@push.rocks/smartproxy 15.0.2 → 16.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (160) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/certificate/index.d.ts +10 -4
  3. package/dist_ts/certificate/index.js +5 -7
  4. package/dist_ts/certificate/models/certificate-types.d.ts +35 -15
  5. package/dist_ts/certificate/providers/cert-provisioner.d.ts +41 -15
  6. package/dist_ts/certificate/providers/cert-provisioner.js +201 -41
  7. package/dist_ts/core/models/index.d.ts +2 -0
  8. package/dist_ts/core/models/index.js +3 -1
  9. package/dist_ts/core/models/route-context.d.ts +62 -0
  10. package/dist_ts/core/models/route-context.js +43 -0
  11. package/dist_ts/core/models/socket-augmentation.d.ts +12 -0
  12. package/dist_ts/core/models/socket-augmentation.js +18 -0
  13. package/dist_ts/core/utils/event-system.d.ts +200 -0
  14. package/dist_ts/core/utils/event-system.js +224 -0
  15. package/dist_ts/core/utils/index.d.ts +7 -0
  16. package/dist_ts/core/utils/index.js +8 -1
  17. package/dist_ts/core/utils/route-manager.d.ts +118 -0
  18. package/dist_ts/core/utils/route-manager.js +383 -0
  19. package/dist_ts/core/utils/route-utils.d.ts +94 -0
  20. package/dist_ts/core/utils/route-utils.js +264 -0
  21. package/dist_ts/core/utils/security-utils.d.ts +111 -0
  22. package/dist_ts/core/utils/security-utils.js +212 -0
  23. package/dist_ts/core/utils/shared-security-manager.d.ts +110 -0
  24. package/dist_ts/core/utils/shared-security-manager.js +252 -0
  25. package/dist_ts/core/utils/template-utils.d.ts +37 -0
  26. package/dist_ts/core/utils/template-utils.js +104 -0
  27. package/dist_ts/core/utils/websocket-utils.d.ts +23 -0
  28. package/dist_ts/core/utils/websocket-utils.js +86 -0
  29. package/dist_ts/forwarding/config/forwarding-types.d.ts +40 -76
  30. package/dist_ts/forwarding/config/forwarding-types.js +19 -18
  31. package/dist_ts/forwarding/config/index.d.ts +4 -2
  32. package/dist_ts/forwarding/config/index.js +5 -3
  33. package/dist_ts/forwarding/handlers/base-handler.js +3 -1
  34. package/dist_ts/forwarding/index.d.ts +5 -6
  35. package/dist_ts/forwarding/index.js +3 -3
  36. package/dist_ts/http/models/http-types.js +1 -1
  37. package/dist_ts/http/port80/acme-interfaces.d.ts +30 -0
  38. package/dist_ts/http/port80/acme-interfaces.js +46 -1
  39. package/dist_ts/http/port80/port80-handler.d.ts +17 -2
  40. package/dist_ts/http/port80/port80-handler.js +49 -11
  41. package/dist_ts/http/router/index.d.ts +5 -1
  42. package/dist_ts/http/router/index.js +4 -2
  43. package/dist_ts/http/router/route-router.d.ts +108 -0
  44. package/dist_ts/http/router/route-router.js +393 -0
  45. package/dist_ts/index.d.ts +8 -2
  46. package/dist_ts/index.js +10 -3
  47. package/dist_ts/proxies/index.d.ts +7 -2
  48. package/dist_ts/proxies/index.js +10 -4
  49. package/dist_ts/proxies/network-proxy/certificate-manager.d.ts +21 -0
  50. package/dist_ts/proxies/network-proxy/certificate-manager.js +92 -1
  51. package/dist_ts/proxies/network-proxy/context-creator.d.ts +34 -0
  52. package/dist_ts/proxies/network-proxy/context-creator.js +108 -0
  53. package/dist_ts/proxies/network-proxy/function-cache.d.ts +90 -0
  54. package/dist_ts/proxies/network-proxy/function-cache.js +198 -0
  55. package/dist_ts/proxies/network-proxy/http-request-handler.d.ts +40 -0
  56. package/dist_ts/proxies/network-proxy/http-request-handler.js +256 -0
  57. package/dist_ts/proxies/network-proxy/http2-request-handler.d.ts +24 -0
  58. package/dist_ts/proxies/network-proxy/http2-request-handler.js +201 -0
  59. package/dist_ts/proxies/network-proxy/models/types.d.ts +73 -1
  60. package/dist_ts/proxies/network-proxy/models/types.js +242 -1
  61. package/dist_ts/proxies/network-proxy/network-proxy.d.ts +23 -20
  62. package/dist_ts/proxies/network-proxy/network-proxy.js +147 -60
  63. package/dist_ts/proxies/network-proxy/request-handler.d.ts +38 -5
  64. package/dist_ts/proxies/network-proxy/request-handler.js +584 -198
  65. package/dist_ts/proxies/network-proxy/security-manager.d.ts +65 -0
  66. package/dist_ts/proxies/network-proxy/security-manager.js +255 -0
  67. package/dist_ts/proxies/network-proxy/websocket-handler.d.ts +13 -2
  68. package/dist_ts/proxies/network-proxy/websocket-handler.js +238 -20
  69. package/dist_ts/proxies/smart-proxy/index.d.ts +1 -1
  70. package/dist_ts/proxies/smart-proxy/index.js +3 -3
  71. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -66
  72. package/dist_ts/proxies/smart-proxy/models/interfaces.js +5 -4
  73. package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +173 -6
  74. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +20 -7
  75. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +49 -108
  76. package/dist_ts/proxies/smart-proxy/port-manager.d.ts +81 -0
  77. package/dist_ts/proxies/smart-proxy/port-manager.js +166 -0
  78. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +7 -5
  79. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +155 -160
  80. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +9 -0
  81. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +11 -0
  82. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +5 -125
  83. package/dist_ts/proxies/smart-proxy/route-helpers.js +8 -195
  84. package/dist_ts/proxies/smart-proxy/route-manager.d.ts +14 -11
  85. package/dist_ts/proxies/smart-proxy/route-manager.js +81 -124
  86. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +101 -12
  87. package/dist_ts/proxies/smart-proxy/smart-proxy.js +178 -306
  88. package/dist_ts/proxies/smart-proxy/timeout-manager.js +3 -3
  89. package/dist_ts/proxies/smart-proxy/utils/index.d.ts +12 -0
  90. package/dist_ts/proxies/smart-proxy/utils/index.js +19 -0
  91. package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +240 -0
  92. package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +451 -0
  93. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +51 -0
  94. package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +124 -0
  95. package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +131 -0
  96. package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +217 -0
  97. package/dist_ts/proxies/smart-proxy/utils/route-utils.d.ts +79 -0
  98. package/dist_ts/proxies/smart-proxy/utils/route-utils.js +266 -0
  99. package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +73 -0
  100. package/dist_ts/proxies/smart-proxy/utils/route-validators.js +264 -0
  101. package/package.json +1 -1
  102. package/readme.md +241 -125
  103. package/readme.plan.md +73 -286
  104. package/ts/00_commitinfo_data.ts +1 -1
  105. package/ts/certificate/index.ts +17 -9
  106. package/ts/certificate/models/certificate-types.ts +37 -16
  107. package/ts/certificate/providers/cert-provisioner.ts +247 -54
  108. package/ts/core/models/index.ts +2 -0
  109. package/ts/core/models/route-context.ts +113 -0
  110. package/ts/core/models/socket-augmentation.ts +33 -0
  111. package/ts/core/utils/event-system.ts +376 -0
  112. package/ts/core/utils/index.ts +7 -0
  113. package/ts/core/utils/route-manager.ts +489 -0
  114. package/ts/core/utils/route-utils.ts +312 -0
  115. package/ts/core/utils/security-utils.ts +309 -0
  116. package/ts/core/utils/shared-security-manager.ts +333 -0
  117. package/ts/core/utils/template-utils.ts +124 -0
  118. package/ts/core/utils/websocket-utils.ts +81 -0
  119. package/ts/forwarding/config/forwarding-types.ts +79 -107
  120. package/ts/forwarding/config/index.ts +4 -2
  121. package/ts/forwarding/handlers/base-handler.ts +4 -2
  122. package/ts/forwarding/index.ts +3 -2
  123. package/ts/http/models/http-types.ts +0 -1
  124. package/ts/http/port80/acme-interfaces.ts +84 -0
  125. package/ts/http/port80/port80-handler.ts +61 -15
  126. package/ts/http/router/index.ts +8 -1
  127. package/ts/http/router/route-router.ts +482 -0
  128. package/ts/index.ts +14 -2
  129. package/ts/proxies/index.ts +12 -3
  130. package/ts/proxies/network-proxy/certificate-manager.ts +114 -10
  131. package/ts/proxies/network-proxy/context-creator.ts +145 -0
  132. package/ts/proxies/network-proxy/function-cache.ts +259 -0
  133. package/ts/proxies/network-proxy/http-request-handler.ts +330 -0
  134. package/ts/proxies/network-proxy/http2-request-handler.ts +255 -0
  135. package/ts/proxies/network-proxy/models/types.ts +312 -1
  136. package/ts/proxies/network-proxy/network-proxy.ts +195 -86
  137. package/ts/proxies/network-proxy/request-handler.ts +698 -246
  138. package/ts/proxies/network-proxy/security-manager.ts +298 -0
  139. package/ts/proxies/network-proxy/websocket-handler.ts +276 -33
  140. package/ts/proxies/smart-proxy/index.ts +2 -12
  141. package/ts/proxies/smart-proxy/models/interfaces.ts +13 -67
  142. package/ts/proxies/smart-proxy/models/route-types.ts +223 -25
  143. package/ts/proxies/smart-proxy/network-proxy-bridge.ts +57 -123
  144. package/ts/proxies/smart-proxy/port-manager.ts +195 -0
  145. package/ts/proxies/smart-proxy/route-connection-handler.ts +191 -225
  146. package/ts/proxies/smart-proxy/route-manager.ts +101 -144
  147. package/ts/proxies/smart-proxy/smart-proxy.ts +206 -377
  148. package/ts/proxies/smart-proxy/timeout-manager.ts +2 -2
  149. package/ts/proxies/smart-proxy/utils/index.ts +40 -0
  150. package/ts/proxies/smart-proxy/utils/route-helpers.ts +621 -0
  151. package/ts/proxies/smart-proxy/utils/route-migration-utils.ts +165 -0
  152. package/ts/proxies/smart-proxy/utils/route-patterns.ts +309 -0
  153. package/ts/proxies/smart-proxy/utils/route-utils.ts +330 -0
  154. package/ts/proxies/smart-proxy/utils/route-validators.ts +288 -0
  155. package/ts/forwarding/config/domain-config.ts +0 -28
  156. package/ts/forwarding/config/domain-manager.ts +0 -283
  157. package/ts/proxies/smart-proxy/connection-handler.ts +0 -1240
  158. package/ts/proxies/smart-proxy/domain-config-manager.ts +0 -441
  159. package/ts/proxies/smart-proxy/port-range-manager.ts +0 -211
  160. package/ts/proxies/smart-proxy/route-helpers.ts +0 -344
@@ -4,21 +4,60 @@ import { Port80Handler } from '../../http/port80/port80-handler.js';
4
4
  /**
5
5
  * CertProvisioner manages certificate provisioning and renewal workflows,
6
6
  * unifying static certificates and HTTP-01 challenges via Port80Handler.
7
+ *
8
+ * This class directly works with route configurations instead of converting to domain configs.
7
9
  */
8
10
  export class CertProvisioner extends plugins.EventEmitter {
9
11
  /**
10
- * @param domainConfigs Array of domain configuration objects
12
+ * Extract routes that need certificates
13
+ * @param routes Route configurations
14
+ */
15
+ extractCertificateRoutesFromRoutes(routes) {
16
+ const certRoutes = [];
17
+ // Process all HTTPS routes that need certificates
18
+ for (const route of routes) {
19
+ // Only process routes with TLS termination that need certificates
20
+ if (route.action.type === 'forward' &&
21
+ route.action.tls &&
22
+ (route.action.tls.mode === 'terminate' || route.action.tls.mode === 'terminate-and-reencrypt') &&
23
+ route.match.domains) {
24
+ // Extract domains from the route
25
+ const domains = Array.isArray(route.match.domains)
26
+ ? route.match.domains
27
+ : [route.match.domains];
28
+ // For each domain in the route, create a certRoute entry
29
+ for (const domain of domains) {
30
+ // Skip wildcard domains that can't use ACME unless we have a certProvider
31
+ if (domain.includes('*') && (!this.certProvisionFunction || this.certProvisionFunction.length === 0)) {
32
+ console.warn(`Skipping wildcard domain that requires a certProvisionFunction: ${domain}`);
33
+ continue;
34
+ }
35
+ certRoutes.push({
36
+ domain,
37
+ route,
38
+ tlsMode: route.action.tls.mode
39
+ });
40
+ }
41
+ }
42
+ }
43
+ return certRoutes;
44
+ }
45
+ /**
46
+ * Constructor for CertProvisioner
47
+ *
48
+ * @param routeConfigs Array of route configurations
11
49
  * @param port80Handler HTTP-01 challenge handler instance
12
50
  * @param networkProxyBridge Bridge for applying external certificates
13
51
  * @param certProvider Optional callback returning a static cert or 'http01'
14
52
  * @param renewThresholdDays Days before expiry to trigger renewals
15
53
  * @param renewCheckIntervalHours Interval in hours to check for renewals
16
54
  * @param autoRenew Whether to automatically schedule renewals
17
- * @param forwardConfigs Domain forwarding configurations for ACME challenges
55
+ * @param routeForwards Route-specific forwarding configs for ACME challenges
18
56
  */
19
- constructor(domainConfigs, port80Handler, networkProxyBridge, certProvider, renewThresholdDays = 30, renewCheckIntervalHours = 24, autoRenew = true, forwardConfigs = []) {
57
+ constructor(routeConfigs, port80Handler, networkProxyBridge, certProvider, renewThresholdDays = 30, renewCheckIntervalHours = 24, autoRenew = true, routeForwards = []) {
20
58
  super();
21
- this.domainConfigs = domainConfigs;
59
+ this.certRoutes = [];
60
+ this.routeConfigs = routeConfigs;
22
61
  this.port80Handler = port80Handler;
23
62
  this.networkProxyBridge = networkProxyBridge;
24
63
  this.certProvisionFunction = certProvider;
@@ -26,7 +65,9 @@ export class CertProvisioner extends plugins.EventEmitter {
26
65
  this.renewCheckIntervalHours = renewCheckIntervalHours;
27
66
  this.autoRenew = autoRenew;
28
67
  this.provisionMap = new Map();
29
- this.forwardConfigs = forwardConfigs;
68
+ this.routeForwards = routeForwards;
69
+ // Extract certificate routes during instantiation
70
+ this.certRoutes = this.extractCertificateRoutesFromRoutes(routeConfigs);
30
71
  }
31
72
  /**
32
73
  * Start initial provisioning and schedule renewals.
@@ -34,10 +75,10 @@ export class CertProvisioner extends plugins.EventEmitter {
34
75
  async start() {
35
76
  // Subscribe to Port80Handler certificate events
36
77
  this.setupEventSubscriptions();
37
- // Apply external forwarding for ACME challenges
78
+ // Apply route forwarding for ACME challenges
38
79
  this.setupForwardingConfigs();
39
- // Initial provisioning for all domains
40
- await this.provisionAllDomains();
80
+ // Initial provisioning for all domains in routes
81
+ await this.provisionAllCertificates();
41
82
  // Schedule renewals if enabled
42
83
  if (this.autoRenew) {
43
84
  this.scheduleRenewals();
@@ -47,46 +88,74 @@ export class CertProvisioner extends plugins.EventEmitter {
47
88
  * Set up event subscriptions for certificate events
48
89
  */
49
90
  setupEventSubscriptions() {
50
- // We need to reimplement subscribeToPort80Handler here
51
91
  this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_ISSUED, (data) => {
52
- this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, { ...data, source: 'http01', isRenewal: false });
92
+ // Add route reference if we have it
93
+ const routeRef = this.findRouteForDomain(data.domain);
94
+ const enhancedData = {
95
+ ...data,
96
+ source: 'http01',
97
+ isRenewal: false,
98
+ routeReference: routeRef ? {
99
+ routeId: routeRef.route.name,
100
+ routeName: routeRef.route.name
101
+ } : undefined
102
+ };
103
+ this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, enhancedData);
53
104
  });
54
105
  this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_RENEWED, (data) => {
55
- this.emit(CertProvisionerEvents.CERTIFICATE_RENEWED, { ...data, source: 'http01', isRenewal: true });
106
+ // Add route reference if we have it
107
+ const routeRef = this.findRouteForDomain(data.domain);
108
+ const enhancedData = {
109
+ ...data,
110
+ source: 'http01',
111
+ isRenewal: true,
112
+ routeReference: routeRef ? {
113
+ routeId: routeRef.route.name,
114
+ routeName: routeRef.route.name
115
+ } : undefined
116
+ };
117
+ this.emit(CertProvisionerEvents.CERTIFICATE_RENEWED, enhancedData);
56
118
  });
57
119
  this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_FAILED, (error) => {
58
120
  this.emit(CertProvisionerEvents.CERTIFICATE_FAILED, error);
59
121
  });
60
122
  }
123
+ /**
124
+ * Find a route for a given domain
125
+ */
126
+ findRouteForDomain(domain) {
127
+ return this.certRoutes.find(certRoute => certRoute.domain === domain);
128
+ }
61
129
  /**
62
130
  * Set up forwarding configurations for the Port80Handler
63
131
  */
64
132
  setupForwardingConfigs() {
65
- for (const config of this.forwardConfigs) {
133
+ for (const config of this.routeForwards) {
66
134
  const domainOptions = {
67
135
  domainName: config.domain,
68
136
  sslRedirect: config.sslRedirect || false,
69
137
  acmeMaintenance: false,
70
- forward: config.forwardConfig,
71
- acmeForward: config.acmeForwardConfig
138
+ forward: config.target ? {
139
+ ip: config.target.host,
140
+ port: config.target.port
141
+ } : undefined
72
142
  };
73
143
  this.port80Handler.addDomain(domainOptions);
74
144
  }
75
145
  }
76
146
  /**
77
- * Provision certificates for all configured domains
147
+ * Provision certificates for all routes that need them
78
148
  */
79
- async provisionAllDomains() {
80
- const domains = this.domainConfigs.flatMap(cfg => cfg.domains);
81
- for (const domain of domains) {
82
- await this.provisionDomain(domain);
149
+ async provisionAllCertificates() {
150
+ for (const certRoute of this.certRoutes) {
151
+ await this.provisionCertificateForRoute(certRoute);
83
152
  }
84
153
  }
85
154
  /**
86
- * Provision a certificate for a single domain
87
- * @param domain Domain to provision
155
+ * Provision a certificate for a route
88
156
  */
89
- async provisionDomain(domain) {
157
+ async provisionCertificateForRoute(certRoute) {
158
+ const { domain, route } = certRoute;
90
159
  const isWildcard = domain.includes('*');
91
160
  let provision = 'http01';
92
161
  // Try to get a certificate from the provision function
@@ -95,7 +164,7 @@ export class CertProvisioner extends plugins.EventEmitter {
95
164
  provision = await this.certProvisionFunction(domain);
96
165
  }
97
166
  catch (err) {
98
- console.error(`certProvider error for ${domain}:`, err);
167
+ console.error(`certProvider error for ${domain} on route ${route.name || 'unnamed'}:`, err);
99
168
  }
100
169
  }
101
170
  else if (isWildcard) {
@@ -103,27 +172,34 @@ export class CertProvisioner extends plugins.EventEmitter {
103
172
  console.warn(`Skipping wildcard domain without certProvisionFunction: ${domain}`);
104
173
  return;
105
174
  }
175
+ // Store the route reference with the provision type
176
+ this.provisionMap.set(domain, {
177
+ type: provision === 'http01' || provision === 'dns01' ? provision : 'static',
178
+ routeRef: certRoute
179
+ });
106
180
  // Handle different provisioning methods
107
181
  if (provision === 'http01') {
108
182
  if (isWildcard) {
109
183
  console.warn(`Skipping HTTP-01 for wildcard domain: ${domain}`);
110
184
  return;
111
185
  }
112
- this.provisionMap.set(domain, 'http01');
113
186
  this.port80Handler.addDomain({
114
187
  domainName: domain,
115
188
  sslRedirect: true,
116
- acmeMaintenance: true
189
+ acmeMaintenance: true,
190
+ routeReference: {
191
+ routeId: route.name || domain,
192
+ routeName: route.name
193
+ }
117
194
  });
118
195
  }
119
196
  else if (provision === 'dns01') {
120
197
  // DNS-01 challenges would be handled by the certProvisionFunction
121
- this.provisionMap.set(domain, 'dns01');
122
198
  // DNS-01 handling would go here if implemented
199
+ console.log(`DNS-01 challenge type set for ${domain}`);
123
200
  }
124
201
  else {
125
202
  // Static certificate (e.g., DNS-01 provisioned or user-provided)
126
- this.provisionMap.set(domain, 'static');
127
203
  const certObj = provision;
128
204
  const certData = {
129
205
  domain: certObj.domainName,
@@ -131,7 +207,11 @@ export class CertProvisioner extends plugins.EventEmitter {
131
207
  privateKey: certObj.privateKey,
132
208
  expiryDate: new Date(certObj.validUntil),
133
209
  source: 'static',
134
- isRenewal: false
210
+ isRenewal: false,
211
+ routeReference: {
212
+ routeId: route.name || domain,
213
+ routeName: route.name
214
+ }
135
215
  };
136
216
  this.networkProxyBridge.applyExternalCertificate(certData);
137
217
  this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
@@ -155,12 +235,12 @@ export class CertProvisioner extends plugins.EventEmitter {
155
235
  * Perform renewals for all domains that need it
156
236
  */
157
237
  async performRenewals() {
158
- for (const [domain, type] of this.provisionMap.entries()) {
238
+ for (const [domain, info] of this.provisionMap.entries()) {
159
239
  // Skip wildcard domains for HTTP-01 challenges
160
- if (domain.includes('*') && type === 'http01')
240
+ if (domain.includes('*') && info.type === 'http01')
161
241
  continue;
162
242
  try {
163
- await this.renewDomain(domain, type);
243
+ await this.renewCertificateForDomain(domain, info.type, info.routeRef);
164
244
  }
165
245
  catch (err) {
166
246
  console.error(`Renewal error for ${domain}:`, err);
@@ -171,8 +251,9 @@ export class CertProvisioner extends plugins.EventEmitter {
171
251
  * Renew a certificate for a specific domain
172
252
  * @param domain Domain to renew
173
253
  * @param provisionType Type of provisioning for this domain
254
+ * @param certRoute The route reference for this domain
174
255
  */
175
- async renewDomain(domain, provisionType) {
256
+ async renewCertificateForDomain(domain, provisionType, certRoute) {
176
257
  if (provisionType === 'http01') {
177
258
  await this.port80Handler.renewCertificate(domain);
178
259
  }
@@ -180,13 +261,18 @@ export class CertProvisioner extends plugins.EventEmitter {
180
261
  const provision = await this.certProvisionFunction(domain);
181
262
  if (provision !== 'http01' && provision !== 'dns01') {
182
263
  const certObj = provision;
264
+ const routeRef = certRoute?.route;
183
265
  const certData = {
184
266
  domain: certObj.domainName,
185
267
  certificate: certObj.publicKey,
186
268
  privateKey: certObj.privateKey,
187
269
  expiryDate: new Date(certObj.validUntil),
188
270
  source: 'static',
189
- isRenewal: true
271
+ isRenewal: true,
272
+ routeReference: routeRef ? {
273
+ routeId: routeRef.name || domain,
274
+ routeName: routeRef.name
275
+ } : undefined
190
276
  };
191
277
  this.networkProxyBridge.applyExternalCertificate(certData);
192
278
  this.emit(CertProvisionerEvents.CERTIFICATE_RENEWED, certData);
@@ -203,10 +289,14 @@ export class CertProvisioner extends plugins.EventEmitter {
203
289
  }
204
290
  /**
205
291
  * Request a certificate on-demand for the given domain.
292
+ * This will look for a matching route configuration and provision accordingly.
293
+ *
206
294
  * @param domain Domain name to provision
207
295
  */
208
296
  async requestCertificate(domain) {
209
297
  const isWildcard = domain.includes('*');
298
+ // Find matching route
299
+ const certRoute = this.findRouteForDomain(domain);
210
300
  // Determine provisioning method
211
301
  let provision = 'http01';
212
302
  if (this.certProvisionFunction) {
@@ -224,7 +314,6 @@ export class CertProvisioner extends plugins.EventEmitter {
224
314
  }
225
315
  else if (provision === 'dns01') {
226
316
  // DNS-01 challenges would be handled by external mechanisms
227
- // This is a placeholder for future implementation
228
317
  console.log(`DNS-01 challenge requested for ${domain}`);
229
318
  }
230
319
  else {
@@ -236,7 +325,11 @@ export class CertProvisioner extends plugins.EventEmitter {
236
325
  privateKey: certObj.privateKey,
237
326
  expiryDate: new Date(certObj.validUntil),
238
327
  source: 'static',
239
- isRenewal: false
328
+ isRenewal: false,
329
+ routeReference: certRoute ? {
330
+ routeId: certRoute.route.name || domain,
331
+ routeName: certRoute.route.name
332
+ } : undefined
240
333
  };
241
334
  this.networkProxyBridge.applyExternalCertificate(certData);
242
335
  this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
@@ -244,19 +337,86 @@ export class CertProvisioner extends plugins.EventEmitter {
244
337
  }
245
338
  /**
246
339
  * Add a new domain for certificate provisioning
340
+ *
247
341
  * @param domain Domain to add
248
342
  * @param options Domain configuration options
249
343
  */
250
344
  async addDomain(domain, options) {
251
345
  const domainOptions = {
252
346
  domainName: domain,
253
- sslRedirect: options?.sslRedirect || true,
254
- acmeMaintenance: options?.acmeMaintenance || true
347
+ sslRedirect: options?.sslRedirect ?? true,
348
+ acmeMaintenance: options?.acmeMaintenance ?? true,
349
+ routeReference: {
350
+ routeId: options?.routeId,
351
+ routeName: options?.routeName
352
+ }
255
353
  };
256
354
  this.port80Handler.addDomain(domainOptions);
257
- await this.provisionDomain(domain);
355
+ // Find matching route or create a generic one
356
+ const existingRoute = this.findRouteForDomain(domain);
357
+ if (existingRoute) {
358
+ await this.provisionCertificateForRoute(existingRoute);
359
+ }
360
+ else {
361
+ // We don't have a route, just provision the domain
362
+ const isWildcard = domain.includes('*');
363
+ let provision = 'http01';
364
+ if (this.certProvisionFunction) {
365
+ provision = await this.certProvisionFunction(domain);
366
+ }
367
+ else if (isWildcard) {
368
+ throw new Error(`Cannot request certificate for wildcard domain without certProvisionFunction: ${domain}`);
369
+ }
370
+ this.provisionMap.set(domain, {
371
+ type: provision === 'http01' || provision === 'dns01' ? provision : 'static'
372
+ });
373
+ if (provision !== 'http01' && provision !== 'dns01') {
374
+ const certObj = provision;
375
+ const certData = {
376
+ domain: certObj.domainName,
377
+ certificate: certObj.publicKey,
378
+ privateKey: certObj.privateKey,
379
+ expiryDate: new Date(certObj.validUntil),
380
+ source: 'static',
381
+ isRenewal: false,
382
+ routeReference: {
383
+ routeId: options?.routeId,
384
+ routeName: options?.routeName
385
+ }
386
+ };
387
+ this.networkProxyBridge.applyExternalCertificate(certData);
388
+ this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
389
+ }
390
+ }
391
+ }
392
+ /**
393
+ * Update routes with new configurations
394
+ * This replaces all existing routes with new ones and re-provisions certificates as needed
395
+ *
396
+ * @param newRoutes New route configurations to use
397
+ */
398
+ async updateRoutes(newRoutes) {
399
+ // Store the new route configs
400
+ this.routeConfigs = newRoutes;
401
+ // Extract new certificate routes
402
+ const newCertRoutes = this.extractCertificateRoutesFromRoutes(newRoutes);
403
+ // Find domains that no longer need certificates
404
+ const oldDomains = new Set(this.certRoutes.map(r => r.domain));
405
+ const newDomains = new Set(newCertRoutes.map(r => r.domain));
406
+ // Domains to remove
407
+ const domainsToRemove = [...oldDomains].filter(d => !newDomains.has(d));
408
+ // Remove obsolete domains from provision map
409
+ for (const domain of domainsToRemove) {
410
+ this.provisionMap.delete(domain);
411
+ }
412
+ // Update the cert routes
413
+ this.certRoutes = newCertRoutes;
414
+ // Provision certificates for new routes
415
+ for (const certRoute of newCertRoutes) {
416
+ if (!oldDomains.has(certRoute.domain)) {
417
+ await this.provisionCertificateForRoute(certRoute);
418
+ }
419
+ }
258
420
  }
259
421
  }
260
- // For backward compatibility
261
- export { CertProvisioner as CertificateProvisioner };
262
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cert-provisioner.js","sourceRoot":"","sources":["../../../ts/certificate/providers/cert-provisioner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAG5C,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,iCAAiC,CAAC;AAC7F,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AAiBpE;;;GAGG;AACH,MAAM,OAAO,eAAgB,SAAQ,OAAO,CAAC,YAAY;IAavD;;;;;;;;;OASG;IACH,YACE,aAA8B,EAC9B,aAA4B,EAC5B,kBAAuC,EACvC,YAAgE,EAChE,qBAA6B,EAAE,EAC/B,0BAAkC,EAAE,EACpC,YAAqB,IAAI,EACzB,iBAAyC,EAAE;QAE3C,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,qBAAqB,GAAG,YAAY,CAAC;QAC1C,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,uBAAuB,GAAG,uBAAuB,CAAC;QACvD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,YAAY,GAAG,IAAI,GAAG,EAAE,CAAC;QAC9B,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,gDAAgD;QAChD,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,gDAAgD;QAChD,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAE9B,uCAAuC;QACvC,MAAM,IAAI,CAAC,mBAAmB,EAAE,CAAC;QAEjC,+BAA+B;QAC/B,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB;QAC7B,uDAAuD;QACvD,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACvF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,EAAE,GAAG,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,CAAC,CAAC;QACvG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACxF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,EAAE,GAAG,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACvG,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,KAAK,EAAE,EAAE;YACtE,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACzC,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM,CAAC,MAAM;gBACzB,WAAW,EAAE,MAAM,CAAC,WAAW,IAAI,KAAK;gBACxC,eAAe,EAAE,KAAK;gBACtB,OAAO,EAAE,MAAM,CAAC,aAAa;gBAC7B,WAAW,EAAE,MAAM,CAAC,iBAAiB;aACtC,CAAC;YACF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,mBAAmB;QAC/B,MAAM,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;QAE/D,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;YAC7B,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;QACrC,CAAC;IACH,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAAC,MAAc;QAC1C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,uDAAuD;QACvD,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,0BAA0B,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,iEAAiE;YACjE,OAAO,CAAC,IAAI,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YAClF,OAAO;QACT,CAAC;QAED,wCAAwC;QACxC,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;gBAChE,OAAO;YACT,CAAC;YAED,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YACxC,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;gBAC3B,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;aACtB,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,kEAAkE;YAClE,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YACvC,+CAA+C;QACjD,CAAC;aAAM,CAAC;YACN,iEAAiE;YACjE,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YACxC,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;aACjB,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB;QACtB,IAAI,CAAC,YAAY,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC;QAEzD,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC;YAC5C,IAAI,EAAE,qBAAqB;YAC3B,YAAY,EAAE,KAAK,IAAI,EAAE,CAAC,MAAM,IAAI,CAAC,eAAe,EAAE;SACvD,CAAC,CAAC;QAEH,MAAM,KAAK,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3C,MAAM,QAAQ,GAAG,SAAS,KAAK,QAAQ,CAAC;QAExC,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAC1D,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;IAC5B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,EAAE,CAAC;YACzD,+CAA+C;YAC/C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,KAAK,QAAQ;gBAAE,SAAS;YAExD,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;YACvC,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,qBAAqB,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,aAA4C;QACpF,IAAI,aAAa,KAAK,QAAQ,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,CAAC,aAAa,KAAK,QAAQ,IAAI,aAAa,KAAK,OAAO,CAAC,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACnG,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YAE3D,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,IAAI;iBAChB,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;YACjE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;QAC3B,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QAExC,gCAAgC;QAChC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,0DAA0D;YAC1D,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;QAC7G,CAAC;QAED,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YACvF,CAAC;YACD,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,4DAA4D;YAC5D,kDAAkD;YAClD,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC1D,CAAC;aAAM,CAAC;YACN,mEAAmE;YACnE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;aACjB,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,SAAS,CAAC,MAAc,EAAE,OAGtC;QACC,MAAM,aAAa,GAAmB;YACpC,UAAU,EAAE,MAAM;YAClB,WAAW,EAAE,OAAO,EAAE,WAAW,IAAI,IAAI;YACzC,eAAe,EAAE,OAAO,EAAE,eAAe,IAAI,IAAI;SAClD,CAAC;QAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAC5C,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;IACrC,CAAC;CACF;AAED,6BAA6B;AAC7B,OAAO,EAAE,eAAe,IAAI,sBAAsB,EAAE,CAAA"}
422
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cert-provisioner.js","sourceRoot":"","sources":["../../../ts/certificate/providers/cert-provisioner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAG5C,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,iCAAiC,CAAC;AAC7F,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AAqBpE;;;;;GAKG;AACH,MAAM,OAAO,eAAgB,SAAQ,OAAO,CAAC,YAAY;IAcvD;;;OAGG;IACK,kCAAkC,CAAC,MAAsB;QAC/D,MAAM,UAAU,GAAiB,EAAE,CAAC;QAEpC,kDAAkD;QAClD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,kEAAkE;YAClE,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG;gBAChB,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC;gBAC9F,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;gBAExB,iCAAiC;gBACjC,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;oBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBAE1B,yDAAyD;gBACzD,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;oBAC7B,0EAA0E;oBAC1E,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,qBAAqB,CAAC,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;wBACrG,OAAO,CAAC,IAAI,CAAC,mEAAmE,MAAM,EAAE,CAAC,CAAC;wBAC1F,SAAS;oBACX,CAAC;oBAED,UAAU,CAAC,IAAI,CAAC;wBACd,MAAM;wBACN,KAAK;wBACL,OAAO,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI;qBAC/B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,UAAU,CAAC;IACpB,CAAC;IAED;;;;;;;;;;;OAWG;IACH,YACE,YAA4B,EAC5B,aAA4B,EAC5B,kBAAuC,EACvC,YAAgE,EAChE,qBAA6B,EAAE,EAC/B,0BAAkC,EAAE,EACpC,YAAqB,IAAI,EACzB,gBAAuC,EAAE;QAEzC,KAAK,EAAE,CAAC;QA1EF,eAAU,GAAiB,EAAE,CAAC;QA2EpC,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,qBAAqB,GAAG,YAAY,CAAC;QAC1C,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,uBAAuB,GAAG,uBAAuB,CAAC;QACvD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,YAAY,GAAG,IAAI,GAAG,EAAE,CAAC;QAC9B,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QAEnC,kDAAkD;QAClD,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC,kCAAkC,CAAC,YAAY,CAAC,CAAC;IAC1E,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,gDAAgD;QAChD,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,6CAA6C;QAC7C,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAE9B,iDAAiD;QACjD,MAAM,IAAI,CAAC,wBAAwB,EAAE,CAAC;QAEtC,+BAA+B;QAC/B,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB;QAC7B,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACvF,oCAAoC;YACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,YAAY,GAAqB;gBACrC,GAAG,IAAI;gBACP,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;oBACzB,OAAO,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;oBAC5B,SAAS,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;iBAC/B,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,YAAY,CAAC,CAAC;QACpE,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACxF,oCAAoC;YACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,YAAY,GAAqB;gBACrC,GAAG,IAAI;gBACP,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,IAAI;gBACf,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;oBACzB,OAAO,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;oBAC5B,SAAS,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;iBAC/B,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,YAAY,CAAC,CAAC;QACrE,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,KAAK,EAAE,EAAE;YACtE,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,MAAc;QACvC,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;IACxE,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACxC,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM,CAAC,MAAM;gBACzB,WAAW,EAAE,MAAM,CAAC,WAAW,IAAI,KAAK;gBACxC,eAAe,EAAE,KAAK;gBACtB,OAAO,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;oBACvB,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI;oBACtB,IAAI,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI;iBACzB,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YACF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB;QACpC,KAAK,MAAM,SAAS,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;YACxC,MAAM,IAAI,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,SAAqB;QAC9D,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,GAAG,SAAS,CAAC;QACpC,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,uDAAuD;QACvD,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,0BAA0B,MAAM,aAAa,KAAK,CAAC,IAAI,IAAI,SAAS,GAAG,EAAE,GAAG,CAAC,CAAC;YAC9F,CAAC;QACH,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,iEAAiE;YACjE,OAAO,CAAC,IAAI,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YAClF,OAAO;QACT,CAAC;QAED,oDAAoD;QACpD,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE;YAC5B,IAAI,EAAE,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;YAC5E,QAAQ,EAAE,SAAS;SACpB,CAAC,CAAC;QAEH,wCAAwC;QACxC,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;gBAChE,OAAO;YACT,CAAC;YAED,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;gBAC3B,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;gBACrB,cAAc,EAAE;oBACd,OAAO,EAAE,KAAK,CAAC,IAAI,IAAI,MAAM;oBAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;iBACtB;aACF,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,kEAAkE;YAClE,+CAA+C;YAC/C,OAAO,CAAC,GAAG,CAAC,iCAAiC,MAAM,EAAE,CAAC,CAAC;QACzD,CAAC;aAAM,CAAC;YACN,iEAAiE;YACjE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE;oBACd,OAAO,EAAE,KAAK,CAAC,IAAI,IAAI,MAAM;oBAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;iBACtB;aACF,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB;QACtB,IAAI,CAAC,YAAY,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC;QAEzD,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC;YAC5C,IAAI,EAAE,qBAAqB;YAC3B,YAAY,EAAE,KAAK,IAAI,EAAE,CAAC,MAAM,IAAI,CAAC,eAAe,EAAE;SACvD,CAAC,CAAC;QAEH,MAAM,KAAK,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3C,MAAM,QAAQ,GAAG,SAAS,KAAK,QAAQ,CAAC;QAExC,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAC1D,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;IAC5B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,EAAE,CAAC;YACzD,+CAA+C;YAC/C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,IAAI,KAAK,QAAQ;gBAAE,SAAS;YAE7D,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;YACzE,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,qBAAqB,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,yBAAyB,CACrC,MAAc,EACd,aAA4C,EAC5C,SAAsB;QAEtB,IAAI,aAAa,KAAK,QAAQ,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,CAAC,aAAa,KAAK,QAAQ,IAAI,aAAa,KAAK,OAAO,CAAC,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACnG,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YAE3D,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAG,SAAS,EAAE,KAAK,CAAC;gBAElC,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,IAAI;oBACf,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;wBACzB,OAAO,EAAE,QAAQ,CAAC,IAAI,IAAI,MAAM;wBAChC,SAAS,EAAE,QAAQ,CAAC,IAAI;qBACzB,CAAC,CAAC,CAAC,SAAS;iBACd,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;YACjE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;QAC3B,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,sBAAsB;QACtB,MAAM,SAAS,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAElD,gCAAgC;QAChC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,0DAA0D;YAC1D,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;QAC7G,CAAC;QAED,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YACvF,CAAC;YACD,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,4DAA4D;YAC5D,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC1D,CAAC;aAAM,CAAC;YACN,mEAAmE;YACnE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE,SAAS,CAAC,CAAC,CAAC;oBAC1B,OAAO,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI,IAAI,MAAM;oBACvC,SAAS,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI;iBAChC,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,SAAS,CAAC,MAAc,EAAE,OAKtC;QACC,MAAM,aAAa,GAAmB;YACpC,UAAU,EAAE,MAAM;YAClB,WAAW,EAAE,OAAO,EAAE,WAAW,IAAI,IAAI;YACzC,eAAe,EAAE,OAAO,EAAE,eAAe,IAAI,IAAI;YACjD,cAAc,EAAE;gBACd,OAAO,EAAE,OAAO,EAAE,OAAO;gBACzB,SAAS,EAAE,OAAO,EAAE,SAAS;aAC9B;SACF,CAAC;QAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAE5C,8CAA8C;QAC9C,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACtD,IAAI,aAAa,EAAE,CAAC;YAClB,MAAM,IAAI,CAAC,4BAA4B,CAAC,aAAa,CAAC,CAAC;QACzD,CAAC;aAAM,CAAC;YACN,mDAAmD;YACnD,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;YACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;YAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;gBAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;iBAAM,IAAI,UAAU,EAAE,CAAC;gBACtB,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;YAC7G,CAAC;YAED,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE;gBAC5B,IAAI,EAAE,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;aAC7E,CAAC,CAAC;YAEH,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,KAAK;oBAChB,cAAc,EAAE;wBACd,OAAO,EAAE,OAAO,EAAE,OAAO;wBACzB,SAAS,EAAE,OAAO,EAAE,SAAS;qBAC9B;iBACF,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,YAAY,CAAC,SAAyB;QACjD,8BAA8B;QAC9B,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;QAE9B,iCAAiC;QACjC,MAAM,aAAa,GAAG,IAAI,CAAC,kCAAkC,CAAC,SAAS,CAAC,CAAC;QAEzE,gDAAgD;QAChD,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAC/D,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAE7D,oBAAoB;QACpB,MAAM,eAAe,GAAG,CAAC,GAAG,UAAU,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAExE,6CAA6C;QAC7C,KAAK,MAAM,MAAM,IAAI,eAAe,EAAE,CAAC;YACrC,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC;QAED,yBAAyB;QACzB,IAAI,CAAC,UAAU,GAAG,aAAa,CAAC;QAEhC,wCAAwC;QACxC,KAAK,MAAM,SAAS,IAAI,aAAa,EAAE,CAAC;YACtC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC;gBACtC,MAAM,IAAI,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
@@ -2,3 +2,5 @@
2
2
  * Core data models and interfaces
3
3
  */
4
4
  export * from './common-types.js';
5
+ export * from './socket-augmentation.js';
6
+ export * from './route-context.js';
@@ -2,4 +2,6 @@
2
2
  * Core data models and interfaces
3
3
  */
4
4
  export * from './common-types.js';
5
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9jb3JlL21vZGVscy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQTs7R0FFRztBQUVILGNBQWMsbUJBQW1CLENBQUMifQ==
5
+ export * from './socket-augmentation.js';
6
+ export * from './route-context.js';
7
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9jb3JlL21vZGVscy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQTs7R0FFRztBQUVILGNBQWMsbUJBQW1CLENBQUM7QUFDbEMsY0FBYywwQkFBMEIsQ0FBQztBQUN6QyxjQUFjLG9CQUFvQixDQUFDIn0=
@@ -0,0 +1,62 @@
1
+ import * as plugins from '../../plugins.js';
2
+ /**
3
+ * Shared Route Context Interface
4
+ *
5
+ * This interface defines the route context object that is used by both
6
+ * SmartProxy and NetworkProxy, ensuring consistent context throughout the system.
7
+ */
8
+ /**
9
+ * Route context for route matching and function-based target resolution
10
+ */
11
+ export interface IRouteContext {
12
+ port: number;
13
+ domain?: string;
14
+ clientIp: string;
15
+ serverIp: string;
16
+ path?: string;
17
+ query?: string;
18
+ headers?: Record<string, string>;
19
+ isTls: boolean;
20
+ tlsVersion?: string;
21
+ routeName?: string;
22
+ routeId?: string;
23
+ targetHost?: string | string[];
24
+ targetPort?: number;
25
+ timestamp: number;
26
+ connectionId: string;
27
+ }
28
+ /**
29
+ * Extended context interface with HTTP-specific objects
30
+ * Used only in NetworkProxy for HTTP request handling
31
+ */
32
+ export interface IHttpRouteContext extends IRouteContext {
33
+ req?: plugins.http.IncomingMessage;
34
+ res?: plugins.http.ServerResponse;
35
+ method?: string;
36
+ }
37
+ /**
38
+ * Extended context interface with HTTP/2-specific objects
39
+ * Used only in NetworkProxy for HTTP/2 request handling
40
+ */
41
+ export interface IHttp2RouteContext extends IHttpRouteContext {
42
+ stream?: plugins.http2.ServerHttp2Stream;
43
+ headers?: Record<string, string>;
44
+ }
45
+ /**
46
+ * Create a basic route context from connection information
47
+ */
48
+ export declare function createBaseRouteContext(options: {
49
+ port: number;
50
+ clientIp: string;
51
+ serverIp: string;
52
+ domain?: string;
53
+ isTls: boolean;
54
+ tlsVersion?: string;
55
+ connectionId: string;
56
+ }): IRouteContext;
57
+ /**
58
+ * Convert IHttpRouteContext to IRouteContext
59
+ * This is used to ensure type compatibility when passing HTTP-specific context
60
+ * to methods that require the base IRouteContext type
61
+ */
62
+ export declare function toBaseContext(httpContext: IHttpRouteContext): IRouteContext;
@@ -0,0 +1,43 @@
1
+ import * as plugins from '../../plugins.js';
2
+ /**
3
+ * Create a basic route context from connection information
4
+ */
5
+ export function createBaseRouteContext(options) {
6
+ return {
7
+ ...options,
8
+ timestamp: Date.now(),
9
+ };
10
+ }
11
+ /**
12
+ * Convert IHttpRouteContext to IRouteContext
13
+ * This is used to ensure type compatibility when passing HTTP-specific context
14
+ * to methods that require the base IRouteContext type
15
+ */
16
+ export function toBaseContext(httpContext) {
17
+ // Create a new object with only the properties from IRouteContext
18
+ const baseContext = {
19
+ port: httpContext.port,
20
+ domain: httpContext.domain,
21
+ clientIp: httpContext.clientIp,
22
+ serverIp: httpContext.serverIp,
23
+ path: httpContext.path,
24
+ query: httpContext.query,
25
+ headers: httpContext.headers,
26
+ isTls: httpContext.isTls,
27
+ tlsVersion: httpContext.tlsVersion,
28
+ routeName: httpContext.routeName,
29
+ routeId: httpContext.routeId,
30
+ timestamp: httpContext.timestamp,
31
+ connectionId: httpContext.connectionId
32
+ };
33
+ // Only copy targetHost if it's a string
34
+ if (httpContext.targetHost) {
35
+ baseContext.targetHost = httpContext.targetHost;
36
+ }
37
+ // Copy targetPort if it exists
38
+ if (httpContext.targetPort) {
39
+ baseContext.targetPort = httpContext.targetPort;
40
+ }
41
+ return baseContext;
42
+ }
43
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,12 @@
1
+ import * as plugins from '../../plugins.js';
2
+ declare module 'net' {
3
+ interface Socket {
4
+ encrypted?: boolean;
5
+ authorizationError?: Error;
6
+ getTLSVersion?(): string;
7
+ getPeerCertificate?(detailed?: boolean): any;
8
+ getSession?(): Buffer;
9
+ }
10
+ }
11
+ export declare function isTLSSocket(socket: plugins.net.Socket): boolean;
12
+ export declare function getTLSVersion(socket: plugins.net.Socket): string | null;
@@ -0,0 +1,18 @@
1
+ import * as plugins from '../../plugins.js';
2
+ // Export a utility function to check if a socket is a TLS socket
3
+ export function isTLSSocket(socket) {
4
+ return 'encrypted' in socket && !!socket.encrypted;
5
+ }
6
+ // Export a utility function to safely get the TLS version
7
+ export function getTLSVersion(socket) {
8
+ if (socket.getTLSVersion) {
9
+ try {
10
+ return socket.getTLSVersion();
11
+ }
12
+ catch (e) {
13
+ return null;
14
+ }
15
+ }
16
+ return null;
17
+ }
18
+ //# sourceMappingURL=data:application/json;base64,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