@push.rocks/smartproxy 18.0.2 → 18.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/certificate/certificate-manager.d.ts +150 -0
  3. package/dist_ts/certificate/certificate-manager.js +505 -0
  4. package/dist_ts/certificate/events/simplified-events.d.ts +56 -0
  5. package/dist_ts/certificate/events/simplified-events.js +13 -0
  6. package/dist_ts/certificate/models/certificate-errors.d.ts +69 -0
  7. package/dist_ts/certificate/models/certificate-errors.js +141 -0
  8. package/dist_ts/certificate/models/certificate-strategy.d.ts +60 -0
  9. package/dist_ts/certificate/models/certificate-strategy.js +73 -0
  10. package/dist_ts/certificate/simplified-certificate-manager.d.ts +150 -0
  11. package/dist_ts/certificate/simplified-certificate-manager.js +501 -0
  12. package/dist_ts/http/index.d.ts +1 -9
  13. package/dist_ts/http/index.js +5 -11
  14. package/dist_ts/plugins.d.ts +3 -1
  15. package/dist_ts/plugins.js +4 -2
  16. package/dist_ts/proxies/network-proxy/network-proxy.js +3 -1
  17. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +48 -0
  18. package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +76 -0
  19. package/dist_ts/proxies/network-proxy/websocket-handler.js +41 -4
  20. package/dist_ts/proxies/smart-proxy/cert-store.d.ts +10 -0
  21. package/dist_ts/proxies/smart-proxy/cert-store.js +70 -0
  22. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +116 -0
  23. package/dist_ts/proxies/smart-proxy/certificate-manager.js +401 -0
  24. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +168 -0
  25. package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +642 -0
  26. package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +26 -0
  27. package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
  28. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +65 -0
  29. package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +31 -0
  30. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +102 -0
  31. package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +73 -0
  32. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +10 -44
  33. package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +66 -202
  34. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +4 -0
  35. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +62 -2
  36. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +41 -0
  37. package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +132 -0
  38. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +18 -13
  39. package/dist_ts/proxies/smart-proxy/smart-proxy.js +79 -196
  40. package/package.json +7 -5
  41. package/readme.md +224 -10
  42. package/readme.plan.md +1405 -617
  43. package/ts/00_commitinfo_data.ts +1 -1
  44. package/ts/http/index.ts +5 -12
  45. package/ts/plugins.ts +4 -1
  46. package/ts/proxies/network-proxy/network-proxy.ts +3 -0
  47. package/ts/proxies/network-proxy/websocket-handler.ts +38 -3
  48. package/ts/proxies/smart-proxy/cert-store.ts +86 -0
  49. package/ts/proxies/smart-proxy/certificate-manager.ts +506 -0
  50. package/ts/proxies/smart-proxy/models/route-types.ts +33 -3
  51. package/ts/proxies/smart-proxy/network-proxy-bridge.ts +86 -239
  52. package/ts/proxies/smart-proxy/route-connection-handler.ts +74 -1
  53. package/ts/proxies/smart-proxy/smart-proxy.ts +105 -222
@@ -0,0 +1,401 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { NetworkProxy } from '../network-proxy/index.js';
3
+ import { CertStore } from './cert-store.js';
4
+ export class SmartCertManager {
5
+ constructor(routes, certDir = './certs', acmeOptions) {
6
+ this.routes = routes;
7
+ this.certDir = certDir;
8
+ this.acmeOptions = acmeOptions;
9
+ this.smartAcme = null;
10
+ this.networkProxy = null;
11
+ this.renewalTimer = null;
12
+ this.pendingChallenges = new Map();
13
+ this.challengeRoute = null;
14
+ // Track certificate status by route name
15
+ this.certStatus = new Map();
16
+ this.certStore = new CertStore(certDir);
17
+ }
18
+ setNetworkProxy(networkProxy) {
19
+ this.networkProxy = networkProxy;
20
+ }
21
+ /**
22
+ * Set callback for updating routes (used for challenge routes)
23
+ */
24
+ setUpdateRoutesCallback(callback) {
25
+ this.updateRoutesCallback = callback;
26
+ }
27
+ /**
28
+ * Initialize certificate manager and provision certificates for all routes
29
+ */
30
+ async initialize() {
31
+ // Create certificate directory if it doesn't exist
32
+ await this.certStore.initialize();
33
+ // Initialize SmartAcme if we have any ACME routes
34
+ const hasAcmeRoutes = this.routes.some(r => r.action.tls?.certificate === 'auto');
35
+ if (hasAcmeRoutes && this.acmeOptions?.email) {
36
+ // Create HTTP-01 challenge handler
37
+ const http01Handler = new plugins.smartacme.handlers.Http01MemoryHandler();
38
+ // Set up challenge handler integration with our routing
39
+ this.setupChallengeHandler(http01Handler);
40
+ // Create SmartAcme instance with built-in MemoryCertManager and HTTP-01 handler
41
+ this.smartAcme = new plugins.smartacme.SmartAcme({
42
+ accountEmail: this.acmeOptions.email,
43
+ environment: this.acmeOptions.useProduction ? 'production' : 'integration',
44
+ certManager: new plugins.smartacme.certmanagers.MemoryCertManager(),
45
+ challengeHandlers: [http01Handler]
46
+ });
47
+ await this.smartAcme.start();
48
+ }
49
+ // Provision certificates for all routes
50
+ await this.provisionAllCertificates();
51
+ // Start renewal timer
52
+ this.startRenewalTimer();
53
+ }
54
+ /**
55
+ * Provision certificates for all routes that need them
56
+ */
57
+ async provisionAllCertificates() {
58
+ const certRoutes = this.routes.filter(r => r.action.tls?.mode === 'terminate' ||
59
+ r.action.tls?.mode === 'terminate-and-reencrypt');
60
+ for (const route of certRoutes) {
61
+ try {
62
+ await this.provisionCertificate(route);
63
+ }
64
+ catch (error) {
65
+ console.error(`Failed to provision certificate for route ${route.name}: ${error}`);
66
+ }
67
+ }
68
+ }
69
+ /**
70
+ * Provision certificate for a single route
71
+ */
72
+ async provisionCertificate(route) {
73
+ const tls = route.action.tls;
74
+ if (!tls || (tls.mode !== 'terminate' && tls.mode !== 'terminate-and-reencrypt')) {
75
+ return;
76
+ }
77
+ const domains = this.extractDomainsFromRoute(route);
78
+ if (domains.length === 0) {
79
+ console.warn(`Route ${route.name} has TLS termination but no domains`);
80
+ return;
81
+ }
82
+ const primaryDomain = domains[0];
83
+ if (tls.certificate === 'auto') {
84
+ // ACME certificate
85
+ await this.provisionAcmeCertificate(route, domains);
86
+ }
87
+ else if (typeof tls.certificate === 'object') {
88
+ // Static certificate
89
+ await this.provisionStaticCertificate(route, primaryDomain, tls.certificate);
90
+ }
91
+ }
92
+ /**
93
+ * Provision ACME certificate
94
+ */
95
+ async provisionAcmeCertificate(route, domains) {
96
+ if (!this.smartAcme) {
97
+ throw new Error('SmartAcme not initialized');
98
+ }
99
+ const primaryDomain = domains[0];
100
+ const routeName = route.name || primaryDomain;
101
+ // Check if we already have a valid certificate
102
+ const existingCert = await this.certStore.getCertificate(routeName);
103
+ if (existingCert && this.isCertificateValid(existingCert)) {
104
+ console.log(`Using existing valid certificate for ${primaryDomain}`);
105
+ await this.applyCertificate(primaryDomain, existingCert);
106
+ this.updateCertStatus(routeName, 'valid', 'acme', existingCert);
107
+ return;
108
+ }
109
+ console.log(`Requesting ACME certificate for ${domains.join(', ')}`);
110
+ this.updateCertStatus(routeName, 'pending', 'acme');
111
+ try {
112
+ // Add challenge route before requesting certificate
113
+ await this.addChallengeRoute();
114
+ try {
115
+ // Use smartacme to get certificate
116
+ const cert = await this.smartAcme.getCertificateForDomain(primaryDomain);
117
+ // SmartAcme's Cert object has these properties:
118
+ // - publicKey: The certificate PEM string
119
+ // - privateKey: The private key PEM string
120
+ // - csr: Certificate signing request
121
+ // - validUntil: Timestamp in milliseconds
122
+ // - domainName: The domain name
123
+ const certData = {
124
+ cert: cert.publicKey,
125
+ key: cert.privateKey,
126
+ ca: cert.publicKey, // Use same as cert for now
127
+ expiryDate: new Date(cert.validUntil),
128
+ issueDate: new Date(cert.created)
129
+ };
130
+ await this.certStore.saveCertificate(routeName, certData);
131
+ await this.applyCertificate(primaryDomain, certData);
132
+ this.updateCertStatus(routeName, 'valid', 'acme', certData);
133
+ console.log(`Successfully provisioned ACME certificate for ${primaryDomain}`);
134
+ }
135
+ catch (error) {
136
+ console.error(`Failed to provision ACME certificate for ${primaryDomain}: ${error}`);
137
+ this.updateCertStatus(routeName, 'error', 'acme', undefined, error.message);
138
+ throw error;
139
+ }
140
+ finally {
141
+ // Always remove challenge route after provisioning
142
+ await this.removeChallengeRoute();
143
+ }
144
+ }
145
+ catch (error) {
146
+ // Handle outer try-catch from adding challenge route
147
+ console.error(`Failed to setup ACME challenge for ${primaryDomain}: ${error}`);
148
+ this.updateCertStatus(routeName, 'error', 'acme', undefined, error.message);
149
+ throw error;
150
+ }
151
+ }
152
+ /**
153
+ * Provision static certificate
154
+ */
155
+ async provisionStaticCertificate(route, domain, certConfig) {
156
+ const routeName = route.name || domain;
157
+ try {
158
+ let key = certConfig.key;
159
+ let cert = certConfig.cert;
160
+ // Load from files if paths are provided
161
+ if (certConfig.keyFile) {
162
+ const keyFile = await plugins.smartfile.SmartFile.fromFilePath(certConfig.keyFile);
163
+ key = keyFile.contents.toString();
164
+ }
165
+ if (certConfig.certFile) {
166
+ const certFile = await plugins.smartfile.SmartFile.fromFilePath(certConfig.certFile);
167
+ cert = certFile.contents.toString();
168
+ }
169
+ // Parse certificate to get dates
170
+ // Parse certificate to get dates - for now just use defaults
171
+ // TODO: Implement actual certificate parsing if needed
172
+ const certInfo = { validTo: new Date(Date.now() + 90 * 24 * 60 * 60 * 1000), validFrom: new Date() };
173
+ const certData = {
174
+ cert,
175
+ key,
176
+ expiryDate: certInfo.validTo,
177
+ issueDate: certInfo.validFrom
178
+ };
179
+ // Save to store for consistency
180
+ await this.certStore.saveCertificate(routeName, certData);
181
+ await this.applyCertificate(domain, certData);
182
+ this.updateCertStatus(routeName, 'valid', 'static', certData);
183
+ console.log(`Successfully loaded static certificate for ${domain}`);
184
+ }
185
+ catch (error) {
186
+ console.error(`Failed to provision static certificate for ${domain}: ${error}`);
187
+ this.updateCertStatus(routeName, 'error', 'static', undefined, error.message);
188
+ throw error;
189
+ }
190
+ }
191
+ /**
192
+ * Apply certificate to NetworkProxy
193
+ */
194
+ async applyCertificate(domain, certData) {
195
+ if (!this.networkProxy) {
196
+ console.warn('NetworkProxy not set, cannot apply certificate');
197
+ return;
198
+ }
199
+ // Apply certificate to NetworkProxy
200
+ this.networkProxy.updateCertificate(domain, certData.cert, certData.key);
201
+ // Also apply for wildcard if it's a subdomain
202
+ if (domain.includes('.') && !domain.startsWith('*.')) {
203
+ const parts = domain.split('.');
204
+ if (parts.length >= 2) {
205
+ const wildcardDomain = `*.${parts.slice(-2).join('.')}`;
206
+ this.networkProxy.updateCertificate(wildcardDomain, certData.cert, certData.key);
207
+ }
208
+ }
209
+ }
210
+ /**
211
+ * Extract domains from route configuration
212
+ */
213
+ extractDomainsFromRoute(route) {
214
+ if (!route.match.domains) {
215
+ return [];
216
+ }
217
+ const domains = Array.isArray(route.match.domains)
218
+ ? route.match.domains
219
+ : [route.match.domains];
220
+ // Filter out wildcards and patterns
221
+ return domains.filter(d => !d.includes('*') &&
222
+ !d.includes('{') &&
223
+ d.includes('.'));
224
+ }
225
+ /**
226
+ * Check if certificate is valid
227
+ */
228
+ isCertificateValid(cert) {
229
+ const now = new Date();
230
+ const expiryThreshold = new Date(now.getTime() + 30 * 24 * 60 * 60 * 1000); // 30 days
231
+ return cert.expiryDate > expiryThreshold;
232
+ }
233
+ /**
234
+ * Add challenge route to SmartProxy
235
+ */
236
+ async addChallengeRoute() {
237
+ if (!this.updateRoutesCallback) {
238
+ throw new Error('No route update callback set');
239
+ }
240
+ if (!this.challengeRoute) {
241
+ throw new Error('Challenge route not initialized');
242
+ }
243
+ const challengeRoute = this.challengeRoute;
244
+ const updatedRoutes = [...this.routes, challengeRoute];
245
+ await this.updateRoutesCallback(updatedRoutes);
246
+ }
247
+ /**
248
+ * Remove challenge route from SmartProxy
249
+ */
250
+ async removeChallengeRoute() {
251
+ if (!this.updateRoutesCallback) {
252
+ return;
253
+ }
254
+ const filteredRoutes = this.routes.filter(r => r.name !== 'acme-challenge');
255
+ await this.updateRoutesCallback(filteredRoutes);
256
+ }
257
+ /**
258
+ * Start renewal timer
259
+ */
260
+ startRenewalTimer() {
261
+ // Check for renewals every 12 hours
262
+ this.renewalTimer = setInterval(() => {
263
+ this.checkAndRenewCertificates();
264
+ }, 12 * 60 * 60 * 1000);
265
+ // Also do an immediate check
266
+ this.checkAndRenewCertificates();
267
+ }
268
+ /**
269
+ * Check and renew certificates that are expiring
270
+ */
271
+ async checkAndRenewCertificates() {
272
+ for (const route of this.routes) {
273
+ if (route.action.tls?.certificate === 'auto') {
274
+ const routeName = route.name || this.extractDomainsFromRoute(route)[0];
275
+ const cert = await this.certStore.getCertificate(routeName);
276
+ if (cert && !this.isCertificateValid(cert)) {
277
+ console.log(`Certificate for ${routeName} needs renewal`);
278
+ try {
279
+ await this.provisionCertificate(route);
280
+ }
281
+ catch (error) {
282
+ console.error(`Failed to renew certificate for ${routeName}: ${error}`);
283
+ }
284
+ }
285
+ }
286
+ }
287
+ }
288
+ /**
289
+ * Update certificate status
290
+ */
291
+ updateCertStatus(routeName, status, source, certData, error) {
292
+ this.certStatus.set(routeName, {
293
+ domain: routeName,
294
+ status,
295
+ source,
296
+ expiryDate: certData?.expiryDate,
297
+ issueDate: certData?.issueDate,
298
+ error
299
+ });
300
+ }
301
+ /**
302
+ * Get certificate status for a route
303
+ */
304
+ getCertificateStatus(routeName) {
305
+ return this.certStatus.get(routeName);
306
+ }
307
+ /**
308
+ * Force renewal of a certificate
309
+ */
310
+ async renewCertificate(routeName) {
311
+ const route = this.routes.find(r => r.name === routeName);
312
+ if (!route) {
313
+ throw new Error(`Route ${routeName} not found`);
314
+ }
315
+ // Remove existing certificate to force renewal
316
+ await this.certStore.deleteCertificate(routeName);
317
+ await this.provisionCertificate(route);
318
+ }
319
+ /**
320
+ * Setup challenge handler integration with SmartProxy routing
321
+ */
322
+ setupChallengeHandler(http01Handler) {
323
+ // Create a challenge route that delegates to SmartAcme's HTTP-01 handler
324
+ const challengeRoute = {
325
+ name: 'acme-challenge',
326
+ priority: 1000, // High priority
327
+ match: {
328
+ ports: 80,
329
+ path: '/.well-known/acme-challenge/*'
330
+ },
331
+ action: {
332
+ type: 'static',
333
+ handler: async (context) => {
334
+ // Extract the token from the path
335
+ const token = context.path?.split('/').pop();
336
+ if (!token) {
337
+ return { status: 404, body: 'Not found' };
338
+ }
339
+ // Create mock request/response objects for SmartAcme
340
+ const mockReq = {
341
+ url: context.path,
342
+ method: 'GET',
343
+ headers: context.headers || {}
344
+ };
345
+ let responseData = null;
346
+ const mockRes = {
347
+ statusCode: 200,
348
+ setHeader: (name, value) => { },
349
+ end: (data) => {
350
+ responseData = data;
351
+ }
352
+ };
353
+ // Use SmartAcme's handler
354
+ const handled = await new Promise((resolve) => {
355
+ http01Handler.handleRequest(mockReq, mockRes, () => {
356
+ resolve(false);
357
+ });
358
+ // Give it a moment to process
359
+ setTimeout(() => resolve(true), 100);
360
+ });
361
+ if (handled && responseData) {
362
+ return {
363
+ status: mockRes.statusCode,
364
+ headers: { 'Content-Type': 'text/plain' },
365
+ body: responseData
366
+ };
367
+ }
368
+ else {
369
+ return { status: 404, body: 'Not found' };
370
+ }
371
+ }
372
+ }
373
+ };
374
+ // Store the challenge route to add it when needed
375
+ this.challengeRoute = challengeRoute;
376
+ }
377
+ /**
378
+ * Stop certificate manager
379
+ */
380
+ async stop() {
381
+ if (this.renewalTimer) {
382
+ clearInterval(this.renewalTimer);
383
+ this.renewalTimer = null;
384
+ }
385
+ if (this.smartAcme) {
386
+ await this.smartAcme.stop();
387
+ }
388
+ // Remove any active challenge routes
389
+ if (this.pendingChallenges.size > 0) {
390
+ this.pendingChallenges.clear();
391
+ await this.removeChallengeRoute();
392
+ }
393
+ }
394
+ /**
395
+ * Get ACME options (for recreating after route updates)
396
+ */
397
+ getAcmeOptions() {
398
+ return this.acmeOptions;
399
+ }
400
+ }
401
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate-manager.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AAEzD,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAmB5C,MAAM,OAAO,gBAAgB;IAc3B,YACU,MAAsB,EACtB,UAAkB,SAAS,EAC3B,WAIP;QANO,WAAM,GAAN,MAAM,CAAgB;QACtB,YAAO,GAAP,OAAO,CAAoB;QAC3B,gBAAW,GAAX,WAAW,CAIlB;QAnBK,cAAS,GAAuC,IAAI,CAAC;QACrD,iBAAY,GAAwB,IAAI,CAAC;QACzC,iBAAY,GAA0B,IAAI,CAAC;QAC3C,sBAAiB,GAAwB,IAAI,GAAG,EAAE,CAAC;QACnD,mBAAc,GAAwB,IAAI,CAAC;QAEnD,yCAAyC;QACjC,eAAU,GAA6B,IAAI,GAAG,EAAE,CAAC;QAcvD,IAAI,CAAC,SAAS,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,CAAC;IAC1C,CAAC;IAEM,eAAe,CAAC,YAA0B;QAC/C,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;IACnC,CAAC;IAED;;OAEG;IACI,uBAAuB,CAAC,QAAmD;QAChF,IAAI,CAAC,oBAAoB,GAAG,QAAQ,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,mDAAmD;QACnD,MAAM,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;QAElC,kDAAkD;QAClD,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CACzC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,CACrC,CAAC;QAEF,IAAI,aAAa,IAAI,IAAI,CAAC,WAAW,EAAE,KAAK,EAAE,CAAC;YAC7C,mCAAmC;YACnC,MAAM,aAAa,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,mBAAmB,EAAE,CAAC;YAE3E,wDAAwD;YACxD,IAAI,CAAC,qBAAqB,CAAC,aAAa,CAAC,CAAC;YAE1C,gFAAgF;YAChF,IAAI,CAAC,SAAS,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC;gBAC/C,YAAY,EAAE,IAAI,CAAC,WAAW,CAAC,KAAK;gBACpC,WAAW,EAAE,IAAI,CAAC,WAAW,CAAC,aAAa,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,aAAa;gBAC1E,WAAW,EAAE,IAAI,OAAO,CAAC,SAAS,CAAC,YAAY,CAAC,iBAAiB,EAAE;gBACnE,iBAAiB,EAAE,CAAC,aAAa,CAAC;aACnC,CAAC,CAAC;YAEH,MAAM,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,CAAC;QAC/B,CAAC;QAED,wCAAwC;QACxC,MAAM,IAAI,CAAC,wBAAwB,EAAE,CAAC;QAEtC,sBAAsB;QACtB,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB;QACpC,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACxC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;YAClC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,yBAAyB,CACjD,CAAC;QAEF,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,KAAK,CAAC,6CAA6C,KAAK,CAAC,IAAI,KAAK,KAAK,EAAE,CAAC,CAAC;YACrF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,KAAmB;QACnD,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC;QAC7B,IAAI,CAAC,GAAG,IAAI,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC,EAAE,CAAC;YACjF,OAAO;QACT,CAAC;QAED,MAAM,OAAO,GAAG,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC;QACpD,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACzB,OAAO,CAAC,IAAI,CAAC,SAAS,KAAK,CAAC,IAAI,qCAAqC,CAAC,CAAC;YACvE,OAAO;QACT,CAAC;QAED,MAAM,aAAa,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;QAEjC,IAAI,GAAG,CAAC,WAAW,KAAK,MAAM,EAAE,CAAC;YAC/B,mBAAmB;YACnB,MAAM,IAAI,CAAC,wBAAwB,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACtD,CAAC;aAAM,IAAI,OAAO,GAAG,CAAC,WAAW,KAAK,QAAQ,EAAE,CAAC;YAC/C,qBAAqB;YACrB,MAAM,IAAI,CAAC,0BAA0B,CAAC,KAAK,EAAE,aAAa,EAAE,GAAG,CAAC,WAAW,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB,CACpC,KAAmB,EACnB,OAAiB;QAEjB,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QAC/C,CAAC;QAED,MAAM,aAAa,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;QACjC,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,aAAa,CAAC;QAE9C,+CAA+C;QAC/C,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QACpE,IAAI,YAAY,IAAI,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,EAAE,CAAC;YAC1D,OAAO,CAAC,GAAG,CAAC,wCAAwC,aAAa,EAAE,CAAC,CAAC;YACrE,MAAM,IAAI,CAAC,gBAAgB,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC;YACzD,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,YAAY,CAAC,CAAC;YAChE,OAAO;QACT,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,mCAAmC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACrE,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;QAEpD,IAAI,CAAC;YACH,oDAAoD;YACpD,MAAM,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAE/B,IAAI,CAAC;gBACH,mCAAmC;gBACnC,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAE3E,gDAAgD;gBAChD,4CAA4C;gBAC5C,2CAA2C;gBAC3C,qCAAqC;gBACrC,0CAA0C;gBAC1C,gCAAgC;gBAChC,MAAM,QAAQ,GAAqB;oBACjC,IAAI,EAAE,IAAI,CAAC,SAAS;oBACpB,GAAG,EAAE,IAAI,CAAC,UAAU;oBACpB,EAAE,EAAE,IAAI,CAAC,SAAS,EAAE,2BAA2B;oBAC/C,UAAU,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC;oBACrC,SAAS,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;iBAClC,CAAC;gBAEF,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;gBAC1D,MAAM,IAAI,CAAC,gBAAgB,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;gBACrD,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,QAAQ,CAAC,CAAC;gBAE1D,OAAO,CAAC,GAAG,CAAC,iDAAiD,aAAa,EAAE,CAAC,CAAC;YAChF,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,KAAK,CAAC,4CAA4C,aAAa,KAAK,KAAK,EAAE,CAAC,CAAC;gBACrF,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC5E,MAAM,KAAK,CAAC;YACd,CAAC;oBAAS,CAAC;gBACT,mDAAmD;gBACnD,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;YACpC,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,qDAAqD;YACrD,OAAO,CAAC,KAAK,CAAC,sCAAsC,aAAa,KAAK,KAAK,EAAE,CAAC,CAAC;YAC/E,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;YAC5E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,0BAA0B,CACtC,KAAmB,EACnB,MAAc,EACd,UAA8E;QAE9E,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,MAAM,CAAC;QAEvC,IAAI,CAAC;YACH,IAAI,GAAG,GAAW,UAAU,CAAC,GAAG,CAAC;YACjC,IAAI,IAAI,GAAW,UAAU,CAAC,IAAI,CAAC;YAEnC,wCAAwC;YACxC,IAAI,UAAU,CAAC,OAAO,EAAE,CAAC;gBACvB,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;gBACnF,GAAG,GAAG,OAAO,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;YACpC,CAAC;YACD,IAAI,UAAU,CAAC,QAAQ,EAAE,CAAC;gBACxB,MAAM,QAAQ,GAAG,MAAM,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC,YAAY,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;gBACrF,IAAI,GAAG,QAAQ,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;YACtC,CAAC;YAED,iCAAiC;YACjC,6DAA6D;YAC7D,uDAAuD;YACvD,MAAM,QAAQ,GAAG,EAAE,OAAO,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,EAAE,SAAS,EAAE,IAAI,IAAI,EAAE,EAAE,CAAC;YAErG,MAAM,QAAQ,GAAqB;gBACjC,IAAI;gBACJ,GAAG;gBACH,UAAU,EAAE,QAAQ,CAAC,OAAO;gBAC5B,SAAS,EAAE,QAAQ,CAAC,SAAS;aAC9B,CAAC;YAEF,gCAAgC;YAChC,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;YAC1D,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YAC9C,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,CAAC,CAAC;YAE9D,OAAO,CAAC,GAAG,CAAC,8CAA8C,MAAM,EAAE,CAAC,CAAC;QACtE,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,8CAA8C,MAAM,KAAK,KAAK,EAAE,CAAC,CAAC;YAChF,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;YAC9E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,MAAc,EAAE,QAA0B;QACvE,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,IAAI,CAAC,gDAAgD,CAAC,CAAC;YAC/D,OAAO;QACT,CAAC;QAED,oCAAoC;QACpC,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,MAAM,EAAE,QAAQ,CAAC,IAAI,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC;QAEzE,8CAA8C;QAC9C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;YACrD,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAChC,IAAI,KAAK,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBACtB,MAAM,cAAc,GAAG,KAAK,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;gBACxD,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,cAAc,EAAE,QAAQ,CAAC,IAAI,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC;YACnF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB,CAAC,KAAmB;QACjD,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YACzB,OAAO,EAAE,CAAC;QACZ,CAAC;QAED,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;YAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;YACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QAE1B,oCAAoC;QACpC,OAAO,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACxB,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC;YAChB,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC;YAChB,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,CAChB,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,IAAsB;QAC/C,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,eAAe,GAAG,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,UAAU;QAEtF,OAAO,IAAI,CAAC,UAAU,GAAG,eAAe,CAAC;IAC3C,CAAC;IAGD;;OAEG;IACK,KAAK,CAAC,iBAAiB;QAC7B,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC/B,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;QACrD,CAAC;QACD,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;QAE3C,MAAM,aAAa,GAAG,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;QACvD,MAAM,IAAI,CAAC,oBAAoB,CAAC,aAAa,CAAC,CAAC;IACjD,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB;QAChC,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,MAAM,cAAc,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,gBAAgB,CAAC,CAAC;QAC5E,MAAM,IAAI,CAAC,oBAAoB,CAAC,cAAc,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,oCAAoC;QACpC,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE;YACnC,IAAI,CAAC,yBAAyB,EAAE,CAAC;QACnC,CAAC,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAExB,6BAA6B;QAC7B,IAAI,CAAC,yBAAyB,EAAE,CAAC;IACnC,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB;QACrC,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChC,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,EAAE,CAAC;gBAC7C,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;gBACvE,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;gBAE5D,IAAI,IAAI,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC3C,OAAO,CAAC,GAAG,CAAC,mBAAmB,SAAS,gBAAgB,CAAC,CAAC;oBAC1D,IAAI,CAAC;wBACH,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;oBACzC,CAAC;oBAAC,OAAO,KAAK,EAAE,CAAC;wBACf,OAAO,CAAC,KAAK,CAAC,mCAAmC,SAAS,KAAK,KAAK,EAAE,CAAC,CAAC;oBAC1E,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB,CACtB,SAAiB,EACjB,MAA6B,EAC7B,MAA6B,EAC7B,QAA2B,EAC3B,KAAc;QAEd,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,EAAE;YAC7B,MAAM,EAAE,SAAS;YACjB,MAAM;YACN,MAAM;YACN,UAAU,EAAE,QAAQ,EAAE,UAAU;YAChC,SAAS,EAAE,QAAQ,EAAE,SAAS;YAC9B,KAAK;SACN,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,oBAAoB,CAAC,SAAiB;QAC3C,OAAO,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;IACxC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,SAAiB;QAC7C,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;QAC1D,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,SAAS,SAAS,YAAY,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;QAClD,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACK,qBAAqB,CAAC,aAA6D;QACzF,yEAAyE;QACzE,MAAM,cAAc,GAAiB;YACnC,IAAI,EAAE,gBAAgB;YACtB,QAAQ,EAAE,IAAI,EAAG,gBAAgB;YACjC,KAAK,EAAE;gBACL,KAAK,EAAE,EAAE;gBACT,IAAI,EAAE,+BAA+B;aACtC;YACD,MAAM,EAAE;gBACN,IAAI,EAAE,QAAQ;gBACd,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,EAAE;oBACzB,kCAAkC;oBAClC,MAAM,KAAK,GAAG,OAAO,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;oBAC7C,IAAI,CAAC,KAAK,EAAE,CAAC;wBACX,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,WAAW,EAAE,CAAC;oBAC5C,CAAC;oBAED,qDAAqD;oBACrD,MAAM,OAAO,GAAG;wBACd,GAAG,EAAE,OAAO,CAAC,IAAI;wBACjB,MAAM,EAAE,KAAK;wBACb,OAAO,EAAE,OAAO,CAAC,OAAO,IAAI,EAAE;qBAC/B,CAAC;oBAEF,IAAI,YAAY,GAAQ,IAAI,CAAC;oBAC7B,MAAM,OAAO,GAAG;wBACd,UAAU,EAAE,GAAG;wBACf,SAAS,EAAE,CAAC,IAAY,EAAE,KAAa,EAAE,EAAE,GAAE,CAAC;wBAC9C,GAAG,EAAE,CAAC,IAAS,EAAE,EAAE;4BACjB,YAAY,GAAG,IAAI,CAAC;wBACtB,CAAC;qBACF,CAAC;oBAEF,0BAA0B;oBAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,OAAO,CAAU,CAAC,OAAO,EAAE,EAAE;wBACrD,aAAa,CAAC,aAAa,CAAC,OAAc,EAAE,OAAc,EAAE,GAAG,EAAE;4BAC/D,OAAO,CAAC,KAAK,CAAC,CAAC;wBACjB,CAAC,CAAC,CAAC;wBACH,8BAA8B;wBAC9B,UAAU,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,GAAG,CAAC,CAAC;oBACvC,CAAC,CAAC,CAAC;oBAEH,IAAI,OAAO,IAAI,YAAY,EAAE,CAAC;wBAC5B,OAAO;4BACL,MAAM,EAAE,OAAO,CAAC,UAAU;4BAC1B,OAAO,EAAE,EAAE,cAAc,EAAE,YAAY,EAAE;4BACzC,IAAI,EAAE,YAAY;yBACnB,CAAC;oBACJ,CAAC;yBAAM,CAAC;wBACN,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,WAAW,EAAE,CAAC;oBAC5C,CAAC;gBACH,CAAC;aACF;SACF,CAAC;QAEF,kDAAkD;QAClD,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;QAC3B,CAAC;QAED,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,MAAM,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;QAC9B,CAAC;QAED,qCAAqC;QACrC,IAAI,IAAI,CAAC,iBAAiB,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACpC,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACpC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;CACF"}
@@ -0,0 +1,168 @@
1
+ import * as plugins from '../../plugins.js';
2
+ import { RouteManager } from './route-manager.js';
3
+ import type { ISmartProxyOptions } from './models/interfaces.js';
4
+ import type { IRouteConfig } from './models/route-types.js';
5
+ /**
6
+ * SmartProxy - Pure route-based API
7
+ *
8
+ * SmartProxy is a unified proxy system that works with routes to define connection handling behavior.
9
+ * Each route contains matching criteria (ports, domains, etc.) and an action to take (forward, redirect, block).
10
+ *
11
+ * Configuration is provided through a set of routes, with each route defining:
12
+ * - What to match (ports, domains, paths, client IPs)
13
+ * - What to do with matching traffic (forward, redirect, block)
14
+ * - How to handle TLS (passthrough, terminate, terminate-and-reencrypt)
15
+ * - Security settings (IP restrictions, connection limits)
16
+ * - Advanced options (timeout, headers, etc.)
17
+ */
18
+ export declare class SmartProxy extends plugins.EventEmitter {
19
+ private portManager;
20
+ private connectionLogger;
21
+ private isShuttingDown;
22
+ private connectionManager;
23
+ private securityManager;
24
+ private tlsManager;
25
+ private networkProxyBridge;
26
+ private timeoutManager;
27
+ routeManager: RouteManager;
28
+ private routeConnectionHandler;
29
+ private nftablesManager;
30
+ private port80Handler;
31
+ private certProvisioner?;
32
+ /**
33
+ * Constructor for SmartProxy
34
+ *
35
+ * @param settingsArg Configuration options containing routes and other settings
36
+ * Routes define how traffic is matched and handled, with each route having:
37
+ * - match: criteria for matching traffic (ports, domains, paths, IPs)
38
+ * - action: what to do with matched traffic (forward, redirect, block)
39
+ *
40
+ * Example:
41
+ * ```ts
42
+ * const proxy = new SmartProxy({
43
+ * routes: [
44
+ * {
45
+ * match: {
46
+ * ports: 443,
47
+ * domains: ['example.com', '*.example.com']
48
+ * },
49
+ * action: {
50
+ * type: 'forward',
51
+ * target: { host: '10.0.0.1', port: 8443 },
52
+ * tls: { mode: 'passthrough' }
53
+ * }
54
+ * }
55
+ * ],
56
+ * defaults: {
57
+ * target: { host: 'localhost', port: 8080 },
58
+ * security: { ipAllowList: ['*'] }
59
+ * }
60
+ * });
61
+ * ```
62
+ */
63
+ constructor(settingsArg: ISmartProxyOptions);
64
+ /**
65
+ * The settings for the SmartProxy
66
+ */
67
+ settings: ISmartProxyOptions;
68
+ /**
69
+ * Initialize the Port80Handler for ACME certificate management
70
+ */
71
+ private initializePort80Handler;
72
+ /**
73
+ * Start the proxy server with support for both configuration types
74
+ */
75
+ start(): Promise<void>;
76
+ /**
77
+ * Extract domain configurations from routes for certificate provisioning
78
+ *
79
+ * Note: This method has been removed as we now work directly with routes
80
+ */
81
+ /**
82
+ * Stop the proxy server
83
+ */
84
+ stop(): Promise<void>;
85
+ /**
86
+ * Updates the domain configurations for the proxy
87
+ *
88
+ * Note: This legacy method has been removed. Use updateRoutes instead.
89
+ */
90
+ updateDomainConfigs(): Promise<void>;
91
+ /**
92
+ * Update routes with new configuration
93
+ *
94
+ * This method replaces the current route configuration with the provided routes.
95
+ * It also provisions certificates for routes that require TLS termination and have
96
+ * `certificate: 'auto'` set in their TLS configuration.
97
+ *
98
+ * @param newRoutes Array of route configurations to use
99
+ *
100
+ * Example:
101
+ * ```ts
102
+ * proxy.updateRoutes([
103
+ * {
104
+ * match: { ports: 443, domains: 'secure.example.com' },
105
+ * action: {
106
+ * type: 'forward',
107
+ * target: { host: '10.0.0.1', port: 8443 },
108
+ * tls: { mode: 'terminate', certificate: 'auto' }
109
+ * }
110
+ * }
111
+ * ]);
112
+ * ```
113
+ */
114
+ updateRoutes(newRoutes: IRouteConfig[]): Promise<void>;
115
+ /**
116
+ * Request a certificate for a specific domain
117
+ *
118
+ * @param domain The domain to request a certificate for
119
+ * @param routeName Optional route name to associate with the certificate
120
+ */
121
+ requestCertificate(domain: string, routeName?: string): Promise<boolean>;
122
+ /**
123
+ * Validates if a domain name is valid for certificate issuance
124
+ */
125
+ private isValidDomain;
126
+ /**
127
+ * Add a new listening port without changing the route configuration
128
+ *
129
+ * This allows you to add a port listener without updating routes.
130
+ * Useful for preparing to listen on a port before adding routes for it.
131
+ *
132
+ * @param port The port to start listening on
133
+ * @returns Promise that resolves when the port is listening
134
+ */
135
+ addListeningPort(port: number): Promise<void>;
136
+ /**
137
+ * Stop listening on a specific port without changing the route configuration
138
+ *
139
+ * This allows you to stop a port listener without updating routes.
140
+ * Useful for temporary maintenance or port changes.
141
+ *
142
+ * @param port The port to stop listening on
143
+ * @returns Promise that resolves when the port is closed
144
+ */
145
+ removeListeningPort(port: number): Promise<void>;
146
+ /**
147
+ * Get a list of all ports currently being listened on
148
+ *
149
+ * @returns Array of port numbers
150
+ */
151
+ getListeningPorts(): number[];
152
+ /**
153
+ * Get statistics about current connections
154
+ */
155
+ getStatistics(): any;
156
+ /**
157
+ * Get a list of eligible domains for ACME certificates
158
+ */
159
+ getEligibleDomainsForCertificates(): string[];
160
+ /**
161
+ * Get NFTables status
162
+ */
163
+ getNfTablesStatus(): Promise<Record<string, any>>;
164
+ /**
165
+ * Get status of certificates managed by Port80Handler
166
+ */
167
+ getCertificateStatus(): any;
168
+ }