@push.rocks/smartproxy 16.0.2 → 16.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/core/models/index.d.ts +2 -0
- package/dist_ts/core/models/index.js +3 -1
- package/dist_ts/core/models/route-context.d.ts +62 -0
- package/dist_ts/core/models/route-context.js +43 -0
- package/dist_ts/core/models/socket-augmentation.d.ts +12 -0
- package/dist_ts/core/models/socket-augmentation.js +18 -0
- package/dist_ts/core/utils/event-system.d.ts +200 -0
- package/dist_ts/core/utils/event-system.js +224 -0
- package/dist_ts/core/utils/index.d.ts +7 -0
- package/dist_ts/core/utils/index.js +8 -1
- package/dist_ts/core/utils/route-manager.d.ts +118 -0
- package/dist_ts/core/utils/route-manager.js +383 -0
- package/dist_ts/core/utils/route-utils.d.ts +94 -0
- package/dist_ts/core/utils/route-utils.js +264 -0
- package/dist_ts/core/utils/security-utils.d.ts +111 -0
- package/dist_ts/core/utils/security-utils.js +212 -0
- package/dist_ts/core/utils/shared-security-manager.d.ts +110 -0
- package/dist_ts/core/utils/shared-security-manager.js +252 -0
- package/dist_ts/core/utils/template-utils.d.ts +37 -0
- package/dist_ts/core/utils/template-utils.js +104 -0
- package/dist_ts/core/utils/websocket-utils.d.ts +23 -0
- package/dist_ts/core/utils/websocket-utils.js +86 -0
- package/dist_ts/http/router/index.d.ts +5 -1
- package/dist_ts/http/router/index.js +4 -2
- package/dist_ts/http/router/route-router.d.ts +108 -0
- package/dist_ts/http/router/route-router.js +393 -0
- package/dist_ts/index.d.ts +8 -2
- package/dist_ts/index.js +10 -3
- package/dist_ts/proxies/index.d.ts +7 -2
- package/dist_ts/proxies/index.js +10 -4
- package/dist_ts/proxies/network-proxy/certificate-manager.d.ts +21 -0
- package/dist_ts/proxies/network-proxy/certificate-manager.js +92 -1
- package/dist_ts/proxies/network-proxy/context-creator.d.ts +34 -0
- package/dist_ts/proxies/network-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/network-proxy/function-cache.d.ts +90 -0
- package/dist_ts/proxies/network-proxy/function-cache.js +198 -0
- package/dist_ts/proxies/network-proxy/http-request-handler.d.ts +40 -0
- package/dist_ts/proxies/network-proxy/http-request-handler.js +256 -0
- package/dist_ts/proxies/network-proxy/http2-request-handler.d.ts +24 -0
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/network-proxy/models/types.d.ts +73 -1
- package/dist_ts/proxies/network-proxy/models/types.js +242 -1
- package/dist_ts/proxies/network-proxy/network-proxy.d.ts +23 -20
- package/dist_ts/proxies/network-proxy/network-proxy.js +147 -60
- package/dist_ts/proxies/network-proxy/request-handler.d.ts +38 -5
- package/dist_ts/proxies/network-proxy/request-handler.js +584 -198
- package/dist_ts/proxies/network-proxy/security-manager.d.ts +65 -0
- package/dist_ts/proxies/network-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/network-proxy/websocket-handler.d.ts +13 -2
- package/dist_ts/proxies/network-proxy/websocket-handler.js +238 -20
- package/dist_ts/proxies/smart-proxy/index.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/index.js +3 -3
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +3 -5
- package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +56 -3
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +4 -57
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +19 -228
- package/dist_ts/proxies/smart-proxy/port-manager.d.ts +81 -0
- package/dist_ts/proxies/smart-proxy/port-manager.js +166 -0
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +5 -0
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +131 -15
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +3 -1
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +5 -3
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +5 -178
- package/dist_ts/proxies/smart-proxy/route-helpers.js +8 -296
- package/dist_ts/proxies/smart-proxy/route-manager.d.ts +11 -2
- package/dist_ts/proxies/smart-proxy/route-manager.js +79 -10
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +29 -2
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +48 -43
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +67 -1
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +120 -1
- package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/utils/route-validators.js +27 -5
- package/package.json +1 -1
- package/readme.md +102 -14
- package/readme.plan.md +103 -168
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/core/models/index.ts +2 -0
- package/ts/core/models/route-context.ts +113 -0
- package/ts/core/models/socket-augmentation.ts +33 -0
- package/ts/core/utils/event-system.ts +376 -0
- package/ts/core/utils/index.ts +7 -0
- package/ts/core/utils/route-manager.ts +489 -0
- package/ts/core/utils/route-utils.ts +312 -0
- package/ts/core/utils/security-utils.ts +309 -0
- package/ts/core/utils/shared-security-manager.ts +333 -0
- package/ts/core/utils/template-utils.ts +124 -0
- package/ts/core/utils/websocket-utils.ts +81 -0
- package/ts/http/router/index.ts +8 -1
- package/ts/http/router/route-router.ts +482 -0
- package/ts/index.ts +14 -2
- package/ts/proxies/index.ts +12 -3
- package/ts/proxies/network-proxy/certificate-manager.ts +114 -10
- package/ts/proxies/network-proxy/context-creator.ts +145 -0
- package/ts/proxies/network-proxy/function-cache.ts +259 -0
- package/ts/proxies/network-proxy/http-request-handler.ts +330 -0
- package/ts/proxies/network-proxy/http2-request-handler.ts +255 -0
- package/ts/proxies/network-proxy/models/types.ts +312 -1
- package/ts/proxies/network-proxy/network-proxy.ts +195 -86
- package/ts/proxies/network-proxy/request-handler.ts +698 -246
- package/ts/proxies/network-proxy/security-manager.ts +298 -0
- package/ts/proxies/network-proxy/websocket-handler.ts +276 -33
- package/ts/proxies/smart-proxy/index.ts +2 -12
- package/ts/proxies/smart-proxy/models/interfaces.ts +7 -4
- package/ts/proxies/smart-proxy/models/route-types.ts +78 -10
- package/ts/proxies/smart-proxy/network-proxy-bridge.ts +20 -257
- package/ts/proxies/smart-proxy/port-manager.ts +195 -0
- package/ts/proxies/smart-proxy/route-connection-handler.ts +156 -21
- package/ts/proxies/smart-proxy/route-manager.ts +98 -14
- package/ts/proxies/smart-proxy/smart-proxy.ts +56 -55
- package/ts/proxies/smart-proxy/utils/route-helpers.ts +167 -1
- package/ts/proxies/smart-proxy/utils/route-validators.ts +24 -5
- package/ts/proxies/smart-proxy/domain-config-manager.ts.bak +0 -441
- package/ts/proxies/smart-proxy/route-helpers/index.ts +0 -9
- package/ts/proxies/smart-proxy/route-helpers.ts +0 -498
|
@@ -0,0 +1,65 @@
|
|
|
1
|
+
import type { ILogger } from './models/types.js';
|
|
2
|
+
import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
|
|
3
|
+
import type { IRouteContext } from '../../core/models/route-context.js';
|
|
4
|
+
/**
|
|
5
|
+
* Manages security features for the NetworkProxy
|
|
6
|
+
* Implements Phase 5.4: Security features like IP filtering and rate limiting
|
|
7
|
+
*/
|
|
8
|
+
export declare class SecurityManager {
|
|
9
|
+
private logger;
|
|
10
|
+
private routes;
|
|
11
|
+
private ipFilterCache;
|
|
12
|
+
private rateLimits;
|
|
13
|
+
constructor(logger: ILogger, routes?: IRouteConfig[]);
|
|
14
|
+
/**
|
|
15
|
+
* Update the routes configuration
|
|
16
|
+
*/
|
|
17
|
+
setRoutes(routes: IRouteConfig[]): void;
|
|
18
|
+
/**
|
|
19
|
+
* Check if a client is allowed to access a specific route
|
|
20
|
+
*
|
|
21
|
+
* @param route The route to check access for
|
|
22
|
+
* @param context The route context with client information
|
|
23
|
+
* @returns True if access is allowed, false otherwise
|
|
24
|
+
*/
|
|
25
|
+
isAllowed(route: IRouteConfig, context: IRouteContext): boolean;
|
|
26
|
+
/**
|
|
27
|
+
* Check if an IP is allowed based on route security settings
|
|
28
|
+
*/
|
|
29
|
+
private isIpAllowed;
|
|
30
|
+
/**
|
|
31
|
+
* Check if IP matches any pattern in the list
|
|
32
|
+
*/
|
|
33
|
+
private ipMatchesPattern;
|
|
34
|
+
/**
|
|
35
|
+
* Check if IP matches CIDR notation
|
|
36
|
+
* Very basic implementation - for production use, consider a dedicated IP library
|
|
37
|
+
*/
|
|
38
|
+
private ipMatchesCidr;
|
|
39
|
+
/**
|
|
40
|
+
* Check if request is within rate limit
|
|
41
|
+
*/
|
|
42
|
+
private isWithinRateLimit;
|
|
43
|
+
/**
|
|
44
|
+
* Clean up expired rate limits
|
|
45
|
+
* Should be called periodically to prevent memory leaks
|
|
46
|
+
*/
|
|
47
|
+
cleanupExpiredRateLimits(): void;
|
|
48
|
+
/**
|
|
49
|
+
* Check basic auth credentials
|
|
50
|
+
*
|
|
51
|
+
* @param route The route to check auth for
|
|
52
|
+
* @param username The provided username
|
|
53
|
+
* @param password The provided password
|
|
54
|
+
* @returns True if credentials are valid, false otherwise
|
|
55
|
+
*/
|
|
56
|
+
checkBasicAuth(route: IRouteConfig, username: string, password: string): boolean;
|
|
57
|
+
/**
|
|
58
|
+
* Verify a JWT token
|
|
59
|
+
*
|
|
60
|
+
* @param route The route to verify the token for
|
|
61
|
+
* @param token The JWT token to verify
|
|
62
|
+
* @returns True if the token is valid, false otherwise
|
|
63
|
+
*/
|
|
64
|
+
verifyJwtToken(route: IRouteConfig, token: string): boolean;
|
|
65
|
+
}
|
|
@@ -0,0 +1,255 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
/**
|
|
3
|
+
* Manages security features for the NetworkProxy
|
|
4
|
+
* Implements Phase 5.4: Security features like IP filtering and rate limiting
|
|
5
|
+
*/
|
|
6
|
+
export class SecurityManager {
|
|
7
|
+
constructor(logger, routes = []) {
|
|
8
|
+
this.logger = logger;
|
|
9
|
+
this.routes = routes;
|
|
10
|
+
// Cache IP filtering results to avoid constant regex matching
|
|
11
|
+
this.ipFilterCache = new Map();
|
|
12
|
+
// Store rate limits per route and key
|
|
13
|
+
this.rateLimits = new Map();
|
|
14
|
+
}
|
|
15
|
+
/**
|
|
16
|
+
* Update the routes configuration
|
|
17
|
+
*/
|
|
18
|
+
setRoutes(routes) {
|
|
19
|
+
this.routes = routes;
|
|
20
|
+
// Reset caches when routes change
|
|
21
|
+
this.ipFilterCache.clear();
|
|
22
|
+
}
|
|
23
|
+
/**
|
|
24
|
+
* Check if a client is allowed to access a specific route
|
|
25
|
+
*
|
|
26
|
+
* @param route The route to check access for
|
|
27
|
+
* @param context The route context with client information
|
|
28
|
+
* @returns True if access is allowed, false otherwise
|
|
29
|
+
*/
|
|
30
|
+
isAllowed(route, context) {
|
|
31
|
+
if (!route.security) {
|
|
32
|
+
return true; // No security restrictions
|
|
33
|
+
}
|
|
34
|
+
// --- IP filtering ---
|
|
35
|
+
if (!this.isIpAllowed(route, context.clientIp)) {
|
|
36
|
+
this.logger.debug(`IP ${context.clientIp} is blocked for route ${route.name || route.id || 'unnamed'}`);
|
|
37
|
+
return false;
|
|
38
|
+
}
|
|
39
|
+
// --- Rate limiting ---
|
|
40
|
+
if (route.security.rateLimit?.enabled && !this.isWithinRateLimit(route, context)) {
|
|
41
|
+
this.logger.debug(`Rate limit exceeded for route ${route.name || route.id || 'unnamed'}`);
|
|
42
|
+
return false;
|
|
43
|
+
}
|
|
44
|
+
// --- Basic Auth (handled at HTTP level) ---
|
|
45
|
+
// Basic auth is not checked here as it requires HTTP headers
|
|
46
|
+
// and is handled in the RequestHandler
|
|
47
|
+
return true;
|
|
48
|
+
}
|
|
49
|
+
/**
|
|
50
|
+
* Check if an IP is allowed based on route security settings
|
|
51
|
+
*/
|
|
52
|
+
isIpAllowed(route, clientIp) {
|
|
53
|
+
if (!route.security) {
|
|
54
|
+
return true; // No security restrictions
|
|
55
|
+
}
|
|
56
|
+
const routeId = route.id || route.name || 'unnamed';
|
|
57
|
+
// Check cache first
|
|
58
|
+
if (!this.ipFilterCache.has(routeId)) {
|
|
59
|
+
this.ipFilterCache.set(routeId, new Map());
|
|
60
|
+
}
|
|
61
|
+
const routeCache = this.ipFilterCache.get(routeId);
|
|
62
|
+
if (routeCache.has(clientIp)) {
|
|
63
|
+
return routeCache.get(clientIp);
|
|
64
|
+
}
|
|
65
|
+
let allowed = true;
|
|
66
|
+
// Check block list first (deny has priority over allow)
|
|
67
|
+
if (route.security.ipBlockList && route.security.ipBlockList.length > 0) {
|
|
68
|
+
if (this.ipMatchesPattern(clientIp, route.security.ipBlockList)) {
|
|
69
|
+
allowed = false;
|
|
70
|
+
}
|
|
71
|
+
}
|
|
72
|
+
// Then check allow list (overrides block list if specified)
|
|
73
|
+
if (route.security.ipAllowList && route.security.ipAllowList.length > 0) {
|
|
74
|
+
// If allow list is specified, IP must match an entry to be allowed
|
|
75
|
+
allowed = this.ipMatchesPattern(clientIp, route.security.ipAllowList);
|
|
76
|
+
}
|
|
77
|
+
// Cache the result
|
|
78
|
+
routeCache.set(clientIp, allowed);
|
|
79
|
+
return allowed;
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
* Check if IP matches any pattern in the list
|
|
83
|
+
*/
|
|
84
|
+
ipMatchesPattern(ip, patterns) {
|
|
85
|
+
for (const pattern of patterns) {
|
|
86
|
+
// CIDR notation
|
|
87
|
+
if (pattern.includes('/')) {
|
|
88
|
+
if (this.ipMatchesCidr(ip, pattern)) {
|
|
89
|
+
return true;
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
// Wildcard notation
|
|
93
|
+
else if (pattern.includes('*')) {
|
|
94
|
+
const regex = new RegExp('^' + pattern.replace(/\./g, '\\.').replace(/\*/g, '.*') + '$');
|
|
95
|
+
if (regex.test(ip)) {
|
|
96
|
+
return true;
|
|
97
|
+
}
|
|
98
|
+
}
|
|
99
|
+
// Exact match
|
|
100
|
+
else if (pattern === ip) {
|
|
101
|
+
return true;
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
return false;
|
|
105
|
+
}
|
|
106
|
+
/**
|
|
107
|
+
* Check if IP matches CIDR notation
|
|
108
|
+
* Very basic implementation - for production use, consider a dedicated IP library
|
|
109
|
+
*/
|
|
110
|
+
ipMatchesCidr(ip, cidr) {
|
|
111
|
+
try {
|
|
112
|
+
const [subnet, bits] = cidr.split('/');
|
|
113
|
+
const mask = parseInt(bits, 10);
|
|
114
|
+
// Convert IP to numeric format
|
|
115
|
+
const ipParts = ip.split('.').map(part => parseInt(part, 10));
|
|
116
|
+
const subnetParts = subnet.split('.').map(part => parseInt(part, 10));
|
|
117
|
+
// Calculate the numeric IP and subnet
|
|
118
|
+
const ipNum = (ipParts[0] << 24) | (ipParts[1] << 16) | (ipParts[2] << 8) | ipParts[3];
|
|
119
|
+
const subnetNum = (subnetParts[0] << 24) | (subnetParts[1] << 16) | (subnetParts[2] << 8) | subnetParts[3];
|
|
120
|
+
// Calculate the mask
|
|
121
|
+
const maskNum = ~((1 << (32 - mask)) - 1);
|
|
122
|
+
// Check if IP is in subnet
|
|
123
|
+
return (ipNum & maskNum) === (subnetNum & maskNum);
|
|
124
|
+
}
|
|
125
|
+
catch (e) {
|
|
126
|
+
this.logger.error(`Invalid CIDR notation: ${cidr}`);
|
|
127
|
+
return false;
|
|
128
|
+
}
|
|
129
|
+
}
|
|
130
|
+
/**
|
|
131
|
+
* Check if request is within rate limit
|
|
132
|
+
*/
|
|
133
|
+
isWithinRateLimit(route, context) {
|
|
134
|
+
if (!route.security?.rateLimit?.enabled) {
|
|
135
|
+
return true;
|
|
136
|
+
}
|
|
137
|
+
const rateLimit = route.security.rateLimit;
|
|
138
|
+
const routeId = route.id || route.name || 'unnamed';
|
|
139
|
+
// Determine rate limit key (by IP, path, or header)
|
|
140
|
+
let key = context.clientIp; // Default to IP
|
|
141
|
+
if (rateLimit.keyBy === 'path' && context.path) {
|
|
142
|
+
key = `${context.clientIp}:${context.path}`;
|
|
143
|
+
}
|
|
144
|
+
else if (rateLimit.keyBy === 'header' && rateLimit.headerName && context.headers) {
|
|
145
|
+
const headerValue = context.headers[rateLimit.headerName.toLowerCase()];
|
|
146
|
+
if (headerValue) {
|
|
147
|
+
key = `${context.clientIp}:${headerValue}`;
|
|
148
|
+
}
|
|
149
|
+
}
|
|
150
|
+
// Get or create rate limit tracking for this route
|
|
151
|
+
if (!this.rateLimits.has(routeId)) {
|
|
152
|
+
this.rateLimits.set(routeId, new Map());
|
|
153
|
+
}
|
|
154
|
+
const routeLimits = this.rateLimits.get(routeId);
|
|
155
|
+
const now = Date.now();
|
|
156
|
+
// Get or create rate limit tracking for this key
|
|
157
|
+
let limit = routeLimits.get(key);
|
|
158
|
+
if (!limit || limit.expiry < now) {
|
|
159
|
+
// Create new rate limit or reset expired one
|
|
160
|
+
limit = {
|
|
161
|
+
count: 1,
|
|
162
|
+
expiry: now + (rateLimit.window * 1000)
|
|
163
|
+
};
|
|
164
|
+
routeLimits.set(key, limit);
|
|
165
|
+
return true;
|
|
166
|
+
}
|
|
167
|
+
// Increment the counter
|
|
168
|
+
limit.count++;
|
|
169
|
+
// Check if rate limit is exceeded
|
|
170
|
+
return limit.count <= rateLimit.maxRequests;
|
|
171
|
+
}
|
|
172
|
+
/**
|
|
173
|
+
* Clean up expired rate limits
|
|
174
|
+
* Should be called periodically to prevent memory leaks
|
|
175
|
+
*/
|
|
176
|
+
cleanupExpiredRateLimits() {
|
|
177
|
+
const now = Date.now();
|
|
178
|
+
for (const [routeId, routeLimits] of this.rateLimits.entries()) {
|
|
179
|
+
let removed = 0;
|
|
180
|
+
for (const [key, limit] of routeLimits.entries()) {
|
|
181
|
+
if (limit.expiry < now) {
|
|
182
|
+
routeLimits.delete(key);
|
|
183
|
+
removed++;
|
|
184
|
+
}
|
|
185
|
+
}
|
|
186
|
+
if (removed > 0) {
|
|
187
|
+
this.logger.debug(`Cleaned up ${removed} expired rate limits for route ${routeId}`);
|
|
188
|
+
}
|
|
189
|
+
}
|
|
190
|
+
}
|
|
191
|
+
/**
|
|
192
|
+
* Check basic auth credentials
|
|
193
|
+
*
|
|
194
|
+
* @param route The route to check auth for
|
|
195
|
+
* @param username The provided username
|
|
196
|
+
* @param password The provided password
|
|
197
|
+
* @returns True if credentials are valid, false otherwise
|
|
198
|
+
*/
|
|
199
|
+
checkBasicAuth(route, username, password) {
|
|
200
|
+
if (!route.security?.basicAuth?.enabled) {
|
|
201
|
+
return true;
|
|
202
|
+
}
|
|
203
|
+
const basicAuth = route.security.basicAuth;
|
|
204
|
+
// Check credentials against configured users
|
|
205
|
+
for (const user of basicAuth.users) {
|
|
206
|
+
if (user.username === username && user.password === password) {
|
|
207
|
+
return true;
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
return false;
|
|
211
|
+
}
|
|
212
|
+
/**
|
|
213
|
+
* Verify a JWT token
|
|
214
|
+
*
|
|
215
|
+
* @param route The route to verify the token for
|
|
216
|
+
* @param token The JWT token to verify
|
|
217
|
+
* @returns True if the token is valid, false otherwise
|
|
218
|
+
*/
|
|
219
|
+
verifyJwtToken(route, token) {
|
|
220
|
+
if (!route.security?.jwtAuth?.enabled) {
|
|
221
|
+
return true;
|
|
222
|
+
}
|
|
223
|
+
try {
|
|
224
|
+
// This is a simplified version - in production you'd use a proper JWT library
|
|
225
|
+
const jwtAuth = route.security.jwtAuth;
|
|
226
|
+
// Verify structure
|
|
227
|
+
const parts = token.split('.');
|
|
228
|
+
if (parts.length !== 3) {
|
|
229
|
+
return false;
|
|
230
|
+
}
|
|
231
|
+
// Decode payload
|
|
232
|
+
const payload = JSON.parse(Buffer.from(parts[1], 'base64').toString());
|
|
233
|
+
// Check expiration
|
|
234
|
+
if (payload.exp && payload.exp < Math.floor(Date.now() / 1000)) {
|
|
235
|
+
return false;
|
|
236
|
+
}
|
|
237
|
+
// Check issuer
|
|
238
|
+
if (jwtAuth.issuer && payload.iss !== jwtAuth.issuer) {
|
|
239
|
+
return false;
|
|
240
|
+
}
|
|
241
|
+
// Check audience
|
|
242
|
+
if (jwtAuth.audience && payload.aud !== jwtAuth.audience) {
|
|
243
|
+
return false;
|
|
244
|
+
}
|
|
245
|
+
// In a real implementation, you'd also verify the signature
|
|
246
|
+
// using the secret and algorithm specified in jwtAuth
|
|
247
|
+
return true;
|
|
248
|
+
}
|
|
249
|
+
catch (err) {
|
|
250
|
+
this.logger.error(`Error verifying JWT: ${err}`);
|
|
251
|
+
return false;
|
|
252
|
+
}
|
|
253
|
+
}
|
|
254
|
+
}
|
|
255
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"security-manager.js","sourceRoot":"","sources":["../../../ts/proxies/network-proxy/security-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAK5C;;;GAGG;AACH,MAAM,OAAO,eAAe;IAO1B,YAAoB,MAAe,EAAU,SAAyB,EAAE;QAApD,WAAM,GAAN,MAAM,CAAS;QAAU,WAAM,GAAN,MAAM,CAAqB;QANxE,8DAA8D;QACtD,kBAAa,GAAsC,IAAI,GAAG,EAAE,CAAC;QAErE,sCAAsC;QAC9B,eAAU,GAAgE,IAAI,GAAG,EAAE,CAAC;IAEjB,CAAC;IAE5E;;OAEG;IACI,SAAS,CAAC,MAAsB;QACrC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,kCAAkC;QAClC,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,CAAC;IAC7B,CAAC;IAED;;;;;;OAMG;IACI,SAAS,CAAC,KAAmB,EAAE,OAAsB;QAC1D,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,uBAAuB;QACvB,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC/C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,OAAO,CAAC,QAAQ,yBAAyB,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,IAAI,SAAS,EAAE,CAAC,CAAC;YACxG,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,IAAI,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,OAAO,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,OAAO,CAAC,EAAE,CAAC;YACjF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,iCAAiC,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,OAAO,KAAK,CAAC;QACf,CAAC;QAED,6CAA6C;QAC7C,6DAA6D;QAC7D,uCAAuC;QAEvC,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,KAAmB,EAAE,QAAgB;QACvD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,MAAM,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAEpD,oBAAoB;QACpB,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC7C,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QACpD,IAAI,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC7B,OAAO,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAE,CAAC;QACnC,CAAC;QAED,IAAI,OAAO,GAAG,IAAI,CAAC;QAEnB,wDAAwD;QACxD,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,IAAI,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;gBAChE,OAAO,GAAG,KAAK,CAAC;YAClB,CAAC;QACH,CAAC;QAED,4DAA4D;QAC5D,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,mEAAmE;YACnE,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QACxE,CAAC;QAED,mBAAmB;QACnB,UAAU,CAAC,GAAG,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,EAAU,EAAE,QAAkB;QACrD,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,gBAAgB;YAChB,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC1B,IAAI,IAAI,CAAC,aAAa,CAAC,EAAE,EAAE,OAAO,CAAC,EAAE,CAAC;oBACpC,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YACD,oBAAoB;iBACf,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC/B,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,GAAG,GAAG,OAAO,CAAC,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC;gBACzF,IAAI,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;oBACnB,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YACD,cAAc;iBACT,IAAI,OAAO,KAAK,EAAE,EAAE,CAAC;gBACxB,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;OAGG;IACK,aAAa,CAAC,EAAU,EAAE,IAAY;QAC5C,IAAI,CAAC;YACH,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,IAAI,GAAG,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;YAEhC,+BAA+B;YAC/B,MAAM,OAAO,GAAG,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;YAC9D,MAAM,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;YAEtE,sCAAsC;YACtC,MAAM,KAAK,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;YACvF,MAAM,SAAS,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;YAE3G,qBAAqB;YACrB,MAAM,OAAO,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,GAAG,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YAE1C,2BAA2B;YAC3B,OAAO,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,SAAS,GAAG,OAAO,CAAC,CAAC;QACrD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,IAAI,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,KAAmB,EAAE,OAAsB;QACnE,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAC3C,MAAM,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAEpD,oDAAoD;QACpD,IAAI,GAAG,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC,gBAAgB;QAE5C,IAAI,SAAS,CAAC,KAAK,KAAK,MAAM,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;YAC/C,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;QAC9C,CAAC;aAAM,IAAI,SAAS,CAAC,KAAK,KAAK,QAAQ,IAAI,SAAS,CAAC,UAAU,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACnF,MAAM,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,CAAC;YACxE,IAAI,WAAW,EAAE,CAAC;gBAChB,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,WAAW,EAAE,CAAC;YAC7C,CAAC;QACH,CAAC;QAED,mDAAmD;QACnD,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YAClC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC1C,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QAClD,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,iDAAiD;QACjD,IAAI,KAAK,GAAG,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACjC,IAAI,CAAC,KAAK,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;YACjC,6CAA6C;YAC7C,KAAK,GAAG;gBACN,KAAK,EAAE,CAAC;gBACR,MAAM,EAAE,GAAG,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,IAAI,CAAC;aACxC,CAAC;YACF,WAAW,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YAC5B,OAAO,IAAI,CAAC;QACd,CAAC;QAED,wBAAwB;QACxB,KAAK,CAAC,KAAK,EAAE,CAAC;QAEd,kCAAkC;QAClC,OAAO,KAAK,CAAC,KAAK,IAAI,SAAS,CAAC,WAAW,CAAC;IAC9C,CAAC;IAED;;;OAGG;IACI,wBAAwB;QAC7B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,KAAK,MAAM,CAAC,OAAO,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;YAC/D,IAAI,OAAO,GAAG,CAAC,CAAC;YAChB,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,WAAW,CAAC,OAAO,EAAE,EAAE,CAAC;gBACjD,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;oBACvB,WAAW,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;oBACxB,OAAO,EAAE,CAAC;gBACZ,CAAC;YACH,CAAC;YACD,IAAI,OAAO,GAAG,CAAC,EAAE,CAAC;gBAChB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,cAAc,OAAO,kCAAkC,OAAO,EAAE,CAAC,CAAC;YACtF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACI,cAAc,CAAC,KAAmB,EAAE,QAAgB,EAAE,QAAgB;QAC3E,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAE3C,6CAA6C;QAC7C,KAAK,MAAM,IAAI,IAAI,SAAS,CAAC,KAAK,EAAE,CAAC;YACnC,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;gBAC7D,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;OAMG;IACI,cAAc,CAAC,KAAmB,EAAE,KAAa;QACtD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,OAAO,EAAE,OAAO,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,IAAI,CAAC;YACH,8EAA8E;YAC9E,MAAM,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC;YAEvC,mBAAmB;YACnB,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvB,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC;YAEvE,mBAAmB;YACnB,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,EAAE,CAAC;gBAC/D,OAAO,KAAK,CAAC;YACf,CAAC;YAED,eAAe;YACf,IAAI,OAAO,CAAC,MAAM,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,MAAM,EAAE,CAAC;gBACrD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,IAAI,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,QAAQ,EAAE,CAAC;gBACzD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,4DAA4D;YAC5D,sDAAsD;YAEtD,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,wBAAwB,GAAG,EAAE,CAAC,CAAC;YACjD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
|
|
@@ -1,18 +1,29 @@
|
|
|
1
1
|
import * as plugins from '../../plugins.js';
|
|
2
|
+
import '../../core/models/socket-augmentation.js';
|
|
2
3
|
import { type INetworkProxyOptions } from './models/types.js';
|
|
3
4
|
import { ConnectionPool } from './connection-pool.js';
|
|
4
5
|
import { ProxyRouter } from '../../http/router/index.js';
|
|
6
|
+
import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
|
|
5
7
|
/**
|
|
6
8
|
* Handles WebSocket connections and proxying
|
|
7
9
|
*/
|
|
8
10
|
export declare class WebSocketHandler {
|
|
9
11
|
private options;
|
|
10
12
|
private connectionPool;
|
|
11
|
-
private
|
|
13
|
+
private legacyRouter;
|
|
14
|
+
private routes;
|
|
12
15
|
private heartbeatInterval;
|
|
13
16
|
private wsServer;
|
|
14
17
|
private logger;
|
|
15
|
-
|
|
18
|
+
private contextCreator;
|
|
19
|
+
private routeRouter;
|
|
20
|
+
private securityManager;
|
|
21
|
+
constructor(options: INetworkProxyOptions, connectionPool: ConnectionPool, legacyRouter: ProxyRouter, // Legacy router for backward compatibility
|
|
22
|
+
routes?: IRouteConfig[]);
|
|
23
|
+
/**
|
|
24
|
+
* Set the route configurations
|
|
25
|
+
*/
|
|
26
|
+
setRoutes(routes: IRouteConfig[]): void;
|
|
16
27
|
/**
|
|
17
28
|
* Initialize WebSocket server on an existing HTTPS server
|
|
18
29
|
*/
|