@serve.zone/dcrouter 5.0.2 → 5.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (207) hide show
  1. package/dist_serve/bundle.js +30539 -0
  2. package/dist_serve/bundle.js.map +7 -0
  3. package/dist_serve/index.html +1 -0
  4. package/dist_ts/00_commitinfo_data.d.ts +8 -0
  5. package/dist_ts/00_commitinfo_data.js +9 -0
  6. package/dist_ts/cache/classes.cache.cleaner.d.ts +47 -0
  7. package/dist_ts/cache/classes.cache.cleaner.js +130 -0
  8. package/dist_ts/cache/classes.cached.document.d.ts +76 -0
  9. package/dist_ts/cache/classes.cached.document.js +100 -0
  10. package/dist_ts/cache/classes.cachedb.d.ts +60 -0
  11. package/dist_ts/cache/classes.cachedb.js +126 -0
  12. package/dist_ts/cache/documents/classes.cached.email.d.ts +125 -0
  13. package/dist_ts/cache/documents/classes.cached.email.js +337 -0
  14. package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +119 -0
  15. package/dist_ts/cache/documents/classes.cached.ip.reputation.js +323 -0
  16. package/dist_ts/cache/documents/index.d.ts +2 -0
  17. package/dist_ts/cache/documents/index.js +3 -0
  18. package/dist_ts/cache/index.d.ts +4 -0
  19. package/dist_ts/cache/index.js +7 -0
  20. package/dist_ts/classes.dcrouter.d.ts +276 -0
  21. package/dist_ts/classes.dcrouter.js +1033 -0
  22. package/dist_ts/config/index.d.ts +1 -0
  23. package/dist_ts/config/index.js +3 -0
  24. package/dist_ts/config/validator.d.ts +104 -0
  25. package/dist_ts/config/validator.js +152 -0
  26. package/dist_ts/errors/base.errors.d.ts +224 -0
  27. package/dist_ts/errors/base.errors.js +320 -0
  28. package/dist_ts/errors/error-handler.d.ts +98 -0
  29. package/dist_ts/errors/error-handler.js +282 -0
  30. package/dist_ts/errors/error.codes.d.ts +115 -0
  31. package/dist_ts/errors/error.codes.js +136 -0
  32. package/dist_ts/errors/index.d.ts +54 -0
  33. package/dist_ts/errors/index.js +136 -0
  34. package/dist_ts/errors/reputation.errors.d.ts +183 -0
  35. package/dist_ts/errors/reputation.errors.js +292 -0
  36. package/dist_ts/index.d.ts +6 -0
  37. package/dist_ts/index.js +9 -0
  38. package/dist_ts/logger.d.ts +17 -0
  39. package/dist_ts/logger.js +76 -0
  40. package/dist_ts/monitoring/classes.metricscache.d.ts +32 -0
  41. package/dist_ts/monitoring/classes.metricscache.js +63 -0
  42. package/dist_ts/monitoring/classes.metricsmanager.d.ts +112 -0
  43. package/dist_ts/monitoring/classes.metricsmanager.js +446 -0
  44. package/dist_ts/monitoring/index.d.ts +1 -0
  45. package/dist_ts/monitoring/index.js +2 -0
  46. package/dist_ts/opsserver/classes.opsserver.d.ts +22 -0
  47. package/dist_ts/opsserver/classes.opsserver.js +56 -0
  48. package/dist_ts/opsserver/handlers/admin.handler.d.ts +31 -0
  49. package/dist_ts/opsserver/handlers/admin.handler.js +180 -0
  50. package/dist_ts/opsserver/handlers/config.handler.d.ts +9 -0
  51. package/dist_ts/opsserver/handlers/config.handler.js +67 -0
  52. package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +12 -0
  53. package/dist_ts/opsserver/handlers/email-ops.handler.js +219 -0
  54. package/dist_ts/opsserver/handlers/index.d.ts +7 -0
  55. package/dist_ts/opsserver/handlers/index.js +8 -0
  56. package/dist_ts/opsserver/handlers/logs.handler.d.ts +10 -0
  57. package/dist_ts/opsserver/handlers/logs.handler.js +122 -0
  58. package/dist_ts/opsserver/handlers/radius.handler.d.ts +8 -0
  59. package/dist_ts/opsserver/handlers/radius.handler.js +296 -0
  60. package/dist_ts/opsserver/handlers/security.handler.d.ts +11 -0
  61. package/dist_ts/opsserver/handlers/security.handler.js +217 -0
  62. package/dist_ts/opsserver/handlers/stats.handler.d.ts +13 -0
  63. package/dist_ts/opsserver/handlers/stats.handler.js +366 -0
  64. package/dist_ts/opsserver/helpers/guards.d.ts +25 -0
  65. package/dist_ts/opsserver/helpers/guards.js +41 -0
  66. package/dist_ts/opsserver/index.d.ts +1 -0
  67. package/dist_ts/opsserver/index.js +2 -0
  68. package/dist_ts/paths.d.ts +16 -0
  69. package/dist_ts/paths.js +43 -0
  70. package/dist_ts/plugins.d.ts +78 -0
  71. package/dist_ts/plugins.js +112 -0
  72. package/dist_ts/radius/classes.accounting.manager.d.ts +218 -0
  73. package/dist_ts/radius/classes.accounting.manager.js +417 -0
  74. package/dist_ts/radius/classes.radius.server.d.ts +171 -0
  75. package/dist_ts/radius/classes.radius.server.js +385 -0
  76. package/dist_ts/radius/classes.vlan.manager.d.ts +128 -0
  77. package/dist_ts/radius/classes.vlan.manager.js +272 -0
  78. package/dist_ts/radius/index.d.ts +13 -0
  79. package/dist_ts/radius/index.js +14 -0
  80. package/dist_ts/security/classes.contentscanner.d.ts +160 -0
  81. package/dist_ts/security/classes.contentscanner.js +637 -0
  82. package/dist_ts/security/classes.ipreputationchecker.d.ts +150 -0
  83. package/dist_ts/security/classes.ipreputationchecker.js +512 -0
  84. package/dist_ts/security/classes.securitylogger.d.ts +140 -0
  85. package/dist_ts/security/classes.securitylogger.js +235 -0
  86. package/dist_ts/security/index.d.ts +3 -0
  87. package/dist_ts/security/index.js +4 -0
  88. package/dist_ts/sms/classes.smsservice.d.ts +15 -0
  89. package/dist_ts/sms/classes.smsservice.js +72 -0
  90. package/dist_ts/sms/config/sms.config.d.ts +93 -0
  91. package/dist_ts/sms/config/sms.config.js +2 -0
  92. package/dist_ts/sms/config/sms.schema.d.ts +5 -0
  93. package/dist_ts/sms/config/sms.schema.js +121 -0
  94. package/dist_ts/sms/index.d.ts +1 -0
  95. package/dist_ts/sms/index.js +2 -0
  96. package/dist_ts/storage/classes.storagemanager.d.ts +82 -0
  97. package/dist_ts/storage/classes.storagemanager.js +344 -0
  98. package/dist_ts/storage/index.d.ts +1 -0
  99. package/dist_ts/storage/index.js +3 -0
  100. package/dist_ts_interfaces/data/auth.d.ts +8 -0
  101. package/dist_ts_interfaces/data/auth.js +2 -0
  102. package/dist_ts_interfaces/data/index.d.ts +2 -0
  103. package/dist_ts_interfaces/data/index.js +3 -0
  104. package/dist_ts_interfaces/data/stats.d.ts +120 -0
  105. package/dist_ts_interfaces/data/stats.js +2 -0
  106. package/{ts_interfaces/index.ts → dist_ts_interfaces/index.d.ts} +1 -5
  107. package/dist_ts_interfaces/index.js +8 -0
  108. package/{ts_interfaces/plugins.ts → dist_ts_interfaces/plugins.d.ts} +1 -5
  109. package/dist_ts_interfaces/plugins.js +4 -0
  110. package/dist_ts_interfaces/requests/admin.d.ts +31 -0
  111. package/dist_ts_interfaces/requests/admin.js +3 -0
  112. package/dist_ts_interfaces/requests/combined.stats.d.ts +24 -0
  113. package/dist_ts_interfaces/requests/combined.stats.js +2 -0
  114. package/dist_ts_interfaces/requests/config.d.ts +13 -0
  115. package/dist_ts_interfaces/requests/config.js +3 -0
  116. package/dist_ts_interfaces/requests/email-ops.d.ts +139 -0
  117. package/dist_ts_interfaces/requests/email-ops.js +3 -0
  118. package/{ts_interfaces/requests/index.ts → dist_ts_interfaces/requests/index.d.ts} +1 -1
  119. package/dist_ts_interfaces/requests/index.js +8 -0
  120. package/dist_ts_interfaces/requests/logs.d.ts +34 -0
  121. package/dist_ts_interfaces/requests/logs.js +4 -0
  122. package/dist_ts_interfaces/requests/radius.d.ts +268 -0
  123. package/dist_ts_interfaces/requests/radius.js +3 -0
  124. package/dist_ts_interfaces/requests/stats.d.ts +131 -0
  125. package/dist_ts_interfaces/requests/stats.js +4 -0
  126. package/dist_ts_web/00_commitinfo_data.d.ts +8 -0
  127. package/dist_ts_web/00_commitinfo_data.js +9 -0
  128. package/dist_ts_web/appstate.d.ts +96 -0
  129. package/dist_ts_web/appstate.js +587 -0
  130. package/dist_ts_web/elements/index.d.ts +8 -0
  131. package/dist_ts_web/elements/index.js +9 -0
  132. package/dist_ts_web/elements/ops-dashboard.d.ts +23 -0
  133. package/dist_ts_web/elements/ops-dashboard.js +271 -0
  134. package/dist_ts_web/elements/ops-view-config.d.ts +17 -0
  135. package/dist_ts_web/elements/ops-view-config.js +414 -0
  136. package/dist_ts_web/elements/ops-view-emails.d.ts +44 -0
  137. package/dist_ts_web/elements/ops-view-emails.js +880 -0
  138. package/dist_ts_web/elements/ops-view-logs.d.ts +13 -0
  139. package/dist_ts_web/elements/ops-view-logs.js +249 -0
  140. package/dist_ts_web/elements/ops-view-network.d.ts +65 -0
  141. package/dist_ts_web/elements/ops-view-network.js +579 -0
  142. package/dist_ts_web/elements/ops-view-overview.d.ts +14 -0
  143. package/dist_ts_web/elements/ops-view-overview.js +344 -0
  144. package/dist_ts_web/elements/ops-view-security.d.ts +21 -0
  145. package/dist_ts_web/elements/ops-view-security.js +568 -0
  146. package/dist_ts_web/elements/shared/css.d.ts +1 -0
  147. package/dist_ts_web/elements/shared/css.js +10 -0
  148. package/dist_ts_web/elements/shared/index.d.ts +2 -0
  149. package/dist_ts_web/elements/shared/index.js +3 -0
  150. package/dist_ts_web/elements/shared/ops-sectionheading.d.ts +5 -0
  151. package/dist_ts_web/elements/shared/ops-sectionheading.js +82 -0
  152. package/dist_ts_web/index.d.ts +1 -0
  153. package/dist_ts_web/index.js +10 -0
  154. package/dist_ts_web/plugins.d.ts +4 -0
  155. package/dist_ts_web/plugins.js +7 -0
  156. package/dist_ts_web/router.d.ts +25 -0
  157. package/dist_ts_web/router.js +165 -0
  158. package/package.json +22 -18
  159. package/readme.hints.md +3 -3
  160. package/readme.md +3 -3
  161. package/ts/00_commitinfo_data.ts +1 -1
  162. package/ts/cache/classes.cachedb.ts +3 -2
  163. package/ts/classes.dcrouter.ts +2 -2
  164. package/ts/paths.ts +11 -5
  165. package/ts_web/00_commitinfo_data.ts +1 -1
  166. package/.dockerignore +0 -1
  167. package/.gitea/workflows/docker_nottags.yaml +0 -71
  168. package/.gitea/workflows/docker_tags.yaml +0 -106
  169. package/.playwright-mcp/dcrouter-scrollbar-issue.png +0 -0
  170. package/.playwright-mcp/page-2026-02-01T23-10-23-737Z.png +0 -0
  171. package/.playwright-mcp/page-2026-02-01T23-11-19-449Z.png +0 -0
  172. package/.playwright-mcp/page-2026-02-01T23-12-03-126Z.png +0 -0
  173. package/.playwright-mcp/page-2026-02-01T23-12-15-576Z.png +0 -0
  174. package/.vscode/launch.json +0 -11
  175. package/.vscode/settings.json +0 -26
  176. package/Dockerfile +0 -46
  177. package/changelog.md +0 -350
  178. package/cli.child.js +0 -4
  179. package/cli.child.ts +0 -4
  180. package/cli.ts.js +0 -5
  181. package/html/index.html +0 -121
  182. package/test/readme.md +0 -443
  183. package/test/test.config.md +0 -175
  184. package/test/test.contentscanner.ts +0 -265
  185. package/test/test.dcrouter.email.ts +0 -159
  186. package/test/test.dns-server-config.ts +0 -140
  187. package/test/test.dns-socket-handler.ts +0 -148
  188. package/test/test.errors.ts +0 -274
  189. package/test/test.ipreputationchecker.ts +0 -179
  190. package/test/test.jwt-auth.ts +0 -131
  191. package/test/test.opsserver-api.ts +0 -84
  192. package/test/test.protected-endpoint.ts +0 -120
  193. package/test/test.storagemanager.ts +0 -289
  194. package/test_watch/devserver.ts +0 -35
  195. package/ts_interfaces/data/auth.ts +0 -8
  196. package/ts_interfaces/data/index.ts +0 -2
  197. package/ts_interfaces/data/stats.ts +0 -131
  198. package/ts_interfaces/readme.md +0 -205
  199. package/ts_interfaces/requests/admin.ts +0 -46
  200. package/ts_interfaces/requests/combined.stats.ts +0 -25
  201. package/ts_interfaces/requests/config.ts +0 -18
  202. package/ts_interfaces/requests/email-ops.ts +0 -239
  203. package/ts_interfaces/requests/logs.ts +0 -44
  204. package/ts_interfaces/requests/radius.ts +0 -329
  205. package/ts_interfaces/requests/stats.ts +0 -162
  206. package/ts_interfaces/tspublish.json +0 -3
  207. package/tsconfig.json +0 -12
@@ -0,0 +1,637 @@
1
+ import * as plugins from '../plugins.js';
2
+ import * as paths from '../paths.js';
3
+ import { logger } from '../logger.js';
4
+ import { Email } from '@push.rocks/smartmta';
5
+ import { SecurityLogger, SecurityLogLevel, SecurityEventType } from './classes.securitylogger.js';
6
+ import { LRUCache } from 'lru-cache';
7
+ /**
8
+ * Threat categories
9
+ */
10
+ export var ThreatCategory;
11
+ (function (ThreatCategory) {
12
+ ThreatCategory["SPAM"] = "spam";
13
+ ThreatCategory["PHISHING"] = "phishing";
14
+ ThreatCategory["MALWARE"] = "malware";
15
+ ThreatCategory["EXECUTABLE"] = "executable";
16
+ ThreatCategory["SUSPICIOUS_LINK"] = "suspicious_link";
17
+ ThreatCategory["MALICIOUS_MACRO"] = "malicious_macro";
18
+ ThreatCategory["XSS"] = "xss";
19
+ ThreatCategory["SENSITIVE_DATA"] = "sensitive_data";
20
+ ThreatCategory["BLACKLISTED_CONTENT"] = "blacklisted_content";
21
+ ThreatCategory["CUSTOM_RULE"] = "custom_rule";
22
+ })(ThreatCategory || (ThreatCategory = {}));
23
+ /**
24
+ * Content Scanner for detecting malicious email content
25
+ */
26
+ export class ContentScanner {
27
+ static instance;
28
+ scanCache;
29
+ options;
30
+ // Predefined patterns for common threats
31
+ static MALICIOUS_PATTERNS = {
32
+ // Phishing patterns
33
+ phishing: [
34
+ /(?:verify|confirm|update|login).*(?:account|password|details)/i,
35
+ /urgent.*(?:action|attention|required)/i,
36
+ /(?:paypal|apple|microsoft|amazon|google|bank).*(?:verify|confirm|suspend)/i,
37
+ /your.*(?:account).*(?:suspended|compromised|locked)/i,
38
+ /\b(?:password reset|security alert|security notice)\b/i
39
+ ],
40
+ // Spam indicators
41
+ spam: [
42
+ /\b(?:viagra|cialis|enlargement|diet pill|lose weight fast|cheap meds)\b/i,
43
+ /\b(?:million dollars|lottery winner|prize claim|inheritance|rich widow)\b/i,
44
+ /\b(?:earn from home|make money fast|earn \$\d{3,}\/day)\b/i,
45
+ /\b(?:limited time offer|act now|exclusive deal|only \d+ left)\b/i,
46
+ /\b(?:forex|stock tip|investment opportunity|cryptocurrency|bitcoin)\b/i
47
+ ],
48
+ // Malware indicators in text
49
+ malware: [
50
+ /(?:attached file|see attachment).*(?:invoice|receipt|statement|document)/i,
51
+ /open.*(?:the attached|this attachment)/i,
52
+ /(?:enable|allow).*(?:macros|content|editing)/i,
53
+ /download.*(?:attachment|file|document)/i,
54
+ /\b(?:ransomware protection|virus alert|malware detected)\b/i
55
+ ],
56
+ // Suspicious links
57
+ suspiciousLinks: [
58
+ /https?:\/\/bit\.ly\//i,
59
+ /https?:\/\/goo\.gl\//i,
60
+ /https?:\/\/t\.co\//i,
61
+ /https?:\/\/tinyurl\.com\//i,
62
+ /https?:\/\/(?:\d{1,3}\.){3}\d{1,3}/i, // IP address URLs
63
+ /https?:\/\/.*\.(?:xyz|top|club|gq|cf)\//i, // Suspicious TLDs
64
+ /(?:login|account|signin|auth).*\.(?!gov|edu|com|org|net)\w+\.\w+/i, // Login pages on unusual domains
65
+ ],
66
+ // XSS and script injection
67
+ scriptInjection: [
68
+ /<script.*>.*<\/script>/is,
69
+ /javascript:/i,
70
+ /on(?:click|load|mouse|error|focus|blur)=".*"/i,
71
+ /document\.(?:cookie|write|location)/i,
72
+ /eval\s*\(/i
73
+ ],
74
+ // Sensitive data patterns
75
+ sensitiveData: [
76
+ /\b(?:\d{3}-\d{2}-\d{4}|\d{9})\b/, // SSN
77
+ /\b\d{13,16}\b/, // Credit card numbers
78
+ /\b(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=|[A-Za-z0-9+/]{4})\b/ // Possible Base64
79
+ ]
80
+ };
81
+ // Common executable extensions
82
+ static EXECUTABLE_EXTENSIONS = [
83
+ '.exe', '.dll', '.bat', '.cmd', '.msi', '.js', '.vbs', '.ps1',
84
+ '.sh', '.jar', '.py', '.com', '.scr', '.pif', '.hta', '.cpl',
85
+ '.reg', '.vba', '.lnk', '.wsf', '.msi', '.msp', '.mst'
86
+ ];
87
+ // Document formats that may contain macros
88
+ static MACRO_DOCUMENT_EXTENSIONS = [
89
+ '.doc', '.docm', '.xls', '.xlsm', '.ppt', '.pptm', '.dotm', '.xlsb', '.ppam', '.potm'
90
+ ];
91
+ /**
92
+ * Default options for the content scanner
93
+ */
94
+ static DEFAULT_OPTIONS = {
95
+ maxCacheSize: 10000,
96
+ cacheTTL: 24 * 60 * 60 * 1000, // 24 hours
97
+ scanSubject: true,
98
+ scanBody: true,
99
+ scanAttachments: true,
100
+ maxAttachmentSizeToScan: 10 * 1024 * 1024, // 10MB
101
+ scanAttachmentNames: true,
102
+ blockExecutables: true,
103
+ blockMacros: true,
104
+ customRules: [],
105
+ minThreatScore: 30, // Minimum score to consider content as a threat
106
+ highThreatScore: 70 // Score above which content is considered high threat
107
+ };
108
+ /**
109
+ * Constructor for the ContentScanner
110
+ * @param options Configuration options
111
+ */
112
+ constructor(options = {}) {
113
+ // Merge with default options
114
+ this.options = {
115
+ ...ContentScanner.DEFAULT_OPTIONS,
116
+ ...options
117
+ };
118
+ // Initialize cache
119
+ this.scanCache = new LRUCache({
120
+ max: this.options.maxCacheSize,
121
+ ttl: this.options.cacheTTL,
122
+ });
123
+ logger.log('info', 'ContentScanner initialized');
124
+ }
125
+ /**
126
+ * Get the singleton instance of the scanner
127
+ * @param options Configuration options
128
+ * @returns Singleton scanner instance
129
+ */
130
+ static getInstance(options = {}) {
131
+ if (!ContentScanner.instance) {
132
+ ContentScanner.instance = new ContentScanner(options);
133
+ }
134
+ return ContentScanner.instance;
135
+ }
136
+ /**
137
+ * Scan an email for malicious content
138
+ * @param email The email to scan
139
+ * @returns Scan result
140
+ */
141
+ async scanEmail(email) {
142
+ try {
143
+ // Generate a cache key from the email
144
+ const cacheKey = this.generateCacheKey(email);
145
+ // Check cache first
146
+ const cachedResult = this.scanCache.get(cacheKey);
147
+ if (cachedResult) {
148
+ logger.log('info', `Using cached scan result for email ${email.getMessageId()}`);
149
+ return cachedResult;
150
+ }
151
+ // Initialize scan result
152
+ const result = {
153
+ isClean: true,
154
+ threatScore: 0,
155
+ scannedElements: [],
156
+ timestamp: Date.now()
157
+ };
158
+ // List of scan promises
159
+ const scanPromises = [];
160
+ // Scan subject
161
+ if (this.options.scanSubject && email.subject) {
162
+ scanPromises.push(this.scanSubject(email.subject, result));
163
+ }
164
+ // Scan body content
165
+ if (this.options.scanBody) {
166
+ if (email.text) {
167
+ scanPromises.push(this.scanTextContent(email.text, result));
168
+ }
169
+ if (email.html) {
170
+ scanPromises.push(this.scanHtmlContent(email.html, result));
171
+ }
172
+ }
173
+ // Scan attachments
174
+ if (this.options.scanAttachments && email.attachments && email.attachments.length > 0) {
175
+ for (const attachment of email.attachments) {
176
+ scanPromises.push(this.scanAttachment(attachment, result));
177
+ }
178
+ }
179
+ // Run all scans in parallel
180
+ await Promise.all(scanPromises);
181
+ // Determine if the email is clean based on threat score
182
+ result.isClean = result.threatScore < this.options.minThreatScore;
183
+ // Save to cache
184
+ this.scanCache.set(cacheKey, result);
185
+ // Log high threat findings
186
+ if (result.threatScore >= this.options.highThreatScore) {
187
+ this.logHighThreatFound(email, result);
188
+ }
189
+ else if (!result.isClean) {
190
+ this.logThreatFound(email, result);
191
+ }
192
+ return result;
193
+ }
194
+ catch (error) {
195
+ logger.log('error', `Error scanning email: ${error.message}`, {
196
+ messageId: email.getMessageId(),
197
+ error: error.stack
198
+ });
199
+ // Return a safe default with error indication
200
+ return {
201
+ isClean: true, // Let it pass if scanner fails (configure as desired)
202
+ threatScore: 0,
203
+ scannedElements: ['error'],
204
+ timestamp: Date.now(),
205
+ threatType: 'scan_error',
206
+ threatDetails: `Scan error: ${error.message}`
207
+ };
208
+ }
209
+ }
210
+ /**
211
+ * Generate a cache key from an email
212
+ * @param email The email to generate a key for
213
+ * @returns Cache key
214
+ */
215
+ generateCacheKey(email) {
216
+ // Use message ID if available
217
+ if (email.getMessageId()) {
218
+ return `email:${email.getMessageId()}`;
219
+ }
220
+ // Fallback to a hash of key content
221
+ const contentToHash = [
222
+ email.from,
223
+ email.subject || '',
224
+ email.text?.substring(0, 1000) || '',
225
+ email.html?.substring(0, 1000) || '',
226
+ email.attachments?.length || 0
227
+ ].join(':');
228
+ return `email:${plugins.crypto.createHash('sha256').update(contentToHash).digest('hex')}`;
229
+ }
230
+ /**
231
+ * Scan email subject for threats
232
+ * @param subject The subject to scan
233
+ * @param result The scan result to update
234
+ */
235
+ async scanSubject(subject, result) {
236
+ result.scannedElements.push('subject');
237
+ // Check against phishing patterns
238
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.phishing) {
239
+ if (pattern.test(subject)) {
240
+ result.threatScore += 25;
241
+ result.threatType = ThreatCategory.PHISHING;
242
+ result.threatDetails = `Subject contains potential phishing indicators: ${subject}`;
243
+ return;
244
+ }
245
+ }
246
+ // Check against spam patterns
247
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.spam) {
248
+ if (pattern.test(subject)) {
249
+ result.threatScore += 15;
250
+ result.threatType = ThreatCategory.SPAM;
251
+ result.threatDetails = `Subject contains potential spam indicators: ${subject}`;
252
+ return;
253
+ }
254
+ }
255
+ // Check custom rules
256
+ for (const rule of this.options.customRules) {
257
+ const pattern = rule.pattern instanceof RegExp ? rule.pattern : new RegExp(rule.pattern, 'i');
258
+ if (pattern.test(subject)) {
259
+ result.threatScore += rule.score;
260
+ result.threatType = rule.type;
261
+ result.threatDetails = rule.description;
262
+ return;
263
+ }
264
+ }
265
+ }
266
+ /**
267
+ * Scan plain text content for threats
268
+ * @param text The text content to scan
269
+ * @param result The scan result to update
270
+ */
271
+ async scanTextContent(text, result) {
272
+ result.scannedElements.push('text');
273
+ // Check suspicious links
274
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.suspiciousLinks) {
275
+ if (pattern.test(text)) {
276
+ result.threatScore += 20;
277
+ if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SUSPICIOUS_LINK ? 0 : 20)) {
278
+ result.threatType = ThreatCategory.SUSPICIOUS_LINK;
279
+ result.threatDetails = `Text contains suspicious links`;
280
+ }
281
+ }
282
+ }
283
+ // Check phishing
284
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.phishing) {
285
+ if (pattern.test(text)) {
286
+ result.threatScore += 25;
287
+ if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.PHISHING ? 0 : 25)) {
288
+ result.threatType = ThreatCategory.PHISHING;
289
+ result.threatDetails = `Text contains potential phishing indicators`;
290
+ }
291
+ }
292
+ }
293
+ // Check spam
294
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.spam) {
295
+ if (pattern.test(text)) {
296
+ result.threatScore += 15;
297
+ if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SPAM ? 0 : 15)) {
298
+ result.threatType = ThreatCategory.SPAM;
299
+ result.threatDetails = `Text contains potential spam indicators`;
300
+ }
301
+ }
302
+ }
303
+ // Check malware indicators
304
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.malware) {
305
+ if (pattern.test(text)) {
306
+ result.threatScore += 30;
307
+ if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.MALWARE ? 0 : 30)) {
308
+ result.threatType = ThreatCategory.MALWARE;
309
+ result.threatDetails = `Text contains potential malware indicators`;
310
+ }
311
+ }
312
+ }
313
+ // Check sensitive data
314
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.sensitiveData) {
315
+ if (pattern.test(text)) {
316
+ result.threatScore += 25;
317
+ if (!result.threatType || result.threatScore > (result.threatType === ThreatCategory.SENSITIVE_DATA ? 0 : 25)) {
318
+ result.threatType = ThreatCategory.SENSITIVE_DATA;
319
+ result.threatDetails = `Text contains potentially sensitive data patterns`;
320
+ }
321
+ }
322
+ }
323
+ // Check custom rules
324
+ for (const rule of this.options.customRules) {
325
+ const pattern = rule.pattern instanceof RegExp ? rule.pattern : new RegExp(rule.pattern, 'i');
326
+ if (pattern.test(text)) {
327
+ result.threatScore += rule.score;
328
+ if (!result.threatType || result.threatScore > 20) {
329
+ result.threatType = rule.type;
330
+ result.threatDetails = rule.description;
331
+ }
332
+ }
333
+ }
334
+ }
335
+ /**
336
+ * Scan HTML content for threats
337
+ * @param html The HTML content to scan
338
+ * @param result The scan result to update
339
+ */
340
+ async scanHtmlContent(html, result) {
341
+ result.scannedElements.push('html');
342
+ // Check for script injection
343
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.scriptInjection) {
344
+ if (pattern.test(html)) {
345
+ result.threatScore += 40;
346
+ if (!result.threatType || result.threatType !== ThreatCategory.XSS) {
347
+ result.threatType = ThreatCategory.XSS;
348
+ result.threatDetails = `HTML contains potentially malicious script content`;
349
+ }
350
+ }
351
+ }
352
+ // Extract text content from HTML for further scanning
353
+ const textContent = this.extractTextFromHtml(html);
354
+ if (textContent) {
355
+ // We'll leverage the text scanning but not double-count threat score
356
+ const tempResult = {
357
+ isClean: true,
358
+ threatScore: 0,
359
+ scannedElements: [],
360
+ timestamp: Date.now()
361
+ };
362
+ await this.scanTextContent(textContent, tempResult);
363
+ // Only add additional threat types if they're more severe
364
+ if (tempResult.threatType && tempResult.threatScore > 0) {
365
+ // Add half of the text content score to avoid double counting
366
+ result.threatScore += Math.floor(tempResult.threatScore / 2);
367
+ // Adopt the threat type if more severe or no existing type
368
+ if (!result.threatType || tempResult.threatScore > result.threatScore) {
369
+ result.threatType = tempResult.threatType;
370
+ result.threatDetails = tempResult.threatDetails;
371
+ }
372
+ }
373
+ }
374
+ // Extract and check links from HTML
375
+ const links = this.extractLinksFromHtml(html);
376
+ if (links.length > 0) {
377
+ // Check for suspicious links
378
+ let suspiciousLinks = 0;
379
+ for (const link of links) {
380
+ for (const pattern of ContentScanner.MALICIOUS_PATTERNS.suspiciousLinks) {
381
+ if (pattern.test(link)) {
382
+ suspiciousLinks++;
383
+ break;
384
+ }
385
+ }
386
+ }
387
+ if (suspiciousLinks > 0) {
388
+ // Add score based on percentage of suspicious links
389
+ const suspiciousPercentage = (suspiciousLinks / links.length) * 100;
390
+ const additionalScore = Math.min(40, Math.floor(suspiciousPercentage / 2.5));
391
+ result.threatScore += additionalScore;
392
+ if (!result.threatType || additionalScore > 20) {
393
+ result.threatType = ThreatCategory.SUSPICIOUS_LINK;
394
+ result.threatDetails = `HTML contains ${suspiciousLinks} suspicious links out of ${links.length} total links`;
395
+ }
396
+ }
397
+ }
398
+ }
399
+ /**
400
+ * Scan an attachment for threats
401
+ * @param attachment The attachment to scan
402
+ * @param result The scan result to update
403
+ */
404
+ async scanAttachment(attachment, result) {
405
+ const filename = attachment.filename.toLowerCase();
406
+ result.scannedElements.push(`attachment:${filename}`);
407
+ // Skip large attachments if configured
408
+ if (attachment.content && attachment.content.length > this.options.maxAttachmentSizeToScan) {
409
+ logger.log('info', `Skipping scan of large attachment: ${filename} (${attachment.content.length} bytes)`);
410
+ return;
411
+ }
412
+ // Check filename for executable extensions
413
+ if (this.options.blockExecutables) {
414
+ for (const ext of ContentScanner.EXECUTABLE_EXTENSIONS) {
415
+ if (filename.endsWith(ext)) {
416
+ result.threatScore += 70; // High score for executable attachments
417
+ result.threatType = ThreatCategory.EXECUTABLE;
418
+ result.threatDetails = `Attachment has a potentially dangerous extension: ${filename}`;
419
+ return; // No need to scan contents if filename already flagged
420
+ }
421
+ }
422
+ }
423
+ // Check for Office documents with macros
424
+ if (this.options.blockMacros) {
425
+ for (const ext of ContentScanner.MACRO_DOCUMENT_EXTENSIONS) {
426
+ if (filename.endsWith(ext)) {
427
+ // For Office documents, check if they contain macros
428
+ // This is a simplified check - a real implementation would use specialized libraries
429
+ // to detect macros in Office documents
430
+ if (attachment.content && this.likelyContainsMacros(attachment)) {
431
+ result.threatScore += 60;
432
+ result.threatType = ThreatCategory.MALICIOUS_MACRO;
433
+ result.threatDetails = `Attachment appears to contain macros: ${filename}`;
434
+ return;
435
+ }
436
+ }
437
+ }
438
+ }
439
+ // Perform basic content analysis if we have content buffer
440
+ if (attachment.content) {
441
+ // Convert to string for scanning, with a limit to prevent memory issues
442
+ const textContent = this.extractTextFromBuffer(attachment.content);
443
+ if (textContent) {
444
+ // Scan for malicious patterns in attachment content
445
+ for (const category in ContentScanner.MALICIOUS_PATTERNS) {
446
+ const patterns = ContentScanner.MALICIOUS_PATTERNS[category];
447
+ for (const pattern of patterns) {
448
+ if (pattern.test(textContent)) {
449
+ result.threatScore += 30;
450
+ if (!result.threatType) {
451
+ result.threatType = this.mapCategoryToThreatType(category);
452
+ result.threatDetails = `Attachment content contains suspicious patterns: ${filename}`;
453
+ }
454
+ break;
455
+ }
456
+ }
457
+ }
458
+ }
459
+ // Check for PE headers (Windows executables)
460
+ if (attachment.content.length > 64 &&
461
+ attachment.content[0] === 0x4D &&
462
+ attachment.content[1] === 0x5A) { // 'MZ' header
463
+ result.threatScore += 80;
464
+ result.threatType = ThreatCategory.EXECUTABLE;
465
+ result.threatDetails = `Attachment contains executable code: ${filename}`;
466
+ }
467
+ }
468
+ }
469
+ /**
470
+ * Extract links from HTML content
471
+ * @param html HTML content
472
+ * @returns Array of extracted links
473
+ */
474
+ extractLinksFromHtml(html) {
475
+ const links = [];
476
+ // Simple regex-based extraction - a real implementation might use a proper HTML parser
477
+ const matches = html.match(/href=["'](https?:\/\/[^"']+)["']/gi);
478
+ if (matches) {
479
+ for (const match of matches) {
480
+ const linkMatch = match.match(/href=["'](https?:\/\/[^"']+)["']/i);
481
+ if (linkMatch && linkMatch[1]) {
482
+ links.push(linkMatch[1]);
483
+ }
484
+ }
485
+ }
486
+ return links;
487
+ }
488
+ /**
489
+ * Extract plain text from HTML
490
+ * @param html HTML content
491
+ * @returns Extracted text
492
+ */
493
+ extractTextFromHtml(html) {
494
+ // Remove HTML tags and decode entities - simplified version
495
+ return html
496
+ .replace(/<style[^>]*>.*?<\/style>/gs, '')
497
+ .replace(/<script[^>]*>.*?<\/script>/gs, '')
498
+ .replace(/<[^>]+>/g, ' ')
499
+ .replace(/&nbsp;/g, ' ')
500
+ .replace(/&lt;/g, '<')
501
+ .replace(/&gt;/g, '>')
502
+ .replace(/&amp;/g, '&')
503
+ .replace(/&quot;/g, '"')
504
+ .replace(/&apos;/g, "'")
505
+ .replace(/\s+/g, ' ')
506
+ .trim();
507
+ }
508
+ /**
509
+ * Extract text from a binary buffer for scanning
510
+ * @param buffer Binary content
511
+ * @returns Extracted text (may be partial)
512
+ */
513
+ extractTextFromBuffer(buffer) {
514
+ try {
515
+ // Limit the amount we convert to avoid memory issues
516
+ const sampleSize = Math.min(buffer.length, 100 * 1024); // 100KB max sample
517
+ const sample = buffer.slice(0, sampleSize);
518
+ // Try to convert to string, filtering out non-printable chars
519
+ return sample.toString('utf8')
520
+ .replace(/[\x00-\x09\x0B-\x1F\x7F-\x9F]/g, '') // Remove control chars
521
+ .replace(/\uFFFD/g, ''); // Remove replacement char
522
+ }
523
+ catch (error) {
524
+ logger.log('warn', `Error extracting text from buffer: ${error.message}`);
525
+ return '';
526
+ }
527
+ }
528
+ /**
529
+ * Check if an Office document likely contains macros
530
+ * This is a simplified check - real implementation would use specialized libraries
531
+ * @param attachment The attachment to check
532
+ * @returns Whether the file likely contains macros
533
+ */
534
+ likelyContainsMacros(attachment) {
535
+ // Simple heuristic: look for VBA/macro related strings
536
+ // This is a simplified approach and not comprehensive
537
+ const content = this.extractTextFromBuffer(attachment.content);
538
+ const macroIndicators = [
539
+ /vbaProject\.bin/i,
540
+ /Microsoft VBA/i,
541
+ /\bVBA\b/,
542
+ /Auto_Open/i,
543
+ /AutoExec/i,
544
+ /DocumentOpen/i,
545
+ /AutoOpen/i,
546
+ /\bExecute\(/i,
547
+ /\bShell\(/i,
548
+ /\bCreateObject\(/i
549
+ ];
550
+ for (const indicator of macroIndicators) {
551
+ if (indicator.test(content)) {
552
+ return true;
553
+ }
554
+ }
555
+ return false;
556
+ }
557
+ /**
558
+ * Map a pattern category to a threat type
559
+ * @param category The pattern category
560
+ * @returns The corresponding threat type
561
+ */
562
+ mapCategoryToThreatType(category) {
563
+ switch (category) {
564
+ case 'phishing': return ThreatCategory.PHISHING;
565
+ case 'spam': return ThreatCategory.SPAM;
566
+ case 'malware': return ThreatCategory.MALWARE;
567
+ case 'suspiciousLinks': return ThreatCategory.SUSPICIOUS_LINK;
568
+ case 'scriptInjection': return ThreatCategory.XSS;
569
+ case 'sensitiveData': return ThreatCategory.SENSITIVE_DATA;
570
+ default: return ThreatCategory.BLACKLISTED_CONTENT;
571
+ }
572
+ }
573
+ /**
574
+ * Log a high threat finding to the security logger
575
+ * @param email The email containing the threat
576
+ * @param result The scan result
577
+ */
578
+ logHighThreatFound(email, result) {
579
+ SecurityLogger.getInstance().logEvent({
580
+ level: SecurityLogLevel.ERROR,
581
+ type: SecurityEventType.MALWARE,
582
+ message: `High threat content detected in email from ${email.from} to ${email.to.join(', ')}`,
583
+ details: {
584
+ messageId: email.getMessageId(),
585
+ threatType: result.threatType,
586
+ threatDetails: result.threatDetails,
587
+ threatScore: result.threatScore,
588
+ scannedElements: result.scannedElements,
589
+ subject: email.subject
590
+ },
591
+ success: false,
592
+ domain: email.getFromDomain()
593
+ });
594
+ }
595
+ /**
596
+ * Log a threat finding to the security logger
597
+ * @param email The email containing the threat
598
+ * @param result The scan result
599
+ */
600
+ logThreatFound(email, result) {
601
+ SecurityLogger.getInstance().logEvent({
602
+ level: SecurityLogLevel.WARN,
603
+ type: SecurityEventType.SPAM,
604
+ message: `Suspicious content detected in email from ${email.from} to ${email.to.join(', ')}`,
605
+ details: {
606
+ messageId: email.getMessageId(),
607
+ threatType: result.threatType,
608
+ threatDetails: result.threatDetails,
609
+ threatScore: result.threatScore,
610
+ scannedElements: result.scannedElements,
611
+ subject: email.subject
612
+ },
613
+ success: false,
614
+ domain: email.getFromDomain()
615
+ });
616
+ }
617
+ /**
618
+ * Get threat level description based on score
619
+ * @param score Threat score
620
+ * @returns Threat level description
621
+ */
622
+ static getThreatLevel(score) {
623
+ if (score < 20) {
624
+ return 'none';
625
+ }
626
+ else if (score < 40) {
627
+ return 'low';
628
+ }
629
+ else if (score < 70) {
630
+ return 'medium';
631
+ }
632
+ else {
633
+ return 'high';
634
+ }
635
+ }
636
+ }
637
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.contentscanner.js","sourceRoot":"","sources":["../../../ts/security/classes.contentscanner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,KAAK,MAAM,aAAa,CAAC;AACrC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAAE,KAAK,EAAa,MAAM,sBAAsB,CAAC;AAExD,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAClG,OAAO,EAAE,QAAQ,EAAE,MAAM,WAAW,CAAC;AAqCrC;;GAEG;AACH,MAAM,CAAN,IAAY,cAWX;AAXD,WAAY,cAAc;IACxB,+BAAa,CAAA;IACb,uCAAqB,CAAA;IACrB,qCAAmB,CAAA;IACnB,2CAAyB,CAAA;IACzB,qDAAmC,CAAA;IACnC,qDAAmC,CAAA;IACnC,6BAAW,CAAA;IACX,mDAAiC,CAAA;IACjC,6DAA2C,CAAA;IAC3C,6CAA2B,CAAA;AAC7B,CAAC,EAXW,cAAc,KAAd,cAAc,QAWzB;AAED;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,SAAS,CAAgC;IACzC,OAAO,CAAmC;IAElD,yCAAyC;IACjC,MAAM,CAAU,kBAAkB,GAAG;QAC3C,oBAAoB;QACpB,QAAQ,EAAE;YACR,gEAAgE;YAChE,wCAAwC;YACxC,4EAA4E;YAC5E,sDAAsD;YACtD,wDAAwD;SACzD;QAED,kBAAkB;QAClB,IAAI,EAAE;YACJ,0EAA0E;YAC1E,4EAA4E;YAC5E,4DAA4D;YAC5D,kEAAkE;YAClE,wEAAwE;SACzE;QAED,6BAA6B;QAC7B,OAAO,EAAE;YACP,2EAA2E;YAC3E,yCAAyC;YACzC,+CAA+C;YAC/C,yCAAyC;YACzC,6DAA6D;SAC9D;QAED,mBAAmB;QACnB,eAAe,EAAE;YACf,uBAAuB;YACvB,uBAAuB;YACvB,qBAAqB;YACrB,4BAA4B;YAC5B,qCAAqC,EAAE,kBAAkB;YACzD,0CAA0C,EAAE,kBAAkB;YAC9D,mEAAmE,EAAE,iCAAiC;SACvG;QAED,2BAA2B;QAC3B,eAAe,EAAE;YACf,0BAA0B;YAC1B,cAAc;YACd,+CAA+C;YAC/C,sCAAsC;YACtC,YAAY;SACb;QAED,0BAA0B;QAC1B,aAAa,EAAE;YACb,iCAAiC,EAAE,MAAM;YACzC,eAAe,EAAE,sBAAsB;YACvC,oFAAoF,CAAC,kBAAkB;SACxG;KACF,CAAC;IAEF,+BAA+B;IACvB,MAAM,CAAU,qBAAqB,GAAG;QAC9C,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM;QAC7D,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;QAC5D,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;KACvD,CAAC;IAEF,2CAA2C;IACnC,MAAM,CAAU,yBAAyB,GAAG;QAClD,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO;KACtF,CAAC;IAEF;;OAEG;IACK,MAAM,CAAU,eAAe,GAAqC;QAC1E,YAAY,EAAE,KAAK;QACnB,QAAQ,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,WAAW;QAC1C,WAAW,EAAE,IAAI;QACjB,QAAQ,EAAE,IAAI;QACd,eAAe,EAAE,IAAI;QACrB,uBAAuB,EAAE,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;QAClD,mBAAmB,EAAE,IAAI;QACzB,gBAAgB,EAAE,IAAI;QACtB,WAAW,EAAE,IAAI;QACjB,WAAW,EAAE,EAAE;QACf,cAAc,EAAE,EAAE,EAAE,gDAAgD;QACpE,eAAe,EAAE,EAAE,CAAE,sDAAsD;KAC5E,CAAC;IAEF;;;OAGG;IACH,YAAY,UAAkC,EAAE;QAC9C,6BAA6B;QAC7B,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,cAAc,CAAC,eAAe;YACjC,GAAG,OAAO;SACX,CAAC;QAEF,mBAAmB;QACnB,IAAI,CAAC,SAAS,GAAG,IAAI,QAAQ,CAAsB;YACjD,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,YAAY;YAC9B,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;SAC3B,CAAC,CAAC;QAEH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,CAAC,CAAC;IACnD,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,WAAW,CAAC,UAAkC,EAAE;QAC5D,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,SAAS,CAAC,KAAY;QACjC,IAAI,CAAC;YACH,sCAAsC;YACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;YAE9C,oBAAoB;YACpB,MAAM,YAAY,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAClD,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;gBACjF,OAAO,YAAY,CAAC;YACtB,CAAC;YAED,yBAAyB;YACzB,MAAM,MAAM,GAAgB;gBAC1B,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,EAAE;gBACnB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,wBAAwB;YACxB,MAAM,YAAY,GAAyB,EAAE,CAAC;YAE9C,eAAe;YACf,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI,KAAK,CAAC,OAAO,EAAE,CAAC;gBAC9C,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC,CAAC;YAC7D,CAAC;YAED,oBAAoB;YACpB,IAAI,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC;gBAC1B,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC;oBACf,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC9D,CAAC;gBAED,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC;oBACf,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC9D,CAAC;YACH,CAAC;YAED,mBAAmB;YACnB,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,IAAI,KAAK,CAAC,WAAW,IAAI,KAAK,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtF,KAAK,MAAM,UAAU,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;oBAC3C,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC,CAAC;gBAC7D,CAAC;YACH,CAAC;YAED,4BAA4B;YAC5B,MAAM,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;YAEhC,wDAAwD;YACxD,MAAM,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,cAAc,CAAC;YAElE,gBAAgB;YAChB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;YAErC,2BAA2B;YAC3B,IAAI,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;gBACvD,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACzC,CAAC;iBAAM,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;gBAC3B,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACrC,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,KAAK,CAAC,OAAO,EAAE,EAAE;gBAC5D,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,KAAK,EAAE,KAAK,CAAC,KAAK;aACnB,CAAC,CAAC;YAEH,8CAA8C;YAC9C,OAAO;gBACL,OAAO,EAAE,IAAI,EAAE,sDAAsD;gBACrE,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,CAAC,OAAO,CAAC;gBAC1B,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,UAAU,EAAE,YAAY;gBACxB,aAAa,EAAE,eAAe,KAAK,CAAC,OAAO,EAAE;aAC9C,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAY;QACnC,8BAA8B;QAC9B,IAAI,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;YACzB,OAAO,SAAS,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;QACzC,CAAC;QAED,oCAAoC;QACpC,MAAM,aAAa,GAAG;YACpB,KAAK,CAAC,IAAI;YACV,KAAK,CAAC,OAAO,IAAI,EAAE;YACnB,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,WAAW,EAAE,MAAM,IAAI,CAAC;SAC/B,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAEZ,OAAO,SAAS,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;IAC5F,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,WAAW,CAAC,OAAe,EAAE,MAAmB;QAC5D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAEvC,kCAAkC;QAClC,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YACjE,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC;gBAC5C,MAAM,CAAC,aAAa,GAAG,mDAAmD,OAAO,EAAE,CAAC;gBACpF,OAAO;YACT,CAAC;QACH,CAAC;QAED,8BAA8B;QAC9B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,IAAI,EAAE,CAAC;YAC7D,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;gBACxC,MAAM,CAAC,aAAa,GAAG,+CAA+C,OAAO,EAAE,CAAC;gBAChF,OAAO;YACT,CAAC;QACH,CAAC;QAED,qBAAqB;QACrB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC9F,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC1B,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC;gBACjC,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC;gBAC9B,MAAM,CAAC,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC;gBACxC,OAAO;YACT,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,eAAe,CAAC,IAAY,EAAE,MAAmB;QAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpC,yBAAyB;QACzB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;YACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC/G,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;oBACnD,MAAM,CAAC,aAAa,GAAG,gCAAgC,CAAC;gBAC1D,CAAC;YACH,CAAC;QACH,CAAC;QAED,iBAAiB;QACjB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC;YACjE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACxG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC;oBAC5C,MAAM,CAAC,aAAa,GAAG,6CAA6C,CAAC;gBACvE,CAAC;YACH,CAAC;QACH,CAAC;QAED,aAAa;QACb,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,IAAI,EAAE,CAAC;YAC7D,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACpG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC;oBACxC,MAAM,CAAC,aAAa,GAAG,yCAAyC,CAAC;gBACnE,CAAC;YACH,CAAC;QACH,CAAC;QAED,2BAA2B;QAC3B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,OAAO,EAAE,CAAC;YAChE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBACvG,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC;oBAC3C,MAAM,CAAC,aAAa,GAAG,4CAA4C,CAAC;gBACtE,CAAC;YACH,CAAC;QACH,CAAC;QAED,uBAAuB;QACvB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC;YACtE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,CAAC,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC;oBAC9G,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC;oBAClD,MAAM,CAAC,aAAa,GAAG,mDAAmD,CAAC;gBAC7E,CAAC;YACH,CAAC;QACH,CAAC;QAED,qBAAqB;QACrB,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC9F,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC;gBACjC,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,WAAW,GAAG,EAAE,EAAE,CAAC;oBAClD,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC;oBAC9B,MAAM,CAAC,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC;gBAC1C,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,eAAe,CAAC,IAAY,EAAE,MAAmB;QAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpC,6BAA6B;QAC7B,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;YACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,UAAU,KAAK,cAAc,CAAC,GAAG,EAAE,CAAC;oBACnE,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,GAAG,CAAC;oBACvC,MAAM,CAAC,aAAa,GAAG,oDAAoD,CAAC;gBAC9E,CAAC;YACH,CAAC;QACH,CAAC;QAED,sDAAsD;QACtD,MAAM,WAAW,GAAG,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;QACnD,IAAI,WAAW,EAAE,CAAC;YAChB,qEAAqE;YACrE,MAAM,UAAU,GAAgB;gBAC9B,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,EAAE;gBACnB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,MAAM,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,UAAU,CAAC,CAAC;YAEpD,0DAA0D;YAC1D,IAAI,UAAU,CAAC,UAAU,IAAI,UAAU,CAAC,WAAW,GAAG,CAAC,EAAE,CAAC;gBACxD,8DAA8D;gBAC9D,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,WAAW,GAAG,CAAC,CAAC,CAAC;gBAE7D,2DAA2D;gBAC3D,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,UAAU,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;oBACtE,MAAM,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;oBAC1C,MAAM,CAAC,aAAa,GAAG,UAAU,CAAC,aAAa,CAAC;gBAClD,CAAC;YACH,CAAC;QACH,CAAC;QAED,oCAAoC;QACpC,MAAM,KAAK,GAAG,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC;QAC9C,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACrB,6BAA6B;YAC7B,IAAI,eAAe,GAAG,CAAC,CAAC;YACxB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;gBACzB,KAAK,MAAM,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,eAAe,EAAE,CAAC;oBACxE,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;wBACvB,eAAe,EAAE,CAAC;wBAClB,MAAM;oBACR,CAAC;gBACH,CAAC;YACH,CAAC;YAED,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;gBACxB,oDAAoD;gBACpD,MAAM,oBAAoB,GAAG,CAAC,eAAe,GAAG,KAAK,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC;gBACpE,MAAM,eAAe,GAAG,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,IAAI,CAAC,KAAK,CAAC,oBAAoB,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7E,MAAM,CAAC,WAAW,IAAI,eAAe,CAAC;gBAEtC,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,eAAe,GAAG,EAAE,EAAE,CAAC;oBAC/C,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;oBACnD,MAAM,CAAC,aAAa,GAAG,iBAAiB,eAAe,4BAA4B,KAAK,CAAC,MAAM,cAAc,CAAC;gBAChH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,cAAc,CAAC,UAAuB,EAAE,MAAmB;QACvE,MAAM,QAAQ,GAAG,UAAU,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;QACnD,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,cAAc,QAAQ,EAAE,CAAC,CAAC;QAEtD,uCAAuC;QACvC,IAAI,UAAU,CAAC,OAAO,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,uBAAuB,EAAE,CAAC;YAC3F,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,QAAQ,KAAK,UAAU,CAAC,OAAO,CAAC,MAAM,SAAS,CAAC,CAAC;YAC1G,OAAO;QACT,CAAC;QAED,2CAA2C;QAC3C,IAAI,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC;YAClC,KAAK,MAAM,GAAG,IAAI,cAAc,CAAC,qBAAqB,EAAE,CAAC;gBACvD,IAAI,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oBAC3B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC,CAAC,wCAAwC;oBAClE,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,UAAU,CAAC;oBAC9C,MAAM,CAAC,aAAa,GAAG,qDAAqD,QAAQ,EAAE,CAAC;oBACvF,OAAO,CAAC,uDAAuD;gBACjE,CAAC;YACH,CAAC;QACH,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC7B,KAAK,MAAM,GAAG,IAAI,cAAc,CAAC,yBAAyB,EAAE,CAAC;gBAC3D,IAAI,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oBAC3B,qDAAqD;oBACrD,qFAAqF;oBACrF,uCAAuC;oBACvC,IAAI,UAAU,CAAC,OAAO,IAAI,IAAI,CAAC,oBAAoB,CAAC,UAAU,CAAC,EAAE,CAAC;wBAChE,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;wBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;wBACnD,MAAM,CAAC,aAAa,GAAG,yCAAyC,QAAQ,EAAE,CAAC;wBAC3E,OAAO;oBACT,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,2DAA2D;QAC3D,IAAI,UAAU,CAAC,OAAO,EAAE,CAAC;YACvB,wEAAwE;YACxE,MAAM,WAAW,GAAG,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;YAEnE,IAAI,WAAW,EAAE,CAAC;gBAChB,oDAAoD;gBACpD,KAAK,MAAM,QAAQ,IAAI,cAAc,CAAC,kBAAkB,EAAE,CAAC;oBACzD,MAAM,QAAQ,GAAG,cAAc,CAAC,kBAAkB,CAAC,QAAQ,CAAC,CAAC;oBAC7D,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;wBAC/B,IAAI,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;4BAC9B,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;4BAEzB,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;gCACvB,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,uBAAuB,CAAC,QAAQ,CAAC,CAAC;gCAC3D,MAAM,CAAC,aAAa,GAAG,oDAAoD,QAAQ,EAAE,CAAC;4BACxF,CAAC;4BAED,MAAM;wBACR,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAED,6CAA6C;YAC7C,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,EAAE;gBAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI;gBAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,cAAc;gBAClD,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;gBACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,UAAU,CAAC;gBAC9C,MAAM,CAAC,aAAa,GAAG,wCAAwC,QAAQ,EAAE,CAAC;YAC5E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,oBAAoB,CAAC,IAAY;QACvC,MAAM,KAAK,GAAa,EAAE,CAAC;QAE3B,uFAAuF;QACvF,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,oCAAoC,CAAC,CAAC;QACjE,IAAI,OAAO,EAAE,CAAC;YACZ,KAAK,MAAM,KAAK,IAAI,OAAO,EAAE,CAAC;gBAC5B,MAAM,SAAS,GAAG,KAAK,CAAC,KAAK,CAAC,mCAAmC,CAAC,CAAC;gBACnE,IAAI,SAAS,IAAI,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC9B,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBAC3B,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,mBAAmB,CAAC,IAAY;QACtC,4DAA4D;QAC5D,OAAO,IAAI;aACR,OAAO,CAAC,4BAA4B,EAAE,EAAE,CAAC;aACzC,OAAO,CAAC,8BAA8B,EAAE,EAAE,CAAC;aAC3C,OAAO,CAAC,UAAU,EAAE,GAAG,CAAC;aACxB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC;aACrB,OAAO,CAAC,OAAO,EAAE,GAAG,CAAC;aACrB,OAAO,CAAC,QAAQ,EAAE,GAAG,CAAC;aACtB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,SAAS,EAAE,GAAG,CAAC;aACvB,OAAO,CAAC,MAAM,EAAE,GAAG,CAAC;aACpB,IAAI,EAAE,CAAC;IACZ,CAAC;IAED;;;;OAIG;IACK,qBAAqB,CAAC,MAAc;QAC1C,IAAI,CAAC;YACH,qDAAqD;YACrD,MAAM,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,MAAM,EAAE,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;YAC3E,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC;YAE3C,8DAA8D;YAC9D,OAAO,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC;iBAC3B,OAAO,CAAC,gCAAgC,EAAE,EAAE,CAAC,CAAC,uBAAuB;iBACrE,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC,CAAC,0BAA0B;QACvD,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC1E,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,oBAAoB,CAAC,UAAuB;QAClD,uDAAuD;QACvD,sDAAsD;QACtD,MAAM,OAAO,GAAG,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAC/D,MAAM,eAAe,GAAG;YACtB,kBAAkB;YAClB,gBAAgB;YAChB,SAAS;YACT,YAAY;YACZ,WAAW;YACX,eAAe;YACf,WAAW;YACX,cAAc;YACd,YAAY;YACZ,mBAAmB;SACpB,CAAC;QAEF,KAAK,MAAM,SAAS,IAAI,eAAe,EAAE,CAAC;YACxC,IAAI,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC5B,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,uBAAuB,CAAC,QAAgB;QAC9C,QAAQ,QAAQ,EAAE,CAAC;YACjB,KAAK,UAAU,CAAC,CAAC,OAAO,cAAc,CAAC,QAAQ,CAAC;YAChD,KAAK,MAAM,CAAC,CAAC,OAAO,cAAc,CAAC,IAAI,CAAC;YACxC,KAAK,SAAS,CAAC,CAAC,OAAO,cAAc,CAAC,OAAO,CAAC;YAC9C,KAAK,iBAAiB,CAAC,CAAC,OAAO,cAAc,CAAC,eAAe,CAAC;YAC9D,KAAK,iBAAiB,CAAC,CAAC,OAAO,cAAc,CAAC,GAAG,CAAC;YAClD,KAAK,eAAe,CAAC,CAAC,OAAO,cAAc,CAAC,cAAc,CAAC;YAC3D,OAAO,CAAC,CAAC,OAAO,cAAc,CAAC,mBAAmB,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,kBAAkB,CAAC,KAAY,EAAE,MAAmB;QAC1D,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,KAAK;YAC7B,IAAI,EAAE,iBAAiB,CAAC,OAAO;YAC/B,OAAO,EAAE,8CAA8C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC7F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACK,cAAc,CAAC,KAAY,EAAE,MAAmB;QACtD,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;YAC5B,IAAI,EAAE,iBAAiB,CAAC,IAAI;YAC5B,OAAO,EAAE,6CAA6C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC5F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc,CAAC,KAAa;QACxC,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACf,OAAO,MAAM,CAAC;QAChB,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,KAAK,CAAC;QACf,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,QAAQ,CAAC;QAClB,CAAC;aAAM,CAAC;YACN,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC"}