From 0ed8bb635e2e271f8847321f14de01c4f0513f0d Mon Sep 17 00:00:00 2001 From: DomySh Date: Thu, 21 Jul 2022 01:02:46 +0200 Subject: [PATCH] Restructurated backend --- .gitignore | 3 +- backend/app.py | 408 +++--------------- backend/modules/firegex.py | 5 +- backend/modules/sqlite.py | 30 +- backend/routers/__init__.py | 0 backend/routers/nfregex.py | 281 ++++++++++++ backend/{utils.py => utils/__init__.py} | 27 ++ backend/utils/loader.py | 106 +++++ backend/utils/models.py | 28 ++ frontend/build/asset-manifest.json | 6 +- frontend/build/index.html | 2 +- .../js/{main.10378d73.js => main.3838510f.js} | 6 +- ...CENSE.txt => main.3838510f.js.LICENSE.txt} | 0 ...n.10378d73.js.map => main.3838510f.js.map} | 2 +- frontend/src/js/utils.tsx | 28 +- 15 files changed, 523 insertions(+), 409 deletions(-) create mode 100644 backend/routers/__init__.py create mode 100644 backend/routers/nfregex.py rename backend/{utils.py => utils/__init__.py} (51%) create mode 100644 backend/utils/loader.py create mode 100644 backend/utils/models.py rename frontend/build/static/js/{main.10378d73.js => main.3838510f.js} (64%) rename frontend/build/static/js/{main.10378d73.js.LICENSE.txt => main.3838510f.js.LICENSE.txt} (100%) rename frontend/build/static/js/{main.10378d73.js.map => main.3838510f.js.map} (55%) diff --git a/.gitignore b/.gitignore index 6b179f5..26ed7b0 100755 --- a/.gitignore +++ b/.gitignore @@ -13,8 +13,7 @@ /frontend/coverage /backend/db/ -/backend/db/firegex.db -/backend/db/firegex.db-journal +/backend/db/** /backend/modules/cppqueue docker-compose.yml diff --git a/backend/app.py b/backend/app.py index 064e54b..1b06af7 100644 --- a/backend/app.py +++ b/backend/app.py @@ -1,74 +1,42 @@ -from base64 import b64decode -import sqlite3, uvicorn, sys, secrets, re -import httpx, websockets, os, asyncio -from typing import List, Union -from fastapi import FastAPI, HTTPException, WebSocket, Depends -from pydantic import BaseModel, BaseSettings -from fastapi.responses import FileResponse, StreamingResponse +import uvicorn, secrets, utils +import os, asyncio +from typing import List +from fastapi import FastAPI, HTTPException, Depends, APIRouter from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm -from jose import JWTError, jwt +from jose import jwt from passlib.context import CryptContext from fastapi_socketio import SocketManager -from modules import SQLite, FirewallManager -from modules.firewall import STATUS +from modules import SQLite from modules.firegex import FiregexTables -from utils import get_interfaces, ip_parse, refactor_name, gen_service_id - -ON_DOCKER = len(sys.argv) > 1 and sys.argv[1] == "DOCKER" -DEBUG = len(sys.argv) > 1 and sys.argv[1] == "DEBUG" +from utils import API_VERSION, FIREGEX_PORT, JWT_ALGORITHM, get_interfaces, refresh_frontend, DEBUG +from utils.loader import frontend_deploy, load_routers +from utils.models import ChangePasswordModel, IpInterface, PasswordChangeForm, PasswordForm, ResetRequest, StatusModel, StatusMessageModel # DB init -if not os.path.exists("db"): os.mkdir("db") db = SQLite('db/firegex.db') -firewall = FirewallManager(db) -class Settings(BaseSettings): - JWT_ALGORITHM: str = "HS256" - REACT_BUILD_DIR: str = "../frontend/build/" if not ON_DOCKER else "frontend/" - REACT_HTML_PATH: str = os.path.join(REACT_BUILD_DIR,"index.html") - VERSION = "1.5.0" - - -settings = Settings() oauth2_scheme = OAuth2PasswordBearer(tokenUrl="/api/login", auto_error=False) crypto = CryptContext(schemes=["bcrypt"], deprecated="auto") app = FastAPI(debug=DEBUG, redoc_url=None) -sio = SocketManager(app, "/sock", socketio_path="") +utils.socketio = SocketManager(app, "/sock", socketio_path="") def APP_STATUS(): return "init" if db.get("password") is None else "run" def JWT_SECRET(): return db.get("secret") -async def refresh_frontend(): - await sio.emit("update","Refresh") - -@sio.on("update") +@utils.socketio.on("update") async def updater(): pass -@app.on_event("startup") -async def startup_event(): - db.init() - await firewall.init() - await refresh_frontend() - if not JWT_SECRET(): db.put("secret", secrets.token_hex(32)) - -@app.on_event("shutdown") -async def shutdown_event(): - db.backup() - await firewall.close() - db.disconnect() - db.restore() - def create_access_token(data: dict): to_encode = data.copy() - encoded_jwt = jwt.encode(to_encode, JWT_SECRET(), algorithm=settings.JWT_ALGORITHM) + encoded_jwt = jwt.encode(to_encode, JWT_SECRET(), algorithm=JWT_ALGORITHM) return encoded_jwt async def check_login(token: str = Depends(oauth2_scheme)): if not token: return False try: - payload = jwt.decode(token, JWT_SECRET(), algorithms=[settings.JWT_ALGORITHM]) + payload = jwt.decode(token, JWT_SECRET(), algorithms=[JWT_ALGORITHM]) logged_in: bool = payload.get("logged_in") except Exception: return False @@ -77,16 +45,13 @@ async def check_login(token: str = Depends(oauth2_scheme)): async def is_loggined(auth: bool = Depends(check_login)): if not auth: raise HTTPException( - status_code=401, - detail="Could not validate credentials", - headers={"WWW-Authenticate": "Bearer"}, - ) + status_code=401, + detail="Could not validate credentials", + headers={"WWW-Authenticate": "Bearer"}, + ) return True -class StatusModel(BaseModel): - status: str - loggined: bool - version: str +api = APIRouter(prefix="/api", dependencies=[Depends(is_loggined)]) @app.get("/api/status", response_model=StatusModel) async def get_app_status(auth: bool = Depends(check_login)): @@ -94,16 +59,9 @@ async def get_app_status(auth: bool = Depends(check_login)): return { "status": APP_STATUS(), "loggined": auth, - "version": settings.VERSION + "version": API_VERSION } -class PasswordForm(BaseModel): - password: str - -class PasswordChangeForm(BaseModel): - password: str - expire: bool - @app.post("/api/login") async def login_api(form: OAuth2PasswordRequestForm = Depends()): """Get a login token to use the firegex api""" @@ -115,12 +73,19 @@ async def login_api(form: OAuth2PasswordRequestForm = Depends()): return {"access_token": create_access_token({"logged_in": True}), "token_type": "bearer"} raise HTTPException(406,"Wrong password!") -class ChangePasswordModel(BaseModel): - status: str - access_token: Union[str,None] +@app.post('/api/set-password', response_model=ChangePasswordModel) +async def set_password(form: PasswordForm): + """Set the password of firegex""" + if APP_STATUS() != "init": raise HTTPException(status_code=400) + if form.password == "": + return {"status":"Cannot insert an empty password!"} + hash_psw = crypto.hash(form.password) + db.put("password",hash_psw) + await refresh_frontend() + return {"status":"ok", "access_token": create_access_token({"logged_in": True})} -@app.post('/api/change-password', response_model=ChangePasswordModel) -async def change_password(form: PasswordChangeForm, auth: bool = Depends(is_loggined)): +@api.post('/change-password', response_model=ChangePasswordModel) +async def change_password(form: PasswordChangeForm): """Change the password of firegex""" if APP_STATUS() != "run": raise HTTPException(status_code=400) @@ -135,306 +100,39 @@ async def change_password(form: PasswordChangeForm, auth: bool = Depends(is_logg return {"status":"ok", "access_token": create_access_token({"logged_in": True})} -@app.post('/api/set-password', response_model=ChangePasswordModel) -async def set_password(form: PasswordForm): - """Set the password of firegex""" - if APP_STATUS() != "init": raise HTTPException(status_code=400) - if form.password == "": - return {"status":"Cannot insert an empty password!"} - hash_psw = crypto.hash(form.password) - db.put("password",hash_psw) - await refresh_frontend() - return {"status":"ok", "access_token": create_access_token({"logged_in": True})} - -class GeneralStatModel(BaseModel): - closed:int - regexes: int - services: int - -@app.get('/api/general-stats', response_model=GeneralStatModel) -async def get_general_stats(auth: bool = Depends(is_loggined)): - """Get firegex general status about services""" - return db.query(""" - SELECT - (SELECT COALESCE(SUM(blocked_packets),0) FROM regexes) closed, - (SELECT COUNT(*) FROM regexes) regexes, - (SELECT COUNT(*) FROM services) services - """)[0] - -class ServiceModel(BaseModel): - status: str - service_id: str - port: int - name: str - proto: str - ip_int: str - n_regex: int - n_packets: int - -@app.get('/api/services', response_model=List[ServiceModel]) -async def get_service_list(auth: bool = Depends(is_loggined)): - """Get the list of existent firegex services""" - return db.query(""" - SELECT - s.service_id service_id, - s.status status, - s.port port, - s.name name, - s.proto proto, - s.ip_int ip_int, - COUNT(r.regex_id) n_regex, - COALESCE(SUM(r.blocked_packets),0) n_packets - FROM services s LEFT JOIN regexes r ON s.service_id = r.service_id - GROUP BY s.service_id; - """) - -@app.get('/api/service/{service_id}', response_model=ServiceModel) -async def get_service_by_id(service_id: str, auth: bool = Depends(is_loggined)): - """Get info about a specific service using his id""" - res = db.query(""" - SELECT - s.service_id service_id, - s.status status, - s.port port, - s.name name, - s.proto proto, - s.ip_int ip_int, - COUNT(r.regex_id) n_regex, - COALESCE(SUM(r.blocked_packets),0) n_packets - FROM services s LEFT JOIN regexes r ON s.service_id = r.service_id - WHERE s.service_id = ? GROUP BY s.service_id; - """, service_id) - if len(res) == 0: raise HTTPException(status_code=400, detail="This service does not exists!") - return res[0] - -class StatusMessageModel(BaseModel): - status:str - -@app.get('/api/service/{service_id}/stop', response_model=StatusMessageModel) -async def service_stop(service_id: str, auth: bool = Depends(is_loggined)): - """Request the stop of a specific service""" - await firewall.get(service_id).next(STATUS.STOP) - await refresh_frontend() - return {'status': 'ok'} - -@app.get('/api/service/{service_id}/start', response_model=StatusMessageModel) -async def service_start(service_id: str, auth: bool = Depends(is_loggined)): - """Request the start of a specific service""" - await firewall.get(service_id).next(STATUS.ACTIVE) - await refresh_frontend() - return {'status': 'ok'} - -@app.get('/api/service/{service_id}/delete', response_model=StatusMessageModel) -async def service_delete(service_id: str, auth: bool = Depends(is_loggined)): - """Request the deletion of a specific service""" - db.query('DELETE FROM services WHERE service_id = ?;', service_id) - db.query('DELETE FROM regexes WHERE service_id = ?;', service_id) - await firewall.remove(service_id) - await refresh_frontend() - return {'status': 'ok'} - -class RenameForm(BaseModel): - name:str - -@app.post('/api/service/{service_id}/rename', response_model=StatusMessageModel) -async def service_rename(service_id: str, form: RenameForm, auth: bool = Depends(is_loggined)): - """Request to change the name of a specific service""" - form.name = refactor_name(form.name) - if not form.name: return {'status': 'The name cannot be empty!'} - try: - db.query('UPDATE services SET name=? WHERE service_id = ?;', form.name, service_id) - except sqlite3.IntegrityError: - return {'status': 'This name is already used'} - await refresh_frontend() - return {'status': 'ok'} - -class RegexModel(BaseModel): - regex:str - mode:str - id:int - service_id:str - is_blacklist: bool - n_packets:int - is_case_sensitive:bool - active:bool - -@app.get('/api/service/{service_id}/regexes', response_model=List[RegexModel]) -async def get_service_regexe_list(service_id: str, auth: bool = Depends(is_loggined)): - """Get the list of the regexes of a service""" - return db.query(""" - SELECT - regex, mode, regex_id `id`, service_id, is_blacklist, - blocked_packets n_packets, is_case_sensitive, active - FROM regexes WHERE service_id = ?; - """, service_id) - -@app.get('/api/regex/{regex_id}', response_model=RegexModel) -async def get_regex_by_id(regex_id: int, auth: bool = Depends(is_loggined)): - """Get regex info using his id""" - res = db.query(""" - SELECT - regex, mode, regex_id `id`, service_id, is_blacklist, - blocked_packets n_packets, is_case_sensitive, active - FROM regexes WHERE `id` = ?; - """, regex_id) - if len(res) == 0: raise HTTPException(status_code=400, detail="This regex does not exists!") - return res[0] - -@app.get('/api/regex/{regex_id}/delete', response_model=StatusMessageModel) -async def regex_delete(regex_id: int, auth: bool = Depends(is_loggined)): - """Delete a regex using his id""" - res = db.query('SELECT * FROM regexes WHERE regex_id = ?;', regex_id) - if len(res) != 0: - db.query('DELETE FROM regexes WHERE regex_id = ?;', regex_id) - await firewall.get(res[0]["service_id"]).update_filters() - await refresh_frontend() - - return {'status': 'ok'} - -@app.get('/api/regex/{regex_id}/enable', response_model=StatusMessageModel) -async def regex_enable(regex_id: int, auth: bool = Depends(is_loggined)): - """Request the enabling of a regex""" - res = db.query('SELECT * FROM regexes WHERE regex_id = ?;', regex_id) - if len(res) != 0: - db.query('UPDATE regexes SET active=1 WHERE regex_id = ?;', regex_id) - await firewall.get(res[0]["service_id"]).update_filters() - await refresh_frontend() - return {'status': 'ok'} - -@app.get('/api/regex/{regex_id}/disable', response_model=StatusMessageModel) -async def regex_disable(regex_id: int, auth: bool = Depends(is_loggined)): - """Request the deactivation of a regex""" - res = db.query('SELECT * FROM regexes WHERE regex_id = ?;', regex_id) - if len(res) != 0: - db.query('UPDATE regexes SET active=0 WHERE regex_id = ?;', regex_id) - await firewall.get(res[0]["service_id"]).update_filters() - await refresh_frontend() - return {'status': 'ok'} - -class RegexAddForm(BaseModel): - service_id: str - regex: str - mode: str - active: Union[bool,None] - is_blacklist: bool - is_case_sensitive: bool - -@app.post('/api/regexes/add', response_model=StatusMessageModel) -async def add_new_regex(form: RegexAddForm, auth: bool = Depends(is_loggined)): - """Add a new regex""" - try: - re.compile(b64decode(form.regex)) - except Exception: - return {"status":"Invalid regex"} - try: - db.query("INSERT INTO regexes (service_id, regex, is_blacklist, mode, is_case_sensitive, active ) VALUES (?, ?, ?, ?, ?, ?);", - form.service_id, form.regex, form.is_blacklist, form.mode, form.is_case_sensitive, True if form.active is None else form.active ) - except sqlite3.IntegrityError: - return {'status': 'An identical regex already exists'} - - await firewall.get(form.service_id).update_filters() - await refresh_frontend() - return {'status': 'ok'} - -class ServiceAddForm(BaseModel): - name: str - port: int - proto: str - ip_int: str - -class ServiceAddResponse(BaseModel): - status:str - service_id: Union[None,str] - -@app.post('/api/services/add', response_model=ServiceAddResponse) -async def add_new_service(form: ServiceAddForm, auth: bool = Depends(is_loggined)): - """Add a new service""" - try: - form.ip_int = ip_parse(form.ip_int) - except ValueError: - return {"status":"Invalid address"} - if form.proto not in ["tcp", "udp"]: - return {"status":"Invalid protocol"} - srv_id = None - try: - srv_id = gen_service_id(db) - db.query("INSERT INTO services (service_id ,name, port, status, proto, ip_int) VALUES (?, ?, ?, ?, ?, ?)", - srv_id, refactor_name(form.name), form.port, STATUS.STOP, form.proto, form.ip_int) - except sqlite3.IntegrityError: - return {'status': 'This type of service already exists'} - await firewall.reload() - await refresh_frontend() - return {'status': 'ok', 'service_id': srv_id} - -class IpInterface(BaseModel): - addr: str - name: str - -@app.get('/api/interfaces', response_model=List[IpInterface]) -async def get_ip_interfaces(auth: bool = Depends(is_loggined)): +@api.get('/interfaces', response_model=List[IpInterface]) +async def get_ip_interfaces(): """Get a list of ip and ip6 interfaces""" return get_interfaces() -class ResetRequest(BaseModel): - delete:bool +#Routers Loader +reset, startup, shutdown = load_routers(api) -@app.post('/api/reset', response_model=StatusMessageModel) -async def reset_firegex(form: ResetRequest, auth: bool = Depends(is_loggined)): +@app.on_event("startup") +async def startup_event(): + db.init() + await startup() + if not JWT_SECRET(): db.put("secret", secrets.token_hex(32)) + await refresh_frontend() + +@app.on_event("shutdown") +async def shutdown_event(): + await shutdown() + db.disconnect() + +@api.post('/reset', response_model=StatusMessageModel) +async def reset_firegex(form: ResetRequest): """Reset firegex nftables rules and optionally all the database""" - if not form.delete: - db.backup() - await firewall.close() - FiregexTables().reset() if form.delete: db.delete() db.init() db.put("secret", secrets.token_hex(32)) - else: - db.restore() - await firewall.init() + await reset(form) await refresh_frontend() - return {'status': 'ok'} -async def frontend_debug_proxy(path): - httpc = httpx.AsyncClient() - req = httpc.build_request("GET",f"http://127.0.0.1:{os.getenv('F_PORT','3000')}/"+path) - resp = await httpc.send(req, stream=True) - return StreamingResponse(resp.aiter_bytes(),status_code=resp.status_code) - -async def react_deploy(path): - file_request = os.path.join(settings.REACT_BUILD_DIR, path) - if not os.path.isfile(file_request): - return FileResponse(settings.REACT_HTML_PATH, media_type='text/html') - else: - return FileResponse(file_request) - -if DEBUG: - async def forward_websocket(ws_a, ws_b): - while True: - data = await ws_a.receive_bytes() - await ws_b.send(data) - async def reverse_websocket(ws_a, ws_b): - while True: - data = await ws_b.recv() - await ws_a.send_text(data) - @app.websocket("/ws") - async def websocket_debug_proxy(ws: WebSocket): - await ws.accept() - async with websockets.connect(f"ws://127.0.0.1:{os.getenv('F_PORT','3000')}/ws") as ws_b_client: - fwd_task = asyncio.create_task(forward_websocket(ws, ws_b_client)) - rev_task = asyncio.create_task(reverse_websocket(ws, ws_b_client)) - await asyncio.gather(fwd_task, rev_task) - -@app.get("/{full_path:path}", include_in_schema=False) -async def catch_all(full_path:str): - if DEBUG: - try: - return await frontend_debug_proxy(full_path) - except Exception: - return {"details":"Frontend not started at "+f"http://127.0.0.1:{os.getenv('F_PORT','3000')}"} - else: return await react_deploy(full_path) - +app.include_router(api) +frontend_deploy(app) if __name__ == '__main__': # os.environ {PORT = Backend Port (Main Port), F_PORT = Frontend Port} @@ -442,7 +140,7 @@ if __name__ == '__main__': uvicorn.run( "app:app", host="0.0.0.0", - port=int(os.getenv("PORT","4444")), + port=FIREGEX_PORT, reload=DEBUG, access_log=DEBUG, workers=1 diff --git a/backend/modules/firegex.py b/backend/modules/firegex.py index 31feb9f..ba53a7a 100644 --- a/backend/modules/firegex.py +++ b/backend/modules/firegex.py @@ -1,5 +1,5 @@ from typing import Dict, List, Set -from utils import ip_parse, ip_family +from utils import ip_parse, ip_family, run_func from modules.sqlite import Service import re, os, asyncio import traceback, nftables @@ -182,8 +182,7 @@ class RegexFilter: async def update(self): if self.update_func: - if asyncio.iscoroutinefunction(self.update_func): await self.update_func(self) - else: self.update_func(self) + await run_func(self.update_func, self) class FiregexInterceptor: diff --git a/backend/modules/sqlite.py b/backend/modules/sqlite.py index 47362b4..4bf38a3 100644 --- a/backend/modules/sqlite.py +++ b/backend/modules/sqlite.py @@ -4,42 +4,20 @@ from hashlib import md5 import base64 class SQLite(): - def __init__(self, db_name: str) -> None: + def __init__(self, db_name: str, schema:dict = None) -> None: self.conn: Union[None, sqlite3.Connection] = None self.cur = None self.db_name = db_name self.__backup = None - self.schema = { - 'services': { - 'service_id': 'VARCHAR(100) PRIMARY KEY', - 'status': 'VARCHAR(100) NOT NULL', - 'port': 'INT NOT NULL CHECK(port > 0 and port < 65536)', - 'name': 'VARCHAR(100) NOT NULL UNIQUE', - 'proto': 'VARCHAR(3) NOT NULL CHECK (proto IN ("tcp", "udp"))', - 'ip_int': 'VARCHAR(100) NOT NULL', - }, - 'regexes': { - 'regex': 'TEXT NOT NULL', - 'mode': 'VARCHAR(1) NOT NULL', - 'service_id': 'VARCHAR(100) NOT NULL', - 'is_blacklist': 'BOOLEAN NOT NULL CHECK (is_blacklist IN (0, 1))', - 'blocked_packets': 'INTEGER UNSIGNED NOT NULL DEFAULT 0', - 'regex_id': 'INTEGER PRIMARY KEY', - 'is_case_sensitive' : 'BOOLEAN NOT NULL CHECK (is_case_sensitive IN (0, 1))', - 'active' : 'BOOLEAN NOT NULL CHECK (active IN (0, 1)) DEFAULT 1', - 'FOREIGN KEY (service_id)':'REFERENCES services (service_id)', - }, - 'QUERY':[ - "CREATE UNIQUE INDEX IF NOT EXISTS unique_services ON services (port, ip_int, proto);", - "CREATE UNIQUE INDEX IF NOT EXISTS unique_regex_service ON regexes (regex,service_id,is_blacklist,mode,is_case_sensitive);" - ] - } + self.schema = {} if schema is None else schema self.DB_VER = md5(json.dumps(self.schema).encode()).hexdigest() def connect(self) -> None: try: self.conn = sqlite3.connect(self.db_name, check_same_thread = False) except Exception: + path_name = os.path.dirname(self.db_name) + if not os.path.exists(path_name): os.makedirs(path_name) with open(self.db_name, 'x'): pass self.conn = sqlite3.connect(self.db_name, check_same_thread = False) def dict_factory(cursor, row): diff --git a/backend/routers/__init__.py b/backend/routers/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/backend/routers/nfregex.py b/backend/routers/nfregex.py new file mode 100644 index 0000000..9780ce5 --- /dev/null +++ b/backend/routers/nfregex.py @@ -0,0 +1,281 @@ +from base64 import b64decode +import re +import sqlite3 +from typing import List, Union +from fastapi import APIRouter, HTTPException +from pydantic import BaseModel +from modules.firegex import FiregexTables +from modules.firewall import STATUS, FirewallManager +from modules.sqlite import SQLite +from utils import gen_service_id, ip_parse, refactor_name, refresh_frontend +from utils.models import ResetRequest, StatusMessageModel + +class GeneralStatModel(BaseModel): + closed:int + regexes: int + services: int + +class ServiceModel(BaseModel): + status: str + service_id: str + port: int + name: str + proto: str + ip_int: str + n_regex: int + n_packets: int + +class RenameForm(BaseModel): + name:str + +class RegexModel(BaseModel): + regex:str + mode:str + id:int + service_id:str + is_blacklist: bool + n_packets:int + is_case_sensitive:bool + active:bool + +class RegexAddForm(BaseModel): + service_id: str + regex: str + mode: str + active: Union[bool,None] + is_blacklist: bool + is_case_sensitive: bool + +class ServiceAddForm(BaseModel): + name: str + port: int + proto: str + ip_int: str + +class ServiceAddResponse(BaseModel): + status:str + service_id: Union[None,str] + +app = APIRouter() + +async def reset(params: ResetRequest): + if not params.delete: + db.backup() + await firewall.close() + FiregexTables().reset() + if params.delete: + db.delete() + db.init() + else: + db.restore() + await firewall.init() + + +async def startup(): + db.init() + await firewall.init() + +async def shutdown(): + db.backup() + await firewall.close() + db.disconnect() + db.restore() + +db = SQLite('db/nft-regex.db', { + 'services': { + 'service_id': 'VARCHAR(100) PRIMARY KEY', + 'status': 'VARCHAR(100) NOT NULL', + 'port': 'INT NOT NULL CHECK(port > 0 and port < 65536)', + 'name': 'VARCHAR(100) NOT NULL UNIQUE', + 'proto': 'VARCHAR(3) NOT NULL CHECK (proto IN ("tcp", "udp"))', + 'ip_int': 'VARCHAR(100) NOT NULL', + }, + 'regexes': { + 'regex': 'TEXT NOT NULL', + 'mode': 'VARCHAR(1) NOT NULL', + 'service_id': 'VARCHAR(100) NOT NULL', + 'is_blacklist': 'BOOLEAN NOT NULL CHECK (is_blacklist IN (0, 1))', + 'blocked_packets': 'INTEGER UNSIGNED NOT NULL DEFAULT 0', + 'regex_id': 'INTEGER PRIMARY KEY', + 'is_case_sensitive' : 'BOOLEAN NOT NULL CHECK (is_case_sensitive IN (0, 1))', + 'active' : 'BOOLEAN NOT NULL CHECK (active IN (0, 1)) DEFAULT 1', + 'FOREIGN KEY (service_id)':'REFERENCES services (service_id)', + }, + 'QUERY':[ + "CREATE UNIQUE INDEX IF NOT EXISTS unique_services ON services (port, ip_int, proto);", + "CREATE UNIQUE INDEX IF NOT EXISTS unique_regex_service ON regexes (regex,service_id,is_blacklist,mode,is_case_sensitive);" + ] +}) + +firewall = FirewallManager(db) + +@app.get('/stats', response_model=GeneralStatModel) +async def get_general_stats(): + """Get firegex general status about services""" + return db.query(""" + SELECT + (SELECT COALESCE(SUM(blocked_packets),0) FROM regexes) closed, + (SELECT COUNT(*) FROM regexes) regexes, + (SELECT COUNT(*) FROM services) services + """)[0] + +@app.get('/services', response_model=List[ServiceModel]) +async def get_service_list(): + """Get the list of existent firegex services""" + return db.query(""" + SELECT + s.service_id service_id, + s.status status, + s.port port, + s.name name, + s.proto proto, + s.ip_int ip_int, + COUNT(r.regex_id) n_regex, + COALESCE(SUM(r.blocked_packets),0) n_packets + FROM services s LEFT JOIN regexes r ON s.service_id = r.service_id + GROUP BY s.service_id; + """) + +@app.get('/service/{service_id}', response_model=ServiceModel) +async def get_service_by_id(service_id: str, ): + """Get info about a specific service using his id""" + res = db.query(""" + SELECT + s.service_id service_id, + s.status status, + s.port port, + s.name name, + s.proto proto, + s.ip_int ip_int, + COUNT(r.regex_id) n_regex, + COALESCE(SUM(r.blocked_packets),0) n_packets + FROM services s LEFT JOIN regexes r ON s.service_id = r.service_id + WHERE s.service_id = ? GROUP BY s.service_id; + """, service_id) + if len(res) == 0: raise HTTPException(status_code=400, detail="This service does not exists!") + return res[0] + +@app.get('/service/{service_id}/stop', response_model=StatusMessageModel) +async def service_stop(service_id: str, ): + """Request the stop of a specific service""" + await firewall.get(service_id).next(STATUS.STOP) + await refresh_frontend() + return {'status': 'ok'} + +@app.get('/service/{service_id}/start', response_model=StatusMessageModel) +async def service_start(service_id: str, ): + """Request the start of a specific service""" + await firewall.get(service_id).next(STATUS.ACTIVE) + await refresh_frontend() + return {'status': 'ok'} + +@app.get('/service/{service_id}/delete', response_model=StatusMessageModel) +async def service_delete(service_id: str, ): + """Request the deletion of a specific service""" + db.query('DELETE FROM services WHERE service_id = ?;', service_id) + db.query('DELETE FROM regexes WHERE service_id = ?;', service_id) + await firewall.remove(service_id) + await refresh_frontend() + return {'status': 'ok'} + +@app.post('/service/{service_id}/rename', response_model=StatusMessageModel) +async def service_rename(service_id: str, form: RenameForm, ): + """Request to change the name of a specific service""" + form.name = refactor_name(form.name) + if not form.name: return {'status': 'The name cannot be empty!'} + try: + db.query('UPDATE services SET name=? WHERE service_id = ?;', form.name, service_id) + except sqlite3.IntegrityError: + return {'status': 'This name is already used'} + await refresh_frontend() + return {'status': 'ok'} + +@app.get('/service/{service_id}/regexes', response_model=List[RegexModel]) +async def get_service_regexe_list(service_id: str, ): + """Get the list of the regexes of a service""" + return db.query(""" + SELECT + regex, mode, regex_id `id`, service_id, is_blacklist, + blocked_packets n_packets, is_case_sensitive, active + FROM regexes WHERE service_id = ?; + """, service_id) + +@app.get('/regex/{regex_id}', response_model=RegexModel) +async def get_regex_by_id(regex_id: int, ): + """Get regex info using his id""" + res = db.query(""" + SELECT + regex, mode, regex_id `id`, service_id, is_blacklist, + blocked_packets n_packets, is_case_sensitive, active + FROM regexes WHERE `id` = ?; + """, regex_id) + if len(res) == 0: raise HTTPException(status_code=400, detail="This regex does not exists!") + return res[0] + +@app.get('/regex/{regex_id}/delete', response_model=StatusMessageModel) +async def regex_delete(regex_id: int, ): + """Delete a regex using his id""" + res = db.query('SELECT * FROM regexes WHERE regex_id = ?;', regex_id) + if len(res) != 0: + db.query('DELETE FROM regexes WHERE regex_id = ?;', regex_id) + await firewall.get(res[0]["service_id"]).update_filters() + await refresh_frontend() + + return {'status': 'ok'} + +@app.get('/regex/{regex_id}/enable', response_model=StatusMessageModel) +async def regex_enable(regex_id: int, ): + """Request the enabling of a regex""" + res = db.query('SELECT * FROM regexes WHERE regex_id = ?;', regex_id) + if len(res) != 0: + db.query('UPDATE regexes SET active=1 WHERE regex_id = ?;', regex_id) + await firewall.get(res[0]["service_id"]).update_filters() + await refresh_frontend() + return {'status': 'ok'} + +@app.get('/regex/{regex_id}/disable', response_model=StatusMessageModel) +async def regex_disable(regex_id: int, ): + """Request the deactivation of a regex""" + res = db.query('SELECT * FROM regexes WHERE regex_id = ?;', regex_id) + if len(res) != 0: + db.query('UPDATE regexes SET active=0 WHERE regex_id = ?;', regex_id) + await firewall.get(res[0]["service_id"]).update_filters() + await refresh_frontend() + return {'status': 'ok'} + +@app.post('/regexes/add', response_model=StatusMessageModel) +async def add_new_regex(form: RegexAddForm, ): + """Add a new regex""" + try: + re.compile(b64decode(form.regex)) + except Exception: + return {"status":"Invalid regex"} + try: + db.query("INSERT INTO regexes (service_id, regex, is_blacklist, mode, is_case_sensitive, active ) VALUES (?, ?, ?, ?, ?, ?);", + form.service_id, form.regex, form.is_blacklist, form.mode, form.is_case_sensitive, True if form.active is None else form.active ) + except sqlite3.IntegrityError: + return {'status': 'An identical regex already exists'} + + await firewall.get(form.service_id).update_filters() + await refresh_frontend() + return {'status': 'ok'} + +@app.post('/services/add', response_model=ServiceAddResponse) +async def add_new_service(form: ServiceAddForm, ): + """Add a new service""" + try: + form.ip_int = ip_parse(form.ip_int) + except ValueError: + return {"status":"Invalid address"} + if form.proto not in ["tcp", "udp"]: + return {"status":"Invalid protocol"} + srv_id = None + try: + srv_id = gen_service_id(db) + db.query("INSERT INTO services (service_id ,name, port, status, proto, ip_int) VALUES (?, ?, ?, ?, ?, ?)", + srv_id, refactor_name(form.name), form.port, STATUS.STOP, form.proto, form.ip_int) + except sqlite3.IntegrityError: + return {'status': 'This type of service already exists'} + await firewall.reload() + await refresh_frontend() + return {'status': 'ok', 'service_id': srv_id} diff --git a/backend/utils.py b/backend/utils/__init__.py similarity index 51% rename from backend/utils.py rename to backend/utils/__init__.py index 14ab4c7..726d45b 100755 --- a/backend/utils.py +++ b/backend/utils/__init__.py @@ -1,8 +1,30 @@ +import asyncio from ipaddress import ip_interface import os, socket, secrets, psutil +import sys +from fastapi_socketio import SocketManager LOCALHOST_IP = socket.gethostbyname(os.getenv("LOCALHOST_IP","127.0.0.1")) +socketio:SocketManager = None + +ROOT_DIR = os.path.abspath(os.path.join(os.path.dirname(__file__), '..')) +ROUTERS_DIR = os.path.join(ROOT_DIR,"routers") +ON_DOCKER = len(sys.argv) > 1 and sys.argv[1] == "DOCKER" +DEBUG = len(sys.argv) > 1 and sys.argv[1] == "DEBUG" +FIREGEX_PORT = int(os.getenv("PORT","4444")) +JWT_ALGORITHM: str = "HS256" +API_VERSION = "2.0.0" + +async def run_func(func, *args, **kwargs): + if asyncio.iscoroutinefunction(func): + return await func(*args, **kwargs) + else: + return func(*args, **kwargs) + +async def refresh_frontend(): + await socketio.emit("update","Refresh") + def refactor_name(name:str): name = name.strip() while " " in name: name = name.replace(" "," ") @@ -15,6 +37,11 @@ def gen_service_id(db): break return res +def list_files(mypath): + from os import listdir + from os.path import isfile, join + return [f for f in listdir(mypath) if isfile(join(mypath, f))] + def ip_parse(ip:str): return str(ip_interface(ip).network) diff --git a/backend/utils/loader.py b/backend/utils/loader.py new file mode 100644 index 0000000..f10e3b3 --- /dev/null +++ b/backend/utils/loader.py @@ -0,0 +1,106 @@ + +import os, httpx, websockets +from sys import prefix +from typing import Callable, List, Union +from fastapi import APIRouter, WebSocket +import asyncio +from starlette.responses import StreamingResponse +from fastapi.responses import FileResponse +from utils import DEBUG, ON_DOCKER, ROUTERS_DIR, list_files, run_func +from utils.models import ResetRequest + +REACT_BUILD_DIR: str = "../frontend/build/" if not ON_DOCKER else "frontend/" +REACT_HTML_PATH: str = os.path.join(REACT_BUILD_DIR,"index.html") + +async def frontend_debug_proxy(path): + httpc = httpx.AsyncClient() + req = httpc.build_request("GET",f"http://127.0.0.1:{os.getenv('F_PORT','3000')}/"+path) + resp = await httpc.send(req, stream=True) + return StreamingResponse(resp.aiter_bytes(),status_code=resp.status_code) + +async def react_deploy(path): + file_request = os.path.join(REACT_BUILD_DIR, path) + if not os.path.isfile(file_request): + return FileResponse(REACT_HTML_PATH, media_type='text/html') + else: + return FileResponse(file_request) + +def frontend_deploy(app): + if DEBUG: + async def forward_websocket(ws_a, ws_b): + while True: + data = await ws_a.receive_bytes() + await ws_b.send(data) + async def reverse_websocket(ws_a, ws_b): + while True: + data = await ws_b.recv() + await ws_a.send_text(data) + @app.websocket("/ws") + async def websocket_debug_proxy(ws: WebSocket): + await ws.accept() + async with websockets.connect(f"ws://127.0.0.1:{os.getenv('F_PORT','3000')}/ws") as ws_b_client: + fwd_task = asyncio.create_task(forward_websocket(ws, ws_b_client)) + rev_task = asyncio.create_task(reverse_websocket(ws, ws_b_client)) + await asyncio.gather(fwd_task, rev_task) + + @app.get("/{full_path:path}", include_in_schema=False) + async def catch_all(full_path:str): + if DEBUG: + try: + return await frontend_debug_proxy(full_path) + except Exception: + return {"details":"Frontend not started at "+f"http://127.0.0.1:{os.getenv('F_PORT','3000')}"} + else: return await react_deploy(full_path) + +def list_routers(): + return [ele[:-3] for ele in list_files(ROUTERS_DIR) if ele != "__init__.py" and " " not in ele and ele.endswith(".py")] + +class RouterModule(): + router: Union[None, APIRouter] + reset: Union[None, Callable] + startup: Union[None, Callable] + shutdown: Union[None, Callable] + name: str + + def __init__(self, router: APIRouter, reset: Callable, startup: Callable, shutdown: Callable, name:str): + self.router = router + self.reset = reset + self.startup = startup + self.shutdown = shutdown + self.name = name + + def __repr__(self): + return f"RouterModule(router={self.router}, reset={self.reset}, startup={self.startup}, shutdown={self.shutdown})" + +def get_router_modules(): + res: List[RouterModule] = [] + for route in list_routers(): + module = getattr(__import__(f"routers.{route}"), route, None) + if module: + res.append(RouterModule( + router=getattr(module, "app", None), + reset=getattr(module, "reset", None), + startup=getattr(module, "startup", None), + shutdown=getattr(module, "shutdown", None), + name=route + )) + return res + +def load_routers(app): + resets, startups, shutdowns = [], [], [] + for router in get_router_modules(): + if router.router: + app.include_router(router.router, prefix=f"/{router.name}") + if router.reset: + resets.append(router.reset) + if router.startup: + startups.append(router.startup) + if router.shutdown: + shutdowns.append(router.shutdown) + async def reset(reset_option:ResetRequest): + for func in resets: await run_func(func, reset_option) + async def startup(): + for func in startups: await run_func(func) + async def shutdown(): + for func in shutdowns: await run_func(func) + return reset, startup, shutdown diff --git a/backend/utils/models.py b/backend/utils/models.py new file mode 100644 index 0000000..e589685 --- /dev/null +++ b/backend/utils/models.py @@ -0,0 +1,28 @@ +from typing import Union +from pydantic import BaseModel + +class StatusMessageModel(BaseModel): + status:str + +class StatusModel(BaseModel): + status: str + loggined: bool + version: str + +class PasswordForm(BaseModel): + password: str + +class PasswordChangeForm(BaseModel): + password: str + expire: bool + +class ChangePasswordModel(BaseModel): + status: str + access_token: Union[str,None] + +class IpInterface(BaseModel): + addr: str + name: str + +class ResetRequest(BaseModel): + delete:bool \ No newline at end of file diff --git a/frontend/build/asset-manifest.json b/frontend/build/asset-manifest.json index 0a512ff..c9a068e 100644 --- a/frontend/build/asset-manifest.json +++ b/frontend/build/asset-manifest.json @@ -1,13 +1,13 @@ { "files": { "main.css": "/static/css/main.08225a85.css", - "main.js": "/static/js/main.10378d73.js", + "main.js": "/static/js/main.3838510f.js", "index.html": "/index.html", "main.08225a85.css.map": "/static/css/main.08225a85.css.map", - "main.10378d73.js.map": "/static/js/main.10378d73.js.map" + "main.3838510f.js.map": "/static/js/main.3838510f.js.map" }, "entrypoints": [ "static/css/main.08225a85.css", - "static/js/main.10378d73.js" + "static/js/main.3838510f.js" ] } \ No newline at end of file diff --git a/frontend/build/index.html b/frontend/build/index.html index 47f5cb8..aa39e5b 100644 --- a/frontend/build/index.html +++ b/frontend/build/index.html @@ -1 +1 @@ -Firegex
\ No newline at end of file +Firegex
\ No newline at end of file diff --git a/frontend/build/static/js/main.10378d73.js b/frontend/build/static/js/main.3838510f.js similarity index 64% rename from frontend/build/static/js/main.10378d73.js rename to frontend/build/static/js/main.3838510f.js index fabbf4f..1c9dcf4 100644 --- a/frontend/build/static/js/main.10378d73.js +++ b/frontend/build/static/js/main.3838510f.js @@ -1,3 +1,3 @@ -/*! For license information please see main.10378d73.js.LICENSE.txt */ -!function(){var e={9:function(e,t){"use strict";t.byteLength=function(e){var t=s(e),n=t[0],r=t[1];return 3*(n+r)/4-r},t.toByteArray=function(e){var t,n,i=s(e),a=i[0],l=i[1],c=new o(function(e,t,n){return 3*(t+n)/4-n}(0,a,l)),u=0,f=l>0?a-4:a;for(n=0;n>16&255,c[u++]=t>>8&255,c[u++]=255&t;2===l&&(t=r[e.charCodeAt(n)]<<2|r[e.charCodeAt(n+1)]>>4,c[u++]=255&t);1===l&&(t=r[e.charCodeAt(n)]<<10|r[e.charCodeAt(n+1)]<<4|r[e.charCodeAt(n+2)]>>2,c[u++]=t>>8&255,c[u++]=255&t);return c},t.fromByteArray=function(e){for(var t,r=e.length,o=r%3,i=[],a=16383,l=0,s=r-o;ls?s:l+a));1===o?(t=e[r-1],i.push(n[t>>2]+n[t<<4&63]+"==")):2===o&&(t=(e[r-2]<<8)+e[r-1],i.push(n[t>>10]+n[t>>4&63]+n[t<<2&63]+"="));return i.join("")};for(var n=[],r=[],o="undefined"!==typeof Uint8Array?Uint8Array:Array,i="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/",a=0,l=i.length;a0)throw new Error("Invalid string. Length must be a multiple of 4");var n=e.indexOf("=");return-1===n&&(n=t),[n,n===t?0:4-n%4]}function c(e,t,r){for(var o,i,a=[],l=t;l>18&63]+n[i>>12&63]+n[i>>6&63]+n[63&i]);return a.join("")}r["-".charCodeAt(0)]=62,r["_".charCodeAt(0)]=63},778:function(e,t,n){"use strict";var r=n(690).default,o=n(728).default,i=n(115).default,a=n(655).default,l=n(389).default,s=n(9),c=n(38),u="function"===typeof Symbol&&"function"===typeof Symbol.for?Symbol.for("nodejs.util.inspect.custom"):null;t.lW=p,t.h2=50;var f=2147483647;function d(e){if(e>f)throw new RangeError('The value "'+e+'" is invalid for option "size"');var t=new Uint8Array(e);return Object.setPrototypeOf(t,p.prototype),t}function p(e,t,n){if("number"===typeof e){if("string"===typeof t)throw new TypeError('The "string" argument must be of type string. Received type number');return v(e)}return h(e,t,n)}function h(e,t,n){if("string"===typeof e)return function(e,t){"string"===typeof t&&""!==t||(t="utf8");if(!p.isEncoding(t))throw new TypeError("Unknown encoding: "+t);var n=0|w(e,t),r=d(n),o=r.write(e,t);o!==n&&(r=r.slice(0,o));return r}(e,t);if(ArrayBuffer.isView(e))return function(e){if(ee(e,Uint8Array)){var t=new Uint8Array(e);return g(t.buffer,t.byteOffset,t.byteLength)}return y(e)}(e);if(null==e)throw new TypeError("The first argument must be one of type string, Buffer, ArrayBuffer, Array, or Array-like Object. Received type "+typeof e);if(ee(e,ArrayBuffer)||e&&ee(e.buffer,ArrayBuffer))return g(e,t,n);if("undefined"!==typeof SharedArrayBuffer&&(ee(e,SharedArrayBuffer)||e&&ee(e.buffer,SharedArrayBuffer)))return g(e,t,n);if("number"===typeof e)throw new TypeError('The "value" argument must not be of type number. Received type number');var r=e.valueOf&&e.valueOf();if(null!=r&&r!==e)return p.from(r,t,n);var o=function(e){if(p.isBuffer(e)){var t=0|b(e.length),n=d(t);return 0===n.length||e.copy(n,0,0,t),n}if(void 0!==e.length)return"number"!==typeof e.length||te(e.length)?d(0):y(e);if("Buffer"===e.type&&Array.isArray(e.data))return y(e.data)}(e);if(o)return o;if("undefined"!==typeof Symbol&&null!=Symbol.toPrimitive&&"function"===typeof e[Symbol.toPrimitive])return p.from(e[Symbol.toPrimitive]("string"),t,n);throw new TypeError("The first argument must be one of type string, Buffer, ArrayBuffer, Array, or Array-like Object. Received type "+typeof e)}function m(e){if("number"!==typeof e)throw new TypeError('"size" argument must be of type number');if(e<0)throw new RangeError('The value "'+e+'" is invalid for option "size"')}function v(e){return m(e),d(e<0?0:0|b(e))}function y(e){for(var t=e.length<0?0:0|b(e.length),n=d(t),r=0;r=f)throw new RangeError("Attempt to allocate Buffer larger than maximum size: 0x"+f.toString(16)+" bytes");return 0|e}function w(e,t){if(p.isBuffer(e))return e.length;if(ArrayBuffer.isView(e)||ee(e,ArrayBuffer))return e.byteLength;if("string"!==typeof e)throw new TypeError('The "string" argument must be one of type string, Buffer, or ArrayBuffer. Received type '+typeof e);var n=e.length,r=arguments.length>2&&!0===arguments[2];if(!r&&0===n)return 0;for(var o=!1;;)switch(t){case"ascii":case"latin1":case"binary":return n;case"utf8":case"utf-8":return G(e).length;case"ucs2":case"ucs-2":case"utf16le":case"utf-16le":return 2*n;case"hex":return n>>>1;case"base64":return Z(e).length;default:if(o)return r?-1:G(e).length;t=(""+t).toLowerCase(),o=!0}}function x(e,t,n){var r=!1;if((void 0===t||t<0)&&(t=0),t>this.length)return"";if((void 0===n||n>this.length)&&(n=this.length),n<=0)return"";if((n>>>=0)<=(t>>>=0))return"";for(e||(e="utf8");;)switch(e){case"hex":return L(this,t,n);case"utf8":case"utf-8":return _(this,t,n);case"ascii":return R(this,t,n);case"latin1":case"binary":return I(this,t,n);case"base64":return N(this,t,n);case"ucs2":case"ucs-2":case"utf16le":case"utf-16le":return A(this,t,n);default:if(r)throw new TypeError("Unknown encoding: "+e);e=(e+"").toLowerCase(),r=!0}}function k(e,t,n){var r=e[t];e[t]=e[n],e[n]=r}function S(e,t,n,r,o){if(0===e.length)return-1;if("string"===typeof n?(r=n,n=0):n>2147483647?n=2147483647:n<-2147483648&&(n=-2147483648),te(n=+n)&&(n=o?0:e.length-1),n<0&&(n=e.length+n),n>=e.length){if(o)return-1;n=e.length-1}else if(n<0){if(!o)return-1;n=0}if("string"===typeof t&&(t=p.from(t,r)),p.isBuffer(t))return 0===t.length?-1:E(e,t,n,r,o);if("number"===typeof t)return t&=255,"function"===typeof Uint8Array.prototype.indexOf?o?Uint8Array.prototype.indexOf.call(e,t,n):Uint8Array.prototype.lastIndexOf.call(e,t,n):E(e,[t],n,r,o);throw new TypeError("val must be string, number or Buffer")}function E(e,t,n,r,o){var i,a=1,l=e.length,s=t.length;if(void 0!==r&&("ucs2"===(r=String(r).toLowerCase())||"ucs-2"===r||"utf16le"===r||"utf-16le"===r)){if(e.length<2||t.length<2)return-1;a=2,l/=2,s/=2,n/=2}function c(e,t){return 1===a?e[t]:e.readUInt16BE(t*a)}if(o){var u=-1;for(i=n;il&&(n=l-s),i=n;i>=0;i--){for(var f=!0,d=0;do&&(r=o):r=o;var i,a=t.length;for(r>a/2&&(r=a/2),i=0;i>8,o=n%256,i.push(o),i.push(r);return i}(t,e.length-n),e,n,r)}function N(e,t,n){return 0===t&&n===e.length?s.fromByteArray(e):s.fromByteArray(e.slice(t,n))}function _(e,t,n){n=Math.min(e.length,n);for(var r=[],o=t;o239?4:i>223?3:i>191?2:1;if(o+l<=n){var s=void 0,c=void 0,u=void 0,f=void 0;switch(l){case 1:i<128&&(a=i);break;case 2:128===(192&(s=e[o+1]))&&(f=(31&i)<<6|63&s)>127&&(a=f);break;case 3:s=e[o+1],c=e[o+2],128===(192&s)&&128===(192&c)&&(f=(15&i)<<12|(63&s)<<6|63&c)>2047&&(f<55296||f>57343)&&(a=f);break;case 4:s=e[o+1],c=e[o+2],u=e[o+3],128===(192&s)&&128===(192&c)&&128===(192&u)&&(f=(15&i)<<18|(63&s)<<12|(63&c)<<6|63&u)>65535&&f<1114112&&(a=f)}}null===a?(a=65533,l=1):a>65535&&(a-=65536,r.push(a>>>10&1023|55296),a=56320|1023&a),r.push(a),o+=l}return function(e){var t=e.length;if(t<=T)return String.fromCharCode.apply(String,e);var n="",r=0;for(;rr.length?(p.isBuffer(i)||(i=p.from(i)),i.copy(r,o)):Uint8Array.prototype.set.call(r,i,o);else{if(!p.isBuffer(i))throw new TypeError('"list" argument must be an Array of Buffers');i.copy(r,o)}o+=i.length}return r},p.byteLength=w,p.prototype._isBuffer=!0,p.prototype.swap16=function(){var e=this.length;if(e%2!==0)throw new RangeError("Buffer size must be a multiple of 16-bits");for(var t=0;tn&&(e+=" ... "),""},u&&(p.prototype[u]=p.prototype.inspect),p.prototype.compare=function(e,t,n,r,o){if(ee(e,Uint8Array)&&(e=p.from(e,e.offset,e.byteLength)),!p.isBuffer(e))throw new TypeError('The "target" argument must be one of type Buffer or Uint8Array. Received type '+typeof e);if(void 0===t&&(t=0),void 0===n&&(n=e?e.length:0),void 0===r&&(r=0),void 0===o&&(o=this.length),t<0||n>e.length||r<0||o>this.length)throw new RangeError("out of range index");if(r>=o&&t>=n)return 0;if(r>=o)return-1;if(t>=n)return 1;if(this===e)return 0;for(var i=(o>>>=0)-(r>>>=0),a=(n>>>=0)-(t>>>=0),l=Math.min(i,a),s=this.slice(r,o),c=e.slice(t,n),u=0;u>>=0,isFinite(n)?(n>>>=0,void 0===r&&(r="utf8")):(r=n,n=void 0)}var o=this.length-t;if((void 0===n||n>o)&&(n=o),e.length>0&&(n<0||t<0)||t>this.length)throw new RangeError("Attempt to write outside buffer bounds");r||(r="utf8");for(var i=!1;;)switch(r){case"hex":return O(this,e,t,n);case"utf8":case"utf-8":return C(this,e,t,n);case"ascii":case"latin1":case"binary":return j(this,e,t,n);case"base64":return P(this,e,t,n);case"ucs2":case"ucs-2":case"utf16le":case"utf-16le":return z(this,e,t,n);default:if(i)throw new TypeError("Unknown encoding: "+r);r=(""+r).toLowerCase(),i=!0}},p.prototype.toJSON=function(){return{type:"Buffer",data:Array.prototype.slice.call(this._arr||this,0)}};var T=4096;function R(e,t,n){var r="";n=Math.min(e.length,n);for(var o=t;or)&&(n=r);for(var o="",i=t;in)throw new RangeError("Trying to access beyond buffer length")}function M(e,t,n,r,o,i){if(!p.isBuffer(e))throw new TypeError('"buffer" argument must be a Buffer instance');if(t>o||te.length)throw new RangeError("Index out of range")}function F(e,t,n,r,o){Y(t,r,o,e,n,7);var i=Number(t&BigInt(4294967295));e[n++]=i,i>>=8,e[n++]=i,i>>=8,e[n++]=i,i>>=8,e[n++]=i;var a=Number(t>>BigInt(32)&BigInt(4294967295));return e[n++]=a,a>>=8,e[n++]=a,a>>=8,e[n++]=a,a>>=8,e[n++]=a,n}function B(e,t,n,r,o){Y(t,r,o,e,n,7);var i=Number(t&BigInt(4294967295));e[n+7]=i,i>>=8,e[n+6]=i,i>>=8,e[n+5]=i,i>>=8,e[n+4]=i;var a=Number(t>>BigInt(32)&BigInt(4294967295));return e[n+3]=a,a>>=8,e[n+2]=a,a>>=8,e[n+1]=a,a>>=8,e[n]=a,n+8}function U(e,t,n,r,o,i){if(n+r>e.length)throw new RangeError("Index out of range");if(n<0)throw new RangeError("Index out of range")}function W(e,t,n,r,o){return t=+t,n>>>=0,o||U(e,0,n,4),c.write(e,t,n,r,23,4),n+4}function H(e,t,n,r,o){return t=+t,n>>>=0,o||U(e,0,n,8),c.write(e,t,n,r,52,8),n+8}p.prototype.slice=function(e,t){var n=this.length;(e=~~e)<0?(e+=n)<0&&(e=0):e>n&&(e=n),(t=void 0===t?n:~~t)<0?(t+=n)<0&&(t=0):t>n&&(t=n),t>>=0,t>>>=0,n||D(e,t,this.length);for(var r=this[e],o=1,i=0;++i>>=0,t>>>=0,n||D(e,t,this.length);for(var r=this[e+--t],o=1;t>0&&(o*=256);)r+=this[e+--t]*o;return r},p.prototype.readUint8=p.prototype.readUInt8=function(e,t){return e>>>=0,t||D(e,1,this.length),this[e]},p.prototype.readUint16LE=p.prototype.readUInt16LE=function(e,t){return e>>>=0,t||D(e,2,this.length),this[e]|this[e+1]<<8},p.prototype.readUint16BE=p.prototype.readUInt16BE=function(e,t){return e>>>=0,t||D(e,2,this.length),this[e]<<8|this[e+1]},p.prototype.readUint32LE=p.prototype.readUInt32LE=function(e,t){return e>>>=0,t||D(e,4,this.length),(this[e]|this[e+1]<<8|this[e+2]<<16)+16777216*this[e+3]},p.prototype.readUint32BE=p.prototype.readUInt32BE=function(e,t){return e>>>=0,t||D(e,4,this.length),16777216*this[e]+(this[e+1]<<16|this[e+2]<<8|this[e+3])},p.prototype.readBigUInt64LE=re((function(e){Q(e>>>=0,"offset");var t=this[e],n=this[e+7];void 0!==t&&void 0!==n||X(e,this.length-8);var r=t+this[++e]*Math.pow(2,8)+this[++e]*Math.pow(2,16)+this[++e]*Math.pow(2,24),o=this[++e]+this[++e]*Math.pow(2,8)+this[++e]*Math.pow(2,16)+n*Math.pow(2,24);return BigInt(r)+(BigInt(o)<>>=0,"offset");var t=this[e],n=this[e+7];void 0!==t&&void 0!==n||X(e,this.length-8);var r=t*Math.pow(2,24)+this[++e]*Math.pow(2,16)+this[++e]*Math.pow(2,8)+this[++e],o=this[++e]*Math.pow(2,24)+this[++e]*Math.pow(2,16)+this[++e]*Math.pow(2,8)+n;return(BigInt(r)<>>=0,t>>>=0,n||D(e,t,this.length);for(var r=this[e],o=1,i=0;++i=(o*=128)&&(r-=Math.pow(2,8*t)),r},p.prototype.readIntBE=function(e,t,n){e>>>=0,t>>>=0,n||D(e,t,this.length);for(var r=t,o=1,i=this[e+--r];r>0&&(o*=256);)i+=this[e+--r]*o;return i>=(o*=128)&&(i-=Math.pow(2,8*t)),i},p.prototype.readInt8=function(e,t){return e>>>=0,t||D(e,1,this.length),128&this[e]?-1*(255-this[e]+1):this[e]},p.prototype.readInt16LE=function(e,t){e>>>=0,t||D(e,2,this.length);var n=this[e]|this[e+1]<<8;return 32768&n?4294901760|n:n},p.prototype.readInt16BE=function(e,t){e>>>=0,t||D(e,2,this.length);var n=this[e+1]|this[e]<<8;return 32768&n?4294901760|n:n},p.prototype.readInt32LE=function(e,t){return e>>>=0,t||D(e,4,this.length),this[e]|this[e+1]<<8|this[e+2]<<16|this[e+3]<<24},p.prototype.readInt32BE=function(e,t){return e>>>=0,t||D(e,4,this.length),this[e]<<24|this[e+1]<<16|this[e+2]<<8|this[e+3]},p.prototype.readBigInt64LE=re((function(e){Q(e>>>=0,"offset");var t=this[e],n=this[e+7];void 0!==t&&void 0!==n||X(e,this.length-8);var r=this[e+4]+this[e+5]*Math.pow(2,8)+this[e+6]*Math.pow(2,16)+(n<<24);return(BigInt(r)<>>=0,"offset");var t=this[e],n=this[e+7];void 0!==t&&void 0!==n||X(e,this.length-8);var r=(t<<24)+this[++e]*Math.pow(2,16)+this[++e]*Math.pow(2,8)+this[++e];return(BigInt(r)<>>=0,t||D(e,4,this.length),c.read(this,e,!0,23,4)},p.prototype.readFloatBE=function(e,t){return e>>>=0,t||D(e,4,this.length),c.read(this,e,!1,23,4)},p.prototype.readDoubleLE=function(e,t){return e>>>=0,t||D(e,8,this.length),c.read(this,e,!0,52,8)},p.prototype.readDoubleBE=function(e,t){return e>>>=0,t||D(e,8,this.length),c.read(this,e,!1,52,8)},p.prototype.writeUintLE=p.prototype.writeUIntLE=function(e,t,n,r){(e=+e,t>>>=0,n>>>=0,r)||M(this,e,t,n,Math.pow(2,8*n)-1,0);var o=1,i=0;for(this[t]=255&e;++i>>=0,n>>>=0,r)||M(this,e,t,n,Math.pow(2,8*n)-1,0);var o=n-1,i=1;for(this[t+o]=255&e;--o>=0&&(i*=256);)this[t+o]=e/i&255;return t+n},p.prototype.writeUint8=p.prototype.writeUInt8=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,1,255,0),this[t]=255&e,t+1},p.prototype.writeUint16LE=p.prototype.writeUInt16LE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,2,65535,0),this[t]=255&e,this[t+1]=e>>>8,t+2},p.prototype.writeUint16BE=p.prototype.writeUInt16BE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,2,65535,0),this[t]=e>>>8,this[t+1]=255&e,t+2},p.prototype.writeUint32LE=p.prototype.writeUInt32LE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,4,4294967295,0),this[t+3]=e>>>24,this[t+2]=e>>>16,this[t+1]=e>>>8,this[t]=255&e,t+4},p.prototype.writeUint32BE=p.prototype.writeUInt32BE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,4,4294967295,0),this[t]=e>>>24,this[t+1]=e>>>16,this[t+2]=e>>>8,this[t+3]=255&e,t+4},p.prototype.writeBigUInt64LE=re((function(e){var t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:0;return F(this,e,t,BigInt(0),BigInt("0xffffffffffffffff"))})),p.prototype.writeBigUInt64BE=re((function(e){var t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:0;return B(this,e,t,BigInt(0),BigInt("0xffffffffffffffff"))})),p.prototype.writeIntLE=function(e,t,n,r){if(e=+e,t>>>=0,!r){var o=Math.pow(2,8*n-1);M(this,e,t,n,o-1,-o)}var i=0,a=1,l=0;for(this[t]=255&e;++i>0)-l&255;return t+n},p.prototype.writeIntBE=function(e,t,n,r){if(e=+e,t>>>=0,!r){var o=Math.pow(2,8*n-1);M(this,e,t,n,o-1,-o)}var i=n-1,a=1,l=0;for(this[t+i]=255&e;--i>=0&&(a*=256);)e<0&&0===l&&0!==this[t+i+1]&&(l=1),this[t+i]=(e/a>>0)-l&255;return t+n},p.prototype.writeInt8=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,1,127,-128),e<0&&(e=255+e+1),this[t]=255&e,t+1},p.prototype.writeInt16LE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,2,32767,-32768),this[t]=255&e,this[t+1]=e>>>8,t+2},p.prototype.writeInt16BE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,2,32767,-32768),this[t]=e>>>8,this[t+1]=255&e,t+2},p.prototype.writeInt32LE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,4,2147483647,-2147483648),this[t]=255&e,this[t+1]=e>>>8,this[t+2]=e>>>16,this[t+3]=e>>>24,t+4},p.prototype.writeInt32BE=function(e,t,n){return e=+e,t>>>=0,n||M(this,e,t,4,2147483647,-2147483648),e<0&&(e=4294967295+e+1),this[t]=e>>>24,this[t+1]=e>>>16,this[t+2]=e>>>8,this[t+3]=255&e,t+4},p.prototype.writeBigInt64LE=re((function(e){var t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:0;return F(this,e,t,-BigInt("0x8000000000000000"),BigInt("0x7fffffffffffffff"))})),p.prototype.writeBigInt64BE=re((function(e){var t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:0;return B(this,e,t,-BigInt("0x8000000000000000"),BigInt("0x7fffffffffffffff"))})),p.prototype.writeFloatLE=function(e,t,n){return W(this,e,t,!0,n)},p.prototype.writeFloatBE=function(e,t,n){return W(this,e,t,!1,n)},p.prototype.writeDoubleLE=function(e,t,n){return H(this,e,t,!0,n)},p.prototype.writeDoubleBE=function(e,t,n){return H(this,e,t,!1,n)},p.prototype.copy=function(e,t,n,r){if(!p.isBuffer(e))throw new TypeError("argument should be a Buffer");if(n||(n=0),r||0===r||(r=this.length),t>=e.length&&(t=e.length),t||(t=0),r>0&&r=this.length)throw new RangeError("Index out of range");if(r<0)throw new RangeError("sourceEnd out of bounds");r>this.length&&(r=this.length),e.length-t>>=0,n=void 0===n?this.length:n>>>0,e||(e=0),"number"===typeof e)for(i=t;i=r+4;n-=3)t="_".concat(e.slice(n-3,n)).concat(t);return"".concat(e.slice(0,n)).concat(t)}function Y(e,t,n,r,o,i){if(e>n||e3?0===t||t===BigInt(0)?">= 0".concat(l," and < 2").concat(l," ** ").concat(8*(i+1)).concat(l):">= -(2".concat(l," ** ").concat(8*(i+1)-1).concat(l,") and < 2 ** ")+"".concat(8*(i+1)-1).concat(l):">= ".concat(t).concat(l," and <= ").concat(n).concat(l),new V.ERR_OUT_OF_RANGE("value",a,e)}!function(e,t,n){Q(t,"offset"),void 0!==e[t]&&void 0!==e[t+n]||X(t,e.length-(n+1))}(r,o,i)}function Q(e,t){if("number"!==typeof e)throw new V.ERR_INVALID_ARG_TYPE(t,"number",e)}function X(e,t,n){if(Math.floor(e)!==e)throw Q(e,n),new V.ERR_OUT_OF_RANGE(n||"offset","an integer",e);if(t<0)throw new V.ERR_BUFFER_OUT_OF_BOUNDS;throw new V.ERR_OUT_OF_RANGE(n||"offset",">= ".concat(n?1:0," and <= ").concat(t),e)}$("ERR_BUFFER_OUT_OF_BOUNDS",(function(e){return e?"".concat(e," is outside of buffer bounds"):"Attempt to access memory outside buffer bounds"}),RangeError),$("ERR_INVALID_ARG_TYPE",(function(e,t){return'The "'.concat(e,'" argument must be of type number. Received type ').concat(typeof t)}),TypeError),$("ERR_OUT_OF_RANGE",(function(e,t,n){var r='The value of "'.concat(e,'" is out of range.'),o=n;return Number.isInteger(n)&&Math.abs(n)>Math.pow(2,32)?o=q(String(n)):"bigint"===typeof n&&(o=String(n),(n>Math.pow(BigInt(2),BigInt(32))||n<-Math.pow(BigInt(2),BigInt(32)))&&(o=q(o)),o+="n"),r+=" It must be ".concat(t,". Received ").concat(o)}),RangeError);var K=/[^+/0-9A-Za-z-_]/g;function G(e,t){var n;t=t||1/0;for(var r=e.length,o=null,i=[],a=0;a55295&&n<57344){if(!o){if(n>56319){(t-=3)>-1&&i.push(239,191,189);continue}if(a+1===r){(t-=3)>-1&&i.push(239,191,189);continue}o=n;continue}if(n<56320){(t-=3)>-1&&i.push(239,191,189),o=n;continue}n=65536+(o-55296<<10|n-56320)}else o&&(t-=3)>-1&&i.push(239,191,189);if(o=null,n<128){if((t-=1)<0)break;i.push(n)}else if(n<2048){if((t-=2)<0)break;i.push(n>>6|192,63&n|128)}else if(n<65536){if((t-=3)<0)break;i.push(n>>12|224,n>>6&63|128,63&n|128)}else{if(!(n<1114112))throw new Error("Invalid code point");if((t-=4)<0)break;i.push(n>>18|240,n>>12&63|128,n>>6&63|128,63&n|128)}}return i}function Z(e){return s.toByteArray(function(e){if((e=(e=e.split("=")[0]).trim().replace(K,"")).length<2)return"";for(;e.length%4!==0;)e+="=";return e}(e))}function J(e,t,n,r){var o;for(o=0;o=t.length||o>=e.length);++o)t[o+n]=e[o];return o}function ee(e,t){return e instanceof t||null!=e&&null!=e.constructor&&null!=e.constructor.name&&e.constructor.name===t.name}function te(e){return e!==e}var ne=function(){for(var e="0123456789abcdef",t=new Array(256),n=0;n<16;++n)for(var r=16*n,o=0;o<16;++o)t[r+o]=e[n]+e[o];return t}();function re(e){return"undefined"===typeof BigInt?oe:e}function oe(){throw new Error("BigInt not supported")}},110:function(e,t,n){"use strict";var r=n(441),o={childContextTypes:!0,contextType:!0,contextTypes:!0,defaultProps:!0,displayName:!0,getDefaultProps:!0,getDerivedStateFromError:!0,getDerivedStateFromProps:!0,mixins:!0,propTypes:!0,type:!0},i={name:!0,length:!0,prototype:!0,caller:!0,callee:!0,arguments:!0,arity:!0},a={$$typeof:!0,compare:!0,defaultProps:!0,displayName:!0,propTypes:!0,type:!0},l={};function s(e){return r.isMemo(e)?a:l[e.$$typeof]||o}l[r.ForwardRef]={$$typeof:!0,render:!0,defaultProps:!0,displayName:!0,propTypes:!0},l[r.Memo]=a;var c=Object.defineProperty,u=Object.getOwnPropertyNames,f=Object.getOwnPropertySymbols,d=Object.getOwnPropertyDescriptor,p=Object.getPrototypeOf,h=Object.prototype;e.exports=function e(t,n,r){if("string"!==typeof n){if(h){var o=p(n);o&&o!==h&&e(t,o,r)}var a=u(n);f&&(a=a.concat(f(n)));for(var l=s(t),m=s(n),v=0;v>1,u=-7,f=n?o-1:0,d=n?-1:1,p=e[t+f];for(f+=d,i=p&(1<<-u)-1,p>>=-u,u+=l;u>0;i=256*i+e[t+f],f+=d,u-=8);for(a=i&(1<<-u)-1,i>>=-u,u+=r;u>0;a=256*a+e[t+f],f+=d,u-=8);if(0===i)i=1-c;else{if(i===s)return a?NaN:1/0*(p?-1:1);a+=Math.pow(2,r),i-=c}return(p?-1:1)*a*Math.pow(2,i-r)},t.write=function(e,t,n,r,o,i){var a,l,s,c=8*i-o-1,u=(1<>1,d=23===o?Math.pow(2,-24)-Math.pow(2,-77):0,p=r?0:i-1,h=r?1:-1,m=t<0||0===t&&1/t<0?1:0;for(t=Math.abs(t),isNaN(t)||t===1/0?(l=isNaN(t)?1:0,a=u):(a=Math.floor(Math.log(t)/Math.LN2),t*(s=Math.pow(2,-a))<1&&(a--,s*=2),(t+=a+f>=1?d/s:d*Math.pow(2,1-f))*s>=2&&(a++,s/=2),a+f>=u?(l=0,a=u):a+f>=1?(l=(t*s-1)*Math.pow(2,o),a+=f):(l=t*Math.pow(2,f-1)*Math.pow(2,o),a=0));o>=8;e[n+p]=255&l,p+=h,l/=256,o-=8);for(a=a<0;e[n+p]=255&a,p+=h,a/=256,c-=8);e[n+p-h]|=128*m}},463:function(e,t,n){"use strict";var r=n(791),o=n(296);function i(e){for(var t="https://reactjs.org/docs/error-decoder.html?invariant="+e,n=1;n