@serve.zone/dcrouter 11.0.4 → 11.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (118) hide show
  1. package/dist_serve/bundle.js +1 -1
  2. package/package.json +1 -1
  3. package/ts/00_commitinfo_data.ts +1 -1
  4. package/ts_web/00_commitinfo_data.ts +1 -1
  5. package/dist_ts/00_commitinfo_data.d.ts +0 -8
  6. package/dist_ts/00_commitinfo_data.js +0 -9
  7. package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
  8. package/dist_ts/cache/classes.cache.cleaner.js +0 -130
  9. package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
  10. package/dist_ts/cache/documents/classes.cached.email.js +0 -337
  11. package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
  12. package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
  13. package/dist_ts/cache/documents/index.d.ts +0 -2
  14. package/dist_ts/cache/documents/index.js +0 -3
  15. package/dist_ts/cache/index.d.ts +0 -4
  16. package/dist_ts/cache/index.js +0 -7
  17. package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -53
  18. package/dist_ts/classes.cert-provision-scheduler.js +0 -110
  19. package/dist_ts/classes.dcrouter.d.ts +0 -337
  20. package/dist_ts/classes.dcrouter.js +0 -1405
  21. package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
  22. package/dist_ts/classes.storage-cert-manager.js +0 -43
  23. package/dist_ts/config/classes.api-token-manager.d.ts +0 -46
  24. package/dist_ts/config/classes.api-token-manager.js +0 -150
  25. package/dist_ts/config/classes.route-config-manager.d.ts +0 -35
  26. package/dist_ts/config/classes.route-config-manager.js +0 -231
  27. package/dist_ts/config/index.d.ts +0 -3
  28. package/dist_ts/config/index.js +0 -5
  29. package/dist_ts/config/validator.d.ts +0 -104
  30. package/dist_ts/config/validator.js +0 -152
  31. package/dist_ts/errors/base.errors.d.ts +0 -224
  32. package/dist_ts/errors/base.errors.js +0 -320
  33. package/dist_ts/errors/error-handler.d.ts +0 -98
  34. package/dist_ts/errors/error-handler.js +0 -282
  35. package/dist_ts/errors/error.codes.d.ts +0 -115
  36. package/dist_ts/errors/error.codes.js +0 -136
  37. package/dist_ts/errors/index.d.ts +0 -54
  38. package/dist_ts/errors/index.js +0 -136
  39. package/dist_ts/errors/reputation.errors.d.ts +0 -183
  40. package/dist_ts/errors/reputation.errors.js +0 -292
  41. package/dist_ts/index.d.ts +0 -7
  42. package/dist_ts/index.js +0 -11
  43. package/dist_ts/logger.d.ts +0 -21
  44. package/dist_ts/logger.js +0 -81
  45. package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
  46. package/dist_ts/monitoring/classes.metricscache.js +0 -63
  47. package/dist_ts/monitoring/classes.metricsmanager.d.ts +0 -178
  48. package/dist_ts/monitoring/classes.metricsmanager.js +0 -642
  49. package/dist_ts/monitoring/index.d.ts +0 -1
  50. package/dist_ts/monitoring/index.js +0 -2
  51. package/dist_ts/opsserver/classes.opsserver.d.ts +0 -37
  52. package/dist_ts/opsserver/classes.opsserver.js +0 -85
  53. package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
  54. package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
  55. package/dist_ts/opsserver/handlers/api-token.handler.d.ts +0 -6
  56. package/dist_ts/opsserver/handlers/api-token.handler.js +0 -62
  57. package/dist_ts/opsserver/handlers/certificate.handler.d.ts +0 -32
  58. package/dist_ts/opsserver/handlers/certificate.handler.js +0 -421
  59. package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
  60. package/dist_ts/opsserver/handlers/config.handler.js +0 -192
  61. package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +0 -30
  62. package/dist_ts/opsserver/handlers/email-ops.handler.js +0 -227
  63. package/dist_ts/opsserver/handlers/index.d.ts +0 -11
  64. package/dist_ts/opsserver/handlers/index.js +0 -12
  65. package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
  66. package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
  67. package/dist_ts/opsserver/handlers/radius.handler.d.ts +0 -6
  68. package/dist_ts/opsserver/handlers/radius.handler.js +0 -295
  69. package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +0 -6
  70. package/dist_ts/opsserver/handlers/remoteingress.handler.js +0 -156
  71. package/dist_ts/opsserver/handlers/route-management.handler.d.ts +0 -14
  72. package/dist_ts/opsserver/handlers/route-management.handler.js +0 -117
  73. package/dist_ts/opsserver/handlers/security.handler.d.ts +0 -9
  74. package/dist_ts/opsserver/handlers/security.handler.js +0 -231
  75. package/dist_ts/opsserver/handlers/stats.handler.d.ts +0 -11
  76. package/dist_ts/opsserver/handlers/stats.handler.js +0 -399
  77. package/dist_ts/opsserver/helpers/guards.d.ts +0 -27
  78. package/dist_ts/opsserver/helpers/guards.js +0 -43
  79. package/dist_ts/opsserver/index.d.ts +0 -1
  80. package/dist_ts/opsserver/index.js +0 -2
  81. package/dist_ts/paths.d.ts +0 -26
  82. package/dist_ts/paths.js +0 -45
  83. package/dist_ts/plugins.d.ts +0 -79
  84. package/dist_ts/plugins.js +0 -113
  85. package/dist_ts/radius/classes.accounting.manager.d.ts +0 -218
  86. package/dist_ts/radius/classes.accounting.manager.js +0 -417
  87. package/dist_ts/radius/classes.radius.server.d.ts +0 -171
  88. package/dist_ts/radius/classes.radius.server.js +0 -385
  89. package/dist_ts/radius/classes.vlan.manager.d.ts +0 -128
  90. package/dist_ts/radius/classes.vlan.manager.js +0 -279
  91. package/dist_ts/radius/index.d.ts +0 -13
  92. package/dist_ts/radius/index.js +0 -14
  93. package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +0 -82
  94. package/dist_ts/remoteingress/classes.remoteingress-manager.js +0 -227
  95. package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +0 -59
  96. package/dist_ts/remoteingress/classes.tunnel-manager.js +0 -165
  97. package/dist_ts/remoteingress/index.d.ts +0 -2
  98. package/dist_ts/remoteingress/index.js +0 -3
  99. package/dist_ts/security/classes.contentscanner.d.ts +0 -164
  100. package/dist_ts/security/classes.contentscanner.js +0 -642
  101. package/dist_ts/security/classes.ipreputationchecker.d.ts +0 -160
  102. package/dist_ts/security/classes.ipreputationchecker.js +0 -537
  103. package/dist_ts/security/classes.securitylogger.d.ts +0 -144
  104. package/dist_ts/security/classes.securitylogger.js +0 -233
  105. package/dist_ts/security/index.d.ts +0 -3
  106. package/dist_ts/security/index.js +0 -4
  107. package/dist_ts/sms/classes.smsservice.d.ts +0 -15
  108. package/dist_ts/sms/classes.smsservice.js +0 -72
  109. package/dist_ts/sms/config/sms.config.d.ts +0 -93
  110. package/dist_ts/sms/config/sms.config.js +0 -2
  111. package/dist_ts/sms/config/sms.schema.d.ts +0 -5
  112. package/dist_ts/sms/config/sms.schema.js +0 -121
  113. package/dist_ts/sms/index.d.ts +0 -1
  114. package/dist_ts/sms/index.js +0 -2
  115. package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
  116. package/dist_ts/storage/classes.storagemanager.js +0 -350
  117. package/dist_ts/storage/index.d.ts +0 -1
  118. package/dist_ts/storage/index.js +0 -3
@@ -1,642 +0,0 @@
1
- import * as plugins from '../plugins.js';
2
- import { logger } from '../logger.js';
3
- import { Email } from '@push.rocks/smartmta';
4
- import { SecurityLogger, SecurityLogLevel, SecurityEventType } from './classes.securitylogger.js';
5
- import { LRUCache } from 'lru-cache';
6
- /**
7
- * Threat categories
8
- */
9
- export var ThreatCategory;
10
- (function (ThreatCategory) {
11
- ThreatCategory["SPAM"] = "spam";
12
- ThreatCategory["PHISHING"] = "phishing";
13
- ThreatCategory["MALWARE"] = "malware";
14
- ThreatCategory["EXECUTABLE"] = "executable";
15
- ThreatCategory["SUSPICIOUS_LINK"] = "suspicious_link";
16
- ThreatCategory["MALICIOUS_MACRO"] = "malicious_macro";
17
- ThreatCategory["XSS"] = "xss";
18
- ThreatCategory["SENSITIVE_DATA"] = "sensitive_data";
19
- ThreatCategory["BLACKLISTED_CONTENT"] = "blacklisted_content";
20
- ThreatCategory["CUSTOM_RULE"] = "custom_rule";
21
- })(ThreatCategory || (ThreatCategory = {}));
22
- /**
23
- * Content Scanner for detecting malicious email content
24
- */
25
- export class ContentScanner {
26
- static instance;
27
- scanCache;
28
- options;
29
- // Predefined patterns for common threats
30
- static MALICIOUS_PATTERNS = {
31
- // Phishing patterns
32
- phishing: [
33
- /(?:verify|confirm|update|login).*(?:account|password|details)/i,
34
- /urgent.*(?:action|attention|required)/i,
35
- /(?:paypal|apple|microsoft|amazon|google|bank).*(?:verify|confirm|suspend)/i,
36
- /your.*(?:account).*(?:suspended|compromised|locked)/i,
37
- /\b(?:password reset|security alert|security notice)\b/i
38
- ],
39
- // Spam indicators
40
- spam: [
41
- /\b(?:viagra|cialis|enlargement|diet pill|lose weight fast|cheap meds)\b/i,
42
- /\b(?:million dollars|lottery winner|prize claim|inheritance|rich widow)\b/i,
43
- /\b(?:earn from home|make money fast|earn \$\d{3,}\/day)\b/i,
44
- /\b(?:limited time offer|act now|exclusive deal|only \d+ left)\b/i,
45
- /\b(?:forex|stock tip|investment opportunity|cryptocurrency|bitcoin)\b/i
46
- ],
47
- // Malware indicators in text
48
- malware: [
49
- /(?:attached file|see attachment).*(?:invoice|receipt|statement|document)/i,
50
- /open.*(?:the attached|this attachment)/i,
51
- /(?:enable|allow).*(?:macros|content|editing)/i,
52
- /download.*(?:attachment|file|document)/i,
53
- /\b(?:ransomware protection|virus alert|malware detected)\b/i
54
- ],
55
- // Suspicious links
56
- suspiciousLinks: [
57
- /https?:\/\/bit\.ly\//i,
58
- /https?:\/\/goo\.gl\//i,
59
- /https?:\/\/t\.co\//i,
60
- /https?:\/\/tinyurl\.com\//i,
61
- /https?:\/\/(?:\d{1,3}\.){3}\d{1,3}/i, // IP address URLs
62
- /https?:\/\/.*\.(?:xyz|top|club|gq|cf)\//i, // Suspicious TLDs
63
- /(?:login|account|signin|auth).*\.(?!gov|edu|com|org|net)\w+\.\w+/i, // Login pages on unusual domains
64
- ],
65
- // XSS and script injection
66
- scriptInjection: [
67
- /<script.*>.*<\/script>/is,
68
- /javascript:/i,
69
- /on(?:click|load|mouse|error|focus|blur)=".*"/i,
70
- /document\.(?:cookie|write|location)/i,
71
- /eval\s*\(/i
72
- ],
73
- // Sensitive data patterns
74
- sensitiveData: [
75
- /\b(?:\d{3}-\d{2}-\d{4}|\d{9})\b/, // SSN
76
- /\b\d{13,16}\b/, // Credit card numbers
77
- /\b(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=|[A-Za-z0-9+/]{4})\b/ // Possible Base64
78
- ]
79
- };
80
- // Common executable extensions
81
- static EXECUTABLE_EXTENSIONS = [
82
- '.exe', '.dll', '.bat', '.cmd', '.msi', '.js', '.vbs', '.ps1',
83
- '.sh', '.jar', '.py', '.com', '.scr', '.pif', '.hta', '.cpl',
84
- '.reg', '.vba', '.lnk', '.wsf', '.msi', '.msp', '.mst'
85
- ];
86
- // Document formats that may contain macros
87
- static MACRO_DOCUMENT_EXTENSIONS = [
88
- '.doc', '.docm', '.xls', '.xlsm', '.ppt', '.pptm', '.dotm', '.xlsb', '.ppam', '.potm'
89
- ];
90
- /**
91
- * Default options for the content scanner
92
- */
93
- static DEFAULT_OPTIONS = {
94
- maxCacheSize: 10000,
95
- cacheTTL: 24 * 60 * 60 * 1000, // 24 hours
96
- scanSubject: true,
97
- scanBody: true,
98
- scanAttachments: true,
99
- maxAttachmentSizeToScan: 10 * 1024 * 1024, // 10MB
100
- scanAttachmentNames: true,
101
- blockExecutables: true,
102
- blockMacros: true,
103
- customRules: [],
104
- minThreatScore: 30, // Minimum score to consider content as a threat
105
- highThreatScore: 70 // Score above which content is considered high threat
106
- };
107
- /**
108
- * Constructor for the ContentScanner
109
- * @param options Configuration options
110
- */
111
- constructor(options = {}) {
112
- // Merge with default options
113
- this.options = {
114
- ...ContentScanner.DEFAULT_OPTIONS,
115
- ...options
116
- };
117
- // Initialize cache
118
- this.scanCache = new LRUCache({
119
- max: this.options.maxCacheSize,
120
- ttl: this.options.cacheTTL,
121
- });
122
- logger.log('info', 'ContentScanner initialized');
123
- }
124
- /**
125
- * Get the singleton instance of the scanner
126
- * @param options Configuration options
127
- * @returns Singleton scanner instance
128
- */
129
- static getInstance(options = {}) {
130
- if (!ContentScanner.instance) {
131
- ContentScanner.instance = new ContentScanner(options);
132
- }
133
- return ContentScanner.instance;
134
- }
135
- /**
136
- * Reset the singleton instance (for shutdown/testing)
137
- */
138
- static resetInstance() {
139
- ContentScanner.instance = undefined;
140
- }
141
- /**
142
- * Scan an email for malicious content
143
- * @param email The email to scan
144
- * @returns Scan result
145
- */
146
- async scanEmail(email) {
147
- try {
148
- // Generate a cache key from the email
149
- const cacheKey = this.generateCacheKey(email);
150
- // Check cache first
151
- const cachedResult = this.scanCache.get(cacheKey);
152
- if (cachedResult) {
153
- logger.log('info', `Using cached scan result for email ${email.getMessageId()}`);
154
- return cachedResult;
155
- }
156
- // Initialize scan result
157
- const result = {
158
- isClean: true,
159
- threatScore: 0,
160
- scannedElements: [],
161
- timestamp: Date.now()
162
- };
163
- // List of scan promises
164
- const scanPromises = [];
165
- // Scan subject
166
- if (this.options.scanSubject && email.subject) {
167
- scanPromises.push(this.scanSubject(email.subject, result));
168
- }
169
- // Scan body content
170
- if (this.options.scanBody) {
171
- if (email.text) {
172
- scanPromises.push(this.scanTextContent(email.text, result));
173
- }
174
- if (email.html) {
175
- scanPromises.push(this.scanHtmlContent(email.html, result));
176
- }
177
- }
178
- // Scan attachments
179
- if (this.options.scanAttachments && email.attachments && email.attachments.length > 0) {
180
- for (const attachment of email.attachments) {
181
- scanPromises.push(this.scanAttachment(attachment, result));
182
- }
183
- }
184
- // Run all scans in parallel
185
- await Promise.all(scanPromises);
186
- // Determine if the email is clean based on threat score
187
- result.isClean = result.threatScore < this.options.minThreatScore;
188
- // Save to cache
189
- this.scanCache.set(cacheKey, result);
190
- // Log high threat findings
191
- if (result.threatScore >= this.options.highThreatScore) {
192
- this.logHighThreatFound(email, result);
193
- }
194
- else if (!result.isClean) {
195
- this.logThreatFound(email, result);
196
- }
197
- return result;
198
- }
199
- catch (error) {
200
- logger.log('error', `Error scanning email: ${error.message}`, {
201
- messageId: email.getMessageId(),
202
- error: error.stack
203
- });
204
- // Return a safe default with error indication
205
- return {
206
- isClean: true, // Let it pass if scanner fails (configure as desired)
207
- threatScore: 0,
208
- scannedElements: ['error'],
209
- timestamp: Date.now(),
210
- threatType: 'scan_error',
211
- threatDetails: `Scan error: ${error.message}`
212
- };
213
- }
214
- }
215
- /**
216
- * Generate a cache key from an email
217
- * @param email The email to generate a key for
218
- * @returns Cache key
219
- */
220
- generateCacheKey(email) {
221
- // Use message ID if available
222
- if (email.getMessageId()) {
223
- return `email:${email.getMessageId()}`;
224
- }
225
- // Fallback to a hash of key content
226
- const contentToHash = [
227
- email.from,
228
- email.subject || '',
229
- email.text?.substring(0, 1000) || '',
230
- email.html?.substring(0, 1000) || '',
231
- email.attachments?.length || 0
232
- ].join(':');
233
- return `email:${plugins.crypto.createHash('sha256').update(contentToHash).digest('hex')}`;
234
- }
235
- /**
236
- * Scan email subject for threats
237
- * @param subject The subject to scan
238
- * @param result The scan result to update
239
- */
240
- async scanSubject(subject, result) {
241
- result.scannedElements.push('subject');
242
- // Check against phishing patterns
243
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.phishing) {
244
- if (pattern.test(subject)) {
245
- result.threatScore += 25;
246
- result.threatType = ThreatCategory.PHISHING;
247
- result.threatDetails = `Subject contains potential phishing indicators: ${subject}`;
248
- return;
249
- }
250
- }
251
- // Check against spam patterns
252
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.spam) {
253
- if (pattern.test(subject)) {
254
- result.threatScore += 15;
255
- result.threatType = ThreatCategory.SPAM;
256
- result.threatDetails = `Subject contains potential spam indicators: ${subject}`;
257
- return;
258
- }
259
- }
260
- // Check custom rules
261
- for (const rule of this.options.customRules) {
262
- const pattern = rule.pattern instanceof RegExp ? rule.pattern : new RegExp(rule.pattern, 'i');
263
- if (pattern.test(subject)) {
264
- result.threatScore += rule.score;
265
- result.threatType = rule.type;
266
- result.threatDetails = rule.description;
267
- return;
268
- }
269
- }
270
- }
271
- /**
272
- * Scan plain text content for threats
273
- * @param text The text content to scan
274
- * @param result The scan result to update
275
- */
276
- async scanTextContent(text, result) {
277
- result.scannedElements.push('text');
278
- // Check suspicious links
279
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.suspiciousLinks) {
280
- if (pattern.test(text)) {
281
- result.threatScore += 20;
282
- if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SUSPICIOUS_LINK ? 0 : 20)) {
283
- result.threatType = ThreatCategory.SUSPICIOUS_LINK;
284
- result.threatDetails = `Text contains suspicious links`;
285
- }
286
- }
287
- }
288
- // Check phishing
289
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.phishing) {
290
- if (pattern.test(text)) {
291
- result.threatScore += 25;
292
- if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.PHISHING ? 0 : 25)) {
293
- result.threatType = ThreatCategory.PHISHING;
294
- result.threatDetails = `Text contains potential phishing indicators`;
295
- }
296
- }
297
- }
298
- // Check spam
299
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.spam) {
300
- if (pattern.test(text)) {
301
- result.threatScore += 15;
302
- if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SPAM ? 0 : 15)) {
303
- result.threatType = ThreatCategory.SPAM;
304
- result.threatDetails = `Text contains potential spam indicators`;
305
- }
306
- }
307
- }
308
- // Check malware indicators
309
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.malware) {
310
- if (pattern.test(text)) {
311
- result.threatScore += 30;
312
- if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.MALWARE ? 0 : 30)) {
313
- result.threatType = ThreatCategory.MALWARE;
314
- result.threatDetails = `Text contains potential malware indicators`;
315
- }
316
- }
317
- }
318
- // Check sensitive data
319
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.sensitiveData) {
320
- if (pattern.test(text)) {
321
- result.threatScore += 25;
322
- if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SENSITIVE_DATA ? 0 : 25)) {
323
- result.threatType = ThreatCategory.SENSITIVE_DATA;
324
- result.threatDetails = `Text contains potentially sensitive data patterns`;
325
- }
326
- }
327
- }
328
- // Check custom rules
329
- for (const rule of this.options.customRules) {
330
- const pattern = rule.pattern instanceof RegExp ? rule.pattern : new RegExp(rule.pattern, 'i');
331
- if (pattern.test(text)) {
332
- result.threatScore += rule.score;
333
- if (!result.threatType || result.threatScore > 20) {
334
- result.threatType = rule.type;
335
- result.threatDetails = rule.description;
336
- }
337
- }
338
- }
339
- }
340
- /**
341
- * Scan HTML content for threats
342
- * @param html The HTML content to scan
343
- * @param result The scan result to update
344
- */
345
- async scanHtmlContent(html, result) {
346
- result.scannedElements.push('html');
347
- // Check for script injection
348
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.scriptInjection) {
349
- if (pattern.test(html)) {
350
- result.threatScore += 40;
351
- if (!result.threatType || result.threatType !== ThreatCategory.XSS) {
352
- result.threatType = ThreatCategory.XSS;
353
- result.threatDetails = `HTML contains potentially malicious script content`;
354
- }
355
- }
356
- }
357
- // Extract text content from HTML for further scanning
358
- const textContent = this.extractTextFromHtml(html);
359
- if (textContent) {
360
- // We'll leverage the text scanning but not double-count threat score
361
- const tempResult = {
362
- isClean: true,
363
- threatScore: 0,
364
- scannedElements: [],
365
- timestamp: Date.now()
366
- };
367
- await this.scanTextContent(textContent, tempResult);
368
- // Only add additional threat types if they're more severe
369
- if (tempResult.threatType && tempResult.threatScore > 0) {
370
- // Add half of the text content score to avoid double counting
371
- result.threatScore += Math.floor(tempResult.threatScore / 2);
372
- // Adopt the threat type if more severe or no existing type
373
- if (!result.threatType || tempResult.threatScore > result.threatScore) {
374
- result.threatType = tempResult.threatType;
375
- result.threatDetails = tempResult.threatDetails;
376
- }
377
- }
378
- }
379
- // Extract and check links from HTML
380
- const links = this.extractLinksFromHtml(html);
381
- if (links.length > 0) {
382
- // Check for suspicious links
383
- let suspiciousLinks = 0;
384
- for (const link of links) {
385
- for (const pattern of ContentScanner.MALICIOUS_PATTERNS.suspiciousLinks) {
386
- if (pattern.test(link)) {
387
- suspiciousLinks++;
388
- break;
389
- }
390
- }
391
- }
392
- if (suspiciousLinks > 0) {
393
- // Add score based on percentage of suspicious links
394
- const suspiciousPercentage = (suspiciousLinks / links.length) * 100;
395
- const additionalScore = Math.min(40, Math.floor(suspiciousPercentage / 2.5));
396
- result.threatScore += additionalScore;
397
- if (!result.threatType || additionalScore > 20) {
398
- result.threatType = ThreatCategory.SUSPICIOUS_LINK;
399
- result.threatDetails = `HTML contains ${suspiciousLinks} suspicious links out of ${links.length} total links`;
400
- }
401
- }
402
- }
403
- }
404
- /**
405
- * Scan an attachment for threats
406
- * @param attachment The attachment to scan
407
- * @param result The scan result to update
408
- */
409
- async scanAttachment(attachment, result) {
410
- const filename = attachment.filename.toLowerCase();
411
- result.scannedElements.push(`attachment:${filename}`);
412
- // Skip large attachments if configured
413
- if (attachment.content && attachment.content.length > this.options.maxAttachmentSizeToScan) {
414
- logger.log('info', `Skipping scan of large attachment: ${filename} (${attachment.content.length} bytes)`);
415
- return;
416
- }
417
- // Check filename for executable extensions
418
- if (this.options.blockExecutables) {
419
- for (const ext of ContentScanner.EXECUTABLE_EXTENSIONS) {
420
- if (filename.endsWith(ext)) {
421
- result.threatScore += 70; // High score for executable attachments
422
- result.threatType = ThreatCategory.EXECUTABLE;
423
- result.threatDetails = `Attachment has a potentially dangerous extension: ${filename}`;
424
- return; // No need to scan contents if filename already flagged
425
- }
426
- }
427
- }
428
- // Check for Office documents with macros
429
- if (this.options.blockMacros) {
430
- for (const ext of ContentScanner.MACRO_DOCUMENT_EXTENSIONS) {
431
- if (filename.endsWith(ext)) {
432
- // For Office documents, check if they contain macros
433
- // This is a simplified check - a real implementation would use specialized libraries
434
- // to detect macros in Office documents
435
- if (attachment.content && this.likelyContainsMacros(attachment)) {
436
- result.threatScore += 60;
437
- result.threatType = ThreatCategory.MALICIOUS_MACRO;
438
- result.threatDetails = `Attachment appears to contain macros: ${filename}`;
439
- return;
440
- }
441
- }
442
- }
443
- }
444
- // Perform basic content analysis if we have content buffer
445
- if (attachment.content) {
446
- // Convert to string for scanning, with a limit to prevent memory issues
447
- const textContent = this.extractTextFromBuffer(attachment.content);
448
- if (textContent) {
449
- // Scan for malicious patterns in attachment content
450
- for (const category in ContentScanner.MALICIOUS_PATTERNS) {
451
- const patterns = ContentScanner.MALICIOUS_PATTERNS[category];
452
- for (const pattern of patterns) {
453
- if (pattern.test(textContent)) {
454
- result.threatScore += 30;
455
- if (!result.threatType) {
456
- result.threatType = this.mapCategoryToThreatType(category);
457
- result.threatDetails = `Attachment content contains suspicious patterns: ${filename}`;
458
- }
459
- break;
460
- }
461
- }
462
- }
463
- }
464
- // Check for PE headers (Windows executables)
465
- if (attachment.content.length > 64 &&
466
- attachment.content[0] === 0x4D &&
467
- attachment.content[1] === 0x5A) { // 'MZ' header
468
- result.threatScore += 80;
469
- result.threatType = ThreatCategory.EXECUTABLE;
470
- result.threatDetails = `Attachment contains executable code: ${filename}`;
471
- }
472
- }
473
- }
474
- /**
475
- * Extract links from HTML content
476
- * @param html HTML content
477
- * @returns Array of extracted links
478
- */
479
- extractLinksFromHtml(html) {
480
- const links = [];
481
- // Simple regex-based extraction - a real implementation might use a proper HTML parser
482
- const matches = html.match(/href=["'](https?:\/\/[^"']+)["']/gi);
483
- if (matches) {
484
- for (const match of matches) {
485
- const linkMatch = match.match(/href=["'](https?:\/\/[^"']+)["']/i);
486
- if (linkMatch && linkMatch[1]) {
487
- links.push(linkMatch[1]);
488
- }
489
- }
490
- }
491
- return links;
492
- }
493
- /**
494
- * Extract plain text from HTML
495
- * @param html HTML content
496
- * @returns Extracted text
497
- */
498
- extractTextFromHtml(html) {
499
- // Remove HTML tags and decode entities - simplified version
500
- return html
501
- .replace(/<style[^>]*>.*?<\/style>/gs, '')
502
- .replace(/<script[^>]*>.*?<\/script>/gs, '')
503
- .replace(/<[^>]+>/g, ' ')
504
- .replace(/&nbsp;/g, ' ')
505
- .replace(/&lt;/g, '<')
506
- .replace(/&gt;/g, '>')
507
- .replace(/&amp;/g, '&')
508
- .replace(/&quot;/g, '"')
509
- .replace(/&apos;/g, "'")
510
- .replace(/\s+/g, ' ')
511
- .trim();
512
- }
513
- /**
514
- * Extract text from a binary buffer for scanning
515
- * @param buffer Binary content
516
- * @returns Extracted text (may be partial)
517
- */
518
- extractTextFromBuffer(buffer) {
519
- try {
520
- // Limit the amount we convert to avoid memory issues
521
- const sampleSize = Math.min(buffer.length, 100 * 1024); // 100KB max sample
522
- const sample = buffer.slice(0, sampleSize);
523
- // Try to convert to string, filtering out non-printable chars
524
- return sample.toString('utf8')
525
- .replace(/[\x00-\x09\x0B-\x1F\x7F-\x9F]/g, '') // Remove control chars
526
- .replace(/\uFFFD/g, ''); // Remove replacement char
527
- }
528
- catch (error) {
529
- logger.log('warn', `Error extracting text from buffer: ${error.message}`);
530
- return '';
531
- }
532
- }
533
- /**
534
- * Check if an Office document likely contains macros
535
- * This is a simplified check - real implementation would use specialized libraries
536
- * @param attachment The attachment to check
537
- * @returns Whether the file likely contains macros
538
- */
539
- likelyContainsMacros(attachment) {
540
- // Simple heuristic: look for VBA/macro related strings
541
- // This is a simplified approach and not comprehensive
542
- const content = this.extractTextFromBuffer(attachment.content);
543
- const macroIndicators = [
544
- /vbaProject\.bin/i,
545
- /Microsoft VBA/i,
546
- /\bVBA\b/,
547
- /Auto_Open/i,
548
- /AutoExec/i,
549
- /DocumentOpen/i,
550
- /AutoOpen/i,
551
- /\bExecute\(/i,
552
- /\bShell\(/i,
553
- /\bCreateObject\(/i
554
- ];
555
- for (const indicator of macroIndicators) {
556
- if (indicator.test(content)) {
557
- return true;
558
- }
559
- }
560
- return false;
561
- }
562
- /**
563
- * Map a pattern category to a threat type
564
- * @param category The pattern category
565
- * @returns The corresponding threat type
566
- */
567
- mapCategoryToThreatType(category) {
568
- switch (category) {
569
- case 'phishing': return ThreatCategory.PHISHING;
570
- case 'spam': return ThreatCategory.SPAM;
571
- case 'malware': return ThreatCategory.MALWARE;
572
- case 'suspiciousLinks': return ThreatCategory.SUSPICIOUS_LINK;
573
- case 'scriptInjection': return ThreatCategory.XSS;
574
- case 'sensitiveData': return ThreatCategory.SENSITIVE_DATA;
575
- default: return ThreatCategory.BLACKLISTED_CONTENT;
576
- }
577
- }
578
- /**
579
- * Log a high threat finding to the security logger
580
- * @param email The email containing the threat
581
- * @param result The scan result
582
- */
583
- logHighThreatFound(email, result) {
584
- SecurityLogger.getInstance().logEvent({
585
- level: SecurityLogLevel.ERROR,
586
- type: SecurityEventType.MALWARE,
587
- message: `High threat content detected in email from ${email.from} to ${email.to.join(', ')}`,
588
- details: {
589
- messageId: email.getMessageId(),
590
- threatType: result.threatType,
591
- threatDetails: result.threatDetails,
592
- threatScore: result.threatScore,
593
- scannedElements: result.scannedElements,
594
- subject: email.subject
595
- },
596
- success: false,
597
- domain: email.getFromDomain()
598
- });
599
- }
600
- /**
601
- * Log a threat finding to the security logger
602
- * @param email The email containing the threat
603
- * @param result The scan result
604
- */
605
- logThreatFound(email, result) {
606
- SecurityLogger.getInstance().logEvent({
607
- level: SecurityLogLevel.WARN,
608
- type: SecurityEventType.SPAM,
609
- message: `Suspicious content detected in email from ${email.from} to ${email.to.join(', ')}`,
610
- details: {
611
- messageId: email.getMessageId(),
612
- threatType: result.threatType,
613
- threatDetails: result.threatDetails,
614
- threatScore: result.threatScore,
615
- scannedElements: result.scannedElements,
616
- subject: email.subject
617
- },
618
- success: false,
619
- domain: email.getFromDomain()
620
- });
621
- }
622
- /**
623
- * Get threat level description based on score
624
- * @param score Threat score
625
- * @returns Threat level description
626
- */
627
- static getThreatLevel(score) {
628
- if (score < 20) {
629
- return 'none';
630
- }
631
- else if (score < 40) {
632
- return 'low';
633
- }
634
- else if (score < 70) {
635
- return 'medium';
636
- }
637
- else {
638
- return 'high';
639
- }
640
- }
641
- }
642
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.contentscanner.js","sourceRoot":"","sources":["../../../ts/security/classes.contentscanner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAAE,KAAK,EAAa,MAAM,sBAAsB,CAAC;AAExD,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAClG,OAAO,EAAE,QAAQ,EAAE,MAAM,WAAW,CAAC;AAqCrC;;GAEG;AACH,MAAM,CAAN,IAAY,cAWX;AAXD,WAAY,cAAc;IACxB,+BAAa,CAAA;IACb,uCAAqB,CAAA;IACrB,qCAAmB,CAAA;IACnB,2CAAyB,CAAA;IACzB,qDAAmC,CAAA;IACnC,qDAAmC,CAAA;IACnC,6BAAW,CAAA;IACX,mDAAiC,CAAA;IACjC,6DAA2C,CAAA;IAC3C,6CAA2B,CAAA;AAC7B,CAAC,EAXW,cAAc,KAAd,cAAc,QAWzB;AAED;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,SAAS,CAAgC;IACzC,OAAO,CAAmC;IAElD,yCAAyC;IACjC,MAAM,CAAU,kBAAkB,GAAG;QAC3C,oBAAoB;QACpB,QAAQ,EAAE;YACR,gEAAgE;YAChE,wCAAwC;YACxC,4EAA4E;YAC5E,sDAAsD;YACtD,wDAAwD;SACzD;QAED,kBAAkB;QAClB,IAAI,EAAE;YACJ,0EAA0E;YAC1E,4EAA4E;YAC5E,4DAA4D;YAC5D,kEAAkE;YAClE,wEAAwE;SACzE;QAED,6BAA6B;QAC7B,OAAO,EAAE;YACP,2EAA2E;YAC3E,yCAAyC;YACzC,+CAA+C;YAC/C,yCAAyC;YACzC,6DAA6D;SAC9D;QAED,mBAAmB;QACnB,eAAe,EAAE;YACf,uBAAuB;YACvB,uBAAuB;YACvB,qBAAqB;YACrB,4BAA4B;YAC5B,qCAAqC,EAAE,kBAAkB;YACzD,0CAA0C,EAAE,kBAAkB;YAC9D,mEAAmE,EAAE,iCAAiC;SACvG;QAED,2BAA2B;QAC3B,eAAe,EAAE;YACf,0BAA0B;YAC1B,cAAc;YACd,+CAA+C;YAC/C,sCAAsC;YACtC,YAAY;SACb;QAED,0BAA0B;QAC1B,aAAa,EAAE;YACb,iCAAiC,EAAE,MAAM;YACzC,eAAe,EAAE,sBAAsB;YACvC,oFAAoF,CAAC,kBAAkB;SACxG;KACF,CAAC;IAEF,+BAA+B;IACvB,MAAM,CAAU,qBAAqB,GAAG;QAC9C,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM;QAC7D,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;QAC5D,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;KACvD,CAAC;IAEF,2CAA2C;IACnC,MAAM,CAAU,yBAAyB,GAAG;QAClD,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO;KACtF,CAAC;IAEF;;OAEG;IACK,MAAM,CAAU,eAAe,GAAqC;QAC1E,YAAY,EAAE,KAAK;QACnB,QAAQ,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,WAAW;QAC1C,WAAW,EAAE,IAAI;QACjB,QAAQ,EAAE,IAAI;QACd,eAAe,EAAE,IAAI;QACrB,uBAAuB,EAAE,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;QAClD,mBAAmB,EAAE,IAAI;QACzB,gBAAgB,EAAE,IAAI;QACtB,WAAW,EAAE,IAAI;QACjB,WAAW,EAAE,EAAE;QACf,cAAc,EAAE,EAAE,EAAE,gDAAgD;QACpE,eAAe,EAAE,EAAE,CAAE,sDAAsD;KAC5E,CAAC;IAEF;;;OAGG;IACH,YAAY,UAAkC,EAAE;QAC9C,6BAA6B;QAC7B,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,cAAc,CAAC,eAAe;YACjC,GAAG,OAAO;SACX,CAAC;QAEF,mBAAmB;QACnB,IAAI,CAAC,SAAS,GAAG,IAAI,QAAQ,CAAsB;YACjD,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,YAAY;YAC9B,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;SAC3B,CAAC,CAAC;QAEH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,CAAC,CAAC;IACnD,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,WAAW,CAAC,UAAkC,EAAE;QAC5D,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,aAAa;QACzB,cAAc,CAAC,QAAQ,GAAG,SAAS,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,SAAS,CAAC,KAAY;QACjC,IAAI,CAAC;YACH,sCAAsC;YACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;YAE9C,oBAAoB;YACpB,MAAM,YAAY,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAClD,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;gBACjF,OAAO,YAAY,CAAC;YACtB,CAAC;YAED,yBAAyB;YACzB,MAAM,MAAM,GAAgB;gBAC1B,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,EAAE;gBACnB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,wBAAwB;YACxB,MAAM,YAAY,GAAyB,EAAE,CAAC;YAE9C,eAAe;YACf,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI,KAAK,CAAC,OAAO,EAAE,CAAC;gBAC9C,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC,CAAC;YAC7D,CAAC;YAED,oBAAoB;YACpB,IAAI,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;gBAC1B,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC;oBACf,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC9D,CAAC;gBAED,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC;oBACf,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC9D,CAAC;YACH,CAAC;YAED,mBAAmB;YACnB,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,IAAI,KAAK,CAAC,WAAW,IAAI,KAAK,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtF,KAAK,MAAM,UAAU,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;oBAC3C,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC7D,CAAC;YACH,CAAC;YAED,4BAA4B;YAC5B,MAAM,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;YAEhC,wDAAwD;YACxD,MAAM,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,cAAc,CAAC;YAElE,gBAAgB;YAChB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;YAErC,2BAA2B;YAC3B,IAAI,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;gBACvD,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACzC,CAAC;iBAAM,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;gBAC3B,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACrC,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,KAAK,CAAC,OAAO,EAAE,EAAE;gBAC5D,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,KAAK,EAAE,KAAK,CAAC,KAAK;aACnB,CAAC,CAAC;YAEH,8CAA8C;YAC9C,OAAO;gBACL,OAAO,EAAE,IAAI,EAAE,sDAAsD;gBACrE,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,CAAC,OAAO,CAAC;gBAC1B,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,UAAU,EAAE,YAAY;gBACxB,aAAa,EAAE,eAAe,KAAK,CAAC,OAAO,EAAE;aAC9C,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAY;QACnC,8BAA8B;QAC9B,IAAI,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;YACzB,OAAO,SAAS,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;QACzC,CAAC;QAED,oCAAoC;QACpC,MAAM,aAAa,GAAG;YACpB,KAAK,CAAC,IAAI;YACV,KAAK,CAAC,OAAO,IAAI,EAAE;YACnB,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,WAAW,EAAE,MAAM,IAAI,CAAC;SAC/B,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAEZ,OAAO,SAAS,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;IAC5F,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,WAAW,CAAC,OAAe,EAAE,MAAmB;QAC5D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAEvC,kCAAkC;QAClC,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YACjE,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC;gBAC5C,MAAM,CAAC,aAAa,GAAG,mDAAmD,OAAO,EAAE,CAAC;gBACpF,OAAO;YACT,CAAC;QACH,CAAC;QAED,8BAA8B;QAC9B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,IAAI,EAAE,CAAC;YAC7D,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;gBACxC,MAAM,CAAC,aAAa,GAAG,+CAA+C,OAAO,EAAE,CAAC;gBAChF,OAAO;YACT,CAAC;QACH,CAAC;QAED,qBAAqB;QACrB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC9F,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC;gBACjC,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC;gBAC9B,MAAM,CAAC,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC;gBACxC,OAAO;YACT,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,eAAe,CAAC,IAAY,EAAE,MAAmB;QAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpC,yBAAyB;QACzB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;YACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC/G,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;oBACnD,MAAM,CAAC,aAAa,GAAG,gCAAgC,CAAC;gBAC1D,CAAC;YACH,CAAC;QACH,CAAC;QAED,iBAAiB;QACjB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YACjE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACxG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC;oBAC5C,MAAM,CAAC,aAAa,GAAG,6CAA6C,CAAC;gBACvE,CAAC;YACH,CAAC;QACH,CAAC;QAED,aAAa;QACb,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,IAAI,EAAE,CAAC;YAC7D,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACpG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;oBACxC,MAAM,CAAC,aAAa,GAAG,yCAAyC,CAAC;gBACnE,CAAC;YACH,CAAC;QACH,CAAC;QAED,2BAA2B;QAC3B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,OAAO,EAAE,CAAC;YAChE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACvG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC;oBAC3C,MAAM,CAAC,aAAa,GAAG,4CAA4C,CAAC;gBACtE,CAAC;YACH,CAAC;QACH,CAAC;QAED,uBAAuB;QACvB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC;YACtE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC9G,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC;oBAClD,MAAM,CAAC,aAAa,GAAG,mDAAmD,CAAC;gBAC7E,CAAC;YACH,CAAC;QACH,CAAC;QAED,qBAAqB;QACrB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC9F,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC;gBACjC,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,EAAE,EAAE,CAAC;oBAClD,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC;oBAC9B,MAAM,CAAC,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC;gBAC1C,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,eAAe,CAAC,IAAY,EAAE,MAAmB;QAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpC,6BAA6B;QAC7B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;YACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,GAAG,EAAE,CAAC;oBACnE,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,GAAG,CAAC;oBACvC,MAAM,CAAC,aAAa,GAAG,oDAAoD,CAAC;gBAC9E,CAAC;YACH,CAAC;QACH,CAAC;QAED,sDAAsD;QACtD,MAAM,WAAW,GAAG,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;QACnD,IAAI,WAAW,EAAE,CAAC;YAChB,qEAAqE;YACrE,MAAM,UAAU,GAAgB;gBAC9B,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,EAAE;gBACnB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,MAAM,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,UAAU,CAAC,CAAC;YAEpD,0DAA0D;YAC1D,IAAI,UAAU,CAAC,UAAU,IAAI,UAAU,CAAC,WAAW,GAAG,CAAC,EAAE,CAAC;gBACxD,8DAA8D;gBAC9D,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,WAAW,GAAG,CAAC,CAAC,CAAC;gBAE7D,2DAA2D;gBAC3D,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,UAAU,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;oBACtE,MAAM,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;oBAC1C,MAAM,CAAC,aAAa,GAAG,UAAU,CAAC,aAAa,CAAC;gBAClD,CAAC;YACH,CAAC;QACH,CAAC;QAED,oCAAoC;QACpC,MAAM,KAAK,GAAG,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;QAC9C,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACrB,6BAA6B;YAC7B,IAAI,eAAe,GAAG,CAAC,CAAC;YACxB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;gBACzB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;oBACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;wBACvB,eAAe,EAAE,CAAC;wBAClB,MAAM;oBACR,CAAC;gBACH,CAAC;YACH,CAAC;YAED,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;gBACxB,oDAAoD;gBACpD,MAAM,oBAAoB,GAAG,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC;gBACpE,MAAM,eAAe,GAAG,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,IAAI,CAAC,KAAK,CAAC,oBAAoB,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7E,MAAM,CAAC,WAAW,IAAI,eAAe,CAAC;gBAEtC,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,eAAe,GAAG,EAAE,EAAE,CAAC;oBAC/C,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;oBACnD,MAAM,CAAC,aAAa,GAAG,iBAAiB,eAAe,4BAA4B,KAAK,CAAC,MAAM,cAAc,CAAC;gBAChH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,cAAc,CAAC,UAAuB,EAAE,MAAmB;QACvE,MAAM,QAAQ,GAAG,UAAU,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;QACnD,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,cAAc,QAAQ,EAAE,CAAC,CAAC;QAEtD,uCAAuC;QACvC,IAAI,UAAU,CAAC,OAAO,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,uBAAuB,EAAE,CAAC;YAC3F,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,QAAQ,KAAK,UAAU,CAAC,OAAO,CAAC,MAAM,SAAS,CAAC,CAAC;YAC1G,OAAO;QACT,CAAC;QAED,2CAA2C;QAC3C,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;YAClC,KAAK,MAAM,GAAG,IAAI,cAAc,CAAC,qBAAqB,EAAE,CAAC;gBACvD,IAAI,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oBAC3B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC,CAAC,wCAAwC;oBAClE,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,UAAU,CAAC;oBAC9C,MAAM,CAAC,aAAa,GAAG,qDAAqD,QAAQ,EAAE,CAAC;oBACvF,OAAO,CAAC,uDAAuD;gBACjE,CAAC;YACH,CAAC;QACH,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC7B,KAAK,MAAM,GAAG,IAAI,cAAc,CAAC,yBAAyB,EAAE,CAAC;gBAC3D,IAAI,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oBAC3B,qDAAqD;oBACrD,qFAAqF;oBACrF,uCAAuC;oBACvC,IAAI,UAAU,CAAC,OAAO,IAAI,IAAI,CAAC,oBAAoB,CAAC,UAAU,CAAC,EAAE,CAAC;wBAChE,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;wBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;wBACnD,MAAM,CAAC,aAAa,GAAG,yCAAyC,QAAQ,EAAE,CAAC;wBAC3E,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,2DAA2D;QAC3D,IAAI,UAAU,CAAC,OAAO,EAAE,CAAC;YACvB,wEAAwE;YACxE,MAAM,WAAW,GAAG,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;YAEnE,IAAI,WAAW,EAAE,CAAC;gBAChB,oDAAoD;gBACpD,KAAK,MAAM,QAAQ,IAAI,cAAc,CAAC,kBAAkB,EAAE,CAAC;oBACzD,MAAM,QAAQ,GAAG,cAAc,CAAC,kBAAkB,CAAC,QAAQ,CAAC,CAAC;oBAC7D,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;wBAC/B,IAAI,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;4BAC9B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;4BAEzB,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;gCACvB,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,uBAAuB,CAAC,QAAQ,CAAC,CAAC;gCAC3D,MAAM,CAAC,aAAa,GAAG,oDAAoD,QAAQ,EAAE,CAAC;4BACxF,CAAC;4BAED,MAAM;wBACR,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,6CAA6C;YAC7C,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,EAAE;gBAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI;gBAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,cAAc;gBAClD,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,UAAU,CAAC;gBAC9C,MAAM,CAAC,aAAa,GAAG,wCAAwC,QAAQ,EAAE,CAAC;YAC5E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,oBAAoB,CAAC,IAAY;QACvC,MAAM,KAAK,GAAa,EAAE,CAAC;QAE3B,uFAAuF;QACvF,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,oCAAoC,CAAC,CAAC;QACjE,IAAI,OAAO,EAAE,CAAC;YACZ,KAAK,MAAM,KAAK,IAAI,OAAO,EAAE,CAAC;gBAC5B,MAAM,SAAS,GAAG,KAAK,CAAC,KAAK,CAAC,mCAAmC,CAAC,CAAC;gBACnE,IAAI,SAAS,IAAI,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC9B,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC3B,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,mBAAmB,CAAC,IAAY;QACtC,4DAA4D;QAC5D,OAAO,IAAI;aACR,OAAO,CAAC,4BAA4B,EAAE,EAAE,CAAC;aACzC,OAAO,CAAC,8BAA8B,EAAE,EAAE,CAAC;aAC3C,OAAO,CAAC,UAAU,EAAE,GAAG,CAAC;aACxB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC;aACrB,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC;aACrB,OAAO,CAAC,QAAQ,EAAE,GAAG,CAAC;aACtB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,MAAM,EAAE,GAAG,CAAC;aACpB,IAAI,EAAE,CAAC;IACZ,CAAC;IAED;;;;OAIG;IACK,qBAAqB,CAAC,MAAc;QAC1C,IAAI,CAAC;YACH,qDAAqD;YACrD,MAAM,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,MAAM,EAAE,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;YAC3E,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC;YAE3C,8DAA8D;YAC9D,OAAO,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC;iBAC3B,OAAO,CAAC,gCAAgC,EAAE,EAAE,CAAC,CAAC,uBAAuB;iBACrE,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC,CAAC,0BAA0B;QACvD,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC1E,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,oBAAoB,CAAC,UAAuB;QAClD,uDAAuD;QACvD,sDAAsD;QACtD,MAAM,OAAO,GAAG,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAC/D,MAAM,eAAe,GAAG;YACtB,kBAAkB;YAClB,gBAAgB;YAChB,SAAS;YACT,YAAY;YACZ,WAAW;YACX,eAAe;YACf,WAAW;YACX,cAAc;YACd,YAAY;YACZ,mBAAmB;SACpB,CAAC;QAEF,KAAK,MAAM,SAAS,IAAI,eAAe,EAAE,CAAC;YACxC,IAAI,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC5B,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,uBAAuB,CAAC,QAAgB;QAC9C,QAAQ,QAAQ,EAAE,CAAC;YACjB,KAAK,UAAU,CAAC,CAAC,OAAO,cAAc,CAAC,QAAQ,CAAC;YAChD,KAAK,MAAM,CAAC,CAAC,OAAO,cAAc,CAAC,IAAI,CAAC;YACxC,KAAK,SAAS,CAAC,CAAC,OAAO,cAAc,CAAC,OAAO,CAAC;YAC9C,KAAK,iBAAiB,CAAC,CAAC,OAAO,cAAc,CAAC,eAAe,CAAC;YAC9D,KAAK,iBAAiB,CAAC,CAAC,OAAO,cAAc,CAAC,GAAG,CAAC;YAClD,KAAK,eAAe,CAAC,CAAC,OAAO,cAAc,CAAC,cAAc,CAAC;YAC3D,OAAO,CAAC,CAAC,OAAO,cAAc,CAAC,mBAAmB,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,kBAAkB,CAAC,KAAY,EAAE,MAAmB;QAC1D,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,KAAK;YAC7B,IAAI,EAAE,iBAAiB,CAAC,OAAO;YAC/B,OAAO,EAAE,8CAA8C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC7F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACK,cAAc,CAAC,KAAY,EAAE,MAAmB;QACtD,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;YAC5B,IAAI,EAAE,iBAAiB,CAAC,IAAI;YAC5B,OAAO,EAAE,6CAA6C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC5F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc,CAAC,KAAa;QACxC,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACf,OAAO,MAAM,CAAC;QAChB,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,KAAK,CAAC;QACf,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,QAAQ,CAAC;QAClB,CAAC;aAAM,CAAC;YACN,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC"}