@serve.zone/dcrouter 8.1.0 → 9.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/dist_serve/bundle.js +1417 -992
  2. package/dist_ts/00_commitinfo_data.js +1 -1
  3. package/dist_ts/monitoring/classes.metricsmanager.d.ts +169 -0
  4. package/dist_ts/monitoring/classes.metricsmanager.js +591 -0
  5. package/dist_ts/monitoring/index.d.ts +1 -0
  6. package/dist_ts/monitoring/index.js +2 -0
  7. package/dist_ts/opsserver/handlers/certificate.handler.d.ts +34 -0
  8. package/dist_ts/opsserver/handlers/certificate.handler.js +419 -0
  9. package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +32 -0
  10. package/dist_ts/opsserver/handlers/email-ops.handler.js +226 -0
  11. package/dist_ts/opsserver/handlers/radius.handler.d.ts +8 -0
  12. package/dist_ts/opsserver/handlers/radius.handler.js +296 -0
  13. package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +8 -0
  14. package/dist_ts/opsserver/handlers/remoteingress.handler.js +154 -0
  15. package/dist_ts/opsserver/handlers/security.handler.d.ts +11 -0
  16. package/dist_ts/opsserver/handlers/security.handler.js +232 -0
  17. package/dist_ts/opsserver/handlers/stats.handler.d.ts +13 -0
  18. package/dist_ts/opsserver/handlers/stats.handler.js +400 -0
  19. package/dist_ts/security/classes.securitylogger.d.ts +140 -0
  20. package/dist_ts_interfaces/requests/config.d.ts +77 -1
  21. package/dist_ts_web/00_commitinfo_data.js +1 -1
  22. package/dist_ts_web/appstate.d.ts +1 -1
  23. package/dist_ts_web/elements/ops-dashboard.js +15 -5
  24. package/dist_ts_web/elements/ops-view-apitokens.js +8 -4
  25. package/dist_ts_web/elements/ops-view-config.d.ts +10 -8
  26. package/dist_ts_web/elements/ops-view-config.js +215 -297
  27. package/package.json +2 -2
  28. package/ts/00_commitinfo_data.ts +1 -1
  29. package/ts/opsserver/handlers/config.handler.ts +154 -72
  30. package/ts_web/00_commitinfo_data.ts +1 -1
  31. package/ts_web/appstate.ts +1 -1
  32. package/ts_web/elements/ops-dashboard.ts +14 -4
  33. package/ts_web/elements/ops-view-apitokens.ts +7 -3
  34. package/ts_web/elements/ops-view-config.ts +237 -299
@@ -0,0 +1,34 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import type { OpsServer } from '../classes.opsserver.js';
3
+ export declare class CertificateHandler {
4
+ private opsServerRef;
5
+ typedrouter: plugins.typedrequest.TypedRouter;
6
+ constructor(opsServerRef: OpsServer);
7
+ private registerHandlers;
8
+ /**
9
+ * Build domain-centric certificate overview.
10
+ * Instead of one row per route, we produce one row per unique domain.
11
+ */
12
+ private buildCertificateOverview;
13
+ private buildSummary;
14
+ /**
15
+ * Legacy route-based reprovisioning
16
+ */
17
+ private reprovisionCertificateByRoute;
18
+ /**
19
+ * Domain-based reprovisioning — clears backoff first, then triggers provision
20
+ */
21
+ private reprovisionCertificateDomain;
22
+ /**
23
+ * Delete certificate data for a domain from storage
24
+ */
25
+ private deleteCertificate;
26
+ /**
27
+ * Export certificate data for a domain as ICert-shaped JSON
28
+ */
29
+ private exportCertificate;
30
+ /**
31
+ * Import a certificate from ICert-shaped JSON
32
+ */
33
+ private importCertificate;
34
+ }
@@ -0,0 +1,419 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import * as interfaces from '../../../dist_ts_interfaces/index.js';
3
+ export class CertificateHandler {
4
+ opsServerRef;
5
+ typedrouter = new plugins.typedrequest.TypedRouter();
6
+ constructor(opsServerRef) {
7
+ this.opsServerRef = opsServerRef;
8
+ this.opsServerRef.typedrouter.addTypedRouter(this.typedrouter);
9
+ this.registerHandlers();
10
+ }
11
+ registerHandlers() {
12
+ // Get Certificate Overview
13
+ this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('getCertificateOverview', async (dataArg) => {
14
+ const certificates = await this.buildCertificateOverview();
15
+ const summary = this.buildSummary(certificates);
16
+ return { certificates, summary };
17
+ }));
18
+ // Legacy route-based reprovision (backward compat)
19
+ this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('reprovisionCertificate', async (dataArg) => {
20
+ return this.reprovisionCertificateByRoute(dataArg.routeName);
21
+ }));
22
+ // Domain-based reprovision (preferred)
23
+ this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('reprovisionCertificateDomain', async (dataArg) => {
24
+ return this.reprovisionCertificateDomain(dataArg.domain);
25
+ }));
26
+ // Delete certificate
27
+ this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('deleteCertificate', async (dataArg) => {
28
+ return this.deleteCertificate(dataArg.domain);
29
+ }));
30
+ // Export certificate
31
+ this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('exportCertificate', async (dataArg) => {
32
+ return this.exportCertificate(dataArg.domain);
33
+ }));
34
+ // Import certificate
35
+ this.typedrouter.addTypedHandler(new plugins.typedrequest.TypedHandler('importCertificate', async (dataArg) => {
36
+ return this.importCertificate(dataArg.cert);
37
+ }));
38
+ }
39
+ /**
40
+ * Build domain-centric certificate overview.
41
+ * Instead of one row per route, we produce one row per unique domain.
42
+ */
43
+ async buildCertificateOverview() {
44
+ const dcRouter = this.opsServerRef.dcRouterRef;
45
+ const smartProxy = dcRouter.smartProxy;
46
+ if (!smartProxy)
47
+ return [];
48
+ const routes = smartProxy.routeManager.getRoutes();
49
+ // Phase 1: Collect unique domains with their associated route info
50
+ const domainMap = new Map();
51
+ for (const route of routes) {
52
+ if (!route.name)
53
+ continue;
54
+ const tls = route.action?.tls;
55
+ if (!tls)
56
+ continue;
57
+ // Skip passthrough routes - they don't manage certificates
58
+ if (tls.mode === 'passthrough')
59
+ continue;
60
+ const routeDomains = route.match.domains
61
+ ? (Array.isArray(route.match.domains) ? route.match.domains : [route.match.domains])
62
+ : [];
63
+ // Determine source
64
+ let source = 'none';
65
+ if (tls.certificate === 'auto') {
66
+ if (smartProxy.settings.certProvisionFunction) {
67
+ source = 'provision-function';
68
+ }
69
+ else {
70
+ source = 'acme';
71
+ }
72
+ }
73
+ else if (tls.certificate && typeof tls.certificate === 'object') {
74
+ source = 'static';
75
+ }
76
+ const canReprovision = source === 'acme' || source === 'provision-function';
77
+ const tlsMode = tls.mode;
78
+ for (const domain of routeDomains) {
79
+ const existing = domainMap.get(domain);
80
+ if (existing) {
81
+ // Add this route name to the existing domain entry
82
+ if (!existing.routeNames.includes(route.name)) {
83
+ existing.routeNames.push(route.name);
84
+ }
85
+ // Upgrade source if more specific
86
+ if (existing.source === 'none' && source !== 'none') {
87
+ existing.source = source;
88
+ existing.canReprovision = canReprovision;
89
+ }
90
+ }
91
+ else {
92
+ domainMap.set(domain, {
93
+ routeNames: [route.name],
94
+ source,
95
+ tlsMode,
96
+ canReprovision,
97
+ });
98
+ }
99
+ }
100
+ }
101
+ // Phase 2: Resolve status for each unique domain
102
+ const certificates = [];
103
+ for (const [domain, info] of domainMap) {
104
+ let status = 'unknown';
105
+ let expiryDate;
106
+ let issuedAt;
107
+ let issuer;
108
+ let error;
109
+ // Check event-based status from certificateStatusMap (now keyed by domain)
110
+ const eventStatus = dcRouter.certificateStatusMap.get(domain);
111
+ if (eventStatus) {
112
+ status = eventStatus.status;
113
+ expiryDate = eventStatus.expiryDate;
114
+ issuedAt = eventStatus.issuedAt;
115
+ error = eventStatus.error;
116
+ if (eventStatus.source) {
117
+ issuer = eventStatus.source;
118
+ }
119
+ }
120
+ // Try SmartProxy certificate status if no event data
121
+ if (status === 'unknown' && info.routeNames.length > 0) {
122
+ try {
123
+ const rustStatus = await smartProxy.getCertificateStatus(info.routeNames[0]);
124
+ if (rustStatus) {
125
+ if (rustStatus.expiryDate)
126
+ expiryDate = rustStatus.expiryDate;
127
+ if (rustStatus.issuer)
128
+ issuer = rustStatus.issuer;
129
+ if (rustStatus.issuedAt)
130
+ issuedAt = rustStatus.issuedAt;
131
+ if (rustStatus.status === 'valid' || rustStatus.status === 'expired') {
132
+ status = rustStatus.status;
133
+ }
134
+ }
135
+ }
136
+ catch {
137
+ // Rust bridge may not support this command yet — ignore
138
+ }
139
+ }
140
+ // Check persisted cert data from StorageManager
141
+ if (status === 'unknown') {
142
+ const cleanDomain = domain.replace(/^\*\.?/, '');
143
+ let certData = await dcRouter.storageManager.getJSON(`/certs/${cleanDomain}`);
144
+ if (!certData) {
145
+ // Also check certStore path (proxy-certs)
146
+ certData = await dcRouter.storageManager.getJSON(`/proxy-certs/${domain}`);
147
+ }
148
+ if (certData?.validUntil) {
149
+ expiryDate = new Date(certData.validUntil).toISOString();
150
+ if (certData.created) {
151
+ issuedAt = new Date(certData.created).toISOString();
152
+ }
153
+ issuer = 'smartacme-dns-01';
154
+ }
155
+ else if (certData?.publicKey) {
156
+ // certStore has the cert — parse PEM for expiry
157
+ try {
158
+ const x509 = new plugins.crypto.X509Certificate(certData.publicKey);
159
+ expiryDate = new Date(x509.validTo).toISOString();
160
+ issuedAt = new Date(x509.validFrom).toISOString();
161
+ }
162
+ catch { /* PEM parsing failed */ }
163
+ status = 'valid';
164
+ issuer = 'cert-store';
165
+ }
166
+ else if (certData) {
167
+ status = 'valid';
168
+ issuer = 'cert-store';
169
+ }
170
+ }
171
+ // Compute status from expiry date
172
+ if (expiryDate && (status === 'valid' || status === 'unknown')) {
173
+ const expiry = new Date(expiryDate);
174
+ const now = new Date();
175
+ const daysUntilExpiry = (expiry.getTime() - now.getTime()) / (1000 * 60 * 60 * 24);
176
+ if (daysUntilExpiry < 0) {
177
+ status = 'expired';
178
+ }
179
+ else if (daysUntilExpiry < 30) {
180
+ status = 'expiring';
181
+ }
182
+ else {
183
+ status = 'valid';
184
+ }
185
+ }
186
+ // Static certs with no other info default to 'valid'
187
+ if (info.source === 'static' && status === 'unknown') {
188
+ status = 'valid';
189
+ }
190
+ // ACME/provision-function routes with no cert data are still provisioning
191
+ if (status === 'unknown' && (info.source === 'acme' || info.source === 'provision-function')) {
192
+ status = 'provisioning';
193
+ }
194
+ // Phase 3: Attach backoff info
195
+ let backoffInfo;
196
+ if (dcRouter.certProvisionScheduler) {
197
+ const bi = await dcRouter.certProvisionScheduler.getBackoffInfo(domain);
198
+ if (bi) {
199
+ backoffInfo = bi;
200
+ }
201
+ }
202
+ certificates.push({
203
+ domain,
204
+ routeNames: info.routeNames,
205
+ status,
206
+ source: info.source,
207
+ tlsMode: info.tlsMode,
208
+ expiryDate,
209
+ issuer,
210
+ issuedAt,
211
+ error,
212
+ canReprovision: info.canReprovision,
213
+ backoffInfo,
214
+ });
215
+ }
216
+ return certificates;
217
+ }
218
+ buildSummary(certificates) {
219
+ const summary = { total: 0, valid: 0, expiring: 0, expired: 0, failed: 0, unknown: 0 };
220
+ summary.total = certificates.length;
221
+ for (const cert of certificates) {
222
+ switch (cert.status) {
223
+ case 'valid':
224
+ summary.valid++;
225
+ break;
226
+ case 'expiring':
227
+ summary.expiring++;
228
+ break;
229
+ case 'expired':
230
+ summary.expired++;
231
+ break;
232
+ case 'failed':
233
+ summary.failed++;
234
+ break;
235
+ case 'provisioning': // count as unknown
236
+ case 'unknown':
237
+ summary.unknown++;
238
+ break;
239
+ }
240
+ }
241
+ return summary;
242
+ }
243
+ /**
244
+ * Legacy route-based reprovisioning
245
+ */
246
+ async reprovisionCertificateByRoute(routeName) {
247
+ const dcRouter = this.opsServerRef.dcRouterRef;
248
+ const smartProxy = dcRouter.smartProxy;
249
+ if (!smartProxy) {
250
+ return { success: false, message: 'SmartProxy is not running' };
251
+ }
252
+ try {
253
+ await smartProxy.provisionCertificate(routeName);
254
+ // Clear event-based status for domains in this route
255
+ for (const [domain, entry] of dcRouter.certificateStatusMap) {
256
+ if (entry.routeNames.includes(routeName)) {
257
+ dcRouter.certificateStatusMap.delete(domain);
258
+ }
259
+ }
260
+ return { success: true, message: `Certificate reprovisioning triggered for route '${routeName}'` };
261
+ }
262
+ catch (err) {
263
+ return { success: false, message: err.message || 'Failed to reprovision certificate' };
264
+ }
265
+ }
266
+ /**
267
+ * Domain-based reprovisioning — clears backoff first, then triggers provision
268
+ */
269
+ async reprovisionCertificateDomain(domain) {
270
+ const dcRouter = this.opsServerRef.dcRouterRef;
271
+ const smartProxy = dcRouter.smartProxy;
272
+ if (!smartProxy) {
273
+ return { success: false, message: 'SmartProxy is not running' };
274
+ }
275
+ // Clear backoff for this domain (user override)
276
+ if (dcRouter.certProvisionScheduler) {
277
+ await dcRouter.certProvisionScheduler.clearBackoff(domain);
278
+ }
279
+ // Clear status map entry so it gets refreshed
280
+ dcRouter.certificateStatusMap.delete(domain);
281
+ // Try to provision via SmartAcme directly
282
+ if (dcRouter.smartAcme) {
283
+ try {
284
+ await dcRouter.smartAcme.getCertificateForDomain(domain);
285
+ return { success: true, message: `Certificate reprovisioning triggered for domain '${domain}'` };
286
+ }
287
+ catch (err) {
288
+ return { success: false, message: err.message || `Failed to reprovision certificate for ${domain}` };
289
+ }
290
+ }
291
+ // Fallback: try provisioning via the first matching route
292
+ const routeNames = dcRouter.findRouteNamesForDomain(domain);
293
+ if (routeNames.length > 0) {
294
+ try {
295
+ await smartProxy.provisionCertificate(routeNames[0]);
296
+ return { success: true, message: `Certificate reprovisioning triggered for domain '${domain}' via route '${routeNames[0]}'` };
297
+ }
298
+ catch (err) {
299
+ return { success: false, message: err.message || `Failed to reprovision certificate for ${domain}` };
300
+ }
301
+ }
302
+ return { success: false, message: `No routes found for domain '${domain}'` };
303
+ }
304
+ /**
305
+ * Delete certificate data for a domain from storage
306
+ */
307
+ async deleteCertificate(domain) {
308
+ const dcRouter = this.opsServerRef.dcRouterRef;
309
+ const cleanDomain = domain.replace(/^\*\.?/, '');
310
+ // Delete from all known storage paths
311
+ const paths = [
312
+ `/proxy-certs/${domain}`,
313
+ `/proxy-certs/${cleanDomain}`,
314
+ `/certs/${cleanDomain}`,
315
+ ];
316
+ for (const path of paths) {
317
+ try {
318
+ await dcRouter.storageManager.delete(path);
319
+ }
320
+ catch {
321
+ // Path may not exist — ignore
322
+ }
323
+ }
324
+ // Clear from in-memory status map
325
+ dcRouter.certificateStatusMap.delete(domain);
326
+ // Clear backoff info
327
+ if (dcRouter.certProvisionScheduler) {
328
+ await dcRouter.certProvisionScheduler.clearBackoff(domain);
329
+ }
330
+ return { success: true, message: `Certificate data deleted for '${domain}'` };
331
+ }
332
+ /**
333
+ * Export certificate data for a domain as ICert-shaped JSON
334
+ */
335
+ async exportCertificate(domain) {
336
+ const dcRouter = this.opsServerRef.dcRouterRef;
337
+ const cleanDomain = domain.replace(/^\*\.?/, '');
338
+ // Try SmartAcme /certs/ path first (has full ICert fields)
339
+ let certData = await dcRouter.storageManager.getJSON(`/certs/${cleanDomain}`);
340
+ if (certData && certData.publicKey && certData.privateKey) {
341
+ return {
342
+ success: true,
343
+ cert: {
344
+ id: certData.id || plugins.crypto.randomUUID(),
345
+ domainName: certData.domainName || domain,
346
+ created: certData.created || Date.now(),
347
+ validUntil: certData.validUntil || 0,
348
+ privateKey: certData.privateKey,
349
+ publicKey: certData.publicKey,
350
+ csr: certData.csr || '',
351
+ },
352
+ };
353
+ }
354
+ // Fallback: try /proxy-certs/ with original domain
355
+ certData = await dcRouter.storageManager.getJSON(`/proxy-certs/${domain}`);
356
+ if (!certData || !certData.publicKey) {
357
+ // Try with clean domain
358
+ certData = await dcRouter.storageManager.getJSON(`/proxy-certs/${cleanDomain}`);
359
+ }
360
+ if (certData && certData.publicKey && certData.privateKey) {
361
+ return {
362
+ success: true,
363
+ cert: {
364
+ id: plugins.crypto.randomUUID(),
365
+ domainName: domain,
366
+ created: certData.validFrom || Date.now(),
367
+ validUntil: certData.validUntil || 0,
368
+ privateKey: certData.privateKey,
369
+ publicKey: certData.publicKey,
370
+ csr: '',
371
+ },
372
+ };
373
+ }
374
+ return { success: false, message: `No certificate data found for '${domain}'` };
375
+ }
376
+ /**
377
+ * Import a certificate from ICert-shaped JSON
378
+ */
379
+ async importCertificate(cert) {
380
+ // Validate PEM content
381
+ if (!cert.publicKey || !cert.publicKey.includes('-----BEGIN CERTIFICATE-----')) {
382
+ return { success: false, message: 'Invalid publicKey: must contain a PEM-encoded certificate' };
383
+ }
384
+ if (!cert.privateKey || !cert.privateKey.includes('-----BEGIN')) {
385
+ return { success: false, message: 'Invalid privateKey: must contain a PEM-encoded key' };
386
+ }
387
+ const dcRouter = this.opsServerRef.dcRouterRef;
388
+ const cleanDomain = cert.domainName.replace(/^\*\.?/, '');
389
+ // Save to /certs/ (SmartAcme-compatible path)
390
+ await dcRouter.storageManager.setJSON(`/certs/${cleanDomain}`, {
391
+ id: cert.id,
392
+ domainName: cert.domainName,
393
+ created: cert.created,
394
+ validUntil: cert.validUntil,
395
+ privateKey: cert.privateKey,
396
+ publicKey: cert.publicKey,
397
+ csr: cert.csr || '',
398
+ });
399
+ // Also save to /proxy-certs/ (proxy-cert format)
400
+ await dcRouter.storageManager.setJSON(`/proxy-certs/${cert.domainName}`, {
401
+ domain: cert.domainName,
402
+ publicKey: cert.publicKey,
403
+ privateKey: cert.privateKey,
404
+ ca: undefined,
405
+ validUntil: cert.validUntil,
406
+ validFrom: cert.created,
407
+ });
408
+ // Update in-memory status map
409
+ dcRouter.certificateStatusMap.set(cert.domainName, {
410
+ status: 'valid',
411
+ source: 'static',
412
+ expiryDate: cert.validUntil ? new Date(cert.validUntil).toISOString() : undefined,
413
+ issuedAt: cert.created ? new Date(cert.created).toISOString() : undefined,
414
+ routeNames: [],
415
+ });
416
+ return { success: true, message: `Certificate imported for '${cert.domainName}'` };
417
+ }
418
+ }
419
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate.handler.js","sourceRoot":"","sources":["../../../../ts/opsserver/handlers/certificate.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAE5C,OAAO,KAAK,UAAU,MAAM,iCAAiC,CAAC;AAE9D,MAAM,OAAO,kBAAkB;IAGT;IAFb,WAAW,GAAG,IAAI,OAAO,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC;IAE5D,YAAoB,YAAuB;QAAvB,iBAAY,GAAZ,YAAY,CAAW;QACzC,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAC/D,IAAI,CAAC,gBAAgB,EAAE,CAAC;IAC1B,CAAC;IAEO,gBAAgB;QACtB,2BAA2B;QAC3B,IAAI,CAAC,WAAW,CAAC,eAAe,CAC9B,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,wBAAwB,EACxB,KAAK,EAAE,OAAO,EAAE,EAAE;YAChB,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,wBAAwB,EAAE,CAAC;YAC3D,MAAM,OAAO,GAAG,IAAI,CAAC,YAAY,CAAC,YAAY,CAAC,CAAC;YAChD,OAAO,EAAE,YAAY,EAAE,OAAO,EAAE,CAAC;QACnC,CAAC,CACF,CACF,CAAC;QAEF,mDAAmD;QACnD,IAAI,CAAC,WAAW,CAAC,eAAe,CAC9B,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,wBAAwB,EACxB,KAAK,EAAE,OAAO,EAAE,EAAE;YAChB,OAAO,IAAI,CAAC,6BAA6B,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;QAC/D,CAAC,CACF,CACF,CAAC;QAEF,uCAAuC;QACvC,IAAI,CAAC,WAAW,CAAC,eAAe,CAC9B,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,8BAA8B,EAC9B,KAAK,EAAE,OAAO,EAAE,EAAE;YAChB,OAAO,IAAI,CAAC,4BAA4B,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QAC3D,CAAC,CACF,CACF,CAAC;QAEF,qBAAqB;QACrB,IAAI,CAAC,WAAW,CAAC,eAAe,CAC9B,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,mBAAmB,EACnB,KAAK,EAAE,OAAO,EAAE,EAAE;YAChB,OAAO,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QAChD,CAAC,CACF,CACF,CAAC;QAEF,qBAAqB;QACrB,IAAI,CAAC,WAAW,CAAC,eAAe,CAC9B,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,mBAAmB,EACnB,KAAK,EAAE,OAAO,EAAE,EAAE;YAChB,OAAO,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QAChD,CAAC,CACF,CACF,CAAC;QAEF,qBAAqB;QACrB,IAAI,CAAC,WAAW,CAAC,eAAe,CAC9B,IAAI,OAAO,CAAC,YAAY,CAAC,YAAY,CACnC,mBAAmB,EACnB,KAAK,EAAE,OAAO,EAAE,EAAE;YAChB,OAAO,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAC9C,CAAC,CACF,CACF,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,wBAAwB;QACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAC/C,MAAM,UAAU,GAAG,QAAQ,CAAC,UAAU,CAAC;QACvC,IAAI,CAAC,UAAU;YAAE,OAAO,EAAE,CAAC;QAE3B,MAAM,MAAM,GAAG,UAAU,CAAC,YAAY,CAAC,SAAS,EAAE,CAAC;QAEnD,mEAAmE;QACnE,MAAM,SAAS,GAAG,IAAI,GAAG,EAKrB,CAAC;QAEL,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,CAAC,KAAK,CAAC,IAAI;gBAAE,SAAS;YAE1B,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,EAAE,GAAG,CAAC;YAC9B,IAAI,CAAC,GAAG;gBAAE,SAAS;YAEnB,2DAA2D;YAC3D,IAAI,GAAG,CAAC,IAAI,KAAK,aAAa;gBAAE,SAAS;YAEzC,MAAM,YAAY,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO;gBACtC,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBACpF,CAAC,CAAC,EAAE,CAAC;YAEP,mBAAmB;YACnB,IAAI,MAAM,GAA2C,MAAM,CAAC;YAC5D,IAAI,GAAG,CAAC,WAAW,KAAK,MAAM,EAAE,CAAC;gBAC/B,IAAK,UAAU,CAAC,QAAgB,CAAC,qBAAqB,EAAE,CAAC;oBACvD,MAAM,GAAG,oBAAoB,CAAC;gBAChC,CAAC;qBAAM,CAAC;oBACN,MAAM,GAAG,MAAM,CAAC;gBAClB,CAAC;YACH,CAAC;iBAAM,IAAI,GAAG,CAAC,WAAW,IAAI,OAAO,GAAG,CAAC,WAAW,KAAK,QAAQ,EAAE,CAAC;gBAClE,MAAM,GAAG,QAAQ,CAAC;YACpB,CAAC;YAED,MAAM,cAAc,GAAG,MAAM,KAAK,MAAM,IAAI,MAAM,KAAK,oBAAoB,CAAC;YAC5E,MAAM,OAAO,GAAG,GAAG,CAAC,IAA+D,CAAC;YAEpF,KAAK,MAAM,MAAM,IAAI,YAAY,EAAE,CAAC;gBAClC,MAAM,QAAQ,GAAG,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;gBACvC,IAAI,QAAQ,EAAE,CAAC;oBACb,mDAAmD;oBACnD,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC;wBAC9C,QAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;oBACvC,CAAC;oBACD,kCAAkC;oBAClC,IAAI,QAAQ,CAAC,MAAM,KAAK,MAAM,IAAI,MAAM,KAAK,MAAM,EAAE,CAAC;wBACpD,QAAQ,CAAC,MAAM,GAAG,MAAM,CAAC;wBACzB,QAAQ,CAAC,cAAc,GAAG,cAAc,CAAC;oBAC3C,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,SAAS,CAAC,GAAG,CAAC,MAAM,EAAE;wBACpB,UAAU,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC;wBACxB,MAAM;wBACN,OAAO;wBACP,cAAc;qBACf,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;QAED,iDAAiD;QACjD,MAAM,YAAY,GAA2C,EAAE,CAAC;QAEhE,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,SAAS,EAAE,CAAC;YACvC,IAAI,MAAM,GAA2C,SAAS,CAAC;YAC/D,IAAI,UAA8B,CAAC;YACnC,IAAI,QAA4B,CAAC;YACjC,IAAI,MAA0B,CAAC;YAC/B,IAAI,KAAyB,CAAC;YAE9B,2EAA2E;YAC3E,MAAM,WAAW,GAAG,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;YAC9D,IAAI,WAAW,EAAE,CAAC;gBAChB,MAAM,GAAG,WAAW,CAAC,MAAM,CAAC;gBAC5B,UAAU,GAAG,WAAW,CAAC,UAAU,CAAC;gBACpC,QAAQ,GAAG,WAAW,CAAC,QAAQ,CAAC;gBAChC,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC;gBAC1B,IAAI,WAAW,CAAC,MAAM,EAAE,CAAC;oBACvB,MAAM,GAAG,WAAW,CAAC,MAAM,CAAC;gBAC9B,CAAC;YACH,CAAC;YAED,qDAAqD;YACrD,IAAI,MAAM,KAAK,SAAS,IAAI,IAAI,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACvD,IAAI,CAAC;oBACH,MAAM,UAAU,GAAG,MAAM,UAAU,CAAC,oBAAoB,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC;oBAC7E,IAAI,UAAU,EAAE,CAAC;wBACf,IAAI,UAAU,CAAC,UAAU;4BAAE,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;wBAC9D,IAAI,UAAU,CAAC,MAAM;4BAAE,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC;wBAClD,IAAI,UAAU,CAAC,QAAQ;4BAAE,QAAQ,GAAG,UAAU,CAAC,QAAQ,CAAC;wBACxD,IAAI,UAAU,CAAC,MAAM,KAAK,OAAO,IAAI,UAAU,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;4BACrE,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC;wBAC7B,CAAC;oBACH,CAAC;gBACH,CAAC;gBAAC,MAAM,CAAC;oBACP,wDAAwD;gBAC1D,CAAC;YACH,CAAC;YAED,gDAAgD;YAChD,IAAI,MAAM,KAAK,SAAS,EAAE,CAAC;gBACzB,MAAM,WAAW,GAAG,MAAM,CAAC,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;gBACjD,IAAI,QAAQ,GAAG,MAAM,QAAQ,CAAC,cAAc,CAAC,OAAO,CAAC,UAAU,WAAW,EAAE,CAAC,CAAC;gBAC9E,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,0CAA0C;oBAC1C,QAAQ,GAAG,MAAM,QAAQ,CAAC,cAAc,CAAC,OAAO,CAAC,gBAAgB,MAAM,EAAE,CAAC,CAAC;gBAC7E,CAAC;gBACD,IAAI,QAAQ,EAAE,UAAU,EAAE,CAAC;oBACzB,UAAU,GAAG,IAAI,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC,WAAW,EAAE,CAAC;oBACzD,IAAI,QAAQ,CAAC,OAAO,EAAE,CAAC;wBACrB,QAAQ,GAAG,IAAI,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,WAAW,EAAE,CAAC;oBACtD,CAAC;oBACD,MAAM,GAAG,kBAAkB,CAAC;gBAC9B,CAAC;qBAAM,IAAI,QAAQ,EAAE,SAAS,EAAE,CAAC;oBAC/B,gDAAgD;oBAChD,IAAI,CAAC;wBACH,MAAM,IAAI,GAAG,IAAI,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;wBACpE,UAAU,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,WAAW,EAAE,CAAC;wBAClD,QAAQ,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,WAAW,EAAE,CAAC;oBACpD,CAAC;oBAAC,MAAM,CAAC,CAAC,wBAAwB,CAAC,CAAC;oBACpC,MAAM,GAAG,OAAO,CAAC;oBACjB,MAAM,GAAG,YAAY,CAAC;gBACxB,CAAC;qBAAM,IAAI,QAAQ,EAAE,CAAC;oBACpB,MAAM,GAAG,OAAO,CAAC;oBACjB,MAAM,GAAG,YAAY,CAAC;gBACxB,CAAC;YACH,CAAC;YAED,kCAAkC;YAClC,IAAI,UAAU,IAAI,CAAC,MAAM,KAAK,OAAO,IAAI,MAAM,KAAK,SAAS,CAAC,EAAE,CAAC;gBAC/D,MAAM,MAAM,GAAG,IAAI,IAAI,CAAC,UAAU,CAAC,CAAC;gBACpC,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;gBACvB,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC,GAAG,CAAC,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;gBAEnF,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;oBACxB,MAAM,GAAG,SAAS,CAAC;gBACrB,CAAC;qBAAM,IAAI,eAAe,GAAG,EAAE,EAAE,CAAC;oBAChC,MAAM,GAAG,UAAU,CAAC;gBACtB,CAAC;qBAAM,CAAC;oBACN,MAAM,GAAG,OAAO,CAAC;gBACnB,CAAC;YACH,CAAC;YAED,qDAAqD;YACrD,IAAI,IAAI,CAAC,MAAM,KAAK,QAAQ,IAAI,MAAM,KAAK,SAAS,EAAE,CAAC;gBACrD,MAAM,GAAG,OAAO,CAAC;YACnB,CAAC;YAED,0EAA0E;YAC1E,IAAI,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,MAAM,KAAK,MAAM,IAAI,IAAI,CAAC,MAAM,KAAK,oBAAoB,CAAC,EAAE,CAAC;gBAC7F,MAAM,GAAG,cAAc,CAAC;YAC1B,CAAC;YAED,+BAA+B;YAC/B,IAAI,WAAgE,CAAC;YACrE,IAAI,QAAQ,CAAC,sBAAsB,EAAE,CAAC;gBACpC,MAAM,EAAE,GAAG,MAAM,QAAQ,CAAC,sBAAsB,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBACxE,IAAI,EAAE,EAAE,CAAC;oBACP,WAAW,GAAG,EAAE,CAAC;gBACnB,CAAC;YACH,CAAC;YAED,YAAY,CAAC,IAAI,CAAC;gBAChB,MAAM;gBACN,UAAU,EAAE,IAAI,CAAC,UAAU;gBAC3B,MAAM;gBACN,MAAM,EAAE,IAAI,CAAC,MAAM;gBACnB,OAAO,EAAE,IAAI,CAAC,OAAO;gBACrB,UAAU;gBACV,MAAM;gBACN,QAAQ;gBACR,KAAK;gBACL,cAAc,EAAE,IAAI,CAAC,cAAc;gBACnC,WAAW;aACZ,CAAC,CAAC;QACL,CAAC;QAED,OAAO,YAAY,CAAC;IACtB,CAAC;IAEO,YAAY,CAAC,YAAoD;QAQvE,MAAM,OAAO,GAAG,EAAE,KAAK,EAAE,CAAC,EAAE,KAAK,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,CAAC;QACvF,OAAO,CAAC,KAAK,GAAG,YAAY,CAAC,MAAM,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE,CAAC;YAChC,QAAQ,IAAI,CAAC,MAAM,EAAE,CAAC;gBACpB,KAAK,OAAO;oBAAE,OAAO,CAAC,KAAK,EAAE,CAAC;oBAAC,MAAM;gBACrC,KAAK,UAAU;oBAAE,OAAO,CAAC,QAAQ,EAAE,CAAC;oBAAC,MAAM;gBAC3C,KAAK,SAAS;oBAAE,OAAO,CAAC,OAAO,EAAE,CAAC;oBAAC,MAAM;gBACzC,KAAK,QAAQ;oBAAE,OAAO,CAAC,MAAM,EAAE,CAAC;oBAAC,MAAM;gBACvC,KAAK,cAAc,CAAC,CAAC,mBAAmB;gBACxC,KAAK,SAAS;oBAAE,OAAO,CAAC,OAAO,EAAE,CAAC;oBAAC,MAAM;YAC3C,CAAC;QACH,CAAC;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,6BAA6B,CAAC,SAAiB;QAC3D,MAAM,QAAQ,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAC/C,MAAM,UAAU,GAAG,QAAQ,CAAC,UAAU,CAAC;QAEvC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;QAClE,CAAC;QAED,IAAI,CAAC;YACH,MAAM,UAAU,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;YACjD,qDAAqD;YACrD,KAAK,MAAM,CAAC,MAAM,EAAE,KAAK,CAAC,IAAI,QAAQ,CAAC,oBAAoB,EAAE,CAAC;gBAC5D,IAAI,KAAK,CAAC,UAAU,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;oBACzC,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;gBAC/C,CAAC;YACH,CAAC;YACD,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,mDAAmD,SAAS,GAAG,EAAE,CAAC;QACrG,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,CAAC,OAAO,IAAI,mCAAmC,EAAE,CAAC;QACzF,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,MAAc;QACvD,MAAM,QAAQ,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAC/C,MAAM,UAAU,GAAG,QAAQ,CAAC,UAAU,CAAC;QAEvC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;QAClE,CAAC;QAED,gDAAgD;QAChD,IAAI,QAAQ,CAAC,sBAAsB,EAAE,CAAC;YACpC,MAAM,QAAQ,CAAC,sBAAsB,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;QAC7D,CAAC;QAED,8CAA8C;QAC9C,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;QAE7C,0CAA0C;QAC1C,IAAI,QAAQ,CAAC,SAAS,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,MAAM,QAAQ,CAAC,SAAS,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;gBACzD,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,oDAAoD,MAAM,GAAG,EAAE,CAAC;YACnG,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,CAAC,OAAO,IAAI,yCAAyC,MAAM,EAAE,EAAE,CAAC;YACvG,CAAC;QACH,CAAC;QAED,0DAA0D;QAC1D,MAAM,UAAU,GAAG,QAAQ,CAAC,uBAAuB,CAAC,MAAM,CAAC,CAAC;QAC5D,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1B,IAAI,CAAC;gBACH,MAAM,UAAU,CAAC,oBAAoB,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC;gBACrD,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,oDAAoD,MAAM,gBAAgB,UAAU,CAAC,CAAC,CAAC,GAAG,EAAE,CAAC;YAChI,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,CAAC,OAAO,IAAI,yCAAyC,MAAM,EAAE,EAAE,CAAC;YACvG,CAAC;QACH,CAAC;QAED,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,+BAA+B,MAAM,GAAG,EAAE,CAAC;IAC/E,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,MAAc;QAC5C,MAAM,QAAQ,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAC/C,MAAM,WAAW,GAAG,MAAM,CAAC,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QAEjD,sCAAsC;QACtC,MAAM,KAAK,GAAG;YACZ,gBAAgB,MAAM,EAAE;YACxB,gBAAgB,WAAW,EAAE;YAC7B,UAAU,WAAW,EAAE;SACxB,CAAC;QAEF,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;YACzB,IAAI,CAAC;gBACH,MAAM,QAAQ,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;YAC7C,CAAC;YAAC,MAAM,CAAC;gBACP,8BAA8B;YAChC,CAAC;QACH,CAAC;QAED,kCAAkC;QAClC,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;QAE7C,qBAAqB;QACrB,IAAI,QAAQ,CAAC,sBAAsB,EAAE,CAAC;YACpC,MAAM,QAAQ,CAAC,sBAAsB,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;QAC7D,CAAC;QAED,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,iCAAiC,MAAM,GAAG,EAAE,CAAC;IAChF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,MAAc;QAa5C,MAAM,QAAQ,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAC/C,MAAM,WAAW,GAAG,MAAM,CAAC,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QAEjD,2DAA2D;QAC3D,IAAI,QAAQ,GAAG,MAAM,QAAQ,CAAC,cAAc,CAAC,OAAO,CAAC,UAAU,WAAW,EAAE,CAAC,CAAC;QAC9E,IAAI,QAAQ,IAAI,QAAQ,CAAC,SAAS,IAAI,QAAQ,CAAC,UAAU,EAAE,CAAC;YAC1D,OAAO;gBACL,OAAO,EAAE,IAAI;gBACb,IAAI,EAAE;oBACJ,EAAE,EAAE,QAAQ,CAAC,EAAE,IAAI,OAAO,CAAC,MAAM,CAAC,UAAU,EAAE;oBAC9C,UAAU,EAAE,QAAQ,CAAC,UAAU,IAAI,MAAM;oBACzC,OAAO,EAAE,QAAQ,CAAC,OAAO,IAAI,IAAI,CAAC,GAAG,EAAE;oBACvC,UAAU,EAAE,QAAQ,CAAC,UAAU,IAAI,CAAC;oBACpC,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,SAAS,EAAE,QAAQ,CAAC,SAAS;oBAC7B,GAAG,EAAE,QAAQ,CAAC,GAAG,IAAI,EAAE;iBACxB;aACF,CAAC;QACJ,CAAC;QAED,mDAAmD;QACnD,QAAQ,GAAG,MAAM,QAAQ,CAAC,cAAc,CAAC,OAAO,CAAC,gBAAgB,MAAM,EAAE,CAAC,CAAC;QAC3E,IAAI,CAAC,QAAQ,IAAI,CAAC,QAAQ,CAAC,SAAS,EAAE,CAAC;YACrC,wBAAwB;YACxB,QAAQ,GAAG,MAAM,QAAQ,CAAC,cAAc,CAAC,OAAO,CAAC,gBAAgB,WAAW,EAAE,CAAC,CAAC;QAClF,CAAC;QAED,IAAI,QAAQ,IAAI,QAAQ,CAAC,SAAS,IAAI,QAAQ,CAAC,UAAU,EAAE,CAAC;YAC1D,OAAO;gBACL,OAAO,EAAE,IAAI;gBACb,IAAI,EAAE;oBACJ,EAAE,EAAE,OAAO,CAAC,MAAM,CAAC,UAAU,EAAE;oBAC/B,UAAU,EAAE,MAAM;oBAClB,OAAO,EAAE,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,GAAG,EAAE;oBACzC,UAAU,EAAE,QAAQ,CAAC,UAAU,IAAI,CAAC;oBACpC,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,SAAS,EAAE,QAAQ,CAAC,SAAS;oBAC7B,GAAG,EAAE,EAAE;iBACR;aACF,CAAC;QACJ,CAAC;QAED,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,kCAAkC,MAAM,GAAG,EAAE,CAAC;IAClF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,iBAAiB,CAAC,IAQ/B;QACC,uBAAuB;QACvB,IAAI,CAAC,IAAI,CAAC,SAAS,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;YAC/E,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,2DAA2D,EAAE,CAAC;QAClG,CAAC;QACD,IAAI,CAAC,IAAI,CAAC,UAAU,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,YAAY,CAAC,EAAE,CAAC;YAChE,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,oDAAoD,EAAE,CAAC;QAC3F,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC;QAC/C,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QAE1D,8CAA8C;QAC9C,MAAM,QAAQ,CAAC,cAAc,CAAC,OAAO,CAAC,UAAU,WAAW,EAAE,EAAE;YAC7D,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,GAAG,EAAE,IAAI,CAAC,GAAG,IAAI,EAAE;SACpB,CAAC,CAAC;QAEH,iDAAiD;QACjD,MAAM,QAAQ,CAAC,cAAc,CAAC,OAAO,CAAC,gBAAgB,IAAI,CAAC,UAAU,EAAE,EAAE;YACvE,MAAM,EAAE,IAAI,CAAC,UAAU;YACvB,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,EAAE,EAAE,SAAS;YACb,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,SAAS,EAAE,IAAI,CAAC,OAAO;SACxB,CAAC,CAAC;QAEH,8BAA8B;QAC9B,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC,IAAI,CAAC,UAAU,EAAE;YACjD,MAAM,EAAE,OAAO;YACf,MAAM,EAAE,QAAQ;YAChB,UAAU,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC,SAAS;YACjF,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC,SAAS;YACzE,UAAU,EAAE,EAAE;SACf,CAAC,CAAC;QAEH,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,6BAA6B,IAAI,CAAC,UAAU,GAAG,EAAE,CAAC;IACrF,CAAC;CACF"}
@@ -0,0 +1,32 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import type { OpsServer } from '../classes.opsserver.js';
3
+ export declare class EmailOpsHandler {
4
+ private opsServerRef;
5
+ typedrouter: plugins.typedrequest.TypedRouter;
6
+ constructor(opsServerRef: OpsServer);
7
+ private registerHandlers;
8
+ /**
9
+ * Get all queue items mapped to catalog IEmail format
10
+ */
11
+ private getAllQueueEmails;
12
+ /**
13
+ * Get a single email detail by ID
14
+ */
15
+ private getEmailDetail;
16
+ /**
17
+ * Map a queue item to catalog IEmail format
18
+ */
19
+ private mapQueueItemToEmail;
20
+ /**
21
+ * Map a queue item to catalog IEmailDetail format
22
+ */
23
+ private mapQueueItemToEmailDetail;
24
+ /**
25
+ * Map queue status to catalog TEmailStatus
26
+ */
27
+ private mapStatus;
28
+ /**
29
+ * Format byte size to human-readable string
30
+ */
31
+ private formatSize;
32
+ }