@push.rocks/smartproxy
Version:
A powerful proxy package with unified route-based configuration for high traffic management. Features include SSL/TLS support, flexible routing patterns, WebSocket handling, advanced security options, and automatic ACME certificate management.
226 lines • 19.6 kB
JavaScript
import * as plugins from '../../../plugins.js';
import { TlsAlertLevel, TlsAlertDescription, TlsVersion } from '../utils/tls-utils.js';
/**
* TlsAlert class for creating and sending TLS alert messages
*/
export class TlsAlert {
// Use enum values from TlsAlertLevel
static { this.LEVEL_WARNING = TlsAlertLevel.WARNING; }
static { this.LEVEL_FATAL = TlsAlertLevel.FATAL; }
// Use enum values from TlsAlertDescription
static { this.CLOSE_NOTIFY = TlsAlertDescription.CLOSE_NOTIFY; }
static { this.UNEXPECTED_MESSAGE = TlsAlertDescription.UNEXPECTED_MESSAGE; }
static { this.BAD_RECORD_MAC = TlsAlertDescription.BAD_RECORD_MAC; }
static { this.DECRYPTION_FAILED = TlsAlertDescription.DECRYPTION_FAILED; }
static { this.RECORD_OVERFLOW = TlsAlertDescription.RECORD_OVERFLOW; }
static { this.DECOMPRESSION_FAILURE = TlsAlertDescription.DECOMPRESSION_FAILURE; }
static { this.HANDSHAKE_FAILURE = TlsAlertDescription.HANDSHAKE_FAILURE; }
static { this.NO_CERTIFICATE = TlsAlertDescription.NO_CERTIFICATE; }
static { this.BAD_CERTIFICATE = TlsAlertDescription.BAD_CERTIFICATE; }
static { this.UNSUPPORTED_CERTIFICATE = TlsAlertDescription.UNSUPPORTED_CERTIFICATE; }
static { this.CERTIFICATE_REVOKED = TlsAlertDescription.CERTIFICATE_REVOKED; }
static { this.CERTIFICATE_EXPIRED = TlsAlertDescription.CERTIFICATE_EXPIRED; }
static { this.CERTIFICATE_UNKNOWN = TlsAlertDescription.CERTIFICATE_UNKNOWN; }
static { this.ILLEGAL_PARAMETER = TlsAlertDescription.ILLEGAL_PARAMETER; }
static { this.UNKNOWN_CA = TlsAlertDescription.UNKNOWN_CA; }
static { this.ACCESS_DENIED = TlsAlertDescription.ACCESS_DENIED; }
static { this.DECODE_ERROR = TlsAlertDescription.DECODE_ERROR; }
static { this.DECRYPT_ERROR = TlsAlertDescription.DECRYPT_ERROR; }
static { this.EXPORT_RESTRICTION = TlsAlertDescription.EXPORT_RESTRICTION; }
static { this.PROTOCOL_VERSION = TlsAlertDescription.PROTOCOL_VERSION; }
static { this.INSUFFICIENT_SECURITY = TlsAlertDescription.INSUFFICIENT_SECURITY; }
static { this.INTERNAL_ERROR = TlsAlertDescription.INTERNAL_ERROR; }
static { this.INAPPROPRIATE_FALLBACK = TlsAlertDescription.INAPPROPRIATE_FALLBACK; }
static { this.USER_CANCELED = TlsAlertDescription.USER_CANCELED; }
static { this.NO_RENEGOTIATION = TlsAlertDescription.NO_RENEGOTIATION; }
static { this.MISSING_EXTENSION = TlsAlertDescription.MISSING_EXTENSION; }
static { this.UNSUPPORTED_EXTENSION = TlsAlertDescription.UNSUPPORTED_EXTENSION; }
static { this.CERTIFICATE_REQUIRED = TlsAlertDescription.CERTIFICATE_REQUIRED; }
static { this.UNRECOGNIZED_NAME = TlsAlertDescription.UNRECOGNIZED_NAME; }
static { this.BAD_CERTIFICATE_STATUS_RESPONSE = TlsAlertDescription.BAD_CERTIFICATE_STATUS_RESPONSE; }
static { this.BAD_CERTIFICATE_HASH_VALUE = TlsAlertDescription.BAD_CERTIFICATE_HASH_VALUE; }
static { this.UNKNOWN_PSK_IDENTITY = TlsAlertDescription.UNKNOWN_PSK_IDENTITY; }
static { this.CERTIFICATE_REQUIRED_1_3 = TlsAlertDescription.CERTIFICATE_REQUIRED_1_3; }
static { this.NO_APPLICATION_PROTOCOL = TlsAlertDescription.NO_APPLICATION_PROTOCOL; }
/**
* Create a TLS alert buffer with the specified level and description code
*
* @param level Alert level (warning or fatal)
* @param description Alert description code
* @param tlsVersion TLS version bytes (default is TLS 1.2: 0x0303)
* @returns Buffer containing the TLS alert message
*/
static create(level, description, tlsVersion = [TlsVersion.TLS1_2[0], TlsVersion.TLS1_2[1]]) {
return Buffer.from([
0x15, // Alert record type
tlsVersion[0],
tlsVersion[1], // TLS version (default to TLS 1.2: 0x0303)
0x00,
0x02, // Length
level, // Alert level
description, // Alert description
]);
}
/**
* Create a warning-level TLS alert
*
* @param description Alert description code
* @returns Buffer containing the warning-level TLS alert message
*/
static createWarning(description) {
return this.create(this.LEVEL_WARNING, description);
}
/**
* Create a fatal-level TLS alert
*
* @param description Alert description code
* @returns Buffer containing the fatal-level TLS alert message
*/
static createFatal(description) {
return this.create(this.LEVEL_FATAL, description);
}
/**
* Send a TLS alert to a socket and optionally close the connection
*
* @param socket The socket to send the alert to
* @param level Alert level (warning or fatal)
* @param description Alert description code
* @param closeAfterSend Whether to close the connection after sending the alert
* @param closeDelay Milliseconds to wait before closing the connection (default: 200ms)
* @returns Promise that resolves when the alert has been sent
*/
static async send(socket, level, description, closeAfterSend = false, closeDelay = 200) {
const alert = this.create(level, description);
return new Promise((resolve, reject) => {
try {
// Ensure the alert is written as a single packet
socket.cork();
const writeSuccessful = socket.write(alert, (err) => {
if (err) {
reject(err);
return;
}
if (closeAfterSend) {
setTimeout(() => {
socket.end();
resolve();
}, closeDelay);
}
else {
resolve();
}
});
socket.uncork();
// If write wasn't successful immediately, wait for drain
if (!writeSuccessful && !closeAfterSend) {
socket.once('drain', () => {
resolve();
});
}
}
catch (err) {
reject(err);
}
});
}
/**
* Pre-defined TLS alert messages
*/
static { this.alerts = {
// Warning level alerts
closeNotify: TlsAlert.createWarning(TlsAlert.CLOSE_NOTIFY),
unsupportedExtension: TlsAlert.createWarning(TlsAlert.UNSUPPORTED_EXTENSION),
certificateRequired: TlsAlert.createWarning(TlsAlert.CERTIFICATE_REQUIRED),
unrecognizedName: TlsAlert.createWarning(TlsAlert.UNRECOGNIZED_NAME),
noRenegotiation: TlsAlert.createWarning(TlsAlert.NO_RENEGOTIATION),
userCanceled: TlsAlert.createWarning(TlsAlert.USER_CANCELED),
// Warning level alerts for session resumption
certificateExpiredWarning: TlsAlert.createWarning(TlsAlert.CERTIFICATE_EXPIRED),
handshakeFailureWarning: TlsAlert.createWarning(TlsAlert.HANDSHAKE_FAILURE),
insufficientSecurityWarning: TlsAlert.createWarning(TlsAlert.INSUFFICIENT_SECURITY),
// Fatal level alerts
unexpectedMessage: TlsAlert.createFatal(TlsAlert.UNEXPECTED_MESSAGE),
badRecordMac: TlsAlert.createFatal(TlsAlert.BAD_RECORD_MAC),
recordOverflow: TlsAlert.createFatal(TlsAlert.RECORD_OVERFLOW),
handshakeFailure: TlsAlert.createFatal(TlsAlert.HANDSHAKE_FAILURE),
badCertificate: TlsAlert.createFatal(TlsAlert.BAD_CERTIFICATE),
certificateExpired: TlsAlert.createFatal(TlsAlert.CERTIFICATE_EXPIRED),
certificateUnknown: TlsAlert.createFatal(TlsAlert.CERTIFICATE_UNKNOWN),
illegalParameter: TlsAlert.createFatal(TlsAlert.ILLEGAL_PARAMETER),
unknownCA: TlsAlert.createFatal(TlsAlert.UNKNOWN_CA),
accessDenied: TlsAlert.createFatal(TlsAlert.ACCESS_DENIED),
decodeError: TlsAlert.createFatal(TlsAlert.DECODE_ERROR),
decryptError: TlsAlert.createFatal(TlsAlert.DECRYPT_ERROR),
protocolVersion: TlsAlert.createFatal(TlsAlert.PROTOCOL_VERSION),
insufficientSecurity: TlsAlert.createFatal(TlsAlert.INSUFFICIENT_SECURITY),
internalError: TlsAlert.createFatal(TlsAlert.INTERNAL_ERROR),
unrecognizedNameFatal: TlsAlert.createFatal(TlsAlert.UNRECOGNIZED_NAME),
}; }
/**
* Utility method to send a warning-level unrecognized_name alert
* Specifically designed for SNI issues to encourage the client to retry with SNI
*
* @param socket The socket to send the alert to
* @returns Promise that resolves when the alert has been sent
*/
static async sendSniRequired(socket) {
return this.send(socket, this.LEVEL_WARNING, this.UNRECOGNIZED_NAME);
}
/**
* Utility method to send a close_notify alert and close the connection
*
* @param socket The socket to send the alert to
* @param closeDelay Milliseconds to wait before closing the connection (default: 200ms)
* @returns Promise that resolves when the alert has been sent and the connection closed
*/
static async sendCloseNotify(socket, closeDelay = 200) {
return this.send(socket, this.LEVEL_WARNING, this.CLOSE_NOTIFY, true, closeDelay);
}
/**
* Utility method to send a certificate_expired alert to force new TLS session
*
* @param socket The socket to send the alert to
* @param fatal Whether to send as a fatal alert (default: false)
* @param closeAfterSend Whether to close the connection after sending the alert (default: true)
* @param closeDelay Milliseconds to wait before closing the connection (default: 200ms)
* @returns Promise that resolves when the alert has been sent
*/
static async sendCertificateExpired(socket, fatal = false, closeAfterSend = true, closeDelay = 200) {
const level = fatal ? this.LEVEL_FATAL : this.LEVEL_WARNING;
return this.send(socket, level, this.CERTIFICATE_EXPIRED, closeAfterSend, closeDelay);
}
/**
* Send a sequence of alerts to force SNI from clients
* This combines multiple alerts to ensure maximum browser compatibility
*
* @param socket The socket to send the alerts to
* @returns Promise that resolves when all alerts have been sent
*/
static async sendForceSniSequence(socket) {
try {
// Send unrecognized_name (warning)
socket.cork();
socket.write(this.alerts.unrecognizedName);
socket.uncork();
// Give the socket time to send the alert
return new Promise((resolve) => {
setTimeout(resolve, 50);
});
}
catch (err) {
return Promise.reject(err);
}
}
/**
* Send a fatal level alert that immediately terminates the connection
*
* @param socket The socket to send the alert to
* @param description Alert description code
* @param closeDelay Milliseconds to wait before closing the connection (default: 100ms)
* @returns Promise that resolves when the alert has been sent and the connection closed
*/
static async sendFatalAndClose(socket, description, closeDelay = 100) {
return this.send(socket, this.LEVEL_FATAL, description, true, closeDelay);
}
}
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tls-alert.js","sourceRoot":"","sources":["../../../../ts/protocols/tls/alerts/tls-alert.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,qBAAqB,CAAC;AAC/C,OAAO,EAAE,aAAa,EAAE,mBAAmB,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AAEvF;;GAEG;AACH,MAAM,OAAO,QAAQ;IACnB,qCAAqC;aACrB,kBAAa,GAAG,aAAa,CAAC,OAAO,CAAC;aACtC,gBAAW,GAAG,aAAa,CAAC,KAAK,CAAC;IAElD,2CAA2C;aAC3B,iBAAY,GAAG,mBAAmB,CAAC,YAAY,CAAC;aAChD,uBAAkB,GAAG,mBAAmB,CAAC,kBAAkB,CAAC;aAC5D,mBAAc,GAAG,mBAAmB,CAAC,cAAc,CAAC;aACpD,sBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;aAC1D,oBAAe,GAAG,mBAAmB,CAAC,eAAe,CAAC;aACtD,0BAAqB,GAAG,mBAAmB,CAAC,qBAAqB,CAAC;aAClE,sBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;aAC1D,mBAAc,GAAG,mBAAmB,CAAC,cAAc,CAAC;aACpD,oBAAe,GAAG,mBAAmB,CAAC,eAAe,CAAC;aACtD,4BAAuB,GAAG,mBAAmB,CAAC,uBAAuB,CAAC;aACtE,wBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;aAC9D,wBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;aAC9D,wBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;aAC9D,sBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;aAC1D,eAAU,GAAG,mBAAmB,CAAC,UAAU,CAAC;aAC5C,kBAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;aAClD,iBAAY,GAAG,mBAAmB,CAAC,YAAY,CAAC;aAChD,kBAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;aAClD,uBAAkB,GAAG,mBAAmB,CAAC,kBAAkB,CAAC;aAC5D,qBAAgB,GAAG,mBAAmB,CAAC,gBAAgB,CAAC;aACxD,0BAAqB,GAAG,mBAAmB,CAAC,qBAAqB,CAAC;aAClE,mBAAc,GAAG,mBAAmB,CAAC,cAAc,CAAC;aACpD,2BAAsB,GAAG,mBAAmB,CAAC,sBAAsB,CAAC;aACpE,kBAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;aAClD,qBAAgB,GAAG,mBAAmB,CAAC,gBAAgB,CAAC;aACxD,sBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;aAC1D,0BAAqB,GAAG,mBAAmB,CAAC,qBAAqB,CAAC;aAClE,yBAAoB,GAAG,mBAAmB,CAAC,oBAAoB,CAAC;aAChE,sBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;aAC1D,oCAA+B,GAAG,mBAAmB,CAAC,+BAA+B,CAAC;aACtF,+BAA0B,GAAG,mBAAmB,CAAC,0BAA0B,CAAC;aAC5E,yBAAoB,GAAG,mBAAmB,CAAC,oBAAoB,CAAC;aAChE,6BAAwB,GAAG,mBAAmB,CAAC,wBAAwB,CAAC;aACxE,4BAAuB,GAAG,mBAAmB,CAAC,uBAAuB,CAAC;IAEtF;;;;;;;OAOG;IACH,MAAM,CAAC,MAAM,CACX,KAAa,EACb,WAAmB,EACnB,aAA+B,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;QAE3E,OAAO,MAAM,CAAC,IAAI,CAAC;YACjB,IAAI,EAAE,oBAAoB;YAC1B,UAAU,CAAC,CAAC,CAAC;YACb,UAAU,CAAC,CAAC,CAAC,EAAE,2CAA2C;YAC1D,IAAI;YACJ,IAAI,EAAE,SAAS;YACf,KAAK,EAAE,cAAc;YACrB,WAAW,EAAE,oBAAoB;SAClC,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,aAAa,CAAC,WAAmB;QACtC,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,EAAE,WAAW,CAAC,CAAC;IACtD,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,WAAW,CAAC,WAAmB;QACpC,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,EAAE,WAAW,CAAC,CAAC;IACpD,CAAC;IAED;;;;;;;;;OASG;IACH,MAAM,CAAC,KAAK,CAAC,IAAI,CACf,MAA0B,EAC1B,KAAa,EACb,WAAmB,EACnB,iBAA0B,KAAK,EAC/B,aAAqB,GAAG;QAExB,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,WAAW,CAAC,CAAC;QAE9C,OAAO,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAC3C,IAAI,CAAC;gBACH,iDAAiD;gBACjD,MAAM,CAAC,IAAI,EAAE,CAAC;gBACd,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,EAAE,CAAC,GAAG,EAAE,EAAE;oBAClD,IAAI,GAAG,EAAE,CAAC;wBACR,MAAM,CAAC,GAAG,CAAC,CAAC;wBACZ,OAAO;oBACT,CAAC;oBAED,IAAI,cAAc,EAAE,CAAC;wBACnB,UAAU,CAAC,GAAG,EAAE;4BACd,MAAM,CAAC,GAAG,EAAE,CAAC;4BACb,OAAO,EAAE,CAAC;wBACZ,CAAC,EAAE,UAAU,CAAC,CAAC;oBACjB,CAAC;yBAAM,CAAC;wBACN,OAAO,EAAE,CAAC;oBACZ,CAAC;gBACH,CAAC,CAAC,CAAC;gBACH,MAAM,CAAC,MAAM,EAAE,CAAC;gBAEhB,yDAAyD;gBACzD,IAAI,CAAC,eAAe,IAAI,CAAC,cAAc,EAAE,CAAC;oBACxC,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,EAAE;wBACxB,OAAO,EAAE,CAAC;oBACZ,CAAC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,MAAM,CAAC,GAAG,CAAC,CAAC;YACd,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;aACa,WAAM,GAAG;QACvB,uBAAuB;QACvB,WAAW,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,YAAY,CAAC;QAC1D,oBAAoB,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,qBAAqB,CAAC;QAC5E,mBAAmB,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,oBAAoB,CAAC;QAC1E,gBAAgB,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,iBAAiB,CAAC;QACpE,eAAe,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,gBAAgB,CAAC;QAClE,YAAY,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,aAAa,CAAC;QAE5D,8CAA8C;QAC9C,yBAAyB,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QAC/E,uBAAuB,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,iBAAiB,CAAC;QAC3E,2BAA2B,EAAE,QAAQ,CAAC,aAAa,CAAC,QAAQ,CAAC,qBAAqB,CAAC;QAEnF,qBAAqB;QACrB,iBAAiB,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,kBAAkB,CAAC;QACpE,YAAY,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,cAAc,CAAC;QAC3D,cAAc,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,eAAe,CAAC;QAC9D,gBAAgB,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,iBAAiB,CAAC;QAClE,cAAc,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,eAAe,CAAC;QAC9D,kBAAkB,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACtE,kBAAkB,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,mBAAmB,CAAC;QACtE,gBAAgB,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,iBAAiB,CAAC;QAClE,SAAS,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,UAAU,CAAC;QACpD,YAAY,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,aAAa,CAAC;QAC1D,WAAW,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,YAAY,CAAC;QACxD,YAAY,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,aAAa,CAAC;QAC1D,eAAe,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,gBAAgB,CAAC;QAChE,oBAAoB,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,qBAAqB,CAAC;QAC1E,aAAa,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,cAAc,CAAC;QAC5D,qBAAqB,EAAE,QAAQ,CAAC,WAAW,CAAC,QAAQ,CAAC,iBAAiB,CAAC;KACxE,CAAC;IAEF;;;;;;OAMG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,MAA0B;QACrD,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,aAAa,EAAE,IAAI,CAAC,iBAAiB,CAAC,CAAC;IACvE,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,MAA0B,EAAE,aAAqB,GAAG;QAC/E,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,aAAa,EAAE,IAAI,CAAC,YAAY,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC;IACpF,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,KAAK,CAAC,sBAAsB,CACjC,MAA0B,EAC1B,QAAiB,KAAK,EACtB,iBAA0B,IAAI,EAC9B,aAAqB,GAAG;QAExB,MAAM,KAAK,GAAG,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC;QAC5D,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,EAAE,IAAI,CAAC,mBAAmB,EAAE,cAAc,EAAE,UAAU,CAAC,CAAC;IACxF,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,KAAK,CAAC,oBAAoB,CAAC,MAA0B;QAC1D,IAAI,CAAC;YACH,mCAAmC;YACnC,MAAM,CAAC,IAAI,EAAE,CAAC;YACd,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC;YAC3C,MAAM,CAAC,MAAM,EAAE,CAAC;YAEhB,yCAAyC;YACzC,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;gBAC7B,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;YAC1B,CAAC,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAC7B,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,MAA0B,EAC1B,WAAmB,EACnB,aAAqB,GAAG;QAExB,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,WAAW,EAAE,WAAW,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC;IAC5E,CAAC"}