@push.rocks/smartproxy 15.0.2 → 16.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/certificate/index.d.ts +10 -4
- package/dist_ts/certificate/index.js +5 -7
- package/dist_ts/certificate/models/certificate-types.d.ts +35 -15
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +41 -15
- package/dist_ts/certificate/providers/cert-provisioner.js +201 -41
- package/dist_ts/core/models/index.d.ts +2 -0
- package/dist_ts/core/models/index.js +3 -1
- package/dist_ts/core/models/route-context.d.ts +62 -0
- package/dist_ts/core/models/route-context.js +43 -0
- package/dist_ts/core/models/socket-augmentation.d.ts +12 -0
- package/dist_ts/core/models/socket-augmentation.js +18 -0
- package/dist_ts/core/utils/event-system.d.ts +200 -0
- package/dist_ts/core/utils/event-system.js +224 -0
- package/dist_ts/core/utils/index.d.ts +7 -0
- package/dist_ts/core/utils/index.js +8 -1
- package/dist_ts/core/utils/route-manager.d.ts +118 -0
- package/dist_ts/core/utils/route-manager.js +383 -0
- package/dist_ts/core/utils/route-utils.d.ts +94 -0
- package/dist_ts/core/utils/route-utils.js +264 -0
- package/dist_ts/core/utils/security-utils.d.ts +111 -0
- package/dist_ts/core/utils/security-utils.js +212 -0
- package/dist_ts/core/utils/shared-security-manager.d.ts +110 -0
- package/dist_ts/core/utils/shared-security-manager.js +252 -0
- package/dist_ts/core/utils/template-utils.d.ts +37 -0
- package/dist_ts/core/utils/template-utils.js +104 -0
- package/dist_ts/core/utils/websocket-utils.d.ts +23 -0
- package/dist_ts/core/utils/websocket-utils.js +86 -0
- package/dist_ts/forwarding/config/forwarding-types.d.ts +40 -76
- package/dist_ts/forwarding/config/forwarding-types.js +19 -18
- package/dist_ts/forwarding/config/index.d.ts +4 -2
- package/dist_ts/forwarding/config/index.js +5 -3
- package/dist_ts/forwarding/handlers/base-handler.js +3 -1
- package/dist_ts/forwarding/index.d.ts +5 -6
- package/dist_ts/forwarding/index.js +3 -3
- package/dist_ts/http/models/http-types.js +1 -1
- package/dist_ts/http/port80/acme-interfaces.d.ts +30 -0
- package/dist_ts/http/port80/acme-interfaces.js +46 -1
- package/dist_ts/http/port80/port80-handler.d.ts +17 -2
- package/dist_ts/http/port80/port80-handler.js +49 -11
- package/dist_ts/http/router/index.d.ts +5 -1
- package/dist_ts/http/router/index.js +4 -2
- package/dist_ts/http/router/route-router.d.ts +108 -0
- package/dist_ts/http/router/route-router.js +393 -0
- package/dist_ts/index.d.ts +8 -2
- package/dist_ts/index.js +10 -3
- package/dist_ts/proxies/index.d.ts +7 -2
- package/dist_ts/proxies/index.js +10 -4
- package/dist_ts/proxies/network-proxy/certificate-manager.d.ts +21 -0
- package/dist_ts/proxies/network-proxy/certificate-manager.js +92 -1
- package/dist_ts/proxies/network-proxy/context-creator.d.ts +34 -0
- package/dist_ts/proxies/network-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/network-proxy/function-cache.d.ts +90 -0
- package/dist_ts/proxies/network-proxy/function-cache.js +198 -0
- package/dist_ts/proxies/network-proxy/http-request-handler.d.ts +40 -0
- package/dist_ts/proxies/network-proxy/http-request-handler.js +256 -0
- package/dist_ts/proxies/network-proxy/http2-request-handler.d.ts +24 -0
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/network-proxy/models/types.d.ts +73 -1
- package/dist_ts/proxies/network-proxy/models/types.js +242 -1
- package/dist_ts/proxies/network-proxy/network-proxy.d.ts +23 -20
- package/dist_ts/proxies/network-proxy/network-proxy.js +147 -60
- package/dist_ts/proxies/network-proxy/request-handler.d.ts +38 -5
- package/dist_ts/proxies/network-proxy/request-handler.js +584 -198
- package/dist_ts/proxies/network-proxy/security-manager.d.ts +65 -0
- package/dist_ts/proxies/network-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/network-proxy/websocket-handler.d.ts +13 -2
- package/dist_ts/proxies/network-proxy/websocket-handler.js +238 -20
- package/dist_ts/proxies/smart-proxy/index.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/index.js +3 -3
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -66
- package/dist_ts/proxies/smart-proxy/models/interfaces.js +5 -4
- package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +173 -6
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +20 -7
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +49 -108
- package/dist_ts/proxies/smart-proxy/port-manager.d.ts +81 -0
- package/dist_ts/proxies/smart-proxy/port-manager.js +166 -0
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +7 -5
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +155 -160
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +9 -0
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +11 -0
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +5 -125
- package/dist_ts/proxies/smart-proxy/route-helpers.js +8 -195
- package/dist_ts/proxies/smart-proxy/route-manager.d.ts +14 -11
- package/dist_ts/proxies/smart-proxy/route-manager.js +81 -124
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +101 -12
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +178 -306
- package/dist_ts/proxies/smart-proxy/timeout-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/utils/index.d.ts +12 -0
- package/dist_ts/proxies/smart-proxy/utils/index.js +19 -0
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +240 -0
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +451 -0
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +51 -0
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +124 -0
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +131 -0
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +217 -0
- package/dist_ts/proxies/smart-proxy/utils/route-utils.d.ts +79 -0
- package/dist_ts/proxies/smart-proxy/utils/route-utils.js +266 -0
- package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +73 -0
- package/dist_ts/proxies/smart-proxy/utils/route-validators.js +264 -0
- package/package.json +1 -1
- package/readme.md +241 -125
- package/readme.plan.md +73 -286
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/certificate/index.ts +17 -9
- package/ts/certificate/models/certificate-types.ts +37 -16
- package/ts/certificate/providers/cert-provisioner.ts +247 -54
- package/ts/core/models/index.ts +2 -0
- package/ts/core/models/route-context.ts +113 -0
- package/ts/core/models/socket-augmentation.ts +33 -0
- package/ts/core/utils/event-system.ts +376 -0
- package/ts/core/utils/index.ts +7 -0
- package/ts/core/utils/route-manager.ts +489 -0
- package/ts/core/utils/route-utils.ts +312 -0
- package/ts/core/utils/security-utils.ts +309 -0
- package/ts/core/utils/shared-security-manager.ts +333 -0
- package/ts/core/utils/template-utils.ts +124 -0
- package/ts/core/utils/websocket-utils.ts +81 -0
- package/ts/forwarding/config/forwarding-types.ts +79 -107
- package/ts/forwarding/config/index.ts +4 -2
- package/ts/forwarding/handlers/base-handler.ts +4 -2
- package/ts/forwarding/index.ts +3 -2
- package/ts/http/models/http-types.ts +0 -1
- package/ts/http/port80/acme-interfaces.ts +84 -0
- package/ts/http/port80/port80-handler.ts +61 -15
- package/ts/http/router/index.ts +8 -1
- package/ts/http/router/route-router.ts +482 -0
- package/ts/index.ts +14 -2
- package/ts/proxies/index.ts +12 -3
- package/ts/proxies/network-proxy/certificate-manager.ts +114 -10
- package/ts/proxies/network-proxy/context-creator.ts +145 -0
- package/ts/proxies/network-proxy/function-cache.ts +259 -0
- package/ts/proxies/network-proxy/http-request-handler.ts +330 -0
- package/ts/proxies/network-proxy/http2-request-handler.ts +255 -0
- package/ts/proxies/network-proxy/models/types.ts +312 -1
- package/ts/proxies/network-proxy/network-proxy.ts +195 -86
- package/ts/proxies/network-proxy/request-handler.ts +698 -246
- package/ts/proxies/network-proxy/security-manager.ts +298 -0
- package/ts/proxies/network-proxy/websocket-handler.ts +276 -33
- package/ts/proxies/smart-proxy/index.ts +2 -12
- package/ts/proxies/smart-proxy/models/interfaces.ts +13 -67
- package/ts/proxies/smart-proxy/models/route-types.ts +223 -25
- package/ts/proxies/smart-proxy/network-proxy-bridge.ts +57 -123
- package/ts/proxies/smart-proxy/port-manager.ts +195 -0
- package/ts/proxies/smart-proxy/route-connection-handler.ts +191 -225
- package/ts/proxies/smart-proxy/route-manager.ts +101 -144
- package/ts/proxies/smart-proxy/smart-proxy.ts +206 -377
- package/ts/proxies/smart-proxy/timeout-manager.ts +2 -2
- package/ts/proxies/smart-proxy/utils/index.ts +40 -0
- package/ts/proxies/smart-proxy/utils/route-helpers.ts +621 -0
- package/ts/proxies/smart-proxy/utils/route-migration-utils.ts +165 -0
- package/ts/proxies/smart-proxy/utils/route-patterns.ts +309 -0
- package/ts/proxies/smart-proxy/utils/route-utils.ts +330 -0
- package/ts/proxies/smart-proxy/utils/route-validators.ts +288 -0
- package/ts/forwarding/config/domain-config.ts +0 -28
- package/ts/forwarding/config/domain-manager.ts +0 -283
- package/ts/proxies/smart-proxy/connection-handler.ts +0 -1240
- package/ts/proxies/smart-proxy/domain-config-manager.ts +0 -441
- package/ts/proxies/smart-proxy/port-range-manager.ts +0 -211
- package/ts/proxies/smart-proxy/route-helpers.ts +0 -344
|
@@ -2,7 +2,7 @@ import type { IAcmeOptions } from '../../../certificate/models/certificate-types
|
|
|
2
2
|
/**
|
|
3
3
|
* Supported action types for route configurations
|
|
4
4
|
*/
|
|
5
|
-
export type TRouteActionType = 'forward' | 'redirect' | 'block';
|
|
5
|
+
export type TRouteActionType = 'forward' | 'redirect' | 'block' | 'static';
|
|
6
6
|
/**
|
|
7
7
|
* TLS handling modes for route configurations
|
|
8
8
|
*/
|
|
@@ -23,13 +23,34 @@ export interface IRouteMatch {
|
|
|
23
23
|
path?: string;
|
|
24
24
|
clientIp?: string[];
|
|
25
25
|
tlsVersion?: string[];
|
|
26
|
+
headers?: Record<string, string | RegExp>;
|
|
27
|
+
}
|
|
28
|
+
/**
|
|
29
|
+
* Context provided to port and host mapping functions
|
|
30
|
+
*/
|
|
31
|
+
export interface IRouteContext {
|
|
32
|
+
port: number;
|
|
33
|
+
domain?: string;
|
|
34
|
+
clientIp: string;
|
|
35
|
+
serverIp: string;
|
|
36
|
+
path?: string;
|
|
37
|
+
query?: string;
|
|
38
|
+
headers?: Record<string, string>;
|
|
39
|
+
isTls: boolean;
|
|
40
|
+
tlsVersion?: string;
|
|
41
|
+
routeName?: string;
|
|
42
|
+
routeId?: string;
|
|
43
|
+
targetHost?: string | string[];
|
|
44
|
+
targetPort?: number;
|
|
45
|
+
timestamp: number;
|
|
46
|
+
connectionId: string;
|
|
26
47
|
}
|
|
27
48
|
/**
|
|
28
49
|
* Target configuration for forwarding
|
|
29
50
|
*/
|
|
30
51
|
export interface IRouteTarget {
|
|
31
|
-
host: string | string[];
|
|
32
|
-
port: number;
|
|
52
|
+
host: string | string[] | ((context: IRouteContext) => string | string[]);
|
|
53
|
+
port: number | ((context: IRouteContext) => number);
|
|
33
54
|
preservePort?: boolean;
|
|
34
55
|
}
|
|
35
56
|
/**
|
|
@@ -49,6 +70,24 @@ export interface IRouteRedirect {
|
|
|
49
70
|
to: string;
|
|
50
71
|
status: 301 | 302 | 307 | 308;
|
|
51
72
|
}
|
|
73
|
+
/**
|
|
74
|
+
* Authentication options
|
|
75
|
+
*/
|
|
76
|
+
export interface IRouteAuthentication {
|
|
77
|
+
type: 'basic' | 'digest' | 'oauth' | 'jwt';
|
|
78
|
+
credentials?: {
|
|
79
|
+
username: string;
|
|
80
|
+
password: string;
|
|
81
|
+
}[];
|
|
82
|
+
realm?: string;
|
|
83
|
+
jwtSecret?: string;
|
|
84
|
+
jwtIssuer?: string;
|
|
85
|
+
oauthProvider?: string;
|
|
86
|
+
oauthClientId?: string;
|
|
87
|
+
oauthClientSecret?: string;
|
|
88
|
+
oauthRedirectUri?: string;
|
|
89
|
+
options?: Record<string, unknown>;
|
|
90
|
+
}
|
|
52
91
|
/**
|
|
53
92
|
* Security options for route actions
|
|
54
93
|
*/
|
|
@@ -56,9 +95,38 @@ export interface IRouteSecurity {
|
|
|
56
95
|
allowedIps?: string[];
|
|
57
96
|
blockedIps?: string[];
|
|
58
97
|
maxConnections?: number;
|
|
59
|
-
authentication?:
|
|
60
|
-
|
|
61
|
-
|
|
98
|
+
authentication?: IRouteAuthentication;
|
|
99
|
+
}
|
|
100
|
+
/**
|
|
101
|
+
* Static file server configuration
|
|
102
|
+
*/
|
|
103
|
+
export interface IRouteStaticFiles {
|
|
104
|
+
root: string;
|
|
105
|
+
index?: string[];
|
|
106
|
+
headers?: Record<string, string>;
|
|
107
|
+
directory?: string;
|
|
108
|
+
indexFiles?: string[];
|
|
109
|
+
cacheControl?: string;
|
|
110
|
+
expires?: number;
|
|
111
|
+
followSymlinks?: boolean;
|
|
112
|
+
disableDirectoryListing?: boolean;
|
|
113
|
+
}
|
|
114
|
+
/**
|
|
115
|
+
* Test route response configuration
|
|
116
|
+
*/
|
|
117
|
+
export interface IRouteTestResponse {
|
|
118
|
+
status: number;
|
|
119
|
+
headers: Record<string, string>;
|
|
120
|
+
body: string;
|
|
121
|
+
}
|
|
122
|
+
/**
|
|
123
|
+
* URL rewriting configuration
|
|
124
|
+
*/
|
|
125
|
+
export interface IRouteUrlRewrite {
|
|
126
|
+
pattern: string;
|
|
127
|
+
target: string;
|
|
128
|
+
flags?: string;
|
|
129
|
+
onlyRewritePath?: boolean;
|
|
62
130
|
}
|
|
63
131
|
/**
|
|
64
132
|
* Advanced options for route actions
|
|
@@ -67,6 +135,36 @@ export interface IRouteAdvanced {
|
|
|
67
135
|
timeout?: number;
|
|
68
136
|
headers?: Record<string, string>;
|
|
69
137
|
keepAlive?: boolean;
|
|
138
|
+
staticFiles?: IRouteStaticFiles;
|
|
139
|
+
testResponse?: IRouteTestResponse;
|
|
140
|
+
urlRewrite?: IRouteUrlRewrite;
|
|
141
|
+
}
|
|
142
|
+
/**
|
|
143
|
+
* WebSocket configuration
|
|
144
|
+
*/
|
|
145
|
+
export interface IRouteWebSocket {
|
|
146
|
+
enabled: boolean;
|
|
147
|
+
pingInterval?: number;
|
|
148
|
+
pingTimeout?: number;
|
|
149
|
+
maxPayloadSize?: number;
|
|
150
|
+
customHeaders?: Record<string, string>;
|
|
151
|
+
subprotocols?: string[];
|
|
152
|
+
rewritePath?: string;
|
|
153
|
+
allowedOrigins?: string[];
|
|
154
|
+
authenticateRequest?: boolean;
|
|
155
|
+
}
|
|
156
|
+
/**
|
|
157
|
+
* Load balancing configuration
|
|
158
|
+
*/
|
|
159
|
+
export interface IRouteLoadBalancing {
|
|
160
|
+
algorithm: 'round-robin' | 'least-connections' | 'ip-hash';
|
|
161
|
+
healthCheck?: {
|
|
162
|
+
path: string;
|
|
163
|
+
interval: number;
|
|
164
|
+
timeout: number;
|
|
165
|
+
unhealthyThreshold: number;
|
|
166
|
+
healthyThreshold: number;
|
|
167
|
+
};
|
|
70
168
|
}
|
|
71
169
|
/**
|
|
72
170
|
* Action configuration for route handling
|
|
@@ -76,19 +174,88 @@ export interface IRouteAction {
|
|
|
76
174
|
target?: IRouteTarget;
|
|
77
175
|
tls?: IRouteTls;
|
|
78
176
|
redirect?: IRouteRedirect;
|
|
177
|
+
static?: IRouteStaticFiles;
|
|
178
|
+
websocket?: IRouteWebSocket;
|
|
179
|
+
loadBalancing?: IRouteLoadBalancing;
|
|
79
180
|
security?: IRouteSecurity;
|
|
80
181
|
advanced?: IRouteAdvanced;
|
|
182
|
+
options?: {
|
|
183
|
+
backendProtocol?: 'http1' | 'http2';
|
|
184
|
+
[key: string]: any;
|
|
185
|
+
};
|
|
186
|
+
}
|
|
187
|
+
/**
|
|
188
|
+
* Rate limiting configuration
|
|
189
|
+
*/
|
|
190
|
+
export interface IRouteRateLimit {
|
|
191
|
+
enabled: boolean;
|
|
192
|
+
maxRequests: number;
|
|
193
|
+
window: number;
|
|
194
|
+
keyBy?: 'ip' | 'path' | 'header';
|
|
195
|
+
headerName?: string;
|
|
196
|
+
errorMessage?: string;
|
|
197
|
+
}
|
|
198
|
+
/**
|
|
199
|
+
* Security features for routes
|
|
200
|
+
*/
|
|
201
|
+
export interface IRouteSecurity {
|
|
202
|
+
rateLimit?: IRouteRateLimit;
|
|
203
|
+
basicAuth?: {
|
|
204
|
+
enabled: boolean;
|
|
205
|
+
users: Array<{
|
|
206
|
+
username: string;
|
|
207
|
+
password: string;
|
|
208
|
+
}>;
|
|
209
|
+
realm?: string;
|
|
210
|
+
excludePaths?: string[];
|
|
211
|
+
};
|
|
212
|
+
jwtAuth?: {
|
|
213
|
+
enabled: boolean;
|
|
214
|
+
secret: string;
|
|
215
|
+
algorithm?: string;
|
|
216
|
+
issuer?: string;
|
|
217
|
+
audience?: string;
|
|
218
|
+
expiresIn?: number;
|
|
219
|
+
excludePaths?: string[];
|
|
220
|
+
};
|
|
221
|
+
ipAllowList?: string[];
|
|
222
|
+
ipBlockList?: string[];
|
|
223
|
+
}
|
|
224
|
+
/**
|
|
225
|
+
* CORS configuration for a route
|
|
226
|
+
*/
|
|
227
|
+
export interface IRouteCors {
|
|
228
|
+
enabled: boolean;
|
|
229
|
+
allowOrigin?: string | string[];
|
|
230
|
+
allowMethods?: string;
|
|
231
|
+
allowHeaders?: string;
|
|
232
|
+
allowCredentials?: boolean;
|
|
233
|
+
exposeHeaders?: string;
|
|
234
|
+
maxAge?: number;
|
|
235
|
+
preflight?: boolean;
|
|
236
|
+
}
|
|
237
|
+
/**
|
|
238
|
+
* Headers configuration
|
|
239
|
+
*/
|
|
240
|
+
export interface IRouteHeaders {
|
|
241
|
+
request?: Record<string, string>;
|
|
242
|
+
response?: Record<string, string>;
|
|
243
|
+
cors?: IRouteCors;
|
|
81
244
|
}
|
|
82
245
|
/**
|
|
83
246
|
* The core unified configuration interface
|
|
84
247
|
*/
|
|
85
248
|
export interface IRouteConfig {
|
|
249
|
+
id?: string;
|
|
86
250
|
match: IRouteMatch;
|
|
87
251
|
action: IRouteAction;
|
|
252
|
+
headers?: IRouteHeaders;
|
|
253
|
+
security?: IRouteSecurity;
|
|
88
254
|
name?: string;
|
|
89
255
|
description?: string;
|
|
90
256
|
priority?: number;
|
|
91
257
|
tags?: string[];
|
|
258
|
+
enabled?: boolean;
|
|
92
259
|
}
|
|
93
260
|
/**
|
|
94
261
|
* Unified SmartProxy options with routes-based configuration
|
|
@@ -3,8 +3,17 @@ import { NetworkProxy } from '../network-proxy/index.js';
|
|
|
3
3
|
import { Port80Handler } from '../../http/port80/port80-handler.js';
|
|
4
4
|
import type { ICertificateData } from '../../certificate/models/certificate-types.js';
|
|
5
5
|
import type { IConnectionRecord, ISmartProxyOptions } from './models/interfaces.js';
|
|
6
|
+
import type { IRouteConfig } from './models/route-types.js';
|
|
6
7
|
/**
|
|
7
8
|
* Manages NetworkProxy integration for TLS termination
|
|
9
|
+
*
|
|
10
|
+
* NetworkProxyBridge connects SmartProxy with NetworkProxy to handle TLS termination.
|
|
11
|
+
* It directly passes route configurations to NetworkProxy and manages the physical
|
|
12
|
+
* connection piping between SmartProxy and NetworkProxy for TLS termination.
|
|
13
|
+
*
|
|
14
|
+
* It is used by SmartProxy for routes that have:
|
|
15
|
+
* - TLS mode of 'terminate' or 'terminate-and-reencrypt'
|
|
16
|
+
* - Certificate set to 'auto' or custom certificate
|
|
8
17
|
*/
|
|
9
18
|
export declare class NetworkProxyBridge {
|
|
10
19
|
private settings;
|
|
@@ -43,20 +52,24 @@ export declare class NetworkProxyBridge {
|
|
|
43
52
|
* Stop NetworkProxy
|
|
44
53
|
*/
|
|
45
54
|
stop(): Promise<void>;
|
|
46
|
-
/**
|
|
47
|
-
* Register domains with Port80Handler
|
|
48
|
-
*/
|
|
49
|
-
registerDomainsWithPort80Handler(domains: string[]): void;
|
|
50
55
|
/**
|
|
51
56
|
* Forwards a TLS connection to a NetworkProxy for handling
|
|
52
57
|
*/
|
|
53
58
|
forwardToNetworkProxy(connectionId: string, socket: plugins.net.Socket, record: IConnectionRecord, initialData: Buffer, customProxyPort?: number, onError?: (reason: string) => void): void;
|
|
54
59
|
/**
|
|
55
|
-
* Synchronizes
|
|
60
|
+
* Synchronizes routes to NetworkProxy
|
|
61
|
+
*
|
|
62
|
+
* This method directly passes route configurations to NetworkProxy without any
|
|
63
|
+
* intermediate conversion. NetworkProxy natively understands route configurations.
|
|
64
|
+
*
|
|
65
|
+
* @param routes The route configurations to sync to NetworkProxy
|
|
56
66
|
*/
|
|
57
|
-
|
|
67
|
+
syncRoutesToNetworkProxy(routes: IRouteConfig[]): Promise<void>;
|
|
58
68
|
/**
|
|
59
69
|
* Request a certificate for a specific domain
|
|
70
|
+
*
|
|
71
|
+
* @param domain The domain to request a certificate for
|
|
72
|
+
* @param routeName Optional route name to associate with this certificate
|
|
60
73
|
*/
|
|
61
|
-
requestCertificate(domain: string): Promise<boolean>;
|
|
74
|
+
requestCertificate(domain: string, routeName?: string): Promise<boolean>;
|
|
62
75
|
}
|
|
@@ -1,10 +1,17 @@
|
|
|
1
1
|
import * as plugins from '../../plugins.js';
|
|
2
2
|
import { NetworkProxy } from '../network-proxy/index.js';
|
|
3
3
|
import { Port80Handler } from '../../http/port80/port80-handler.js';
|
|
4
|
-
import { Port80HandlerEvents } from '../../core/models/common-types.js';
|
|
5
4
|
import { subscribeToPort80Handler } from '../../core/utils/event-utils.js';
|
|
6
5
|
/**
|
|
7
6
|
* Manages NetworkProxy integration for TLS termination
|
|
7
|
+
*
|
|
8
|
+
* NetworkProxyBridge connects SmartProxy with NetworkProxy to handle TLS termination.
|
|
9
|
+
* It directly passes route configurations to NetworkProxy and manages the physical
|
|
10
|
+
* connection piping between SmartProxy and NetworkProxy for TLS termination.
|
|
11
|
+
*
|
|
12
|
+
* It is used by SmartProxy for routes that have:
|
|
13
|
+
* - TLS mode of 'terminate' or 'terminate-and-reencrypt'
|
|
14
|
+
* - Certificate set to 'auto' or custom certificate
|
|
8
15
|
*/
|
|
9
16
|
export class NetworkProxyBridge {
|
|
10
17
|
constructor(settings) {
|
|
@@ -33,7 +40,7 @@ export class NetworkProxyBridge {
|
|
|
33
40
|
*/
|
|
34
41
|
async initialize() {
|
|
35
42
|
if (!this.networkProxy && this.settings.useNetworkProxy && this.settings.useNetworkProxy.length > 0) {
|
|
36
|
-
// Configure NetworkProxy options based on
|
|
43
|
+
// Configure NetworkProxy options based on SmartProxy settings
|
|
37
44
|
const networkProxyOptions = {
|
|
38
45
|
port: this.settings.networkProxyPort,
|
|
39
46
|
portProxyIntegration: true,
|
|
@@ -46,8 +53,8 @@ export class NetworkProxyBridge {
|
|
|
46
53
|
if (this.port80Handler) {
|
|
47
54
|
this.networkProxy.setExternalPort80Handler(this.port80Handler);
|
|
48
55
|
}
|
|
49
|
-
//
|
|
50
|
-
await this.
|
|
56
|
+
// Apply route configurations to NetworkProxy
|
|
57
|
+
await this.syncRoutesToNetworkProxy(this.settings.routes || []);
|
|
51
58
|
}
|
|
52
59
|
}
|
|
53
60
|
/**
|
|
@@ -57,29 +64,8 @@ export class NetworkProxyBridge {
|
|
|
57
64
|
if (!this.networkProxy)
|
|
58
65
|
return;
|
|
59
66
|
console.log(`Received certificate for ${data.domain} from Port80Handler, updating NetworkProxy`);
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
const existingConfigs = this.networkProxy.getProxyConfigs()
|
|
63
|
-
.filter(config => config.hostName === data.domain);
|
|
64
|
-
if (existingConfigs.length > 0) {
|
|
65
|
-
// Update existing configs with new certificate
|
|
66
|
-
for (const config of existingConfigs) {
|
|
67
|
-
config.privateKey = data.privateKey;
|
|
68
|
-
config.publicKey = data.certificate;
|
|
69
|
-
}
|
|
70
|
-
// Apply updated configs
|
|
71
|
-
this.networkProxy.updateProxyConfigs(existingConfigs)
|
|
72
|
-
.then(() => console.log(`Updated certificate for ${data.domain} in NetworkProxy`))
|
|
73
|
-
.catch(err => console.log(`Error updating certificate in NetworkProxy: ${err}`));
|
|
74
|
-
}
|
|
75
|
-
else {
|
|
76
|
-
// Create a new config for this domain
|
|
77
|
-
console.log(`No existing config found for ${data.domain}, creating new config in NetworkProxy`);
|
|
78
|
-
}
|
|
79
|
-
}
|
|
80
|
-
catch (err) {
|
|
81
|
-
console.log(`Error handling certificate event: ${err}`);
|
|
82
|
-
}
|
|
67
|
+
// Apply certificate directly to NetworkProxy
|
|
68
|
+
this.networkProxy.updateCertificate(data.domain, data.certificate, data.privateKey);
|
|
83
69
|
}
|
|
84
70
|
/**
|
|
85
71
|
* Apply an external (static) certificate into NetworkProxy
|
|
@@ -89,7 +75,8 @@ export class NetworkProxyBridge {
|
|
|
89
75
|
console.log(`NetworkProxy not initialized: cannot apply external certificate for ${data.domain}`);
|
|
90
76
|
return;
|
|
91
77
|
}
|
|
92
|
-
|
|
78
|
+
// Apply certificate directly to NetworkProxy
|
|
79
|
+
this.networkProxy.updateCertificate(data.domain, data.certificate, data.privateKey);
|
|
93
80
|
}
|
|
94
81
|
/**
|
|
95
82
|
* Get the NetworkProxy instance
|
|
@@ -127,34 +114,6 @@ export class NetworkProxyBridge {
|
|
|
127
114
|
}
|
|
128
115
|
}
|
|
129
116
|
}
|
|
130
|
-
/**
|
|
131
|
-
* Register domains with Port80Handler
|
|
132
|
-
*/
|
|
133
|
-
registerDomainsWithPort80Handler(domains) {
|
|
134
|
-
if (!this.port80Handler) {
|
|
135
|
-
console.log('Cannot register domains - Port80Handler not initialized');
|
|
136
|
-
return;
|
|
137
|
-
}
|
|
138
|
-
for (const domain of domains) {
|
|
139
|
-
// Skip wildcards
|
|
140
|
-
if (domain.includes('*')) {
|
|
141
|
-
console.log(`Skipping wildcard domain for ACME: ${domain}`);
|
|
142
|
-
continue;
|
|
143
|
-
}
|
|
144
|
-
// Register the domain
|
|
145
|
-
try {
|
|
146
|
-
this.port80Handler.addDomain({
|
|
147
|
-
domainName: domain,
|
|
148
|
-
sslRedirect: true,
|
|
149
|
-
acmeMaintenance: true
|
|
150
|
-
});
|
|
151
|
-
console.log(`Registered domain with Port80Handler: ${domain}`);
|
|
152
|
-
}
|
|
153
|
-
catch (err) {
|
|
154
|
-
console.log(`Error registering domain ${domain} with Port80Handler: ${err}`);
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
}
|
|
158
117
|
/**
|
|
159
118
|
* Forwards a TLS connection to a NetworkProxy for handling
|
|
160
119
|
*/
|
|
@@ -199,72 +158,46 @@ export class NetworkProxyBridge {
|
|
|
199
158
|
// Now set up bidirectional piping between client and NetworkProxy
|
|
200
159
|
socket.pipe(proxySocket);
|
|
201
160
|
proxySocket.pipe(socket);
|
|
202
|
-
// Update activity on data transfer (caller should handle this)
|
|
203
161
|
if (this.settings.enableDetailedLogging) {
|
|
204
162
|
console.log(`[${connectionId}] TLS connection successfully forwarded to NetworkProxy`);
|
|
205
163
|
}
|
|
206
164
|
});
|
|
207
165
|
}
|
|
208
166
|
/**
|
|
209
|
-
* Synchronizes
|
|
167
|
+
* Synchronizes routes to NetworkProxy
|
|
168
|
+
*
|
|
169
|
+
* This method directly passes route configurations to NetworkProxy without any
|
|
170
|
+
* intermediate conversion. NetworkProxy natively understands route configurations.
|
|
171
|
+
*
|
|
172
|
+
* @param routes The route configurations to sync to NetworkProxy
|
|
210
173
|
*/
|
|
211
|
-
async
|
|
174
|
+
async syncRoutesToNetworkProxy(routes) {
|
|
212
175
|
if (!this.networkProxy) {
|
|
213
176
|
console.log('Cannot sync configurations - NetworkProxy not initialized');
|
|
214
177
|
return;
|
|
215
178
|
}
|
|
216
179
|
try {
|
|
217
|
-
//
|
|
218
|
-
|
|
219
|
-
|
|
220
|
-
|
|
221
|
-
|
|
222
|
-
|
|
223
|
-
|
|
224
|
-
|
|
225
|
-
|
|
226
|
-
}
|
|
227
|
-
catch (certError) {
|
|
228
|
-
console.log(`Warning: Could not read default certificates: ${certError}`);
|
|
229
|
-
console.log('Using empty certificate placeholders - ACME will generate proper certificates if enabled');
|
|
230
|
-
// Use empty placeholders - NetworkProxy will use its internal defaults
|
|
231
|
-
// or ACME will generate proper ones if enabled
|
|
232
|
-
certPair = {
|
|
233
|
-
key: '',
|
|
234
|
-
cert: '',
|
|
235
|
-
};
|
|
236
|
-
}
|
|
237
|
-
// Convert domain configs to NetworkProxy configs
|
|
238
|
-
const proxyConfigs = this.networkProxy.convertSmartProxyConfigs(this.settings.domainConfigs, certPair);
|
|
239
|
-
// Log ACME-eligible domains
|
|
240
|
-
const acmeEnabled = !!this.settings.acme?.enabled;
|
|
241
|
-
if (acmeEnabled) {
|
|
242
|
-
const acmeEligibleDomains = proxyConfigs
|
|
243
|
-
.filter((config) => !config.hostName.includes('*')) // Exclude wildcards
|
|
244
|
-
.map((config) => config.hostName);
|
|
245
|
-
if (acmeEligibleDomains.length > 0) {
|
|
246
|
-
console.log(`Domains eligible for ACME certificates: ${acmeEligibleDomains.join(', ')}`);
|
|
247
|
-
// Register these domains with Port80Handler if available
|
|
248
|
-
if (this.port80Handler) {
|
|
249
|
-
this.registerDomainsWithPort80Handler(acmeEligibleDomains);
|
|
250
|
-
}
|
|
251
|
-
}
|
|
252
|
-
else {
|
|
253
|
-
console.log('No domains eligible for ACME certificates found in configuration');
|
|
254
|
-
}
|
|
255
|
-
}
|
|
256
|
-
// Update NetworkProxy with the converted configs
|
|
257
|
-
await this.networkProxy.updateProxyConfigs(proxyConfigs);
|
|
258
|
-
console.log(`Successfully synchronized ${proxyConfigs.length} domain configurations to NetworkProxy`);
|
|
180
|
+
// Filter only routes that are applicable to NetworkProxy (TLS termination)
|
|
181
|
+
const networkProxyRoutes = routes.filter(route => {
|
|
182
|
+
return (route.action.type === 'forward' &&
|
|
183
|
+
route.action.tls &&
|
|
184
|
+
(route.action.tls.mode === 'terminate' || route.action.tls.mode === 'terminate-and-reencrypt'));
|
|
185
|
+
});
|
|
186
|
+
// Pass routes directly to NetworkProxy
|
|
187
|
+
await this.networkProxy.updateRouteConfigs(networkProxyRoutes);
|
|
188
|
+
console.log(`Synced ${networkProxyRoutes.length} routes directly to NetworkProxy`);
|
|
259
189
|
}
|
|
260
190
|
catch (err) {
|
|
261
|
-
console.log(`
|
|
191
|
+
console.log(`Error syncing routes to NetworkProxy: ${err}`);
|
|
262
192
|
}
|
|
263
193
|
}
|
|
264
194
|
/**
|
|
265
195
|
* Request a certificate for a specific domain
|
|
196
|
+
*
|
|
197
|
+
* @param domain The domain to request a certificate for
|
|
198
|
+
* @param routeName Optional route name to associate with this certificate
|
|
266
199
|
*/
|
|
267
|
-
async requestCertificate(domain) {
|
|
200
|
+
async requestCertificate(domain, routeName) {
|
|
268
201
|
// Delegate to Port80Handler if available
|
|
269
202
|
if (this.port80Handler) {
|
|
270
203
|
try {
|
|
@@ -274,12 +207,20 @@ export class NetworkProxyBridge {
|
|
|
274
207
|
console.log(`Certificate already exists for ${domain}`);
|
|
275
208
|
return true;
|
|
276
209
|
}
|
|
277
|
-
//
|
|
278
|
-
|
|
210
|
+
// Build the domain options
|
|
211
|
+
const domainOptions = {
|
|
279
212
|
domainName: domain,
|
|
280
213
|
sslRedirect: true,
|
|
281
|
-
acmeMaintenance: true
|
|
282
|
-
}
|
|
214
|
+
acmeMaintenance: true,
|
|
215
|
+
};
|
|
216
|
+
// Add route reference if available
|
|
217
|
+
if (routeName) {
|
|
218
|
+
domainOptions.routeReference = {
|
|
219
|
+
routeName
|
|
220
|
+
};
|
|
221
|
+
}
|
|
222
|
+
// Register the domain for certificate issuance
|
|
223
|
+
this.port80Handler.addDomain(domainOptions);
|
|
283
224
|
console.log(`Domain ${domain} registered for certificate issuance`);
|
|
284
225
|
return true;
|
|
285
226
|
}
|
|
@@ -313,4 +254,4 @@ export class NetworkProxyBridge {
|
|
|
313
254
|
}
|
|
314
255
|
}
|
|
315
256
|
}
|
|
316
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"network-proxy-bridge.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/network-proxy-bridge.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AACpE,OAAO,EAAE,mBAAmB,EAAE,MAAM,mCAAmC,CAAC;AACxE,OAAO,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAI3E;;GAEG;AACH,MAAM,OAAO,kBAAkB;IAI7B,YAAoB,QAA4B;QAA5B,aAAQ,GAAR,QAAQ,CAAoB;QAHxC,iBAAY,GAAwB,IAAI,CAAC;QACzC,kBAAa,GAAyB,IAAI,CAAC;IAEA,CAAC;IAEpD;;OAEG;IACI,gBAAgB,CAAC,OAAsB;QAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;QAE7B,kCAAkC;QAClC,wBAAwB,CAAC,OAAO,EAAE;YAChC,mBAAmB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;YAC3D,oBAAoB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;SAC7D,CAAC,CAAC;QAEH,wEAAwE;QACxE,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,OAAO,CAAC,CAAC;QACtD,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,+CAA+C,CAAC,CAAC;IAC/D,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,IAAI,CAAC,IAAI,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACpG,6DAA6D;YAC7D,MAAM,mBAAmB,GAAQ;gBAC/B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAiB;gBACrC,oBAAoB,EAAE,IAAI;gBAC1B,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM;gBAChE,wBAAwB,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,iCAAiC;aACjF,CAAC;YAGF,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC,mBAAmB,CAAC,CAAC;YAE1D,OAAO,CAAC,GAAG,CAAC,oCAAoC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAElF,qCAAqC;YACrC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;gBACvB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;YACjE,CAAC;YAED,0DAA0D;YAC1D,MAAM,IAAI,CAAC,+BAA+B,EAAE,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,IAAsB;QACnD,IAAI,CAAC,IAAI,CAAC,YAAY;YAAE,OAAO;QAE/B,OAAO,CAAC,GAAG,CAAC,4BAA4B,IAAI,CAAC,MAAM,4CAA4C,CAAC,CAAC;QAEjG,IAAI,CAAC;YACH,uCAAuC;YACvC,MAAM,eAAe,GAAG,IAAI,CAAC,YAAY,CAAC,eAAe,EAAE;iBACxD,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,QAAQ,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;YAErD,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC/B,+CAA+C;gBAC/C,KAAK,MAAM,MAAM,IAAI,eAAe,EAAE,CAAC;oBACrC,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC;oBACpC,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,WAAW,CAAC;gBACtC,CAAC;gBAED,wBAAwB;gBACxB,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,eAAe,CAAC;qBAClD,IAAI,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,2BAA2B,IAAI,CAAC,MAAM,kBAAkB,CAAC,CAAC;qBACjF,KAAK,CAAC,GAAG,CAAC,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,+CAA+C,GAAG,EAAE,CAAC,CAAC,CAAC;YACrF,CAAC;iBAAM,CAAC;gBACN,sCAAsC;gBACtC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,MAAM,uCAAuC,CAAC,CAAC;YAClG,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,qCAAqC,GAAG,EAAE,CAAC,CAAC;QAC1D,CAAC;IACH,CAAC;IAED;;OAEG;IACI,wBAAwB,CAAC,IAAsB;QACpD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,uEAAuE,IAAI,CAAC,MAAM,EAAE,CAAC,CAAC;YAClG,OAAO;QACT,CAAC;QACD,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;IACpC,CAAC;IAED;;OAEG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC;IAC3G,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;QAChF,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC/B,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;YACnD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,gCAAgC,CAAC,OAAiB;QACvD,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,OAAO,CAAC,GAAG,CAAC,yDAAyD,CAAC,CAAC;YACvE,OAAO;QACT,CAAC;QAED,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;YAC7B,iBAAiB;YACjB,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBACzB,OAAO,CAAC,GAAG,CAAC,sCAAsC,MAAM,EAAE,CAAC,CAAC;gBAC5D,SAAS;YACX,CAAC;YAED,sBAAsB;YACtB,IAAI,CAAC;gBACH,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;oBAC3B,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC,CAAC;gBAEH,OAAO,CAAC,GAAG,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;YACjE,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,4BAA4B,MAAM,wBAAwB,GAAG,EAAE,CAAC,CAAC;YAC/E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,qBAAqB,CAC1B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,WAAmB,EACnB,eAAwB,EACxB,OAAkC;QAElC,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D,CAC7E,CAAC;YACF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,+BAA+B,CAAC,CAAC;YAC3C,CAAC;YACD,OAAO;QACT,CAAC;QAED,+EAA+E;QAC/E,MAAM,SAAS,GAAG,eAAe,IAAI,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC;QAC1E,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,qCAAqC;QAEpE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD,SAAS,IAAI,SAAS,EAAE,CAC3F,CAAC;QACJ,CAAC;QAED,0CAA0C;QAC1C,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YACtC,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,SAAS;SAChB,CAAC,CAAC;QAEH,0CAA0C;QAC1C,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC;QAC9B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtC,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAEhC,wBAAwB;QACxB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YAC9B,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,6BAA6B,CAAC,CAAC;YACzC,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,WAAW,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,SAAS,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,gEAAgE;YAChE,WAAW,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAE/B,kEAAkE;YAClE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACzB,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEzB,+DAA+D;YAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yDAAyD,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,+BAA+B;QAC1C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,mCAAmC;YACnC,+CAA+C;YAC/C,MAAM,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;YAE9B,IAAI,QAAQ,CAAC;YACb,IAAI,CAAC;gBACH,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,sBAAsB,EAAE,MAAM,CAAC;oBACpD,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,uBAAuB,EAAE,MAAM,CAAC;iBACvD,CAAC;YACJ,CAAC;YAAC,OAAO,SAAS,EAAE,CAAC;gBACnB,OAAO,CAAC,GAAG,CAAC,iDAAiD,SAAS,EAAE,CAAC,CAAC;gBAC1E,OAAO,CAAC,GAAG,CACT,0FAA0F,CAC3F,CAAC;gBAEF,uEAAuE;gBACvE,+CAA+C;gBAC/C,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE;oBACP,IAAI,EAAE,EAAE;iBACT,CAAC;YACJ,CAAC;YAED,iDAAiD;YACjD,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAC7D,IAAI,CAAC,QAAQ,CAAC,aAAa,EAC3B,QAAQ,CACT,CAAC;YAEF,4BAA4B;YAC5B,MAAM,WAAW,GAAG,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,CAAC;YAClD,IAAI,WAAW,EAAE,CAAC;gBAChB,MAAM,mBAAmB,GAAG,YAAY;qBACrC,MAAM,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,oBAAoB;qBACvE,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAEpC,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACnC,OAAO,CAAC,GAAG,CAAC,2CAA2C,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;oBAEzF,yDAAyD;oBACzD,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;wBACvB,IAAI,CAAC,gCAAgC,CAAC,mBAAmB,CAAC,CAAC;oBAC7D,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,OAAO,CAAC,GAAG,CAAC,kEAAkE,CAAC,CAAC;gBAClF,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;YACzD,OAAO,CAAC,GAAG,CAAC,6BAA6B,YAAY,CAAC,MAAM,wCAAwC,CAAC,CAAC;QACxG,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,yCAAyC;QACzC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,4CAA4C;gBAC5C,MAAM,IAAI,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBACvD,IAAI,IAAI,EAAE,CAAC;oBACT,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;oBACxD,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;oBAC3B,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC,CAAC;gBAEH,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,sCAAsC,CAAC,CAAC;gBACpE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;gBACpD,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,8DAA8D;QAC9D,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAClE,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,yBAAyB,CAAC,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,SAAS,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
|
|
257
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"network-proxy-bridge.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/network-proxy-bridge.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AACpE,OAAO,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAK3E;;;;;;;;;;GAUG;AACH,MAAM,OAAO,kBAAkB;IAI7B,YAAoB,QAA4B;QAA5B,aAAQ,GAAR,QAAQ,CAAoB;QAHxC,iBAAY,GAAwB,IAAI,CAAC;QACzC,kBAAa,GAAyB,IAAI,CAAC;IAEA,CAAC;IAEpD;;OAEG;IACI,gBAAgB,CAAC,OAAsB;QAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;QAE7B,kCAAkC;QAClC,wBAAwB,CAAC,OAAO,EAAE;YAChC,mBAAmB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;YAC3D,oBAAoB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;SAC7D,CAAC,CAAC;QAEH,wEAAwE;QACxE,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,OAAO,CAAC,CAAC;QACtD,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,+CAA+C,CAAC,CAAC;IAC/D,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,IAAI,CAAC,IAAI,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACpG,8DAA8D;YAC9D,MAAM,mBAAmB,GAAQ;gBAC/B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAiB;gBACrC,oBAAoB,EAAE,IAAI;gBAC1B,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM;gBAChE,wBAAwB,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,iCAAiC;aACjF,CAAC;YAEF,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC,mBAAmB,CAAC,CAAC;YAE1D,OAAO,CAAC,GAAG,CAAC,oCAAoC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAElF,qCAAqC;YACrC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;gBACvB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;YACjE,CAAC;YAED,6CAA6C;YAC7C,MAAM,IAAI,CAAC,wBAAwB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;QAClE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,IAAsB;QACnD,IAAI,CAAC,IAAI,CAAC,YAAY;YAAE,OAAO;QAE/B,OAAO,CAAC,GAAG,CAAC,4BAA4B,IAAI,CAAC,MAAM,4CAA4C,CAAC,CAAC;QAEjG,6CAA6C;QAC7C,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;IACtF,CAAC;IAED;;OAEG;IACI,wBAAwB,CAAC,IAAsB;QACpD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,uEAAuE,IAAI,CAAC,MAAM,EAAE,CAAC,CAAC;YAClG,OAAO;QACT,CAAC;QAED,6CAA6C;QAC7C,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;IACtF,CAAC;IAED;;OAEG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC;IAC3G,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;QAChF,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC/B,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;YACnD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,qBAAqB,CAC1B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,WAAmB,EACnB,eAAwB,EACxB,OAAkC;QAElC,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D,CAC7E,CAAC;YACF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,+BAA+B,CAAC,CAAC;YAC3C,CAAC;YACD,OAAO;QACT,CAAC;QAED,+EAA+E;QAC/E,MAAM,SAAS,GAAG,eAAe,IAAI,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC;QAC1E,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,qCAAqC;QAEpE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD,SAAS,IAAI,SAAS,EAAE,CAC3F,CAAC;QACJ,CAAC;QAED,0CAA0C;QAC1C,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YACtC,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,SAAS;SAChB,CAAC,CAAC;QAEH,0CAA0C;QAC1C,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC;QAC9B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtC,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAEhC,wBAAwB;QACxB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YAC9B,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,6BAA6B,CAAC,CAAC;YACzC,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,WAAW,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,SAAS,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,gEAAgE;YAChE,WAAW,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAE/B,kEAAkE;YAClE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACzB,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEzB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yDAAyD,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;OAOG;IACI,KAAK,CAAC,wBAAwB,CAAC,MAAsB;QAC1D,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,2EAA2E;YAC3E,MAAM,kBAAkB,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE;gBAC/C,OAAO,CACL,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;oBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG;oBAChB,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC,CAC/F,CAAC;YACJ,CAAC,CAAC,CAAC;YAEH,uCAAuC;YACvC,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;YAC/D,OAAO,CAAC,GAAG,CAAC,UAAU,kBAAkB,CAAC,MAAM,kCAAkC,CAAC,CAAC;QACrF,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,yCAAyC,GAAG,EAAE,CAAC,CAAC;QAC9D,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc,EAAE,SAAkB;QAChE,yCAAyC;QACzC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,4CAA4C;gBAC5C,MAAM,IAAI,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBACvD,IAAI,IAAI,EAAE,CAAC;oBACT,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;oBACxD,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,2BAA2B;gBAC3B,MAAM,aAAa,GAAQ;oBACzB,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC;gBAEF,mCAAmC;gBACnC,IAAI,SAAS,EAAE,CAAC;oBACd,aAAa,CAAC,cAAc,GAAG;wBAC7B,SAAS;qBACV,CAAC;gBACJ,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;gBAE5C,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,sCAAsC,CAAC,CAAC;gBACpE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;gBACpD,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,8DAA8D;QAC9D,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAClE,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,yBAAyB,CAAC,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,SAAS,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
|
|
@@ -0,0 +1,81 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import type { ISmartProxyOptions } from './models/interfaces.js';
|
|
3
|
+
import { RouteConnectionHandler } from './route-connection-handler.js';
|
|
4
|
+
/**
|
|
5
|
+
* PortManager handles the dynamic creation and removal of port listeners
|
|
6
|
+
*
|
|
7
|
+
* This class provides methods to add and remove listening ports at runtime,
|
|
8
|
+
* allowing SmartProxy to adapt to configuration changes without requiring
|
|
9
|
+
* a full restart.
|
|
10
|
+
*/
|
|
11
|
+
export declare class PortManager {
|
|
12
|
+
private servers;
|
|
13
|
+
private settings;
|
|
14
|
+
private routeConnectionHandler;
|
|
15
|
+
private isShuttingDown;
|
|
16
|
+
/**
|
|
17
|
+
* Create a new PortManager
|
|
18
|
+
*
|
|
19
|
+
* @param settings The SmartProxy settings
|
|
20
|
+
* @param routeConnectionHandler The handler for new connections
|
|
21
|
+
*/
|
|
22
|
+
constructor(settings: ISmartProxyOptions, routeConnectionHandler: RouteConnectionHandler);
|
|
23
|
+
/**
|
|
24
|
+
* Start listening on a specific port
|
|
25
|
+
*
|
|
26
|
+
* @param port The port number to listen on
|
|
27
|
+
* @returns Promise that resolves when the server is listening or rejects on error
|
|
28
|
+
*/
|
|
29
|
+
addPort(port: number): Promise<void>;
|
|
30
|
+
/**
|
|
31
|
+
* Stop listening on a specific port
|
|
32
|
+
*
|
|
33
|
+
* @param port The port to stop listening on
|
|
34
|
+
* @returns Promise that resolves when the server is closed
|
|
35
|
+
*/
|
|
36
|
+
removePort(port: number): Promise<void>;
|
|
37
|
+
/**
|
|
38
|
+
* Add multiple ports at once
|
|
39
|
+
*
|
|
40
|
+
* @param ports Array of ports to add
|
|
41
|
+
* @returns Promise that resolves when all servers are listening
|
|
42
|
+
*/
|
|
43
|
+
addPorts(ports: number[]): Promise<void>;
|
|
44
|
+
/**
|
|
45
|
+
* Remove multiple ports at once
|
|
46
|
+
*
|
|
47
|
+
* @param ports Array of ports to remove
|
|
48
|
+
* @returns Promise that resolves when all servers are closed
|
|
49
|
+
*/
|
|
50
|
+
removePorts(ports: number[]): Promise<void>;
|
|
51
|
+
/**
|
|
52
|
+
* Update listening ports to match the provided list
|
|
53
|
+
*
|
|
54
|
+
* This will add any ports that aren't currently listening,
|
|
55
|
+
* and remove any ports that are no longer needed.
|
|
56
|
+
*
|
|
57
|
+
* @param ports Array of ports that should be listening
|
|
58
|
+
* @returns Promise that resolves when all operations are complete
|
|
59
|
+
*/
|
|
60
|
+
updatePorts(ports: number[]): Promise<void>;
|
|
61
|
+
/**
|
|
62
|
+
* Get all ports that are currently listening
|
|
63
|
+
*
|
|
64
|
+
* @returns Array of port numbers
|
|
65
|
+
*/
|
|
66
|
+
getListeningPorts(): number[];
|
|
67
|
+
/**
|
|
68
|
+
* Mark the port manager as shutting down
|
|
69
|
+
*/
|
|
70
|
+
setShuttingDown(isShuttingDown: boolean): void;
|
|
71
|
+
/**
|
|
72
|
+
* Close all listening servers
|
|
73
|
+
*
|
|
74
|
+
* @returns Promise that resolves when all servers are closed
|
|
75
|
+
*/
|
|
76
|
+
closeAll(): Promise<void>;
|
|
77
|
+
/**
|
|
78
|
+
* Get all server instances (for testing or debugging)
|
|
79
|
+
*/
|
|
80
|
+
getServers(): Map<number, plugins.net.Server>;
|
|
81
|
+
}
|