@push.rocks/smartproxy 12.0.0 → 13.1.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +17 -0
- package/dist_ts/certificate/acme/acme-factory.js +40 -0
- package/dist_ts/certificate/acme/challenge-handler.d.ts +44 -0
- package/dist_ts/certificate/acme/challenge-handler.js +92 -0
- package/dist_ts/certificate/acme/index.d.ts +4 -0
- package/dist_ts/certificate/acme/index.js +5 -0
- package/dist_ts/certificate/events/certificate-events.d.ts +33 -0
- package/dist_ts/certificate/events/certificate-events.js +38 -0
- package/dist_ts/certificate/index.d.ts +24 -0
- package/dist_ts/certificate/index.js +39 -0
- package/dist_ts/certificate/models/certificate-types.d.ts +77 -0
- package/dist_ts/certificate/models/certificate-types.js +2 -0
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +93 -0
- package/dist_ts/certificate/providers/cert-provisioner.js +262 -0
- package/dist_ts/certificate/providers/index.d.ts +4 -0
- package/dist_ts/certificate/providers/index.js +5 -0
- package/dist_ts/certificate/storage/file-storage.d.ts +66 -0
- package/dist_ts/certificate/storage/file-storage.js +194 -0
- package/dist_ts/certificate/storage/index.d.ts +4 -0
- package/dist_ts/certificate/storage/index.js +5 -0
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +17 -0
- package/dist_ts/certificate/utils/certificate-helpers.js +45 -0
- package/dist_ts/common/eventUtils.d.ts +1 -1
- package/dist_ts/common/port80-adapter.d.ts +1 -1
- package/dist_ts/core/events/index.d.ts +4 -0
- package/dist_ts/core/events/index.js +5 -0
- package/dist_ts/core/index.d.ts +6 -0
- package/dist_ts/core/index.js +8 -0
- package/dist_ts/core/models/common-types.d.ts +82 -0
- package/dist_ts/core/models/common-types.js +15 -0
- package/dist_ts/core/models/index.d.ts +4 -0
- package/dist_ts/core/models/index.js +5 -0
- package/dist_ts/core/utils/event-utils.d.ts +15 -0
- package/dist_ts/core/utils/event-utils.js +19 -0
- package/dist_ts/core/utils/index.d.ts +6 -0
- package/dist_ts/core/utils/index.js +7 -0
- package/dist_ts/core/utils/ip-utils.d.ts +53 -0
- package/dist_ts/core/utils/ip-utils.js +153 -0
- package/dist_ts/core/utils/validation-utils.d.ts +61 -0
- package/dist_ts/core/utils/validation-utils.js +149 -0
- package/dist_ts/forwarding/config/domain-config.d.ts +12 -0
- package/dist_ts/forwarding/config/domain-config.js +12 -0
- package/dist_ts/forwarding/config/domain-manager.d.ts +86 -0
- package/dist_ts/forwarding/config/domain-manager.js +242 -0
- package/dist_ts/forwarding/config/forwarding-types.d.ts +104 -0
- package/dist_ts/forwarding/config/forwarding-types.js +50 -0
- package/dist_ts/forwarding/config/index.d.ts +6 -0
- package/dist_ts/forwarding/config/index.js +7 -0
- package/dist_ts/forwarding/factory/forwarding-factory.d.ts +25 -0
- package/dist_ts/forwarding/factory/forwarding-factory.js +138 -0
- package/dist_ts/forwarding/factory/index.d.ts +4 -0
- package/dist_ts/forwarding/factory/index.js +5 -0
- package/dist_ts/forwarding/handlers/base-handler.d.ts +55 -0
- package/dist_ts/forwarding/handlers/base-handler.js +94 -0
- package/dist_ts/forwarding/handlers/http-handler.d.ts +30 -0
- package/dist_ts/forwarding/handlers/http-handler.js +131 -0
- package/dist_ts/forwarding/handlers/https-passthrough-handler.d.ts +29 -0
- package/dist_ts/forwarding/handlers/https-passthrough-handler.js +162 -0
- package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.d.ts +36 -0
- package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.js +229 -0
- package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.d.ts +35 -0
- package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.js +254 -0
- package/dist_ts/forwarding/handlers/index.d.ts +8 -0
- package/dist_ts/forwarding/handlers/index.js +9 -0
- package/dist_ts/forwarding/index.d.ts +19 -0
- package/dist_ts/forwarding/index.js +25 -0
- package/dist_ts/http/index.d.ts +15 -0
- package/dist_ts/http/index.js +20 -0
- package/dist_ts/http/models/http-types.d.ts +81 -0
- package/dist_ts/http/models/http-types.js +62 -0
- package/dist_ts/http/port80/acme-interfaces.d.ts +78 -0
- package/dist_ts/http/port80/acme-interfaces.js +6 -0
- package/dist_ts/http/port80/challenge-responder.d.ts +53 -0
- package/dist_ts/http/port80/challenge-responder.js +203 -0
- package/dist_ts/http/port80/index.d.ts +6 -0
- package/dist_ts/http/port80/index.js +9 -0
- package/dist_ts/http/port80/port80-handler.d.ts +121 -0
- package/dist_ts/http/port80/port80-handler.js +554 -0
- package/dist_ts/http/redirects/index.d.ts +4 -0
- package/dist_ts/http/redirects/index.js +5 -0
- package/dist_ts/http/router/index.d.ts +4 -0
- package/dist_ts/http/router/index.js +5 -0
- package/dist_ts/http/router/proxy-router.d.ts +115 -0
- package/dist_ts/http/router/proxy-router.js +325 -0
- package/dist_ts/index.d.ts +15 -8
- package/dist_ts/index.js +26 -10
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +2 -2
- package/dist_ts/networkproxy/index.d.ts +1 -6
- package/dist_ts/networkproxy/index.js +4 -8
- package/dist_ts/plugins.d.ts +2 -1
- package/dist_ts/plugins.js +3 -2
- package/dist_ts/port80handler/classes.port80handler.d.ts +8 -136
- package/dist_ts/port80handler/classes.port80handler.js +14 -567
- package/dist_ts/proxies/index.d.ts +6 -0
- package/dist_ts/proxies/index.js +8 -0
- package/dist_ts/proxies/network-proxy/certificate-manager.d.ts +77 -0
- package/dist_ts/proxies/network-proxy/certificate-manager.js +373 -0
- package/dist_ts/proxies/network-proxy/connection-pool.d.ts +47 -0
- package/dist_ts/proxies/network-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/network-proxy/index.d.ts +10 -0
- package/dist_ts/proxies/network-proxy/index.js +12 -0
- package/dist_ts/proxies/network-proxy/models/index.d.ts +4 -0
- package/dist_ts/proxies/network-proxy/models/index.js +5 -0
- package/dist_ts/proxies/network-proxy/models/types.d.ts +80 -0
- package/dist_ts/proxies/network-proxy/models/types.js +35 -0
- package/dist_ts/proxies/network-proxy/network-proxy.d.ts +118 -0
- package/dist_ts/proxies/network-proxy/network-proxy.js +387 -0
- package/dist_ts/proxies/network-proxy/request-handler.d.ts +57 -0
- package/dist_ts/proxies/network-proxy/request-handler.js +394 -0
- package/dist_ts/proxies/network-proxy/websocket-handler.d.ts +38 -0
- package/dist_ts/proxies/network-proxy/websocket-handler.js +188 -0
- package/dist_ts/proxies/nftables-proxy/index.d.ts +5 -0
- package/dist_ts/proxies/nftables-proxy/index.js +6 -0
- package/dist_ts/proxies/nftables-proxy/models/errors.d.ts +15 -0
- package/dist_ts/proxies/nftables-proxy/models/errors.js +28 -0
- package/dist_ts/proxies/nftables-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/nftables-proxy/models/index.js +6 -0
- package/dist_ts/proxies/nftables-proxy/models/interfaces.d.ts +75 -0
- package/dist_ts/proxies/nftables-proxy/models/interfaces.js +5 -0
- package/dist_ts/proxies/nftables-proxy/nftables-proxy.d.ts +136 -0
- package/dist_ts/proxies/nftables-proxy/nftables-proxy.js +1516 -0
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +39 -0
- package/dist_ts/proxies/smart-proxy/connection-handler.js +894 -0
- package/dist_ts/proxies/smart-proxy/connection-manager.d.ts +78 -0
- package/dist_ts/proxies/smart-proxy/connection-manager.js +378 -0
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +95 -0
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +255 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +13 -0
- package/dist_ts/proxies/smart-proxy/index.js +17 -0
- package/dist_ts/proxies/smart-proxy/models/index.d.ts +4 -0
- package/dist_ts/proxies/smart-proxy/models/index.js +5 -0
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +107 -0
- package/dist_ts/proxies/smart-proxy/models/interfaces.js +2 -0
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +62 -0
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +316 -0
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +56 -0
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +176 -0
- package/dist_ts/proxies/smart-proxy/security-manager.d.ts +64 -0
- package/dist_ts/proxies/smart-proxy/security-manager.js +149 -0
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +63 -0
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +523 -0
- package/dist_ts/proxies/smart-proxy/timeout-manager.d.ts +47 -0
- package/dist_ts/proxies/smart-proxy/timeout-manager.js +154 -0
- package/dist_ts/proxies/smart-proxy/tls-manager.d.ts +57 -0
- package/dist_ts/proxies/smart-proxy/tls-manager.js +132 -0
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +2 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +1 -1
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +2 -2
- package/dist_ts/smartproxy/classes.smartproxy.js +3 -3
- package/dist_ts/tls/alerts/index.d.ts +4 -0
- package/dist_ts/tls/alerts/index.js +5 -0
- package/dist_ts/tls/alerts/tls-alert.d.ts +150 -0
- package/dist_ts/tls/alerts/tls-alert.js +226 -0
- package/dist_ts/tls/index.d.ts +18 -0
- package/dist_ts/tls/index.js +27 -0
- package/dist_ts/tls/sni/client-hello-parser.d.ts +100 -0
- package/dist_ts/tls/sni/client-hello-parser.js +463 -0
- package/dist_ts/tls/sni/index.d.ts +4 -0
- package/dist_ts/tls/sni/index.js +5 -0
- package/dist_ts/tls/sni/sni-extraction.d.ts +58 -0
- package/dist_ts/tls/sni/sni-extraction.js +275 -0
- package/dist_ts/tls/sni/sni-handler.d.ts +154 -0
- package/dist_ts/tls/sni/sni-handler.js +191 -0
- package/dist_ts/tls/utils/index.d.ts +4 -0
- package/dist_ts/tls/utils/index.js +5 -0
- package/dist_ts/tls/utils/tls-utils.d.ts +158 -0
- package/dist_ts/tls/utils/tls-utils.js +187 -0
- package/package.json +1 -1
- package/readme.md +89 -21
- package/readme.plan.md +253 -469
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/certificate/acme/acme-factory.ts +48 -0
- package/ts/certificate/acme/challenge-handler.ts +110 -0
- package/ts/certificate/acme/index.ts +3 -0
- package/ts/certificate/events/certificate-events.ts +36 -0
- package/ts/certificate/index.ts +67 -0
- package/ts/certificate/models/certificate-types.ts +88 -0
- package/ts/certificate/providers/cert-provisioner.ts +326 -0
- package/ts/certificate/providers/index.ts +3 -0
- package/ts/certificate/storage/file-storage.ts +234 -0
- package/ts/certificate/storage/index.ts +3 -0
- package/ts/certificate/utils/certificate-helpers.ts +50 -0
- package/ts/common/eventUtils.ts +1 -1
- package/ts/common/port80-adapter.ts +1 -1
- package/ts/core/events/index.ts +3 -0
- package/ts/core/index.ts +8 -0
- package/ts/core/models/common-types.ts +91 -0
- package/ts/core/models/index.ts +5 -0
- package/ts/core/utils/event-utils.ts +34 -0
- package/ts/core/utils/index.ts +7 -0
- package/ts/core/utils/ip-utils.ts +175 -0
- package/ts/core/utils/validation-utils.ts +177 -0
- package/ts/{smartproxy/forwarding → forwarding/config}/domain-config.ts +1 -1
- package/ts/{smartproxy/forwarding → forwarding/config}/domain-manager.ts +8 -8
- package/ts/{smartproxy/types/forwarding.types.ts → forwarding/config/forwarding-types.ts} +6 -6
- package/ts/forwarding/config/index.ts +7 -0
- package/ts/{smartproxy/forwarding/forwarding.factory.ts → forwarding/factory/forwarding-factory.ts} +12 -11
- package/ts/forwarding/factory/index.ts +5 -0
- package/ts/{smartproxy/forwarding/forwarding.handler.ts → forwarding/handlers/base-handler.ts} +2 -2
- package/ts/{smartproxy/forwarding/http.handler.ts → forwarding/handlers/http-handler.ts} +13 -4
- package/ts/{smartproxy/forwarding/https-passthrough.handler.ts → forwarding/handlers/https-passthrough-handler.ts} +13 -4
- package/ts/{smartproxy/forwarding/https-terminate-to-http.handler.ts → forwarding/handlers/https-terminate-to-http-handler.ts} +3 -3
- package/ts/{smartproxy/forwarding/https-terminate-to-https.handler.ts → forwarding/handlers/https-terminate-to-https-handler.ts} +3 -3
- package/ts/forwarding/handlers/index.ts +9 -0
- package/ts/forwarding/index.ts +34 -0
- package/ts/http/index.ts +23 -0
- package/ts/http/models/http-types.ts +105 -0
- package/ts/http/port80/acme-interfaces.ts +85 -0
- package/ts/http/port80/challenge-responder.ts +246 -0
- package/ts/http/port80/index.ts +13 -0
- package/ts/{port80handler/classes.port80handler.ts → http/port80/port80-handler.ts} +164 -161
- package/ts/http/redirects/index.ts +3 -0
- package/ts/http/router/index.ts +5 -0
- package/ts/{classes.router.ts → http/router/proxy-router.ts} +27 -20
- package/ts/index.ts +32 -9
- package/ts/plugins.ts +2 -1
- package/ts/proxies/index.ts +8 -0
- package/ts/{networkproxy/classes.np.certificatemanager.ts → proxies/network-proxy/certificate-manager.ts} +17 -16
- package/ts/{networkproxy/classes.np.connectionpool.ts → proxies/network-proxy/connection-pool.ts} +3 -3
- package/ts/proxies/network-proxy/index.ts +13 -0
- package/ts/proxies/network-proxy/models/index.ts +4 -0
- package/ts/{networkproxy/classes.np.types.ts → proxies/network-proxy/models/types.ts} +7 -11
- package/ts/{networkproxy/classes.np.networkproxy.ts → proxies/network-proxy/network-proxy.ts} +31 -24
- package/ts/{networkproxy/classes.np.requesthandler.ts → proxies/network-proxy/request-handler.ts} +12 -7
- package/ts/{networkproxy/classes.np.websockethandler.ts → proxies/network-proxy/websocket-handler.ts} +6 -6
- package/ts/proxies/nftables-proxy/index.ts +5 -0
- package/ts/proxies/nftables-proxy/models/errors.ts +30 -0
- package/ts/proxies/nftables-proxy/models/index.ts +5 -0
- package/ts/proxies/nftables-proxy/models/interfaces.ts +94 -0
- package/ts/{nfttablesproxy/classes.nftablesproxy.ts → proxies/nftables-proxy/nftables-proxy.ts} +24 -126
- package/ts/{smartproxy/classes.pp.connectionhandler.ts → proxies/smart-proxy/connection-handler.ts} +12 -12
- package/ts/{smartproxy/classes.pp.connectionmanager.ts → proxies/smart-proxy/connection-manager.ts} +8 -8
- package/ts/{smartproxy/classes.pp.domainconfigmanager.ts → proxies/smart-proxy/domain-config-manager.ts} +15 -14
- package/ts/proxies/smart-proxy/index.ts +18 -0
- package/ts/proxies/smart-proxy/models/index.ts +4 -0
- package/ts/{smartproxy/classes.pp.interfaces.ts → proxies/smart-proxy/models/interfaces.ts} +12 -8
- package/ts/{smartproxy/classes.pp.networkproxybridge.ts → proxies/smart-proxy/network-proxy-bridge.ts} +14 -14
- package/ts/{smartproxy/classes.pp.portrangemanager.ts → proxies/smart-proxy/port-range-manager.ts} +1 -1
- package/ts/{smartproxy/classes.pp.securitymanager.ts → proxies/smart-proxy/security-manager.ts} +3 -3
- package/ts/{smartproxy/classes.smartproxy.ts → proxies/smart-proxy/smart-proxy.ts} +29 -24
- package/ts/{smartproxy/classes.pp.timeoutmanager.ts → proxies/smart-proxy/timeout-manager.ts} +3 -3
- package/ts/{smartproxy/classes.pp.tlsmanager.ts → proxies/smart-proxy/tls-manager.ts} +3 -3
- package/ts/tls/alerts/index.ts +3 -0
- package/ts/{smartproxy/classes.pp.tlsalert.ts → tls/alerts/tls-alert.ts} +44 -43
- package/ts/tls/index.ts +33 -0
- package/ts/tls/sni/client-hello-parser.ts +629 -0
- package/ts/tls/sni/index.ts +3 -0
- package/ts/tls/sni/sni-extraction.ts +353 -0
- package/ts/tls/sni/sni-handler.ts +264 -0
- package/ts/tls/utils/index.ts +3 -0
- package/ts/tls/utils/tls-utils.ts +201 -0
- package/ts/common/acmeFactory.ts +0 -23
- package/ts/helpers.certificates.ts +0 -30
- package/ts/networkproxy/index.ts +0 -7
- package/ts/smartproxy/classes.pp.certprovisioner.ts +0 -200
- package/ts/smartproxy/classes.pp.snihandler.ts +0 -1281
- package/ts/smartproxy/forwarding/index.ts +0 -52
|
@@ -0,0 +1,523 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
// Importing from the new structure
|
|
3
|
+
import { ConnectionManager } from './connection-manager.js';
|
|
4
|
+
import { SecurityManager } from './security-manager.js';
|
|
5
|
+
import { DomainConfigManager } from './domain-config-manager.js';
|
|
6
|
+
import { TlsManager } from './tls-manager.js';
|
|
7
|
+
import { NetworkProxyBridge } from './network-proxy-bridge.js';
|
|
8
|
+
import { TimeoutManager } from './timeout-manager.js';
|
|
9
|
+
import { PortRangeManager } from './port-range-manager.js';
|
|
10
|
+
import { ConnectionHandler } from './connection-handler.js';
|
|
11
|
+
// External dependencies from migrated modules
|
|
12
|
+
import { Port80Handler } from '../../http/port80/port80-handler.js';
|
|
13
|
+
import { CertProvisioner } from '../../certificate/providers/cert-provisioner.js';
|
|
14
|
+
import { buildPort80Handler } from '../../certificate/acme/acme-factory.js';
|
|
15
|
+
import { createPort80HandlerOptions } from '../../common/port80-adapter.js';
|
|
16
|
+
/**
|
|
17
|
+
* SmartProxy - Main class that coordinates all components
|
|
18
|
+
*/
|
|
19
|
+
export class SmartProxy extends plugins.EventEmitter {
|
|
20
|
+
constructor(settingsArg) {
|
|
21
|
+
super();
|
|
22
|
+
this.netServers = [];
|
|
23
|
+
this.connectionLogger = null;
|
|
24
|
+
this.isShuttingDown = false;
|
|
25
|
+
// Port80Handler for ACME certificate management
|
|
26
|
+
this.port80Handler = null;
|
|
27
|
+
// Set reasonable defaults for all settings
|
|
28
|
+
this.settings = {
|
|
29
|
+
...settingsArg,
|
|
30
|
+
targetIP: settingsArg.targetIP || 'localhost',
|
|
31
|
+
initialDataTimeout: settingsArg.initialDataTimeout || 120000,
|
|
32
|
+
socketTimeout: settingsArg.socketTimeout || 3600000,
|
|
33
|
+
inactivityCheckInterval: settingsArg.inactivityCheckInterval || 60000,
|
|
34
|
+
maxConnectionLifetime: settingsArg.maxConnectionLifetime || 86400000,
|
|
35
|
+
inactivityTimeout: settingsArg.inactivityTimeout || 14400000,
|
|
36
|
+
gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000,
|
|
37
|
+
noDelay: settingsArg.noDelay !== undefined ? settingsArg.noDelay : true,
|
|
38
|
+
keepAlive: settingsArg.keepAlive !== undefined ? settingsArg.keepAlive : true,
|
|
39
|
+
keepAliveInitialDelay: settingsArg.keepAliveInitialDelay || 10000,
|
|
40
|
+
maxPendingDataSize: settingsArg.maxPendingDataSize || 10 * 1024 * 1024,
|
|
41
|
+
disableInactivityCheck: settingsArg.disableInactivityCheck || false,
|
|
42
|
+
enableKeepAliveProbes: settingsArg.enableKeepAliveProbes !== undefined ? settingsArg.enableKeepAliveProbes : true,
|
|
43
|
+
enableDetailedLogging: settingsArg.enableDetailedLogging || false,
|
|
44
|
+
enableTlsDebugLogging: settingsArg.enableTlsDebugLogging || false,
|
|
45
|
+
enableRandomizedTimeouts: settingsArg.enableRandomizedTimeouts || false,
|
|
46
|
+
allowSessionTicket: settingsArg.allowSessionTicket !== undefined ? settingsArg.allowSessionTicket : true,
|
|
47
|
+
maxConnectionsPerIP: settingsArg.maxConnectionsPerIP || 100,
|
|
48
|
+
connectionRateLimitPerMinute: settingsArg.connectionRateLimitPerMinute || 300,
|
|
49
|
+
keepAliveTreatment: settingsArg.keepAliveTreatment || 'extended',
|
|
50
|
+
keepAliveInactivityMultiplier: settingsArg.keepAliveInactivityMultiplier || 6,
|
|
51
|
+
extendedKeepAliveLifetime: settingsArg.extendedKeepAliveLifetime || 7 * 24 * 60 * 60 * 1000,
|
|
52
|
+
networkProxyPort: settingsArg.networkProxyPort || 8443,
|
|
53
|
+
acme: settingsArg.acme || {},
|
|
54
|
+
globalPortRanges: settingsArg.globalPortRanges || [],
|
|
55
|
+
};
|
|
56
|
+
// Set default ACME options if not provided
|
|
57
|
+
if (!this.settings.acme || Object.keys(this.settings.acme).length === 0) {
|
|
58
|
+
this.settings.acme = {
|
|
59
|
+
enabled: false,
|
|
60
|
+
port: 80,
|
|
61
|
+
accountEmail: 'admin@example.com',
|
|
62
|
+
useProduction: false,
|
|
63
|
+
renewThresholdDays: 30,
|
|
64
|
+
autoRenew: true,
|
|
65
|
+
certificateStore: './certs',
|
|
66
|
+
skipConfiguredCerts: false,
|
|
67
|
+
httpsRedirectPort: this.settings.fromPort,
|
|
68
|
+
renewCheckIntervalHours: 24,
|
|
69
|
+
domainForwards: []
|
|
70
|
+
};
|
|
71
|
+
}
|
|
72
|
+
// Initialize component managers
|
|
73
|
+
this.timeoutManager = new TimeoutManager(this.settings);
|
|
74
|
+
this.securityManager = new SecurityManager(this.settings);
|
|
75
|
+
this.connectionManager = new ConnectionManager(this.settings, this.securityManager, this.timeoutManager);
|
|
76
|
+
this.domainConfigManager = new DomainConfigManager(this.settings);
|
|
77
|
+
this.tlsManager = new TlsManager(this.settings);
|
|
78
|
+
this.networkProxyBridge = new NetworkProxyBridge(this.settings);
|
|
79
|
+
this.portRangeManager = new PortRangeManager(this.settings);
|
|
80
|
+
// Initialize connection handler
|
|
81
|
+
this.connectionHandler = new ConnectionHandler(this.settings, this.connectionManager, this.securityManager, this.domainConfigManager, this.tlsManager, this.networkProxyBridge, this.timeoutManager, this.portRangeManager);
|
|
82
|
+
}
|
|
83
|
+
/**
|
|
84
|
+
* Initialize the Port80Handler for ACME certificate management
|
|
85
|
+
*/
|
|
86
|
+
async initializePort80Handler() {
|
|
87
|
+
const config = this.settings.acme;
|
|
88
|
+
if (!config.enabled) {
|
|
89
|
+
console.log('ACME is disabled in configuration');
|
|
90
|
+
return;
|
|
91
|
+
}
|
|
92
|
+
try {
|
|
93
|
+
// Build and start the Port80Handler
|
|
94
|
+
this.port80Handler = buildPort80Handler({
|
|
95
|
+
...config,
|
|
96
|
+
httpsRedirectPort: config.httpsRedirectPort || this.settings.fromPort
|
|
97
|
+
});
|
|
98
|
+
// Share Port80Handler with NetworkProxyBridge before start
|
|
99
|
+
this.networkProxyBridge.setPort80Handler(this.port80Handler);
|
|
100
|
+
await this.port80Handler.start();
|
|
101
|
+
console.log(`Port80Handler started on port ${config.port}`);
|
|
102
|
+
}
|
|
103
|
+
catch (err) {
|
|
104
|
+
console.log(`Error initializing Port80Handler: ${err}`);
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
/**
|
|
108
|
+
* Start the proxy server
|
|
109
|
+
*/
|
|
110
|
+
async start() {
|
|
111
|
+
// Don't start if already shutting down
|
|
112
|
+
if (this.isShuttingDown) {
|
|
113
|
+
console.log("Cannot start SmartProxy while it's shutting down");
|
|
114
|
+
return;
|
|
115
|
+
}
|
|
116
|
+
// Process domain configs
|
|
117
|
+
// Note: ensureForwardingConfig is no longer needed since forwarding is now required
|
|
118
|
+
// Initialize domain config manager with the processed configs
|
|
119
|
+
this.domainConfigManager.updateDomainConfigs(this.settings.domainConfigs);
|
|
120
|
+
// Initialize Port80Handler if enabled
|
|
121
|
+
await this.initializePort80Handler();
|
|
122
|
+
// Initialize CertProvisioner for unified certificate workflows
|
|
123
|
+
if (this.port80Handler) {
|
|
124
|
+
const acme = this.settings.acme;
|
|
125
|
+
// Convert domain forwards to use the new forwarding system if possible
|
|
126
|
+
const domainForwards = acme.domainForwards?.map(f => {
|
|
127
|
+
// If the domain has a forwarding config in domainConfigs, use that
|
|
128
|
+
const domainConfig = this.settings.domainConfigs.find(dc => dc.domains.some(d => d === f.domain));
|
|
129
|
+
if (domainConfig?.forwarding) {
|
|
130
|
+
return {
|
|
131
|
+
domain: f.domain,
|
|
132
|
+
forwardConfig: f.forwardConfig,
|
|
133
|
+
acmeForwardConfig: f.acmeForwardConfig,
|
|
134
|
+
sslRedirect: f.sslRedirect || domainConfig.forwarding.http?.redirectToHttps || false
|
|
135
|
+
};
|
|
136
|
+
}
|
|
137
|
+
// Otherwise use the existing configuration
|
|
138
|
+
return {
|
|
139
|
+
domain: f.domain,
|
|
140
|
+
forwardConfig: f.forwardConfig,
|
|
141
|
+
acmeForwardConfig: f.acmeForwardConfig,
|
|
142
|
+
sslRedirect: f.sslRedirect || false
|
|
143
|
+
};
|
|
144
|
+
}) || [];
|
|
145
|
+
this.certProvisioner = new CertProvisioner(this.settings.domainConfigs, this.port80Handler, this.networkProxyBridge, this.settings.certProvisionFunction, acme.renewThresholdDays, acme.renewCheckIntervalHours, acme.autoRenew, domainForwards);
|
|
146
|
+
this.certProvisioner.on('certificate', (certData) => {
|
|
147
|
+
this.emit('certificate', {
|
|
148
|
+
domain: certData.domain,
|
|
149
|
+
publicKey: certData.certificate,
|
|
150
|
+
privateKey: certData.privateKey,
|
|
151
|
+
expiryDate: certData.expiryDate,
|
|
152
|
+
source: certData.source,
|
|
153
|
+
isRenewal: certData.isRenewal
|
|
154
|
+
});
|
|
155
|
+
});
|
|
156
|
+
await this.certProvisioner.start();
|
|
157
|
+
console.log('CertProvisioner started');
|
|
158
|
+
}
|
|
159
|
+
// Initialize and start NetworkProxy if needed
|
|
160
|
+
if (this.settings.useNetworkProxy &&
|
|
161
|
+
this.settings.useNetworkProxy.length > 0) {
|
|
162
|
+
await this.networkProxyBridge.initialize();
|
|
163
|
+
await this.networkProxyBridge.start();
|
|
164
|
+
}
|
|
165
|
+
// Validate port configuration
|
|
166
|
+
const configWarnings = this.portRangeManager.validateConfiguration();
|
|
167
|
+
if (configWarnings.length > 0) {
|
|
168
|
+
console.log("Port configuration warnings:");
|
|
169
|
+
for (const warning of configWarnings) {
|
|
170
|
+
console.log(` - ${warning}`);
|
|
171
|
+
}
|
|
172
|
+
}
|
|
173
|
+
// Get listening ports from PortRangeManager
|
|
174
|
+
const listeningPorts = this.portRangeManager.getListeningPorts();
|
|
175
|
+
// Create servers for each port
|
|
176
|
+
for (const port of listeningPorts) {
|
|
177
|
+
const server = plugins.net.createServer((socket) => {
|
|
178
|
+
// Check if shutting down
|
|
179
|
+
if (this.isShuttingDown) {
|
|
180
|
+
socket.end();
|
|
181
|
+
socket.destroy();
|
|
182
|
+
return;
|
|
183
|
+
}
|
|
184
|
+
// Delegate to connection handler
|
|
185
|
+
this.connectionHandler.handleConnection(socket);
|
|
186
|
+
}).on('error', (err) => {
|
|
187
|
+
console.log(`Server Error on port ${port}: ${err.message}`);
|
|
188
|
+
});
|
|
189
|
+
server.listen(port, () => {
|
|
190
|
+
const isNetworkProxyPort = this.settings.useNetworkProxy?.includes(port);
|
|
191
|
+
console.log(`SmartProxy -> OK: Now listening on port ${port}${this.settings.sniEnabled && !isNetworkProxyPort ? ' (SNI passthrough enabled)' : ''}${isNetworkProxyPort ? ' (NetworkProxy forwarding enabled)' : ''}`);
|
|
192
|
+
});
|
|
193
|
+
this.netServers.push(server);
|
|
194
|
+
}
|
|
195
|
+
// Set up periodic connection logging and inactivity checks
|
|
196
|
+
this.connectionLogger = setInterval(() => {
|
|
197
|
+
// Immediately return if shutting down
|
|
198
|
+
if (this.isShuttingDown)
|
|
199
|
+
return;
|
|
200
|
+
// Perform inactivity check
|
|
201
|
+
this.connectionManager.performInactivityCheck();
|
|
202
|
+
// Log connection statistics
|
|
203
|
+
const now = Date.now();
|
|
204
|
+
let maxIncoming = 0;
|
|
205
|
+
let maxOutgoing = 0;
|
|
206
|
+
let tlsConnections = 0;
|
|
207
|
+
let nonTlsConnections = 0;
|
|
208
|
+
let completedTlsHandshakes = 0;
|
|
209
|
+
let pendingTlsHandshakes = 0;
|
|
210
|
+
let keepAliveConnections = 0;
|
|
211
|
+
let networkProxyConnections = 0;
|
|
212
|
+
// Get connection records for analysis
|
|
213
|
+
const connectionRecords = this.connectionManager.getConnections();
|
|
214
|
+
// Analyze active connections
|
|
215
|
+
for (const record of connectionRecords.values()) {
|
|
216
|
+
// Track connection stats
|
|
217
|
+
if (record.isTLS) {
|
|
218
|
+
tlsConnections++;
|
|
219
|
+
if (record.tlsHandshakeComplete) {
|
|
220
|
+
completedTlsHandshakes++;
|
|
221
|
+
}
|
|
222
|
+
else {
|
|
223
|
+
pendingTlsHandshakes++;
|
|
224
|
+
}
|
|
225
|
+
}
|
|
226
|
+
else {
|
|
227
|
+
nonTlsConnections++;
|
|
228
|
+
}
|
|
229
|
+
if (record.hasKeepAlive) {
|
|
230
|
+
keepAliveConnections++;
|
|
231
|
+
}
|
|
232
|
+
if (record.usingNetworkProxy) {
|
|
233
|
+
networkProxyConnections++;
|
|
234
|
+
}
|
|
235
|
+
maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
|
|
236
|
+
if (record.outgoingStartTime) {
|
|
237
|
+
maxOutgoing = Math.max(maxOutgoing, now - record.outgoingStartTime);
|
|
238
|
+
}
|
|
239
|
+
}
|
|
240
|
+
// Get termination stats
|
|
241
|
+
const terminationStats = this.connectionManager.getTerminationStats();
|
|
242
|
+
// Log detailed stats
|
|
243
|
+
console.log(`Active connections: ${connectionRecords.size}. ` +
|
|
244
|
+
`Types: TLS=${tlsConnections} (Completed=${completedTlsHandshakes}, Pending=${pendingTlsHandshakes}), ` +
|
|
245
|
+
`Non-TLS=${nonTlsConnections}, KeepAlive=${keepAliveConnections}, NetworkProxy=${networkProxyConnections}. ` +
|
|
246
|
+
`Longest running: IN=${plugins.prettyMs(maxIncoming)}, OUT=${plugins.prettyMs(maxOutgoing)}. ` +
|
|
247
|
+
`Termination stats: ${JSON.stringify({
|
|
248
|
+
IN: terminationStats.incoming,
|
|
249
|
+
OUT: terminationStats.outgoing,
|
|
250
|
+
})}`);
|
|
251
|
+
}, this.settings.inactivityCheckInterval || 60000);
|
|
252
|
+
// Make sure the interval doesn't keep the process alive
|
|
253
|
+
if (this.connectionLogger.unref) {
|
|
254
|
+
this.connectionLogger.unref();
|
|
255
|
+
}
|
|
256
|
+
}
|
|
257
|
+
/**
|
|
258
|
+
* Stop the proxy server
|
|
259
|
+
*/
|
|
260
|
+
async stop() {
|
|
261
|
+
console.log('SmartProxy shutting down...');
|
|
262
|
+
this.isShuttingDown = true;
|
|
263
|
+
// Stop CertProvisioner if active
|
|
264
|
+
if (this.certProvisioner) {
|
|
265
|
+
await this.certProvisioner.stop();
|
|
266
|
+
console.log('CertProvisioner stopped');
|
|
267
|
+
}
|
|
268
|
+
// Stop the Port80Handler if running
|
|
269
|
+
if (this.port80Handler) {
|
|
270
|
+
try {
|
|
271
|
+
await this.port80Handler.stop();
|
|
272
|
+
console.log('Port80Handler stopped');
|
|
273
|
+
this.port80Handler = null;
|
|
274
|
+
}
|
|
275
|
+
catch (err) {
|
|
276
|
+
console.log(`Error stopping Port80Handler: ${err}`);
|
|
277
|
+
}
|
|
278
|
+
}
|
|
279
|
+
// Stop accepting new connections
|
|
280
|
+
const closeServerPromises = this.netServers.map((server) => new Promise((resolve) => {
|
|
281
|
+
if (!server.listening) {
|
|
282
|
+
resolve();
|
|
283
|
+
return;
|
|
284
|
+
}
|
|
285
|
+
server.close((err) => {
|
|
286
|
+
if (err) {
|
|
287
|
+
console.log(`Error closing server: ${err.message}`);
|
|
288
|
+
}
|
|
289
|
+
resolve();
|
|
290
|
+
});
|
|
291
|
+
}));
|
|
292
|
+
// Stop the connection logger
|
|
293
|
+
if (this.connectionLogger) {
|
|
294
|
+
clearInterval(this.connectionLogger);
|
|
295
|
+
this.connectionLogger = null;
|
|
296
|
+
}
|
|
297
|
+
// Wait for servers to close
|
|
298
|
+
await Promise.all(closeServerPromises);
|
|
299
|
+
console.log('All servers closed. Cleaning up active connections...');
|
|
300
|
+
// Clean up all active connections
|
|
301
|
+
this.connectionManager.clearConnections();
|
|
302
|
+
// Stop NetworkProxy
|
|
303
|
+
await this.networkProxyBridge.stop();
|
|
304
|
+
// Clear all servers
|
|
305
|
+
this.netServers = [];
|
|
306
|
+
console.log('SmartProxy shutdown complete.');
|
|
307
|
+
}
|
|
308
|
+
/**
|
|
309
|
+
* Updates the domain configurations for the proxy
|
|
310
|
+
*/
|
|
311
|
+
async updateDomainConfigs(newDomainConfigs) {
|
|
312
|
+
console.log(`Updating domain configurations (${newDomainConfigs.length} configs)`);
|
|
313
|
+
// Update domain configs in DomainConfigManager
|
|
314
|
+
this.domainConfigManager.updateDomainConfigs(newDomainConfigs);
|
|
315
|
+
// If NetworkProxy is initialized, resync the configurations
|
|
316
|
+
if (this.networkProxyBridge.getNetworkProxy()) {
|
|
317
|
+
await this.networkProxyBridge.syncDomainConfigsToNetworkProxy();
|
|
318
|
+
}
|
|
319
|
+
// If Port80Handler is running, provision certificates based on forwarding type
|
|
320
|
+
if (this.port80Handler && this.settings.acme?.enabled) {
|
|
321
|
+
for (const domainConfig of newDomainConfigs) {
|
|
322
|
+
// Skip certificate provisioning for http-only or passthrough configs that don't need certs
|
|
323
|
+
const forwardingType = domainConfig.forwarding.type;
|
|
324
|
+
const needsCertificate = forwardingType === 'https-terminate-to-http' ||
|
|
325
|
+
forwardingType === 'https-terminate-to-https';
|
|
326
|
+
// Skip certificate provisioning if ACME is explicitly disabled for this domain
|
|
327
|
+
const acmeDisabled = domainConfig.forwarding.acme?.enabled === false;
|
|
328
|
+
if (!needsCertificate || acmeDisabled) {
|
|
329
|
+
if (this.settings.enableDetailedLogging) {
|
|
330
|
+
console.log(`Skipping certificate provisioning for ${domainConfig.domains.join(', ')} (${forwardingType})`);
|
|
331
|
+
}
|
|
332
|
+
continue;
|
|
333
|
+
}
|
|
334
|
+
for (const domain of domainConfig.domains) {
|
|
335
|
+
const isWildcard = domain.includes('*');
|
|
336
|
+
let provision = 'http01';
|
|
337
|
+
// Check for ACME forwarding configuration in the domain
|
|
338
|
+
const forwardAcmeChallenges = domainConfig.forwarding.acme?.forwardChallenges;
|
|
339
|
+
if (this.settings.certProvisionFunction) {
|
|
340
|
+
try {
|
|
341
|
+
provision = await this.settings.certProvisionFunction(domain);
|
|
342
|
+
}
|
|
343
|
+
catch (err) {
|
|
344
|
+
console.log(`certProvider error for ${domain}: ${err}`);
|
|
345
|
+
}
|
|
346
|
+
}
|
|
347
|
+
else if (isWildcard) {
|
|
348
|
+
console.warn(`Skipping wildcard domain without certProvisionFunction: ${domain}`);
|
|
349
|
+
continue;
|
|
350
|
+
}
|
|
351
|
+
if (provision === 'http01') {
|
|
352
|
+
if (isWildcard) {
|
|
353
|
+
console.warn(`Skipping HTTP-01 for wildcard domain: ${domain}`);
|
|
354
|
+
continue;
|
|
355
|
+
}
|
|
356
|
+
// Create Port80Handler options from the forwarding configuration
|
|
357
|
+
const port80Config = createPort80HandlerOptions(domain, domainConfig.forwarding);
|
|
358
|
+
this.port80Handler.addDomain(port80Config);
|
|
359
|
+
console.log(`Registered domain ${domain} with Port80Handler for HTTP-01`);
|
|
360
|
+
}
|
|
361
|
+
else {
|
|
362
|
+
// Static certificate (e.g., DNS-01 provisioned) supports wildcards
|
|
363
|
+
const certObj = provision;
|
|
364
|
+
const certData = {
|
|
365
|
+
domain: certObj.domainName,
|
|
366
|
+
certificate: certObj.publicKey,
|
|
367
|
+
privateKey: certObj.privateKey,
|
|
368
|
+
expiryDate: new Date(certObj.validUntil)
|
|
369
|
+
};
|
|
370
|
+
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
371
|
+
console.log(`Applied static certificate for ${domain} from certProvider`);
|
|
372
|
+
}
|
|
373
|
+
}
|
|
374
|
+
}
|
|
375
|
+
console.log('Provisioned certificates for new domains');
|
|
376
|
+
}
|
|
377
|
+
}
|
|
378
|
+
/**
|
|
379
|
+
* Request a certificate for a specific domain
|
|
380
|
+
*/
|
|
381
|
+
async requestCertificate(domain) {
|
|
382
|
+
// Validate domain format
|
|
383
|
+
if (!this.isValidDomain(domain)) {
|
|
384
|
+
console.log(`Invalid domain format: ${domain}`);
|
|
385
|
+
return false;
|
|
386
|
+
}
|
|
387
|
+
// Use Port80Handler if available
|
|
388
|
+
if (this.port80Handler) {
|
|
389
|
+
try {
|
|
390
|
+
// Check if we already have a certificate
|
|
391
|
+
const cert = this.port80Handler.getCertificate(domain);
|
|
392
|
+
if (cert) {
|
|
393
|
+
console.log(`Certificate already exists for ${domain}, valid until ${cert.expiryDate.toISOString()}`);
|
|
394
|
+
return true;
|
|
395
|
+
}
|
|
396
|
+
// Register domain for certificate issuance
|
|
397
|
+
this.port80Handler.addDomain({
|
|
398
|
+
domainName: domain,
|
|
399
|
+
sslRedirect: true,
|
|
400
|
+
acmeMaintenance: true
|
|
401
|
+
});
|
|
402
|
+
console.log(`Domain ${domain} registered for certificate issuance`);
|
|
403
|
+
return true;
|
|
404
|
+
}
|
|
405
|
+
catch (err) {
|
|
406
|
+
console.log(`Error registering domain with Port80Handler: ${err}`);
|
|
407
|
+
return false;
|
|
408
|
+
}
|
|
409
|
+
}
|
|
410
|
+
// Fall back to NetworkProxyBridge
|
|
411
|
+
return this.networkProxyBridge.requestCertificate(domain);
|
|
412
|
+
}
|
|
413
|
+
/**
|
|
414
|
+
* Validates if a domain name is valid for certificate issuance
|
|
415
|
+
*/
|
|
416
|
+
isValidDomain(domain) {
|
|
417
|
+
// Very basic domain validation
|
|
418
|
+
if (!domain || domain.length === 0) {
|
|
419
|
+
return false;
|
|
420
|
+
}
|
|
421
|
+
// Check for wildcard domains (they can't get ACME certs)
|
|
422
|
+
if (domain.includes('*')) {
|
|
423
|
+
console.log(`Wildcard domains like "${domain}" are not supported for ACME certificates`);
|
|
424
|
+
return false;
|
|
425
|
+
}
|
|
426
|
+
// Check if domain has at least one dot and no invalid characters
|
|
427
|
+
const validDomainRegex = /^[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(\.[a-zA-Z0-9]([a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/;
|
|
428
|
+
if (!validDomainRegex.test(domain)) {
|
|
429
|
+
console.log(`Domain "${domain}" has invalid format`);
|
|
430
|
+
return false;
|
|
431
|
+
}
|
|
432
|
+
return true;
|
|
433
|
+
}
|
|
434
|
+
/**
|
|
435
|
+
* Get statistics about current connections
|
|
436
|
+
*/
|
|
437
|
+
getStatistics() {
|
|
438
|
+
const connectionRecords = this.connectionManager.getConnections();
|
|
439
|
+
const terminationStats = this.connectionManager.getTerminationStats();
|
|
440
|
+
let tlsConnections = 0;
|
|
441
|
+
let nonTlsConnections = 0;
|
|
442
|
+
let keepAliveConnections = 0;
|
|
443
|
+
let networkProxyConnections = 0;
|
|
444
|
+
// Analyze active connections
|
|
445
|
+
for (const record of connectionRecords.values()) {
|
|
446
|
+
if (record.isTLS)
|
|
447
|
+
tlsConnections++;
|
|
448
|
+
else
|
|
449
|
+
nonTlsConnections++;
|
|
450
|
+
if (record.hasKeepAlive)
|
|
451
|
+
keepAliveConnections++;
|
|
452
|
+
if (record.usingNetworkProxy)
|
|
453
|
+
networkProxyConnections++;
|
|
454
|
+
}
|
|
455
|
+
return {
|
|
456
|
+
activeConnections: connectionRecords.size,
|
|
457
|
+
tlsConnections,
|
|
458
|
+
nonTlsConnections,
|
|
459
|
+
keepAliveConnections,
|
|
460
|
+
networkProxyConnections,
|
|
461
|
+
terminationStats,
|
|
462
|
+
acmeEnabled: !!this.port80Handler,
|
|
463
|
+
port80HandlerPort: this.port80Handler ? this.settings.acme?.port : null
|
|
464
|
+
};
|
|
465
|
+
}
|
|
466
|
+
/**
|
|
467
|
+
* Get a list of eligible domains for ACME certificates
|
|
468
|
+
*/
|
|
469
|
+
getEligibleDomainsForCertificates() {
|
|
470
|
+
// Collect all non-wildcard domains from domain configs
|
|
471
|
+
const domains = [];
|
|
472
|
+
for (const config of this.settings.domainConfigs) {
|
|
473
|
+
// Skip domains that can't be used with ACME
|
|
474
|
+
const eligibleDomains = config.domains.filter(domain => !domain.includes('*') && this.isValidDomain(domain));
|
|
475
|
+
domains.push(...eligibleDomains);
|
|
476
|
+
}
|
|
477
|
+
return domains;
|
|
478
|
+
}
|
|
479
|
+
/**
|
|
480
|
+
* Get status of certificates managed by Port80Handler
|
|
481
|
+
*/
|
|
482
|
+
getCertificateStatus() {
|
|
483
|
+
if (!this.port80Handler) {
|
|
484
|
+
return {
|
|
485
|
+
enabled: false,
|
|
486
|
+
message: 'Port80Handler is not enabled'
|
|
487
|
+
};
|
|
488
|
+
}
|
|
489
|
+
// Get eligible domains
|
|
490
|
+
const eligibleDomains = this.getEligibleDomainsForCertificates();
|
|
491
|
+
const certificateStatus = {};
|
|
492
|
+
// Check each domain
|
|
493
|
+
for (const domain of eligibleDomains) {
|
|
494
|
+
const cert = this.port80Handler.getCertificate(domain);
|
|
495
|
+
if (cert) {
|
|
496
|
+
const now = new Date();
|
|
497
|
+
const expiryDate = cert.expiryDate;
|
|
498
|
+
const daysRemaining = Math.floor((expiryDate.getTime() - now.getTime()) / (24 * 60 * 60 * 1000));
|
|
499
|
+
certificateStatus[domain] = {
|
|
500
|
+
status: 'valid',
|
|
501
|
+
expiryDate: expiryDate.toISOString(),
|
|
502
|
+
daysRemaining,
|
|
503
|
+
renewalNeeded: daysRemaining <= (this.settings.acme?.renewThresholdDays ?? 0)
|
|
504
|
+
};
|
|
505
|
+
}
|
|
506
|
+
else {
|
|
507
|
+
certificateStatus[domain] = {
|
|
508
|
+
status: 'missing',
|
|
509
|
+
message: 'No certificate found'
|
|
510
|
+
};
|
|
511
|
+
}
|
|
512
|
+
}
|
|
513
|
+
const acme = this.settings.acme;
|
|
514
|
+
return {
|
|
515
|
+
enabled: true,
|
|
516
|
+
port: acme.port,
|
|
517
|
+
useProduction: acme.useProduction,
|
|
518
|
+
autoRenew: acme.autoRenew,
|
|
519
|
+
certificates: certificateStatus
|
|
520
|
+
};
|
|
521
|
+
}
|
|
522
|
+
}
|
|
523
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"smart-proxy.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/smart-proxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAE5C,mCAAmC;AACnC,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACjE,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC3D,OAAO,EAAE,iBAAiB,EAAE,MAAM,yBAAyB,CAAC;AAE5D,8CAA8C;AAC9C,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AACpE,OAAO,EAAE,eAAe,EAAE,MAAM,iDAAiD,CAAC;AAElF,OAAO,EAAE,kBAAkB,EAAE,MAAM,wCAAwC,CAAC;AAE5E,OAAO,EAAE,0BAA0B,EAAE,MAAM,gCAAgC,CAAC;AAO5E;;GAEG;AACH,MAAM,OAAO,UAAW,SAAQ,OAAO,CAAC,YAAY;IAoBlD,YAAY,WAA+B;QACzC,KAAK,EAAE,CAAC;QApBF,eAAU,GAAyB,EAAE,CAAC;QACtC,qBAAgB,GAA0B,IAAI,CAAC;QAC/C,mBAAc,GAAY,KAAK,CAAC;QAYxC,gDAAgD;QACxC,kBAAa,GAAyB,IAAI,CAAC;QAMjD,2CAA2C;QAC3C,IAAI,CAAC,QAAQ,GAAG;YACd,GAAG,WAAW;YACd,QAAQ,EAAE,WAAW,CAAC,QAAQ,IAAI,WAAW;YAC7C,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,MAAM;YAC5D,aAAa,EAAE,WAAW,CAAC,aAAa,IAAI,OAAO;YACnD,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,QAAQ;YACpE,iBAAiB,EAAE,WAAW,CAAC,iBAAiB,IAAI,QAAQ;YAC5D,uBAAuB,EAAE,WAAW,CAAC,uBAAuB,IAAI,KAAK;YACrE,OAAO,EAAE,WAAW,CAAC,OAAO,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI;YACvE,SAAS,EAAE,WAAW,CAAC,SAAS,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YAC7E,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,EAAE,GAAG,IAAI,GAAG,IAAI;YACtE,sBAAsB,EAAE,WAAW,CAAC,sBAAsB,IAAI,KAAK;YACnE,qBAAqB,EACnB,WAAW,CAAC,qBAAqB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,qBAAqB,CAAC,CAAC,CAAC,IAAI;YAC5F,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,qBAAqB,EAAE,WAAW,CAAC,qBAAqB,IAAI,KAAK;YACjE,wBAAwB,EAAE,WAAW,CAAC,wBAAwB,IAAI,KAAK;YACvE,kBAAkB,EAChB,WAAW,CAAC,kBAAkB,KAAK,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,kBAAkB,CAAC,CAAC,CAAC,IAAI;YACtF,mBAAmB,EAAE,WAAW,CAAC,mBAAmB,IAAI,GAAG;YAC3D,4BAA4B,EAAE,WAAW,CAAC,4BAA4B,IAAI,GAAG;YAC7E,kBAAkB,EAAE,WAAW,CAAC,kBAAkB,IAAI,UAAU;YAChE,6BAA6B,EAAE,WAAW,CAAC,6BAA6B,IAAI,CAAC;YAC7E,yBAAyB,EAAE,WAAW,CAAC,yBAAyB,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI;YAC3F,gBAAgB,EAAE,WAAW,CAAC,gBAAgB,IAAI,IAAI;YACtD,IAAI,EAAE,WAAW,CAAC,IAAI,IAAI,EAAE;YAC5B,gBAAgB,EAAE,WAAW,CAAC,gBAAgB,IAAI,EAAE;SACrD,CAAC;QAEF,2CAA2C;QAC3C,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACxE,IAAI,CAAC,QAAQ,CAAC,IAAI,GAAG;gBACnB,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,EAAE;gBACR,YAAY,EAAE,mBAAmB;gBACjC,aAAa,EAAE,KAAK;gBACpB,kBAAkB,EAAE,EAAE;gBACtB,SAAS,EAAE,IAAI;gBACf,gBAAgB,EAAE,SAAS;gBAC3B,mBAAmB,EAAE,KAAK;gBAC1B,iBAAiB,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ;gBACzC,uBAAuB,EAAE,EAAE;gBAC3B,cAAc,EAAE,EAAE;aACnB,CAAC;QACJ,CAAC;QAED,gCAAgC;QAChC,IAAI,CAAC,cAAc,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACxD,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAC1D,IAAI,CAAC,iBAAiB,GAAG,IAAI,iBAAiB,CAC5C,IAAI,CAAC,QAAQ,EACb,IAAI,CAAC,eAAe,EACpB,IAAI,CAAC,cAAc,CACpB,CAAC;QACF,IAAI,CAAC,mBAAmB,GAAG,IAAI,mBAAmB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAClE,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAChD,IAAI,CAAC,kBAAkB,GAAG,IAAI,kBAAkB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAChE,IAAI,CAAC,gBAAgB,GAAG,IAAI,gBAAgB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAE5D,gCAAgC;QAChC,IAAI,CAAC,iBAAiB,GAAG,IAAI,iBAAiB,CAC5C,IAAI,CAAC,QAAQ,EACb,IAAI,CAAC,iBAAiB,EACtB,IAAI,CAAC,eAAe,EACpB,IAAI,CAAC,mBAAmB,EACxB,IAAI,CAAC,UAAU,EACf,IAAI,CAAC,kBAAkB,EACvB,IAAI,CAAC,cAAc,EACnB,IAAI,CAAC,gBAAgB,CACtB,CAAC;IACJ,CAAC;IAOD;;OAEG;IACK,KAAK,CAAC,uBAAuB;QACnC,MAAM,MAAM,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAK,CAAC;QACnC,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YACpB,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;YACjD,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,oCAAoC;YACpC,IAAI,CAAC,aAAa,GAAG,kBAAkB,CAAC;gBACtC,GAAG,MAAM;gBACT,iBAAiB,EAAE,MAAM,CAAC,iBAAiB,IAAI,IAAI,CAAC,QAAQ,CAAC,QAAQ;aACtE,CAAC,CAAC;YACH,2DAA2D;YAC3D,IAAI,CAAC,kBAAkB,CAAC,gBAAgB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;YAC7D,MAAM,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,iCAAiC,MAAM,CAAC,IAAI,EAAE,CAAC,CAAC;QAC9D,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,qCAAqC,GAAG,EAAE,CAAC,CAAC;QAC1D,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,uCAAuC;QACvC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACxB,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO;QACT,CAAC;QAED,yBAAyB;QACzB,oFAAoF;QAEpF,8DAA8D;QAC9D,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAE1E,sCAAsC;QACtC,MAAM,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAErC,+DAA+D;QAC/D,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,MAAM,IAAI,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAK,CAAC;YAEjC,uEAAuE;YACvE,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,EAAE,GAAG,CAAC,CAAC,CAAC,EAAE;gBAClD,mEAAmE;gBACnE,MAAM,YAAY,GAAG,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,IAAI,CACnD,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,CAC3C,CAAC;gBAEF,IAAI,YAAY,EAAE,UAAU,EAAE,CAAC;oBAC7B,OAAO;wBACL,MAAM,EAAE,CAAC,CAAC,MAAM;wBAChB,aAAa,EAAE,CAAC,CAAC,aAAa;wBAC9B,iBAAiB,EAAE,CAAC,CAAC,iBAAiB;wBACtC,WAAW,EAAE,CAAC,CAAC,WAAW,IAAI,YAAY,CAAC,UAAU,CAAC,IAAI,EAAE,eAAe,IAAI,KAAK;qBACrF,CAAC;gBACJ,CAAC;gBAED,2CAA2C;gBAC3C,OAAO;oBACL,MAAM,EAAE,CAAC,CAAC,MAAM;oBAChB,aAAa,EAAE,CAAC,CAAC,aAAa;oBAC9B,iBAAiB,EAAE,CAAC,CAAC,iBAAiB;oBACtC,WAAW,EAAE,CAAC,CAAC,WAAW,IAAI,KAAK;iBACpC,CAAC;YACJ,CAAC,CAAC,IAAI,EAAE,CAAC;YAET,IAAI,CAAC,eAAe,GAAG,IAAI,eAAe,CACxC,IAAI,CAAC,QAAQ,CAAC,aAAa,EAC3B,IAAI,CAAC,aAAa,EAClB,IAAI,CAAC,kBAAkB,EACvB,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EACnC,IAAI,CAAC,kBAAmB,EACxB,IAAI,CAAC,uBAAwB,EAC7B,IAAI,CAAC,SAAU,EACf,cAAc,CACf,CAAC;YAEF,IAAI,CAAC,eAAe,CAAC,EAAE,CAAC,aAAa,EAAE,CAAC,QAAQ,EAAE,EAAE;gBAClD,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE;oBACvB,MAAM,EAAE,QAAQ,CAAC,MAAM;oBACvB,SAAS,EAAE,QAAQ,CAAC,WAAW;oBAC/B,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,UAAU,EAAE,QAAQ,CAAC,UAAU;oBAC/B,MAAM,EAAE,QAAQ,CAAC,MAAM;oBACvB,SAAS,EAAE,QAAQ,CAAC,SAAS;iBAC9B,CAAC,CAAC;YACL,CAAC,CAAC,CAAC;YAEH,MAAM,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;QACzC,CAAC;QAED,8CAA8C;QAC9C,IACE,IAAI,CAAC,QAAQ,CAAC,eAAe;YAC7B,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EACxC,CAAC;YACD,MAAM,IAAI,CAAC,kBAAkB,CAAC,UAAU,EAAE,CAAC;YAC3C,MAAM,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,CAAC;QACxC,CAAC;QAED,8BAA8B;QAC9B,MAAM,cAAc,GAAG,IAAI,CAAC,gBAAgB,CAAC,qBAAqB,EAAE,CAAC;QACrE,IAAI,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC9B,OAAO,CAAC,GAAG,CAAC,8BAA8B,CAAC,CAAC;YAC5C,KAAK,MAAM,OAAO,IAAI,cAAc,EAAE,CAAC;gBACrC,OAAO,CAAC,GAAG,CAAC,MAAM,OAAO,EAAE,CAAC,CAAC;YAC/B,CAAC;QACH,CAAC;QAED,4CAA4C;QAC5C,MAAM,cAAc,GAAG,IAAI,CAAC,gBAAgB,CAAC,iBAAiB,EAAE,CAAC;QAEjE,+BAA+B;QAC/B,KAAK,MAAM,IAAI,IAAI,cAAc,EAAE,CAAC;YAClC,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC,MAAM,EAAE,EAAE;gBACjD,yBAAyB;gBACzB,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;oBACxB,MAAM,CAAC,GAAG,EAAE,CAAC;oBACb,MAAM,CAAC,OAAO,EAAE,CAAC;oBACjB,OAAO;gBACT,CAAC;gBAED,iCAAiC;gBACjC,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;YAClD,CAAC,CAAC,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAU,EAAE,EAAE;gBAC5B,OAAO,CAAC,GAAG,CAAC,wBAAwB,IAAI,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAC9D,CAAC,CAAC,CAAC;YAEH,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,GAAG,EAAE;gBACvB,MAAM,kBAAkB,GAAG,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAC;gBACzE,OAAO,CAAC,GAAG,CACT,2CAA2C,IAAI,GAC7C,IAAI,CAAC,QAAQ,CAAC,UAAU,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,EACnF,GAAG,kBAAkB,CAAC,CAAC,CAAC,oCAAoC,CAAC,CAAC,CAAC,EAAE,EAAE,CACpE,CAAC;YACJ,CAAC,CAAC,CAAC;YAEH,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC/B,CAAC;QAED,2DAA2D;QAC3D,IAAI,CAAC,gBAAgB,GAAG,WAAW,CAAC,GAAG,EAAE;YACvC,sCAAsC;YACtC,IAAI,IAAI,CAAC,cAAc;gBAAE,OAAO;YAEhC,2BAA2B;YAC3B,IAAI,CAAC,iBAAiB,CAAC,sBAAsB,EAAE,CAAC;YAEhD,4BAA4B;YAC5B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACvB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,WAAW,GAAG,CAAC,CAAC;YACpB,IAAI,cAAc,GAAG,CAAC,CAAC;YACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;YAC1B,IAAI,sBAAsB,GAAG,CAAC,CAAC;YAC/B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,oBAAoB,GAAG,CAAC,CAAC;YAC7B,IAAI,uBAAuB,GAAG,CAAC,CAAC;YAEhC,sCAAsC;YACtC,MAAM,iBAAiB,GAAG,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,CAAC;YAElE,6BAA6B;YAC7B,KAAK,MAAM,MAAM,IAAI,iBAAiB,CAAC,MAAM,EAAE,EAAE,CAAC;gBAChD,yBAAyB;gBACzB,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;oBACjB,cAAc,EAAE,CAAC;oBACjB,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;wBAChC,sBAAsB,EAAE,CAAC;oBAC3B,CAAC;yBAAM,CAAC;wBACN,oBAAoB,EAAE,CAAC;oBACzB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,iBAAiB,EAAE,CAAC;gBACtB,CAAC;gBAED,IAAI,MAAM,CAAC,YAAY,EAAE,CAAC;oBACxB,oBAAoB,EAAE,CAAC;gBACzB,CAAC;gBAED,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,uBAAuB,EAAE,CAAC;gBAC5B,CAAC;gBAED,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACpE,IAAI,MAAM,CAAC,iBAAiB,EAAE,CAAC;oBAC7B,WAAW,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,GAAG,GAAG,MAAM,CAAC,iBAAiB,CAAC,CAAC;gBACtE,CAAC;YACH,CAAC;YAED,wBAAwB;YACxB,MAAM,gBAAgB,GAAG,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,CAAC;YAEtE,qBAAqB;YACrB,OAAO,CAAC,GAAG,CACT,uBAAuB,iBAAiB,CAAC,IAAI,IAAI;gBACjD,cAAc,cAAc,eAAe,sBAAsB,aAAa,oBAAoB,KAAK;gBACvG,WAAW,iBAAiB,eAAe,oBAAoB,kBAAkB,uBAAuB,IAAI;gBAC5G,uBAAuB,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,SAAS,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,IAAI;gBAC9F,sBAAsB,IAAI,CAAC,SAAS,CAAC;oBACnC,EAAE,EAAE,gBAAgB,CAAC,QAAQ;oBAC7B,GAAG,EAAE,gBAAgB,CAAC,QAAQ;iBAC/B,CAAC,EAAE,CACL,CAAC;QACJ,CAAC,EAAE,IAAI,CAAC,QAAQ,CAAC,uBAAuB,IAAI,KAAK,CAAC,CAAC;QAEnD,wDAAwD;QACxD,IAAI,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;YAChC,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,OAAO,CAAC,GAAG,CAAC,6BAA6B,CAAC,CAAC;QAC3C,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC;QAC3B,iCAAiC;QACjC,IAAI,IAAI,CAAC,eAAe,EAAE,CAAC;YACzB,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,EAAE,CAAC;YAClC,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;QACzC,CAAC;QAED,oCAAoC;QACpC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;gBACrC,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC;YAC5B,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACtD,CAAC;QACH,CAAC;QAED,iCAAiC;QACjC,MAAM,mBAAmB,GAAoB,IAAI,CAAC,UAAU,CAAC,GAAG,CAC9D,CAAC,MAAM,EAAE,EAAE,CACT,IAAI,OAAO,CAAO,CAAC,OAAO,EAAE,EAAE;YAC5B,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;gBACtB,OAAO,EAAE,CAAC;gBACV,OAAO;YACT,CAAC;YACD,MAAM,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;gBACnB,IAAI,GAAG,EAAE,CAAC;oBACR,OAAO,CAAC,GAAG,CAAC,yBAAyB,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACtD,CAAC;gBACD,OAAO,EAAE,CAAC;YACZ,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CACL,CAAC;QAEF,6BAA6B;QAC7B,IAAI,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAC1B,aAAa,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACrC,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC;QAC/B,CAAC;QAED,4BAA4B;QAC5B,MAAM,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;QACvC,OAAO,CAAC,GAAG,CAAC,uDAAuD,CAAC,CAAC;QAErE,kCAAkC;QAClC,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,EAAE,CAAC;QAE1C,oBAAoB;QACpB,MAAM,IAAI,CAAC,kBAAkB,CAAC,IAAI,EAAE,CAAC;QAErC,oBAAoB;QACpB,IAAI,CAAC,UAAU,GAAG,EAAE,CAAC;QAErB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAC;IAC/C,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,mBAAmB,CAAC,gBAAiC;QAChE,OAAO,CAAC,GAAG,CAAC,mCAAmC,gBAAgB,CAAC,MAAM,WAAW,CAAC,CAAC;QAEnF,+CAA+C;QAC/C,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,CAAC;QAE/D,4DAA4D;QAC5D,IAAI,IAAI,CAAC,kBAAkB,CAAC,eAAe,EAAE,EAAE,CAAC;YAC9C,MAAM,IAAI,CAAC,kBAAkB,CAAC,+BAA+B,EAAE,CAAC;QAClE,CAAC;QAED,+EAA+E;QAC/E,IAAI,IAAI,CAAC,aAAa,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACtD,KAAK,MAAM,YAAY,IAAI,gBAAgB,EAAE,CAAC;gBAC5C,2FAA2F;gBAC3F,MAAM,cAAc,GAAG,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC;gBACpD,MAAM,gBAAgB,GACpB,cAAc,KAAK,yBAAyB;oBAC5C,cAAc,KAAK,0BAA0B,CAAC;gBAEhD,+EAA+E;gBAC/E,MAAM,YAAY,GAAG,YAAY,CAAC,UAAU,CAAC,IAAI,EAAE,OAAO,KAAK,KAAK,CAAC;gBAErE,IAAI,CAAC,gBAAgB,IAAI,YAAY,EAAE,CAAC;oBACtC,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,OAAO,CAAC,GAAG,CAAC,yCAAyC,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,cAAc,GAAG,CAAC,CAAC;oBAC9G,CAAC;oBACD,SAAS;gBACX,CAAC;gBAED,KAAK,MAAM,MAAM,IAAI,YAAY,CAAC,OAAO,EAAE,CAAC;oBAC1C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;oBACxC,IAAI,SAAS,GAA2C,QAAQ,CAAC;oBAEjE,wDAAwD;oBACxD,MAAM,qBAAqB,GAAG,YAAY,CAAC,UAAU,CAAC,IAAI,EAAE,iBAAiB,CAAC;oBAE9E,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;wBACxC,IAAI,CAAC;4BACH,SAAS,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;wBAChE,CAAC;wBAAC,OAAO,GAAG,EAAE,CAAC;4BACb,OAAO,CAAC,GAAG,CAAC,0BAA0B,MAAM,KAAK,GAAG,EAAE,CAAC,CAAC;wBAC1D,CAAC;oBACH,CAAC;yBAAM,IAAI,UAAU,EAAE,CAAC;wBACtB,OAAO,CAAC,IAAI,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;wBAClF,SAAS;oBACX,CAAC;oBAED,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;wBAC3B,IAAI,UAAU,EAAE,CAAC;4BACf,OAAO,CAAC,IAAI,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;4BAChE,SAAS;wBACX,CAAC;wBAED,iEAAiE;wBACjE,MAAM,YAAY,GAAG,0BAA0B,CAAC,MAAM,EAAE,YAAY,CAAC,UAAU,CAAC,CAAC;wBAEjF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;wBAC3C,OAAO,CAAC,GAAG,CAAC,qBAAqB,MAAM,iCAAiC,CAAC,CAAC;oBAC5E,CAAC;yBAAM,CAAC;wBACN,mEAAmE;wBACnE,MAAM,OAAO,GAAG,SAA0C,CAAC;wBAC3D,MAAM,QAAQ,GAAqB;4BACjC,MAAM,EAAE,OAAO,CAAC,UAAU;4BAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;4BAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;4BAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;yBACzC,CAAC;wBACF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;wBAC3D,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,oBAAoB,CAAC,CAAC;oBAC5E,CAAC;gBACH,CAAC;YACH,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,0CAA0C,CAAC,CAAC;QAC1D,CAAC;IACH,CAAC;IAGD;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,yBAAyB;QACzB,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,0BAA0B,MAAM,EAAE,CAAC,CAAC;YAChD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,iCAAiC;QACjC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,yCAAyC;gBACzC,MAAM,IAAI,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBACvD,IAAI,IAAI,EAAE,CAAC;oBACT,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,iBAAiB,IAAI,CAAC,UAAU,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;oBACtG,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,2CAA2C;gBAC3C,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;oBAC3B,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC,CAAC;gBAEH,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,sCAAsC,CAAC,CAAC;gBACpE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gDAAgD,GAAG,EAAE,CAAC,CAAC;gBACnE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,kCAAkC;QAClC,OAAO,IAAI,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;IAC5D,CAAC;IAED;;OAEG;IACK,aAAa,CAAC,MAAc;QAClC,+BAA+B;QAC/B,IAAI,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACnC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,yDAAyD;QACzD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,OAAO,CAAC,GAAG,CAAC,0BAA0B,MAAM,2CAA2C,CAAC,CAAC;YACzF,OAAO,KAAK,CAAC;QACf,CAAC;QAED,iEAAiE;QACjE,MAAM,gBAAgB,GAAG,+FAA+F,CAAC;QACzH,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,WAAW,MAAM,sBAAsB,CAAC,CAAC;YACrD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACI,aAAa;QAClB,MAAM,iBAAiB,GAAG,IAAI,CAAC,iBAAiB,CAAC,cAAc,EAAE,CAAC;QAClE,MAAM,gBAAgB,GAAG,IAAI,CAAC,iBAAiB,CAAC,mBAAmB,EAAE,CAAC;QAEtE,IAAI,cAAc,GAAG,CAAC,CAAC;QACvB,IAAI,iBAAiB,GAAG,CAAC,CAAC;QAC1B,IAAI,oBAAoB,GAAG,CAAC,CAAC;QAC7B,IAAI,uBAAuB,GAAG,CAAC,CAAC;QAEhC,6BAA6B;QAC7B,KAAK,MAAM,MAAM,IAAI,iBAAiB,CAAC,MAAM,EAAE,EAAE,CAAC;YAChD,IAAI,MAAM,CAAC,KAAK;gBAAE,cAAc,EAAE,CAAC;;gBAC9B,iBAAiB,EAAE,CAAC;YACzB,IAAI,MAAM,CAAC,YAAY;gBAAE,oBAAoB,EAAE,CAAC;YAChD,IAAI,MAAM,CAAC,iBAAiB;gBAAE,uBAAuB,EAAE,CAAC;QAC1D,CAAC;QAED,OAAO;YACL,iBAAiB,EAAE,iBAAiB,CAAC,IAAI;YACzC,cAAc;YACd,iBAAiB;YACjB,oBAAoB;YACpB,uBAAuB;YACvB,gBAAgB;YAChB,WAAW,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa;YACjC,iBAAiB,EAAE,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC,IAAI;SACxE,CAAC;IACJ,CAAC;IAED;;OAEG;IACI,iCAAiC;QACtC,uDAAuD;QACvD,MAAM,OAAO,GAAa,EAAE,CAAC;QAE7B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,aAAa,EAAE,CAAC;YACjD,4CAA4C;YAC5C,MAAM,eAAe,GAAG,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CACrD,CAAC,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CACpD,CAAC;YAEF,OAAO,CAAC,IAAI,CAAC,GAAG,eAAe,CAAC,CAAC;QACnC,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACI,oBAAoB;QACzB,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,8BAA8B;aACxC,CAAC;QACJ,CAAC;QAED,uBAAuB;QACvB,MAAM,eAAe,GAAG,IAAI,CAAC,iCAAiC,EAAE,CAAC;QACjE,MAAM,iBAAiB,GAAwB,EAAE,CAAC;QAElD,oBAAoB;QACpB,KAAK,MAAM,MAAM,IAAI,eAAe,EAAE,CAAC;YACrC,MAAM,IAAI,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;YAEvD,IAAI,IAAI,EAAE,CAAC;gBACT,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;gBACvB,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC;gBACnC,MAAM,aAAa,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC,GAAG,CAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC;gBAEjG,iBAAiB,CAAC,MAAM,CAAC,GAAG;oBAC1B,MAAM,EAAE,OAAO;oBACf,UAAU,EAAE,UAAU,CAAC,WAAW,EAAE;oBACpC,aAAa;oBACb,aAAa,EAAE,aAAa,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,kBAAkB,IAAI,CAAC,CAAC;iBAC9E,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,iBAAiB,CAAC,MAAM,CAAC,GAAG;oBAC1B,MAAM,EAAE,SAAS;oBACjB,OAAO,EAAE,sBAAsB;iBAChC,CAAC;YACJ,CAAC;QACH,CAAC;QAED,MAAM,IAAI,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAK,CAAC;QACjC,OAAO;YACL,OAAO,EAAE,IAAI;YACb,IAAI,EAAE,IAAI,CAAC,IAAK;YAChB,aAAa,EAAE,IAAI,CAAC,aAAc;YAClC,SAAS,EAAE,IAAI,CAAC,SAAU;YAC1B,YAAY,EAAE,iBAAiB;SAChC,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
import type { IConnectionRecord, ISmartProxyOptions } from './models/interfaces.js';
|
|
2
|
+
/**
|
|
3
|
+
* Manages timeouts and inactivity tracking for connections
|
|
4
|
+
*/
|
|
5
|
+
export declare class TimeoutManager {
|
|
6
|
+
private settings;
|
|
7
|
+
constructor(settings: ISmartProxyOptions);
|
|
8
|
+
/**
|
|
9
|
+
* Ensure timeout values don't exceed Node.js max safe integer
|
|
10
|
+
*/
|
|
11
|
+
ensureSafeTimeout(timeout: number): number;
|
|
12
|
+
/**
|
|
13
|
+
* Generate a slightly randomized timeout to prevent thundering herd
|
|
14
|
+
*/
|
|
15
|
+
randomizeTimeout(baseTimeout: number, variationPercent?: number): number;
|
|
16
|
+
/**
|
|
17
|
+
* Update connection activity timestamp
|
|
18
|
+
*/
|
|
19
|
+
updateActivity(record: IConnectionRecord): void;
|
|
20
|
+
/**
|
|
21
|
+
* Calculate effective inactivity timeout based on connection type
|
|
22
|
+
*/
|
|
23
|
+
getEffectiveInactivityTimeout(record: IConnectionRecord): number;
|
|
24
|
+
/**
|
|
25
|
+
* Calculate effective max lifetime based on connection type
|
|
26
|
+
*/
|
|
27
|
+
getEffectiveMaxLifetime(record: IConnectionRecord): number;
|
|
28
|
+
/**
|
|
29
|
+
* Setup connection timeout
|
|
30
|
+
* @returns The cleanup timer
|
|
31
|
+
*/
|
|
32
|
+
setupConnectionTimeout(record: IConnectionRecord, onTimeout: (record: IConnectionRecord, reason: string) => void): NodeJS.Timeout;
|
|
33
|
+
/**
|
|
34
|
+
* Check for inactivity on a connection
|
|
35
|
+
* @returns Object with check results
|
|
36
|
+
*/
|
|
37
|
+
checkInactivity(record: IConnectionRecord): {
|
|
38
|
+
isInactive: boolean;
|
|
39
|
+
shouldWarn: boolean;
|
|
40
|
+
inactivityTime: number;
|
|
41
|
+
effectiveTimeout: number;
|
|
42
|
+
};
|
|
43
|
+
/**
|
|
44
|
+
* Apply socket timeout settings
|
|
45
|
+
*/
|
|
46
|
+
applySocketTimeouts(record: IConnectionRecord): void;
|
|
47
|
+
}
|