@push.rocks/smartproxy 10.2.0 → 12.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/common/port80-adapter.d.ts +11 -0
  3. package/dist_ts/common/port80-adapter.js +61 -0
  4. package/dist_ts/examples/forwarding-example.d.ts +1 -0
  5. package/dist_ts/examples/forwarding-example.js +96 -0
  6. package/dist_ts/index.d.ts +1 -0
  7. package/dist_ts/index.js +3 -1
  8. package/dist_ts/smartproxy/classes.pp.connectionhandler.js +179 -30
  9. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +39 -0
  10. package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +172 -20
  11. package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +3 -11
  12. package/dist_ts/smartproxy/classes.pp.portrangemanager.js +17 -10
  13. package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +19 -2
  14. package/dist_ts/smartproxy/classes.pp.securitymanager.js +27 -4
  15. package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +3 -3
  16. package/dist_ts/smartproxy/classes.smartproxy.js +45 -13
  17. package/dist_ts/smartproxy/forwarding/domain-config.d.ts +12 -0
  18. package/dist_ts/smartproxy/forwarding/domain-config.js +12 -0
  19. package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +86 -0
  20. package/dist_ts/smartproxy/forwarding/domain-manager.js +241 -0
  21. package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +24 -0
  22. package/dist_ts/smartproxy/forwarding/forwarding.factory.js +137 -0
  23. package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +55 -0
  24. package/dist_ts/smartproxy/forwarding/forwarding.handler.js +94 -0
  25. package/dist_ts/smartproxy/forwarding/http.handler.d.ts +25 -0
  26. package/dist_ts/smartproxy/forwarding/http.handler.js +123 -0
  27. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +24 -0
  28. package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +154 -0
  29. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +36 -0
  30. package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +229 -0
  31. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +35 -0
  32. package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +254 -0
  33. package/dist_ts/smartproxy/forwarding/index.d.ts +16 -0
  34. package/dist_ts/smartproxy/forwarding/index.js +23 -0
  35. package/dist_ts/smartproxy/types/forwarding.types.d.ts +104 -0
  36. package/dist_ts/smartproxy/types/forwarding.types.js +50 -0
  37. package/package.json +2 -2
  38. package/readme.md +158 -8
  39. package/readme.plan.md +471 -42
  40. package/ts/00_commitinfo_data.ts +1 -1
  41. package/ts/common/port80-adapter.ts +87 -0
  42. package/ts/index.ts +3 -0
  43. package/ts/smartproxy/classes.pp.connectionhandler.ts +231 -44
  44. package/ts/smartproxy/classes.pp.domainconfigmanager.ts +198 -24
  45. package/ts/smartproxy/classes.pp.interfaces.ts +3 -11
  46. package/ts/smartproxy/classes.pp.portrangemanager.ts +17 -10
  47. package/ts/smartproxy/classes.pp.securitymanager.ts +29 -5
  48. package/ts/smartproxy/classes.pp.timeoutmanager.ts +3 -3
  49. package/ts/smartproxy/classes.smartproxy.ts +68 -15
  50. package/ts/smartproxy/forwarding/domain-config.ts +28 -0
  51. package/ts/smartproxy/forwarding/domain-manager.ts +283 -0
  52. package/ts/smartproxy/forwarding/forwarding.factory.ts +155 -0
  53. package/ts/smartproxy/forwarding/forwarding.handler.ts +127 -0
  54. package/ts/smartproxy/forwarding/http.handler.ts +140 -0
  55. package/ts/smartproxy/forwarding/https-passthrough.handler.ts +182 -0
  56. package/ts/smartproxy/forwarding/https-terminate-to-http.handler.ts +264 -0
  57. package/ts/smartproxy/forwarding/https-terminate-to-https.handler.ts +292 -0
  58. package/ts/smartproxy/forwarding/index.ts +52 -0
  59. package/ts/smartproxy/types/forwarding.types.ts +162 -0
@@ -0,0 +1,36 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { ForwardingHandler } from './forwarding.handler.js';
3
+ import type { IForwardConfig } from '../types/forwarding.types.js';
4
+ /**
5
+ * Handler for HTTPS termination with HTTP backend
6
+ */
7
+ export declare class HttpsTerminateToHttpHandler extends ForwardingHandler {
8
+ private tlsServer;
9
+ private secureContext;
10
+ /**
11
+ * Create a new HTTPS termination with HTTP backend handler
12
+ * @param config The forwarding configuration
13
+ */
14
+ constructor(config: IForwardConfig);
15
+ /**
16
+ * Initialize the handler, setting up TLS context
17
+ */
18
+ initialize(): Promise<void>;
19
+ /**
20
+ * Set the secure context for TLS termination
21
+ * Called when a certificate is available
22
+ * @param context The secure context
23
+ */
24
+ setSecureContext(context: plugins.tls.SecureContext): void;
25
+ /**
26
+ * Handle a TLS/SSL socket connection by terminating TLS and forwarding to HTTP backend
27
+ * @param clientSocket The incoming socket from the client
28
+ */
29
+ handleConnection(clientSocket: plugins.net.Socket): void;
30
+ /**
31
+ * Handle an HTTP request by forwarding to the HTTP backend
32
+ * @param req The HTTP request
33
+ * @param res The HTTP response
34
+ */
35
+ handleHttpRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void;
36
+ }
@@ -0,0 +1,229 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { ForwardingHandler } from './forwarding.handler.js';
3
+ import { ForwardingHandlerEvents } from '../types/forwarding.types.js';
4
+ /**
5
+ * Handler for HTTPS termination with HTTP backend
6
+ */
7
+ export class HttpsTerminateToHttpHandler extends ForwardingHandler {
8
+ /**
9
+ * Create a new HTTPS termination with HTTP backend handler
10
+ * @param config The forwarding configuration
11
+ */
12
+ constructor(config) {
13
+ super(config);
14
+ this.tlsServer = null;
15
+ this.secureContext = null;
16
+ // Validate that this is an HTTPS terminate to HTTP configuration
17
+ if (config.type !== 'https-terminate-to-http') {
18
+ throw new Error(`Invalid configuration type for HttpsTerminateToHttpHandler: ${config.type}`);
19
+ }
20
+ }
21
+ /**
22
+ * Initialize the handler, setting up TLS context
23
+ */
24
+ async initialize() {
25
+ // We need to load or create TLS certificates
26
+ if (this.config.https?.customCert) {
27
+ // Use custom certificate from configuration
28
+ this.secureContext = plugins.tls.createSecureContext({
29
+ key: this.config.https.customCert.key,
30
+ cert: this.config.https.customCert.cert
31
+ });
32
+ this.emit(ForwardingHandlerEvents.CERTIFICATE_LOADED, {
33
+ source: 'config',
34
+ domain: this.config.target.host
35
+ });
36
+ }
37
+ else if (this.config.acme?.enabled) {
38
+ // Request certificate through ACME if needed
39
+ this.emit(ForwardingHandlerEvents.CERTIFICATE_NEEDED, {
40
+ domain: Array.isArray(this.config.target.host)
41
+ ? this.config.target.host[0]
42
+ : this.config.target.host,
43
+ useProduction: this.config.acme.production || false
44
+ });
45
+ // In a real implementation, we would wait for the certificate to be issued
46
+ // For now, we'll use a dummy context
47
+ this.secureContext = plugins.tls.createSecureContext({
48
+ key: '-----BEGIN PRIVATE KEY-----\nDummy key\n-----END PRIVATE KEY-----',
49
+ cert: '-----BEGIN CERTIFICATE-----\nDummy cert\n-----END CERTIFICATE-----'
50
+ });
51
+ }
52
+ else {
53
+ throw new Error('HTTPS termination requires either a custom certificate or ACME enabled');
54
+ }
55
+ }
56
+ /**
57
+ * Set the secure context for TLS termination
58
+ * Called when a certificate is available
59
+ * @param context The secure context
60
+ */
61
+ setSecureContext(context) {
62
+ this.secureContext = context;
63
+ }
64
+ /**
65
+ * Handle a TLS/SSL socket connection by terminating TLS and forwarding to HTTP backend
66
+ * @param clientSocket The incoming socket from the client
67
+ */
68
+ handleConnection(clientSocket) {
69
+ // Make sure we have a secure context
70
+ if (!this.secureContext) {
71
+ clientSocket.destroy(new Error('TLS secure context not initialized'));
72
+ return;
73
+ }
74
+ const remoteAddress = clientSocket.remoteAddress || 'unknown';
75
+ const remotePort = clientSocket.remotePort || 0;
76
+ // Create a TLS socket using our secure context
77
+ const tlsSocket = new plugins.tls.TLSSocket(clientSocket, {
78
+ secureContext: this.secureContext,
79
+ isServer: true,
80
+ server: this.tlsServer || undefined
81
+ });
82
+ this.emit(ForwardingHandlerEvents.CONNECTED, {
83
+ remoteAddress,
84
+ remotePort,
85
+ tls: true
86
+ });
87
+ // Handle TLS errors
88
+ tlsSocket.on('error', (error) => {
89
+ this.emit(ForwardingHandlerEvents.ERROR, {
90
+ remoteAddress,
91
+ error: `TLS error: ${error.message}`
92
+ });
93
+ if (!tlsSocket.destroyed) {
94
+ tlsSocket.destroy();
95
+ }
96
+ });
97
+ // The TLS socket will now emit HTTP traffic that can be processed
98
+ // In a real implementation, we would create an HTTP parser and handle
99
+ // the requests here, but for simplicity, we'll just log the data
100
+ let dataBuffer = Buffer.alloc(0);
101
+ tlsSocket.on('data', (data) => {
102
+ // Append to buffer
103
+ dataBuffer = Buffer.concat([dataBuffer, data]);
104
+ // Very basic HTTP parsing - in a real implementation, use http-parser
105
+ if (dataBuffer.includes(Buffer.from('\r\n\r\n'))) {
106
+ const target = this.getTargetFromConfig();
107
+ // Simple example: forward the data to an HTTP server
108
+ const socket = plugins.net.connect(target.port, target.host, () => {
109
+ socket.write(dataBuffer);
110
+ dataBuffer = Buffer.alloc(0);
111
+ // Set up bidirectional data flow
112
+ tlsSocket.pipe(socket);
113
+ socket.pipe(tlsSocket);
114
+ });
115
+ socket.on('error', (error) => {
116
+ this.emit(ForwardingHandlerEvents.ERROR, {
117
+ remoteAddress,
118
+ error: `Target connection error: ${error.message}`
119
+ });
120
+ if (!tlsSocket.destroyed) {
121
+ tlsSocket.destroy();
122
+ }
123
+ });
124
+ }
125
+ });
126
+ // Handle close
127
+ tlsSocket.on('close', () => {
128
+ this.emit(ForwardingHandlerEvents.DISCONNECTED, {
129
+ remoteAddress
130
+ });
131
+ });
132
+ // Set timeout
133
+ const timeout = this.getTimeout();
134
+ tlsSocket.setTimeout(timeout);
135
+ tlsSocket.on('timeout', () => {
136
+ this.emit(ForwardingHandlerEvents.ERROR, {
137
+ remoteAddress,
138
+ error: 'TLS connection timeout'
139
+ });
140
+ if (!tlsSocket.destroyed) {
141
+ tlsSocket.destroy();
142
+ }
143
+ });
144
+ }
145
+ /**
146
+ * Handle an HTTP request by forwarding to the HTTP backend
147
+ * @param req The HTTP request
148
+ * @param res The HTTP response
149
+ */
150
+ handleHttpRequest(req, res) {
151
+ // Check if we should redirect to HTTPS
152
+ if (this.config.http?.redirectToHttps) {
153
+ this.redirectToHttps(req, res);
154
+ return;
155
+ }
156
+ // Get the target from configuration
157
+ const target = this.getTargetFromConfig();
158
+ // Create custom headers with variable substitution
159
+ const variables = {
160
+ clientIp: req.socket.remoteAddress || 'unknown'
161
+ };
162
+ // Prepare headers, merging with any custom headers from config
163
+ const headers = this.applyCustomHeaders(req.headers, variables);
164
+ // Create the proxy request options
165
+ const options = {
166
+ hostname: target.host,
167
+ port: target.port,
168
+ path: req.url,
169
+ method: req.method,
170
+ headers
171
+ };
172
+ // Create the proxy request
173
+ const proxyReq = plugins.http.request(options, (proxyRes) => {
174
+ // Copy status code and headers from the proxied response
175
+ res.writeHead(proxyRes.statusCode || 500, proxyRes.headers);
176
+ // Pipe the proxy response to the client response
177
+ proxyRes.pipe(res);
178
+ // Track response size for logging
179
+ let responseSize = 0;
180
+ proxyRes.on('data', (chunk) => {
181
+ responseSize += chunk.length;
182
+ });
183
+ proxyRes.on('end', () => {
184
+ this.emit(ForwardingHandlerEvents.HTTP_RESPONSE, {
185
+ statusCode: proxyRes.statusCode,
186
+ headers: proxyRes.headers,
187
+ size: responseSize
188
+ });
189
+ });
190
+ });
191
+ // Handle errors in the proxy request
192
+ proxyReq.on('error', (error) => {
193
+ this.emit(ForwardingHandlerEvents.ERROR, {
194
+ remoteAddress: req.socket.remoteAddress,
195
+ error: `Proxy request error: ${error.message}`
196
+ });
197
+ // Send an error response if headers haven't been sent yet
198
+ if (!res.headersSent) {
199
+ res.writeHead(502, { 'Content-Type': 'text/plain' });
200
+ res.end(`Error forwarding request: ${error.message}`);
201
+ }
202
+ else {
203
+ // Just end the response if headers have already been sent
204
+ res.end();
205
+ }
206
+ });
207
+ // Track request details for logging
208
+ let requestSize = 0;
209
+ req.on('data', (chunk) => {
210
+ requestSize += chunk.length;
211
+ });
212
+ // Log the request
213
+ this.emit(ForwardingHandlerEvents.HTTP_REQUEST, {
214
+ method: req.method,
215
+ url: req.url,
216
+ headers: req.headers,
217
+ remoteAddress: req.socket.remoteAddress,
218
+ target: `${target.host}:${target.port}`
219
+ });
220
+ // Pipe the client request to the proxy request
221
+ if (req.readable) {
222
+ req.pipe(proxyReq);
223
+ }
224
+ else {
225
+ proxyReq.end();
226
+ }
227
+ }
228
+ }
229
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"https-terminate-to-http.handler.js","sourceRoot":"","sources":["../../../ts/smartproxy/forwarding/https-terminate-to-http.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAE5D,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAC;AAEvE;;GAEG;AACH,MAAM,OAAO,2BAA4B,SAAQ,iBAAiB;IAIhE;;;OAGG;IACH,YAAY,MAAsB;QAChC,KAAK,CAAC,MAAM,CAAC,CAAC;QARR,cAAS,GAA8B,IAAI,CAAC;QAC5C,kBAAa,GAAqC,IAAI,CAAC;QAS7D,iEAAiE;QACjE,IAAI,MAAM,CAAC,IAAI,KAAK,yBAAyB,EAAE,CAAC;YAC9C,MAAM,IAAI,KAAK,CAAC,+DAA+D,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QAChG,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,6CAA6C;QAC7C,IAAI,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,UAAU,EAAE,CAAC;YAClC,4CAA4C;YAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG;gBACrC,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,IAAI;aACxC,CAAC,CAAC;YAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,QAAQ;gBAChB,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;aAChC,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACrC,6CAA6C;YAC7C,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAC5C,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC5B,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;gBAC3B,aAAa,EAAE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,IAAI,KAAK;aACpD,CAAC,CAAC;YAEH,2EAA2E;YAC3E,qCAAqC;YACrC,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,mEAAmE;gBACxE,IAAI,EAAE,oEAAoE;aAC3E,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,wEAAwE,CAAC,CAAC;QAC5F,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,OAAkC;QACxD,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACI,gBAAgB,CAAC,YAAgC;QACtD,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,YAAY,CAAC,OAAO,CAAC,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC,CAAC;YACtE,OAAO;QACT,CAAC;QAED,MAAM,aAAa,GAAG,YAAY,CAAC,aAAa,IAAI,SAAS,CAAC;QAC9D,MAAM,UAAU,GAAG,YAAY,CAAC,UAAU,IAAI,CAAC,CAAC;QAEhD,+CAA+C;QAC/C,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,YAAY,EAAE;YACxD,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ,EAAE,IAAI;YACd,MAAM,EAAE,IAAI,CAAC,SAAS,IAAI,SAAS;SACpC,CAAC,CAAC;QAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,SAAS,EAAE;YAC3C,aAAa;YACb,UAAU;YACV,GAAG,EAAE,IAAI;SACV,CAAC,CAAC;QAEH,oBAAoB;QACpB,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC9B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,cAAc,KAAK,CAAC,OAAO,EAAE;aACrC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,kEAAkE;QAClE,sEAAsE;QACtE,iEAAiE;QAEjE,IAAI,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAEjC,SAAS,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE;YAC5B,mBAAmB;YACnB,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC,CAAC;YAE/C,sEAAsE;YACtE,IAAI,UAAU,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,EAAE,CAAC;gBACjD,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBAE1C,qDAAqD;gBACrD,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC,IAAI,EAAE,GAAG,EAAE;oBAChE,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;oBACzB,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;oBAE7B,iCAAiC;oBACjC,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;oBACvB,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;gBACzB,CAAC,CAAC,CAAC;gBAEH,MAAM,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;oBAC3B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;wBACvC,aAAa;wBACb,KAAK,EAAE,4BAA4B,KAAK,CAAC,OAAO,EAAE;qBACnD,CAAC,CAAC;oBAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;wBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;oBACtB,CAAC;gBACH,CAAC,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,eAAe;QACf,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;YACzB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;gBAC9C,aAAa;aACd,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,cAAc;QACd,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAClC,SAAS,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAE9B,SAAS,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC3B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,wBAAwB;aAChC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,GAAiC,EAAE,GAAgC;QAC1F,uCAAuC;QACvC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,eAAe,EAAE,CAAC;YACtC,IAAI,CAAC,eAAe,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,oCAAoC;QACpC,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAE1C,mDAAmD;QACnD,MAAM,SAAS,GAAG;YAChB,QAAQ,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa,IAAI,SAAS;SAChD,CAAC;QAEF,+DAA+D;QAC/D,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;QAEhE,mCAAmC;QACnC,MAAM,OAAO,GAAG;YACd,QAAQ,EAAE,MAAM,CAAC,IAAI;YACrB,IAAI,EAAE,MAAM,CAAC,IAAI;YACjB,IAAI,EAAE,GAAG,CAAC,GAAG;YACb,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,OAAO;SACR,CAAC;QAEF,2BAA2B;QAC3B,MAAM,QAAQ,GAAG,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;YAC1D,yDAAyD;YACzD,GAAG,CAAC,SAAS,CAAC,QAAQ,CAAC,UAAU,IAAI,GAAG,EAAE,QAAQ,CAAC,OAAO,CAAC,CAAC;YAE5D,iDAAiD;YACjD,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAEnB,kCAAkC;YAClC,IAAI,YAAY,GAAG,CAAC,CAAC;YACrB,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;gBAC5B,YAAY,IAAI,KAAK,CAAC,MAAM,CAAC;YAC/B,CAAC,CAAC,CAAC;YAEH,QAAQ,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;gBACtB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,aAAa,EAAE;oBAC/C,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,OAAO,EAAE,QAAQ,CAAC,OAAO;oBACzB,IAAI,EAAE,YAAY;iBACnB,CAAC,CAAC;YACL,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,qCAAqC;QACrC,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC7B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;gBACvC,KAAK,EAAE,wBAAwB,KAAK,CAAC,OAAO,EAAE;aAC/C,CAAC,CAAC;YAEH,0DAA0D;YAC1D,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC;gBACrB,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,EAAE,cAAc,EAAE,YAAY,EAAE,CAAC,CAAC;gBACrD,GAAG,CAAC,GAAG,CAAC,6BAA6B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YACxD,CAAC;iBAAM,CAAC;gBACN,0DAA0D;gBAC1D,GAAG,CAAC,GAAG,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,IAAI,WAAW,GAAG,CAAC,CAAC;QACpB,GAAG,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;YACvB,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC;QAC9B,CAAC,CAAC,CAAC;QAEH,kBAAkB;QAClB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;YAC9C,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,GAAG,EAAE,GAAG,CAAC,GAAG;YACZ,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;YACvC,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE;SACxC,CAAC,CAAC;QAEH,+CAA+C;QAC/C,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;YACjB,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,QAAQ,CAAC,GAAG,EAAE,CAAC;QACjB,CAAC;IACH,CAAC;CACF"}
@@ -0,0 +1,35 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { ForwardingHandler } from './forwarding.handler.js';
3
+ import type { IForwardConfig } from '../types/forwarding.types.js';
4
+ /**
5
+ * Handler for HTTPS termination with HTTPS backend
6
+ */
7
+ export declare class HttpsTerminateToHttpsHandler extends ForwardingHandler {
8
+ private secureContext;
9
+ /**
10
+ * Create a new HTTPS termination with HTTPS backend handler
11
+ * @param config The forwarding configuration
12
+ */
13
+ constructor(config: IForwardConfig);
14
+ /**
15
+ * Initialize the handler, setting up TLS context
16
+ */
17
+ initialize(): Promise<void>;
18
+ /**
19
+ * Set the secure context for TLS termination
20
+ * Called when a certificate is available
21
+ * @param context The secure context
22
+ */
23
+ setSecureContext(context: plugins.tls.SecureContext): void;
24
+ /**
25
+ * Handle a TLS/SSL socket connection by terminating TLS and creating a new TLS connection to backend
26
+ * @param clientSocket The incoming socket from the client
27
+ */
28
+ handleConnection(clientSocket: plugins.net.Socket): void;
29
+ /**
30
+ * Handle an HTTP request by forwarding to the HTTPS backend
31
+ * @param req The HTTP request
32
+ * @param res The HTTP response
33
+ */
34
+ handleHttpRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void;
35
+ }
@@ -0,0 +1,254 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { ForwardingHandler } from './forwarding.handler.js';
3
+ import { ForwardingHandlerEvents } from '../types/forwarding.types.js';
4
+ /**
5
+ * Handler for HTTPS termination with HTTPS backend
6
+ */
7
+ export class HttpsTerminateToHttpsHandler extends ForwardingHandler {
8
+ /**
9
+ * Create a new HTTPS termination with HTTPS backend handler
10
+ * @param config The forwarding configuration
11
+ */
12
+ constructor(config) {
13
+ super(config);
14
+ this.secureContext = null;
15
+ // Validate that this is an HTTPS terminate to HTTPS configuration
16
+ if (config.type !== 'https-terminate-to-https') {
17
+ throw new Error(`Invalid configuration type for HttpsTerminateToHttpsHandler: ${config.type}`);
18
+ }
19
+ }
20
+ /**
21
+ * Initialize the handler, setting up TLS context
22
+ */
23
+ async initialize() {
24
+ // We need to load or create TLS certificates for termination
25
+ if (this.config.https?.customCert) {
26
+ // Use custom certificate from configuration
27
+ this.secureContext = plugins.tls.createSecureContext({
28
+ key: this.config.https.customCert.key,
29
+ cert: this.config.https.customCert.cert
30
+ });
31
+ this.emit(ForwardingHandlerEvents.CERTIFICATE_LOADED, {
32
+ source: 'config',
33
+ domain: this.config.target.host
34
+ });
35
+ }
36
+ else if (this.config.acme?.enabled) {
37
+ // Request certificate through ACME if needed
38
+ this.emit(ForwardingHandlerEvents.CERTIFICATE_NEEDED, {
39
+ domain: Array.isArray(this.config.target.host)
40
+ ? this.config.target.host[0]
41
+ : this.config.target.host,
42
+ useProduction: this.config.acme.production || false
43
+ });
44
+ // In a real implementation, we would wait for the certificate to be issued
45
+ // For now, we'll use a dummy context
46
+ this.secureContext = plugins.tls.createSecureContext({
47
+ key: '-----BEGIN PRIVATE KEY-----\nDummy key\n-----END PRIVATE KEY-----',
48
+ cert: '-----BEGIN CERTIFICATE-----\nDummy cert\n-----END CERTIFICATE-----'
49
+ });
50
+ }
51
+ else {
52
+ throw new Error('HTTPS termination requires either a custom certificate or ACME enabled');
53
+ }
54
+ }
55
+ /**
56
+ * Set the secure context for TLS termination
57
+ * Called when a certificate is available
58
+ * @param context The secure context
59
+ */
60
+ setSecureContext(context) {
61
+ this.secureContext = context;
62
+ }
63
+ /**
64
+ * Handle a TLS/SSL socket connection by terminating TLS and creating a new TLS connection to backend
65
+ * @param clientSocket The incoming socket from the client
66
+ */
67
+ handleConnection(clientSocket) {
68
+ // Make sure we have a secure context
69
+ if (!this.secureContext) {
70
+ clientSocket.destroy(new Error('TLS secure context not initialized'));
71
+ return;
72
+ }
73
+ const remoteAddress = clientSocket.remoteAddress || 'unknown';
74
+ const remotePort = clientSocket.remotePort || 0;
75
+ // Create a TLS socket using our secure context
76
+ const tlsSocket = new plugins.tls.TLSSocket(clientSocket, {
77
+ secureContext: this.secureContext,
78
+ isServer: true
79
+ });
80
+ this.emit(ForwardingHandlerEvents.CONNECTED, {
81
+ remoteAddress,
82
+ remotePort,
83
+ tls: true
84
+ });
85
+ // Handle TLS errors
86
+ tlsSocket.on('error', (error) => {
87
+ this.emit(ForwardingHandlerEvents.ERROR, {
88
+ remoteAddress,
89
+ error: `TLS error: ${error.message}`
90
+ });
91
+ if (!tlsSocket.destroyed) {
92
+ tlsSocket.destroy();
93
+ }
94
+ });
95
+ // The TLS socket will now emit HTTP traffic that can be processed
96
+ // In a real implementation, we would create an HTTP parser and handle
97
+ // the requests here, but for simplicity, we'll just forward the data
98
+ // Get the target from configuration
99
+ const target = this.getTargetFromConfig();
100
+ // Set up the connection to the HTTPS backend
101
+ const connectToBackend = () => {
102
+ const backendSocket = plugins.tls.connect({
103
+ host: target.host,
104
+ port: target.port,
105
+ // In a real implementation, we would configure TLS options
106
+ rejectUnauthorized: false // For testing only, never use in production
107
+ }, () => {
108
+ this.emit(ForwardingHandlerEvents.DATA_FORWARDED, {
109
+ direction: 'outbound',
110
+ target: `${target.host}:${target.port}`,
111
+ tls: true
112
+ });
113
+ // Set up bidirectional data flow
114
+ tlsSocket.pipe(backendSocket);
115
+ backendSocket.pipe(tlsSocket);
116
+ });
117
+ backendSocket.on('error', (error) => {
118
+ this.emit(ForwardingHandlerEvents.ERROR, {
119
+ remoteAddress,
120
+ error: `Backend connection error: ${error.message}`
121
+ });
122
+ if (!tlsSocket.destroyed) {
123
+ tlsSocket.destroy();
124
+ }
125
+ });
126
+ // Handle close
127
+ backendSocket.on('close', () => {
128
+ if (!tlsSocket.destroyed) {
129
+ tlsSocket.destroy();
130
+ }
131
+ });
132
+ // Set timeout
133
+ const timeout = this.getTimeout();
134
+ backendSocket.setTimeout(timeout);
135
+ backendSocket.on('timeout', () => {
136
+ this.emit(ForwardingHandlerEvents.ERROR, {
137
+ remoteAddress,
138
+ error: 'Backend connection timeout'
139
+ });
140
+ if (!backendSocket.destroyed) {
141
+ backendSocket.destroy();
142
+ }
143
+ });
144
+ };
145
+ // Wait for the TLS handshake to complete before connecting to backend
146
+ tlsSocket.on('secure', () => {
147
+ connectToBackend();
148
+ });
149
+ // Handle close
150
+ tlsSocket.on('close', () => {
151
+ this.emit(ForwardingHandlerEvents.DISCONNECTED, {
152
+ remoteAddress
153
+ });
154
+ });
155
+ // Set timeout
156
+ const timeout = this.getTimeout();
157
+ tlsSocket.setTimeout(timeout);
158
+ tlsSocket.on('timeout', () => {
159
+ this.emit(ForwardingHandlerEvents.ERROR, {
160
+ remoteAddress,
161
+ error: 'TLS connection timeout'
162
+ });
163
+ if (!tlsSocket.destroyed) {
164
+ tlsSocket.destroy();
165
+ }
166
+ });
167
+ }
168
+ /**
169
+ * Handle an HTTP request by forwarding to the HTTPS backend
170
+ * @param req The HTTP request
171
+ * @param res The HTTP response
172
+ */
173
+ handleHttpRequest(req, res) {
174
+ // Check if we should redirect to HTTPS
175
+ if (this.config.http?.redirectToHttps) {
176
+ this.redirectToHttps(req, res);
177
+ return;
178
+ }
179
+ // Get the target from configuration
180
+ const target = this.getTargetFromConfig();
181
+ // Create custom headers with variable substitution
182
+ const variables = {
183
+ clientIp: req.socket.remoteAddress || 'unknown'
184
+ };
185
+ // Prepare headers, merging with any custom headers from config
186
+ const headers = this.applyCustomHeaders(req.headers, variables);
187
+ // Create the proxy request options
188
+ const options = {
189
+ hostname: target.host,
190
+ port: target.port,
191
+ path: req.url,
192
+ method: req.method,
193
+ headers,
194
+ // In a real implementation, we would configure TLS options
195
+ rejectUnauthorized: false // For testing only, never use in production
196
+ };
197
+ // Create the proxy request using HTTPS
198
+ const proxyReq = plugins.https.request(options, (proxyRes) => {
199
+ // Copy status code and headers from the proxied response
200
+ res.writeHead(proxyRes.statusCode || 500, proxyRes.headers);
201
+ // Pipe the proxy response to the client response
202
+ proxyRes.pipe(res);
203
+ // Track response size for logging
204
+ let responseSize = 0;
205
+ proxyRes.on('data', (chunk) => {
206
+ responseSize += chunk.length;
207
+ });
208
+ proxyRes.on('end', () => {
209
+ this.emit(ForwardingHandlerEvents.HTTP_RESPONSE, {
210
+ statusCode: proxyRes.statusCode,
211
+ headers: proxyRes.headers,
212
+ size: responseSize
213
+ });
214
+ });
215
+ });
216
+ // Handle errors in the proxy request
217
+ proxyReq.on('error', (error) => {
218
+ this.emit(ForwardingHandlerEvents.ERROR, {
219
+ remoteAddress: req.socket.remoteAddress,
220
+ error: `Proxy request error: ${error.message}`
221
+ });
222
+ // Send an error response if headers haven't been sent yet
223
+ if (!res.headersSent) {
224
+ res.writeHead(502, { 'Content-Type': 'text/plain' });
225
+ res.end(`Error forwarding request: ${error.message}`);
226
+ }
227
+ else {
228
+ // Just end the response if headers have already been sent
229
+ res.end();
230
+ }
231
+ });
232
+ // Track request details for logging
233
+ let requestSize = 0;
234
+ req.on('data', (chunk) => {
235
+ requestSize += chunk.length;
236
+ });
237
+ // Log the request
238
+ this.emit(ForwardingHandlerEvents.HTTP_REQUEST, {
239
+ method: req.method,
240
+ url: req.url,
241
+ headers: req.headers,
242
+ remoteAddress: req.socket.remoteAddress,
243
+ target: `${target.host}:${target.port}`
244
+ });
245
+ // Pipe the client request to the proxy request
246
+ if (req.readable) {
247
+ req.pipe(proxyReq);
248
+ }
249
+ else {
250
+ proxyReq.end();
251
+ }
252
+ }
253
+ }
254
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"https-terminate-to-https.handler.js","sourceRoot":"","sources":["../../../ts/smartproxy/forwarding/https-terminate-to-https.handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAE5D,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAC;AAEvE;;GAEG;AACH,MAAM,OAAO,4BAA6B,SAAQ,iBAAiB;IAGjE;;;OAGG;IACH,YAAY,MAAsB;QAChC,KAAK,CAAC,MAAM,CAAC,CAAC;QAPR,kBAAa,GAAqC,IAAI,CAAC;QAS7D,kEAAkE;QAClE,IAAI,MAAM,CAAC,IAAI,KAAK,0BAA0B,EAAE,CAAC;YAC/C,MAAM,IAAI,KAAK,CAAC,gEAAgE,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QACjG,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,6DAA6D;QAC7D,IAAI,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,UAAU,EAAE,CAAC;YAClC,4CAA4C;YAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG;gBACrC,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,UAAU,CAAC,IAAI;aACxC,CAAC,CAAC;YAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,QAAQ;gBAChB,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;aAChC,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACrC,6CAA6C;YAC7C,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE;gBACpD,MAAM,EAAE,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;oBAC5C,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC5B,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI;gBAC3B,aAAa,EAAE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,IAAI,KAAK;aACpD,CAAC,CAAC;YAEH,2EAA2E;YAC3E,qCAAqC;YACrC,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC;gBACnD,GAAG,EAAE,mEAAmE;gBACxE,IAAI,EAAE,oEAAoE;aAC3E,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,wEAAwE,CAAC,CAAC;QAC5F,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,OAAkC;QACxD,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACI,gBAAgB,CAAC,YAAgC;QACtD,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,YAAY,CAAC,OAAO,CAAC,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC,CAAC;YACtE,OAAO;QACT,CAAC;QAED,MAAM,aAAa,GAAG,YAAY,CAAC,aAAa,IAAI,SAAS,CAAC;QAC9D,MAAM,UAAU,GAAG,YAAY,CAAC,UAAU,IAAI,CAAC,CAAC;QAEhD,+CAA+C;QAC/C,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,YAAY,EAAE;YACxD,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,QAAQ,EAAE,IAAI;SACf,CAAC,CAAC;QAEH,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,SAAS,EAAE;YAC3C,aAAa;YACb,UAAU;YACV,GAAG,EAAE,IAAI;SACV,CAAC,CAAC;QAEH,oBAAoB;QACpB,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC9B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,cAAc,KAAK,CAAC,OAAO,EAAE;aACrC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,kEAAkE;QAClE,sEAAsE;QACtE,qEAAqE;QAErE,oCAAoC;QACpC,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAE1C,6CAA6C;QAC7C,MAAM,gBAAgB,GAAG,GAAG,EAAE;YAC5B,MAAM,aAAa,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;gBACxC,IAAI,EAAE,MAAM,CAAC,IAAI;gBACjB,IAAI,EAAE,MAAM,CAAC,IAAI;gBACjB,2DAA2D;gBAC3D,kBAAkB,EAAE,KAAK,CAAC,4CAA4C;aACvE,EAAE,GAAG,EAAE;gBACN,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,cAAc,EAAE;oBAChD,SAAS,EAAE,UAAU;oBACrB,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE;oBACvC,GAAG,EAAE,IAAI;iBACV,CAAC,CAAC;gBAEH,iCAAiC;gBACjC,SAAS,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBAC9B,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAChC,CAAC,CAAC,CAAC;YAEH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;gBAClC,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;oBACvC,aAAa;oBACb,KAAK,EAAE,6BAA6B,KAAK,CAAC,OAAO,EAAE;iBACpD,CAAC,CAAC;gBAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;oBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;gBACtB,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,eAAe;YACf,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC7B,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;oBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;gBACtB,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,cAAc;YACd,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;YAClC,aAAa,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;YAElC,aAAa,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBAC/B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;oBACvC,aAAa;oBACb,KAAK,EAAE,4BAA4B;iBACpC,CAAC,CAAC;gBAEH,IAAI,CAAC,aAAa,CAAC,SAAS,EAAE,CAAC;oBAC7B,aAAa,CAAC,OAAO,EAAE,CAAC;gBAC1B,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,CAAC;QAEF,sEAAsE;QACtE,SAAS,CAAC,EAAE,CAAC,QAAQ,EAAE,GAAG,EAAE;YAC1B,gBAAgB,EAAE,CAAC;QACrB,CAAC,CAAC,CAAC;QAEH,eAAe;QACf,SAAS,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;YACzB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;gBAC9C,aAAa;aACd,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,cAAc;QACd,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAClC,SAAS,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAE9B,SAAS,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC3B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa;gBACb,KAAK,EAAE,wBAAwB;aAChC,CAAC,CAAC;YAEH,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;gBACzB,SAAS,CAAC,OAAO,EAAE,CAAC;YACtB,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,iBAAiB,CAAC,GAAiC,EAAE,GAAgC;QAC1F,uCAAuC;QACvC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE,eAAe,EAAE,CAAC;YACtC,IAAI,CAAC,eAAe,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,oCAAoC;QACpC,MAAM,MAAM,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAE1C,mDAAmD;QACnD,MAAM,SAAS,GAAG;YAChB,QAAQ,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa,IAAI,SAAS;SAChD,CAAC;QAEF,+DAA+D;QAC/D,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;QAEhE,mCAAmC;QACnC,MAAM,OAAO,GAAG;YACd,QAAQ,EAAE,MAAM,CAAC,IAAI;YACrB,IAAI,EAAE,MAAM,CAAC,IAAI;YACjB,IAAI,EAAE,GAAG,CAAC,GAAG;YACb,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,OAAO;YACP,2DAA2D;YAC3D,kBAAkB,EAAE,KAAK,CAAC,4CAA4C;SACvE,CAAC;QAEF,uCAAuC;QACvC,MAAM,QAAQ,GAAG,OAAO,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;YAC3D,yDAAyD;YACzD,GAAG,CAAC,SAAS,CAAC,QAAQ,CAAC,UAAU,IAAI,GAAG,EAAE,QAAQ,CAAC,OAAO,CAAC,CAAC;YAE5D,iDAAiD;YACjD,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAEnB,kCAAkC;YAClC,IAAI,YAAY,GAAG,CAAC,CAAC;YACrB,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;gBAC5B,YAAY,IAAI,KAAK,CAAC,MAAM,CAAC;YAC/B,CAAC,CAAC,CAAC;YAEH,QAAQ,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;gBACtB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,aAAa,EAAE;oBAC/C,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,OAAO,EAAE,QAAQ,CAAC,OAAO;oBACzB,IAAI,EAAE,YAAY;iBACnB,CAAC,CAAC;YACL,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,qCAAqC;QACrC,QAAQ,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;YAC7B,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE;gBACvC,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;gBACvC,KAAK,EAAE,wBAAwB,KAAK,CAAC,OAAO,EAAE;aAC/C,CAAC,CAAC;YAEH,0DAA0D;YAC1D,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC;gBACrB,GAAG,CAAC,SAAS,CAAC,GAAG,EAAE,EAAE,cAAc,EAAE,YAAY,EAAE,CAAC,CAAC;gBACrD,GAAG,CAAC,GAAG,CAAC,6BAA6B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YACxD,CAAC;iBAAM,CAAC;gBACN,0DAA0D;gBAC1D,GAAG,CAAC,GAAG,EAAE,CAAC;YACZ,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,IAAI,WAAW,GAAG,CAAC,CAAC;QACpB,GAAG,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE;YACvB,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC;QAC9B,CAAC,CAAC,CAAC;QAEH,kBAAkB;QAClB,IAAI,CAAC,IAAI,CAAC,uBAAuB,CAAC,YAAY,EAAE;YAC9C,MAAM,EAAE,GAAG,CAAC,MAAM;YAClB,GAAG,EAAE,GAAG,CAAC,GAAG;YACZ,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,aAAa,EAAE,GAAG,CAAC,MAAM,CAAC,aAAa;YACvC,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE;SACxC,CAAC,CAAC;QAEH,+CAA+C;QAC/C,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;YACjB,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,QAAQ,CAAC,GAAG,EAAE,CAAC;QACjB,CAAC;IACH,CAAC;CACF"}
@@ -0,0 +1,16 @@
1
+ export type { ForwardingType, IForwardConfig, IForwardingHandler, ITargetConfig, IHttpOptions, IHttpsOptions, IAcmeForwardingOptions, ISecurityOptions, IAdvancedOptions } from '../types/forwarding.types.js';
2
+ export { ForwardingHandlerEvents, httpOnly, tlsTerminateToHttp, tlsTerminateToHttps, httpsPassthrough } from '../types/forwarding.types.js';
3
+ export * from './domain-config.js';
4
+ export { ForwardingHandler } from './forwarding.handler.js';
5
+ export { HttpForwardingHandler } from './http.handler.js';
6
+ export { HttpsPassthroughHandler } from './https-passthrough.handler.js';
7
+ export { HttpsTerminateToHttpHandler } from './https-terminate-to-http.handler.js';
8
+ export { HttpsTerminateToHttpsHandler } from './https-terminate-to-https.handler.js';
9
+ export { ForwardingHandlerFactory } from './forwarding.factory.js';
10
+ export { DomainManager, DomainManagerEvents } from './domain-manager.js';
11
+ export declare const helpers: {
12
+ httpOnly: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
13
+ tlsTerminateToHttp: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
14
+ tlsTerminateToHttps: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
15
+ httpsPassthrough: (partialConfig: Partial<import("../types/forwarding.types.js").IForwardConfig> & Pick<import("../types/forwarding.types.js").IForwardConfig, "target">) => import("../types/forwarding.types.js").IForwardConfig;
16
+ };
@@ -0,0 +1,23 @@
1
+ // Export values
2
+ export { ForwardingHandlerEvents, httpOnly, tlsTerminateToHttp, tlsTerminateToHttps, httpsPassthrough } from '../types/forwarding.types.js';
3
+ // Export domain configuration
4
+ export * from './domain-config.js';
5
+ // Export handlers
6
+ export { ForwardingHandler } from './forwarding.handler.js';
7
+ export { HttpForwardingHandler } from './http.handler.js';
8
+ export { HttpsPassthroughHandler } from './https-passthrough.handler.js';
9
+ export { HttpsTerminateToHttpHandler } from './https-terminate-to-http.handler.js';
10
+ export { HttpsTerminateToHttpsHandler } from './https-terminate-to-https.handler.js';
11
+ // Export factory
12
+ export { ForwardingHandlerFactory } from './forwarding.factory.js';
13
+ // Export manager
14
+ export { DomainManager, DomainManagerEvents } from './domain-manager.js';
15
+ // Helper functions as a convenience object
16
+ import { httpOnly, tlsTerminateToHttp, tlsTerminateToHttps, httpsPassthrough } from '../types/forwarding.types.js';
17
+ export const helpers = {
18
+ httpOnly,
19
+ tlsTerminateToHttp,
20
+ tlsTerminateToHttps,
21
+ httpsPassthrough
22
+ };
23
+ //# sourceMappingURL=data:application/json;base64,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