@serve.zone/dcrouter 11.0.4 → 11.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_serve/bundle.js +1 -1
- package/package.json +1 -1
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts_web/00_commitinfo_data.ts +1 -1
- package/dist_ts/00_commitinfo_data.d.ts +0 -8
- package/dist_ts/00_commitinfo_data.js +0 -9
- package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
- package/dist_ts/cache/classes.cache.cleaner.js +0 -130
- package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
- package/dist_ts/cache/documents/classes.cached.email.js +0 -337
- package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
- package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
- package/dist_ts/cache/documents/index.d.ts +0 -2
- package/dist_ts/cache/documents/index.js +0 -3
- package/dist_ts/cache/index.d.ts +0 -4
- package/dist_ts/cache/index.js +0 -7
- package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -53
- package/dist_ts/classes.cert-provision-scheduler.js +0 -110
- package/dist_ts/classes.dcrouter.d.ts +0 -337
- package/dist_ts/classes.dcrouter.js +0 -1405
- package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
- package/dist_ts/classes.storage-cert-manager.js +0 -43
- package/dist_ts/config/classes.api-token-manager.d.ts +0 -46
- package/dist_ts/config/classes.api-token-manager.js +0 -150
- package/dist_ts/config/classes.route-config-manager.d.ts +0 -35
- package/dist_ts/config/classes.route-config-manager.js +0 -231
- package/dist_ts/config/index.d.ts +0 -3
- package/dist_ts/config/index.js +0 -5
- package/dist_ts/config/validator.d.ts +0 -104
- package/dist_ts/config/validator.js +0 -152
- package/dist_ts/errors/base.errors.d.ts +0 -224
- package/dist_ts/errors/base.errors.js +0 -320
- package/dist_ts/errors/error-handler.d.ts +0 -98
- package/dist_ts/errors/error-handler.js +0 -282
- package/dist_ts/errors/error.codes.d.ts +0 -115
- package/dist_ts/errors/error.codes.js +0 -136
- package/dist_ts/errors/index.d.ts +0 -54
- package/dist_ts/errors/index.js +0 -136
- package/dist_ts/errors/reputation.errors.d.ts +0 -183
- package/dist_ts/errors/reputation.errors.js +0 -292
- package/dist_ts/index.d.ts +0 -7
- package/dist_ts/index.js +0 -11
- package/dist_ts/logger.d.ts +0 -21
- package/dist_ts/logger.js +0 -81
- package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
- package/dist_ts/monitoring/classes.metricscache.js +0 -63
- package/dist_ts/monitoring/classes.metricsmanager.d.ts +0 -178
- package/dist_ts/monitoring/classes.metricsmanager.js +0 -642
- package/dist_ts/monitoring/index.d.ts +0 -1
- package/dist_ts/monitoring/index.js +0 -2
- package/dist_ts/opsserver/classes.opsserver.d.ts +0 -37
- package/dist_ts/opsserver/classes.opsserver.js +0 -85
- package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
- package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
- package/dist_ts/opsserver/handlers/api-token.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/api-token.handler.js +0 -62
- package/dist_ts/opsserver/handlers/certificate.handler.d.ts +0 -32
- package/dist_ts/opsserver/handlers/certificate.handler.js +0 -421
- package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
- package/dist_ts/opsserver/handlers/config.handler.js +0 -192
- package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +0 -30
- package/dist_ts/opsserver/handlers/email-ops.handler.js +0 -227
- package/dist_ts/opsserver/handlers/index.d.ts +0 -11
- package/dist_ts/opsserver/handlers/index.js +0 -12
- package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
- package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
- package/dist_ts/opsserver/handlers/radius.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/radius.handler.js +0 -295
- package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/remoteingress.handler.js +0 -156
- package/dist_ts/opsserver/handlers/route-management.handler.d.ts +0 -14
- package/dist_ts/opsserver/handlers/route-management.handler.js +0 -117
- package/dist_ts/opsserver/handlers/security.handler.d.ts +0 -9
- package/dist_ts/opsserver/handlers/security.handler.js +0 -231
- package/dist_ts/opsserver/handlers/stats.handler.d.ts +0 -11
- package/dist_ts/opsserver/handlers/stats.handler.js +0 -399
- package/dist_ts/opsserver/helpers/guards.d.ts +0 -27
- package/dist_ts/opsserver/helpers/guards.js +0 -43
- package/dist_ts/opsserver/index.d.ts +0 -1
- package/dist_ts/opsserver/index.js +0 -2
- package/dist_ts/paths.d.ts +0 -26
- package/dist_ts/paths.js +0 -45
- package/dist_ts/plugins.d.ts +0 -79
- package/dist_ts/plugins.js +0 -113
- package/dist_ts/radius/classes.accounting.manager.d.ts +0 -218
- package/dist_ts/radius/classes.accounting.manager.js +0 -417
- package/dist_ts/radius/classes.radius.server.d.ts +0 -171
- package/dist_ts/radius/classes.radius.server.js +0 -385
- package/dist_ts/radius/classes.vlan.manager.d.ts +0 -128
- package/dist_ts/radius/classes.vlan.manager.js +0 -279
- package/dist_ts/radius/index.d.ts +0 -13
- package/dist_ts/radius/index.js +0 -14
- package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +0 -82
- package/dist_ts/remoteingress/classes.remoteingress-manager.js +0 -227
- package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +0 -59
- package/dist_ts/remoteingress/classes.tunnel-manager.js +0 -165
- package/dist_ts/remoteingress/index.d.ts +0 -2
- package/dist_ts/remoteingress/index.js +0 -3
- package/dist_ts/security/classes.contentscanner.d.ts +0 -164
- package/dist_ts/security/classes.contentscanner.js +0 -642
- package/dist_ts/security/classes.ipreputationchecker.d.ts +0 -160
- package/dist_ts/security/classes.ipreputationchecker.js +0 -537
- package/dist_ts/security/classes.securitylogger.d.ts +0 -144
- package/dist_ts/security/classes.securitylogger.js +0 -233
- package/dist_ts/security/index.d.ts +0 -3
- package/dist_ts/security/index.js +0 -4
- package/dist_ts/sms/classes.smsservice.d.ts +0 -15
- package/dist_ts/sms/classes.smsservice.js +0 -72
- package/dist_ts/sms/config/sms.config.d.ts +0 -93
- package/dist_ts/sms/config/sms.config.js +0 -2
- package/dist_ts/sms/config/sms.schema.d.ts +0 -5
- package/dist_ts/sms/config/sms.schema.js +0 -121
- package/dist_ts/sms/index.d.ts +0 -1
- package/dist_ts/sms/index.js +0 -2
- package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
- package/dist_ts/storage/classes.storagemanager.js +0 -350
- package/dist_ts/storage/index.d.ts +0 -1
- package/dist_ts/storage/index.js +0 -3
|
@@ -1,642 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../plugins.js';
|
|
2
|
-
import { logger } from '../logger.js';
|
|
3
|
-
import { Email } from '@push.rocks/smartmta';
|
|
4
|
-
import { SecurityLogger, SecurityLogLevel, SecurityEventType } from './classes.securitylogger.js';
|
|
5
|
-
import { LRUCache } from 'lru-cache';
|
|
6
|
-
/**
|
|
7
|
-
* Threat categories
|
|
8
|
-
*/
|
|
9
|
-
export var ThreatCategory;
|
|
10
|
-
(function (ThreatCategory) {
|
|
11
|
-
ThreatCategory["SPAM"] = "spam";
|
|
12
|
-
ThreatCategory["PHISHING"] = "phishing";
|
|
13
|
-
ThreatCategory["MALWARE"] = "malware";
|
|
14
|
-
ThreatCategory["EXECUTABLE"] = "executable";
|
|
15
|
-
ThreatCategory["SUSPICIOUS_LINK"] = "suspicious_link";
|
|
16
|
-
ThreatCategory["MALICIOUS_MACRO"] = "malicious_macro";
|
|
17
|
-
ThreatCategory["XSS"] = "xss";
|
|
18
|
-
ThreatCategory["SENSITIVE_DATA"] = "sensitive_data";
|
|
19
|
-
ThreatCategory["BLACKLISTED_CONTENT"] = "blacklisted_content";
|
|
20
|
-
ThreatCategory["CUSTOM_RULE"] = "custom_rule";
|
|
21
|
-
})(ThreatCategory || (ThreatCategory = {}));
|
|
22
|
-
/**
|
|
23
|
-
* Content Scanner for detecting malicious email content
|
|
24
|
-
*/
|
|
25
|
-
export class ContentScanner {
|
|
26
|
-
static instance;
|
|
27
|
-
scanCache;
|
|
28
|
-
options;
|
|
29
|
-
// Predefined patterns for common threats
|
|
30
|
-
static MALICIOUS_PATTERNS = {
|
|
31
|
-
// Phishing patterns
|
|
32
|
-
phishing: [
|
|
33
|
-
/(?:verify|confirm|update|login).*(?:account|password|details)/i,
|
|
34
|
-
/urgent.*(?:action|attention|required)/i,
|
|
35
|
-
/(?:paypal|apple|microsoft|amazon|google|bank).*(?:verify|confirm|suspend)/i,
|
|
36
|
-
/your.*(?:account).*(?:suspended|compromised|locked)/i,
|
|
37
|
-
/\b(?:password reset|security alert|security notice)\b/i
|
|
38
|
-
],
|
|
39
|
-
// Spam indicators
|
|
40
|
-
spam: [
|
|
41
|
-
/\b(?:viagra|cialis|enlargement|diet pill|lose weight fast|cheap meds)\b/i,
|
|
42
|
-
/\b(?:million dollars|lottery winner|prize claim|inheritance|rich widow)\b/i,
|
|
43
|
-
/\b(?:earn from home|make money fast|earn \$\d{3,}\/day)\b/i,
|
|
44
|
-
/\b(?:limited time offer|act now|exclusive deal|only \d+ left)\b/i,
|
|
45
|
-
/\b(?:forex|stock tip|investment opportunity|cryptocurrency|bitcoin)\b/i
|
|
46
|
-
],
|
|
47
|
-
// Malware indicators in text
|
|
48
|
-
malware: [
|
|
49
|
-
/(?:attached file|see attachment).*(?:invoice|receipt|statement|document)/i,
|
|
50
|
-
/open.*(?:the attached|this attachment)/i,
|
|
51
|
-
/(?:enable|allow).*(?:macros|content|editing)/i,
|
|
52
|
-
/download.*(?:attachment|file|document)/i,
|
|
53
|
-
/\b(?:ransomware protection|virus alert|malware detected)\b/i
|
|
54
|
-
],
|
|
55
|
-
// Suspicious links
|
|
56
|
-
suspiciousLinks: [
|
|
57
|
-
/https?:\/\/bit\.ly\//i,
|
|
58
|
-
/https?:\/\/goo\.gl\//i,
|
|
59
|
-
/https?:\/\/t\.co\//i,
|
|
60
|
-
/https?:\/\/tinyurl\.com\//i,
|
|
61
|
-
/https?:\/\/(?:\d{1,3}\.){3}\d{1,3}/i, // IP address URLs
|
|
62
|
-
/https?:\/\/.*\.(?:xyz|top|club|gq|cf)\//i, // Suspicious TLDs
|
|
63
|
-
/(?:login|account|signin|auth).*\.(?!gov|edu|com|org|net)\w+\.\w+/i, // Login pages on unusual domains
|
|
64
|
-
],
|
|
65
|
-
// XSS and script injection
|
|
66
|
-
scriptInjection: [
|
|
67
|
-
/<script.*>.*<\/script>/is,
|
|
68
|
-
/javascript:/i,
|
|
69
|
-
/on(?:click|load|mouse|error|focus|blur)=".*"/i,
|
|
70
|
-
/document\.(?:cookie|write|location)/i,
|
|
71
|
-
/eval\s*\(/i
|
|
72
|
-
],
|
|
73
|
-
// Sensitive data patterns
|
|
74
|
-
sensitiveData: [
|
|
75
|
-
/\b(?:\d{3}-\d{2}-\d{4}|\d{9})\b/, // SSN
|
|
76
|
-
/\b\d{13,16}\b/, // Credit card numbers
|
|
77
|
-
/\b(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=|[A-Za-z0-9+/]{4})\b/ // Possible Base64
|
|
78
|
-
]
|
|
79
|
-
};
|
|
80
|
-
// Common executable extensions
|
|
81
|
-
static EXECUTABLE_EXTENSIONS = [
|
|
82
|
-
'.exe', '.dll', '.bat', '.cmd', '.msi', '.js', '.vbs', '.ps1',
|
|
83
|
-
'.sh', '.jar', '.py', '.com', '.scr', '.pif', '.hta', '.cpl',
|
|
84
|
-
'.reg', '.vba', '.lnk', '.wsf', '.msi', '.msp', '.mst'
|
|
85
|
-
];
|
|
86
|
-
// Document formats that may contain macros
|
|
87
|
-
static MACRO_DOCUMENT_EXTENSIONS = [
|
|
88
|
-
'.doc', '.docm', '.xls', '.xlsm', '.ppt', '.pptm', '.dotm', '.xlsb', '.ppam', '.potm'
|
|
89
|
-
];
|
|
90
|
-
/**
|
|
91
|
-
* Default options for the content scanner
|
|
92
|
-
*/
|
|
93
|
-
static DEFAULT_OPTIONS = {
|
|
94
|
-
maxCacheSize: 10000,
|
|
95
|
-
cacheTTL: 24 * 60 * 60 * 1000, // 24 hours
|
|
96
|
-
scanSubject: true,
|
|
97
|
-
scanBody: true,
|
|
98
|
-
scanAttachments: true,
|
|
99
|
-
maxAttachmentSizeToScan: 10 * 1024 * 1024, // 10MB
|
|
100
|
-
scanAttachmentNames: true,
|
|
101
|
-
blockExecutables: true,
|
|
102
|
-
blockMacros: true,
|
|
103
|
-
customRules: [],
|
|
104
|
-
minThreatScore: 30, // Minimum score to consider content as a threat
|
|
105
|
-
highThreatScore: 70 // Score above which content is considered high threat
|
|
106
|
-
};
|
|
107
|
-
/**
|
|
108
|
-
* Constructor for the ContentScanner
|
|
109
|
-
* @param options Configuration options
|
|
110
|
-
*/
|
|
111
|
-
constructor(options = {}) {
|
|
112
|
-
// Merge with default options
|
|
113
|
-
this.options = {
|
|
114
|
-
...ContentScanner.DEFAULT_OPTIONS,
|
|
115
|
-
...options
|
|
116
|
-
};
|
|
117
|
-
// Initialize cache
|
|
118
|
-
this.scanCache = new LRUCache({
|
|
119
|
-
max: this.options.maxCacheSize,
|
|
120
|
-
ttl: this.options.cacheTTL,
|
|
121
|
-
});
|
|
122
|
-
logger.log('info', 'ContentScanner initialized');
|
|
123
|
-
}
|
|
124
|
-
/**
|
|
125
|
-
* Get the singleton instance of the scanner
|
|
126
|
-
* @param options Configuration options
|
|
127
|
-
* @returns Singleton scanner instance
|
|
128
|
-
*/
|
|
129
|
-
static getInstance(options = {}) {
|
|
130
|
-
if (!ContentScanner.instance) {
|
|
131
|
-
ContentScanner.instance = new ContentScanner(options);
|
|
132
|
-
}
|
|
133
|
-
return ContentScanner.instance;
|
|
134
|
-
}
|
|
135
|
-
/**
|
|
136
|
-
* Reset the singleton instance (for shutdown/testing)
|
|
137
|
-
*/
|
|
138
|
-
static resetInstance() {
|
|
139
|
-
ContentScanner.instance = undefined;
|
|
140
|
-
}
|
|
141
|
-
/**
|
|
142
|
-
* Scan an email for malicious content
|
|
143
|
-
* @param email The email to scan
|
|
144
|
-
* @returns Scan result
|
|
145
|
-
*/
|
|
146
|
-
async scanEmail(email) {
|
|
147
|
-
try {
|
|
148
|
-
// Generate a cache key from the email
|
|
149
|
-
const cacheKey = this.generateCacheKey(email);
|
|
150
|
-
// Check cache first
|
|
151
|
-
const cachedResult = this.scanCache.get(cacheKey);
|
|
152
|
-
if (cachedResult) {
|
|
153
|
-
logger.log('info', `Using cached scan result for email ${email.getMessageId()}`);
|
|
154
|
-
return cachedResult;
|
|
155
|
-
}
|
|
156
|
-
// Initialize scan result
|
|
157
|
-
const result = {
|
|
158
|
-
isClean: true,
|
|
159
|
-
threatScore: 0,
|
|
160
|
-
scannedElements: [],
|
|
161
|
-
timestamp: Date.now()
|
|
162
|
-
};
|
|
163
|
-
// List of scan promises
|
|
164
|
-
const scanPromises = [];
|
|
165
|
-
// Scan subject
|
|
166
|
-
if (this.options.scanSubject && email.subject) {
|
|
167
|
-
scanPromises.push(this.scanSubject(email.subject, result));
|
|
168
|
-
}
|
|
169
|
-
// Scan body content
|
|
170
|
-
if (this.options.scanBody) {
|
|
171
|
-
if (email.text) {
|
|
172
|
-
scanPromises.push(this.scanTextContent(email.text, result));
|
|
173
|
-
}
|
|
174
|
-
if (email.html) {
|
|
175
|
-
scanPromises.push(this.scanHtmlContent(email.html, result));
|
|
176
|
-
}
|
|
177
|
-
}
|
|
178
|
-
// Scan attachments
|
|
179
|
-
if (this.options.scanAttachments && email.attachments && email.attachments.length > 0) {
|
|
180
|
-
for (const attachment of email.attachments) {
|
|
181
|
-
scanPromises.push(this.scanAttachment(attachment, result));
|
|
182
|
-
}
|
|
183
|
-
}
|
|
184
|
-
// Run all scans in parallel
|
|
185
|
-
await Promise.all(scanPromises);
|
|
186
|
-
// Determine if the email is clean based on threat score
|
|
187
|
-
result.isClean = result.threatScore < this.options.minThreatScore;
|
|
188
|
-
// Save to cache
|
|
189
|
-
this.scanCache.set(cacheKey, result);
|
|
190
|
-
// Log high threat findings
|
|
191
|
-
if (result.threatScore >= this.options.highThreatScore) {
|
|
192
|
-
this.logHighThreatFound(email, result);
|
|
193
|
-
}
|
|
194
|
-
else if (!result.isClean) {
|
|
195
|
-
this.logThreatFound(email, result);
|
|
196
|
-
}
|
|
197
|
-
return result;
|
|
198
|
-
}
|
|
199
|
-
catch (error) {
|
|
200
|
-
logger.log('error', `Error scanning email: ${error.message}`, {
|
|
201
|
-
messageId: email.getMessageId(),
|
|
202
|
-
error: error.stack
|
|
203
|
-
});
|
|
204
|
-
// Return a safe default with error indication
|
|
205
|
-
return {
|
|
206
|
-
isClean: true, // Let it pass if scanner fails (configure as desired)
|
|
207
|
-
threatScore: 0,
|
|
208
|
-
scannedElements: ['error'],
|
|
209
|
-
timestamp: Date.now(),
|
|
210
|
-
threatType: 'scan_error',
|
|
211
|
-
threatDetails: `Scan error: ${error.message}`
|
|
212
|
-
};
|
|
213
|
-
}
|
|
214
|
-
}
|
|
215
|
-
/**
|
|
216
|
-
* Generate a cache key from an email
|
|
217
|
-
* @param email The email to generate a key for
|
|
218
|
-
* @returns Cache key
|
|
219
|
-
*/
|
|
220
|
-
generateCacheKey(email) {
|
|
221
|
-
// Use message ID if available
|
|
222
|
-
if (email.getMessageId()) {
|
|
223
|
-
return `email:${email.getMessageId()}`;
|
|
224
|
-
}
|
|
225
|
-
// Fallback to a hash of key content
|
|
226
|
-
const contentToHash = [
|
|
227
|
-
email.from,
|
|
228
|
-
email.subject || '',
|
|
229
|
-
email.text?.substring(0, 1000) || '',
|
|
230
|
-
email.html?.substring(0, 1000) || '',
|
|
231
|
-
email.attachments?.length || 0
|
|
232
|
-
].join(':');
|
|
233
|
-
return `email:${plugins.crypto.createHash('sha256').update(contentToHash).digest('hex')}`;
|
|
234
|
-
}
|
|
235
|
-
/**
|
|
236
|
-
* Scan email subject for threats
|
|
237
|
-
* @param subject The subject to scan
|
|
238
|
-
* @param result The scan result to update
|
|
239
|
-
*/
|
|
240
|
-
async scanSubject(subject, result) {
|
|
241
|
-
result.scannedElements.push('subject');
|
|
242
|
-
// Check against phishing patterns
|
|
243
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.phishing) {
|
|
244
|
-
if (pattern.test(subject)) {
|
|
245
|
-
result.threatScore += 25;
|
|
246
|
-
result.threatType = ThreatCategory.PHISHING;
|
|
247
|
-
result.threatDetails = `Subject contains potential phishing indicators: ${subject}`;
|
|
248
|
-
return;
|
|
249
|
-
}
|
|
250
|
-
}
|
|
251
|
-
// Check against spam patterns
|
|
252
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.spam) {
|
|
253
|
-
if (pattern.test(subject)) {
|
|
254
|
-
result.threatScore += 15;
|
|
255
|
-
result.threatType = ThreatCategory.SPAM;
|
|
256
|
-
result.threatDetails = `Subject contains potential spam indicators: ${subject}`;
|
|
257
|
-
return;
|
|
258
|
-
}
|
|
259
|
-
}
|
|
260
|
-
// Check custom rules
|
|
261
|
-
for (const rule of this.options.customRules) {
|
|
262
|
-
const pattern = rule.pattern instanceof RegExp ? rule.pattern : new RegExp(rule.pattern, 'i');
|
|
263
|
-
if (pattern.test(subject)) {
|
|
264
|
-
result.threatScore += rule.score;
|
|
265
|
-
result.threatType = rule.type;
|
|
266
|
-
result.threatDetails = rule.description;
|
|
267
|
-
return;
|
|
268
|
-
}
|
|
269
|
-
}
|
|
270
|
-
}
|
|
271
|
-
/**
|
|
272
|
-
* Scan plain text content for threats
|
|
273
|
-
* @param text The text content to scan
|
|
274
|
-
* @param result The scan result to update
|
|
275
|
-
*/
|
|
276
|
-
async scanTextContent(text, result) {
|
|
277
|
-
result.scannedElements.push('text');
|
|
278
|
-
// Check suspicious links
|
|
279
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.suspiciousLinks) {
|
|
280
|
-
if (pattern.test(text)) {
|
|
281
|
-
result.threatScore += 20;
|
|
282
|
-
if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SUSPICIOUS_LINK ? 0 : 20)) {
|
|
283
|
-
result.threatType = ThreatCategory.SUSPICIOUS_LINK;
|
|
284
|
-
result.threatDetails = `Text contains suspicious links`;
|
|
285
|
-
}
|
|
286
|
-
}
|
|
287
|
-
}
|
|
288
|
-
// Check phishing
|
|
289
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.phishing) {
|
|
290
|
-
if (pattern.test(text)) {
|
|
291
|
-
result.threatScore += 25;
|
|
292
|
-
if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.PHISHING ? 0 : 25)) {
|
|
293
|
-
result.threatType = ThreatCategory.PHISHING;
|
|
294
|
-
result.threatDetails = `Text contains potential phishing indicators`;
|
|
295
|
-
}
|
|
296
|
-
}
|
|
297
|
-
}
|
|
298
|
-
// Check spam
|
|
299
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.spam) {
|
|
300
|
-
if (pattern.test(text)) {
|
|
301
|
-
result.threatScore += 15;
|
|
302
|
-
if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SPAM ? 0 : 15)) {
|
|
303
|
-
result.threatType = ThreatCategory.SPAM;
|
|
304
|
-
result.threatDetails = `Text contains potential spam indicators`;
|
|
305
|
-
}
|
|
306
|
-
}
|
|
307
|
-
}
|
|
308
|
-
// Check malware indicators
|
|
309
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.malware) {
|
|
310
|
-
if (pattern.test(text)) {
|
|
311
|
-
result.threatScore += 30;
|
|
312
|
-
if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.MALWARE ? 0 : 30)) {
|
|
313
|
-
result.threatType = ThreatCategory.MALWARE;
|
|
314
|
-
result.threatDetails = `Text contains potential malware indicators`;
|
|
315
|
-
}
|
|
316
|
-
}
|
|
317
|
-
}
|
|
318
|
-
// Check sensitive data
|
|
319
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.sensitiveData) {
|
|
320
|
-
if (pattern.test(text)) {
|
|
321
|
-
result.threatScore += 25;
|
|
322
|
-
if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SENSITIVE_DATA ? 0 : 25)) {
|
|
323
|
-
result.threatType = ThreatCategory.SENSITIVE_DATA;
|
|
324
|
-
result.threatDetails = `Text contains potentially sensitive data patterns`;
|
|
325
|
-
}
|
|
326
|
-
}
|
|
327
|
-
}
|
|
328
|
-
// Check custom rules
|
|
329
|
-
for (const rule of this.options.customRules) {
|
|
330
|
-
const pattern = rule.pattern instanceof RegExp ? rule.pattern : new RegExp(rule.pattern, 'i');
|
|
331
|
-
if (pattern.test(text)) {
|
|
332
|
-
result.threatScore += rule.score;
|
|
333
|
-
if (!result.threatType || result.threatScore > 20) {
|
|
334
|
-
result.threatType = rule.type;
|
|
335
|
-
result.threatDetails = rule.description;
|
|
336
|
-
}
|
|
337
|
-
}
|
|
338
|
-
}
|
|
339
|
-
}
|
|
340
|
-
/**
|
|
341
|
-
* Scan HTML content for threats
|
|
342
|
-
* @param html The HTML content to scan
|
|
343
|
-
* @param result The scan result to update
|
|
344
|
-
*/
|
|
345
|
-
async scanHtmlContent(html, result) {
|
|
346
|
-
result.scannedElements.push('html');
|
|
347
|
-
// Check for script injection
|
|
348
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.scriptInjection) {
|
|
349
|
-
if (pattern.test(html)) {
|
|
350
|
-
result.threatScore += 40;
|
|
351
|
-
if (!result.threatType || result.threatType !== ThreatCategory.XSS) {
|
|
352
|
-
result.threatType = ThreatCategory.XSS;
|
|
353
|
-
result.threatDetails = `HTML contains potentially malicious script content`;
|
|
354
|
-
}
|
|
355
|
-
}
|
|
356
|
-
}
|
|
357
|
-
// Extract text content from HTML for further scanning
|
|
358
|
-
const textContent = this.extractTextFromHtml(html);
|
|
359
|
-
if (textContent) {
|
|
360
|
-
// We'll leverage the text scanning but not double-count threat score
|
|
361
|
-
const tempResult = {
|
|
362
|
-
isClean: true,
|
|
363
|
-
threatScore: 0,
|
|
364
|
-
scannedElements: [],
|
|
365
|
-
timestamp: Date.now()
|
|
366
|
-
};
|
|
367
|
-
await this.scanTextContent(textContent, tempResult);
|
|
368
|
-
// Only add additional threat types if they're more severe
|
|
369
|
-
if (tempResult.threatType && tempResult.threatScore > 0) {
|
|
370
|
-
// Add half of the text content score to avoid double counting
|
|
371
|
-
result.threatScore += Math.floor(tempResult.threatScore / 2);
|
|
372
|
-
// Adopt the threat type if more severe or no existing type
|
|
373
|
-
if (!result.threatType || tempResult.threatScore > result.threatScore) {
|
|
374
|
-
result.threatType = tempResult.threatType;
|
|
375
|
-
result.threatDetails = tempResult.threatDetails;
|
|
376
|
-
}
|
|
377
|
-
}
|
|
378
|
-
}
|
|
379
|
-
// Extract and check links from HTML
|
|
380
|
-
const links = this.extractLinksFromHtml(html);
|
|
381
|
-
if (links.length > 0) {
|
|
382
|
-
// Check for suspicious links
|
|
383
|
-
let suspiciousLinks = 0;
|
|
384
|
-
for (const link of links) {
|
|
385
|
-
for (const pattern of ContentScanner.MALICIOUS_PATTERNS.suspiciousLinks) {
|
|
386
|
-
if (pattern.test(link)) {
|
|
387
|
-
suspiciousLinks++;
|
|
388
|
-
break;
|
|
389
|
-
}
|
|
390
|
-
}
|
|
391
|
-
}
|
|
392
|
-
if (suspiciousLinks > 0) {
|
|
393
|
-
// Add score based on percentage of suspicious links
|
|
394
|
-
const suspiciousPercentage = (suspiciousLinks / links.length) * 100;
|
|
395
|
-
const additionalScore = Math.min(40, Math.floor(suspiciousPercentage / 2.5));
|
|
396
|
-
result.threatScore += additionalScore;
|
|
397
|
-
if (!result.threatType || additionalScore > 20) {
|
|
398
|
-
result.threatType = ThreatCategory.SUSPICIOUS_LINK;
|
|
399
|
-
result.threatDetails = `HTML contains ${suspiciousLinks} suspicious links out of ${links.length} total links`;
|
|
400
|
-
}
|
|
401
|
-
}
|
|
402
|
-
}
|
|
403
|
-
}
|
|
404
|
-
/**
|
|
405
|
-
* Scan an attachment for threats
|
|
406
|
-
* @param attachment The attachment to scan
|
|
407
|
-
* @param result The scan result to update
|
|
408
|
-
*/
|
|
409
|
-
async scanAttachment(attachment, result) {
|
|
410
|
-
const filename = attachment.filename.toLowerCase();
|
|
411
|
-
result.scannedElements.push(`attachment:${filename}`);
|
|
412
|
-
// Skip large attachments if configured
|
|
413
|
-
if (attachment.content && attachment.content.length > this.options.maxAttachmentSizeToScan) {
|
|
414
|
-
logger.log('info', `Skipping scan of large attachment: ${filename} (${attachment.content.length} bytes)`);
|
|
415
|
-
return;
|
|
416
|
-
}
|
|
417
|
-
// Check filename for executable extensions
|
|
418
|
-
if (this.options.blockExecutables) {
|
|
419
|
-
for (const ext of ContentScanner.EXECUTABLE_EXTENSIONS) {
|
|
420
|
-
if (filename.endsWith(ext)) {
|
|
421
|
-
result.threatScore += 70; // High score for executable attachments
|
|
422
|
-
result.threatType = ThreatCategory.EXECUTABLE;
|
|
423
|
-
result.threatDetails = `Attachment has a potentially dangerous extension: ${filename}`;
|
|
424
|
-
return; // No need to scan contents if filename already flagged
|
|
425
|
-
}
|
|
426
|
-
}
|
|
427
|
-
}
|
|
428
|
-
// Check for Office documents with macros
|
|
429
|
-
if (this.options.blockMacros) {
|
|
430
|
-
for (const ext of ContentScanner.MACRO_DOCUMENT_EXTENSIONS) {
|
|
431
|
-
if (filename.endsWith(ext)) {
|
|
432
|
-
// For Office documents, check if they contain macros
|
|
433
|
-
// This is a simplified check - a real implementation would use specialized libraries
|
|
434
|
-
// to detect macros in Office documents
|
|
435
|
-
if (attachment.content && this.likelyContainsMacros(attachment)) {
|
|
436
|
-
result.threatScore += 60;
|
|
437
|
-
result.threatType = ThreatCategory.MALICIOUS_MACRO;
|
|
438
|
-
result.threatDetails = `Attachment appears to contain macros: ${filename}`;
|
|
439
|
-
return;
|
|
440
|
-
}
|
|
441
|
-
}
|
|
442
|
-
}
|
|
443
|
-
}
|
|
444
|
-
// Perform basic content analysis if we have content buffer
|
|
445
|
-
if (attachment.content) {
|
|
446
|
-
// Convert to string for scanning, with a limit to prevent memory issues
|
|
447
|
-
const textContent = this.extractTextFromBuffer(attachment.content);
|
|
448
|
-
if (textContent) {
|
|
449
|
-
// Scan for malicious patterns in attachment content
|
|
450
|
-
for (const category in ContentScanner.MALICIOUS_PATTERNS) {
|
|
451
|
-
const patterns = ContentScanner.MALICIOUS_PATTERNS[category];
|
|
452
|
-
for (const pattern of patterns) {
|
|
453
|
-
if (pattern.test(textContent)) {
|
|
454
|
-
result.threatScore += 30;
|
|
455
|
-
if (!result.threatType) {
|
|
456
|
-
result.threatType = this.mapCategoryToThreatType(category);
|
|
457
|
-
result.threatDetails = `Attachment content contains suspicious patterns: ${filename}`;
|
|
458
|
-
}
|
|
459
|
-
break;
|
|
460
|
-
}
|
|
461
|
-
}
|
|
462
|
-
}
|
|
463
|
-
}
|
|
464
|
-
// Check for PE headers (Windows executables)
|
|
465
|
-
if (attachment.content.length > 64 &&
|
|
466
|
-
attachment.content[0] === 0x4D &&
|
|
467
|
-
attachment.content[1] === 0x5A) { // 'MZ' header
|
|
468
|
-
result.threatScore += 80;
|
|
469
|
-
result.threatType = ThreatCategory.EXECUTABLE;
|
|
470
|
-
result.threatDetails = `Attachment contains executable code: ${filename}`;
|
|
471
|
-
}
|
|
472
|
-
}
|
|
473
|
-
}
|
|
474
|
-
/**
|
|
475
|
-
* Extract links from HTML content
|
|
476
|
-
* @param html HTML content
|
|
477
|
-
* @returns Array of extracted links
|
|
478
|
-
*/
|
|
479
|
-
extractLinksFromHtml(html) {
|
|
480
|
-
const links = [];
|
|
481
|
-
// Simple regex-based extraction - a real implementation might use a proper HTML parser
|
|
482
|
-
const matches = html.match(/href=["'](https?:\/\/[^"']+)["']/gi);
|
|
483
|
-
if (matches) {
|
|
484
|
-
for (const match of matches) {
|
|
485
|
-
const linkMatch = match.match(/href=["'](https?:\/\/[^"']+)["']/i);
|
|
486
|
-
if (linkMatch && linkMatch[1]) {
|
|
487
|
-
links.push(linkMatch[1]);
|
|
488
|
-
}
|
|
489
|
-
}
|
|
490
|
-
}
|
|
491
|
-
return links;
|
|
492
|
-
}
|
|
493
|
-
/**
|
|
494
|
-
* Extract plain text from HTML
|
|
495
|
-
* @param html HTML content
|
|
496
|
-
* @returns Extracted text
|
|
497
|
-
*/
|
|
498
|
-
extractTextFromHtml(html) {
|
|
499
|
-
// Remove HTML tags and decode entities - simplified version
|
|
500
|
-
return html
|
|
501
|
-
.replace(/<style[^>]*>.*?<\/style>/gs, '')
|
|
502
|
-
.replace(/<script[^>]*>.*?<\/script>/gs, '')
|
|
503
|
-
.replace(/<[^>]+>/g, ' ')
|
|
504
|
-
.replace(/ /g, ' ')
|
|
505
|
-
.replace(/</g, '<')
|
|
506
|
-
.replace(/>/g, '>')
|
|
507
|
-
.replace(/&/g, '&')
|
|
508
|
-
.replace(/"/g, '"')
|
|
509
|
-
.replace(/'/g, "'")
|
|
510
|
-
.replace(/\s+/g, ' ')
|
|
511
|
-
.trim();
|
|
512
|
-
}
|
|
513
|
-
/**
|
|
514
|
-
* Extract text from a binary buffer for scanning
|
|
515
|
-
* @param buffer Binary content
|
|
516
|
-
* @returns Extracted text (may be partial)
|
|
517
|
-
*/
|
|
518
|
-
extractTextFromBuffer(buffer) {
|
|
519
|
-
try {
|
|
520
|
-
// Limit the amount we convert to avoid memory issues
|
|
521
|
-
const sampleSize = Math.min(buffer.length, 100 * 1024); // 100KB max sample
|
|
522
|
-
const sample = buffer.slice(0, sampleSize);
|
|
523
|
-
// Try to convert to string, filtering out non-printable chars
|
|
524
|
-
return sample.toString('utf8')
|
|
525
|
-
.replace(/[\x00-\x09\x0B-\x1F\x7F-\x9F]/g, '') // Remove control chars
|
|
526
|
-
.replace(/\uFFFD/g, ''); // Remove replacement char
|
|
527
|
-
}
|
|
528
|
-
catch (error) {
|
|
529
|
-
logger.log('warn', `Error extracting text from buffer: ${error.message}`);
|
|
530
|
-
return '';
|
|
531
|
-
}
|
|
532
|
-
}
|
|
533
|
-
/**
|
|
534
|
-
* Check if an Office document likely contains macros
|
|
535
|
-
* This is a simplified check - real implementation would use specialized libraries
|
|
536
|
-
* @param attachment The attachment to check
|
|
537
|
-
* @returns Whether the file likely contains macros
|
|
538
|
-
*/
|
|
539
|
-
likelyContainsMacros(attachment) {
|
|
540
|
-
// Simple heuristic: look for VBA/macro related strings
|
|
541
|
-
// This is a simplified approach and not comprehensive
|
|
542
|
-
const content = this.extractTextFromBuffer(attachment.content);
|
|
543
|
-
const macroIndicators = [
|
|
544
|
-
/vbaProject\.bin/i,
|
|
545
|
-
/Microsoft VBA/i,
|
|
546
|
-
/\bVBA\b/,
|
|
547
|
-
/Auto_Open/i,
|
|
548
|
-
/AutoExec/i,
|
|
549
|
-
/DocumentOpen/i,
|
|
550
|
-
/AutoOpen/i,
|
|
551
|
-
/\bExecute\(/i,
|
|
552
|
-
/\bShell\(/i,
|
|
553
|
-
/\bCreateObject\(/i
|
|
554
|
-
];
|
|
555
|
-
for (const indicator of macroIndicators) {
|
|
556
|
-
if (indicator.test(content)) {
|
|
557
|
-
return true;
|
|
558
|
-
}
|
|
559
|
-
}
|
|
560
|
-
return false;
|
|
561
|
-
}
|
|
562
|
-
/**
|
|
563
|
-
* Map a pattern category to a threat type
|
|
564
|
-
* @param category The pattern category
|
|
565
|
-
* @returns The corresponding threat type
|
|
566
|
-
*/
|
|
567
|
-
mapCategoryToThreatType(category) {
|
|
568
|
-
switch (category) {
|
|
569
|
-
case 'phishing': return ThreatCategory.PHISHING;
|
|
570
|
-
case 'spam': return ThreatCategory.SPAM;
|
|
571
|
-
case 'malware': return ThreatCategory.MALWARE;
|
|
572
|
-
case 'suspiciousLinks': return ThreatCategory.SUSPICIOUS_LINK;
|
|
573
|
-
case 'scriptInjection': return ThreatCategory.XSS;
|
|
574
|
-
case 'sensitiveData': return ThreatCategory.SENSITIVE_DATA;
|
|
575
|
-
default: return ThreatCategory.BLACKLISTED_CONTENT;
|
|
576
|
-
}
|
|
577
|
-
}
|
|
578
|
-
/**
|
|
579
|
-
* Log a high threat finding to the security logger
|
|
580
|
-
* @param email The email containing the threat
|
|
581
|
-
* @param result The scan result
|
|
582
|
-
*/
|
|
583
|
-
logHighThreatFound(email, result) {
|
|
584
|
-
SecurityLogger.getInstance().logEvent({
|
|
585
|
-
level: SecurityLogLevel.ERROR,
|
|
586
|
-
type: SecurityEventType.MALWARE,
|
|
587
|
-
message: `High threat content detected in email from ${email.from} to ${email.to.join(', ')}`,
|
|
588
|
-
details: {
|
|
589
|
-
messageId: email.getMessageId(),
|
|
590
|
-
threatType: result.threatType,
|
|
591
|
-
threatDetails: result.threatDetails,
|
|
592
|
-
threatScore: result.threatScore,
|
|
593
|
-
scannedElements: result.scannedElements,
|
|
594
|
-
subject: email.subject
|
|
595
|
-
},
|
|
596
|
-
success: false,
|
|
597
|
-
domain: email.getFromDomain()
|
|
598
|
-
});
|
|
599
|
-
}
|
|
600
|
-
/**
|
|
601
|
-
* Log a threat finding to the security logger
|
|
602
|
-
* @param email The email containing the threat
|
|
603
|
-
* @param result The scan result
|
|
604
|
-
*/
|
|
605
|
-
logThreatFound(email, result) {
|
|
606
|
-
SecurityLogger.getInstance().logEvent({
|
|
607
|
-
level: SecurityLogLevel.WARN,
|
|
608
|
-
type: SecurityEventType.SPAM,
|
|
609
|
-
message: `Suspicious content detected in email from ${email.from} to ${email.to.join(', ')}`,
|
|
610
|
-
details: {
|
|
611
|
-
messageId: email.getMessageId(),
|
|
612
|
-
threatType: result.threatType,
|
|
613
|
-
threatDetails: result.threatDetails,
|
|
614
|
-
threatScore: result.threatScore,
|
|
615
|
-
scannedElements: result.scannedElements,
|
|
616
|
-
subject: email.subject
|
|
617
|
-
},
|
|
618
|
-
success: false,
|
|
619
|
-
domain: email.getFromDomain()
|
|
620
|
-
});
|
|
621
|
-
}
|
|
622
|
-
/**
|
|
623
|
-
* Get threat level description based on score
|
|
624
|
-
* @param score Threat score
|
|
625
|
-
* @returns Threat level description
|
|
626
|
-
*/
|
|
627
|
-
static getThreatLevel(score) {
|
|
628
|
-
if (score < 20) {
|
|
629
|
-
return 'none';
|
|
630
|
-
}
|
|
631
|
-
else if (score < 40) {
|
|
632
|
-
return 'low';
|
|
633
|
-
}
|
|
634
|
-
else if (score < 70) {
|
|
635
|
-
return 'medium';
|
|
636
|
-
}
|
|
637
|
-
else {
|
|
638
|
-
return 'high';
|
|
639
|
-
}
|
|
640
|
-
}
|
|
641
|
-
}
|
|
642
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.contentscanner.js","sourceRoot":"","sources":["../../../ts/security/classes.contentscanner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAAE,KAAK,EAAa,MAAM,sBAAsB,CAAC;AAExD,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAClG,OAAO,EAAE,QAAQ,EAAE,MAAM,WAAW,CAAC;AAqCrC;;GAEG;AACH,MAAM,CAAN,IAAY,cAWX;AAXD,WAAY,cAAc;IACxB,+BAAa,CAAA;IACb,uCAAqB,CAAA;IACrB,qCAAmB,CAAA;IACnB,2CAAyB,CAAA;IACzB,qDAAmC,CAAA;IACnC,qDAAmC,CAAA;IACnC,6BAAW,CAAA;IACX,mDAAiC,CAAA;IACjC,6DAA2C,CAAA;IAC3C,6CAA2B,CAAA;AAC7B,CAAC,EAXW,cAAc,KAAd,cAAc,QAWzB;AAED;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,SAAS,CAAgC;IACzC,OAAO,CAAmC;IAElD,yCAAyC;IACjC,MAAM,CAAU,kBAAkB,GAAG;QAC3C,oBAAoB;QACpB,QAAQ,EAAE;YACR,gEAAgE;YAChE,wCAAwC;YACxC,4EAA4E;YAC5E,sDAAsD;YACtD,wDAAwD;SACzD;QAED,kBAAkB;QAClB,IAAI,EAAE;YACJ,0EAA0E;YAC1E,4EAA4E;YAC5E,4DAA4D;YAC5D,kEAAkE;YAClE,wEAAwE;SACzE;QAED,6BAA6B;QAC7B,OAAO,EAAE;YACP,2EAA2E;YAC3E,yCAAyC;YACzC,+CAA+C;YAC/C,yCAAyC;YACzC,6DAA6D;SAC9D;QAED,mBAAmB;QACnB,eAAe,EAAE;YACf,uBAAuB;YACvB,uBAAuB;YACvB,qBAAqB;YACrB,4BAA4B;YAC5B,qCAAqC,EAAE,kBAAkB;YACzD,0CAA0C,EAAE,kBAAkB;YAC9D,mEAAmE,EAAE,iCAAiC;SACvG;QAED,2BAA2B;QAC3B,eAAe,EAAE;YACf,0BAA0B;YAC1B,cAAc;YACd,+CAA+C;YAC/C,sCAAsC;YACtC,YAAY;SACb;QAED,0BAA0B;QAC1B,aAAa,EAAE;YACb,iCAAiC,EAAE,MAAM;YACzC,eAAe,EAAE,sBAAsB;YACvC,oFAAoF,CAAC,kBAAkB;SACxG;KACF,CAAC;IAEF,+BAA+B;IACvB,MAAM,CAAU,qBAAqB,GAAG;QAC9C,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM;QAC7D,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;QAC5D,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;KACvD,CAAC;IAEF,2CAA2C;IACnC,MAAM,CAAU,yBAAyB,GAAG;QAClD,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO;KACtF,CAAC;IAEF;;OAEG;IACK,MAAM,CAAU,eAAe,GAAqC;QAC1E,YAAY,EAAE,KAAK;QACnB,QAAQ,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,WAAW;QAC1C,WAAW,EAAE,IAAI;QACjB,QAAQ,EAAE,IAAI;QACd,eAAe,EAAE,IAAI;QACrB,uBAAuB,EAAE,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;QAClD,mBAAmB,EAAE,IAAI;QACzB,gBAAgB,EAAE,IAAI;QACtB,WAAW,EAAE,IAAI;QACjB,WAAW,EAAE,EAAE;QACf,cAAc,EAAE,EAAE,EAAE,gDAAgD;QACpE,eAAe,EAAE,EAAE,CAAE,sDAAsD;KAC5E,CAAC;IAEF;;;OAGG;IACH,YAAY,UAAkC,EAAE;QAC9C,6BAA6B;QAC7B,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,cAAc,CAAC,eAAe;YACjC,GAAG,OAAO;SACX,CAAC;QAEF,mBAAmB;QACnB,IAAI,CAAC,SAAS,GAAG,IAAI,QAAQ,CAAsB;YACjD,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,YAAY;YAC9B,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;SAC3B,CAAC,CAAC;QAEH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,CAAC,CAAC;IACnD,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,WAAW,CAAC,UAAkC,EAAE;QAC5D,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,aAAa;QACzB,cAAc,CAAC,QAAQ,GAAG,SAAS,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,SAAS,CAAC,KAAY;QACjC,IAAI,CAAC;YACH,sCAAsC;YACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;YAE9C,oBAAoB;YACpB,MAAM,YAAY,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAClD,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;gBACjF,OAAO,YAAY,CAAC;YACtB,CAAC;YAED,yBAAyB;YACzB,MAAM,MAAM,GAAgB;gBAC1B,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,EAAE;gBACnB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,wBAAwB;YACxB,MAAM,YAAY,GAAyB,EAAE,CAAC;YAE9C,eAAe;YACf,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI,KAAK,CAAC,OAAO,EAAE,CAAC;gBAC9C,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC,CAAC;YAC7D,CAAC;YAED,oBAAoB;YACpB,IAAI,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;gBAC1B,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC;oBACf,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC9D,CAAC;gBAED,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC;oBACf,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC9D,CAAC;YACH,CAAC;YAED,mBAAmB;YACnB,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,IAAI,KAAK,CAAC,WAAW,IAAI,KAAK,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtF,KAAK,MAAM,UAAU,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;oBAC3C,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC7D,CAAC;YACH,CAAC;YAED,4BAA4B;YAC5B,MAAM,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;YAEhC,wDAAwD;YACxD,MAAM,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,cAAc,CAAC;YAElE,gBAAgB;YAChB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;YAErC,2BAA2B;YAC3B,IAAI,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;gBACvD,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACzC,CAAC;iBAAM,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;gBAC3B,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACrC,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,KAAK,CAAC,OAAO,EAAE,EAAE;gBAC5D,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,KAAK,EAAE,KAAK,CAAC,KAAK;aACnB,CAAC,CAAC;YAEH,8CAA8C;YAC9C,OAAO;gBACL,OAAO,EAAE,IAAI,EAAE,sDAAsD;gBACrE,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,CAAC,OAAO,CAAC;gBAC1B,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,UAAU,EAAE,YAAY;gBACxB,aAAa,EAAE,eAAe,KAAK,CAAC,OAAO,EAAE;aAC9C,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAY;QACnC,8BAA8B;QAC9B,IAAI,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;YACzB,OAAO,SAAS,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;QACzC,CAAC;QAED,oCAAoC;QACpC,MAAM,aAAa,GAAG;YACpB,KAAK,CAAC,IAAI;YACV,KAAK,CAAC,OAAO,IAAI,EAAE;YACnB,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,WAAW,EAAE,MAAM,IAAI,CAAC;SAC/B,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAEZ,OAAO,SAAS,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;IAC5F,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,WAAW,CAAC,OAAe,EAAE,MAAmB;QAC5D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAEvC,kCAAkC;QAClC,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YACjE,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC;gBAC5C,MAAM,CAAC,aAAa,GAAG,mDAAmD,OAAO,EAAE,CAAC;gBACpF,OAAO;YACT,CAAC;QACH,CAAC;QAED,8BAA8B;QAC9B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,IAAI,EAAE,CAAC;YAC7D,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;gBACxC,MAAM,CAAC,aAAa,GAAG,+CAA+C,OAAO,EAAE,CAAC;gBAChF,OAAO;YACT,CAAC;QACH,CAAC;QAED,qBAAqB;QACrB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC9F,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC;gBACjC,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC;gBAC9B,MAAM,CAAC,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC;gBACxC,OAAO;YACT,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,eAAe,CAAC,IAAY,EAAE,MAAmB;QAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpC,yBAAyB;QACzB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;YACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC/G,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;oBACnD,MAAM,CAAC,aAAa,GAAG,gCAAgC,CAAC;gBAC1D,CAAC;YACH,CAAC;QACH,CAAC;QAED,iBAAiB;QACjB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YACjE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACxG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC;oBAC5C,MAAM,CAAC,aAAa,GAAG,6CAA6C,CAAC;gBACvE,CAAC;YACH,CAAC;QACH,CAAC;QAED,aAAa;QACb,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,IAAI,EAAE,CAAC;YAC7D,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACpG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;oBACxC,MAAM,CAAC,aAAa,GAAG,yCAAyC,CAAC;gBACnE,CAAC;YACH,CAAC;QACH,CAAC;QAED,2BAA2B;QAC3B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,OAAO,EAAE,CAAC;YAChE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACvG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC;oBAC3C,MAAM,CAAC,aAAa,GAAG,4CAA4C,CAAC;gBACtE,CAAC;YACH,CAAC;QACH,CAAC;QAED,uBAAuB;QACvB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC;YACtE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC9G,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC;oBAClD,MAAM,CAAC,aAAa,GAAG,mDAAmD,CAAC;gBAC7E,CAAC;YACH,CAAC;QACH,CAAC;QAED,qBAAqB;QACrB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC9F,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC;gBACjC,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,EAAE,EAAE,CAAC;oBAClD,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC;oBAC9B,MAAM,CAAC,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC;gBAC1C,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,eAAe,CAAC,IAAY,EAAE,MAAmB;QAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpC,6BAA6B;QAC7B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;YACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,GAAG,EAAE,CAAC;oBACnE,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,GAAG,CAAC;oBACvC,MAAM,CAAC,aAAa,GAAG,oDAAoD,CAAC;gBAC9E,CAAC;YACH,CAAC;QACH,CAAC;QAED,sDAAsD;QACtD,MAAM,WAAW,GAAG,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;QACnD,IAAI,WAAW,EAAE,CAAC;YAChB,qEAAqE;YACrE,MAAM,UAAU,GAAgB;gBAC9B,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,EAAE;gBACnB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,MAAM,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,UAAU,CAAC,CAAC;YAEpD,0DAA0D;YAC1D,IAAI,UAAU,CAAC,UAAU,IAAI,UAAU,CAAC,WAAW,GAAG,CAAC,EAAE,CAAC;gBACxD,8DAA8D;gBAC9D,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,WAAW,GAAG,CAAC,CAAC,CAAC;gBAE7D,2DAA2D;gBAC3D,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,UAAU,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;oBACtE,MAAM,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;oBAC1C,MAAM,CAAC,aAAa,GAAG,UAAU,CAAC,aAAa,CAAC;gBAClD,CAAC;YACH,CAAC;QACH,CAAC;QAED,oCAAoC;QACpC,MAAM,KAAK,GAAG,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;QAC9C,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACrB,6BAA6B;YAC7B,IAAI,eAAe,GAAG,CAAC,CAAC;YACxB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;gBACzB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;oBACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;wBACvB,eAAe,EAAE,CAAC;wBAClB,MAAM;oBACR,CAAC;gBACH,CAAC;YACH,CAAC;YAED,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;gBACxB,oDAAoD;gBACpD,MAAM,oBAAoB,GAAG,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC;gBACpE,MAAM,eAAe,GAAG,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,IAAI,CAAC,KAAK,CAAC,oBAAoB,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7E,MAAM,CAAC,WAAW,IAAI,eAAe,CAAC;gBAEtC,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,eAAe,GAAG,EAAE,EAAE,CAAC;oBAC/C,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;oBACnD,MAAM,CAAC,aAAa,GAAG,iBAAiB,eAAe,4BAA4B,KAAK,CAAC,MAAM,cAAc,CAAC;gBAChH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,cAAc,CAAC,UAAuB,EAAE,MAAmB;QACvE,MAAM,QAAQ,GAAG,UAAU,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;QACnD,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,cAAc,QAAQ,EAAE,CAAC,CAAC;QAEtD,uCAAuC;QACvC,IAAI,UAAU,CAAC,OAAO,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,uBAAuB,EAAE,CAAC;YAC3F,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,QAAQ,KAAK,UAAU,CAAC,OAAO,CAAC,MAAM,SAAS,CAAC,CAAC;YAC1G,OAAO;QACT,CAAC;QAED,2CAA2C;QAC3C,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;YAClC,KAAK,MAAM,GAAG,IAAI,cAAc,CAAC,qBAAqB,EAAE,CAAC;gBACvD,IAAI,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oBAC3B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC,CAAC,wCAAwC;oBAClE,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,UAAU,CAAC;oBAC9C,MAAM,CAAC,aAAa,GAAG,qDAAqD,QAAQ,EAAE,CAAC;oBACvF,OAAO,CAAC,uDAAuD;gBACjE,CAAC;YACH,CAAC;QACH,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC7B,KAAK,MAAM,GAAG,IAAI,cAAc,CAAC,yBAAyB,EAAE,CAAC;gBAC3D,IAAI,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oBAC3B,qDAAqD;oBACrD,qFAAqF;oBACrF,uCAAuC;oBACvC,IAAI,UAAU,CAAC,OAAO,IAAI,IAAI,CAAC,oBAAoB,CAAC,UAAU,CAAC,EAAE,CAAC;wBAChE,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;wBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;wBACnD,MAAM,CAAC,aAAa,GAAG,yCAAyC,QAAQ,EAAE,CAAC;wBAC3E,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,2DAA2D;QAC3D,IAAI,UAAU,CAAC,OAAO,EAAE,CAAC;YACvB,wEAAwE;YACxE,MAAM,WAAW,GAAG,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;YAEnE,IAAI,WAAW,EAAE,CAAC;gBAChB,oDAAoD;gBACpD,KAAK,MAAM,QAAQ,IAAI,cAAc,CAAC,kBAAkB,EAAE,CAAC;oBACzD,MAAM,QAAQ,GAAG,cAAc,CAAC,kBAAkB,CAAC,QAAQ,CAAC,CAAC;oBAC7D,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;wBAC/B,IAAI,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;4BAC9B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;4BAEzB,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;gCACvB,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,uBAAuB,CAAC,QAAQ,CAAC,CAAC;gCAC3D,MAAM,CAAC,aAAa,GAAG,oDAAoD,QAAQ,EAAE,CAAC;4BACxF,CAAC;4BAED,MAAM;wBACR,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,6CAA6C;YAC7C,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,EAAE;gBAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI;gBAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,cAAc;gBAClD,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,UAAU,CAAC;gBAC9C,MAAM,CAAC,aAAa,GAAG,wCAAwC,QAAQ,EAAE,CAAC;YAC5E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,oBAAoB,CAAC,IAAY;QACvC,MAAM,KAAK,GAAa,EAAE,CAAC;QAE3B,uFAAuF;QACvF,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,oCAAoC,CAAC,CAAC;QACjE,IAAI,OAAO,EAAE,CAAC;YACZ,KAAK,MAAM,KAAK,IAAI,OAAO,EAAE,CAAC;gBAC5B,MAAM,SAAS,GAAG,KAAK,CAAC,KAAK,CAAC,mCAAmC,CAAC,CAAC;gBACnE,IAAI,SAAS,IAAI,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC9B,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC3B,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,mBAAmB,CAAC,IAAY;QACtC,4DAA4D;QAC5D,OAAO,IAAI;aACR,OAAO,CAAC,4BAA4B,EAAE,EAAE,CAAC;aACzC,OAAO,CAAC,8BAA8B,EAAE,EAAE,CAAC;aAC3C,OAAO,CAAC,UAAU,EAAE,GAAG,CAAC;aACxB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC;aACrB,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC;aACrB,OAAO,CAAC,QAAQ,EAAE,GAAG,CAAC;aACtB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,MAAM,EAAE,GAAG,CAAC;aACpB,IAAI,EAAE,CAAC;IACZ,CAAC;IAED;;;;OAIG;IACK,qBAAqB,CAAC,MAAc;QAC1C,IAAI,CAAC;YACH,qDAAqD;YACrD,MAAM,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,MAAM,EAAE,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;YAC3E,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC;YAE3C,8DAA8D;YAC9D,OAAO,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC;iBAC3B,OAAO,CAAC,gCAAgC,EAAE,EAAE,CAAC,CAAC,uBAAuB;iBACrE,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC,CAAC,0BAA0B;QACvD,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC1E,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,oBAAoB,CAAC,UAAuB;QAClD,uDAAuD;QACvD,sDAAsD;QACtD,MAAM,OAAO,GAAG,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAC/D,MAAM,eAAe,GAAG;YACtB,kBAAkB;YAClB,gBAAgB;YAChB,SAAS;YACT,YAAY;YACZ,WAAW;YACX,eAAe;YACf,WAAW;YACX,cAAc;YACd,YAAY;YACZ,mBAAmB;SACpB,CAAC;QAEF,KAAK,MAAM,SAAS,IAAI,eAAe,EAAE,CAAC;YACxC,IAAI,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC5B,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,uBAAuB,CAAC,QAAgB;QAC9C,QAAQ,QAAQ,EAAE,CAAC;YACjB,KAAK,UAAU,CAAC,CAAC,OAAO,cAAc,CAAC,QAAQ,CAAC;YAChD,KAAK,MAAM,CAAC,CAAC,OAAO,cAAc,CAAC,IAAI,CAAC;YACxC,KAAK,SAAS,CAAC,CAAC,OAAO,cAAc,CAAC,OAAO,CAAC;YAC9C,KAAK,iBAAiB,CAAC,CAAC,OAAO,cAAc,CAAC,eAAe,CAAC;YAC9D,KAAK,iBAAiB,CAAC,CAAC,OAAO,cAAc,CAAC,GAAG,CAAC;YAClD,KAAK,eAAe,CAAC,CAAC,OAAO,cAAc,CAAC,cAAc,CAAC;YAC3D,OAAO,CAAC,CAAC,OAAO,cAAc,CAAC,mBAAmB,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,kBAAkB,CAAC,KAAY,EAAE,MAAmB;QAC1D,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,KAAK;YAC7B,IAAI,EAAE,iBAAiB,CAAC,OAAO;YAC/B,OAAO,EAAE,8CAA8C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC7F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACK,cAAc,CAAC,KAAY,EAAE,MAAmB;QACtD,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;YAC5B,IAAI,EAAE,iBAAiB,CAAC,IAAI;YAC5B,OAAO,EAAE,6CAA6C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC5F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc,CAAC,KAAa;QACxC,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACf,OAAO,MAAM,CAAC;QAChB,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,KAAK,CAAC;QACf,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,QAAQ,CAAC;QAClB,CAAC;aAAM,CAAC;YACN,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC"}
|