@push.rocks/smartproxy 15.0.2 → 16.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (160) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/certificate/index.d.ts +10 -4
  3. package/dist_ts/certificate/index.js +5 -7
  4. package/dist_ts/certificate/models/certificate-types.d.ts +35 -15
  5. package/dist_ts/certificate/providers/cert-provisioner.d.ts +41 -15
  6. package/dist_ts/certificate/providers/cert-provisioner.js +201 -41
  7. package/dist_ts/core/models/index.d.ts +2 -0
  8. package/dist_ts/core/models/index.js +3 -1
  9. package/dist_ts/core/models/route-context.d.ts +62 -0
  10. package/dist_ts/core/models/route-context.js +43 -0
  11. package/dist_ts/core/models/socket-augmentation.d.ts +12 -0
  12. package/dist_ts/core/models/socket-augmentation.js +18 -0
  13. package/dist_ts/core/utils/event-system.d.ts +200 -0
  14. package/dist_ts/core/utils/event-system.js +224 -0
  15. package/dist_ts/core/utils/index.d.ts +7 -0
  16. package/dist_ts/core/utils/index.js +8 -1
  17. package/dist_ts/core/utils/route-manager.d.ts +118 -0
  18. package/dist_ts/core/utils/route-manager.js +383 -0
  19. package/dist_ts/core/utils/route-utils.d.ts +94 -0
  20. package/dist_ts/core/utils/route-utils.js +264 -0
  21. package/dist_ts/core/utils/security-utils.d.ts +111 -0
  22. package/dist_ts/core/utils/security-utils.js +212 -0
  23. package/dist_ts/core/utils/shared-security-manager.d.ts +110 -0
  24. package/dist_ts/core/utils/shared-security-manager.js +252 -0
  25. package/dist_ts/core/utils/template-utils.d.ts +37 -0
  26. package/dist_ts/core/utils/template-utils.js +104 -0
  27. package/dist_ts/core/utils/websocket-utils.d.ts +23 -0
  28. package/dist_ts/core/utils/websocket-utils.js +86 -0
  29. package/dist_ts/forwarding/config/forwarding-types.d.ts +40 -76
  30. package/dist_ts/forwarding/config/forwarding-types.js +19 -18
  31. package/dist_ts/forwarding/config/index.d.ts +4 -2
  32. package/dist_ts/forwarding/config/index.js +5 -3
  33. package/dist_ts/forwarding/handlers/base-handler.js +3 -1
  34. package/dist_ts/forwarding/index.d.ts +5 -6
  35. package/dist_ts/forwarding/index.js +3 -3
  36. package/dist_ts/http/models/http-types.js +1 -1
  37. package/dist_ts/http/port80/acme-interfaces.d.ts +30 -0
  38. package/dist_ts/http/port80/acme-interfaces.js +46 -1
  39. package/dist_ts/http/port80/port80-handler.d.ts +17 -2
  40. package/dist_ts/http/port80/port80-handler.js +49 -11
  41. package/dist_ts/http/router/index.d.ts +5 -1
  42. package/dist_ts/http/router/index.js +4 -2
  43. package/dist_ts/http/router/route-router.d.ts +108 -0
  44. package/dist_ts/http/router/route-router.js +393 -0
  45. package/dist_ts/index.d.ts +8 -2
  46. package/dist_ts/index.js +10 -3
  47. package/dist_ts/proxies/index.d.ts +7 -2
  48. package/dist_ts/proxies/index.js +10 -4
  49. package/dist_ts/proxies/network-proxy/certificate-manager.d.ts +21 -0
  50. package/dist_ts/proxies/network-proxy/certificate-manager.js +92 -1
  51. package/dist_ts/proxies/network-proxy/context-creator.d.ts +34 -0
  52. package/dist_ts/proxies/network-proxy/context-creator.js +108 -0
  53. package/dist_ts/proxies/network-proxy/function-cache.d.ts +90 -0
  54. package/dist_ts/proxies/network-proxy/function-cache.js +198 -0
  55. package/dist_ts/proxies/network-proxy/http-request-handler.d.ts +40 -0
  56. package/dist_ts/proxies/network-proxy/http-request-handler.js +256 -0
  57. package/dist_ts/proxies/network-proxy/http2-request-handler.d.ts +24 -0
  58. package/dist_ts/proxies/network-proxy/http2-request-handler.js +201 -0
  59. package/dist_ts/proxies/network-proxy/models/types.d.ts +73 -1
  60. package/dist_ts/proxies/network-proxy/models/types.js +242 -1
  61. package/dist_ts/proxies/network-proxy/network-proxy.d.ts +23 -20
  62. package/dist_ts/proxies/network-proxy/network-proxy.js +147 -60
  63. package/dist_ts/proxies/network-proxy/request-handler.d.ts +38 -5
  64. package/dist_ts/proxies/network-proxy/request-handler.js +584 -198
  65. package/dist_ts/proxies/network-proxy/security-manager.d.ts +65 -0
  66. package/dist_ts/proxies/network-proxy/security-manager.js +255 -0
  67. package/dist_ts/proxies/network-proxy/websocket-handler.d.ts +13 -2
  68. package/dist_ts/proxies/network-proxy/websocket-handler.js +238 -20
  69. package/dist_ts/proxies/smart-proxy/index.d.ts +1 -1
  70. package/dist_ts/proxies/smart-proxy/index.js +3 -3
  71. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -66
  72. package/dist_ts/proxies/smart-proxy/models/interfaces.js +5 -4
  73. package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +173 -6
  74. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +20 -7
  75. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +49 -108
  76. package/dist_ts/proxies/smart-proxy/port-manager.d.ts +81 -0
  77. package/dist_ts/proxies/smart-proxy/port-manager.js +166 -0
  78. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +7 -5
  79. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +155 -160
  80. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +9 -0
  81. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +11 -0
  82. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +5 -125
  83. package/dist_ts/proxies/smart-proxy/route-helpers.js +8 -195
  84. package/dist_ts/proxies/smart-proxy/route-manager.d.ts +14 -11
  85. package/dist_ts/proxies/smart-proxy/route-manager.js +81 -124
  86. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +101 -12
  87. package/dist_ts/proxies/smart-proxy/smart-proxy.js +178 -306
  88. package/dist_ts/proxies/smart-proxy/timeout-manager.js +3 -3
  89. package/dist_ts/proxies/smart-proxy/utils/index.d.ts +12 -0
  90. package/dist_ts/proxies/smart-proxy/utils/index.js +19 -0
  91. package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +240 -0
  92. package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +451 -0
  93. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +51 -0
  94. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +124 -0
  95. package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +131 -0
  96. package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +217 -0
  97. package/dist_ts/proxies/smart-proxy/utils/route-utils.d.ts +79 -0
  98. package/dist_ts/proxies/smart-proxy/utils/route-utils.js +266 -0
  99. package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +73 -0
  100. package/dist_ts/proxies/smart-proxy/utils/route-validators.js +264 -0
  101. package/package.json +1 -1
  102. package/readme.md +241 -125
  103. package/readme.plan.md +73 -286
  104. package/ts/00_commitinfo_data.ts +1 -1
  105. package/ts/certificate/index.ts +17 -9
  106. package/ts/certificate/models/certificate-types.ts +37 -16
  107. package/ts/certificate/providers/cert-provisioner.ts +247 -54
  108. package/ts/core/models/index.ts +2 -0
  109. package/ts/core/models/route-context.ts +113 -0
  110. package/ts/core/models/socket-augmentation.ts +33 -0
  111. package/ts/core/utils/event-system.ts +376 -0
  112. package/ts/core/utils/index.ts +7 -0
  113. package/ts/core/utils/route-manager.ts +489 -0
  114. package/ts/core/utils/route-utils.ts +312 -0
  115. package/ts/core/utils/security-utils.ts +309 -0
  116. package/ts/core/utils/shared-security-manager.ts +333 -0
  117. package/ts/core/utils/template-utils.ts +124 -0
  118. package/ts/core/utils/websocket-utils.ts +81 -0
  119. package/ts/forwarding/config/forwarding-types.ts +79 -107
  120. package/ts/forwarding/config/index.ts +4 -2
  121. package/ts/forwarding/handlers/base-handler.ts +4 -2
  122. package/ts/forwarding/index.ts +3 -2
  123. package/ts/http/models/http-types.ts +0 -1
  124. package/ts/http/port80/acme-interfaces.ts +84 -0
  125. package/ts/http/port80/port80-handler.ts +61 -15
  126. package/ts/http/router/index.ts +8 -1
  127. package/ts/http/router/route-router.ts +482 -0
  128. package/ts/index.ts +14 -2
  129. package/ts/proxies/index.ts +12 -3
  130. package/ts/proxies/network-proxy/certificate-manager.ts +114 -10
  131. package/ts/proxies/network-proxy/context-creator.ts +145 -0
  132. package/ts/proxies/network-proxy/function-cache.ts +259 -0
  133. package/ts/proxies/network-proxy/http-request-handler.ts +330 -0
  134. package/ts/proxies/network-proxy/http2-request-handler.ts +255 -0
  135. package/ts/proxies/network-proxy/models/types.ts +312 -1
  136. package/ts/proxies/network-proxy/network-proxy.ts +195 -86
  137. package/ts/proxies/network-proxy/request-handler.ts +698 -246
  138. package/ts/proxies/network-proxy/security-manager.ts +298 -0
  139. package/ts/proxies/network-proxy/websocket-handler.ts +276 -33
  140. package/ts/proxies/smart-proxy/index.ts +2 -12
  141. package/ts/proxies/smart-proxy/models/interfaces.ts +13 -67
  142. package/ts/proxies/smart-proxy/models/route-types.ts +223 -25
  143. package/ts/proxies/smart-proxy/network-proxy-bridge.ts +57 -123
  144. package/ts/proxies/smart-proxy/port-manager.ts +195 -0
  145. package/ts/proxies/smart-proxy/route-connection-handler.ts +191 -225
  146. package/ts/proxies/smart-proxy/route-manager.ts +101 -144
  147. package/ts/proxies/smart-proxy/smart-proxy.ts +206 -377
  148. package/ts/proxies/smart-proxy/timeout-manager.ts +2 -2
  149. package/ts/proxies/smart-proxy/utils/index.ts +40 -0
  150. package/ts/proxies/smart-proxy/utils/route-helpers.ts +621 -0
  151. package/ts/proxies/smart-proxy/utils/route-migration-utils.ts +165 -0
  152. package/ts/proxies/smart-proxy/utils/route-patterns.ts +309 -0
  153. package/ts/proxies/smart-proxy/utils/route-utils.ts +330 -0
  154. package/ts/proxies/smart-proxy/utils/route-validators.ts +288 -0
  155. package/ts/forwarding/config/domain-config.ts +0 -28
  156. package/ts/forwarding/config/domain-manager.ts +0 -283
  157. package/ts/proxies/smart-proxy/connection-handler.ts +0 -1240
  158. package/ts/proxies/smart-proxy/domain-config-manager.ts +0 -441
  159. package/ts/proxies/smart-proxy/port-range-manager.ts +0 -211
  160. package/ts/proxies/smart-proxy/route-helpers.ts +0 -344
@@ -2,7 +2,7 @@ import type { IAcmeOptions } from '../../../certificate/models/certificate-types
2
2
  /**
3
3
  * Supported action types for route configurations
4
4
  */
5
- export type TRouteActionType = 'forward' | 'redirect' | 'block';
5
+ export type TRouteActionType = 'forward' | 'redirect' | 'block' | 'static';
6
6
  /**
7
7
  * TLS handling modes for route configurations
8
8
  */
@@ -23,13 +23,34 @@ export interface IRouteMatch {
23
23
  path?: string;
24
24
  clientIp?: string[];
25
25
  tlsVersion?: string[];
26
+ headers?: Record<string, string | RegExp>;
27
+ }
28
+ /**
29
+ * Context provided to port and host mapping functions
30
+ */
31
+ export interface IRouteContext {
32
+ port: number;
33
+ domain?: string;
34
+ clientIp: string;
35
+ serverIp: string;
36
+ path?: string;
37
+ query?: string;
38
+ headers?: Record<string, string>;
39
+ isTls: boolean;
40
+ tlsVersion?: string;
41
+ routeName?: string;
42
+ routeId?: string;
43
+ targetHost?: string | string[];
44
+ targetPort?: number;
45
+ timestamp: number;
46
+ connectionId: string;
26
47
  }
27
48
  /**
28
49
  * Target configuration for forwarding
29
50
  */
30
51
  export interface IRouteTarget {
31
- host: string | string[];
32
- port: number;
52
+ host: string | string[] | ((context: IRouteContext) => string | string[]);
53
+ port: number | ((context: IRouteContext) => number);
33
54
  preservePort?: boolean;
34
55
  }
35
56
  /**
@@ -49,6 +70,24 @@ export interface IRouteRedirect {
49
70
  to: string;
50
71
  status: 301 | 302 | 307 | 308;
51
72
  }
73
+ /**
74
+ * Authentication options
75
+ */
76
+ export interface IRouteAuthentication {
77
+ type: 'basic' | 'digest' | 'oauth' | 'jwt';
78
+ credentials?: {
79
+ username: string;
80
+ password: string;
81
+ }[];
82
+ realm?: string;
83
+ jwtSecret?: string;
84
+ jwtIssuer?: string;
85
+ oauthProvider?: string;
86
+ oauthClientId?: string;
87
+ oauthClientSecret?: string;
88
+ oauthRedirectUri?: string;
89
+ options?: Record<string, unknown>;
90
+ }
52
91
  /**
53
92
  * Security options for route actions
54
93
  */
@@ -56,9 +95,38 @@ export interface IRouteSecurity {
56
95
  allowedIps?: string[];
57
96
  blockedIps?: string[];
58
97
  maxConnections?: number;
59
- authentication?: {
60
- type: 'basic' | 'digest' | 'oauth';
61
- };
98
+ authentication?: IRouteAuthentication;
99
+ }
100
+ /**
101
+ * Static file server configuration
102
+ */
103
+ export interface IRouteStaticFiles {
104
+ root: string;
105
+ index?: string[];
106
+ headers?: Record<string, string>;
107
+ directory?: string;
108
+ indexFiles?: string[];
109
+ cacheControl?: string;
110
+ expires?: number;
111
+ followSymlinks?: boolean;
112
+ disableDirectoryListing?: boolean;
113
+ }
114
+ /**
115
+ * Test route response configuration
116
+ */
117
+ export interface IRouteTestResponse {
118
+ status: number;
119
+ headers: Record<string, string>;
120
+ body: string;
121
+ }
122
+ /**
123
+ * URL rewriting configuration
124
+ */
125
+ export interface IRouteUrlRewrite {
126
+ pattern: string;
127
+ target: string;
128
+ flags?: string;
129
+ onlyRewritePath?: boolean;
62
130
  }
63
131
  /**
64
132
  * Advanced options for route actions
@@ -67,6 +135,36 @@ export interface IRouteAdvanced {
67
135
  timeout?: number;
68
136
  headers?: Record<string, string>;
69
137
  keepAlive?: boolean;
138
+ staticFiles?: IRouteStaticFiles;
139
+ testResponse?: IRouteTestResponse;
140
+ urlRewrite?: IRouteUrlRewrite;
141
+ }
142
+ /**
143
+ * WebSocket configuration
144
+ */
145
+ export interface IRouteWebSocket {
146
+ enabled: boolean;
147
+ pingInterval?: number;
148
+ pingTimeout?: number;
149
+ maxPayloadSize?: number;
150
+ customHeaders?: Record<string, string>;
151
+ subprotocols?: string[];
152
+ rewritePath?: string;
153
+ allowedOrigins?: string[];
154
+ authenticateRequest?: boolean;
155
+ }
156
+ /**
157
+ * Load balancing configuration
158
+ */
159
+ export interface IRouteLoadBalancing {
160
+ algorithm: 'round-robin' | 'least-connections' | 'ip-hash';
161
+ healthCheck?: {
162
+ path: string;
163
+ interval: number;
164
+ timeout: number;
165
+ unhealthyThreshold: number;
166
+ healthyThreshold: number;
167
+ };
70
168
  }
71
169
  /**
72
170
  * Action configuration for route handling
@@ -76,19 +174,88 @@ export interface IRouteAction {
76
174
  target?: IRouteTarget;
77
175
  tls?: IRouteTls;
78
176
  redirect?: IRouteRedirect;
177
+ static?: IRouteStaticFiles;
178
+ websocket?: IRouteWebSocket;
179
+ loadBalancing?: IRouteLoadBalancing;
79
180
  security?: IRouteSecurity;
80
181
  advanced?: IRouteAdvanced;
182
+ options?: {
183
+ backendProtocol?: 'http1' | 'http2';
184
+ [key: string]: any;
185
+ };
186
+ }
187
+ /**
188
+ * Rate limiting configuration
189
+ */
190
+ export interface IRouteRateLimit {
191
+ enabled: boolean;
192
+ maxRequests: number;
193
+ window: number;
194
+ keyBy?: 'ip' | 'path' | 'header';
195
+ headerName?: string;
196
+ errorMessage?: string;
197
+ }
198
+ /**
199
+ * Security features for routes
200
+ */
201
+ export interface IRouteSecurity {
202
+ rateLimit?: IRouteRateLimit;
203
+ basicAuth?: {
204
+ enabled: boolean;
205
+ users: Array<{
206
+ username: string;
207
+ password: string;
208
+ }>;
209
+ realm?: string;
210
+ excludePaths?: string[];
211
+ };
212
+ jwtAuth?: {
213
+ enabled: boolean;
214
+ secret: string;
215
+ algorithm?: string;
216
+ issuer?: string;
217
+ audience?: string;
218
+ expiresIn?: number;
219
+ excludePaths?: string[];
220
+ };
221
+ ipAllowList?: string[];
222
+ ipBlockList?: string[];
223
+ }
224
+ /**
225
+ * CORS configuration for a route
226
+ */
227
+ export interface IRouteCors {
228
+ enabled: boolean;
229
+ allowOrigin?: string | string[];
230
+ allowMethods?: string;
231
+ allowHeaders?: string;
232
+ allowCredentials?: boolean;
233
+ exposeHeaders?: string;
234
+ maxAge?: number;
235
+ preflight?: boolean;
236
+ }
237
+ /**
238
+ * Headers configuration
239
+ */
240
+ export interface IRouteHeaders {
241
+ request?: Record<string, string>;
242
+ response?: Record<string, string>;
243
+ cors?: IRouteCors;
81
244
  }
82
245
  /**
83
246
  * The core unified configuration interface
84
247
  */
85
248
  export interface IRouteConfig {
249
+ id?: string;
86
250
  match: IRouteMatch;
87
251
  action: IRouteAction;
252
+ headers?: IRouteHeaders;
253
+ security?: IRouteSecurity;
88
254
  name?: string;
89
255
  description?: string;
90
256
  priority?: number;
91
257
  tags?: string[];
258
+ enabled?: boolean;
92
259
  }
93
260
  /**
94
261
  * Unified SmartProxy options with routes-based configuration
@@ -3,8 +3,17 @@ import { NetworkProxy } from '../network-proxy/index.js';
3
3
  import { Port80Handler } from '../../http/port80/port80-handler.js';
4
4
  import type { ICertificateData } from '../../certificate/models/certificate-types.js';
5
5
  import type { IConnectionRecord, ISmartProxyOptions } from './models/interfaces.js';
6
+ import type { IRouteConfig } from './models/route-types.js';
6
7
  /**
7
8
  * Manages NetworkProxy integration for TLS termination
9
+ *
10
+ * NetworkProxyBridge connects SmartProxy with NetworkProxy to handle TLS termination.
11
+ * It directly passes route configurations to NetworkProxy and manages the physical
12
+ * connection piping between SmartProxy and NetworkProxy for TLS termination.
13
+ *
14
+ * It is used by SmartProxy for routes that have:
15
+ * - TLS mode of 'terminate' or 'terminate-and-reencrypt'
16
+ * - Certificate set to 'auto' or custom certificate
8
17
  */
9
18
  export declare class NetworkProxyBridge {
10
19
  private settings;
@@ -43,20 +52,24 @@ export declare class NetworkProxyBridge {
43
52
  * Stop NetworkProxy
44
53
  */
45
54
  stop(): Promise<void>;
46
- /**
47
- * Register domains with Port80Handler
48
- */
49
- registerDomainsWithPort80Handler(domains: string[]): void;
50
55
  /**
51
56
  * Forwards a TLS connection to a NetworkProxy for handling
52
57
  */
53
58
  forwardToNetworkProxy(connectionId: string, socket: plugins.net.Socket, record: IConnectionRecord, initialData: Buffer, customProxyPort?: number, onError?: (reason: string) => void): void;
54
59
  /**
55
- * Synchronizes domain configurations to NetworkProxy
60
+ * Synchronizes routes to NetworkProxy
61
+ *
62
+ * This method directly passes route configurations to NetworkProxy without any
63
+ * intermediate conversion. NetworkProxy natively understands route configurations.
64
+ *
65
+ * @param routes The route configurations to sync to NetworkProxy
56
66
  */
57
- syncDomainConfigsToNetworkProxy(): Promise<void>;
67
+ syncRoutesToNetworkProxy(routes: IRouteConfig[]): Promise<void>;
58
68
  /**
59
69
  * Request a certificate for a specific domain
70
+ *
71
+ * @param domain The domain to request a certificate for
72
+ * @param routeName Optional route name to associate with this certificate
60
73
  */
61
- requestCertificate(domain: string): Promise<boolean>;
74
+ requestCertificate(domain: string, routeName?: string): Promise<boolean>;
62
75
  }
@@ -1,10 +1,17 @@
1
1
  import * as plugins from '../../plugins.js';
2
2
  import { NetworkProxy } from '../network-proxy/index.js';
3
3
  import { Port80Handler } from '../../http/port80/port80-handler.js';
4
- import { Port80HandlerEvents } from '../../core/models/common-types.js';
5
4
  import { subscribeToPort80Handler } from '../../core/utils/event-utils.js';
6
5
  /**
7
6
  * Manages NetworkProxy integration for TLS termination
7
+ *
8
+ * NetworkProxyBridge connects SmartProxy with NetworkProxy to handle TLS termination.
9
+ * It directly passes route configurations to NetworkProxy and manages the physical
10
+ * connection piping between SmartProxy and NetworkProxy for TLS termination.
11
+ *
12
+ * It is used by SmartProxy for routes that have:
13
+ * - TLS mode of 'terminate' or 'terminate-and-reencrypt'
14
+ * - Certificate set to 'auto' or custom certificate
8
15
  */
9
16
  export class NetworkProxyBridge {
10
17
  constructor(settings) {
@@ -33,7 +40,7 @@ export class NetworkProxyBridge {
33
40
  */
34
41
  async initialize() {
35
42
  if (!this.networkProxy && this.settings.useNetworkProxy && this.settings.useNetworkProxy.length > 0) {
36
- // Configure NetworkProxy options based on PortProxy settings
43
+ // Configure NetworkProxy options based on SmartProxy settings
37
44
  const networkProxyOptions = {
38
45
  port: this.settings.networkProxyPort,
39
46
  portProxyIntegration: true,
@@ -46,8 +53,8 @@ export class NetworkProxyBridge {
46
53
  if (this.port80Handler) {
47
54
  this.networkProxy.setExternalPort80Handler(this.port80Handler);
48
55
  }
49
- // Convert and apply domain configurations to NetworkProxy
50
- await this.syncDomainConfigsToNetworkProxy();
56
+ // Apply route configurations to NetworkProxy
57
+ await this.syncRoutesToNetworkProxy(this.settings.routes || []);
51
58
  }
52
59
  }
53
60
  /**
@@ -57,29 +64,8 @@ export class NetworkProxyBridge {
57
64
  if (!this.networkProxy)
58
65
  return;
59
66
  console.log(`Received certificate for ${data.domain} from Port80Handler, updating NetworkProxy`);
60
- try {
61
- // Find existing config for this domain
62
- const existingConfigs = this.networkProxy.getProxyConfigs()
63
- .filter(config => config.hostName === data.domain);
64
- if (existingConfigs.length > 0) {
65
- // Update existing configs with new certificate
66
- for (const config of existingConfigs) {
67
- config.privateKey = data.privateKey;
68
- config.publicKey = data.certificate;
69
- }
70
- // Apply updated configs
71
- this.networkProxy.updateProxyConfigs(existingConfigs)
72
- .then(() => console.log(`Updated certificate for ${data.domain} in NetworkProxy`))
73
- .catch(err => console.log(`Error updating certificate in NetworkProxy: ${err}`));
74
- }
75
- else {
76
- // Create a new config for this domain
77
- console.log(`No existing config found for ${data.domain}, creating new config in NetworkProxy`);
78
- }
79
- }
80
- catch (err) {
81
- console.log(`Error handling certificate event: ${err}`);
82
- }
67
+ // Apply certificate directly to NetworkProxy
68
+ this.networkProxy.updateCertificate(data.domain, data.certificate, data.privateKey);
83
69
  }
84
70
  /**
85
71
  * Apply an external (static) certificate into NetworkProxy
@@ -89,7 +75,8 @@ export class NetworkProxyBridge {
89
75
  console.log(`NetworkProxy not initialized: cannot apply external certificate for ${data.domain}`);
90
76
  return;
91
77
  }
92
- this.handleCertificateEvent(data);
78
+ // Apply certificate directly to NetworkProxy
79
+ this.networkProxy.updateCertificate(data.domain, data.certificate, data.privateKey);
93
80
  }
94
81
  /**
95
82
  * Get the NetworkProxy instance
@@ -127,34 +114,6 @@ export class NetworkProxyBridge {
127
114
  }
128
115
  }
129
116
  }
130
- /**
131
- * Register domains with Port80Handler
132
- */
133
- registerDomainsWithPort80Handler(domains) {
134
- if (!this.port80Handler) {
135
- console.log('Cannot register domains - Port80Handler not initialized');
136
- return;
137
- }
138
- for (const domain of domains) {
139
- // Skip wildcards
140
- if (domain.includes('*')) {
141
- console.log(`Skipping wildcard domain for ACME: ${domain}`);
142
- continue;
143
- }
144
- // Register the domain
145
- try {
146
- this.port80Handler.addDomain({
147
- domainName: domain,
148
- sslRedirect: true,
149
- acmeMaintenance: true
150
- });
151
- console.log(`Registered domain with Port80Handler: ${domain}`);
152
- }
153
- catch (err) {
154
- console.log(`Error registering domain ${domain} with Port80Handler: ${err}`);
155
- }
156
- }
157
- }
158
117
  /**
159
118
  * Forwards a TLS connection to a NetworkProxy for handling
160
119
  */
@@ -199,72 +158,46 @@ export class NetworkProxyBridge {
199
158
  // Now set up bidirectional piping between client and NetworkProxy
200
159
  socket.pipe(proxySocket);
201
160
  proxySocket.pipe(socket);
202
- // Update activity on data transfer (caller should handle this)
203
161
  if (this.settings.enableDetailedLogging) {
204
162
  console.log(`[${connectionId}] TLS connection successfully forwarded to NetworkProxy`);
205
163
  }
206
164
  });
207
165
  }
208
166
  /**
209
- * Synchronizes domain configurations to NetworkProxy
167
+ * Synchronizes routes to NetworkProxy
168
+ *
169
+ * This method directly passes route configurations to NetworkProxy without any
170
+ * intermediate conversion. NetworkProxy natively understands route configurations.
171
+ *
172
+ * @param routes The route configurations to sync to NetworkProxy
210
173
  */
211
- async syncDomainConfigsToNetworkProxy() {
174
+ async syncRoutesToNetworkProxy(routes) {
212
175
  if (!this.networkProxy) {
213
176
  console.log('Cannot sync configurations - NetworkProxy not initialized');
214
177
  return;
215
178
  }
216
179
  try {
217
- // Get SSL certificates from assets
218
- // Import fs directly since it's not in plugins
219
- const fs = await import('fs');
220
- let certPair;
221
- try {
222
- certPair = {
223
- key: fs.readFileSync('assets/certs/key.pem', 'utf8'),
224
- cert: fs.readFileSync('assets/certs/cert.pem', 'utf8'),
225
- };
226
- }
227
- catch (certError) {
228
- console.log(`Warning: Could not read default certificates: ${certError}`);
229
- console.log('Using empty certificate placeholders - ACME will generate proper certificates if enabled');
230
- // Use empty placeholders - NetworkProxy will use its internal defaults
231
- // or ACME will generate proper ones if enabled
232
- certPair = {
233
- key: '',
234
- cert: '',
235
- };
236
- }
237
- // Convert domain configs to NetworkProxy configs
238
- const proxyConfigs = this.networkProxy.convertSmartProxyConfigs(this.settings.domainConfigs, certPair);
239
- // Log ACME-eligible domains
240
- const acmeEnabled = !!this.settings.acme?.enabled;
241
- if (acmeEnabled) {
242
- const acmeEligibleDomains = proxyConfigs
243
- .filter((config) => !config.hostName.includes('*')) // Exclude wildcards
244
- .map((config) => config.hostName);
245
- if (acmeEligibleDomains.length > 0) {
246
- console.log(`Domains eligible for ACME certificates: ${acmeEligibleDomains.join(', ')}`);
247
- // Register these domains with Port80Handler if available
248
- if (this.port80Handler) {
249
- this.registerDomainsWithPort80Handler(acmeEligibleDomains);
250
- }
251
- }
252
- else {
253
- console.log('No domains eligible for ACME certificates found in configuration');
254
- }
255
- }
256
- // Update NetworkProxy with the converted configs
257
- await this.networkProxy.updateProxyConfigs(proxyConfigs);
258
- console.log(`Successfully synchronized ${proxyConfigs.length} domain configurations to NetworkProxy`);
180
+ // Filter only routes that are applicable to NetworkProxy (TLS termination)
181
+ const networkProxyRoutes = routes.filter(route => {
182
+ return (route.action.type === 'forward' &&
183
+ route.action.tls &&
184
+ (route.action.tls.mode === 'terminate' || route.action.tls.mode === 'terminate-and-reencrypt'));
185
+ });
186
+ // Pass routes directly to NetworkProxy
187
+ await this.networkProxy.updateRouteConfigs(networkProxyRoutes);
188
+ console.log(`Synced ${networkProxyRoutes.length} routes directly to NetworkProxy`);
259
189
  }
260
190
  catch (err) {
261
- console.log(`Failed to sync configurations: ${err}`);
191
+ console.log(`Error syncing routes to NetworkProxy: ${err}`);
262
192
  }
263
193
  }
264
194
  /**
265
195
  * Request a certificate for a specific domain
196
+ *
197
+ * @param domain The domain to request a certificate for
198
+ * @param routeName Optional route name to associate with this certificate
266
199
  */
267
- async requestCertificate(domain) {
200
+ async requestCertificate(domain, routeName) {
268
201
  // Delegate to Port80Handler if available
269
202
  if (this.port80Handler) {
270
203
  try {
@@ -274,12 +207,20 @@ export class NetworkProxyBridge {
274
207
  console.log(`Certificate already exists for ${domain}`);
275
208
  return true;
276
209
  }
277
- // Register the domain for certificate issuance
278
- this.port80Handler.addDomain({
210
+ // Build the domain options
211
+ const domainOptions = {
279
212
  domainName: domain,
280
213
  sslRedirect: true,
281
- acmeMaintenance: true
282
- });
214
+ acmeMaintenance: true,
215
+ };
216
+ // Add route reference if available
217
+ if (routeName) {
218
+ domainOptions.routeReference = {
219
+ routeName
220
+ };
221
+ }
222
+ // Register the domain for certificate issuance
223
+ this.port80Handler.addDomain(domainOptions);
283
224
  console.log(`Domain ${domain} registered for certificate issuance`);
284
225
  return true;
285
226
  }
@@ -313,4 +254,4 @@ export class NetworkProxyBridge {
313
254
  }
314
255
  }
315
256
  }
316
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"network-proxy-bridge.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/network-proxy-bridge.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AACpE,OAAO,EAAE,mBAAmB,EAAE,MAAM,mCAAmC,CAAC;AACxE,OAAO,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAI3E;;GAEG;AACH,MAAM,OAAO,kBAAkB;IAI7B,YAAoB,QAA4B;QAA5B,aAAQ,GAAR,QAAQ,CAAoB;QAHxC,iBAAY,GAAwB,IAAI,CAAC;QACzC,kBAAa,GAAyB,IAAI,CAAC;IAEA,CAAC;IAEpD;;OAEG;IACI,gBAAgB,CAAC,OAAsB;QAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;QAE7B,kCAAkC;QAClC,wBAAwB,CAAC,OAAO,EAAE;YAChC,mBAAmB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;YAC3D,oBAAoB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;SAC7D,CAAC,CAAC;QAEH,wEAAwE;QACxE,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,OAAO,CAAC,CAAC;QACtD,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,+CAA+C,CAAC,CAAC;IAC/D,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,IAAI,CAAC,IAAI,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACpG,6DAA6D;YAC7D,MAAM,mBAAmB,GAAQ;gBAC/B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAiB;gBACrC,oBAAoB,EAAE,IAAI;gBAC1B,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM;gBAChE,wBAAwB,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,iCAAiC;aACjF,CAAC;YAGF,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC,mBAAmB,CAAC,CAAC;YAE1D,OAAO,CAAC,GAAG,CAAC,oCAAoC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAElF,qCAAqC;YACrC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;gBACvB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;YACjE,CAAC;YAED,0DAA0D;YAC1D,MAAM,IAAI,CAAC,+BAA+B,EAAE,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,IAAsB;QACnD,IAAI,CAAC,IAAI,CAAC,YAAY;YAAE,OAAO;QAE/B,OAAO,CAAC,GAAG,CAAC,4BAA4B,IAAI,CAAC,MAAM,4CAA4C,CAAC,CAAC;QAEjG,IAAI,CAAC;YACH,uCAAuC;YACvC,MAAM,eAAe,GAAG,IAAI,CAAC,YAAY,CAAC,eAAe,EAAE;iBACxD,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,QAAQ,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;YAErD,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC/B,+CAA+C;gBAC/C,KAAK,MAAM,MAAM,IAAI,eAAe,EAAE,CAAC;oBACrC,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC;oBACpC,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,WAAW,CAAC;gBACtC,CAAC;gBAED,wBAAwB;gBACxB,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,eAAe,CAAC;qBAClD,IAAI,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,2BAA2B,IAAI,CAAC,MAAM,kBAAkB,CAAC,CAAC;qBACjF,KAAK,CAAC,GAAG,CAAC,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,+CAA+C,GAAG,EAAE,CAAC,CAAC,CAAC;YACrF,CAAC;iBAAM,CAAC;gBACN,sCAAsC;gBACtC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,MAAM,uCAAuC,CAAC,CAAC;YAClG,CAAC;QACH,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,qCAAqC,GAAG,EAAE,CAAC,CAAC;QAC1D,CAAC;IACH,CAAC;IAED;;OAEG;IACI,wBAAwB,CAAC,IAAsB;QACpD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,uEAAuE,IAAI,CAAC,MAAM,EAAE,CAAC,CAAC;YAClG,OAAO;QACT,CAAC;QACD,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;IACpC,CAAC;IAED;;OAEG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC;IAC3G,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;QAChF,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC/B,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;YACnD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,gCAAgC,CAAC,OAAiB;QACvD,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;YACxB,OAAO,CAAC,GAAG,CAAC,yDAAyD,CAAC,CAAC;YACvE,OAAO;QACT,CAAC;QAED,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;YAC7B,iBAAiB;YACjB,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBACzB,OAAO,CAAC,GAAG,CAAC,sCAAsC,MAAM,EAAE,CAAC,CAAC;gBAC5D,SAAS;YACX,CAAC;YAED,sBAAsB;YACtB,IAAI,CAAC;gBACH,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;oBAC3B,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC,CAAC;gBAEH,OAAO,CAAC,GAAG,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;YACjE,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,4BAA4B,MAAM,wBAAwB,GAAG,EAAE,CAAC,CAAC;YAC/E,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,qBAAqB,CAC1B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,WAAmB,EACnB,eAAwB,EACxB,OAAkC;QAElC,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D,CAC7E,CAAC;YACF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,+BAA+B,CAAC,CAAC;YAC3C,CAAC;YACD,OAAO;QACT,CAAC;QAED,+EAA+E;QAC/E,MAAM,SAAS,GAAG,eAAe,IAAI,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC;QAC1E,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,qCAAqC;QAEpE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD,SAAS,IAAI,SAAS,EAAE,CAC3F,CAAC;QACJ,CAAC;QAED,0CAA0C;QAC1C,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YACtC,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,SAAS;SAChB,CAAC,CAAC;QAEH,0CAA0C;QAC1C,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC;QAC9B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtC,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAEhC,wBAAwB;QACxB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YAC9B,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,6BAA6B,CAAC,CAAC;YACzC,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,WAAW,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,SAAS,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,gEAAgE;YAChE,WAAW,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAE/B,kEAAkE;YAClE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACzB,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEzB,+DAA+D;YAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yDAAyD,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,+BAA+B;QAC1C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,mCAAmC;YACnC,+CAA+C;YAC/C,MAAM,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;YAE9B,IAAI,QAAQ,CAAC;YACb,IAAI,CAAC;gBACH,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,sBAAsB,EAAE,MAAM,CAAC;oBACpD,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,uBAAuB,EAAE,MAAM,CAAC;iBACvD,CAAC;YACJ,CAAC;YAAC,OAAO,SAAS,EAAE,CAAC;gBACnB,OAAO,CAAC,GAAG,CAAC,iDAAiD,SAAS,EAAE,CAAC,CAAC;gBAC1E,OAAO,CAAC,GAAG,CACT,0FAA0F,CAC3F,CAAC;gBAEF,uEAAuE;gBACvE,+CAA+C;gBAC/C,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE;oBACP,IAAI,EAAE,EAAE;iBACT,CAAC;YACJ,CAAC;YAED,iDAAiD;YACjD,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAC7D,IAAI,CAAC,QAAQ,CAAC,aAAa,EAC3B,QAAQ,CACT,CAAC;YAEF,4BAA4B;YAC5B,MAAM,WAAW,GAAG,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,CAAC;YAClD,IAAI,WAAW,EAAE,CAAC;gBAChB,MAAM,mBAAmB,GAAG,YAAY;qBACrC,MAAM,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,oBAAoB;qBACvE,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAEpC,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACnC,OAAO,CAAC,GAAG,CAAC,2CAA2C,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;oBAEzF,yDAAyD;oBACzD,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;wBACvB,IAAI,CAAC,gCAAgC,CAAC,mBAAmB,CAAC,CAAC;oBAC7D,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,OAAO,CAAC,GAAG,CAAC,kEAAkE,CAAC,CAAC;gBAClF,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;YACzD,OAAO,CAAC,GAAG,CAAC,6BAA6B,YAAY,CAAC,MAAM,wCAAwC,CAAC,CAAC;QACxG,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,yCAAyC;QACzC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,4CAA4C;gBAC5C,MAAM,IAAI,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBACvD,IAAI,IAAI,EAAE,CAAC;oBACT,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;oBACxD,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;oBAC3B,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC,CAAC;gBAEH,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,sCAAsC,CAAC,CAAC;gBACpE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;gBACpD,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,8DAA8D;QAC9D,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAClE,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,yBAAyB,CAAC,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,SAAS,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
257
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"network-proxy-bridge.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/network-proxy-bridge.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AACpE,OAAO,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAK3E;;;;;;;;;;GAUG;AACH,MAAM,OAAO,kBAAkB;IAI7B,YAAoB,QAA4B;QAA5B,aAAQ,GAAR,QAAQ,CAAoB;QAHxC,iBAAY,GAAwB,IAAI,CAAC;QACzC,kBAAa,GAAyB,IAAI,CAAC;IAEA,CAAC;IAEpD;;OAEG;IACI,gBAAgB,CAAC,OAAsB;QAC5C,IAAI,CAAC,aAAa,GAAG,OAAO,CAAC;QAE7B,kCAAkC;QAClC,wBAAwB,CAAC,OAAO,EAAE;YAChC,mBAAmB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;YAC3D,oBAAoB,EAAE,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC;SAC7D,CAAC,CAAC;QAEH,wEAAwE;QACxE,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,OAAO,CAAC,CAAC;QACtD,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,+CAA+C,CAAC,CAAC;IAC/D,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,IAAI,CAAC,IAAI,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACpG,8DAA8D;YAC9D,MAAM,mBAAmB,GAAQ;gBAC/B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAiB;gBACrC,oBAAoB,EAAE,IAAI;gBAC1B,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM;gBAChE,wBAAwB,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,iCAAiC;aACjF,CAAC;YAEF,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC,mBAAmB,CAAC,CAAC;YAE1D,OAAO,CAAC,GAAG,CAAC,oCAAoC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAElF,qCAAqC;YACrC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;gBACvB,IAAI,CAAC,YAAY,CAAC,wBAAwB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;YACjE,CAAC;YAED,6CAA6C;YAC7C,MAAM,IAAI,CAAC,wBAAwB,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;QAClE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,sBAAsB,CAAC,IAAsB;QACnD,IAAI,CAAC,IAAI,CAAC,YAAY;YAAE,OAAO;QAE/B,OAAO,CAAC,GAAG,CAAC,4BAA4B,IAAI,CAAC,MAAM,4CAA4C,CAAC,CAAC;QAEjG,6CAA6C;QAC7C,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;IACtF,CAAC;IAED;;OAEG;IACI,wBAAwB,CAAC,IAAsB;QACpD,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,uEAAuE,IAAI,CAAC,MAAM,EAAE,CAAC,CAAC;YAClG,OAAO;QACT,CAAC;QAED,6CAA6C;QAC7C,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;IACtF,CAAC;IAED;;OAEG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC;IAC3G,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;QAChF,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC/B,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;YACnD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,qBAAqB,CAC1B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,WAAmB,EACnB,eAAwB,EACxB,OAAkC;QAElC,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D,CAC7E,CAAC;YACF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,+BAA+B,CAAC,CAAC;YAC3C,CAAC;YACD,OAAO;QACT,CAAC;QAED,+EAA+E;QAC/E,MAAM,SAAS,GAAG,eAAe,IAAI,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC;QAC1E,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,qCAAqC;QAEpE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD,SAAS,IAAI,SAAS,EAAE,CAC3F,CAAC;QACJ,CAAC;QAED,0CAA0C;QAC1C,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YACtC,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,SAAS;SAChB,CAAC,CAAC;QAEH,0CAA0C;QAC1C,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC;QAC9B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtC,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAEhC,wBAAwB;QACxB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YAC9B,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,6BAA6B,CAAC,CAAC;YACzC,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,WAAW,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,SAAS,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,gEAAgE;YAChE,WAAW,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAE/B,kEAAkE;YAClE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACzB,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEzB,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yDAAyD,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;OAOG;IACI,KAAK,CAAC,wBAAwB,CAAC,MAAsB;QAC1D,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,2EAA2E;YAC3E,MAAM,kBAAkB,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE;gBAC/C,OAAO,CACL,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;oBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG;oBAChB,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC,CAC/F,CAAC;YACJ,CAAC,CAAC,CAAC;YAEH,uCAAuC;YACvC,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;YAC/D,OAAO,CAAC,GAAG,CAAC,UAAU,kBAAkB,CAAC,MAAM,kCAAkC,CAAC,CAAC;QACrF,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,yCAAyC,GAAG,EAAE,CAAC,CAAC;QAC9D,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc,EAAE,SAAkB;QAChE,yCAAyC;QACzC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACvB,IAAI,CAAC;gBACH,4CAA4C;gBAC5C,MAAM,IAAI,GAAG,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBACvD,IAAI,IAAI,EAAE,CAAC;oBACT,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;oBACxD,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,2BAA2B;gBAC3B,MAAM,aAAa,GAAQ;oBACzB,UAAU,EAAE,MAAM;oBAClB,WAAW,EAAE,IAAI;oBACjB,eAAe,EAAE,IAAI;iBACtB,CAAC;gBAEF,mCAAmC;gBACnC,IAAI,SAAS,EAAE,CAAC;oBACd,aAAa,CAAC,cAAc,GAAG;wBAC7B,SAAS;qBACV,CAAC;gBACJ,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;gBAE5C,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,sCAAsC,CAAC,CAAC;gBACpE,OAAO,IAAI,CAAC;YACd,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;gBACpD,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,8DAA8D;QAC9D,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAClE,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,yBAAyB,CAAC,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,SAAS,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
@@ -0,0 +1,81 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import type { ISmartProxyOptions } from './models/interfaces.js';
3
+ import { RouteConnectionHandler } from './route-connection-handler.js';
4
+ /**
5
+ * PortManager handles the dynamic creation and removal of port listeners
6
+ *
7
+ * This class provides methods to add and remove listening ports at runtime,
8
+ * allowing SmartProxy to adapt to configuration changes without requiring
9
+ * a full restart.
10
+ */
11
+ export declare class PortManager {
12
+ private servers;
13
+ private settings;
14
+ private routeConnectionHandler;
15
+ private isShuttingDown;
16
+ /**
17
+ * Create a new PortManager
18
+ *
19
+ * @param settings The SmartProxy settings
20
+ * @param routeConnectionHandler The handler for new connections
21
+ */
22
+ constructor(settings: ISmartProxyOptions, routeConnectionHandler: RouteConnectionHandler);
23
+ /**
24
+ * Start listening on a specific port
25
+ *
26
+ * @param port The port number to listen on
27
+ * @returns Promise that resolves when the server is listening or rejects on error
28
+ */
29
+ addPort(port: number): Promise<void>;
30
+ /**
31
+ * Stop listening on a specific port
32
+ *
33
+ * @param port The port to stop listening on
34
+ * @returns Promise that resolves when the server is closed
35
+ */
36
+ removePort(port: number): Promise<void>;
37
+ /**
38
+ * Add multiple ports at once
39
+ *
40
+ * @param ports Array of ports to add
41
+ * @returns Promise that resolves when all servers are listening
42
+ */
43
+ addPorts(ports: number[]): Promise<void>;
44
+ /**
45
+ * Remove multiple ports at once
46
+ *
47
+ * @param ports Array of ports to remove
48
+ * @returns Promise that resolves when all servers are closed
49
+ */
50
+ removePorts(ports: number[]): Promise<void>;
51
+ /**
52
+ * Update listening ports to match the provided list
53
+ *
54
+ * This will add any ports that aren't currently listening,
55
+ * and remove any ports that are no longer needed.
56
+ *
57
+ * @param ports Array of ports that should be listening
58
+ * @returns Promise that resolves when all operations are complete
59
+ */
60
+ updatePorts(ports: number[]): Promise<void>;
61
+ /**
62
+ * Get all ports that are currently listening
63
+ *
64
+ * @returns Array of port numbers
65
+ */
66
+ getListeningPorts(): number[];
67
+ /**
68
+ * Mark the port manager as shutting down
69
+ */
70
+ setShuttingDown(isShuttingDown: boolean): void;
71
+ /**
72
+ * Close all listening servers
73
+ *
74
+ * @returns Promise that resolves when all servers are closed
75
+ */
76
+ closeAll(): Promise<void>;
77
+ /**
78
+ * Get all server instances (for testing or debugging)
79
+ */
80
+ getServers(): Map<number, plugins.net.Server>;
81
+ }