC,eAAe,CACpB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,eAAe,EACf,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,aAAa,CACnC,OAAO,CAAC,KAAK,EACb,OAAO,CAAC,QAAQ,EAChB,OAAO,CAAC,KAAK,IAAI,GAAG,EACpB,OAAO,CAAC,MAAM,IAAI,CAAC,EACnB,OAAO,CAAC,MAAM,EACd,OAAO,CAAC,SAAS,CAClB,CAAC;YAEF,OAAO;gBACL,IAAI;gBACJ,KAAK,EAAE,IAAI,CAAC,MAAM;gBAClB,OAAO,EAAE,KAAK;aACf,CAAC;QACJ,CAAC,CACF,CACF,CAAC;QAEF,yBAAyB;QACzB,MAAM,CAAC,eAAe,CACpB,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,cAAc,EACd,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;YAC1B,4CAA4C;YAC5C,MAAM,aAAa,GAAG,IAAI,OAAO,CAAC,YAAY,CAAC,aAAa,EAAc,CAAC;YAE3E,uBAAuB;YACvB,MAAM,UAAU,GAAG,IAAI,CAAC,cAAc,CACpC,aAAa,EACb,OAAO,CAAC,OAAO,EAAE,KAAK,EACtB,OAAO,CAAC,OAAO,EAAE,QAAQ,EACzB,OAAO,CAAC,MAAM,CACf,CAAC;YAEF,kBAAkB;YAClB,UAAU,CAAC,KAAK,EAAE,CAAC;YAEnB,yDAAyD;YACzD,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE5C,OAAO;gBACL,SAAS,EAAE,aAAoB;aAChC,CAAC;QACJ,CAAC,CACF,CACF,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,WAAW,CAAC,aAAqB;QAC9C,QAAQ,aAAa,EAAE,CAAC;YACtB,KAAK,OAAO,CAAC;YACb,KAAK,OAAO;gBACV,OAAO,OAAO,CAAC;YACjB,KAAK,MAAM;gBACT,OAAO,MAAM,CAAC;YAChB,KAAK,OAAO;gBACV,OAAO,OAAO,CAAC;YACjB;gBACE,OAAO,MAAM,CAAC;QAClB,CAAC;IACH,CAAC;IAEO,MAAM,CAAC,cAAc,CAC3B,IAAa,EACb,OAAgB;QAEhB,MAAM,GAAG,GAAG,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC;QAC1C,IAAI,GAAG,CAAC,QAAQ,CAAC,YAAY,CAAC,IAAI,GAAG,CAAC,QAAQ,CAAC,UAAU,CAAC;YAAE,OAAO,UAAU,CAAC;QAC9E,IAAI,IAAI,KAAK,OAAO,IAAI,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC;YAAE,OAAO,OAAO,CAAC;QAC7G,IAAI,IAAI,KAAK,KAAK,IAAI,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC;YAAE,OAAO,KAAK,CAAC;QACxD,IAAI,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;YAAE,OAAO,MAAM,CAAC;QACxC,OAAO,QAAQ,CAAC;IAClB,CAAC;IAEO,KAAK,CAAC,aAAa,CACzB,KAA2C,EAC3C,QAA2D,EAC3D,QAAgB,GAAG,EACnB,SAAiB,CAAC,EAClB,MAAe,EACf,SAA8C;QAQ9C,4CAA4C;QAC5C,IAAI,KAAyB,CAAC;QAC9B,IAAI,SAAS,EAAE,CAAC;YACd,MAAM,OAAO,GAA2B;gBACtC,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,QAAQ;gBACd,KAAK,EAAE,QAAQ;gBACf,IAAI,EAAE,SAAS;gBACf,KAAK,EAAE,UAAU;aAClB,CAAC;YACF,KAAK,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,CAAC,OAAO,CAAC,SAAS,CAAC,IAAI,QAAQ,CAAC,CAAC;QACxD,CAAC;QAED,oDAAoD;QACpD,MAAM,cAAc,GAAyB,KAAK;YAChD,CAAC,CAAC,KAAK,KAAK,OAAO;gBACjB,CAAC,CAAC,CAAC,OAAO,EAAE,OAAO,CAAC;gBACpB,CAAC,CAAC,KAAK,KAAK,MAAM;oBAChB,CAAC,CAAC,CAAC,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,WAAW,CAAC;oBAChD,CAAC,CAAC,CAAC,KAAK,CAAC;YACb,CAAC,CAAC,SAAS,CAAC;QAEd,2EAA2E;QAC3E,MAAM,UAAU,GAAG,SAAS,CAAC,UAAU,CAAC;YACtC,KAAK,EAAE,cAAqB;YAC5B,MAAM;YACN,KAAK;YACL,KAAK,EAAE,KAAK,GAAG,CAAC,EAAE,kDAAkD;YACpE,MAAM,EAAE,CAAC;SACV,CAAC,CAAC;QAEH,4DAA4D;QAC5D,MAAM,MAAM,GAMP,EAAE,CAAC;QAER,KAAK,MAAM,GAAG,IAAI,UAAU,EAAE,CAAC;YAC7B,MAAM,OAAO,GAAG,WAAW,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;YACnD,MAAM,UAAU,GAAG,WAAW,CAAC,cAAc,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,EAAE,GAAG,CAAC,OAAO,CAAC,CAAC;YAE9E,IAAI,QAAQ,IAAI,UAAU,KAAK,QAAQ;gBAAE,SAAS;YAElD,MAAM,CAAC,IAAI,CAAC;gBACV,SAAS,EAAE,GAAG,CAAC,SAAS;gBACxB,KAAK,EAAE,OAAO;gBACd,QAAQ,EAAE,UAAU;gBACpB,OAAO,EAAE,GAAG,CAAC,OAAO;gBACpB,QAAQ,EAAE,GAAG,CAAC,IAAI;aACnB,CAAC,CAAC;YAEH,IAAI,MAAM,CAAC,MAAM,IAAI,KAAK;gBAAE,MAAM;QACpC,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;;;;;;OAOG;IACK,uBAAuB;QAC7B,oFAAoF;QACpF,mBAAmB,GAAG,IAAI,CAAC,YAAY,CAAC;QAExC,IAAI,2BAA2B,EAAE,CAAC;YAChC,OAAO,CAAC,wDAAwD;QAClE,CAAC;QACD,2BAA2B,GAAG,IAAI,CAAC;QAEnC,UAAU,CAAC,iBAAiB,CAAC;YAC3B,KAAK,CAAC,SAAS,CAAC,UAAe;gBAC7B,MAAM,SAAS,GAAG,mBAAmB,CAAC;gBACtC,IAAI,CAAC,SAAS;oBAAE,OAAO;gBAEvB,MAAM,WAAW,GAAG,SAAS,CAAC,MAAM,EAAE,WAAW,EAAE,WAAW,CAAC;gBAC/D,IAAI,CAAC,WAAW;oBAAE,OAAO;gBAEzB,IAAI,WAAkB,CAAC;gBACvB,IAAI,CAAC;oBACH,WAAW,GAAG,MAAM,WAAW,CAAC,6BAA6B,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;gBACzF,CAAC;gBAAC,MAAM,CAAC;oBACP,OAAO;gBACT,CAAC;gBACD,IAAI,WAAW,CAAC,MAAM,KAAK,CAAC;oBAAE,OAAO;gBAErC,MAAM,KAAK,GAA8B;oBACvC,SAAS,EAAE,UAAU,CAAC,SAAS,IAAI,IAAI,CAAC,GAAG,EAAE;oBAC7C,KAAK,EAAE,WAAW,CAAC,WAAW,CAAC,UAAU,CAAC,KAAK,CAAC;oBAChD,QAAQ,EAAE,WAAW,CAAC,cAAc,CAAC,UAAU,CAAC,OAAO,EAAE,IAAI,EAAE,UAAU,CAAC,OAAO,CAAC;oBAClF,OAAO,EAAE,UAAU,CAAC,OAAO;oBAC3B,QAAQ,EAAE,UAAU,CAAC,IAAI;iBAC1B,CAAC;gBAEF,KAAK,MAAM,IAAI,IAAI,WAAW,EAAE,CAAC;oBAC/B,IAAI,CAAC;wBACH,MAAM,IAAI,GAAG,WAAW,CAAC,kBAAkB,CACzC,cAAc,EACd,IAAI,CACL,CAAC;wBACF,IAAI,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC,KAAK,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC,CAAC,kBAAkB;oBAC1D,CAAC;oBAAC,MAAM,CAAC;wBACP,6BAA6B;oBAC/B,CAAC;gBACH,CAAC;YACH,CAAC;SACF,CAAC,CAAC;IACL,CAAC;IAEO,cAAc,CACpB,aAA6D,EAC7D,WAAsB,EACtB,cAAyB,EACzB,SAAkB,IAAI;QAKtB,IAAI,UAAU,GAA0B,IAAI,CAAC;QAC7C,IAAI,OAAO,GAAG,KAAK,CAAC;QACpB,IAAI,QAAQ,GAAG,CAAC,CAAC;QAEjB,MAAM,IAAI,GAAG,GAAG,EAAE;YAChB,OAAO,GAAG,IAAI,CAAC;YACf,IAAI,UAAU,EAAE,CAAC;gBACf,aAAa,CAAC,UAAU,CAAC,CAAC;gBAC1B,UAAU,GAAG,IAAI,CAAC;YACpB,CAAC;YACD,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACtC,CAAC,CAAC;QAEF,MAAM,KAAK,GAAG,GAAG,EAAE;YACjB,IAAI,CAAC,MAAM,EAAE,CAAC;gBACZ,+BAA+B;gBAC/B,IAAI,CAAC,aAAa,CAChB,WAAW,EAAE,CAAC,CAAC,CAAQ,EACvB,cAAc,EAAE,CAAC,CAAC,CAAQ,EAC1B,GAAG,EACH,CAAC,CACF,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;oBACZ,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,EAAE;wBACjB,MAAM,OAAO,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;wBACpC,MAAM,OAAO,GAAG,IAAI,WAAW,EAAE,CAAC;wBAClC,aAAa,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC;oBAClD,CAAC,CAAC,CAAC;gBACL,CAAC,CAAC,CAAC;gBACH,OAAO;YACT,CAAC;YAED,oDAAoD;YACpD,UAAU,GAAG,WAAW,CAAC,KAAK,IAAI,EAAE;gBAClC,IAAI,OAAO,EAAE,CAAC;oBACZ,2DAA2D;oBAC3D,aAAa,CAAC,UAAW,CAAC,CAAC;oBAC3B,UAAU,GAAG,IAAI,CAAC;oBAClB,OAAO;gBACT,CAAC;gBAED,MAAM,UAAU,GAA4D,CAAC,MAAM,EAAE,KAAK,EAAE,UAAU,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;gBAC3H,MAAM,MAAM,GAA+C,CAAC,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC;gBAE9F,MAAM,YAAY,GAAG,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC;gBAC/E,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBAEpE,+BAA+B;gBAC/B,IAAI,WAAW,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,SAAS,CAAC;oBAAE,OAAO;gBAC5D,IAAI,cAAc,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,YAAY,CAAC;oBAAE,OAAO;gBAErE,MAAM,QAAQ,GAAG;oBACf,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;oBACrB,KAAK,EAAE,SAAS;oBAChB,QAAQ,EAAE,YAAY;oBACtB,OAAO,EAAE,iBAAiB,QAAQ,EAAE,SAAS,YAAY,EAAE;oBAC3D,QAAQ,EAAE;wBACR,SAAS,EAAE,OAAO,CAAC,IAAI,CAAC,EAAE,EAAE;qBAC7B;iBACF,CAAC;gBAEF,MAAM,OAAO,GAAG,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;gBACzC,MAAM,OAAO,GAAG,IAAI,WAAW,EAAE,CAAC;gBAClC,IAAI,CAAC;oBACH,iEAAiE;oBACjE,4CAA4C;oBAC5C,IAAI,aAA4C,CAAC;oBACjD,MAAM,OAAO,CAAC,IAAI,CAAC;wBACjB,aAAa,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,EAAE;4BAC9D,YAAY,CAAC,aAAa,CAAC,CAAC;4BAC5B,OAAO,MAAM,CAAC;wBAChB,CAAC,CAAC;wBACF,IAAI,OAAO,CAAQ,CAAC,CAAC,EAAE,MAAM,EAAE,EAAE;4BAC/B,aAAa,GAAG,UAAU,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,qBAAqB,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;wBACrF,CAAC,CAAC;qBACH,CAAC,CAAC;gBACL,CAAC;gBAAC,MAAM,CAAC;oBACP,kDAAkD;oBAClD,IAAI,EAAE,CAAC;gBACT,CAAC;YACH,CAAC,EAAE,IAAI,CAAC,CAAC;QACX,CAAC,CAAC;QAEF,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;IACzB,CAAC;CACF"}
@@ -1,144 +0,0 @@
1
- /**
2
- * Log level for security events
3
- */
4
- export declare enum SecurityLogLevel {
5
- INFO = "info",
6
- WARN = "warn",
7
- ERROR = "error",
8
- CRITICAL = "critical"
9
- }
10
- /**
11
- * Security event types for categorization
12
- */
13
- export declare enum SecurityEventType {
14
- AUTHENTICATION = "authentication",
15
- ACCESS_CONTROL = "access_control",
16
- EMAIL_VALIDATION = "email_validation",
17
- EMAIL_PROCESSING = "email_processing",
18
- EMAIL_FORWARDING = "email_forwarding",
19
- EMAIL_DELIVERY = "email_delivery",
20
- DKIM = "dkim",
21
- SPF = "spf",
22
- DMARC = "dmarc",
23
- RATE_LIMIT = "rate_limit",
24
- RATE_LIMITING = "rate_limiting",
25
- SPAM = "spam",
26
- MALWARE = "malware",
27
- CONNECTION = "connection",
28
- DATA_EXPOSURE = "data_exposure",
29
- CONFIGURATION = "configuration",
30
- IP_REPUTATION = "ip_reputation",
31
- REJECTED_CONNECTION = "rejected_connection"
32
- }
33
- /**
34
- * Security event interface
35
- */
36
- export interface ISecurityEvent {
37
- timestamp: number;
38
- level: SecurityLogLevel;
39
- type: SecurityEventType;
40
- message: string;
41
- details?: any;
42
- ipAddress?: string;
43
- userId?: string;
44
- sessionId?: string;
45
- emailId?: string;
46
- domain?: string;
47
- action?: string;
48
- result?: string;
49
- success?: boolean;
50
- }
51
- /**
52
- * Security logger for enhanced security monitoring
53
- */
54
- export declare class SecurityLogger {
55
- private static instance;
56
- private securityEvents;
57
- private maxEventHistory;
58
- private enableNotifications;
59
- private constructor();
60
- /**
61
- * Get singleton instance
62
- */
63
- static getInstance(options?: {
64
- maxEventHistory?: number;
65
- enableNotifications?: boolean;
66
- }): SecurityLogger;
67
- /**
68
- * Reset the singleton instance (for shutdown/testing)
69
- */
70
- static resetInstance(): void;
71
- /**
72
- * Log a security event
73
- * @param event The security event to log
74
- */
75
- logEvent(event: Omit<ISecurityEvent, 'timestamp'>): void;
76
- /**
77
- * Get recent security events
78
- * @param limit Maximum number of events to return
79
- * @param filter Filter for specific event types
80
- * @returns Recent security events
81
- */
82
- getRecentEvents(limit?: number, filter?: {
83
- level?: SecurityLogLevel;
84
- type?: SecurityEventType;
85
- fromTimestamp?: number;
86
- toTimestamp?: number;
87
- }): ISecurityEvent[];
88
- /**
89
- * Get events by security level
90
- * @param level The security level to filter by
91
- * @param limit Maximum number of events to return
92
- * @returns Security events matching the level
93
- */
94
- getEventsByLevel(level: SecurityLogLevel, limit?: number): ISecurityEvent[];
95
- /**
96
- * Get events by security type
97
- * @param type The event type to filter by
98
- * @param limit Maximum number of events to return
99
- * @returns Security events matching the type
100
- */
101
- getEventsByType(type: SecurityEventType, limit?: number): ISecurityEvent[];
102
- /**
103
- * Get security events for a specific IP address
104
- * @param ipAddress The IP address to filter by
105
- * @param limit Maximum number of events to return
106
- * @returns Security events for the IP address
107
- */
108
- getEventsByIP(ipAddress: string, limit?: number): ISecurityEvent[];
109
- /**
110
- * Get security events for a specific domain
111
- * @param domain The domain to filter by
112
- * @param limit Maximum number of events to return
113
- * @returns Security events for the domain
114
- */
115
- getEventsByDomain(domain: string, limit?: number): ISecurityEvent[];
116
- /**
117
- * Send a notification for critical security events
118
- * @param event The security event to notify about
119
- * @private
120
- */
121
- private sendNotification;
122
- /**
123
- * Clear event history
124
- */
125
- clearEvents(): void;
126
- /**
127
- * Get statistical summary of security events
128
- * @param timeWindow Optional time window in milliseconds
129
- * @returns Summary of security events
130
- */
131
- getEventsSummary(timeWindow?: number): {
132
- total: number;
133
- byLevel: Record<SecurityLogLevel, number>;
134
- byType: Record<SecurityEventType, number>;
135
- topIPs: Array<{
136
- ip: string;
137
- count: number;
138
- }>;
139
- topDomains: Array<{
140
- domain: string;
141
- count: number;
142
- }>;
143
- };
144
- }
@@ -1,233 +0,0 @@
1
- import * as plugins from '../plugins.js';
2
- import { logger } from '../logger.js';
3
- /**
4
- * Log level for security events
5
- */
6
- export var SecurityLogLevel;
7
- (function (SecurityLogLevel) {
8
- SecurityLogLevel["INFO"] = "info";
9
- SecurityLogLevel["WARN"] = "warn";
10
- SecurityLogLevel["ERROR"] = "error";
11
- SecurityLogLevel["CRITICAL"] = "critical";
12
- })(SecurityLogLevel || (SecurityLogLevel = {}));
13
- /**
14
- * Security event types for categorization
15
- */
16
- export var SecurityEventType;
17
- (function (SecurityEventType) {
18
- SecurityEventType["AUTHENTICATION"] = "authentication";
19
- SecurityEventType["ACCESS_CONTROL"] = "access_control";
20
- SecurityEventType["EMAIL_VALIDATION"] = "email_validation";
21
- SecurityEventType["EMAIL_PROCESSING"] = "email_processing";
22
- SecurityEventType["EMAIL_FORWARDING"] = "email_forwarding";
23
- SecurityEventType["EMAIL_DELIVERY"] = "email_delivery";
24
- SecurityEventType["DKIM"] = "dkim";
25
- SecurityEventType["SPF"] = "spf";
26
- SecurityEventType["DMARC"] = "dmarc";
27
- SecurityEventType["RATE_LIMIT"] = "rate_limit";
28
- SecurityEventType["RATE_LIMITING"] = "rate_limiting";
29
- SecurityEventType["SPAM"] = "spam";
30
- SecurityEventType["MALWARE"] = "malware";
31
- SecurityEventType["CONNECTION"] = "connection";
32
- SecurityEventType["DATA_EXPOSURE"] = "data_exposure";
33
- SecurityEventType["CONFIGURATION"] = "configuration";
34
- SecurityEventType["IP_REPUTATION"] = "ip_reputation";
35
- SecurityEventType["REJECTED_CONNECTION"] = "rejected_connection";
36
- })(SecurityEventType || (SecurityEventType = {}));
37
- /**
38
- * Security logger for enhanced security monitoring
39
- */
40
- export class SecurityLogger {
41
- static instance;
42
- securityEvents = [];
43
- maxEventHistory;
44
- enableNotifications;
45
- constructor(options) {
46
- this.maxEventHistory = options?.maxEventHistory || 1000;
47
- this.enableNotifications = options?.enableNotifications || false;
48
- }
49
- /**
50
- * Get singleton instance
51
- */
52
- static getInstance(options) {
53
- if (!SecurityLogger.instance) {
54
- SecurityLogger.instance = new SecurityLogger(options);
55
- }
56
- return SecurityLogger.instance;
57
- }
58
- /**
59
- * Reset the singleton instance (for shutdown/testing)
60
- */
61
- static resetInstance() {
62
- SecurityLogger.instance = undefined;
63
- }
64
- /**
65
- * Log a security event
66
- * @param event The security event to log
67
- */
68
- logEvent(event) {
69
- const fullEvent = {
70
- ...event,
71
- timestamp: Date.now()
72
- };
73
- // Store in memory buffer
74
- this.securityEvents.push(fullEvent);
75
- // Trim history if needed
76
- if (this.securityEvents.length > this.maxEventHistory) {
77
- this.securityEvents.shift();
78
- }
79
- // Log to regular logger with appropriate level
80
- switch (event.level) {
81
- case SecurityLogLevel.INFO:
82
- logger.log('info', `[SECURITY:${event.type}] ${event.message}`, event.details);
83
- break;
84
- case SecurityLogLevel.WARN:
85
- logger.log('warn', `[SECURITY:${event.type}] ${event.message}`, event.details);
86
- break;
87
- case SecurityLogLevel.ERROR:
88
- case SecurityLogLevel.CRITICAL:
89
- logger.log('error', `[SECURITY:${event.type}] ${event.message}`, event.details);
90
- // Send notification for critical events if enabled
91
- if (event.level === SecurityLogLevel.CRITICAL && this.enableNotifications) {
92
- this.sendNotification(fullEvent);
93
- }
94
- break;
95
- }
96
- }
97
- /**
98
- * Get recent security events
99
- * @param limit Maximum number of events to return
100
- * @param filter Filter for specific event types
101
- * @returns Recent security events
102
- */
103
- getRecentEvents(limit = 100, filter) {
104
- let filteredEvents = this.securityEvents;
105
- // Apply filters
106
- if (filter) {
107
- if (filter.level) {
108
- filteredEvents = filteredEvents.filter(event => event.level === filter.level);
109
- }
110
- if (filter.type) {
111
- filteredEvents = filteredEvents.filter(event => event.type === filter.type);
112
- }
113
- if (filter.fromTimestamp) {
114
- filteredEvents = filteredEvents.filter(event => event.timestamp >= filter.fromTimestamp);
115
- }
116
- if (filter.toTimestamp) {
117
- filteredEvents = filteredEvents.filter(event => event.timestamp <= filter.toTimestamp);
118
- }
119
- }
120
- // Return most recent events up to limit (slice first to avoid mutating source)
121
- return filteredEvents
122
- .slice()
123
- .sort((a, b) => b.timestamp - a.timestamp)
124
- .slice(0, limit);
125
- }
126
- /**
127
- * Get events by security level
128
- * @param level The security level to filter by
129
- * @param limit Maximum number of events to return
130
- * @returns Security events matching the level
131
- */
132
- getEventsByLevel(level, limit = 100) {
133
- return this.getRecentEvents(limit, { level });
134
- }
135
- /**
136
- * Get events by security type
137
- * @param type The event type to filter by
138
- * @param limit Maximum number of events to return
139
- * @returns Security events matching the type
140
- */
141
- getEventsByType(type, limit = 100) {
142
- return this.getRecentEvents(limit, { type });
143
- }
144
- /**
145
- * Get security events for a specific IP address
146
- * @param ipAddress The IP address to filter by
147
- * @param limit Maximum number of events to return
148
- * @returns Security events for the IP address
149
- */
150
- getEventsByIP(ipAddress, limit = 100) {
151
- return this.securityEvents
152
- .filter(event => event.ipAddress === ipAddress)
153
- .sort((a, b) => b.timestamp - a.timestamp)
154
- .slice(0, limit);
155
- }
156
- /**
157
- * Get security events for a specific domain
158
- * @param domain The domain to filter by
159
- * @param limit Maximum number of events to return
160
- * @returns Security events for the domain
161
- */
162
- getEventsByDomain(domain, limit = 100) {
163
- return this.securityEvents
164
- .filter(event => event.domain === domain)
165
- .sort((a, b) => b.timestamp - a.timestamp)
166
- .slice(0, limit);
167
- }
168
- /**
169
- * Send a notification for critical security events
170
- * @param event The security event to notify about
171
- * @private
172
- */
173
- sendNotification(event) {
174
- // In a production environment, this would integrate with a notification service
175
- // For now, we'll just log that we would send a notification
176
- logger.log('error', `[SECURITY NOTIFICATION] ${event.message}`, {
177
- ...event,
178
- notificationSent: true
179
- });
180
- // Future integration with alerting systems would go here
181
- }
182
- /**
183
- * Clear event history
184
- */
185
- clearEvents() {
186
- this.securityEvents = [];
187
- }
188
- /**
189
- * Get statistical summary of security events
190
- * @param timeWindow Optional time window in milliseconds
191
- * @returns Summary of security events
192
- */
193
- getEventsSummary(timeWindow) {
194
- const cutoff = timeWindow ? Date.now() - timeWindow : 0;
195
- // Initialize counters
196
- const byLevel = {};
197
- for (const level of Object.values(SecurityLogLevel)) {
198
- byLevel[level] = 0;
199
- }
200
- const byType = {};
201
- for (const type of Object.values(SecurityEventType)) {
202
- byType[type] = 0;
203
- }
204
- const ipCounts = new Map();
205
- const domainCounts = new Map();
206
- // Single pass over all events
207
- let total = 0;
208
- for (const e of this.securityEvents) {
209
- if (cutoff && e.timestamp < cutoff)
210
- continue;
211
- total++;
212
- byLevel[e.level]++;
213
- byType[e.type]++;
214
- if (e.ipAddress) {
215
- ipCounts.set(e.ipAddress, (ipCounts.get(e.ipAddress) || 0) + 1);
216
- }
217
- if (e.domain) {
218
- domainCounts.set(e.domain, (domainCounts.get(e.domain) || 0) + 1);
219
- }
220
- }
221
- // Sort and limit top entries
222
- const topIPs = Array.from(ipCounts.entries())
223
- .map(([ip, count]) => ({ ip, count }))
224
- .sort((a, b) => b.count - a.count)
225
- .slice(0, 10);
226
- const topDomains = Array.from(domainCounts.entries())
227
- .map(([domain, count]) => ({ domain, count }))
228
- .sort((a, b) => b.count - a.count)
229
- .slice(0, 10);
230
- return { total, byLevel, byType, topIPs, topDomains };
231
- }
232
- }
233
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.securitylogger.js","sourceRoot":"","sources":["../../../ts/security/classes.securitylogger.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AAEtC;;GAEG;AACH,MAAM,CAAN,IAAY,gBAKX;AALD,WAAY,gBAAgB;IAC1B,iCAAa,CAAA;IACb,iCAAa,CAAA;IACb,mCAAe,CAAA;IACf,yCAAqB,CAAA;AACvB,CAAC,EALW,gBAAgB,KAAhB,gBAAgB,QAK3B;AAED;;GAEG;AACH,MAAM,CAAN,IAAY,iBAmBX;AAnBD,WAAY,iBAAiB;IAC3B,sDAAiC,CAAA;IACjC,sDAAiC,CAAA;IACjC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,sDAAiC,CAAA;IACjC,kCAAa,CAAA;IACb,gCAAW,CAAA;IACX,oCAAe,CAAA;IACf,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,kCAAa,CAAA;IACb,wCAAmB,CAAA;IACnB,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,gEAA2C,CAAA;AAC7C,CAAC,EAnBW,iBAAiB,KAAjB,iBAAiB,QAmB5B;AAqBD;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,cAAc,GAAqB,EAAE,CAAC;IACtC,eAAe,CAAS;IACxB,mBAAmB,CAAU;IAErC,YAAoB,OAGnB;QACC,IAAI,CAAC,eAAe,GAAG,OAAO,EAAE,eAAe,IAAI,IAAI,CAAC;QACxD,IAAI,CAAC,mBAAmB,GAAG,OAAO,EAAE,mBAAmB,IAAI,KAAK,CAAC;IACnE,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,WAAW,CAAC,OAGzB;QACC,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,aAAa;QACzB,cAAc,CAAC,QAAQ,GAAG,SAAS,CAAC;IACtC,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,KAAwC;QACtD,MAAM,SAAS,GAAmB;YAChC,GAAG,KAAK;YACR,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACtB,CAAC;QAEF,yBAAyB;QACzB,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAEpC,yBAAyB;QACzB,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;YACtD,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;QAC9B,CAAC;QAED,+CAA+C;QAC/C,QAAQ,KAAK,CAAC,KAAK,EAAE,CAAC;YACpB,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,KAAK,CAAC;YAC5B,KAAK,gBAAgB,CAAC,QAAQ;gBAC5B,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAEhF,mDAAmD;gBACnD,IAAI,KAAK,CAAC,KAAK,KAAK,gBAAgB,CAAC,QAAQ,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;oBAC1E,IAAI,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;gBACnC,CAAC;gBACD,MAAM;QACV,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,QAAgB,GAAG,EAAE,MAK3C;QACC,IAAI,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;QAEzC,gBAAgB;QAChB,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,KAAK,MAAM,CAAC,KAAK,CAAC,CAAC;YAChF,CAAC;YAED,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC;gBAChB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC;YAC9E,CAAC;YAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;gBACzB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,aAAa,CAAC,CAAC;YAC3F,CAAC;YAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;gBACvB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,WAAW,CAAC,CAAC;YACzF,CAAC;QACH,CAAC;QAED,+EAA+E;QAC/E,OAAO,cAAc;aAClB,KAAK,EAAE;aACP,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,gBAAgB,CAAC,KAAuB,EAAE,QAAgB,GAAG;QAClE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAChD,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,IAAuB,EAAE,QAAgB,GAAG;QACjE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,IAAI,EAAE,CAAC,CAAC;IAC/C,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,SAAiB,EAAE,QAAgB,GAAG;QACzD,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,KAAK,SAAS,CAAC;aAC9C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,iBAAiB,CAAC,MAAc,EAAE,QAAgB,GAAG;QAC1D,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,MAAM,KAAK,MAAM,CAAC;aACxC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAqB;QAC5C,gFAAgF;QAChF,4DAA4D;QAC5D,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,KAAK,CAAC,OAAO,EAAE,EAAE;YAC9D,GAAG,KAAK;YACR,gBAAgB,EAAE,IAAI;SACvB,CAAC,CAAC;QAEH,yDAAyD;IAC3D,CAAC;IAED;;OAEG;IACI,WAAW;QAChB,IAAI,CAAC,cAAc,GAAG,EAAE,CAAC;IAC3B,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,UAAmB;QAOzC,MAAM,MAAM,GAAG,UAAU,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC;QAExD,sBAAsB;QACtB,MAAM,OAAO,GAAG,EAAsC,CAAC;QACvD,KAAK,MAAM,KAAK,IAAI,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,EAAE,CAAC;YACpD,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACrB,CAAC;QACD,MAAM,MAAM,GAAG,EAAuC,CAAC;QACvD,KAAK,MAAM,IAAI,IAAI,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACpD,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACnB,CAAC;QACD,MAAM,QAAQ,GAAG,IAAI,GAAG,EAAkB,CAAC;QAC3C,MAAM,YAAY,GAAG,IAAI,GAAG,EAAkB,CAAC;QAE/C,8BAA8B;QAC9B,IAAI,KAAK,GAAG,CAAC,CAAC;QACd,KAAK,MAAM,CAAC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACpC,IAAI,MAAM,IAAI,CAAC,CAAC,SAAS,GAAG,MAAM;gBAAE,SAAS;YAC7C,KAAK,EAAE,CAAC;YACR,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC;YACnB,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC;YACjB,IAAI,CAAC,CAAC,SAAS,EAAE,CAAC;gBAChB,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YAClE,CAAC;YACD,IAAI,CAAC,CAAC,MAAM,EAAE,CAAC;gBACb,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YACpE,CAAC;QACH,CAAC;QAED,6BAA6B;QAC7B,MAAM,MAAM,GAAG,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;aAC1C,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;aACrC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,MAAM,UAAU,GAAG,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;aAClD,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC,CAAC;aAC7C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;IACxD,CAAC;CACF"}