@push.rocks/smartproxy 10.2.0 → 12.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/common/port80-adapter.d.ts +11 -0
- package/dist_ts/common/port80-adapter.js +61 -0
- package/dist_ts/examples/forwarding-example.d.ts +1 -0
- package/dist_ts/examples/forwarding-example.js +96 -0
- package/dist_ts/index.d.ts +1 -0
- package/dist_ts/index.js +3 -1
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +179 -30
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +39 -0
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +172 -20
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +3 -11
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +17 -10
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +19 -2
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +27 -4
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +3 -3
- package/dist_ts/smartproxy/classes.smartproxy.js +45 -13
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +12 -0
- package/dist_ts/smartproxy/forwarding/domain-config.js +12 -0
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +86 -0
- package/dist_ts/smartproxy/forwarding/domain-manager.js +241 -0
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +24 -0
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +137 -0
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +55 -0
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +94 -0
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +25 -0
- package/dist_ts/smartproxy/forwarding/http.handler.js +123 -0
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +24 -0
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +154 -0
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +36 -0
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +229 -0
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +35 -0
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +254 -0
- package/dist_ts/smartproxy/forwarding/index.d.ts +16 -0
- package/dist_ts/smartproxy/forwarding/index.js +23 -0
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +104 -0
- package/dist_ts/smartproxy/types/forwarding.types.js +50 -0
- package/package.json +2 -2
- package/readme.md +158 -8
- package/readme.plan.md +471 -42
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/common/port80-adapter.ts +87 -0
- package/ts/index.ts +3 -0
- package/ts/smartproxy/classes.pp.connectionhandler.ts +231 -44
- package/ts/smartproxy/classes.pp.domainconfigmanager.ts +198 -24
- package/ts/smartproxy/classes.pp.interfaces.ts +3 -11
- package/ts/smartproxy/classes.pp.portrangemanager.ts +17 -10
- package/ts/smartproxy/classes.pp.securitymanager.ts +29 -5
- package/ts/smartproxy/classes.pp.timeoutmanager.ts +3 -3
- package/ts/smartproxy/classes.smartproxy.ts +68 -15
- package/ts/smartproxy/forwarding/domain-config.ts +28 -0
- package/ts/smartproxy/forwarding/domain-manager.ts +283 -0
- package/ts/smartproxy/forwarding/forwarding.factory.ts +155 -0
- package/ts/smartproxy/forwarding/forwarding.handler.ts +127 -0
- package/ts/smartproxy/forwarding/http.handler.ts +140 -0
- package/ts/smartproxy/forwarding/https-passthrough.handler.ts +182 -0
- package/ts/smartproxy/forwarding/https-terminate-to-http.handler.ts +264 -0
- package/ts/smartproxy/forwarding/https-terminate-to-https.handler.ts +292 -0
- package/ts/smartproxy/forwarding/index.ts +52 -0
- package/ts/smartproxy/types/forwarding.types.ts +162 -0
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import { ForwardingHandler } from './forwarding.handler.js';
|
|
3
|
+
import type { IForwardConfig } from '../types/forwarding.types.js';
|
|
4
|
+
/**
|
|
5
|
+
* Handler for HTTPS termination with HTTP backend
|
|
6
|
+
*/
|
|
7
|
+
export declare class HttpsTerminateToHttpHandler extends ForwardingHandler {
|
|
8
|
+
private tlsServer;
|
|
9
|
+
private secureContext;
|
|
10
|
+
/**
|
|
11
|
+
* Create a new HTTPS termination with HTTP backend handler
|
|
12
|
+
* @param config The forwarding configuration
|
|
13
|
+
*/
|
|
14
|
+
constructor(config: IForwardConfig);
|
|
15
|
+
/**
|
|
16
|
+
* Initialize the handler, setting up TLS context
|
|
17
|
+
*/
|
|
18
|
+
initialize(): Promise<void>;
|
|
19
|
+
/**
|
|
20
|
+
* Set the secure context for TLS termination
|
|
21
|
+
* Called when a certificate is available
|
|
22
|
+
* @param context The secure context
|
|
23
|
+
*/
|
|
24
|
+
setSecureContext(context: plugins.tls.SecureContext): void;
|
|
25
|
+
/**
|
|
26
|
+
* Handle a TLS/SSL socket connection by terminating TLS and forwarding to HTTP backend
|
|
27
|
+
* @param clientSocket The incoming socket from the client
|
|
28
|
+
*/
|
|
29
|
+
handleConnection(clientSocket: plugins.net.Socket): void;
|
|
30
|
+
/**
|
|
31
|
+
* Handle an HTTP request by forwarding to the HTTP backend
|
|
32
|
+
* @param req The HTTP request
|
|
33
|
+
* @param res The HTTP response
|
|
34
|
+
*/
|
|
35
|
+
handleHttpRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void;
|
|
36
|
+
}
|
|
@@ -0,0 +1,229 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import { ForwardingHandler } from './forwarding.handler.js';
|
|
3
|
+
import { ForwardingHandlerEvents } from '../types/forwarding.types.js';
|
|
4
|
+
/**
|
|
5
|
+
* Handler for HTTPS termination with HTTP backend
|
|
6
|
+
*/
|
|
7
|
+
export class HttpsTerminateToHttpHandler extends ForwardingHandler {
|
|
8
|
+
/**
|
|
9
|
+
* Create a new HTTPS termination with HTTP backend handler
|
|
10
|
+
* @param config The forwarding configuration
|
|
11
|
+
*/
|
|
12
|
+
constructor(config) {
|
|
13
|
+
super(config);
|
|
14
|
+
this.tlsServer = null;
|
|
15
|
+
this.secureContext = null;
|
|
16
|
+
// Validate that this is an HTTPS terminate to HTTP configuration
|
|
17
|
+
if (config.type !== 'https-terminate-to-http') {
|
|
18
|
+
throw new Error(`Invalid configuration type for HttpsTerminateToHttpHandler: ${config.type}`);
|
|
19
|
+
}
|
|
20
|
+
}
|
|
21
|
+
/**
|
|
22
|
+
* Initialize the handler, setting up TLS context
|
|
23
|
+
*/
|
|
24
|
+
async initialize() {
|
|
25
|
+
// We need to load or create TLS certificates
|
|
26
|
+
if (this.config.https?.customCert) {
|
|
27
|
+
// Use custom certificate from configuration
|
|
28
|
+
this.secureContext = plugins.tls.createSecureContext({
|
|
29
|
+
key: this.config.https.customCert.key,
|
|
30
|
+
cert: this.config.https.customCert.cert
|
|
31
|
+
});
|
|
32
|
+
this.emit(ForwardingHandlerEvents.CERTIFICATE_LOADED, {
|
|
33
|
+
source: 'config',
|
|
34
|
+
domain: this.config.target.host
|
|
35
|
+
});
|
|
36
|
+
}
|
|
37
|
+
else if (this.config.acme?.enabled) {
|
|
38
|
+
// Request certificate through ACME if needed
|
|
39
|
+
this.emit(ForwardingHandlerEvents.CERTIFICATE_NEEDED, {
|
|
40
|
+
domain: Array.isArray(this.config.target.host)
|
|
41
|
+
? this.config.target.host[0]
|
|
42
|
+
: this.config.target.host,
|
|
43
|
+
useProduction: this.config.acme.production || false
|
|
44
|
+
});
|
|
45
|
+
// In a real implementation, we would wait for the certificate to be issued
|
|
46
|
+
// For now, we'll use a dummy context
|
|
47
|
+
this.secureContext = plugins.tls.createSecureContext({
|
|
48
|
+
key: '-----BEGIN PRIVATE KEY-----\nDummy key\n-----END PRIVATE KEY-----',
|
|
49
|
+
cert: '-----BEGIN CERTIFICATE-----\nDummy cert\n-----END CERTIFICATE-----'
|
|
50
|
+
});
|
|
51
|
+
}
|
|
52
|
+
else {
|
|
53
|
+
throw new Error('HTTPS termination requires either a custom certificate or ACME enabled');
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* Set the secure context for TLS termination
|
|
58
|
+
* Called when a certificate is available
|
|
59
|
+
* @param context The secure context
|
|
60
|
+
*/
|
|
61
|
+
setSecureContext(context) {
|
|
62
|
+
this.secureContext = context;
|
|
63
|
+
}
|
|
64
|
+
/**
|
|
65
|
+
* Handle a TLS/SSL socket connection by terminating TLS and forwarding to HTTP backend
|
|
66
|
+
* @param clientSocket The incoming socket from the client
|
|
67
|
+
*/
|
|
68
|
+
handleConnection(clientSocket) {
|
|
69
|
+
// Make sure we have a secure context
|
|
70
|
+
if (!this.secureContext) {
|
|
71
|
+
clientSocket.destroy(new Error('TLS secure context not initialized'));
|
|
72
|
+
return;
|
|
73
|
+
}
|
|
74
|
+
const remoteAddress = clientSocket.remoteAddress || 'unknown';
|
|
75
|
+
const remotePort = clientSocket.remotePort || 0;
|
|
76
|
+
// Create a TLS socket using our secure context
|
|
77
|
+
const tlsSocket = new plugins.tls.TLSSocket(clientSocket, {
|
|
78
|
+
secureContext: this.secureContext,
|
|
79
|
+
isServer: true,
|
|
80
|
+
server: this.tlsServer || undefined
|
|
81
|
+
});
|
|
82
|
+
this.emit(ForwardingHandlerEvents.CONNECTED, {
|
|
83
|
+
remoteAddress,
|
|
84
|
+
remotePort,
|
|
85
|
+
tls: true
|
|
86
|
+
});
|
|
87
|
+
// Handle TLS errors
|
|
88
|
+
tlsSocket.on('error', (error) => {
|
|
89
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
90
|
+
remoteAddress,
|
|
91
|
+
error: `TLS error: ${error.message}`
|
|
92
|
+
});
|
|
93
|
+
if (!tlsSocket.destroyed) {
|
|
94
|
+
tlsSocket.destroy();
|
|
95
|
+
}
|
|
96
|
+
});
|
|
97
|
+
// The TLS socket will now emit HTTP traffic that can be processed
|
|
98
|
+
// In a real implementation, we would create an HTTP parser and handle
|
|
99
|
+
// the requests here, but for simplicity, we'll just log the data
|
|
100
|
+
let dataBuffer = Buffer.alloc(0);
|
|
101
|
+
tlsSocket.on('data', (data) => {
|
|
102
|
+
// Append to buffer
|
|
103
|
+
dataBuffer = Buffer.concat([dataBuffer, data]);
|
|
104
|
+
// Very basic HTTP parsing - in a real implementation, use http-parser
|
|
105
|
+
if (dataBuffer.includes(Buffer.from('\r\n\r\n'))) {
|
|
106
|
+
const target = this.getTargetFromConfig();
|
|
107
|
+
// Simple example: forward the data to an HTTP server
|
|
108
|
+
const socket = plugins.net.connect(target.port, target.host, () => {
|
|
109
|
+
socket.write(dataBuffer);
|
|
110
|
+
dataBuffer = Buffer.alloc(0);
|
|
111
|
+
// Set up bidirectional data flow
|
|
112
|
+
tlsSocket.pipe(socket);
|
|
113
|
+
socket.pipe(tlsSocket);
|
|
114
|
+
});
|
|
115
|
+
socket.on('error', (error) => {
|
|
116
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
117
|
+
remoteAddress,
|
|
118
|
+
error: `Target connection error: ${error.message}`
|
|
119
|
+
});
|
|
120
|
+
if (!tlsSocket.destroyed) {
|
|
121
|
+
tlsSocket.destroy();
|
|
122
|
+
}
|
|
123
|
+
});
|
|
124
|
+
}
|
|
125
|
+
});
|
|
126
|
+
// Handle close
|
|
127
|
+
tlsSocket.on('close', () => {
|
|
128
|
+
this.emit(ForwardingHandlerEvents.DISCONNECTED, {
|
|
129
|
+
remoteAddress
|
|
130
|
+
});
|
|
131
|
+
});
|
|
132
|
+
// Set timeout
|
|
133
|
+
const timeout = this.getTimeout();
|
|
134
|
+
tlsSocket.setTimeout(timeout);
|
|
135
|
+
tlsSocket.on('timeout', () => {
|
|
136
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
137
|
+
remoteAddress,
|
|
138
|
+
error: 'TLS connection timeout'
|
|
139
|
+
});
|
|
140
|
+
if (!tlsSocket.destroyed) {
|
|
141
|
+
tlsSocket.destroy();
|
|
142
|
+
}
|
|
143
|
+
});
|
|
144
|
+
}
|
|
145
|
+
/**
|
|
146
|
+
* Handle an HTTP request by forwarding to the HTTP backend
|
|
147
|
+
* @param req The HTTP request
|
|
148
|
+
* @param res The HTTP response
|
|
149
|
+
*/
|
|
150
|
+
handleHttpRequest(req, res) {
|
|
151
|
+
// Check if we should redirect to HTTPS
|
|
152
|
+
if (this.config.http?.redirectToHttps) {
|
|
153
|
+
this.redirectToHttps(req, res);
|
|
154
|
+
return;
|
|
155
|
+
}
|
|
156
|
+
// Get the target from configuration
|
|
157
|
+
const target = this.getTargetFromConfig();
|
|
158
|
+
// Create custom headers with variable substitution
|
|
159
|
+
const variables = {
|
|
160
|
+
clientIp: req.socket.remoteAddress || 'unknown'
|
|
161
|
+
};
|
|
162
|
+
// Prepare headers, merging with any custom headers from config
|
|
163
|
+
const headers = this.applyCustomHeaders(req.headers, variables);
|
|
164
|
+
// Create the proxy request options
|
|
165
|
+
const options = {
|
|
166
|
+
hostname: target.host,
|
|
167
|
+
port: target.port,
|
|
168
|
+
path: req.url,
|
|
169
|
+
method: req.method,
|
|
170
|
+
headers
|
|
171
|
+
};
|
|
172
|
+
// Create the proxy request
|
|
173
|
+
const proxyReq = plugins.http.request(options, (proxyRes) => {
|
|
174
|
+
// Copy status code and headers from the proxied response
|
|
175
|
+
res.writeHead(proxyRes.statusCode || 500, proxyRes.headers);
|
|
176
|
+
// Pipe the proxy response to the client response
|
|
177
|
+
proxyRes.pipe(res);
|
|
178
|
+
// Track response size for logging
|
|
179
|
+
let responseSize = 0;
|
|
180
|
+
proxyRes.on('data', (chunk) => {
|
|
181
|
+
responseSize += chunk.length;
|
|
182
|
+
});
|
|
183
|
+
proxyRes.on('end', () => {
|
|
184
|
+
this.emit(ForwardingHandlerEvents.HTTP_RESPONSE, {
|
|
185
|
+
statusCode: proxyRes.statusCode,
|
|
186
|
+
headers: proxyRes.headers,
|
|
187
|
+
size: responseSize
|
|
188
|
+
});
|
|
189
|
+
});
|
|
190
|
+
});
|
|
191
|
+
// Handle errors in the proxy request
|
|
192
|
+
proxyReq.on('error', (error) => {
|
|
193
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
194
|
+
remoteAddress: req.socket.remoteAddress,
|
|
195
|
+
error: `Proxy request error: ${error.message}`
|
|
196
|
+
});
|
|
197
|
+
// Send an error response if headers haven't been sent yet
|
|
198
|
+
if (!res.headersSent) {
|
|
199
|
+
res.writeHead(502, { 'Content-Type': 'text/plain' });
|
|
200
|
+
res.end(`Error forwarding request: ${error.message}`);
|
|
201
|
+
}
|
|
202
|
+
else {
|
|
203
|
+
// Just end the response if headers have already been sent
|
|
204
|
+
res.end();
|
|
205
|
+
}
|
|
206
|
+
});
|
|
207
|
+
// Track request details for logging
|
|
208
|
+
let requestSize = 0;
|
|
209
|
+
req.on('data', (chunk) => {
|
|
210
|
+
requestSize += chunk.length;
|
|
211
|
+
});
|
|
212
|
+
// Log the request
|
|
213
|
+
this.emit(ForwardingHandlerEvents.HTTP_REQUEST, {
|
|
214
|
+
method: req.method,
|
|
215
|
+
url: req.url,
|
|
216
|
+
headers: req.headers,
|
|
217
|
+
remoteAddress: req.socket.remoteAddress,
|
|
218
|
+
target: `${target.host}:${target.port}`
|
|
219
|
+
});
|
|
220
|
+
// Pipe the client request to the proxy request
|
|
221
|
+
if (req.readable) {
|
|
222
|
+
req.pipe(proxyReq);
|
|
223
|
+
}
|
|
224
|
+
else {
|
|
225
|
+
proxyReq.end();
|
|
226
|
+
}
|
|
227
|
+
}
|
|
228
|
+
}
|
|
229
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"https-terminate-to-http.handler.js","sourceRoot":"","sources":["../../../ts/smartproxy/forwarding/https-terminate-to-http.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAE5D,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAC;AAEvE;;GAEG;AACH,MAAM,OAAO,2BAA4B,SAAQ,iBAAiB;IAIhE;;;OAGG;IACH,YAAY,MAAsB;QAChC,KAAK,CAAC,MAAM,CAAC,CAAC;QARR,cAAS,GAA8B,IAAI,CAAC;QAC5C,kBAAa,GAAqC,IAAI,CAAC;QAS7D,iEAAiE;QACjE,IAAI,MAAM,CAAC,IAAI,KAAK,yBAAyB,EAAE,CAAC;YAC9C,MAAM,IAAI,KAAK,CAAC,+DAA+D,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QAChG,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,6CAA6C;QAC7C,IAAI,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,UAAU,EAAE,CAAC;YAClC,4CAA4C;YAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG;gBACrC,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,IAAI;aACxC,CAAC,CAAC;YAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,QAAQ;gBAChB,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;aAChC,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACrC,6CAA6C;YAC7C,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAC5C,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC5B,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;gBAC3B,aAAa,EAAE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,IAAI,KAAK;aACpD,CAAC,CAAC;YAEH,2EAA2E;YAC3E,qCAAqC;YACrC,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,mEAAmE;gBACxE,IAAI,EAAE,oEAAoE;aAC3E,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,wEAAwE,CAAC,CAAC;QAC5F,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,OAAkC;QACxD,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACI,gBAAgB,CAAC,YAAgC;QACtD,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,YAAY,CAAC,OAAO,CAAC,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC,CAAC;YACtE,OAAO;QACT,CAAC;QAED,MAAM,aAAa,GAAG,YAAY,CAAC,aAAa,IAAI,SAAS,CAAC;QAC9D,MAAM,UAAU,GAAG,YAAY,CAAC,UAAU,IAAI,CAAC,CAAC;QAEhD,+CAA+C;QAC/C,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,YAAY,EAAE;YACxD,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ,EAAE,IAAI;YACd,MAAM,EAAE,IAAI,CAAC,SAAS,IAAI,SAAS;SACpC,CAAC,CAAC;QAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,SAAS,EAAE;YAC3C,aAAa;YACb,UAAU;YACV,GAAG,EAAE,IAAI;SACV,CAAC,CAAC;QAEH,oBAAoB;QACpB,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC9B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,cAAc,KAAK,CAAC,OAAO,EAAE;aACrC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,kEAAkE;QAClE,sEAAsE;QACtE,iEAAiE;QAEjE,IAAI,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAEjC,SAAS,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE;YAC5B,mBAAmB;YACnB,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC,CAAC;YAE/C,sEAAsE;YACtE,IAAI,UAAU,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,EAAE,CAAC;gBACjD,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBAE1C,qDAAqD;gBACrD,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC,IAAI,EAAE,GAAG,EAAE;oBAChE,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;oBACzB,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;oBAE7B,iCAAiC;oBACjC,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;oBACvB,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;gBACzB,CAAC,CAAC,CAAC;gBAEH,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;oBAC3B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;wBACvC,aAAa;wBACb,KAAK,EAAE,4BAA4B,KAAK,CAAC,OAAO,EAAE;qBACnD,CAAC,CAAC;oBAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;wBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;oBACtB,CAAC;gBACH,CAAC,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,eAAe;QACf,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;YACzB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;gBAC9C,aAAa;aACd,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,cAAc;QACd,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAClC,SAAS,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAE9B,SAAS,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC3B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,wBAAwB;aAChC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,GAAiC,EAAE,GAAgC;QAC1F,uCAAuC;QACvC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,eAAe,EAAE,CAAC;YACtC,IAAI,CAAC,eAAe,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,oCAAoC;QACpC,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAE1C,mDAAmD;QACnD,MAAM,SAAS,GAAG;YAChB,QAAQ,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa,IAAI,SAAS;SAChD,CAAC;QAEF,+DAA+D;QAC/D,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;QAEhE,mCAAmC;QACnC,MAAM,OAAO,GAAG;YACd,QAAQ,EAAE,MAAM,CAAC,IAAI;YACrB,IAAI,EAAE,MAAM,CAAC,IAAI;YACjB,IAAI,EAAE,GAAG,CAAC,GAAG;YACb,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,OAAO;SACR,CAAC;QAEF,2BAA2B;QAC3B,MAAM,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;YAC1D,yDAAyD;YACzD,GAAG,CAAC,SAAS,CAAC,QAAQ,CAAC,UAAU,IAAI,GAAG,EAAE,QAAQ,CAAC,OAAO,CAAC,CAAC;YAE5D,iDAAiD;YACjD,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAEnB,kCAAkC;YAClC,IAAI,YAAY,GAAG,CAAC,CAAC;YACrB,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;gBAC5B,YAAY,IAAI,KAAK,CAAC,MAAM,CAAC;YAC/B,CAAC,CAAC,CAAC;YAEH,QAAQ,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;gBACtB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,aAAa,EAAE;oBAC/C,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,OAAO,EAAE,QAAQ,CAAC,OAAO;oBACzB,IAAI,EAAE,YAAY;iBACnB,CAAC,CAAC;YACL,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,qCAAqC;QACrC,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC7B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;gBACvC,KAAK,EAAE,wBAAwB,KAAK,CAAC,OAAO,EAAE;aAC/C,CAAC,CAAC;YAEH,0DAA0D;YAC1D,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC;gBACrB,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,EAAE,cAAc,EAAE,YAAY,EAAE,CAAC,CAAC;gBACrD,GAAG,CAAC,GAAG,CAAC,6BAA6B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YACxD,CAAC;iBAAM,CAAC;gBACN,0DAA0D;gBAC1D,GAAG,CAAC,GAAG,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,IAAI,WAAW,GAAG,CAAC,CAAC;QACpB,GAAG,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;YACvB,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC;QAC9B,CAAC,CAAC,CAAC;QAEH,kBAAkB;QAClB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;YAC9C,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,GAAG,EAAE,GAAG,CAAC,GAAG;YACZ,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;YACvC,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE;SACxC,CAAC,CAAC;QAEH,+CAA+C;QAC/C,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;YACjB,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,QAAQ,CAAC,GAAG,EAAE,CAAC;QACjB,CAAC;IACH,CAAC;CACF"}
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import { ForwardingHandler } from './forwarding.handler.js';
|
|
3
|
+
import type { IForwardConfig } from '../types/forwarding.types.js';
|
|
4
|
+
/**
|
|
5
|
+
* Handler for HTTPS termination with HTTPS backend
|
|
6
|
+
*/
|
|
7
|
+
export declare class HttpsTerminateToHttpsHandler extends ForwardingHandler {
|
|
8
|
+
private secureContext;
|
|
9
|
+
/**
|
|
10
|
+
* Create a new HTTPS termination with HTTPS backend handler
|
|
11
|
+
* @param config The forwarding configuration
|
|
12
|
+
*/
|
|
13
|
+
constructor(config: IForwardConfig);
|
|
14
|
+
/**
|
|
15
|
+
* Initialize the handler, setting up TLS context
|
|
16
|
+
*/
|
|
17
|
+
initialize(): Promise<void>;
|
|
18
|
+
/**
|
|
19
|
+
* Set the secure context for TLS termination
|
|
20
|
+
* Called when a certificate is available
|
|
21
|
+
* @param context The secure context
|
|
22
|
+
*/
|
|
23
|
+
setSecureContext(context: plugins.tls.SecureContext): void;
|
|
24
|
+
/**
|
|
25
|
+
* Handle a TLS/SSL socket connection by terminating TLS and creating a new TLS connection to backend
|
|
26
|
+
* @param clientSocket The incoming socket from the client
|
|
27
|
+
*/
|
|
28
|
+
handleConnection(clientSocket: plugins.net.Socket): void;
|
|
29
|
+
/**
|
|
30
|
+
* Handle an HTTP request by forwarding to the HTTPS backend
|
|
31
|
+
* @param req The HTTP request
|
|
32
|
+
* @param res The HTTP response
|
|
33
|
+
*/
|
|
34
|
+
handleHttpRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void;
|
|
35
|
+
}
|
|
@@ -0,0 +1,254 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import { ForwardingHandler } from './forwarding.handler.js';
|
|
3
|
+
import { ForwardingHandlerEvents } from '../types/forwarding.types.js';
|
|
4
|
+
/**
|
|
5
|
+
* Handler for HTTPS termination with HTTPS backend
|
|
6
|
+
*/
|
|
7
|
+
export class HttpsTerminateToHttpsHandler extends ForwardingHandler {
|
|
8
|
+
/**
|
|
9
|
+
* Create a new HTTPS termination with HTTPS backend handler
|
|
10
|
+
* @param config The forwarding configuration
|
|
11
|
+
*/
|
|
12
|
+
constructor(config) {
|
|
13
|
+
super(config);
|
|
14
|
+
this.secureContext = null;
|
|
15
|
+
// Validate that this is an HTTPS terminate to HTTPS configuration
|
|
16
|
+
if (config.type !== 'https-terminate-to-https') {
|
|
17
|
+
throw new Error(`Invalid configuration type for HttpsTerminateToHttpsHandler: ${config.type}`);
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* Initialize the handler, setting up TLS context
|
|
22
|
+
*/
|
|
23
|
+
async initialize() {
|
|
24
|
+
// We need to load or create TLS certificates for termination
|
|
25
|
+
if (this.config.https?.customCert) {
|
|
26
|
+
// Use custom certificate from configuration
|
|
27
|
+
this.secureContext = plugins.tls.createSecureContext({
|
|
28
|
+
key: this.config.https.customCert.key,
|
|
29
|
+
cert: this.config.https.customCert.cert
|
|
30
|
+
});
|
|
31
|
+
this.emit(ForwardingHandlerEvents.CERTIFICATE_LOADED, {
|
|
32
|
+
source: 'config',
|
|
33
|
+
domain: this.config.target.host
|
|
34
|
+
});
|
|
35
|
+
}
|
|
36
|
+
else if (this.config.acme?.enabled) {
|
|
37
|
+
// Request certificate through ACME if needed
|
|
38
|
+
this.emit(ForwardingHandlerEvents.CERTIFICATE_NEEDED, {
|
|
39
|
+
domain: Array.isArray(this.config.target.host)
|
|
40
|
+
? this.config.target.host[0]
|
|
41
|
+
: this.config.target.host,
|
|
42
|
+
useProduction: this.config.acme.production || false
|
|
43
|
+
});
|
|
44
|
+
// In a real implementation, we would wait for the certificate to be issued
|
|
45
|
+
// For now, we'll use a dummy context
|
|
46
|
+
this.secureContext = plugins.tls.createSecureContext({
|
|
47
|
+
key: '-----BEGIN PRIVATE KEY-----\nDummy key\n-----END PRIVATE KEY-----',
|
|
48
|
+
cert: '-----BEGIN CERTIFICATE-----\nDummy cert\n-----END CERTIFICATE-----'
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
else {
|
|
52
|
+
throw new Error('HTTPS termination requires either a custom certificate or ACME enabled');
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* Set the secure context for TLS termination
|
|
57
|
+
* Called when a certificate is available
|
|
58
|
+
* @param context The secure context
|
|
59
|
+
*/
|
|
60
|
+
setSecureContext(context) {
|
|
61
|
+
this.secureContext = context;
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* Handle a TLS/SSL socket connection by terminating TLS and creating a new TLS connection to backend
|
|
65
|
+
* @param clientSocket The incoming socket from the client
|
|
66
|
+
*/
|
|
67
|
+
handleConnection(clientSocket) {
|
|
68
|
+
// Make sure we have a secure context
|
|
69
|
+
if (!this.secureContext) {
|
|
70
|
+
clientSocket.destroy(new Error('TLS secure context not initialized'));
|
|
71
|
+
return;
|
|
72
|
+
}
|
|
73
|
+
const remoteAddress = clientSocket.remoteAddress || 'unknown';
|
|
74
|
+
const remotePort = clientSocket.remotePort || 0;
|
|
75
|
+
// Create a TLS socket using our secure context
|
|
76
|
+
const tlsSocket = new plugins.tls.TLSSocket(clientSocket, {
|
|
77
|
+
secureContext: this.secureContext,
|
|
78
|
+
isServer: true
|
|
79
|
+
});
|
|
80
|
+
this.emit(ForwardingHandlerEvents.CONNECTED, {
|
|
81
|
+
remoteAddress,
|
|
82
|
+
remotePort,
|
|
83
|
+
tls: true
|
|
84
|
+
});
|
|
85
|
+
// Handle TLS errors
|
|
86
|
+
tlsSocket.on('error', (error) => {
|
|
87
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
88
|
+
remoteAddress,
|
|
89
|
+
error: `TLS error: ${error.message}`
|
|
90
|
+
});
|
|
91
|
+
if (!tlsSocket.destroyed) {
|
|
92
|
+
tlsSocket.destroy();
|
|
93
|
+
}
|
|
94
|
+
});
|
|
95
|
+
// The TLS socket will now emit HTTP traffic that can be processed
|
|
96
|
+
// In a real implementation, we would create an HTTP parser and handle
|
|
97
|
+
// the requests here, but for simplicity, we'll just forward the data
|
|
98
|
+
// Get the target from configuration
|
|
99
|
+
const target = this.getTargetFromConfig();
|
|
100
|
+
// Set up the connection to the HTTPS backend
|
|
101
|
+
const connectToBackend = () => {
|
|
102
|
+
const backendSocket = plugins.tls.connect({
|
|
103
|
+
host: target.host,
|
|
104
|
+
port: target.port,
|
|
105
|
+
// In a real implementation, we would configure TLS options
|
|
106
|
+
rejectUnauthorized: false // For testing only, never use in production
|
|
107
|
+
}, () => {
|
|
108
|
+
this.emit(ForwardingHandlerEvents.DATA_FORWARDED, {
|
|
109
|
+
direction: 'outbound',
|
|
110
|
+
target: `${target.host}:${target.port}`,
|
|
111
|
+
tls: true
|
|
112
|
+
});
|
|
113
|
+
// Set up bidirectional data flow
|
|
114
|
+
tlsSocket.pipe(backendSocket);
|
|
115
|
+
backendSocket.pipe(tlsSocket);
|
|
116
|
+
});
|
|
117
|
+
backendSocket.on('error', (error) => {
|
|
118
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
119
|
+
remoteAddress,
|
|
120
|
+
error: `Backend connection error: ${error.message}`
|
|
121
|
+
});
|
|
122
|
+
if (!tlsSocket.destroyed) {
|
|
123
|
+
tlsSocket.destroy();
|
|
124
|
+
}
|
|
125
|
+
});
|
|
126
|
+
// Handle close
|
|
127
|
+
backendSocket.on('close', () => {
|
|
128
|
+
if (!tlsSocket.destroyed) {
|
|
129
|
+
tlsSocket.destroy();
|
|
130
|
+
}
|
|
131
|
+
});
|
|
132
|
+
// Set timeout
|
|
133
|
+
const timeout = this.getTimeout();
|
|
134
|
+
backendSocket.setTimeout(timeout);
|
|
135
|
+
backendSocket.on('timeout', () => {
|
|
136
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
137
|
+
remoteAddress,
|
|
138
|
+
error: 'Backend connection timeout'
|
|
139
|
+
});
|
|
140
|
+
if (!backendSocket.destroyed) {
|
|
141
|
+
backendSocket.destroy();
|
|
142
|
+
}
|
|
143
|
+
});
|
|
144
|
+
};
|
|
145
|
+
// Wait for the TLS handshake to complete before connecting to backend
|
|
146
|
+
tlsSocket.on('secure', () => {
|
|
147
|
+
connectToBackend();
|
|
148
|
+
});
|
|
149
|
+
// Handle close
|
|
150
|
+
tlsSocket.on('close', () => {
|
|
151
|
+
this.emit(ForwardingHandlerEvents.DISCONNECTED, {
|
|
152
|
+
remoteAddress
|
|
153
|
+
});
|
|
154
|
+
});
|
|
155
|
+
// Set timeout
|
|
156
|
+
const timeout = this.getTimeout();
|
|
157
|
+
tlsSocket.setTimeout(timeout);
|
|
158
|
+
tlsSocket.on('timeout', () => {
|
|
159
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
160
|
+
remoteAddress,
|
|
161
|
+
error: 'TLS connection timeout'
|
|
162
|
+
});
|
|
163
|
+
if (!tlsSocket.destroyed) {
|
|
164
|
+
tlsSocket.destroy();
|
|
165
|
+
}
|
|
166
|
+
});
|
|
167
|
+
}
|
|
168
|
+
/**
|
|
169
|
+
* Handle an HTTP request by forwarding to the HTTPS backend
|
|
170
|
+
* @param req The HTTP request
|
|
171
|
+
* @param res The HTTP response
|
|
172
|
+
*/
|
|
173
|
+
handleHttpRequest(req, res) {
|
|
174
|
+
// Check if we should redirect to HTTPS
|
|
175
|
+
if (this.config.http?.redirectToHttps) {
|
|
176
|
+
this.redirectToHttps(req, res);
|
|
177
|
+
return;
|
|
178
|
+
}
|
|
179
|
+
// Get the target from configuration
|
|
180
|
+
const target = this.getTargetFromConfig();
|
|
181
|
+
// Create custom headers with variable substitution
|
|
182
|
+
const variables = {
|
|
183
|
+
clientIp: req.socket.remoteAddress || 'unknown'
|
|
184
|
+
};
|
|
185
|
+
// Prepare headers, merging with any custom headers from config
|
|
186
|
+
const headers = this.applyCustomHeaders(req.headers, variables);
|
|
187
|
+
// Create the proxy request options
|
|
188
|
+
const options = {
|
|
189
|
+
hostname: target.host,
|
|
190
|
+
port: target.port,
|
|
191
|
+
path: req.url,
|
|
192
|
+
method: req.method,
|
|
193
|
+
headers,
|
|
194
|
+
// In a real implementation, we would configure TLS options
|
|
195
|
+
rejectUnauthorized: false // For testing only, never use in production
|
|
196
|
+
};
|
|
197
|
+
// Create the proxy request using HTTPS
|
|
198
|
+
const proxyReq = plugins.https.request(options, (proxyRes) => {
|
|
199
|
+
// Copy status code and headers from the proxied response
|
|
200
|
+
res.writeHead(proxyRes.statusCode || 500, proxyRes.headers);
|
|
201
|
+
// Pipe the proxy response to the client response
|
|
202
|
+
proxyRes.pipe(res);
|
|
203
|
+
// Track response size for logging
|
|
204
|
+
let responseSize = 0;
|
|
205
|
+
proxyRes.on('data', (chunk) => {
|
|
206
|
+
responseSize += chunk.length;
|
|
207
|
+
});
|
|
208
|
+
proxyRes.on('end', () => {
|
|
209
|
+
this.emit(ForwardingHandlerEvents.HTTP_RESPONSE, {
|
|
210
|
+
statusCode: proxyRes.statusCode,
|
|
211
|
+
headers: proxyRes.headers,
|
|
212
|
+
size: responseSize
|
|
213
|
+
});
|
|
214
|
+
});
|
|
215
|
+
});
|
|
216
|
+
// Handle errors in the proxy request
|
|
217
|
+
proxyReq.on('error', (error) => {
|
|
218
|
+
this.emit(ForwardingHandlerEvents.ERROR, {
|
|
219
|
+
remoteAddress: req.socket.remoteAddress,
|
|
220
|
+
error: `Proxy request error: ${error.message}`
|
|
221
|
+
});
|
|
222
|
+
// Send an error response if headers haven't been sent yet
|
|
223
|
+
if (!res.headersSent) {
|
|
224
|
+
res.writeHead(502, { 'Content-Type': 'text/plain' });
|
|
225
|
+
res.end(`Error forwarding request: ${error.message}`);
|
|
226
|
+
}
|
|
227
|
+
else {
|
|
228
|
+
// Just end the response if headers have already been sent
|
|
229
|
+
res.end();
|
|
230
|
+
}
|
|
231
|
+
});
|
|
232
|
+
// Track request details for logging
|
|
233
|
+
let requestSize = 0;
|
|
234
|
+
req.on('data', (chunk) => {
|
|
235
|
+
requestSize += chunk.length;
|
|
236
|
+
});
|
|
237
|
+
// Log the request
|
|
238
|
+
this.emit(ForwardingHandlerEvents.HTTP_REQUEST, {
|
|
239
|
+
method: req.method,
|
|
240
|
+
url: req.url,
|
|
241
|
+
headers: req.headers,
|
|
242
|
+
remoteAddress: req.socket.remoteAddress,
|
|
243
|
+
target: `${target.host}:${target.port}`
|
|
244
|
+
});
|
|
245
|
+
// Pipe the client request to the proxy request
|
|
246
|
+
if (req.readable) {
|
|
247
|
+
req.pipe(proxyReq);
|
|
248
|
+
}
|
|
249
|
+
else {
|
|
250
|
+
proxyReq.end();
|
|
251
|
+
}
|
|
252
|
+
}
|
|
253
|
+
}
|
|
254
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"https-terminate-to-https.handler.js","sourceRoot":"","sources":["../../../ts/smartproxy/forwarding/https-terminate-to-https.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAE5D,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAC;AAEvE;;GAEG;AACH,MAAM,OAAO,4BAA6B,SAAQ,iBAAiB;IAGjE;;;OAGG;IACH,YAAY,MAAsB;QAChC,KAAK,CAAC,MAAM,CAAC,CAAC;QAPR,kBAAa,GAAqC,IAAI,CAAC;QAS7D,kEAAkE;QAClE,IAAI,MAAM,CAAC,IAAI,KAAK,0BAA0B,EAAE,CAAC;YAC/C,MAAM,IAAI,KAAK,CAAC,gEAAgE,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QACjG,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,6DAA6D;QAC7D,IAAI,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,UAAU,EAAE,CAAC;YAClC,4CAA4C;YAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG;gBACrC,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,IAAI;aACxC,CAAC,CAAC;YAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,QAAQ;gBAChB,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;aAChC,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACrC,6CAA6C;YAC7C,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAC5C,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC5B,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;gBAC3B,aAAa,EAAE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,IAAI,KAAK;aACpD,CAAC,CAAC;YAEH,2EAA2E;YAC3E,qCAAqC;YACrC,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,mEAAmE;gBACxE,IAAI,EAAE,oEAAoE;aAC3E,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,wEAAwE,CAAC,CAAC;QAC5F,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,OAAkC;QACxD,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACI,gBAAgB,CAAC,YAAgC;QACtD,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,YAAY,CAAC,OAAO,CAAC,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC,CAAC;YACtE,OAAO;QACT,CAAC;QAED,MAAM,aAAa,GAAG,YAAY,CAAC,aAAa,IAAI,SAAS,CAAC;QAC9D,MAAM,UAAU,GAAG,YAAY,CAAC,UAAU,IAAI,CAAC,CAAC;QAEhD,+CAA+C;QAC/C,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,YAAY,EAAE;YACxD,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ,EAAE,IAAI;SACf,CAAC,CAAC;QAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,SAAS,EAAE;YAC3C,aAAa;YACb,UAAU;YACV,GAAG,EAAE,IAAI;SACV,CAAC,CAAC;QAEH,oBAAoB;QACpB,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC9B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,cAAc,KAAK,CAAC,OAAO,EAAE;aACrC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,kEAAkE;QAClE,sEAAsE;QACtE,qEAAqE;QAErE,oCAAoC;QACpC,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAE1C,6CAA6C;QAC7C,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,MAAM,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;gBACxC,IAAI,EAAE,MAAM,CAAC,IAAI;gBACjB,IAAI,EAAE,MAAM,CAAC,IAAI;gBACjB,2DAA2D;gBAC3D,kBAAkB,EAAE,KAAK,CAAC,4CAA4C;aACvE,EAAE,GAAG,EAAE;gBACN,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,cAAc,EAAE;oBAChD,SAAS,EAAE,UAAU;oBACrB,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE;oBACvC,GAAG,EAAE,IAAI;iBACV,CAAC,CAAC;gBAEH,iCAAiC;gBACjC,SAAS,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBAC9B,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAChC,CAAC,CAAC,CAAC;YAEH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;gBAClC,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;oBACvC,aAAa;oBACb,KAAK,EAAE,6BAA6B,KAAK,CAAC,OAAO,EAAE;iBACpD,CAAC,CAAC;gBAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;oBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;gBACtB,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,eAAe;YACf,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC7B,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;oBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;gBACtB,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,cAAc;YACd,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;YAClC,aAAa,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;YAElC,aAAa,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBAC/B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;oBACvC,aAAa;oBACb,KAAK,EAAE,4BAA4B;iBACpC,CAAC,CAAC;gBAEH,IAAI,CAAC,aAAa,CAAC,SAAS,EAAE,CAAC;oBAC7B,aAAa,CAAC,OAAO,EAAE,CAAC;gBAC1B,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,CAAC;QAEF,sEAAsE;QACtE,SAAS,CAAC,EAAE,CAAC,QAAQ,EAAE,GAAG,EAAE;YAC1B,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC,CAAC;QAEH,eAAe;QACf,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;YACzB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;gBAC9C,aAAa;aACd,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,cAAc;QACd,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAClC,SAAS,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAE9B,SAAS,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC3B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,wBAAwB;aAChC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,GAAiC,EAAE,GAAgC;QAC1F,uCAAuC;QACvC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,eAAe,EAAE,CAAC;YACtC,IAAI,CAAC,eAAe,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,oCAAoC;QACpC,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAE1C,mDAAmD;QACnD,MAAM,SAAS,GAAG;YAChB,QAAQ,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa,IAAI,SAAS;SAChD,CAAC;QAEF,+DAA+D;QAC/D,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;QAEhE,mCAAmC;QACnC,MAAM,OAAO,GAAG;YACd,QAAQ,EAAE,MAAM,CAAC,IAAI;YACrB,IAAI,EAAE,MAAM,CAAC,IAAI;YACjB,IAAI,EAAE,GAAG,CAAC,GAAG;YACb,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,OAAO;YACP,2DAA2D;YAC3D,kBAAkB,EAAE,KAAK,CAAC,4CAA4C;SACvE,CAAC;QAEF,uCAAuC;QACvC,MAAM,QAAQ,GAAG,OAAO,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;YAC3D,yDAAyD;YACzD,GAAG,CAAC,SAAS,CAAC,QAAQ,CAAC,UAAU,IAAI,GAAG,EAAE,QAAQ,CAAC,OAAO,CAAC,CAAC;YAE5D,iDAAiD;YACjD,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAEnB,kCAAkC;YAClC,IAAI,YAAY,GAAG,CAAC,CAAC;YACrB,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;gBAC5B,YAAY,IAAI,KAAK,CAAC,MAAM,CAAC;YAC/B,CAAC,CAAC,CAAC;YAEH,QAAQ,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;gBACtB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,aAAa,EAAE;oBAC/C,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,OAAO,EAAE,QAAQ,CAAC,OAAO;oBACzB,IAAI,EAAE,YAAY;iBACnB,CAAC,CAAC;YACL,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,qCAAqC;QACrC,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC7B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;gBACvC,KAAK,EAAE,wBAAwB,KAAK,CAAC,OAAO,EAAE;aAC/C,CAAC,CAAC;YAEH,0DAA0D;YAC1D,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC;gBACrB,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,EAAE,cAAc,EAAE,YAAY,EAAE,CAAC,CAAC;gBACrD,GAAG,CAAC,GAAG,CAAC,6BAA6B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YACxD,CAAC;iBAAM,CAAC;gBACN,0DAA0D;gBAC1D,GAAG,CAAC,GAAG,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,IAAI,WAAW,GAAG,CAAC,CAAC;QACpB,GAAG,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;YACvB,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC;QAC9B,CAAC,CAAC,CAAC;QAEH,kBAAkB;QAClB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;YAC9C,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,GAAG,EAAE,GAAG,CAAC,GAAG;YACZ,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;YACvC,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE;SACxC,CAAC,CAAC;QAEH,+CAA+C;QAC/C,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;YACjB,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,QAAQ,CAAC,GAAG,EAAE,CAAC;QACjB,CAAC;IACH,CAAC;CACF"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
export type { ForwardingType, IForwardConfig, IForwardingHandler, ITargetConfig, IHttpOptions, IHttpsOptions, IAcmeForwardingOptions, ISecurityOptions, IAdvancedOptions } from '../types/forwarding.types.js';
|
|
2
|
+
export { ForwardingHandlerEvents, httpOnly, tlsTerminateToHttp, tlsTerminateToHttps, httpsPassthrough } from '../types/forwarding.types.js';
|
|
3
|
+
export * from './domain-config.js';
|
|
4
|
+
export { ForwardingHandler } from './forwarding.handler.js';
|
|
5
|
+
export { HttpForwardingHandler } from './http.handler.js';
|
|
6
|
+
export { HttpsPassthroughHandler } from './https-passthrough.handler.js';
|
|
7
|
+
export { HttpsTerminateToHttpHandler } from './https-terminate-to-http.handler.js';
|
|
8
|
+
export { HttpsTerminateToHttpsHandler } from './https-terminate-to-https.handler.js';
|
|
9
|
+
export { ForwardingHandlerFactory } from './forwarding.factory.js';
|
|
10
|
+
export { DomainManager, DomainManagerEvents } from './domain-manager.js';
|
|
11
|
+
export declare const helpers: {
|
|
12
|
+
httpOnly: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
|
|
13
|
+
tlsTerminateToHttp: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
|
|
14
|
+
tlsTerminateToHttps: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
|
|
15
|
+
httpsPassthrough: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
|
|
16
|
+
};
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
// Export values
|
|
2
|
+
export { ForwardingHandlerEvents, httpOnly, tlsTerminateToHttp, tlsTerminateToHttps, httpsPassthrough } from '../types/forwarding.types.js';
|
|
3
|
+
// Export domain configuration
|
|
4
|
+
export * from './domain-config.js';
|
|
5
|
+
// Export handlers
|
|
6
|
+
export { ForwardingHandler } from './forwarding.handler.js';
|
|
7
|
+
export { HttpForwardingHandler } from './http.handler.js';
|
|
8
|
+
export { HttpsPassthroughHandler } from './https-passthrough.handler.js';
|
|
9
|
+
export { HttpsTerminateToHttpHandler } from './https-terminate-to-http.handler.js';
|
|
10
|
+
export { HttpsTerminateToHttpsHandler } from './https-terminate-to-https.handler.js';
|
|
11
|
+
// Export factory
|
|
12
|
+
export { ForwardingHandlerFactory } from './forwarding.factory.js';
|
|
13
|
+
// Export manager
|
|
14
|
+
export { DomainManager, DomainManagerEvents } from './domain-manager.js';
|
|
15
|
+
// Helper functions as a convenience object
|
|
16
|
+
import { httpOnly, tlsTerminateToHttp, tlsTerminateToHttps, httpsPassthrough } from '../types/forwarding.types.js';
|
|
17
|
+
export const helpers = {
|
|
18
|
+
httpOnly,
|
|
19
|
+
tlsTerminateToHttp,
|
|
20
|
+
tlsTerminateToHttps,
|
|
21
|
+
httpsPassthrough
|
|
22
|
+
};
|
|
23
|
+
//# sourceMappingURL=data:application/json;base64,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
|