@serve.zone/dcrouter 11.12.4 → 11.14.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (214) hide show
  1. package/dist_serve/bundle.js +705 -548
  2. package/dist_ts_interfaces/data/index.d.ts +1 -0
  3. package/dist_ts_interfaces/data/index.js +2 -1
  4. package/dist_ts_interfaces/data/remoteingress.d.ts +10 -1
  5. package/dist_ts_interfaces/data/vpn.d.ts +43 -0
  6. package/dist_ts_interfaces/data/vpn.js +2 -0
  7. package/dist_ts_interfaces/requests/index.d.ts +1 -0
  8. package/dist_ts_interfaces/requests/index.js +2 -1
  9. package/dist_ts_interfaces/requests/vpn.d.ts +135 -0
  10. package/dist_ts_interfaces/requests/vpn.js +3 -0
  11. package/package.json +2 -1
  12. package/readme.md +107 -3
  13. package/ts/00_commitinfo_data.ts +1 -1
  14. package/ts/classes.dcrouter.ts +126 -0
  15. package/ts/config/classes.route-config-manager.ts +20 -3
  16. package/ts/opsserver/classes.opsserver.ts +2 -0
  17. package/ts/opsserver/handlers/index.ts +2 -1
  18. package/ts/opsserver/handlers/vpn.handler.ts +257 -0
  19. package/ts/plugins.ts +2 -1
  20. package/ts/vpn/classes.vpn-manager.ts +378 -0
  21. package/ts/vpn/index.ts +1 -0
  22. package/ts_web/00_commitinfo_data.ts +1 -1
  23. package/ts_web/appstate.ts +164 -0
  24. package/ts_web/elements/index.ts +1 -0
  25. package/ts_web/elements/ops-dashboard.ts +6 -0
  26. package/ts_web/elements/ops-view-vpn.ts +330 -0
  27. package/ts_web/readme.md +17 -0
  28. package/ts_web/router.ts +1 -1
  29. package/dist_ts/00_commitinfo_data.d.ts +0 -8
  30. package/dist_ts/00_commitinfo_data.js +0 -9
  31. package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
  32. package/dist_ts/cache/classes.cache.cleaner.js +0 -130
  33. package/dist_ts/cache/classes.cached.document.d.ts +0 -76
  34. package/dist_ts/cache/classes.cached.document.js +0 -100
  35. package/dist_ts/cache/classes.cachedb.d.ts +0 -60
  36. package/dist_ts/cache/classes.cachedb.js +0 -126
  37. package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
  38. package/dist_ts/cache/documents/classes.cached.email.js +0 -337
  39. package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
  40. package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
  41. package/dist_ts/cache/documents/index.d.ts +0 -2
  42. package/dist_ts/cache/documents/index.js +0 -3
  43. package/dist_ts/cache/index.d.ts +0 -4
  44. package/dist_ts/cache/index.js +0 -7
  45. package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -54
  46. package/dist_ts/classes.cert-provision-scheduler.js +0 -118
  47. package/dist_ts/classes.dcrouter.d.ts +0 -356
  48. package/dist_ts/classes.dcrouter.js +0 -1592
  49. package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
  50. package/dist_ts/classes.storage-cert-manager.js +0 -43
  51. package/dist_ts/config/classes.api-token-manager.d.ts +0 -46
  52. package/dist_ts/config/classes.api-token-manager.js +0 -150
  53. package/dist_ts/config/classes.route-config-manager.d.ts +0 -37
  54. package/dist_ts/config/classes.route-config-manager.js +0 -240
  55. package/dist_ts/config/index.d.ts +0 -3
  56. package/dist_ts/config/index.js +0 -5
  57. package/dist_ts/config/validator.d.ts +0 -104
  58. package/dist_ts/config/validator.js +0 -152
  59. package/dist_ts/errors/base.errors.d.ts +0 -224
  60. package/dist_ts/errors/base.errors.js +0 -320
  61. package/dist_ts/errors/error-handler.d.ts +0 -98
  62. package/dist_ts/errors/error-handler.js +0 -282
  63. package/dist_ts/errors/error.codes.d.ts +0 -115
  64. package/dist_ts/errors/error.codes.js +0 -136
  65. package/dist_ts/errors/index.d.ts +0 -54
  66. package/dist_ts/errors/index.js +0 -136
  67. package/dist_ts/errors/reputation.errors.d.ts +0 -183
  68. package/dist_ts/errors/reputation.errors.js +0 -292
  69. package/dist_ts/http3/http3-route-augmentation.d.ts +0 -50
  70. package/dist_ts/http3/http3-route-augmentation.js +0 -98
  71. package/dist_ts/http3/index.d.ts +0 -1
  72. package/dist_ts/http3/index.js +0 -2
  73. package/dist_ts/index.d.ts +0 -8
  74. package/dist_ts/index.js +0 -29
  75. package/dist_ts/logger.d.ts +0 -21
  76. package/dist_ts/logger.js +0 -81
  77. package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
  78. package/dist_ts/monitoring/classes.metricscache.js +0 -63
  79. package/dist_ts/monitoring/classes.metricsmanager.d.ts +0 -184
  80. package/dist_ts/monitoring/classes.metricsmanager.js +0 -744
  81. package/dist_ts/monitoring/index.d.ts +0 -1
  82. package/dist_ts/monitoring/index.js +0 -2
  83. package/dist_ts/opsserver/classes.opsserver.d.ts +0 -37
  84. package/dist_ts/opsserver/classes.opsserver.js +0 -85
  85. package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
  86. package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
  87. package/dist_ts/opsserver/handlers/api-token.handler.d.ts +0 -6
  88. package/dist_ts/opsserver/handlers/api-token.handler.js +0 -62
  89. package/dist_ts/opsserver/handlers/certificate.handler.d.ts +0 -32
  90. package/dist_ts/opsserver/handlers/certificate.handler.js +0 -421
  91. package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
  92. package/dist_ts/opsserver/handlers/config.handler.js +0 -192
  93. package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +0 -30
  94. package/dist_ts/opsserver/handlers/email-ops.handler.js +0 -227
  95. package/dist_ts/opsserver/handlers/index.d.ts +0 -11
  96. package/dist_ts/opsserver/handlers/index.js +0 -12
  97. package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
  98. package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
  99. package/dist_ts/opsserver/handlers/radius.handler.d.ts +0 -6
  100. package/dist_ts/opsserver/handlers/radius.handler.js +0 -295
  101. package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +0 -6
  102. package/dist_ts/opsserver/handlers/remoteingress.handler.js +0 -156
  103. package/dist_ts/opsserver/handlers/route-management.handler.d.ts +0 -14
  104. package/dist_ts/opsserver/handlers/route-management.handler.js +0 -117
  105. package/dist_ts/opsserver/handlers/security.handler.d.ts +0 -9
  106. package/dist_ts/opsserver/handlers/security.handler.js +0 -233
  107. package/dist_ts/opsserver/handlers/stats.handler.d.ts +0 -11
  108. package/dist_ts/opsserver/handlers/stats.handler.js +0 -403
  109. package/dist_ts/opsserver/helpers/guards.d.ts +0 -27
  110. package/dist_ts/opsserver/helpers/guards.js +0 -43
  111. package/dist_ts/opsserver/index.d.ts +0 -1
  112. package/dist_ts/opsserver/index.js +0 -2
  113. package/dist_ts/paths.d.ts +0 -26
  114. package/dist_ts/paths.js +0 -45
  115. package/dist_ts/plugins.d.ts +0 -80
  116. package/dist_ts/plugins.js +0 -114
  117. package/dist_ts/radius/classes.accounting.manager.d.ts +0 -231
  118. package/dist_ts/radius/classes.accounting.manager.js +0 -462
  119. package/dist_ts/radius/classes.radius.server.d.ts +0 -171
  120. package/dist_ts/radius/classes.radius.server.js +0 -386
  121. package/dist_ts/radius/classes.vlan.manager.d.ts +0 -128
  122. package/dist_ts/radius/classes.vlan.manager.js +0 -279
  123. package/dist_ts/radius/index.d.ts +0 -13
  124. package/dist_ts/radius/index.js +0 -14
  125. package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +0 -94
  126. package/dist_ts/remoteingress/classes.remoteingress-manager.js +0 -271
  127. package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +0 -59
  128. package/dist_ts/remoteingress/classes.tunnel-manager.js +0 -165
  129. package/dist_ts/remoteingress/index.d.ts +0 -2
  130. package/dist_ts/remoteingress/index.js +0 -3
  131. package/dist_ts/security/classes.contentscanner.d.ts +0 -164
  132. package/dist_ts/security/classes.contentscanner.js +0 -642
  133. package/dist_ts/security/classes.ipreputationchecker.d.ts +0 -160
  134. package/dist_ts/security/classes.ipreputationchecker.js +0 -537
  135. package/dist_ts/security/classes.securitylogger.d.ts +0 -144
  136. package/dist_ts/security/classes.securitylogger.js +0 -235
  137. package/dist_ts/security/index.d.ts +0 -3
  138. package/dist_ts/security/index.js +0 -4
  139. package/dist_ts/sms/classes.smsservice.d.ts +0 -15
  140. package/dist_ts/sms/classes.smsservice.js +0 -72
  141. package/dist_ts/sms/config/sms.config.d.ts +0 -93
  142. package/dist_ts/sms/config/sms.config.js +0 -2
  143. package/dist_ts/sms/config/sms.schema.d.ts +0 -5
  144. package/dist_ts/sms/config/sms.schema.js +0 -121
  145. package/dist_ts/sms/index.d.ts +0 -1
  146. package/dist_ts/sms/index.js +0 -2
  147. package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
  148. package/dist_ts/storage/classes.storagemanager.js +0 -348
  149. package/dist_ts/storage/index.d.ts +0 -1
  150. package/dist_ts/storage/index.js +0 -3
  151. package/dist_ts_apiclient/classes.apitoken.d.ts +0 -41
  152. package/dist_ts_apiclient/classes.apitoken.js +0 -115
  153. package/dist_ts_apiclient/classes.certificate.d.ts +0 -57
  154. package/dist_ts_apiclient/classes.certificate.js +0 -69
  155. package/dist_ts_apiclient/classes.config.d.ts +0 -7
  156. package/dist_ts_apiclient/classes.config.js +0 -11
  157. package/dist_ts_apiclient/classes.dcrouterapiclient.d.ts +0 -41
  158. package/dist_ts_apiclient/classes.dcrouterapiclient.js +0 -81
  159. package/dist_ts_apiclient/classes.email.d.ts +0 -30
  160. package/dist_ts_apiclient/classes.email.js +0 -52
  161. package/dist_ts_apiclient/classes.logs.d.ts +0 -21
  162. package/dist_ts_apiclient/classes.logs.js +0 -14
  163. package/dist_ts_apiclient/classes.radius.d.ts +0 -59
  164. package/dist_ts_apiclient/classes.radius.js +0 -95
  165. package/dist_ts_apiclient/classes.remoteingress.d.ts +0 -54
  166. package/dist_ts_apiclient/classes.remoteingress.js +0 -136
  167. package/dist_ts_apiclient/classes.route.d.ts +0 -42
  168. package/dist_ts_apiclient/classes.route.js +0 -154
  169. package/dist_ts_apiclient/classes.stats.d.ts +0 -47
  170. package/dist_ts_apiclient/classes.stats.js +0 -38
  171. package/dist_ts_apiclient/index.d.ts +0 -10
  172. package/dist_ts_apiclient/index.js +0 -14
  173. package/dist_ts_apiclient/plugins.d.ts +0 -3
  174. package/dist_ts_apiclient/plugins.js +0 -5
  175. package/dist_ts_web/00_commitinfo_data.d.ts +0 -8
  176. package/dist_ts_web/00_commitinfo_data.js +0 -9
  177. package/dist_ts_web/appstate.d.ts +0 -216
  178. package/dist_ts_web/appstate.js +0 -1064
  179. package/dist_ts_web/elements/index.d.ts +0 -12
  180. package/dist_ts_web/elements/index.js +0 -13
  181. package/dist_ts_web/elements/ops-dashboard.d.ts +0 -23
  182. package/dist_ts_web/elements/ops-dashboard.js +0 -317
  183. package/dist_ts_web/elements/ops-view-apitokens.d.ts +0 -13
  184. package/dist_ts_web/elements/ops-view-apitokens.js +0 -371
  185. package/dist_ts_web/elements/ops-view-certificates.d.ts +0 -22
  186. package/dist_ts_web/elements/ops-view-certificates.js +0 -528
  187. package/dist_ts_web/elements/ops-view-config.d.ts +0 -19
  188. package/dist_ts_web/elements/ops-view-config.js +0 -339
  189. package/dist_ts_web/elements/ops-view-emails.d.ts +0 -21
  190. package/dist_ts_web/elements/ops-view-emails.js +0 -165
  191. package/dist_ts_web/elements/ops-view-logs.d.ts +0 -13
  192. package/dist_ts_web/elements/ops-view-logs.js +0 -159
  193. package/dist_ts_web/elements/ops-view-network.d.ts +0 -71
  194. package/dist_ts_web/elements/ops-view-network.js +0 -764
  195. package/dist_ts_web/elements/ops-view-overview.d.ts +0 -22
  196. package/dist_ts_web/elements/ops-view-overview.js +0 -456
  197. package/dist_ts_web/elements/ops-view-remoteingress.d.ts +0 -20
  198. package/dist_ts_web/elements/ops-view-remoteingress.js +0 -494
  199. package/dist_ts_web/elements/ops-view-routes.d.ts +0 -12
  200. package/dist_ts_web/elements/ops-view-routes.js +0 -404
  201. package/dist_ts_web/elements/ops-view-security.d.ts +0 -21
  202. package/dist_ts_web/elements/ops-view-security.js +0 -574
  203. package/dist_ts_web/elements/shared/css.d.ts +0 -1
  204. package/dist_ts_web/elements/shared/css.js +0 -10
  205. package/dist_ts_web/elements/shared/index.d.ts +0 -2
  206. package/dist_ts_web/elements/shared/index.js +0 -3
  207. package/dist_ts_web/elements/shared/ops-sectionheading.d.ts +0 -5
  208. package/dist_ts_web/elements/shared/ops-sectionheading.js +0 -82
  209. package/dist_ts_web/index.d.ts +0 -1
  210. package/dist_ts_web/index.js +0 -10
  211. package/dist_ts_web/plugins.d.ts +0 -6
  212. package/dist_ts_web/plugins.js +0 -11
  213. package/dist_ts_web/router.d.ts +0 -19
  214. package/dist_ts_web/router.js +0 -91
@@ -1,537 +0,0 @@
1
- import * as plugins from '../plugins.js';
2
- import * as paths from '../paths.js';
3
- import { logger } from '../logger.js';
4
- import { SecurityLogger, SecurityLogLevel, SecurityEventType } from './classes.securitylogger.js';
5
- import { LRUCache } from 'lru-cache';
6
- /**
7
- * Reputation threshold scores
8
- */
9
- export var ReputationThreshold;
10
- (function (ReputationThreshold) {
11
- ReputationThreshold[ReputationThreshold["HIGH_RISK"] = 20] = "HIGH_RISK";
12
- ReputationThreshold[ReputationThreshold["MEDIUM_RISK"] = 50] = "MEDIUM_RISK";
13
- ReputationThreshold[ReputationThreshold["LOW_RISK"] = 80] = "LOW_RISK"; // Score below this is considered low risk (but not trusted)
14
- })(ReputationThreshold || (ReputationThreshold = {}));
15
- /**
16
- * IP type classifications
17
- */
18
- export var IPType;
19
- (function (IPType) {
20
- IPType["RESIDENTIAL"] = "residential";
21
- IPType["DATACENTER"] = "datacenter";
22
- IPType["PROXY"] = "proxy";
23
- IPType["TOR"] = "tor";
24
- IPType["VPN"] = "vpn";
25
- IPType["UNKNOWN"] = "unknown";
26
- })(IPType || (IPType = {}));
27
- /**
28
- * Class for checking IP reputation of inbound email senders
29
- */
30
- export class IPReputationChecker {
31
- static instance;
32
- reputationCache;
33
- options;
34
- storageManager; // StorageManager instance
35
- saveCacheTimer = null;
36
- static SAVE_CACHE_DEBOUNCE_MS = 30_000;
37
- // Default DNSBL servers
38
- static DEFAULT_DNSBL_SERVERS = [
39
- 'zen.spamhaus.org', // Spamhaus
40
- 'bl.spamcop.net', // SpamCop
41
- 'b.barracudacentral.org', // Barracuda
42
- 'spam.dnsbl.sorbs.net', // SORBS
43
- 'dnsbl.sorbs.net', // SORBS (expanded)
44
- 'cbl.abuseat.org', // Composite Blocking List
45
- 'xbl.spamhaus.org', // Spamhaus XBL
46
- 'pbl.spamhaus.org', // Spamhaus PBL
47
- 'dnsbl-1.uceprotect.net', // UCEPROTECT
48
- 'psbl.surriel.com' // PSBL
49
- ];
50
- // Default options
51
- static DEFAULT_OPTIONS = {
52
- maxCacheSize: 10000,
53
- cacheTTL: 24 * 60 * 60 * 1000, // 24 hours
54
- dnsblServers: IPReputationChecker.DEFAULT_DNSBL_SERVERS,
55
- highRiskThreshold: ReputationThreshold.HIGH_RISK,
56
- mediumRiskThreshold: ReputationThreshold.MEDIUM_RISK,
57
- lowRiskThreshold: ReputationThreshold.LOW_RISK,
58
- enableLocalCache: true,
59
- enableDNSBL: true,
60
- enableIPInfo: true
61
- };
62
- /**
63
- * Constructor for IPReputationChecker
64
- * @param options Configuration options
65
- * @param storageManager Optional StorageManager instance for persistence
66
- */
67
- constructor(options = {}, storageManager) {
68
- // Merge with default options
69
- this.options = {
70
- ...IPReputationChecker.DEFAULT_OPTIONS,
71
- ...options
72
- };
73
- this.storageManager = storageManager;
74
- // If no storage manager provided, log warning
75
- if (!storageManager && this.options.enableLocalCache) {
76
- logger.log('warn', '⚠️ WARNING: IPReputationChecker initialized without StorageManager.\n' +
77
- ' IP reputation cache will only be stored to filesystem.\n' +
78
- ' Consider passing a StorageManager instance for better storage flexibility.');
79
- }
80
- // Initialize reputation cache
81
- this.reputationCache = new LRUCache({
82
- max: this.options.maxCacheSize,
83
- ttl: this.options.cacheTTL, // Cache TTL
84
- });
85
- // Load cache from disk if enabled
86
- if (this.options.enableLocalCache) {
87
- // Fire and forget the load operation
88
- this.loadCache().catch((error) => {
89
- logger.log('error', `Failed to load IP reputation cache during initialization: ${error.message}`);
90
- });
91
- }
92
- }
93
- /**
94
- * Get the singleton instance of the checker
95
- * @param options Configuration options
96
- * @param storageManager Optional StorageManager instance for persistence
97
- * @returns Singleton instance
98
- */
99
- static getInstance(options = {}, storageManager) {
100
- if (!IPReputationChecker.instance) {
101
- IPReputationChecker.instance = new IPReputationChecker(options, storageManager);
102
- }
103
- return IPReputationChecker.instance;
104
- }
105
- /**
106
- * Reset the singleton instance (for shutdown/testing)
107
- */
108
- static resetInstance() {
109
- if (IPReputationChecker.instance) {
110
- if (IPReputationChecker.instance.saveCacheTimer) {
111
- clearTimeout(IPReputationChecker.instance.saveCacheTimer);
112
- IPReputationChecker.instance.saveCacheTimer = null;
113
- }
114
- }
115
- IPReputationChecker.instance = undefined;
116
- }
117
- /**
118
- * Check an IP address's reputation
119
- * @param ip IP address to check
120
- * @returns Reputation check result
121
- */
122
- async checkReputation(ip) {
123
- try {
124
- // Validate IP address format
125
- if (!this.isValidIPAddress(ip)) {
126
- logger.log('warn', `Invalid IP address format: ${ip}`);
127
- return this.createErrorResult(ip, 'Invalid IP address format');
128
- }
129
- // Check cache first
130
- const cachedResult = this.reputationCache.get(ip);
131
- if (cachedResult) {
132
- logger.log('info', `Using cached reputation data for IP ${ip}`, {
133
- score: cachedResult.score,
134
- isSpam: cachedResult.isSpam
135
- });
136
- return cachedResult;
137
- }
138
- // Initialize empty result
139
- const result = {
140
- score: 100, // Start with perfect score
141
- isSpam: false,
142
- isProxy: false,
143
- isTor: false,
144
- isVPN: false,
145
- timestamp: Date.now()
146
- };
147
- // Check IP against DNS blacklists if enabled
148
- if (this.options.enableDNSBL) {
149
- const dnsblResult = await this.checkDNSBL(ip);
150
- // Update result with DNSBL information
151
- result.score -= dnsblResult.listCount * 10; // Subtract 10 points per blacklist
152
- result.isSpam = dnsblResult.listCount > 0;
153
- result.blacklists = dnsblResult.lists;
154
- }
155
- // Get additional IP information if enabled
156
- if (this.options.enableIPInfo) {
157
- const ipInfo = await this.getIPInfo(ip);
158
- // Update result with IP info
159
- result.country = ipInfo.country;
160
- result.asn = ipInfo.asn;
161
- result.org = ipInfo.org;
162
- // Adjust score based on IP type
163
- if (ipInfo.type === IPType.PROXY || ipInfo.type === IPType.TOR || ipInfo.type === IPType.VPN) {
164
- result.score -= 30; // Subtract 30 points for proxies, Tor, VPNs
165
- // Set proxy flags
166
- result.isProxy = ipInfo.type === IPType.PROXY;
167
- result.isTor = ipInfo.type === IPType.TOR;
168
- result.isVPN = ipInfo.type === IPType.VPN;
169
- }
170
- }
171
- // Ensure score is between 0 and 100
172
- result.score = Math.max(0, Math.min(100, result.score));
173
- // Update cache with result
174
- this.reputationCache.set(ip, result);
175
- // Schedule debounced cache save if enabled
176
- if (this.options.enableLocalCache) {
177
- this.debouncedSaveCache();
178
- }
179
- // Log the reputation check
180
- this.logReputationCheck(ip, result);
181
- return result;
182
- }
183
- catch (error) {
184
- logger.log('error', `Error checking IP reputation for ${ip}: ${error.message}`, {
185
- ip,
186
- stack: error.stack
187
- });
188
- return this.createErrorResult(ip, error.message);
189
- }
190
- }
191
- /**
192
- * Check an IP against DNS blacklists
193
- * @param ip IP address to check
194
- * @returns DNSBL check results
195
- */
196
- async checkDNSBL(ip) {
197
- try {
198
- // Reverse the IP for DNSBL queries
199
- const reversedIP = this.reverseIP(ip);
200
- const results = await Promise.allSettled(this.options.dnsblServers.map(async (server) => {
201
- try {
202
- const lookupDomain = `${reversedIP}.${server}`;
203
- await plugins.dns.promises.resolve(lookupDomain);
204
- return server; // IP is listed in this DNSBL
205
- }
206
- catch (error) {
207
- if (error.code === 'ENOTFOUND') {
208
- return null; // IP is not listed in this DNSBL
209
- }
210
- throw error; // Other error
211
- }
212
- }));
213
- // Extract successful lookups (listed in DNSBL)
214
- const lists = results
215
- .filter((result) => result.status === 'fulfilled' && result.value !== null)
216
- .map(result => result.value);
217
- return {
218
- listCount: lists.length,
219
- lists
220
- };
221
- }
222
- catch (error) {
223
- logger.log('error', `Error checking DNSBL for ${ip}: ${error.message}`);
224
- return {
225
- listCount: 0,
226
- lists: []
227
- };
228
- }
229
- }
230
- /**
231
- * Get information about an IP address
232
- * @param ip IP address to check
233
- * @returns IP information
234
- */
235
- async getIPInfo(ip) {
236
- try {
237
- // In a real implementation, this would use an IP data service API
238
- // For this implementation, we'll use a simplified approach
239
- // Check if it's a known Tor exit node (simplified)
240
- const isTor = ip.startsWith('171.25.') || ip.startsWith('185.220.') || ip.startsWith('95.216.');
241
- // Check if it's a known VPN (simplified)
242
- const isVPN = ip.startsWith('185.156.') || ip.startsWith('37.120.');
243
- // Check if it's a known proxy (simplified)
244
- const isProxy = ip.startsWith('34.92.') || ip.startsWith('34.206.');
245
- // Determine IP type
246
- let type = IPType.UNKNOWN;
247
- if (isTor) {
248
- type = IPType.TOR;
249
- }
250
- else if (isVPN) {
251
- type = IPType.VPN;
252
- }
253
- else if (isProxy) {
254
- type = IPType.PROXY;
255
- }
256
- else {
257
- // Simple datacenters detection (major cloud providers)
258
- if (ip.startsWith('13.') || // AWS
259
- ip.startsWith('35.') || // Google Cloud
260
- ip.startsWith('52.') || // AWS
261
- ip.startsWith('34.') || // Google Cloud
262
- ip.startsWith('104.') // Various providers
263
- ) {
264
- type = IPType.DATACENTER;
265
- }
266
- else {
267
- type = IPType.RESIDENTIAL;
268
- }
269
- }
270
- // Return the information
271
- return {
272
- country: this.determineCountry(ip), // Simplified, would use geolocation service
273
- asn: 'AS12345', // Simplified, would look up real ASN
274
- org: this.determineOrg(ip), // Simplified, would use real org data
275
- type
276
- };
277
- }
278
- catch (error) {
279
- logger.log('error', `Error getting IP info for ${ip}: ${error.message}`);
280
- return {
281
- type: IPType.UNKNOWN
282
- };
283
- }
284
- }
285
- /**
286
- * Simplified method to determine country from IP
287
- * In a real implementation, this would use a geolocation database or service
288
- * @param ip IP address
289
- * @returns Country code
290
- */
291
- determineCountry(ip) {
292
- // Simplified mapping for demo purposes
293
- if (ip.startsWith('13.') || ip.startsWith('52.'))
294
- return 'US';
295
- if (ip.startsWith('35.') || ip.startsWith('34.'))
296
- return 'US';
297
- if (ip.startsWith('185.'))
298
- return 'NL';
299
- if (ip.startsWith('171.'))
300
- return 'DE';
301
- return 'XX'; // Unknown
302
- }
303
- /**
304
- * Simplified method to determine organization from IP
305
- * In a real implementation, this would use an IP-to-org database or service
306
- * @param ip IP address
307
- * @returns Organization name
308
- */
309
- determineOrg(ip) {
310
- // Simplified mapping for demo purposes
311
- if (ip.startsWith('13.') || ip.startsWith('52.'))
312
- return 'Amazon AWS';
313
- if (ip.startsWith('35.') || ip.startsWith('34.'))
314
- return 'Google Cloud';
315
- if (ip.startsWith('185.156.'))
316
- return 'NordVPN';
317
- if (ip.startsWith('37.120.'))
318
- return 'ExpressVPN';
319
- if (ip.startsWith('185.220.'))
320
- return 'Tor Exit Node';
321
- return 'Unknown';
322
- }
323
- /**
324
- * Reverse an IP address for DNSBL lookups (e.g., 1.2.3.4 -> 4.3.2.1)
325
- * @param ip IP address to reverse
326
- * @returns Reversed IP for DNSBL queries
327
- */
328
- reverseIP(ip) {
329
- return ip.split('.').reverse().join('.');
330
- }
331
- /**
332
- * Create an error result for when reputation check fails
333
- * @param ip IP address
334
- * @param errorMessage Error message
335
- * @returns Error result
336
- */
337
- createErrorResult(ip, errorMessage) {
338
- return {
339
- score: 50, // Neutral score for errors
340
- isSpam: false,
341
- isProxy: false,
342
- isTor: false,
343
- isVPN: false,
344
- timestamp: Date.now(),
345
- error: errorMessage
346
- };
347
- }
348
- /**
349
- * Validate IP address format
350
- * @param ip IP address to validate
351
- * @returns Whether the IP is valid
352
- */
353
- isValidIPAddress(ip) {
354
- // IPv4 regex pattern
355
- const ipv4Pattern = /^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$/;
356
- return ipv4Pattern.test(ip);
357
- }
358
- /**
359
- * Log reputation check to security logger
360
- * @param ip IP address
361
- * @param result Reputation result
362
- */
363
- logReputationCheck(ip, result) {
364
- // Determine log level based on reputation score
365
- let logLevel = SecurityLogLevel.INFO;
366
- if (result.score < this.options.highRiskThreshold) {
367
- logLevel = SecurityLogLevel.WARN;
368
- }
369
- else if (result.score < this.options.mediumRiskThreshold) {
370
- logLevel = SecurityLogLevel.INFO;
371
- }
372
- // Log the check
373
- SecurityLogger.getInstance().logEvent({
374
- level: logLevel,
375
- type: SecurityEventType.IP_REPUTATION,
376
- message: `IP reputation check ${result.isSpam ? 'flagged spam' : 'completed'} for ${ip}`,
377
- ipAddress: ip,
378
- details: {
379
- score: result.score,
380
- isSpam: result.isSpam,
381
- isProxy: result.isProxy,
382
- isTor: result.isTor,
383
- isVPN: result.isVPN,
384
- country: result.country,
385
- blacklists: result.blacklists
386
- },
387
- success: !result.isSpam
388
- });
389
- }
390
- /**
391
- * Schedule a debounced cache save (at most once per SAVE_CACHE_DEBOUNCE_MS)
392
- */
393
- debouncedSaveCache() {
394
- if (this.saveCacheTimer) {
395
- return; // already scheduled
396
- }
397
- this.saveCacheTimer = setTimeout(() => {
398
- this.saveCacheTimer = null;
399
- this.saveCache().catch((error) => {
400
- logger.log('error', `Failed to save IP reputation cache: ${error.message}`);
401
- });
402
- }, IPReputationChecker.SAVE_CACHE_DEBOUNCE_MS);
403
- }
404
- /**
405
- * Save cache to disk or storage manager
406
- */
407
- async saveCache() {
408
- try {
409
- // Convert cache entries to serializable array
410
- const entries = Array.from(this.reputationCache.entries()).map(([ip, data]) => ({
411
- ip,
412
- data
413
- }));
414
- // Only save if we have entries
415
- if (entries.length === 0) {
416
- return;
417
- }
418
- const cacheData = JSON.stringify(entries);
419
- // Save to storage manager if available
420
- if (this.storageManager) {
421
- await this.storageManager.set('/security/ip-reputation-cache.json', cacheData);
422
- logger.log('info', `Saved ${entries.length} IP reputation cache entries to StorageManager`);
423
- }
424
- else {
425
- // Fall back to filesystem
426
- const cacheDir = plugins.path.join(paths.dataDir, 'security');
427
- plugins.fsUtils.ensureDirSync(cacheDir);
428
- const cacheFile = plugins.path.join(cacheDir, 'ip_reputation_cache.json');
429
- plugins.fsUtils.toFsSync(cacheData, cacheFile);
430
- logger.log('info', `Saved ${entries.length} IP reputation cache entries to disk`);
431
- }
432
- }
433
- catch (error) {
434
- logger.log('error', `Failed to save IP reputation cache: ${error.message}`);
435
- }
436
- }
437
- /**
438
- * Load cache from disk or storage manager
439
- */
440
- async loadCache() {
441
- try {
442
- let cacheData = null;
443
- let fromFilesystem = false;
444
- // Try to load from storage manager first
445
- if (this.storageManager) {
446
- try {
447
- cacheData = await this.storageManager.get('/security/ip-reputation-cache.json');
448
- if (!cacheData) {
449
- // Check if data exists in filesystem and migrate it
450
- const cacheFile = plugins.path.join(paths.dataDir, 'security', 'ip_reputation_cache.json');
451
- if (plugins.fs.existsSync(cacheFile)) {
452
- logger.log('info', 'Migrating IP reputation cache from filesystem to StorageManager');
453
- cacheData = plugins.fs.readFileSync(cacheFile, 'utf8');
454
- fromFilesystem = true;
455
- // Migrate to storage manager
456
- await this.storageManager.set('/security/ip-reputation-cache.json', cacheData);
457
- logger.log('info', 'IP reputation cache migrated to StorageManager successfully');
458
- // Optionally delete the old file after successful migration
459
- try {
460
- plugins.fs.unlinkSync(cacheFile);
461
- logger.log('info', 'Old cache file removed after migration');
462
- }
463
- catch (deleteError) {
464
- logger.log('warn', `Could not delete old cache file: ${deleteError.message}`);
465
- }
466
- }
467
- }
468
- }
469
- catch (error) {
470
- logger.log('error', `Error loading from StorageManager: ${error.message}`);
471
- }
472
- }
473
- else {
474
- // No storage manager, load from filesystem
475
- const cacheFile = plugins.path.join(paths.dataDir, 'security', 'ip_reputation_cache.json');
476
- if (plugins.fs.existsSync(cacheFile)) {
477
- cacheData = plugins.fs.readFileSync(cacheFile, 'utf8');
478
- fromFilesystem = true;
479
- }
480
- }
481
- // Parse and restore cache if data was found
482
- if (cacheData) {
483
- const entries = JSON.parse(cacheData);
484
- // Validate and filter entries
485
- const now = Date.now();
486
- const validEntries = entries.filter(entry => {
487
- const age = now - entry.data.timestamp;
488
- return age < this.options.cacheTTL; // Only load entries that haven't expired
489
- });
490
- // Restore cache
491
- for (const entry of validEntries) {
492
- this.reputationCache.set(entry.ip, entry.data);
493
- }
494
- const source = fromFilesystem ? 'disk' : 'StorageManager';
495
- logger.log('info', `Loaded ${validEntries.length} IP reputation cache entries from ${source}`);
496
- }
497
- }
498
- catch (error) {
499
- logger.log('error', `Failed to load IP reputation cache: ${error.message}`);
500
- }
501
- }
502
- /**
503
- * Get the risk level for a reputation score
504
- * @param score Reputation score (0-100)
505
- * @returns Risk level description
506
- */
507
- static getRiskLevel(score) {
508
- if (score < ReputationThreshold.HIGH_RISK) {
509
- return 'high';
510
- }
511
- else if (score < ReputationThreshold.MEDIUM_RISK) {
512
- return 'medium';
513
- }
514
- else if (score < ReputationThreshold.LOW_RISK) {
515
- return 'low';
516
- }
517
- else {
518
- return 'trusted';
519
- }
520
- }
521
- /**
522
- * Update the storage manager after instantiation
523
- * This is useful when the storage manager is not available at construction time
524
- * @param storageManager The StorageManager instance to use
525
- */
526
- updateStorageManager(storageManager) {
527
- this.storageManager = storageManager;
528
- logger.log('info', 'IPReputationChecker storage manager updated');
529
- // If cache is enabled and we have entries, save them to the new storage manager
530
- if (this.options.enableLocalCache && this.reputationCache.size > 0) {
531
- this.saveCache().catch((error) => {
532
- logger.log('error', `Failed to save cache to new storage manager: ${error.message}`);
533
- });
534
- }
535
- }
536
- }
537
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.ipreputationchecker.js","sourceRoot":"","sources":["../../../ts/security/classes.ipreputationchecker.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,KAAK,MAAM,aAAa,CAAC;AACrC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAClG,OAAO,EAAE,QAAQ,EAAE,MAAM,WAAW,CAAC;AAmBrC;;GAEG;AACH,MAAM,CAAN,IAAY,mBAIX;AAJD,WAAY,mBAAmB;IAC7B,wEAAc,CAAA;IACd,4EAAgB,CAAA;IAChB,sEAAa,CAAA,CAAQ,4DAA4D;AACnF,CAAC,EAJW,mBAAmB,KAAnB,mBAAmB,QAI9B;AAED;;GAEG;AACH,MAAM,CAAN,IAAY,MAOX;AAPD,WAAY,MAAM;IAChB,qCAA2B,CAAA;IAC3B,mCAAyB,CAAA;IACzB,yBAAe,CAAA;IACf,qBAAW,CAAA;IACX,qBAAW,CAAA;IACX,6BAAmB,CAAA;AACrB,CAAC,EAPW,MAAM,KAAN,MAAM,QAOjB;AAiBD;;GAEG;AACH,MAAM,OAAO,mBAAmB;IACtB,MAAM,CAAC,QAAQ,CAAkC;IACjD,eAAe,CAAsC;IACrD,OAAO,CAAiC;IACxC,cAAc,CAAO,CAAC,0BAA0B;IAChD,cAAc,GAAyC,IAAI,CAAC;IAC5D,MAAM,CAAU,sBAAsB,GAAG,MAAM,CAAC;IAExD,wBAAwB;IAChB,MAAM,CAAU,qBAAqB,GAAG;QAC9C,kBAAkB,EAAU,WAAW;QACvC,gBAAgB,EAAY,UAAU;QACtC,wBAAwB,EAAI,YAAY;QACxC,sBAAsB,EAAM,QAAQ;QACpC,iBAAiB,EAAW,mBAAmB;QAC/C,iBAAiB,EAAW,2BAA2B;QACvD,kBAAkB,EAAU,eAAe;QAC3C,kBAAkB,EAAU,eAAe;QAC3C,wBAAwB,EAAI,aAAa;QACzC,kBAAkB,CAAU,OAAO;KACpC,CAAC;IAEF,kBAAkB;IACV,MAAM,CAAU,eAAe,GAAmC;QACxE,YAAY,EAAE,KAAK;QACnB,QAAQ,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,WAAW;QAC1C,YAAY,EAAE,mBAAmB,CAAC,qBAAqB;QACvD,iBAAiB,EAAE,mBAAmB,CAAC,SAAS;QAChD,mBAAmB,EAAE,mBAAmB,CAAC,WAAW;QACpD,gBAAgB,EAAE,mBAAmB,CAAC,QAAQ;QAC9C,gBAAgB,EAAE,IAAI;QACtB,WAAW,EAAE,IAAI;QACjB,YAAY,EAAE,IAAI;KACnB,CAAC;IAEF;;;;OAIG;IACH,YAAY,UAAgC,EAAE,EAAE,cAAoB;QAClE,6BAA6B;QAC7B,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,mBAAmB,CAAC,eAAe;YACtC,GAAG,OAAO;SACX,CAAC;QAEF,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QAErC,8CAA8C;QAC9C,IAAI,CAAC,cAAc,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;YACrD,MAAM,CAAC,GAAG,CAAC,MAAM,EACf,wEAAwE;gBACxE,6DAA6D;gBAC7D,+EAA+E,CAChF,CAAC;QACJ,CAAC;QAED,8BAA8B;QAC9B,IAAI,CAAC,eAAe,GAAG,IAAI,QAAQ,CAA4B;YAC7D,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,YAAY;YAC9B,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,YAAY;SACzC,CAAC,CAAC;QAEH,kCAAkC;QAClC,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;YAClC,qCAAqC;YACrC,IAAI,CAAC,SAAS,EAAE,CAAC,KAAK,CAAC,CAAC,KAAc,EAAE,EAAE;gBACxC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,6DAA8D,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;YAC/G,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,WAAW,CAAC,UAAgC,EAAE,EAAE,cAAoB;QAChF,IAAI,CAAC,mBAAmB,CAAC,QAAQ,EAAE,CAAC;YAClC,mBAAmB,CAAC,QAAQ,GAAG,IAAI,mBAAmB,CAAC,OAAO,EAAE,cAAc,CAAC,CAAC;QAClF,CAAC;QACD,OAAO,mBAAmB,CAAC,QAAQ,CAAC;IACtC,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,aAAa;QACzB,IAAI,mBAAmB,CAAC,QAAQ,EAAE,CAAC;YACjC,IAAI,mBAAmB,CAAC,QAAQ,CAAC,cAAc,EAAE,CAAC;gBAChD,YAAY,CAAC,mBAAmB,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC;gBAC1D,mBAAmB,CAAC,QAAQ,CAAC,cAAc,GAAG,IAAI,CAAC;YACrD,CAAC;QACH,CAAC;QACD,mBAAmB,CAAC,QAAQ,GAAG,SAAS,CAAC;IAC3C,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,eAAe,CAAC,EAAU;QACrC,IAAI,CAAC;YACH,6BAA6B;YAC7B,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,EAAE,CAAC,EAAE,CAAC;gBAC/B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,8BAA8B,EAAE,EAAE,CAAC,CAAC;gBACvD,OAAO,IAAI,CAAC,iBAAiB,CAAC,EAAE,EAAE,2BAA2B,CAAC,CAAC;YACjE,CAAC;YAED,oBAAoB;YACpB,MAAM,YAAY,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;YAClD,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,uCAAuC,EAAE,EAAE,EAAE;oBAC9D,KAAK,EAAE,YAAY,CAAC,KAAK;oBACzB,MAAM,EAAE,YAAY,CAAC,MAAM;iBAC5B,CAAC,CAAC;gBACH,OAAO,YAAY,CAAC;YACtB,CAAC;YAED,0BAA0B;YAC1B,MAAM,MAAM,GAAsB;gBAChC,KAAK,EAAE,GAAG,EAAE,2BAA2B;gBACvC,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,KAAK;gBACd,KAAK,EAAE,KAAK;gBACZ,KAAK,EAAE,KAAK;gBACZ,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,6CAA6C;YAC7C,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;gBAC7B,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;gBAE9C,uCAAuC;gBACvC,MAAM,CAAC,KAAK,IAAI,WAAW,CAAC,SAAS,GAAG,EAAE,CAAC,CAAC,mCAAmC;gBAC/E,MAAM,CAAC,MAAM,GAAG,WAAW,CAAC,SAAS,GAAG,CAAC,CAAC;gBAC1C,MAAM,CAAC,UAAU,GAAG,WAAW,CAAC,KAAK,CAAC;YACxC,CAAC;YAED,2CAA2C;YAC3C,IAAI,IAAI,CAAC,OAAO,CAAC,YAAY,EAAE,CAAC;gBAC9B,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAExC,6BAA6B;gBAC7B,MAAM,CAAC,OAAO,GAAG,MAAM,CAAC,OAAO,CAAC;gBAChC,MAAM,CAAC,GAAG,GAAG,MAAM,CAAC,GAAG,CAAC;gBACxB,MAAM,CAAC,GAAG,GAAG,MAAM,CAAC,GAAG,CAAC;gBAExB,gCAAgC;gBAChC,IAAI,MAAM,CAAC,IAAI,KAAK,MAAM,CAAC,KAAK,IAAI,MAAM,CAAC,IAAI,KAAK,MAAM,CAAC,GAAG,IAAI,MAAM,CAAC,IAAI,KAAK,MAAM,CAAC,GAAG,EAAE,CAAC;oBAC7F,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,4CAA4C;oBAEhE,kBAAkB;oBAClB,MAAM,CAAC,OAAO,GAAG,MAAM,CAAC,IAAI,KAAK,MAAM,CAAC,KAAK,CAAC;oBAC9C,MAAM,CAAC,KAAK,GAAG,MAAM,CAAC,IAAI,KAAK,MAAM,CAAC,GAAG,CAAC;oBAC1C,MAAM,CAAC,KAAK,GAAG,MAAM,CAAC,IAAI,KAAK,MAAM,CAAC,GAAG,CAAC;gBAC5C,CAAC;YACH,CAAC;YAED,oCAAoC;YACpC,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,GAAG,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC;YAExD,2BAA2B;YAC3B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE,EAAE,MAAM,CAAC,CAAC;YAErC,2CAA2C;YAC3C,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;gBAClC,IAAI,CAAC,kBAAkB,EAAE,CAAC;YAC5B,CAAC;YAED,2BAA2B;YAC3B,IAAI,CAAC,kBAAkB,CAAC,EAAE,EAAE,MAAM,CAAC,CAAC;YAEpC,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,KAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,oCAAoC,EAAE,KAAM,KAAe,CAAC,OAAO,EAAE,EAAE;gBACzF,EAAE;gBACF,KAAK,EAAG,KAAe,CAAC,KAAK;aAC9B,CAAC,CAAC;YAEH,OAAO,IAAI,CAAC,iBAAiB,CAAC,EAAE,EAAG,KAAe,CAAC,OAAO,CAAC,CAAC;QAC9D,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,UAAU,CAAC,EAAU;QAIjC,IAAI,CAAC;YACH,mCAAmC;YACnC,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;YAEtC,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,UAAU,CACtC,IAAI,CAAC,OAAO,CAAC,YAAY,CAAC,GAAG,CAAC,KAAK,EAAE,MAAM,EAAE,EAAE;gBAC7C,IAAI,CAAC;oBACH,MAAM,YAAY,GAAG,GAAG,UAAU,IAAI,MAAM,EAAE,CAAC;oBAC/C,MAAM,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC;oBACjD,OAAO,MAAM,CAAC,CAAC,6BAA6B;gBAC9C,CAAC;gBAAC,OAAO,KAAc,EAAE,CAAC;oBACxB,IAAK,KAAa,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;wBACxC,OAAO,IAAI,CAAC,CAAC,iCAAiC;oBAChD,CAAC;oBACD,MAAM,KAAK,CAAC,CAAC,cAAc;gBAC7B,CAAC;YACH,CAAC,CAAC,CACH,CAAC;YAEF,+CAA+C;YAC/C,MAAM,KAAK,GAAG,OAAO;iBAClB,MAAM,CAAC,CAAC,MAAM,EAA4C,EAAE,CAC3D,MAAM,CAAC,MAAM,KAAK,WAAW,IAAI,MAAM,CAAC,KAAK,KAAK,IAAI,CACvD;iBACA,GAAG,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YAE/B,OAAO;gBACL,SAAS,EAAE,KAAK,CAAC,MAAM;gBACvB,KAAK;aACN,CAAC;QACJ,CAAC;QAAC,OAAO,KAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,4BAA4B,EAAE,KAAM,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;YACnF,OAAO;gBACL,SAAS,EAAE,CAAC;gBACZ,KAAK,EAAE,EAAE;aACV,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,SAAS,CAAC,EAAU;QAMhC,IAAI,CAAC;YACH,kEAAkE;YAClE,2DAA2D;YAE3D,mDAAmD;YACnD,MAAM,KAAK,GAAG,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;YAEhG,yCAAyC;YACzC,MAAM,KAAK,GAAG,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;YAEpE,2CAA2C;YAC3C,MAAM,OAAO,GAAG,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;YAEpE,oBAAoB;YACpB,IAAI,IAAI,GAAG,MAAM,CAAC,OAAO,CAAC;YAC1B,IAAI,KAAK,EAAE,CAAC;gBACV,IAAI,GAAG,MAAM,CAAC,GAAG,CAAC;YACpB,CAAC;iBAAM,IAAI,KAAK,EAAE,CAAC;gBACjB,IAAI,GAAG,MAAM,CAAC,GAAG,CAAC;YACpB,CAAC;iBAAM,IAAI,OAAO,EAAE,CAAC;gBACnB,IAAI,GAAG,MAAM,CAAC,KAAK,CAAC;YACtB,CAAC;iBAAM,CAAC;gBACN,uDAAuD;gBACvD,IACE,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,MAAM;oBAC9B,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,eAAe;oBACvC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,MAAM;oBAC9B,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,eAAe;oBACvC,EAAE,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,oBAAoB;kBAC1C,CAAC;oBACD,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC;gBAC3B,CAAC;qBAAM,CAAC;oBACN,IAAI,GAAG,MAAM,CAAC,WAAW,CAAC;gBAC5B,CAAC;YACH,CAAC;YAED,yBAAyB;YACzB,OAAO;gBACL,OAAO,EAAE,IAAI,CAAC,gBAAgB,CAAC,EAAE,CAAC,EAAE,4CAA4C;gBAChF,GAAG,EAAE,SAAS,EAAE,qCAAqC;gBACrD,GAAG,EAAE,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC,EAAE,sCAAsC;gBAClE,IAAI;aACL,CAAC;QACJ,CAAC;QAAC,OAAO,KAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,6BAA6B,EAAE,KAAM,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;YACpF,OAAO;gBACL,IAAI,EAAE,MAAM,CAAC,OAAO;aACrB,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,gBAAgB,CAAC,EAAU;QACjC,uCAAuC;QACvC,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC;YAAE,OAAO,IAAI,CAAC;QAC9D,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC;YAAE,OAAO,IAAI,CAAC;QAC9D,IAAI,EAAE,CAAC,UAAU,CAAC,MAAM,CAAC;YAAE,OAAO,IAAI,CAAC;QACvC,IAAI,EAAE,CAAC,UAAU,CAAC,MAAM,CAAC;YAAE,OAAO,IAAI,CAAC;QACvC,OAAO,IAAI,CAAC,CAAC,UAAU;IACzB,CAAC;IAED;;;;;OAKG;IACK,YAAY,CAAC,EAAU;QAC7B,uCAAuC;QACvC,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC;YAAE,OAAO,YAAY,CAAC;QACtE,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC;YAAE,OAAO,cAAc,CAAC;QACxE,IAAI,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC;YAAE,OAAO,SAAS,CAAC;QAChD,IAAI,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC;YAAE,OAAO,YAAY,CAAC;QAClD,IAAI,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC;YAAE,OAAO,eAAe,CAAC;QACtD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;OAIG;IACK,SAAS,CAAC,EAAU;QAC1B,OAAO,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IAC3C,CAAC;IAED;;;;;OAKG;IACK,iBAAiB,CAAC,EAAU,EAAE,YAAoB;QACxD,OAAO;YACL,KAAK,EAAE,EAAE,EAAE,2BAA2B;YACtC,MAAM,EAAE,KAAK;YACb,OAAO,EAAE,KAAK;YACd,KAAK,EAAE,KAAK;YACZ,KAAK,EAAE,KAAK;YACZ,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,KAAK,EAAE,YAAY;SACpB,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,EAAU;QACjC,qBAAqB;QACrB,MAAM,WAAW,GAAG,uFAAuF,CAAC;QAC5G,OAAO,WAAW,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACK,kBAAkB,CAAC,EAAU,EAAE,MAAyB;QAC9D,gDAAgD;QAChD,IAAI,QAAQ,GAAG,gBAAgB,CAAC,IAAI,CAAC;QACrC,IAAI,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC,OAAO,CAAC,iBAAiB,EAAE,CAAC;YAClD,QAAQ,GAAG,gBAAgB,CAAC,IAAI,CAAC;QACnC,CAAC;aAAM,IAAI,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC,OAAO,CAAC,mBAAmB,EAAE,CAAC;YAC3D,QAAQ,GAAG,gBAAgB,CAAC,IAAI,CAAC;QACnC,CAAC;QAED,gBAAgB;QAChB,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,QAAQ;YACf,IAAI,EAAE,iBAAiB,CAAC,aAAa;YACrC,OAAO,EAAE,uBAAuB,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC,WAAW,QAAQ,EAAE,EAAE;YACxF,SAAS,EAAE,EAAE;YACb,OAAO,EAAE;gBACP,KAAK,EAAE,MAAM,CAAC,KAAK;gBACnB,MAAM,EAAE,MAAM,CAAC,MAAM;gBACrB,OAAO,EAAE,MAAM,CAAC,OAAO;gBACvB,KAAK,EAAE,MAAM,CAAC,KAAK;gBACnB,KAAK,EAAE,MAAM,CAAC,KAAK;gBACnB,OAAO,EAAE,MAAM,CAAC,OAAO;gBACvB,UAAU,EAAE,MAAM,CAAC,UAAU;aAC9B;YACD,OAAO,EAAE,CAAC,MAAM,CAAC,MAAM;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,kBAAkB;QACxB,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,OAAO,CAAC,oBAAoB;QAC9B,CAAC;QACD,IAAI,CAAC,cAAc,GAAG,UAAU,CAAC,GAAG,EAAE;YACpC,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;YAC3B,IAAI,CAAC,SAAS,EAAE,CAAC,KAAK,CAAC,CAAC,KAAc,EAAE,EAAE;gBACxC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAwC,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;YACzF,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;IACjD,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,SAAS;QACrB,IAAI,CAAC;YACH,8CAA8C;YAC9C,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;gBAC9E,EAAE;gBACF,IAAI;aACL,CAAC,CAAC,CAAC;YAEJ,+BAA+B;YAC/B,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACzB,OAAO;YACT,CAAC;YAED,MAAM,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;YAE1C,uCAAuC;YACvC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;gBACxB,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,oCAAoC,EAAE,SAAS,CAAC,CAAC;gBAC/E,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,SAAS,OAAO,CAAC,MAAM,gDAAgD,CAAC,CAAC;YAC9F,CAAC;iBAAM,CAAC;gBACN,0BAA0B;gBAC1B,MAAM,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;gBAC9D,OAAO,CAAC,OAAO,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;gBAExC,MAAM,SAAS,GAAG,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,0BAA0B,CAAC,CAAC;gBAC1E,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;gBAE/C,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,SAAS,OAAO,CAAC,MAAM,sCAAsC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAAC,OAAO,KAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAwC,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;QACzF,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,SAAS;QACrB,IAAI,CAAC;YACH,IAAI,SAAS,GAAkB,IAAI,CAAC;YACpC,IAAI,cAAc,GAAG,KAAK,CAAC;YAE3B,yCAAyC;YACzC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;gBACxB,IAAI,CAAC;oBACH,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;oBAEhF,IAAI,CAAC,SAAS,EAAE,CAAC;wBACf,oDAAoD;wBACpD,MAAM,SAAS,GAAG,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,EAAE,UAAU,EAAE,0BAA0B,CAAC,CAAC;wBAE3F,IAAI,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;4BACrC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,iEAAiE,CAAC,CAAC;4BACtF,SAAS,GAAG,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;4BACvD,cAAc,GAAG,IAAI,CAAC;4BAEtB,6BAA6B;4BAC7B,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,oCAAoC,EAAE,SAAS,CAAC,CAAC;4BAC/E,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6DAA6D,CAAC,CAAC;4BAElF,4DAA4D;4BAC5D,IAAI,CAAC;gCACH,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC;gCACjC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,wCAAwC,CAAC,CAAC;4BAC/D,CAAC;4BAAC,OAAO,WAAW,EAAE,CAAC;gCACrB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oCAAqC,WAAqB,CAAC,OAAO,EAAE,CAAC,CAAC;4BAC3F,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAc,EAAE,CAAC;oBACxB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,sCAAuC,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;gBACxF,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,2CAA2C;gBAC3C,MAAM,SAAS,GAAG,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,EAAE,UAAU,EAAE,0BAA0B,CAAC,CAAC;gBAE3F,IAAI,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;oBACrC,SAAS,GAAG,OAAO,CAAC,EAAE,CAAC,YAAY,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;oBACvD,cAAc,GAAG,IAAI,CAAC;gBACxB,CAAC;YACH,CAAC;YAED,4CAA4C;YAC5C,IAAI,SAAS,EAAE,CAAC;gBACd,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;gBAEtC,8BAA8B;gBAC9B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACvB,MAAM,YAAY,GAAG,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE;oBAC1C,MAAM,GAAG,GAAG,GAAG,GAAG,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC;oBACvC,OAAO,GAAG,GAAG,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,yCAAyC;gBAC/E,CAAC,CAAC,CAAC;gBAEH,gBAAgB;gBAChB,KAAK,MAAM,KAAK,IAAI,YAAY,EAAE,CAAC;oBACjC,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,KAAK,CAAC,EAAE,EAAE,KAAK,CAAC,IAAI,CAAC,CAAC;gBACjD,CAAC;gBAED,MAAM,MAAM,GAAG,cAAc,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,gBAAgB,CAAC;gBAC1D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,YAAY,CAAC,MAAM,qCAAqC,MAAM,EAAE,CAAC,CAAC;YACjG,CAAC;QACH,CAAC;QAAC,OAAO,KAAc,EAAE,CAAC;YACxB,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,uCAAwC,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;QACzF,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,YAAY,CAAC,KAAa;QACtC,IAAI,KAAK,GAAG,mBAAmB,CAAC,SAAS,EAAE,CAAC;YAC1C,OAAO,MAAM,CAAC;QAChB,CAAC;aAAM,IAAI,KAAK,GAAG,mBAAmB,CAAC,WAAW,EAAE,CAAC;YACnD,OAAO,QAAQ,CAAC;QAClB,CAAC;aAAM,IAAI,KAAK,GAAG,mBAAmB,CAAC,QAAQ,EAAE,CAAC;YAChD,OAAO,KAAK,CAAC;QACf,CAAC;aAAM,CAAC;YACN,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,oBAAoB,CAAC,cAAmB;QAC7C,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QACrC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6CAA6C,CAAC,CAAC;QAElE,gFAAgF;QAChF,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,IAAI,IAAI,CAAC,eAAe,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACnE,IAAI,CAAC,SAAS,EAAE,CAAC,KAAK,CAAC,CAAC,KAAc,EAAE,EAAE;gBACxC,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,gDAAiD,KAAe,CAAC,OAAO,EAAE,CAAC,CAAC;YAClG,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC"}