Files
smartmta/dist_ts/mail/delivery/smtpserver/certificate-utils.js
2026-02-10 15:54:09 +00:00

345 lines
27 KiB
JavaScript

/**
* Certificate Utilities for SMTP Server
* Provides utilities for managing TLS certificates
*/
import * as fs from 'fs';
import * as tls from 'tls';
import { SmtpLogger } from './utils/logging.js';
/**
* Normalize a PEM certificate string
* @param str - Certificate string
* @returns Normalized certificate string
*/
function normalizeCertificate(str) {
// Handle different input types
let inputStr;
if (Buffer.isBuffer(str)) {
// Convert Buffer to string using utf8 encoding
inputStr = str.toString('utf8');
}
else if (typeof str === 'string') {
inputStr = str;
}
else {
throw new Error('Certificate must be a string or Buffer');
}
if (!inputStr) {
throw new Error('Empty certificate data');
}
// Remove any whitespace around the string
let normalizedStr = inputStr.trim();
// Make sure it has proper PEM format
if (!normalizedStr.includes('-----BEGIN ')) {
throw new Error('Invalid certificate format: Missing BEGIN marker');
}
if (!normalizedStr.includes('-----END ')) {
throw new Error('Invalid certificate format: Missing END marker');
}
// Normalize line endings (replace Windows-style \r\n with Unix-style \n)
normalizedStr = normalizedStr.replace(/\r\n/g, '\n');
// Only normalize if the certificate appears to have formatting issues
// Check if the certificate is already properly formatted
const lines = normalizedStr.split('\n');
let needsReformatting = false;
// Check for common formatting issues:
// 1. Missing line breaks after header/before footer
// 2. Lines that are too long or too short (except header/footer)
// 3. Multiple consecutive blank lines
for (let i = 0; i < lines.length; i++) {
const line = lines[i].trim();
if (line.startsWith('-----BEGIN ') || line.startsWith('-----END ')) {
continue; // Skip header/footer lines
}
if (line.length === 0) {
continue; // Skip empty lines
}
// Check if content lines are reasonable length (base64 is typically 64 chars per line)
if (line.length > 76) { // Allow some flexibility beyond standard 64
needsReformatting = true;
break;
}
}
// Only reformat if necessary
if (needsReformatting) {
const beginMatch = normalizedStr.match(/^(-----BEGIN [^-]+-----)(.*)$/s);
const endMatch = normalizedStr.match(/(.*)(-----END [^-]+-----)$/s);
if (beginMatch && endMatch) {
const header = beginMatch[1];
const footer = endMatch[2];
let content = normalizedStr.substring(header.length, normalizedStr.length - footer.length);
// Clean up only line breaks and carriage returns, preserve base64 content
content = content.replace(/[\n\r]/g, '').trim();
// Add proper line breaks (every 64 characters)
let formattedContent = '';
for (let i = 0; i < content.length; i += 64) {
formattedContent += content.substring(i, Math.min(i + 64, content.length)) + '\n';
}
// Reconstruct the certificate
return header + '\n' + formattedContent + footer;
}
}
return normalizedStr;
}
/**
* Load certificates from PEM format strings
* @param options - Certificate options
* @returns Certificate data with Buffer format
*/
export function loadCertificatesFromString(options) {
try {
// First try to use certificates without normalization
try {
let keyStr;
let certStr;
let caStr;
// Convert inputs to strings without aggressive normalization
if (Buffer.isBuffer(options.key)) {
keyStr = options.key.toString('utf8');
}
else {
keyStr = options.key;
}
if (Buffer.isBuffer(options.cert)) {
certStr = options.cert.toString('utf8');
}
else {
certStr = options.cert;
}
if (options.ca) {
if (Buffer.isBuffer(options.ca)) {
caStr = options.ca.toString('utf8');
}
else {
caStr = options.ca;
}
}
// Simple cleanup - only normalize line endings
keyStr = keyStr.trim().replace(/\r\n/g, '\n');
certStr = certStr.trim().replace(/\r\n/g, '\n');
if (caStr) {
caStr = caStr.trim().replace(/\r\n/g, '\n');
}
// Convert to buffers
const keyBuffer = Buffer.from(keyStr, 'utf8');
const certBuffer = Buffer.from(certStr, 'utf8');
const caBuffer = caStr ? Buffer.from(caStr, 'utf8') : undefined;
// Test the certificates first
const secureContext = tls.createSecureContext({
key: keyBuffer,
cert: certBuffer,
ca: caBuffer
});
SmtpLogger.info('Successfully validated certificates without normalization');
return {
key: keyBuffer,
cert: certBuffer,
ca: caBuffer
};
}
catch (simpleError) {
SmtpLogger.warn(`Simple certificate loading failed, trying normalization: ${simpleError instanceof Error ? simpleError.message : String(simpleError)}`);
// DEBUG: Log certificate details when simple loading fails
SmtpLogger.warn('Certificate loading failure details', {
keyType: typeof options.key,
certType: typeof options.cert,
keyIsBuffer: Buffer.isBuffer(options.key),
certIsBuffer: Buffer.isBuffer(options.cert),
keyLength: options.key ? options.key.length : 0,
certLength: options.cert ? options.cert.length : 0,
keyPreview: options.key ? (typeof options.key === 'string' ? options.key.substring(0, 50) : options.key.toString('utf8').substring(0, 50)) : 'null',
certPreview: options.cert ? (typeof options.cert === 'string' ? options.cert.substring(0, 50) : options.cert.toString('utf8').substring(0, 50)) : 'null'
});
}
// Fallback: Try to fix and normalize certificates
try {
// Normalize certificates (handles both string and Buffer inputs)
const key = normalizeCertificate(options.key);
const cert = normalizeCertificate(options.cert);
const ca = options.ca ? normalizeCertificate(options.ca) : undefined;
// Convert normalized strings to Buffer with explicit utf8 encoding
const keyBuffer = Buffer.from(key, 'utf8');
const certBuffer = Buffer.from(cert, 'utf8');
const caBuffer = ca ? Buffer.from(ca, 'utf8') : undefined;
// Log for debugging
SmtpLogger.debug('Certificate properties', {
keyLength: keyBuffer.length,
certLength: certBuffer.length,
caLength: caBuffer ? caBuffer.length : 0
});
// Validate the certificates by attempting to create a secure context
try {
const secureContext = tls.createSecureContext({
key: keyBuffer,
cert: certBuffer,
ca: caBuffer
});
// If createSecureContext doesn't throw, the certificates are valid
SmtpLogger.info('Successfully validated certificate format');
}
catch (validationError) {
// Log detailed error information for debugging
SmtpLogger.error(`Certificate validation error: ${validationError instanceof Error ? validationError.message : String(validationError)}`);
SmtpLogger.debug('Certificate validation details', {
keyPreview: keyBuffer.toString('utf8').substring(0, 100) + '...',
certPreview: certBuffer.toString('utf8').substring(0, 100) + '...',
keyLength: keyBuffer.length,
certLength: certBuffer.length
});
throw validationError;
}
return {
key: keyBuffer,
cert: certBuffer,
ca: caBuffer
};
}
catch (innerError) {
SmtpLogger.warn(`Certificate normalization failed: ${innerError instanceof Error ? innerError.message : String(innerError)}`);
throw innerError;
}
}
catch (error) {
SmtpLogger.error(`Error loading certificates: ${error instanceof Error ? error.message : String(error)}`);
throw error;
}
}
/**
* Load certificates from files
* @param options - Certificate file paths
* @returns Certificate data with Buffer format
*/
export function loadCertificatesFromFiles(options) {
try {
// Read files directly as Buffers
const key = fs.readFileSync(options.keyPath);
const cert = fs.readFileSync(options.certPath);
const ca = options.caPath ? fs.readFileSync(options.caPath) : undefined;
// Log for debugging
SmtpLogger.debug('Certificate file properties', {
keyLength: key.length,
certLength: cert.length,
caLength: ca ? ca.length : 0
});
// Validate the certificates by attempting to create a secure context
try {
const secureContext = tls.createSecureContext({
key,
cert,
ca
});
// If createSecureContext doesn't throw, the certificates are valid
SmtpLogger.info('Successfully validated certificate files');
}
catch (validationError) {
SmtpLogger.error(`Certificate file validation error: ${validationError instanceof Error ? validationError.message : String(validationError)}`);
throw validationError;
}
return {
key,
cert,
ca
};
}
catch (error) {
SmtpLogger.error(`Error loading certificate files: ${error instanceof Error ? error.message : String(error)}`);
throw error;
}
}
/**
* Generate self-signed certificates for testing
* @returns Certificate data with Buffer format
*/
export function generateSelfSignedCertificates() {
// This is for fallback/testing only - log a warning
SmtpLogger.warn('Generating self-signed certificates for testing - DO NOT USE IN PRODUCTION');
// Create selfsigned certificates using node-forge or similar library
// For now, use hardcoded certificates as a last resort
const key = Buffer.from(`-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----`, 'utf8');
const cert = Buffer.from(`-----BEGIN CERTIFICATE-----
MIIDCTCCAfGgAwIBAgIUHxmGQOQoiSbzqh6hIe+7h9xDXIUwDQYJKoZIhvcNAQEL
BQAwFDESMBAGA1UEAwwJbG9jYWxob3N0MB4XDTI1MDUyMTE2MDAzM1oXDTI2MDUy
MTE2MDAzM1owFDESMBAGA1UEAwwJbG9jYWxob3N0MIIBIjANBgkqhkiG9w0BAQEF
AAOCAQ8AMIIBCgKCAQEAxICVtR3STwAhgYn6C9zwfh3QFQNp1JjH6uNyWyFD1xk8
Qrc5kIbldOFoyE8BcNZaD8d0Xh4eCkeciwOV3FwHR4brjJgcnRwI7+5iJkf1ZLiv
0sE9EORv/fzOeaOh1DaJdFCrfrmbgdgOUm62WNQOB2hq0kggjh/S1K+TBfF+8QFs
XQyW7y7mHecNgCgK/pI5b1irdajRc7nLvzM/U8qNn4jjrLsRoYqBPpn7aLKIBrmN
pNSIe18q8EYWkdmWBcnsZpAYv75SJG8E0lAYpMv9OEUIwsPh7AYUdkZqKtFxVxV5
bYlA5ZfnVnWrWEwRXaVdFFRXIjP+EFkGYYWThbvAIb0TPQIDAQABo1MwUTAdBgNV
HQ4EFgQUiW1MoYR8YK9KJTyip5oFoUVJoCgwHwYDVR0jBBgwFoAUiW1MoYR8YK9K
JTyip5oFoUVJoCgwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEA
BToM8SbUQXwJ9rTlQB2QI2GJaFwTpCFoQZwGUOCkwGLM3nOPLEbNPMDoIKGPwenB
P1xL8uJEgYRqP6UG/xy3HsxYsLCxuoxGGP2QjuiQKnFl0n85usZ5flCxmLC5IzYx
FLcR6WPTdj6b5JX0tM8Bi6toQ9Pj3u3dSVPZKRLYvJvZKt1PXI8qsHD/LvNa2wGG
Zi1BQFAr2cScNYa+p6IYDJi9TBNxoBIHNTzQPfWaen4MHRJqUNZCzQXcOnU/NW5G
+QqQSEMmk8yGucEHWUMFrEbABVgYuBslICEEtBZALB2jZJYSaJnPOJCcmFrxUv61
ORWZbz+8rBL0JIeA7eFxEA==
-----END CERTIFICATE-----`, 'utf8');
return {
key,
cert
};
}
/**
* Create TLS options for secure server or STARTTLS
* @param certificates - Certificate data
* @param isServer - Whether this is for server (true) or client (false)
* @returns TLS options
*/
export function createTlsOptions(certificates, isServer = true) {
const options = {
key: certificates.key,
cert: certificates.cert,
ca: certificates.ca,
// Support a wider range of TLS versions for better compatibility
minVersion: 'TLSv1', // Support older TLS versions (minimum TLS 1.0)
maxVersion: 'TLSv1.3', // Support latest TLS version (1.3)
// Cipher suites for broad compatibility
ciphers: 'HIGH:MEDIUM:!aNULL:!eNULL:!NULL:!ADH:!RC4',
// For testing, allow unauthorized (self-signed certs)
rejectUnauthorized: false,
// Longer handshake timeout for reliability
handshakeTimeout: 30000,
// TLS renegotiation option (removed - not supported in newer Node.js)
// Increase timeout for better reliability under test conditions
sessionTimeout: 600,
// Let the client choose the cipher for better compatibility
honorCipherOrder: false,
// For debugging
enableTrace: true,
// Disable secure options to allow more flexibility
secureOptions: 0
};
// Server-specific options
if (isServer) {
options.ALPNProtocols = ['smtp']; // Accept non-ALPN connections (legacy clients)
}
return options;
}
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate-utils.js","sourceRoot":"","sources":["../../../../ts/mail/delivery/smtpserver/certificate-utils.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,GAAG,MAAM,KAAK,CAAC;AAC3B,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAWhD;;;;GAIG;AACH,SAAS,oBAAoB,CAAC,GAAoB;IAChD,+BAA+B;IAC/B,IAAI,QAAgB,CAAC;IAErB,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;QACzB,+CAA+C;QAC/C,QAAQ,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAClC,CAAC;SAAM,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;QACnC,QAAQ,GAAG,GAAG,CAAC;IACjB,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;IAC5D,CAAC;IAED,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;IAC5C,CAAC;IAED,0CAA0C;IAC1C,IAAI,aAAa,GAAG,QAAQ,CAAC,IAAI,EAAE,CAAC;IAEpC,qCAAqC;IACrC,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;QAC3C,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;IACtE,CAAC;IAED,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;QACzC,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;IACpE,CAAC;IAED,yEAAyE;IACzE,aAAa,GAAG,aAAa,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;IAErD,sEAAsE;IACtE,yDAAyD;IACzD,MAAM,KAAK,GAAG,aAAa,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IACxC,IAAI,iBAAiB,GAAG,KAAK,CAAC;IAE9B,sCAAsC;IACtC,oDAAoD;IACpD,iEAAiE;IACjE,sCAAsC;IACtC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;QACtC,MAAM,IAAI,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC;QAC7B,IAAI,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YACnE,SAAS,CAAC,2BAA2B;QACvC,CAAC;QACD,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,SAAS,CAAC,mBAAmB;QAC/B,CAAC;QACD,uFAAuF;QACvF,IAAI,IAAI,CAAC,MAAM,GAAG,EAAE,EAAE,CAAC,CAAC,4CAA4C;YAClE,iBAAiB,GAAG,IAAI,CAAC;YACzB,MAAM;QACR,CAAC;IACH,CAAC;IAED,6BAA6B;IAC7B,IAAI,iBAAiB,EAAE,CAAC;QACtB,MAAM,UAAU,GAAG,aAAa,CAAC,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACzE,MAAM,QAAQ,GAAG,aAAa,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC;QAEpE,IAAI,UAAU,IAAI,QAAQ,EAAE,CAAC;YAC3B,MAAM,MAAM,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;YAC7B,MAAM,MAAM,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAC;YAC3B,IAAI,OAAO,GAAG,aAAa,CAAC,SAAS,CAAC,MAAM,CAAC,MAAM,EAAE,aAAa,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC;YAE3F,0EAA0E;YAC1E,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC,IAAI,EAAE,CAAC;YAEhD,+CAA+C;YAC/C,IAAI,gBAAgB,GAAG,EAAE,CAAC;YAC1B,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,OAAO,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC;gBAC5C,gBAAgB,IAAI,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC,GAAG,IAAI,CAAC;YACpF,CAAC;YAED,8BAA8B;YAC9B,OAAO,MAAM,GAAG,IAAI,GAAG,gBAAgB,GAAG,MAAM,CAAC;QACnD,CAAC;IACH,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED;;;;GAIG;AACH,MAAM,UAAU,0BAA0B,CAAC,OAI1C;IACC,IAAI,CAAC;QACH,sDAAsD;QACtD,IAAI,CAAC;YACH,IAAI,MAAc,CAAC;YACnB,IAAI,OAAe,CAAC;YACpB,IAAI,KAAyB,CAAC;YAE9B,6DAA6D;YAC7D,IAAI,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC;gBACjC,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACxC,CAAC;iBAAM,CAAC;gBACN,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC;YACvB,CAAC;YAED,IAAI,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBAClC,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAC1C,CAAC;iBAAM,CAAC;gBACN,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC;YACzB,CAAC;YAED,IAAI,OAAO,CAAC,EAAE,EAAE,CAAC;gBACf,IAAI,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC,EAAE,CAAC;oBAChC,KAAK,GAAG,OAAO,CAAC,EAAE,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;gBACtC,CAAC;qBAAM,CAAC;oBACN,KAAK,GAAG,OAAO,CAAC,EAAE,CAAC;gBACrB,CAAC;YACH,CAAC;YAED,+CAA+C;YAC/C,MAAM,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;YAC9C,OAAO,GAAG,OAAO,CAAC,IAAI,EAAE,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;YAChD,IAAI,KAAK,EAAE,CAAC;gBACV,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;YAC9C,CAAC;YAED,qBAAqB;YACrB,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAC9C,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;YAChD,MAAM,QAAQ,GAAG,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAEhE,8BAA8B;YAC9B,MAAM,aAAa,GAAG,GAAG,CAAC,mBAAmB,CAAC;gBAC5C,GAAG,EAAE,SAAS;gBACd,IAAI,EAAE,UAAU;gBAChB,EAAE,EAAE,QAAQ;aACb,CAAC,CAAC;YAEH,UAAU,CAAC,IAAI,CAAC,2DAA2D,CAAC,CAAC;YAE7E,OAAO;gBACL,GAAG,EAAE,SAAS;gBACd,IAAI,EAAE,UAAU;gBAChB,EAAE,EAAE,QAAQ;aACb,CAAC;QAEJ,CAAC;QAAC,OAAO,WAAW,EAAE,CAAC;YACrB,UAAU,CAAC,IAAI,CAAC,4DAA4D,WAAW,YAAY,KAAK,CAAC,CAAC,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC;YAExJ,2DAA2D;YAC3D,UAAU,CAAC,IAAI,CAAC,qCAAqC,EAAE;gBACrD,OAAO,EAAE,OAAO,OAAO,CAAC,GAAG;gBAC3B,QAAQ,EAAE,OAAO,OAAO,CAAC,IAAI;gBAC7B,WAAW,EAAE,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,CAAC;gBACzC,YAAY,EAAE,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC;gBAC3C,SAAS,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/C,UAAU,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;gBAClD,UAAU,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,OAAO,OAAO,CAAC,GAAG,KAAK,QAAQ,CAAC,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM;gBACnJ,WAAW,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,OAAO,OAAO,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM;aACzJ,CAAC,CAAC;QACL,CAAC;QAED,kDAAkD;QAClD,IAAI,CAAC;YACH,iEAAiE;YACjE,MAAM,GAAG,GAAG,oBAAoB,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YAC9C,MAAM,IAAI,GAAG,oBAAoB,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAChD,MAAM,EAAE,GAAG,OAAO,CAAC,EAAE,CAAC,CAAC,CAAC,oBAAoB,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAErE,mEAAmE;YACnE,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;YAC3C,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC;YAC7C,MAAM,QAAQ,GAAG,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAE1D,oBAAoB;YACpB,UAAU,CAAC,KAAK,CAAC,wBAAwB,EAAE;gBACzC,SAAS,EAAE,SAAS,CAAC,MAAM;gBAC3B,UAAU,EAAE,UAAU,CAAC,MAAM;gBAC7B,QAAQ,EAAE,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;aACzC,CAAC,CAAC;YAEH,qEAAqE;YACrE,IAAI,CAAC;gBACH,MAAM,aAAa,GAAG,GAAG,CAAC,mBAAmB,CAAC;oBAC5C,GAAG,EAAE,SAAS;oBACd,IAAI,EAAE,UAAU;oBAChB,EAAE,EAAE,QAAQ;iBACb,CAAC,CAAC;gBAEH,mEAAmE;gBACnE,UAAU,CAAC,IAAI,CAAC,2CAA2C,CAAC,CAAC;YAC/D,CAAC;YAAC,OAAO,eAAe,EAAE,CAAC;gBACzB,+CAA+C;gBAC/C,UAAU,CAAC,KAAK,CAAC,iCAAiC,eAAe,YAAY,KAAK,CAAC,CAAC,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC,CAAC;gBAC1I,UAAU,CAAC,KAAK,CAAC,gCAAgC,EAAE;oBACjD,UAAU,EAAE,SAAS,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,GAAG,CAAC,GAAG,KAAK;oBAChE,WAAW,EAAE,UAAU,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,GAAG,CAAC,GAAG,KAAK;oBAClE,SAAS,EAAE,SAAS,CAAC,MAAM;oBAC3B,UAAU,EAAE,UAAU,CAAC,MAAM;iBAC9B,CAAC,CAAC;gBACH,MAAM,eAAe,CAAC;YACxB,CAAC;YAED,OAAO;gBACL,GAAG,EAAE,SAAS;gBACd,IAAI,EAAE,UAAU;gBAChB,EAAE,EAAE,QAAQ;aACb,CAAC;QACJ,CAAC;QAAC,OAAO,UAAU,EAAE,CAAC;YACpB,UAAU,CAAC,IAAI,CAAC,qCAAqC,UAAU,YAAY,KAAK,CAAC,CAAC,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;YAC9H,MAAM,UAAU,CAAC;QACnB,CAAC;IACH,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,UAAU,CAAC,KAAK,CAAC,+BAA+B,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;QAC1G,MAAM,KAAK,CAAC;IACd,CAAC;AACH,CAAC;AAED;;;;GAIG;AACH,MAAM,UAAU,yBAAyB,CAAC,OAIzC;IACC,IAAI,CAAC;QACH,iCAAiC;QACjC,MAAM,GAAG,GAAG,EAAE,CAAC,YAAY,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAC7C,MAAM,IAAI,GAAG,EAAE,CAAC,YAAY,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;QAC/C,MAAM,EAAE,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,YAAY,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAExE,oBAAoB;QACpB,UAAU,CAAC,KAAK,CAAC,6BAA6B,EAAE;YAC9C,SAAS,EAAE,GAAG,CAAC,MAAM;YACrB,UAAU,EAAE,IAAI,CAAC,MAAM;YACvB,QAAQ,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;SAC7B,CAAC,CAAC;QAEH,qEAAqE;QACrE,IAAI,CAAC;YACH,MAAM,aAAa,GAAG,GAAG,CAAC,mBAAmB,CAAC;gBAC5C,GAAG;gBACH,IAAI;gBACJ,EAAE;aACH,CAAC,CAAC;YAEH,mEAAmE;YACnE,UAAU,CAAC,IAAI,CAAC,0CAA0C,CAAC,CAAC;QAC9D,CAAC;QAAC,OAAO,eAAe,EAAE,CAAC;YACzB,UAAU,CAAC,KAAK,CAAC,sCAAsC,eAAe,YAAY,KAAK,CAAC,CAAC,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC,CAAC;YAC/I,MAAM,eAAe,CAAC;QACxB,CAAC;QAED,OAAO;YACL,GAAG;YACH,IAAI;YACJ,EAAE;SACH,CAAC;IACJ,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,UAAU,CAAC,KAAK,CAAC,oCAAoC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;QAC/G,MAAM,KAAK,CAAC;IACd,CAAC;AACH,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,8BAA8B;IAC5C,oDAAoD;IACpD,UAAU,CAAC,IAAI,CAAC,4EAA4E,CAAC,CAAC;IAE9F,qEAAqE;IACrE,uDAAuD;IACvD,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;0BA2BA,EAAE,MAAM,CAAC,CAAC;IAElC,MAAM,IAAI,GAAG,MAAM,CAAC,IAAI,CAAC;;;;;;;;;;;;;;;;;;0BAkBD,EAAE,MAAM,CAAC,CAAC;IAElC,OAAO;QACL,GAAG;QACH,IAAI;KACL,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACH,MAAM,UAAU,gBAAgB,CAC9B,YAA8B,EAC9B,WAAoB,IAAI;IAExB,MAAM,OAAO,GAAmB;QAC9B,GAAG,EAAE,YAAY,CAAC,GAAG;QACrB,IAAI,EAAE,YAAY,CAAC,IAAI;QACvB,EAAE,EAAE,YAAY,CAAC,EAAE;QACnB,iEAAiE;QACjE,UAAU,EAAE,OAAO,EAAG,+CAA+C;QACrE,UAAU,EAAE,SAAS,EAAE,mCAAmC;QAC1D,wCAAwC;QACxC,OAAO,EAAE,2CAA2C;QACpD,sDAAsD;QACtD,kBAAkB,EAAE,KAAK;QACzB,2CAA2C;QAC3C,gBAAgB,EAAE,KAAK;QACvB,sEAAsE;QACtE,gEAAgE;QAChE,cAAc,EAAE,GAAG;QACnB,4DAA4D;QAC5D,gBAAgB,EAAE,KAAK;QACvB,gBAAgB;QAChB,WAAW,EAAE,IAAI;QACjB,mDAAmD;QACnD,aAAa,EAAE,CAAC;KACjB,CAAC;IAEF,0BAA0B;IAC1B,IAAI,QAAQ,EAAE,CAAC;QACb,OAAO,CAAC,aAAa,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,+CAA+C;IACnF,CAAC;IAED,OAAO,OAAO,CAAC;AACjB,CAAC"}