@push.rocks/smartproxy 16.0.2 → 16.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (115) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/core/models/index.d.ts +2 -0
  3. package/dist_ts/core/models/index.js +3 -1
  4. package/dist_ts/core/models/route-context.d.ts +62 -0
  5. package/dist_ts/core/models/route-context.js +43 -0
  6. package/dist_ts/core/models/socket-augmentation.d.ts +12 -0
  7. package/dist_ts/core/models/socket-augmentation.js +18 -0
  8. package/dist_ts/core/utils/event-system.d.ts +200 -0
  9. package/dist_ts/core/utils/event-system.js +224 -0
  10. package/dist_ts/core/utils/index.d.ts +7 -0
  11. package/dist_ts/core/utils/index.js +8 -1
  12. package/dist_ts/core/utils/route-manager.d.ts +118 -0
  13. package/dist_ts/core/utils/route-manager.js +383 -0
  14. package/dist_ts/core/utils/route-utils.d.ts +94 -0
  15. package/dist_ts/core/utils/route-utils.js +264 -0
  16. package/dist_ts/core/utils/security-utils.d.ts +111 -0
  17. package/dist_ts/core/utils/security-utils.js +212 -0
  18. package/dist_ts/core/utils/shared-security-manager.d.ts +110 -0
  19. package/dist_ts/core/utils/shared-security-manager.js +252 -0
  20. package/dist_ts/core/utils/template-utils.d.ts +37 -0
  21. package/dist_ts/core/utils/template-utils.js +104 -0
  22. package/dist_ts/core/utils/websocket-utils.d.ts +23 -0
  23. package/dist_ts/core/utils/websocket-utils.js +86 -0
  24. package/dist_ts/http/router/index.d.ts +5 -1
  25. package/dist_ts/http/router/index.js +4 -2
  26. package/dist_ts/http/router/route-router.d.ts +108 -0
  27. package/dist_ts/http/router/route-router.js +393 -0
  28. package/dist_ts/index.d.ts +8 -2
  29. package/dist_ts/index.js +10 -3
  30. package/dist_ts/proxies/index.d.ts +7 -2
  31. package/dist_ts/proxies/index.js +10 -4
  32. package/dist_ts/proxies/network-proxy/certificate-manager.d.ts +21 -0
  33. package/dist_ts/proxies/network-proxy/certificate-manager.js +92 -1
  34. package/dist_ts/proxies/network-proxy/context-creator.d.ts +34 -0
  35. package/dist_ts/proxies/network-proxy/context-creator.js +108 -0
  36. package/dist_ts/proxies/network-proxy/function-cache.d.ts +90 -0
  37. package/dist_ts/proxies/network-proxy/function-cache.js +198 -0
  38. package/dist_ts/proxies/network-proxy/http-request-handler.d.ts +40 -0
  39. package/dist_ts/proxies/network-proxy/http-request-handler.js +256 -0
  40. package/dist_ts/proxies/network-proxy/http2-request-handler.d.ts +24 -0
  41. package/dist_ts/proxies/network-proxy/http2-request-handler.js +201 -0
  42. package/dist_ts/proxies/network-proxy/models/types.d.ts +73 -1
  43. package/dist_ts/proxies/network-proxy/models/types.js +242 -1
  44. package/dist_ts/proxies/network-proxy/network-proxy.d.ts +23 -20
  45. package/dist_ts/proxies/network-proxy/network-proxy.js +147 -60
  46. package/dist_ts/proxies/network-proxy/request-handler.d.ts +38 -5
  47. package/dist_ts/proxies/network-proxy/request-handler.js +584 -198
  48. package/dist_ts/proxies/network-proxy/security-manager.d.ts +65 -0
  49. package/dist_ts/proxies/network-proxy/security-manager.js +255 -0
  50. package/dist_ts/proxies/network-proxy/websocket-handler.d.ts +13 -2
  51. package/dist_ts/proxies/network-proxy/websocket-handler.js +238 -20
  52. package/dist_ts/proxies/smart-proxy/index.d.ts +1 -1
  53. package/dist_ts/proxies/smart-proxy/index.js +3 -3
  54. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +3 -5
  55. package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +56 -3
  56. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +4 -57
  57. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +19 -228
  58. package/dist_ts/proxies/smart-proxy/port-manager.d.ts +81 -0
  59. package/dist_ts/proxies/smart-proxy/port-manager.js +166 -0
  60. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +5 -0
  61. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +131 -15
  62. package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +3 -1
  63. package/dist_ts/proxies/smart-proxy/route-helpers/index.js +5 -3
  64. package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +5 -178
  65. package/dist_ts/proxies/smart-proxy/route-helpers.js +8 -296
  66. package/dist_ts/proxies/smart-proxy/route-manager.d.ts +11 -2
  67. package/dist_ts/proxies/smart-proxy/route-manager.js +79 -10
  68. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +29 -2
  69. package/dist_ts/proxies/smart-proxy/smart-proxy.js +48 -43
  70. package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +67 -1
  71. package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +120 -1
  72. package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +3 -3
  73. package/dist_ts/proxies/smart-proxy/utils/route-validators.js +27 -5
  74. package/package.json +1 -1
  75. package/readme.md +102 -14
  76. package/readme.plan.md +103 -168
  77. package/ts/00_commitinfo_data.ts +1 -1
  78. package/ts/core/models/index.ts +2 -0
  79. package/ts/core/models/route-context.ts +113 -0
  80. package/ts/core/models/socket-augmentation.ts +33 -0
  81. package/ts/core/utils/event-system.ts +376 -0
  82. package/ts/core/utils/index.ts +7 -0
  83. package/ts/core/utils/route-manager.ts +489 -0
  84. package/ts/core/utils/route-utils.ts +312 -0
  85. package/ts/core/utils/security-utils.ts +309 -0
  86. package/ts/core/utils/shared-security-manager.ts +333 -0
  87. package/ts/core/utils/template-utils.ts +124 -0
  88. package/ts/core/utils/websocket-utils.ts +81 -0
  89. package/ts/http/router/index.ts +8 -1
  90. package/ts/http/router/route-router.ts +482 -0
  91. package/ts/index.ts +14 -2
  92. package/ts/proxies/index.ts +12 -3
  93. package/ts/proxies/network-proxy/certificate-manager.ts +114 -10
  94. package/ts/proxies/network-proxy/context-creator.ts +145 -0
  95. package/ts/proxies/network-proxy/function-cache.ts +259 -0
  96. package/ts/proxies/network-proxy/http-request-handler.ts +330 -0
  97. package/ts/proxies/network-proxy/http2-request-handler.ts +255 -0
  98. package/ts/proxies/network-proxy/models/types.ts +312 -1
  99. package/ts/proxies/network-proxy/network-proxy.ts +195 -86
  100. package/ts/proxies/network-proxy/request-handler.ts +698 -246
  101. package/ts/proxies/network-proxy/security-manager.ts +298 -0
  102. package/ts/proxies/network-proxy/websocket-handler.ts +276 -33
  103. package/ts/proxies/smart-proxy/index.ts +2 -12
  104. package/ts/proxies/smart-proxy/models/interfaces.ts +7 -4
  105. package/ts/proxies/smart-proxy/models/route-types.ts +78 -10
  106. package/ts/proxies/smart-proxy/network-proxy-bridge.ts +20 -257
  107. package/ts/proxies/smart-proxy/port-manager.ts +195 -0
  108. package/ts/proxies/smart-proxy/route-connection-handler.ts +156 -21
  109. package/ts/proxies/smart-proxy/route-manager.ts +98 -14
  110. package/ts/proxies/smart-proxy/smart-proxy.ts +56 -55
  111. package/ts/proxies/smart-proxy/utils/route-helpers.ts +167 -1
  112. package/ts/proxies/smart-proxy/utils/route-validators.ts +24 -5
  113. package/ts/proxies/smart-proxy/domain-config-manager.ts.bak +0 -441
  114. package/ts/proxies/smart-proxy/route-helpers/index.ts +0 -9
  115. package/ts/proxies/smart-proxy/route-helpers.ts +0 -498
@@ -0,0 +1,65 @@
1
+ import type { ILogger } from './models/types.js';
2
+ import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
3
+ import type { IRouteContext } from '../../core/models/route-context.js';
4
+ /**
5
+ * Manages security features for the NetworkProxy
6
+ * Implements Phase 5.4: Security features like IP filtering and rate limiting
7
+ */
8
+ export declare class SecurityManager {
9
+ private logger;
10
+ private routes;
11
+ private ipFilterCache;
12
+ private rateLimits;
13
+ constructor(logger: ILogger, routes?: IRouteConfig[]);
14
+ /**
15
+ * Update the routes configuration
16
+ */
17
+ setRoutes(routes: IRouteConfig[]): void;
18
+ /**
19
+ * Check if a client is allowed to access a specific route
20
+ *
21
+ * @param route The route to check access for
22
+ * @param context The route context with client information
23
+ * @returns True if access is allowed, false otherwise
24
+ */
25
+ isAllowed(route: IRouteConfig, context: IRouteContext): boolean;
26
+ /**
27
+ * Check if an IP is allowed based on route security settings
28
+ */
29
+ private isIpAllowed;
30
+ /**
31
+ * Check if IP matches any pattern in the list
32
+ */
33
+ private ipMatchesPattern;
34
+ /**
35
+ * Check if IP matches CIDR notation
36
+ * Very basic implementation - for production use, consider a dedicated IP library
37
+ */
38
+ private ipMatchesCidr;
39
+ /**
40
+ * Check if request is within rate limit
41
+ */
42
+ private isWithinRateLimit;
43
+ /**
44
+ * Clean up expired rate limits
45
+ * Should be called periodically to prevent memory leaks
46
+ */
47
+ cleanupExpiredRateLimits(): void;
48
+ /**
49
+ * Check basic auth credentials
50
+ *
51
+ * @param route The route to check auth for
52
+ * @param username The provided username
53
+ * @param password The provided password
54
+ * @returns True if credentials are valid, false otherwise
55
+ */
56
+ checkBasicAuth(route: IRouteConfig, username: string, password: string): boolean;
57
+ /**
58
+ * Verify a JWT token
59
+ *
60
+ * @param route The route to verify the token for
61
+ * @param token The JWT token to verify
62
+ * @returns True if the token is valid, false otherwise
63
+ */
64
+ verifyJwtToken(route: IRouteConfig, token: string): boolean;
65
+ }
@@ -0,0 +1,255 @@
1
+ import * as plugins from '../../plugins.js';
2
+ /**
3
+ * Manages security features for the NetworkProxy
4
+ * Implements Phase 5.4: Security features like IP filtering and rate limiting
5
+ */
6
+ export class SecurityManager {
7
+ constructor(logger, routes = []) {
8
+ this.logger = logger;
9
+ this.routes = routes;
10
+ // Cache IP filtering results to avoid constant regex matching
11
+ this.ipFilterCache = new Map();
12
+ // Store rate limits per route and key
13
+ this.rateLimits = new Map();
14
+ }
15
+ /**
16
+ * Update the routes configuration
17
+ */
18
+ setRoutes(routes) {
19
+ this.routes = routes;
20
+ // Reset caches when routes change
21
+ this.ipFilterCache.clear();
22
+ }
23
+ /**
24
+ * Check if a client is allowed to access a specific route
25
+ *
26
+ * @param route The route to check access for
27
+ * @param context The route context with client information
28
+ * @returns True if access is allowed, false otherwise
29
+ */
30
+ isAllowed(route, context) {
31
+ if (!route.security) {
32
+ return true; // No security restrictions
33
+ }
34
+ // --- IP filtering ---
35
+ if (!this.isIpAllowed(route, context.clientIp)) {
36
+ this.logger.debug(`IP ${context.clientIp} is blocked for route ${route.name || route.id || 'unnamed'}`);
37
+ return false;
38
+ }
39
+ // --- Rate limiting ---
40
+ if (route.security.rateLimit?.enabled && !this.isWithinRateLimit(route, context)) {
41
+ this.logger.debug(`Rate limit exceeded for route ${route.name || route.id || 'unnamed'}`);
42
+ return false;
43
+ }
44
+ // --- Basic Auth (handled at HTTP level) ---
45
+ // Basic auth is not checked here as it requires HTTP headers
46
+ // and is handled in the RequestHandler
47
+ return true;
48
+ }
49
+ /**
50
+ * Check if an IP is allowed based on route security settings
51
+ */
52
+ isIpAllowed(route, clientIp) {
53
+ if (!route.security) {
54
+ return true; // No security restrictions
55
+ }
56
+ const routeId = route.id || route.name || 'unnamed';
57
+ // Check cache first
58
+ if (!this.ipFilterCache.has(routeId)) {
59
+ this.ipFilterCache.set(routeId, new Map());
60
+ }
61
+ const routeCache = this.ipFilterCache.get(routeId);
62
+ if (routeCache.has(clientIp)) {
63
+ return routeCache.get(clientIp);
64
+ }
65
+ let allowed = true;
66
+ // Check block list first (deny has priority over allow)
67
+ if (route.security.ipBlockList && route.security.ipBlockList.length > 0) {
68
+ if (this.ipMatchesPattern(clientIp, route.security.ipBlockList)) {
69
+ allowed = false;
70
+ }
71
+ }
72
+ // Then check allow list (overrides block list if specified)
73
+ if (route.security.ipAllowList && route.security.ipAllowList.length > 0) {
74
+ // If allow list is specified, IP must match an entry to be allowed
75
+ allowed = this.ipMatchesPattern(clientIp, route.security.ipAllowList);
76
+ }
77
+ // Cache the result
78
+ routeCache.set(clientIp, allowed);
79
+ return allowed;
80
+ }
81
+ /**
82
+ * Check if IP matches any pattern in the list
83
+ */
84
+ ipMatchesPattern(ip, patterns) {
85
+ for (const pattern of patterns) {
86
+ // CIDR notation
87
+ if (pattern.includes('/')) {
88
+ if (this.ipMatchesCidr(ip, pattern)) {
89
+ return true;
90
+ }
91
+ }
92
+ // Wildcard notation
93
+ else if (pattern.includes('*')) {
94
+ const regex = new RegExp('^' + pattern.replace(/\./g, '\\.').replace(/\*/g, '.*') + '$');
95
+ if (regex.test(ip)) {
96
+ return true;
97
+ }
98
+ }
99
+ // Exact match
100
+ else if (pattern === ip) {
101
+ return true;
102
+ }
103
+ }
104
+ return false;
105
+ }
106
+ /**
107
+ * Check if IP matches CIDR notation
108
+ * Very basic implementation - for production use, consider a dedicated IP library
109
+ */
110
+ ipMatchesCidr(ip, cidr) {
111
+ try {
112
+ const [subnet, bits] = cidr.split('/');
113
+ const mask = parseInt(bits, 10);
114
+ // Convert IP to numeric format
115
+ const ipParts = ip.split('.').map(part => parseInt(part, 10));
116
+ const subnetParts = subnet.split('.').map(part => parseInt(part, 10));
117
+ // Calculate the numeric IP and subnet
118
+ const ipNum = (ipParts[0] << 24) | (ipParts[1] << 16) | (ipParts[2] << 8) | ipParts[3];
119
+ const subnetNum = (subnetParts[0] << 24) | (subnetParts[1] << 16) | (subnetParts[2] << 8) | subnetParts[3];
120
+ // Calculate the mask
121
+ const maskNum = ~((1 << (32 - mask)) - 1);
122
+ // Check if IP is in subnet
123
+ return (ipNum & maskNum) === (subnetNum & maskNum);
124
+ }
125
+ catch (e) {
126
+ this.logger.error(`Invalid CIDR notation: ${cidr}`);
127
+ return false;
128
+ }
129
+ }
130
+ /**
131
+ * Check if request is within rate limit
132
+ */
133
+ isWithinRateLimit(route, context) {
134
+ if (!route.security?.rateLimit?.enabled) {
135
+ return true;
136
+ }
137
+ const rateLimit = route.security.rateLimit;
138
+ const routeId = route.id || route.name || 'unnamed';
139
+ // Determine rate limit key (by IP, path, or header)
140
+ let key = context.clientIp; // Default to IP
141
+ if (rateLimit.keyBy === 'path' && context.path) {
142
+ key = `${context.clientIp}:${context.path}`;
143
+ }
144
+ else if (rateLimit.keyBy === 'header' && rateLimit.headerName && context.headers) {
145
+ const headerValue = context.headers[rateLimit.headerName.toLowerCase()];
146
+ if (headerValue) {
147
+ key = `${context.clientIp}:${headerValue}`;
148
+ }
149
+ }
150
+ // Get or create rate limit tracking for this route
151
+ if (!this.rateLimits.has(routeId)) {
152
+ this.rateLimits.set(routeId, new Map());
153
+ }
154
+ const routeLimits = this.rateLimits.get(routeId);
155
+ const now = Date.now();
156
+ // Get or create rate limit tracking for this key
157
+ let limit = routeLimits.get(key);
158
+ if (!limit || limit.expiry < now) {
159
+ // Create new rate limit or reset expired one
160
+ limit = {
161
+ count: 1,
162
+ expiry: now + (rateLimit.window * 1000)
163
+ };
164
+ routeLimits.set(key, limit);
165
+ return true;
166
+ }
167
+ // Increment the counter
168
+ limit.count++;
169
+ // Check if rate limit is exceeded
170
+ return limit.count <= rateLimit.maxRequests;
171
+ }
172
+ /**
173
+ * Clean up expired rate limits
174
+ * Should be called periodically to prevent memory leaks
175
+ */
176
+ cleanupExpiredRateLimits() {
177
+ const now = Date.now();
178
+ for (const [routeId, routeLimits] of this.rateLimits.entries()) {
179
+ let removed = 0;
180
+ for (const [key, limit] of routeLimits.entries()) {
181
+ if (limit.expiry < now) {
182
+ routeLimits.delete(key);
183
+ removed++;
184
+ }
185
+ }
186
+ if (removed > 0) {
187
+ this.logger.debug(`Cleaned up ${removed} expired rate limits for route ${routeId}`);
188
+ }
189
+ }
190
+ }
191
+ /**
192
+ * Check basic auth credentials
193
+ *
194
+ * @param route The route to check auth for
195
+ * @param username The provided username
196
+ * @param password The provided password
197
+ * @returns True if credentials are valid, false otherwise
198
+ */
199
+ checkBasicAuth(route, username, password) {
200
+ if (!route.security?.basicAuth?.enabled) {
201
+ return true;
202
+ }
203
+ const basicAuth = route.security.basicAuth;
204
+ // Check credentials against configured users
205
+ for (const user of basicAuth.users) {
206
+ if (user.username === username && user.password === password) {
207
+ return true;
208
+ }
209
+ }
210
+ return false;
211
+ }
212
+ /**
213
+ * Verify a JWT token
214
+ *
215
+ * @param route The route to verify the token for
216
+ * @param token The JWT token to verify
217
+ * @returns True if the token is valid, false otherwise
218
+ */
219
+ verifyJwtToken(route, token) {
220
+ if (!route.security?.jwtAuth?.enabled) {
221
+ return true;
222
+ }
223
+ try {
224
+ // This is a simplified version - in production you'd use a proper JWT library
225
+ const jwtAuth = route.security.jwtAuth;
226
+ // Verify structure
227
+ const parts = token.split('.');
228
+ if (parts.length !== 3) {
229
+ return false;
230
+ }
231
+ // Decode payload
232
+ const payload = JSON.parse(Buffer.from(parts[1], 'base64').toString());
233
+ // Check expiration
234
+ if (payload.exp && payload.exp < Math.floor(Date.now() / 1000)) {
235
+ return false;
236
+ }
237
+ // Check issuer
238
+ if (jwtAuth.issuer && payload.iss !== jwtAuth.issuer) {
239
+ return false;
240
+ }
241
+ // Check audience
242
+ if (jwtAuth.audience && payload.aud !== jwtAuth.audience) {
243
+ return false;
244
+ }
245
+ // In a real implementation, you'd also verify the signature
246
+ // using the secret and algorithm specified in jwtAuth
247
+ return true;
248
+ }
249
+ catch (err) {
250
+ this.logger.error(`Error verifying JWT: ${err}`);
251
+ return false;
252
+ }
253
+ }
254
+ }
255
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"security-manager.js","sourceRoot":"","sources":["../../../ts/proxies/network-proxy/security-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAK5C;;;GAGG;AACH,MAAM,OAAO,eAAe;IAO1B,YAAoB,MAAe,EAAU,SAAyB,EAAE;QAApD,WAAM,GAAN,MAAM,CAAS;QAAU,WAAM,GAAN,MAAM,CAAqB;QANxE,8DAA8D;QACtD,kBAAa,GAAsC,IAAI,GAAG,EAAE,CAAC;QAErE,sCAAsC;QAC9B,eAAU,GAAgE,IAAI,GAAG,EAAE,CAAC;IAEjB,CAAC;IAE5E;;OAEG;IACI,SAAS,CAAC,MAAsB;QACrC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,kCAAkC;QAClC,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,CAAC;IAC7B,CAAC;IAED;;;;;;OAMG;IACI,SAAS,CAAC,KAAmB,EAAE,OAAsB;QAC1D,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,uBAAuB;QACvB,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC/C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,OAAO,CAAC,QAAQ,yBAAyB,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,IAAI,SAAS,EAAE,CAAC,CAAC;YACxG,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,IAAI,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,OAAO,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,OAAO,CAAC,EAAE,CAAC;YACjF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,iCAAiC,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,OAAO,KAAK,CAAC;QACf,CAAC;QAED,6CAA6C;QAC7C,6DAA6D;QAC7D,uCAAuC;QAEvC,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,KAAmB,EAAE,QAAgB;QACvD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,MAAM,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAEpD,oBAAoB;QACpB,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC7C,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QACpD,IAAI,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC7B,OAAO,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAE,CAAC;QACnC,CAAC;QAED,IAAI,OAAO,GAAG,IAAI,CAAC;QAEnB,wDAAwD;QACxD,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,IAAI,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;gBAChE,OAAO,GAAG,KAAK,CAAC;YAClB,CAAC;QACH,CAAC;QAED,4DAA4D;QAC5D,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,mEAAmE;YACnE,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QACxE,CAAC;QAED,mBAAmB;QACnB,UAAU,CAAC,GAAG,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,EAAU,EAAE,QAAkB;QACrD,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,gBAAgB;YAChB,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC1B,IAAI,IAAI,CAAC,aAAa,CAAC,EAAE,EAAE,OAAO,CAAC,EAAE,CAAC;oBACpC,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YACD,oBAAoB;iBACf,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC/B,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,GAAG,GAAG,OAAO,CAAC,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC;gBACzF,IAAI,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;oBACnB,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YACD,cAAc;iBACT,IAAI,OAAO,KAAK,EAAE,EAAE,CAAC;gBACxB,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;OAGG;IACK,aAAa,CAAC,EAAU,EAAE,IAAY;QAC5C,IAAI,CAAC;YACH,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,IAAI,GAAG,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;YAEhC,+BAA+B;YAC/B,MAAM,OAAO,GAAG,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;YAC9D,MAAM,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;YAEtE,sCAAsC;YACtC,MAAM,KAAK,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;YACvF,MAAM,SAAS,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;YAE3G,qBAAqB;YACrB,MAAM,OAAO,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,GAAG,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YAE1C,2BAA2B;YAC3B,OAAO,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,SAAS,GAAG,OAAO,CAAC,CAAC;QACrD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,IAAI,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,KAAmB,EAAE,OAAsB;QACnE,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAC3C,MAAM,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAEpD,oDAAoD;QACpD,IAAI,GAAG,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC,gBAAgB;QAE5C,IAAI,SAAS,CAAC,KAAK,KAAK,MAAM,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;YAC/C,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;QAC9C,CAAC;aAAM,IAAI,SAAS,CAAC,KAAK,KAAK,QAAQ,IAAI,SAAS,CAAC,UAAU,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACnF,MAAM,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,CAAC;YACxE,IAAI,WAAW,EAAE,CAAC;gBAChB,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,WAAW,EAAE,CAAC;YAC7C,CAAC;QACH,CAAC;QAED,mDAAmD;QACnD,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YAClC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC1C,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QAClD,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,iDAAiD;QACjD,IAAI,KAAK,GAAG,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACjC,IAAI,CAAC,KAAK,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;YACjC,6CAA6C;YAC7C,KAAK,GAAG;gBACN,KAAK,EAAE,CAAC;gBACR,MAAM,EAAE,GAAG,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,IAAI,CAAC;aACxC,CAAC;YACF,WAAW,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YAC5B,OAAO,IAAI,CAAC;QACd,CAAC;QAED,wBAAwB;QACxB,KAAK,CAAC,KAAK,EAAE,CAAC;QAEd,kCAAkC;QAClC,OAAO,KAAK,CAAC,KAAK,IAAI,SAAS,CAAC,WAAW,CAAC;IAC9C,CAAC;IAED;;;OAGG;IACI,wBAAwB;QAC7B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,KAAK,MAAM,CAAC,OAAO,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;YAC/D,IAAI,OAAO,GAAG,CAAC,CAAC;YAChB,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,WAAW,CAAC,OAAO,EAAE,EAAE,CAAC;gBACjD,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;oBACvB,WAAW,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;oBACxB,OAAO,EAAE,CAAC;gBACZ,CAAC;YACH,CAAC;YACD,IAAI,OAAO,GAAG,CAAC,EAAE,CAAC;gBAChB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,cAAc,OAAO,kCAAkC,OAAO,EAAE,CAAC,CAAC;YACtF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACI,cAAc,CAAC,KAAmB,EAAE,QAAgB,EAAE,QAAgB;QAC3E,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAE3C,6CAA6C;QAC7C,KAAK,MAAM,IAAI,IAAI,SAAS,CAAC,KAAK,EAAE,CAAC;YACnC,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;gBAC7D,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;OAMG;IACI,cAAc,CAAC,KAAmB,EAAE,KAAa;QACtD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,OAAO,EAAE,OAAO,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,IAAI,CAAC;YACH,8EAA8E;YAC9E,MAAM,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC;YAEvC,mBAAmB;YACnB,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvB,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC;YAEvE,mBAAmB;YACnB,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,EAAE,CAAC;gBAC/D,OAAO,KAAK,CAAC;YACf,CAAC;YAED,eAAe;YACf,IAAI,OAAO,CAAC,MAAM,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,MAAM,EAAE,CAAC;gBACrD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,IAAI,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,QAAQ,EAAE,CAAC;gBACzD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,4DAA4D;YAC5D,sDAAsD;YAEtD,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,wBAAwB,GAAG,EAAE,CAAC,CAAC;YACjD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
@@ -1,18 +1,29 @@
1
1
  import * as plugins from '../../plugins.js';
2
+ import '../../core/models/socket-augmentation.js';
2
3
  import { type INetworkProxyOptions } from './models/types.js';
3
4
  import { ConnectionPool } from './connection-pool.js';
4
5
  import { ProxyRouter } from '../../http/router/index.js';
6
+ import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
5
7
  /**
6
8
  * Handles WebSocket connections and proxying
7
9
  */
8
10
  export declare class WebSocketHandler {
9
11
  private options;
10
12
  private connectionPool;
11
- private router;
13
+ private legacyRouter;
14
+ private routes;
12
15
  private heartbeatInterval;
13
16
  private wsServer;
14
17
  private logger;
15
- constructor(options: INetworkProxyOptions, connectionPool: ConnectionPool, router: ProxyRouter);
18
+ private contextCreator;
19
+ private routeRouter;
20
+ private securityManager;
21
+ constructor(options: INetworkProxyOptions, connectionPool: ConnectionPool, legacyRouter: ProxyRouter, // Legacy router for backward compatibility
22
+ routes?: IRouteConfig[]);
23
+ /**
24
+ * Set the route configurations
25
+ */
26
+ setRoutes(routes: IRouteConfig[]): void;
16
27
  /**
17
28
  * Initialize WebSocket server on an existing HTTPS server
18
29
  */