@push.rocks/smartproxy 15.0.2 → 16.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/certificate/index.d.ts +10 -4
- package/dist_ts/certificate/index.js +5 -7
- package/dist_ts/certificate/models/certificate-types.d.ts +35 -15
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +41 -15
- package/dist_ts/certificate/providers/cert-provisioner.js +201 -41
- package/dist_ts/forwarding/config/forwarding-types.d.ts +40 -76
- package/dist_ts/forwarding/config/forwarding-types.js +19 -18
- package/dist_ts/forwarding/config/index.d.ts +4 -2
- package/dist_ts/forwarding/config/index.js +5 -3
- package/dist_ts/forwarding/handlers/base-handler.js +3 -1
- package/dist_ts/forwarding/index.d.ts +5 -6
- package/dist_ts/forwarding/index.js +3 -3
- package/dist_ts/http/models/http-types.js +1 -1
- package/dist_ts/http/port80/acme-interfaces.d.ts +30 -0
- package/dist_ts/http/port80/acme-interfaces.js +46 -1
- package/dist_ts/http/port80/port80-handler.d.ts +17 -2
- package/dist_ts/http/port80/port80-handler.js +49 -11
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -61
- package/dist_ts/proxies/smart-proxy/models/interfaces.js +5 -4
- package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +118 -4
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +70 -4
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +193 -43
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +2 -5
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +25 -146
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +7 -0
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +9 -0
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +54 -1
- package/dist_ts/proxies/smart-proxy/route-helpers.js +102 -1
- package/dist_ts/proxies/smart-proxy/route-manager.d.ts +3 -9
- package/dist_ts/proxies/smart-proxy/route-manager.js +3 -115
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +72 -10
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +135 -268
- package/dist_ts/proxies/smart-proxy/timeout-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/utils/index.d.ts +12 -0
- package/dist_ts/proxies/smart-proxy/utils/index.js +19 -0
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +174 -0
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +332 -0
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +51 -0
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +124 -0
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +131 -0
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +217 -0
- package/dist_ts/proxies/smart-proxy/utils/route-utils.d.ts +79 -0
- package/dist_ts/proxies/smart-proxy/utils/route-utils.js +266 -0
- package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +73 -0
- package/dist_ts/proxies/smart-proxy/utils/route-validators.js +242 -0
- package/package.json +1 -1
- package/readme.md +139 -111
- package/readme.plan.md +164 -312
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/certificate/index.ts +17 -9
- package/ts/certificate/models/certificate-types.ts +37 -16
- package/ts/certificate/providers/cert-provisioner.ts +247 -54
- package/ts/forwarding/config/forwarding-types.ts +79 -107
- package/ts/forwarding/config/index.ts +4 -2
- package/ts/forwarding/handlers/base-handler.ts +4 -2
- package/ts/forwarding/index.ts +3 -2
- package/ts/http/models/http-types.ts +0 -1
- package/ts/http/port80/acme-interfaces.ts +84 -0
- package/ts/http/port80/port80-handler.ts +61 -15
- package/ts/proxies/smart-proxy/models/interfaces.ts +7 -64
- package/ts/proxies/smart-proxy/models/route-types.ts +152 -22
- package/ts/proxies/smart-proxy/network-proxy-bridge.ts +226 -55
- package/ts/proxies/smart-proxy/route-connection-handler.ts +36 -205
- package/ts/proxies/smart-proxy/route-helpers/index.ts +9 -0
- package/ts/proxies/smart-proxy/route-helpers.ts +165 -11
- package/ts/proxies/smart-proxy/route-manager.ts +3 -130
- package/ts/proxies/smart-proxy/smart-proxy.ts +157 -329
- package/ts/proxies/smart-proxy/timeout-manager.ts +2 -2
- package/ts/proxies/smart-proxy/utils/index.ts +40 -0
- package/ts/proxies/smart-proxy/utils/route-helpers.ts +455 -0
- package/ts/proxies/smart-proxy/utils/route-migration-utils.ts +165 -0
- package/ts/proxies/smart-proxy/utils/route-patterns.ts +309 -0
- package/ts/proxies/smart-proxy/utils/route-utils.ts +330 -0
- package/ts/proxies/smart-proxy/utils/route-validators.ts +269 -0
- package/ts/forwarding/config/domain-config.ts +0 -28
- package/ts/forwarding/config/domain-manager.ts +0 -283
- package/ts/proxies/smart-proxy/connection-handler.ts +0 -1240
- package/ts/proxies/smart-proxy/port-range-manager.ts +0 -211
- /package/ts/proxies/smart-proxy/{domain-config-manager.ts → domain-config-manager.ts.bak} +0 -0
|
@@ -4,21 +4,60 @@ import { Port80Handler } from '../../http/port80/port80-handler.js';
|
|
|
4
4
|
/**
|
|
5
5
|
* CertProvisioner manages certificate provisioning and renewal workflows,
|
|
6
6
|
* unifying static certificates and HTTP-01 challenges via Port80Handler.
|
|
7
|
+
*
|
|
8
|
+
* This class directly works with route configurations instead of converting to domain configs.
|
|
7
9
|
*/
|
|
8
10
|
export class CertProvisioner extends plugins.EventEmitter {
|
|
9
11
|
/**
|
|
10
|
-
*
|
|
12
|
+
* Extract routes that need certificates
|
|
13
|
+
* @param routes Route configurations
|
|
14
|
+
*/
|
|
15
|
+
extractCertificateRoutesFromRoutes(routes) {
|
|
16
|
+
const certRoutes = [];
|
|
17
|
+
// Process all HTTPS routes that need certificates
|
|
18
|
+
for (const route of routes) {
|
|
19
|
+
// Only process routes with TLS termination that need certificates
|
|
20
|
+
if (route.action.type === 'forward' &&
|
|
21
|
+
route.action.tls &&
|
|
22
|
+
(route.action.tls.mode === 'terminate' || route.action.tls.mode === 'terminate-and-reencrypt') &&
|
|
23
|
+
route.match.domains) {
|
|
24
|
+
// Extract domains from the route
|
|
25
|
+
const domains = Array.isArray(route.match.domains)
|
|
26
|
+
? route.match.domains
|
|
27
|
+
: [route.match.domains];
|
|
28
|
+
// For each domain in the route, create a certRoute entry
|
|
29
|
+
for (const domain of domains) {
|
|
30
|
+
// Skip wildcard domains that can't use ACME unless we have a certProvider
|
|
31
|
+
if (domain.includes('*') && (!this.certProvisionFunction || this.certProvisionFunction.length === 0)) {
|
|
32
|
+
console.warn(`Skipping wildcard domain that requires a certProvisionFunction: ${domain}`);
|
|
33
|
+
continue;
|
|
34
|
+
}
|
|
35
|
+
certRoutes.push({
|
|
36
|
+
domain,
|
|
37
|
+
route,
|
|
38
|
+
tlsMode: route.action.tls.mode
|
|
39
|
+
});
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
return certRoutes;
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Constructor for CertProvisioner
|
|
47
|
+
*
|
|
48
|
+
* @param routeConfigs Array of route configurations
|
|
11
49
|
* @param port80Handler HTTP-01 challenge handler instance
|
|
12
50
|
* @param networkProxyBridge Bridge for applying external certificates
|
|
13
51
|
* @param certProvider Optional callback returning a static cert or 'http01'
|
|
14
52
|
* @param renewThresholdDays Days before expiry to trigger renewals
|
|
15
53
|
* @param renewCheckIntervalHours Interval in hours to check for renewals
|
|
16
54
|
* @param autoRenew Whether to automatically schedule renewals
|
|
17
|
-
* @param
|
|
55
|
+
* @param routeForwards Route-specific forwarding configs for ACME challenges
|
|
18
56
|
*/
|
|
19
|
-
constructor(
|
|
57
|
+
constructor(routeConfigs, port80Handler, networkProxyBridge, certProvider, renewThresholdDays = 30, renewCheckIntervalHours = 24, autoRenew = true, routeForwards = []) {
|
|
20
58
|
super();
|
|
21
|
-
this.
|
|
59
|
+
this.certRoutes = [];
|
|
60
|
+
this.routeConfigs = routeConfigs;
|
|
22
61
|
this.port80Handler = port80Handler;
|
|
23
62
|
this.networkProxyBridge = networkProxyBridge;
|
|
24
63
|
this.certProvisionFunction = certProvider;
|
|
@@ -26,7 +65,9 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
26
65
|
this.renewCheckIntervalHours = renewCheckIntervalHours;
|
|
27
66
|
this.autoRenew = autoRenew;
|
|
28
67
|
this.provisionMap = new Map();
|
|
29
|
-
this.
|
|
68
|
+
this.routeForwards = routeForwards;
|
|
69
|
+
// Extract certificate routes during instantiation
|
|
70
|
+
this.certRoutes = this.extractCertificateRoutesFromRoutes(routeConfigs);
|
|
30
71
|
}
|
|
31
72
|
/**
|
|
32
73
|
* Start initial provisioning and schedule renewals.
|
|
@@ -34,10 +75,10 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
34
75
|
async start() {
|
|
35
76
|
// Subscribe to Port80Handler certificate events
|
|
36
77
|
this.setupEventSubscriptions();
|
|
37
|
-
// Apply
|
|
78
|
+
// Apply route forwarding for ACME challenges
|
|
38
79
|
this.setupForwardingConfigs();
|
|
39
|
-
// Initial provisioning for all domains
|
|
40
|
-
await this.
|
|
80
|
+
// Initial provisioning for all domains in routes
|
|
81
|
+
await this.provisionAllCertificates();
|
|
41
82
|
// Schedule renewals if enabled
|
|
42
83
|
if (this.autoRenew) {
|
|
43
84
|
this.scheduleRenewals();
|
|
@@ -47,46 +88,74 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
47
88
|
* Set up event subscriptions for certificate events
|
|
48
89
|
*/
|
|
49
90
|
setupEventSubscriptions() {
|
|
50
|
-
// We need to reimplement subscribeToPort80Handler here
|
|
51
91
|
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_ISSUED, (data) => {
|
|
52
|
-
|
|
92
|
+
// Add route reference if we have it
|
|
93
|
+
const routeRef = this.findRouteForDomain(data.domain);
|
|
94
|
+
const enhancedData = {
|
|
95
|
+
...data,
|
|
96
|
+
source: 'http01',
|
|
97
|
+
isRenewal: false,
|
|
98
|
+
routeReference: routeRef ? {
|
|
99
|
+
routeId: routeRef.route.name,
|
|
100
|
+
routeName: routeRef.route.name
|
|
101
|
+
} : undefined
|
|
102
|
+
};
|
|
103
|
+
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, enhancedData);
|
|
53
104
|
});
|
|
54
105
|
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_RENEWED, (data) => {
|
|
55
|
-
|
|
106
|
+
// Add route reference if we have it
|
|
107
|
+
const routeRef = this.findRouteForDomain(data.domain);
|
|
108
|
+
const enhancedData = {
|
|
109
|
+
...data,
|
|
110
|
+
source: 'http01',
|
|
111
|
+
isRenewal: true,
|
|
112
|
+
routeReference: routeRef ? {
|
|
113
|
+
routeId: routeRef.route.name,
|
|
114
|
+
routeName: routeRef.route.name
|
|
115
|
+
} : undefined
|
|
116
|
+
};
|
|
117
|
+
this.emit(CertProvisionerEvents.CERTIFICATE_RENEWED, enhancedData);
|
|
56
118
|
});
|
|
57
119
|
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_FAILED, (error) => {
|
|
58
120
|
this.emit(CertProvisionerEvents.CERTIFICATE_FAILED, error);
|
|
59
121
|
});
|
|
60
122
|
}
|
|
123
|
+
/**
|
|
124
|
+
* Find a route for a given domain
|
|
125
|
+
*/
|
|
126
|
+
findRouteForDomain(domain) {
|
|
127
|
+
return this.certRoutes.find(certRoute => certRoute.domain === domain);
|
|
128
|
+
}
|
|
61
129
|
/**
|
|
62
130
|
* Set up forwarding configurations for the Port80Handler
|
|
63
131
|
*/
|
|
64
132
|
setupForwardingConfigs() {
|
|
65
|
-
for (const config of this.
|
|
133
|
+
for (const config of this.routeForwards) {
|
|
66
134
|
const domainOptions = {
|
|
67
135
|
domainName: config.domain,
|
|
68
136
|
sslRedirect: config.sslRedirect || false,
|
|
69
137
|
acmeMaintenance: false,
|
|
70
|
-
forward: config.
|
|
71
|
-
|
|
138
|
+
forward: config.target ? {
|
|
139
|
+
ip: config.target.host,
|
|
140
|
+
port: config.target.port
|
|
141
|
+
} : undefined
|
|
72
142
|
};
|
|
73
143
|
this.port80Handler.addDomain(domainOptions);
|
|
74
144
|
}
|
|
75
145
|
}
|
|
76
146
|
/**
|
|
77
|
-
* Provision certificates for all
|
|
147
|
+
* Provision certificates for all routes that need them
|
|
78
148
|
*/
|
|
79
|
-
async
|
|
80
|
-
const
|
|
81
|
-
|
|
82
|
-
await this.provisionDomain(domain);
|
|
149
|
+
async provisionAllCertificates() {
|
|
150
|
+
for (const certRoute of this.certRoutes) {
|
|
151
|
+
await this.provisionCertificateForRoute(certRoute);
|
|
83
152
|
}
|
|
84
153
|
}
|
|
85
154
|
/**
|
|
86
|
-
* Provision a certificate for a
|
|
87
|
-
* @param domain Domain to provision
|
|
155
|
+
* Provision a certificate for a route
|
|
88
156
|
*/
|
|
89
|
-
async
|
|
157
|
+
async provisionCertificateForRoute(certRoute) {
|
|
158
|
+
const { domain, route } = certRoute;
|
|
90
159
|
const isWildcard = domain.includes('*');
|
|
91
160
|
let provision = 'http01';
|
|
92
161
|
// Try to get a certificate from the provision function
|
|
@@ -95,7 +164,7 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
95
164
|
provision = await this.certProvisionFunction(domain);
|
|
96
165
|
}
|
|
97
166
|
catch (err) {
|
|
98
|
-
console.error(`certProvider error for ${domain}:`, err);
|
|
167
|
+
console.error(`certProvider error for ${domain} on route ${route.name || 'unnamed'}:`, err);
|
|
99
168
|
}
|
|
100
169
|
}
|
|
101
170
|
else if (isWildcard) {
|
|
@@ -103,27 +172,34 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
103
172
|
console.warn(`Skipping wildcard domain without certProvisionFunction: ${domain}`);
|
|
104
173
|
return;
|
|
105
174
|
}
|
|
175
|
+
// Store the route reference with the provision type
|
|
176
|
+
this.provisionMap.set(domain, {
|
|
177
|
+
type: provision === 'http01' || provision === 'dns01' ? provision : 'static',
|
|
178
|
+
routeRef: certRoute
|
|
179
|
+
});
|
|
106
180
|
// Handle different provisioning methods
|
|
107
181
|
if (provision === 'http01') {
|
|
108
182
|
if (isWildcard) {
|
|
109
183
|
console.warn(`Skipping HTTP-01 for wildcard domain: ${domain}`);
|
|
110
184
|
return;
|
|
111
185
|
}
|
|
112
|
-
this.provisionMap.set(domain, 'http01');
|
|
113
186
|
this.port80Handler.addDomain({
|
|
114
187
|
domainName: domain,
|
|
115
188
|
sslRedirect: true,
|
|
116
|
-
acmeMaintenance: true
|
|
189
|
+
acmeMaintenance: true,
|
|
190
|
+
routeReference: {
|
|
191
|
+
routeId: route.name || domain,
|
|
192
|
+
routeName: route.name
|
|
193
|
+
}
|
|
117
194
|
});
|
|
118
195
|
}
|
|
119
196
|
else if (provision === 'dns01') {
|
|
120
197
|
// DNS-01 challenges would be handled by the certProvisionFunction
|
|
121
|
-
this.provisionMap.set(domain, 'dns01');
|
|
122
198
|
// DNS-01 handling would go here if implemented
|
|
199
|
+
console.log(`DNS-01 challenge type set for ${domain}`);
|
|
123
200
|
}
|
|
124
201
|
else {
|
|
125
202
|
// Static certificate (e.g., DNS-01 provisioned or user-provided)
|
|
126
|
-
this.provisionMap.set(domain, 'static');
|
|
127
203
|
const certObj = provision;
|
|
128
204
|
const certData = {
|
|
129
205
|
domain: certObj.domainName,
|
|
@@ -131,7 +207,11 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
131
207
|
privateKey: certObj.privateKey,
|
|
132
208
|
expiryDate: new Date(certObj.validUntil),
|
|
133
209
|
source: 'static',
|
|
134
|
-
isRenewal: false
|
|
210
|
+
isRenewal: false,
|
|
211
|
+
routeReference: {
|
|
212
|
+
routeId: route.name || domain,
|
|
213
|
+
routeName: route.name
|
|
214
|
+
}
|
|
135
215
|
};
|
|
136
216
|
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
137
217
|
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
|
|
@@ -155,12 +235,12 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
155
235
|
* Perform renewals for all domains that need it
|
|
156
236
|
*/
|
|
157
237
|
async performRenewals() {
|
|
158
|
-
for (const [domain,
|
|
238
|
+
for (const [domain, info] of this.provisionMap.entries()) {
|
|
159
239
|
// Skip wildcard domains for HTTP-01 challenges
|
|
160
|
-
if (domain.includes('*') && type === 'http01')
|
|
240
|
+
if (domain.includes('*') && info.type === 'http01')
|
|
161
241
|
continue;
|
|
162
242
|
try {
|
|
163
|
-
await this.
|
|
243
|
+
await this.renewCertificateForDomain(domain, info.type, info.routeRef);
|
|
164
244
|
}
|
|
165
245
|
catch (err) {
|
|
166
246
|
console.error(`Renewal error for ${domain}:`, err);
|
|
@@ -171,8 +251,9 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
171
251
|
* Renew a certificate for a specific domain
|
|
172
252
|
* @param domain Domain to renew
|
|
173
253
|
* @param provisionType Type of provisioning for this domain
|
|
254
|
+
* @param certRoute The route reference for this domain
|
|
174
255
|
*/
|
|
175
|
-
async
|
|
256
|
+
async renewCertificateForDomain(domain, provisionType, certRoute) {
|
|
176
257
|
if (provisionType === 'http01') {
|
|
177
258
|
await this.port80Handler.renewCertificate(domain);
|
|
178
259
|
}
|
|
@@ -180,13 +261,18 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
180
261
|
const provision = await this.certProvisionFunction(domain);
|
|
181
262
|
if (provision !== 'http01' && provision !== 'dns01') {
|
|
182
263
|
const certObj = provision;
|
|
264
|
+
const routeRef = certRoute?.route;
|
|
183
265
|
const certData = {
|
|
184
266
|
domain: certObj.domainName,
|
|
185
267
|
certificate: certObj.publicKey,
|
|
186
268
|
privateKey: certObj.privateKey,
|
|
187
269
|
expiryDate: new Date(certObj.validUntil),
|
|
188
270
|
source: 'static',
|
|
189
|
-
isRenewal: true
|
|
271
|
+
isRenewal: true,
|
|
272
|
+
routeReference: routeRef ? {
|
|
273
|
+
routeId: routeRef.name || domain,
|
|
274
|
+
routeName: routeRef.name
|
|
275
|
+
} : undefined
|
|
190
276
|
};
|
|
191
277
|
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
192
278
|
this.emit(CertProvisionerEvents.CERTIFICATE_RENEWED, certData);
|
|
@@ -203,10 +289,14 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
203
289
|
}
|
|
204
290
|
/**
|
|
205
291
|
* Request a certificate on-demand for the given domain.
|
|
292
|
+
* This will look for a matching route configuration and provision accordingly.
|
|
293
|
+
*
|
|
206
294
|
* @param domain Domain name to provision
|
|
207
295
|
*/
|
|
208
296
|
async requestCertificate(domain) {
|
|
209
297
|
const isWildcard = domain.includes('*');
|
|
298
|
+
// Find matching route
|
|
299
|
+
const certRoute = this.findRouteForDomain(domain);
|
|
210
300
|
// Determine provisioning method
|
|
211
301
|
let provision = 'http01';
|
|
212
302
|
if (this.certProvisionFunction) {
|
|
@@ -224,7 +314,6 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
224
314
|
}
|
|
225
315
|
else if (provision === 'dns01') {
|
|
226
316
|
// DNS-01 challenges would be handled by external mechanisms
|
|
227
|
-
// This is a placeholder for future implementation
|
|
228
317
|
console.log(`DNS-01 challenge requested for ${domain}`);
|
|
229
318
|
}
|
|
230
319
|
else {
|
|
@@ -236,7 +325,11 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
236
325
|
privateKey: certObj.privateKey,
|
|
237
326
|
expiryDate: new Date(certObj.validUntil),
|
|
238
327
|
source: 'static',
|
|
239
|
-
isRenewal: false
|
|
328
|
+
isRenewal: false,
|
|
329
|
+
routeReference: certRoute ? {
|
|
330
|
+
routeId: certRoute.route.name || domain,
|
|
331
|
+
routeName: certRoute.route.name
|
|
332
|
+
} : undefined
|
|
240
333
|
};
|
|
241
334
|
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
242
335
|
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
|
|
@@ -244,19 +337,86 @@ export class CertProvisioner extends plugins.EventEmitter {
|
|
|
244
337
|
}
|
|
245
338
|
/**
|
|
246
339
|
* Add a new domain for certificate provisioning
|
|
340
|
+
*
|
|
247
341
|
* @param domain Domain to add
|
|
248
342
|
* @param options Domain configuration options
|
|
249
343
|
*/
|
|
250
344
|
async addDomain(domain, options) {
|
|
251
345
|
const domainOptions = {
|
|
252
346
|
domainName: domain,
|
|
253
|
-
sslRedirect: options?.sslRedirect
|
|
254
|
-
acmeMaintenance: options?.acmeMaintenance
|
|
347
|
+
sslRedirect: options?.sslRedirect ?? true,
|
|
348
|
+
acmeMaintenance: options?.acmeMaintenance ?? true,
|
|
349
|
+
routeReference: {
|
|
350
|
+
routeId: options?.routeId,
|
|
351
|
+
routeName: options?.routeName
|
|
352
|
+
}
|
|
255
353
|
};
|
|
256
354
|
this.port80Handler.addDomain(domainOptions);
|
|
257
|
-
|
|
355
|
+
// Find matching route or create a generic one
|
|
356
|
+
const existingRoute = this.findRouteForDomain(domain);
|
|
357
|
+
if (existingRoute) {
|
|
358
|
+
await this.provisionCertificateForRoute(existingRoute);
|
|
359
|
+
}
|
|
360
|
+
else {
|
|
361
|
+
// We don't have a route, just provision the domain
|
|
362
|
+
const isWildcard = domain.includes('*');
|
|
363
|
+
let provision = 'http01';
|
|
364
|
+
if (this.certProvisionFunction) {
|
|
365
|
+
provision = await this.certProvisionFunction(domain);
|
|
366
|
+
}
|
|
367
|
+
else if (isWildcard) {
|
|
368
|
+
throw new Error(`Cannot request certificate for wildcard domain without certProvisionFunction: ${domain}`);
|
|
369
|
+
}
|
|
370
|
+
this.provisionMap.set(domain, {
|
|
371
|
+
type: provision === 'http01' || provision === 'dns01' ? provision : 'static'
|
|
372
|
+
});
|
|
373
|
+
if (provision !== 'http01' && provision !== 'dns01') {
|
|
374
|
+
const certObj = provision;
|
|
375
|
+
const certData = {
|
|
376
|
+
domain: certObj.domainName,
|
|
377
|
+
certificate: certObj.publicKey,
|
|
378
|
+
privateKey: certObj.privateKey,
|
|
379
|
+
expiryDate: new Date(certObj.validUntil),
|
|
380
|
+
source: 'static',
|
|
381
|
+
isRenewal: false,
|
|
382
|
+
routeReference: {
|
|
383
|
+
routeId: options?.routeId,
|
|
384
|
+
routeName: options?.routeName
|
|
385
|
+
}
|
|
386
|
+
};
|
|
387
|
+
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
388
|
+
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
|
|
389
|
+
}
|
|
390
|
+
}
|
|
391
|
+
}
|
|
392
|
+
/**
|
|
393
|
+
* Update routes with new configurations
|
|
394
|
+
* This replaces all existing routes with new ones and re-provisions certificates as needed
|
|
395
|
+
*
|
|
396
|
+
* @param newRoutes New route configurations to use
|
|
397
|
+
*/
|
|
398
|
+
async updateRoutes(newRoutes) {
|
|
399
|
+
// Store the new route configs
|
|
400
|
+
this.routeConfigs = newRoutes;
|
|
401
|
+
// Extract new certificate routes
|
|
402
|
+
const newCertRoutes = this.extractCertificateRoutesFromRoutes(newRoutes);
|
|
403
|
+
// Find domains that no longer need certificates
|
|
404
|
+
const oldDomains = new Set(this.certRoutes.map(r => r.domain));
|
|
405
|
+
const newDomains = new Set(newCertRoutes.map(r => r.domain));
|
|
406
|
+
// Domains to remove
|
|
407
|
+
const domainsToRemove = [...oldDomains].filter(d => !newDomains.has(d));
|
|
408
|
+
// Remove obsolete domains from provision map
|
|
409
|
+
for (const domain of domainsToRemove) {
|
|
410
|
+
this.provisionMap.delete(domain);
|
|
411
|
+
}
|
|
412
|
+
// Update the cert routes
|
|
413
|
+
this.certRoutes = newCertRoutes;
|
|
414
|
+
// Provision certificates for new routes
|
|
415
|
+
for (const certRoute of newCertRoutes) {
|
|
416
|
+
if (!oldDomains.has(certRoute.domain)) {
|
|
417
|
+
await this.provisionCertificateForRoute(certRoute);
|
|
418
|
+
}
|
|
419
|
+
}
|
|
258
420
|
}
|
|
259
421
|
}
|
|
260
|
-
// For backward compatibility
|
|
261
|
-
export { CertProvisioner as CertificateProvisioner };
|
|
262
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cert-provisioner.js","sourceRoot":"","sources":["../../../ts/certificate/providers/cert-provisioner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAG5C,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,iCAAiC,CAAC;AAC7F,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AAiBpE;;;GAGG;AACH,MAAM,OAAO,eAAgB,SAAQ,OAAO,CAAC,YAAY;IAavD;;;;;;;;;OASG;IACH,YACE,aAA8B,EAC9B,aAA4B,EAC5B,kBAAuC,EACvC,YAAgE,EAChE,qBAA6B,EAAE,EAC/B,0BAAkC,EAAE,EACpC,YAAqB,IAAI,EACzB,iBAAyC,EAAE;QAE3C,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,qBAAqB,GAAG,YAAY,CAAC;QAC1C,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,uBAAuB,GAAG,uBAAuB,CAAC;QACvD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,YAAY,GAAG,IAAI,GAAG,EAAE,CAAC;QAC9B,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,gDAAgD;QAChD,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,gDAAgD;QAChD,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAE9B,uCAAuC;QACvC,MAAM,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAEjC,+BAA+B;QAC/B,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB;QAC7B,uDAAuD;QACvD,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACvF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,EAAE,GAAG,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,CAAC,CAAC;QACvG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACxF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,EAAE,GAAG,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACvG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,KAAK,EAAE,EAAE;YACtE,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACzC,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM,CAAC,MAAM;gBACzB,WAAW,EAAE,MAAM,CAAC,WAAW,IAAI,KAAK;gBACxC,eAAe,EAAE,KAAK;gBACtB,OAAO,EAAE,MAAM,CAAC,aAAa;gBAC7B,WAAW,EAAE,MAAM,CAAC,iBAAiB;aACtC,CAAC;YACF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,mBAAmB;QAC/B,MAAM,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;QAE/D,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;QACrC,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAAC,MAAc;QAC1C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,uDAAuD;QACvD,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,0BAA0B,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,iEAAiE;YACjE,OAAO,CAAC,IAAI,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YAClF,OAAO;QACT,CAAC;QAED,wCAAwC;QACxC,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;gBAChE,OAAO;YACT,CAAC;YAED,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YACxC,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;gBAC3B,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;aACtB,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,kEAAkE;YAClE,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YACvC,+CAA+C;QACjD,CAAC;aAAM,CAAC;YACN,iEAAiE;YACjE,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YACxC,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;aACjB,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB;QACtB,IAAI,CAAC,YAAY,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC;QAEzD,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC;YAC5C,IAAI,EAAE,qBAAqB;YAC3B,YAAY,EAAE,KAAK,IAAI,EAAE,CAAC,MAAM,IAAI,CAAC,eAAe,EAAE;SACvD,CAAC,CAAC;QAEH,MAAM,KAAK,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3C,MAAM,QAAQ,GAAG,SAAS,KAAK,QAAQ,CAAC;QAExC,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAC1D,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;IAC5B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,EAAE,CAAC;YACzD,+CAA+C;YAC/C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,KAAK,QAAQ;gBAAE,SAAS;YAExD,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;YACvC,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,qBAAqB,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,aAA4C;QACpF,IAAI,aAAa,KAAK,QAAQ,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,CAAC,aAAa,KAAK,QAAQ,IAAI,aAAa,KAAK,OAAO,CAAC,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACnG,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YAE3D,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,IAAI;iBAChB,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;YACjE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;QAC3B,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QAExC,gCAAgC;QAChC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,0DAA0D;YAC1D,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;QAC7G,CAAC;QAED,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YACvF,CAAC;YACD,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,4DAA4D;YAC5D,kDAAkD;YAClD,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC1D,CAAC;aAAM,CAAC;YACN,mEAAmE;YACnE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;aACjB,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,SAAS,CAAC,MAAc,EAAE,OAGtC;QACC,MAAM,aAAa,GAAmB;YACpC,UAAU,EAAE,MAAM;YAClB,WAAW,EAAE,OAAO,EAAE,WAAW,IAAI,IAAI;YACzC,eAAe,EAAE,OAAO,EAAE,eAAe,IAAI,IAAI;SAClD,CAAC;QAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAC5C,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;IACrC,CAAC;CACF;AAED,6BAA6B;AAC7B,OAAO,EAAE,eAAe,IAAI,sBAAsB,EAAE,CAAA"}
|
|
422
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cert-provisioner.js","sourceRoot":"","sources":["../../../ts/certificate/providers/cert-provisioner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAG5C,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,iCAAiC,CAAC;AAC7F,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AAqBpE;;;;;GAKG;AACH,MAAM,OAAO,eAAgB,SAAQ,OAAO,CAAC,YAAY;IAcvD;;;OAGG;IACK,kCAAkC,CAAC,MAAsB;QAC/D,MAAM,UAAU,GAAiB,EAAE,CAAC;QAEpC,kDAAkD;QAClD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,kEAAkE;YAClE,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG;gBAChB,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC;gBAC9F,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;gBAExB,iCAAiC;gBACjC,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;oBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBAE1B,yDAAyD;gBACzD,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;oBAC7B,0EAA0E;oBAC1E,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,qBAAqB,CAAC,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;wBACrG,OAAO,CAAC,IAAI,CAAC,mEAAmE,MAAM,EAAE,CAAC,CAAC;wBAC1F,SAAS;oBACX,CAAC;oBAED,UAAU,CAAC,IAAI,CAAC;wBACd,MAAM;wBACN,KAAK;wBACL,OAAO,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI;qBAC/B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,UAAU,CAAC;IACpB,CAAC;IAED;;;;;;;;;;;OAWG;IACH,YACE,YAA4B,EAC5B,aAA4B,EAC5B,kBAAuC,EACvC,YAAgE,EAChE,qBAA6B,EAAE,EAC/B,0BAAkC,EAAE,EACpC,YAAqB,IAAI,EACzB,gBAAuC,EAAE;QAEzC,KAAK,EAAE,CAAC;QA1EF,eAAU,GAAiB,EAAE,CAAC;QA2EpC,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,qBAAqB,GAAG,YAAY,CAAC;QAC1C,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,uBAAuB,GAAG,uBAAuB,CAAC;QACvD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,YAAY,GAAG,IAAI,GAAG,EAAE,CAAC;QAC9B,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QAEnC,kDAAkD;QAClD,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC,kCAAkC,CAAC,YAAY,CAAC,CAAC;IAC1E,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,gDAAgD;QAChD,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,6CAA6C;QAC7C,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAE9B,iDAAiD;QACjD,MAAM,IAAI,CAAC,wBAAwB,EAAE,CAAC;QAEtC,+BAA+B;QAC/B,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB;QAC7B,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACvF,oCAAoC;YACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,YAAY,GAAqB;gBACrC,GAAG,IAAI;gBACP,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;oBACzB,OAAO,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;oBAC5B,SAAS,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;iBAC/B,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,YAAY,CAAC,CAAC;QACpE,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACxF,oCAAoC;YACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,YAAY,GAAqB;gBACrC,GAAG,IAAI;gBACP,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,IAAI;gBACf,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;oBACzB,OAAO,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;oBAC5B,SAAS,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;iBAC/B,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,YAAY,CAAC,CAAC;QACrE,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,KAAK,EAAE,EAAE;YACtE,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,MAAc;QACvC,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;IACxE,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACxC,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM,CAAC,MAAM;gBACzB,WAAW,EAAE,MAAM,CAAC,WAAW,IAAI,KAAK;gBACxC,eAAe,EAAE,KAAK;gBACtB,OAAO,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;oBACvB,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI;oBACtB,IAAI,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI;iBACzB,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YACF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB;QACpC,KAAK,MAAM,SAAS,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;YACxC,MAAM,IAAI,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,SAAqB;QAC9D,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,GAAG,SAAS,CAAC;QACpC,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,uDAAuD;QACvD,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,0BAA0B,MAAM,aAAa,KAAK,CAAC,IAAI,IAAI,SAAS,GAAG,EAAE,GAAG,CAAC,CAAC;YAC9F,CAAC;QACH,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,iEAAiE;YACjE,OAAO,CAAC,IAAI,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YAClF,OAAO;QACT,CAAC;QAED,oDAAoD;QACpD,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE;YAC5B,IAAI,EAAE,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;YAC5E,QAAQ,EAAE,SAAS;SACpB,CAAC,CAAC;QAEH,wCAAwC;QACxC,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;gBAChE,OAAO;YACT,CAAC;YAED,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;gBAC3B,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;gBACrB,cAAc,EAAE;oBACd,OAAO,EAAE,KAAK,CAAC,IAAI,IAAI,MAAM;oBAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;iBACtB;aACF,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,kEAAkE;YAClE,+CAA+C;YAC/C,OAAO,CAAC,GAAG,CAAC,iCAAiC,MAAM,EAAE,CAAC,CAAC;QACzD,CAAC;aAAM,CAAC;YACN,iEAAiE;YACjE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE;oBACd,OAAO,EAAE,KAAK,CAAC,IAAI,IAAI,MAAM;oBAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;iBACtB;aACF,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB;QACtB,IAAI,CAAC,YAAY,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC;QAEzD,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC;YAC5C,IAAI,EAAE,qBAAqB;YAC3B,YAAY,EAAE,KAAK,IAAI,EAAE,CAAC,MAAM,IAAI,CAAC,eAAe,EAAE;SACvD,CAAC,CAAC;QAEH,MAAM,KAAK,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3C,MAAM,QAAQ,GAAG,SAAS,KAAK,QAAQ,CAAC;QAExC,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAC1D,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;IAC5B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,EAAE,CAAC;YACzD,+CAA+C;YAC/C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,IAAI,KAAK,QAAQ;gBAAE,SAAS;YAE7D,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;YACzE,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,qBAAqB,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,yBAAyB,CACrC,MAAc,EACd,aAA4C,EAC5C,SAAsB;QAEtB,IAAI,aAAa,KAAK,QAAQ,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,CAAC,aAAa,KAAK,QAAQ,IAAI,aAAa,KAAK,OAAO,CAAC,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACnG,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YAE3D,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAG,SAAS,EAAE,KAAK,CAAC;gBAElC,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,IAAI;oBACf,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;wBACzB,OAAO,EAAE,QAAQ,CAAC,IAAI,IAAI,MAAM;wBAChC,SAAS,EAAE,QAAQ,CAAC,IAAI;qBACzB,CAAC,CAAC,CAAC,SAAS;iBACd,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;YACjE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;QAC3B,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,sBAAsB;QACtB,MAAM,SAAS,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAElD,gCAAgC;QAChC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,0DAA0D;YAC1D,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;QAC7G,CAAC;QAED,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YACvF,CAAC;YACD,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,4DAA4D;YAC5D,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC1D,CAAC;aAAM,CAAC;YACN,mEAAmE;YACnE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE,SAAS,CAAC,CAAC,CAAC;oBAC1B,OAAO,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI,IAAI,MAAM;oBACvC,SAAS,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI;iBAChC,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,SAAS,CAAC,MAAc,EAAE,OAKtC;QACC,MAAM,aAAa,GAAmB;YACpC,UAAU,EAAE,MAAM;YAClB,WAAW,EAAE,OAAO,EAAE,WAAW,IAAI,IAAI;YACzC,eAAe,EAAE,OAAO,EAAE,eAAe,IAAI,IAAI;YACjD,cAAc,EAAE;gBACd,OAAO,EAAE,OAAO,EAAE,OAAO;gBACzB,SAAS,EAAE,OAAO,EAAE,SAAS;aAC9B;SACF,CAAC;QAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAE5C,8CAA8C;QAC9C,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACtD,IAAI,aAAa,EAAE,CAAC;YAClB,MAAM,IAAI,CAAC,4BAA4B,CAAC,aAAa,CAAC,CAAC;QACzD,CAAC;aAAM,CAAC;YACN,mDAAmD;YACnD,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;YACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;YAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;gBAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;iBAAM,IAAI,UAAU,EAAE,CAAC;gBACtB,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;YAC7G,CAAC;YAED,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE;gBAC5B,IAAI,EAAE,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;aAC7E,CAAC,CAAC;YAEH,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,KAAK;oBAChB,cAAc,EAAE;wBACd,OAAO,EAAE,OAAO,EAAE,OAAO;wBACzB,SAAS,EAAE,OAAO,EAAE,SAAS;qBAC9B;iBACF,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,YAAY,CAAC,SAAyB;QACjD,8BAA8B;QAC9B,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;QAE9B,iCAAiC;QACjC,MAAM,aAAa,GAAG,IAAI,CAAC,kCAAkC,CAAC,SAAS,CAAC,CAAC;QAEzE,gDAAgD;QAChD,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAC/D,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAE7D,oBAAoB;QACpB,MAAM,eAAe,GAAG,CAAC,GAAG,UAAU,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAExE,6CAA6C;QAC7C,KAAK,MAAM,MAAM,IAAI,eAAe,EAAE,CAAC;YACrC,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC;QAED,yBAAyB;QACzB,IAAI,CAAC,UAAU,GAAG,aAAa,CAAC;QAEhC,wCAAwC;QACxC,KAAK,MAAM,SAAS,IAAI,aAAa,EAAE,CAAC;YACtC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC;gBACtC,MAAM,IAAI,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
|
|
@@ -1,79 +1,11 @@
|
|
|
1
1
|
import type * as plugins from '../../plugins.js';
|
|
2
2
|
/**
|
|
3
|
+
* @deprecated The legacy forwarding types are being replaced by the route-based configuration system.
|
|
4
|
+
* See /ts/proxies/smart-proxy/models/route-types.ts for the new route-based configuration.
|
|
5
|
+
*
|
|
3
6
|
* The primary forwarding types supported by SmartProxy
|
|
4
7
|
*/
|
|
5
8
|
export type TForwardingType = 'http-only' | 'https-passthrough' | 'https-terminate-to-http' | 'https-terminate-to-https';
|
|
6
|
-
/**
|
|
7
|
-
* Target configuration for forwarding
|
|
8
|
-
*/
|
|
9
|
-
export interface ITargetConfig {
|
|
10
|
-
host: string | string[];
|
|
11
|
-
port: number;
|
|
12
|
-
}
|
|
13
|
-
/**
|
|
14
|
-
* HTTP-specific options for forwarding
|
|
15
|
-
*/
|
|
16
|
-
export interface IHttpOptions {
|
|
17
|
-
enabled?: boolean;
|
|
18
|
-
redirectToHttps?: boolean;
|
|
19
|
-
headers?: Record<string, string>;
|
|
20
|
-
}
|
|
21
|
-
/**
|
|
22
|
-
* HTTPS-specific options for forwarding
|
|
23
|
-
*/
|
|
24
|
-
export interface IHttpsOptions {
|
|
25
|
-
customCert?: {
|
|
26
|
-
key: string;
|
|
27
|
-
cert: string;
|
|
28
|
-
};
|
|
29
|
-
forwardSni?: boolean;
|
|
30
|
-
}
|
|
31
|
-
/**
|
|
32
|
-
* ACME certificate handling options
|
|
33
|
-
*/
|
|
34
|
-
export interface IAcmeForwardingOptions {
|
|
35
|
-
enabled?: boolean;
|
|
36
|
-
maintenance?: boolean;
|
|
37
|
-
production?: boolean;
|
|
38
|
-
forwardChallenges?: {
|
|
39
|
-
host: string;
|
|
40
|
-
port: number;
|
|
41
|
-
useTls?: boolean;
|
|
42
|
-
};
|
|
43
|
-
}
|
|
44
|
-
/**
|
|
45
|
-
* Security options for forwarding
|
|
46
|
-
*/
|
|
47
|
-
export interface ISecurityOptions {
|
|
48
|
-
allowedIps?: string[];
|
|
49
|
-
blockedIps?: string[];
|
|
50
|
-
maxConnections?: number;
|
|
51
|
-
}
|
|
52
|
-
/**
|
|
53
|
-
* Advanced options for forwarding
|
|
54
|
-
*/
|
|
55
|
-
export interface IAdvancedOptions {
|
|
56
|
-
portRanges?: Array<{
|
|
57
|
-
from: number;
|
|
58
|
-
to: number;
|
|
59
|
-
}>;
|
|
60
|
-
networkProxyPort?: number;
|
|
61
|
-
keepAlive?: boolean;
|
|
62
|
-
timeout?: number;
|
|
63
|
-
headers?: Record<string, string>;
|
|
64
|
-
}
|
|
65
|
-
/**
|
|
66
|
-
* Unified forwarding configuration interface
|
|
67
|
-
*/
|
|
68
|
-
export interface IForwardConfig {
|
|
69
|
-
type: TForwardingType;
|
|
70
|
-
target: ITargetConfig;
|
|
71
|
-
http?: IHttpOptions;
|
|
72
|
-
https?: IHttpsOptions;
|
|
73
|
-
acme?: IAcmeForwardingOptions;
|
|
74
|
-
security?: ISecurityOptions;
|
|
75
|
-
advanced?: IAdvancedOptions;
|
|
76
|
-
}
|
|
77
9
|
/**
|
|
78
10
|
* Event types emitted by forwarding handlers
|
|
79
11
|
*/
|
|
@@ -95,10 +27,42 @@ export interface IForwardingHandler extends plugins.EventEmitter {
|
|
|
95
27
|
handleConnection(socket: plugins.net.Socket): void;
|
|
96
28
|
handleHttpRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void;
|
|
97
29
|
}
|
|
30
|
+
import { createHttpRoute, createHttpsTerminateRoute, createHttpsPassthroughRoute, createHttpToHttpsRedirect, createCompleteHttpsServer, createLoadBalancerRoute } from '../../proxies/smart-proxy/utils/route-helpers.js';
|
|
31
|
+
export { createHttpRoute, createHttpsTerminateRoute, createHttpsPassthroughRoute, createHttpToHttpsRedirect, createCompleteHttpsServer, createLoadBalancerRoute };
|
|
32
|
+
export interface IForwardConfig {
|
|
33
|
+
type: TForwardingType;
|
|
34
|
+
target: {
|
|
35
|
+
host: string | string[];
|
|
36
|
+
port: number;
|
|
37
|
+
};
|
|
38
|
+
http?: any;
|
|
39
|
+
https?: any;
|
|
40
|
+
acme?: any;
|
|
41
|
+
security?: any;
|
|
42
|
+
advanced?: any;
|
|
43
|
+
[key: string]: any;
|
|
44
|
+
}
|
|
45
|
+
export interface IDeprecatedForwardConfig {
|
|
46
|
+
type: TForwardingType;
|
|
47
|
+
target: {
|
|
48
|
+
host: string | string[];
|
|
49
|
+
port: number;
|
|
50
|
+
};
|
|
51
|
+
[key: string]: any;
|
|
52
|
+
}
|
|
53
|
+
/**
|
|
54
|
+
* @deprecated Use createHttpRoute instead
|
|
55
|
+
*/
|
|
56
|
+
export declare const httpOnly: (partialConfig: Partial<IDeprecatedForwardConfig> & Pick<IDeprecatedForwardConfig, "target">) => IDeprecatedForwardConfig;
|
|
57
|
+
/**
|
|
58
|
+
* @deprecated Use createHttpsTerminateRoute instead
|
|
59
|
+
*/
|
|
60
|
+
export declare const tlsTerminateToHttp: (partialConfig: Partial<IDeprecatedForwardConfig> & Pick<IDeprecatedForwardConfig, "target">) => IDeprecatedForwardConfig;
|
|
61
|
+
/**
|
|
62
|
+
* @deprecated Use createHttpsTerminateRoute with reencrypt option instead
|
|
63
|
+
*/
|
|
64
|
+
export declare const tlsTerminateToHttps: (partialConfig: Partial<IDeprecatedForwardConfig> & Pick<IDeprecatedForwardConfig, "target">) => IDeprecatedForwardConfig;
|
|
98
65
|
/**
|
|
99
|
-
*
|
|
66
|
+
* @deprecated Use createHttpsPassthroughRoute instead
|
|
100
67
|
*/
|
|
101
|
-
export declare const
|
|
102
|
-
export declare const tlsTerminateToHttp: (partialConfig: Partial<IForwardConfig> & Pick<IForwardConfig, "target">) => IForwardConfig;
|
|
103
|
-
export declare const tlsTerminateToHttps: (partialConfig: Partial<IForwardConfig> & Pick<IForwardConfig, "target">) => IForwardConfig;
|
|
104
|
-
export declare const httpsPassthrough: (partialConfig: Partial<IForwardConfig> & Pick<IForwardConfig, "target">) => IForwardConfig;
|
|
68
|
+
export declare const httpsPassthrough: (partialConfig: Partial<IDeprecatedForwardConfig> & Pick<IDeprecatedForwardConfig, "target">) => IDeprecatedForwardConfig;
|
|
@@ -12,39 +12,40 @@ export var ForwardingHandlerEvents;
|
|
|
12
12
|
ForwardingHandlerEvents["CERTIFICATE_NEEDED"] = "certificate-needed";
|
|
13
13
|
ForwardingHandlerEvents["CERTIFICATE_LOADED"] = "certificate-loaded";
|
|
14
14
|
})(ForwardingHandlerEvents || (ForwardingHandlerEvents = {}));
|
|
15
|
+
// Import and re-export the route-based helpers for seamless transition
|
|
16
|
+
import { createHttpRoute, createHttpsTerminateRoute, createHttpsPassthroughRoute, createHttpToHttpsRedirect, createCompleteHttpsServer, createLoadBalancerRoute } from '../../proxies/smart-proxy/utils/route-helpers.js';
|
|
17
|
+
export { createHttpRoute, createHttpsTerminateRoute, createHttpsPassthroughRoute, createHttpToHttpsRedirect, createCompleteHttpsServer, createLoadBalancerRoute };
|
|
18
|
+
import { domainConfigToRouteConfig } from '../../proxies/smart-proxy/utils/route-migration-utils.js';
|
|
15
19
|
/**
|
|
16
|
-
*
|
|
20
|
+
* @deprecated Use createHttpRoute instead
|
|
17
21
|
*/
|
|
18
22
|
export const httpOnly = (partialConfig) => ({
|
|
19
23
|
type: 'http-only',
|
|
20
24
|
target: partialConfig.target,
|
|
21
|
-
|
|
22
|
-
...(partialConfig.security ? { security: partialConfig.security } : {}),
|
|
23
|
-
...(partialConfig.advanced ? { advanced: partialConfig.advanced } : {})
|
|
25
|
+
...(partialConfig)
|
|
24
26
|
});
|
|
27
|
+
/**
|
|
28
|
+
* @deprecated Use createHttpsTerminateRoute instead
|
|
29
|
+
*/
|
|
25
30
|
export const tlsTerminateToHttp = (partialConfig) => ({
|
|
26
31
|
type: 'https-terminate-to-http',
|
|
27
32
|
target: partialConfig.target,
|
|
28
|
-
|
|
29
|
-
acme: { enabled: true, maintenance: true, ...(partialConfig.acme || {}) },
|
|
30
|
-
http: { enabled: true, redirectToHttps: true, ...(partialConfig.http || {}) },
|
|
31
|
-
...(partialConfig.security ? { security: partialConfig.security } : {}),
|
|
32
|
-
...(partialConfig.advanced ? { advanced: partialConfig.advanced } : {})
|
|
33
|
+
...(partialConfig)
|
|
33
34
|
});
|
|
35
|
+
/**
|
|
36
|
+
* @deprecated Use createHttpsTerminateRoute with reencrypt option instead
|
|
37
|
+
*/
|
|
34
38
|
export const tlsTerminateToHttps = (partialConfig) => ({
|
|
35
39
|
type: 'https-terminate-to-https',
|
|
36
40
|
target: partialConfig.target,
|
|
37
|
-
|
|
38
|
-
acme: { enabled: true, maintenance: true, ...(partialConfig.acme || {}) },
|
|
39
|
-
http: { enabled: true, redirectToHttps: true, ...(partialConfig.http || {}) },
|
|
40
|
-
...(partialConfig.security ? { security: partialConfig.security } : {}),
|
|
41
|
-
...(partialConfig.advanced ? { advanced: partialConfig.advanced } : {})
|
|
41
|
+
...(partialConfig)
|
|
42
42
|
});
|
|
43
|
+
/**
|
|
44
|
+
* @deprecated Use createHttpsPassthroughRoute instead
|
|
45
|
+
*/
|
|
43
46
|
export const httpsPassthrough = (partialConfig) => ({
|
|
44
47
|
type: 'https-passthrough',
|
|
45
48
|
target: partialConfig.target,
|
|
46
|
-
|
|
47
|
-
...(partialConfig.security ? { security: partialConfig.security } : {}),
|
|
48
|
-
...(partialConfig.advanced ? { advanced: partialConfig.advanced } : {})
|
|
49
|
+
...(partialConfig)
|
|
49
50
|
});
|
|
50
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
51
|
+
//# sourceMappingURL=data:application/json;base64,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
|