@push.rocks/smartproxy 18.0.2 → 18.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/certificate/certificate-manager.d.ts +150 -0
- package/dist_ts/certificate/certificate-manager.js +505 -0
- package/dist_ts/certificate/events/simplified-events.d.ts +56 -0
- package/dist_ts/certificate/events/simplified-events.js +13 -0
- package/dist_ts/certificate/models/certificate-errors.d.ts +69 -0
- package/dist_ts/certificate/models/certificate-errors.js +141 -0
- package/dist_ts/certificate/models/certificate-strategy.d.ts +60 -0
- package/dist_ts/certificate/models/certificate-strategy.js +73 -0
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +150 -0
- package/dist_ts/certificate/simplified-certificate-manager.js +501 -0
- package/dist_ts/http/index.d.ts +1 -9
- package/dist_ts/http/index.js +5 -11
- package/dist_ts/plugins.d.ts +3 -1
- package/dist_ts/plugins.js +4 -2
- package/dist_ts/proxies/network-proxy/network-proxy.js +3 -1
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +48 -0
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +76 -0
- package/dist_ts/proxies/network-proxy/websocket-handler.js +41 -4
- package/dist_ts/proxies/smart-proxy/cert-store.d.ts +10 -0
- package/dist_ts/proxies/smart-proxy/cert-store.js +70 -0
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +116 -0
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +401 -0
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +168 -0
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +642 -0
- package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +26 -0
- package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +65 -0
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +31 -0
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +102 -0
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +73 -0
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +10 -44
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +66 -202
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +4 -0
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +62 -2
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +132 -0
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +18 -13
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +79 -196
- package/package.json +7 -5
- package/readme.md +224 -10
- package/readme.plan.md +1405 -617
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/http/index.ts +5 -12
- package/ts/plugins.ts +4 -1
- package/ts/proxies/network-proxy/network-proxy.ts +3 -0
- package/ts/proxies/network-proxy/websocket-handler.ts +38 -3
- package/ts/proxies/smart-proxy/cert-store.ts +86 -0
- package/ts/proxies/smart-proxy/certificate-manager.ts +506 -0
- package/ts/proxies/smart-proxy/models/route-types.ts +33 -3
- package/ts/proxies/smart-proxy/network-proxy-bridge.ts +86 -239
- package/ts/proxies/smart-proxy/route-connection-handler.ts +74 -1
- package/ts/proxies/smart-proxy/smart-proxy.ts +105 -222
|
@@ -0,0 +1,401 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import { NetworkProxy } from '../network-proxy/index.js';
|
|
3
|
+
import { CertStore } from './cert-store.js';
|
|
4
|
+
export class SmartCertManager {
|
|
5
|
+
constructor(routes, certDir = './certs', acmeOptions) {
|
|
6
|
+
this.routes = routes;
|
|
7
|
+
this.certDir = certDir;
|
|
8
|
+
this.acmeOptions = acmeOptions;
|
|
9
|
+
this.smartAcme = null;
|
|
10
|
+
this.networkProxy = null;
|
|
11
|
+
this.renewalTimer = null;
|
|
12
|
+
this.pendingChallenges = new Map();
|
|
13
|
+
this.challengeRoute = null;
|
|
14
|
+
// Track certificate status by route name
|
|
15
|
+
this.certStatus = new Map();
|
|
16
|
+
this.certStore = new CertStore(certDir);
|
|
17
|
+
}
|
|
18
|
+
setNetworkProxy(networkProxy) {
|
|
19
|
+
this.networkProxy = networkProxy;
|
|
20
|
+
}
|
|
21
|
+
/**
|
|
22
|
+
* Set callback for updating routes (used for challenge routes)
|
|
23
|
+
*/
|
|
24
|
+
setUpdateRoutesCallback(callback) {
|
|
25
|
+
this.updateRoutesCallback = callback;
|
|
26
|
+
}
|
|
27
|
+
/**
|
|
28
|
+
* Initialize certificate manager and provision certificates for all routes
|
|
29
|
+
*/
|
|
30
|
+
async initialize() {
|
|
31
|
+
// Create certificate directory if it doesn't exist
|
|
32
|
+
await this.certStore.initialize();
|
|
33
|
+
// Initialize SmartAcme if we have any ACME routes
|
|
34
|
+
const hasAcmeRoutes = this.routes.some(r => r.action.tls?.certificate === 'auto');
|
|
35
|
+
if (hasAcmeRoutes && this.acmeOptions?.email) {
|
|
36
|
+
// Create HTTP-01 challenge handler
|
|
37
|
+
const http01Handler = new plugins.smartacme.handlers.Http01MemoryHandler();
|
|
38
|
+
// Set up challenge handler integration with our routing
|
|
39
|
+
this.setupChallengeHandler(http01Handler);
|
|
40
|
+
// Create SmartAcme instance with built-in MemoryCertManager and HTTP-01 handler
|
|
41
|
+
this.smartAcme = new plugins.smartacme.SmartAcme({
|
|
42
|
+
accountEmail: this.acmeOptions.email,
|
|
43
|
+
environment: this.acmeOptions.useProduction ? 'production' : 'integration',
|
|
44
|
+
certManager: new plugins.smartacme.certmanagers.MemoryCertManager(),
|
|
45
|
+
challengeHandlers: [http01Handler]
|
|
46
|
+
});
|
|
47
|
+
await this.smartAcme.start();
|
|
48
|
+
}
|
|
49
|
+
// Provision certificates for all routes
|
|
50
|
+
await this.provisionAllCertificates();
|
|
51
|
+
// Start renewal timer
|
|
52
|
+
this.startRenewalTimer();
|
|
53
|
+
}
|
|
54
|
+
/**
|
|
55
|
+
* Provision certificates for all routes that need them
|
|
56
|
+
*/
|
|
57
|
+
async provisionAllCertificates() {
|
|
58
|
+
const certRoutes = this.routes.filter(r => r.action.tls?.mode === 'terminate' ||
|
|
59
|
+
r.action.tls?.mode === 'terminate-and-reencrypt');
|
|
60
|
+
for (const route of certRoutes) {
|
|
61
|
+
try {
|
|
62
|
+
await this.provisionCertificate(route);
|
|
63
|
+
}
|
|
64
|
+
catch (error) {
|
|
65
|
+
console.error(`Failed to provision certificate for route ${route.name}: ${error}`);
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
}
|
|
69
|
+
/**
|
|
70
|
+
* Provision certificate for a single route
|
|
71
|
+
*/
|
|
72
|
+
async provisionCertificate(route) {
|
|
73
|
+
const tls = route.action.tls;
|
|
74
|
+
if (!tls || (tls.mode !== 'terminate' && tls.mode !== 'terminate-and-reencrypt')) {
|
|
75
|
+
return;
|
|
76
|
+
}
|
|
77
|
+
const domains = this.extractDomainsFromRoute(route);
|
|
78
|
+
if (domains.length === 0) {
|
|
79
|
+
console.warn(`Route ${route.name} has TLS termination but no domains`);
|
|
80
|
+
return;
|
|
81
|
+
}
|
|
82
|
+
const primaryDomain = domains[0];
|
|
83
|
+
if (tls.certificate === 'auto') {
|
|
84
|
+
// ACME certificate
|
|
85
|
+
await this.provisionAcmeCertificate(route, domains);
|
|
86
|
+
}
|
|
87
|
+
else if (typeof tls.certificate === 'object') {
|
|
88
|
+
// Static certificate
|
|
89
|
+
await this.provisionStaticCertificate(route, primaryDomain, tls.certificate);
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
/**
|
|
93
|
+
* Provision ACME certificate
|
|
94
|
+
*/
|
|
95
|
+
async provisionAcmeCertificate(route, domains) {
|
|
96
|
+
if (!this.smartAcme) {
|
|
97
|
+
throw new Error('SmartAcme not initialized');
|
|
98
|
+
}
|
|
99
|
+
const primaryDomain = domains[0];
|
|
100
|
+
const routeName = route.name || primaryDomain;
|
|
101
|
+
// Check if we already have a valid certificate
|
|
102
|
+
const existingCert = await this.certStore.getCertificate(routeName);
|
|
103
|
+
if (existingCert && this.isCertificateValid(existingCert)) {
|
|
104
|
+
console.log(`Using existing valid certificate for ${primaryDomain}`);
|
|
105
|
+
await this.applyCertificate(primaryDomain, existingCert);
|
|
106
|
+
this.updateCertStatus(routeName, 'valid', 'acme', existingCert);
|
|
107
|
+
return;
|
|
108
|
+
}
|
|
109
|
+
console.log(`Requesting ACME certificate for ${domains.join(', ')}`);
|
|
110
|
+
this.updateCertStatus(routeName, 'pending', 'acme');
|
|
111
|
+
try {
|
|
112
|
+
// Add challenge route before requesting certificate
|
|
113
|
+
await this.addChallengeRoute();
|
|
114
|
+
try {
|
|
115
|
+
// Use smartacme to get certificate
|
|
116
|
+
const cert = await this.smartAcme.getCertificateForDomain(primaryDomain);
|
|
117
|
+
// SmartAcme's Cert object has these properties:
|
|
118
|
+
// - publicKey: The certificate PEM string
|
|
119
|
+
// - privateKey: The private key PEM string
|
|
120
|
+
// - csr: Certificate signing request
|
|
121
|
+
// - validUntil: Timestamp in milliseconds
|
|
122
|
+
// - domainName: The domain name
|
|
123
|
+
const certData = {
|
|
124
|
+
cert: cert.publicKey,
|
|
125
|
+
key: cert.privateKey,
|
|
126
|
+
ca: cert.publicKey, // Use same as cert for now
|
|
127
|
+
expiryDate: new Date(cert.validUntil),
|
|
128
|
+
issueDate: new Date(cert.created)
|
|
129
|
+
};
|
|
130
|
+
await this.certStore.saveCertificate(routeName, certData);
|
|
131
|
+
await this.applyCertificate(primaryDomain, certData);
|
|
132
|
+
this.updateCertStatus(routeName, 'valid', 'acme', certData);
|
|
133
|
+
console.log(`Successfully provisioned ACME certificate for ${primaryDomain}`);
|
|
134
|
+
}
|
|
135
|
+
catch (error) {
|
|
136
|
+
console.error(`Failed to provision ACME certificate for ${primaryDomain}: ${error}`);
|
|
137
|
+
this.updateCertStatus(routeName, 'error', 'acme', undefined, error.message);
|
|
138
|
+
throw error;
|
|
139
|
+
}
|
|
140
|
+
finally {
|
|
141
|
+
// Always remove challenge route after provisioning
|
|
142
|
+
await this.removeChallengeRoute();
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
catch (error) {
|
|
146
|
+
// Handle outer try-catch from adding challenge route
|
|
147
|
+
console.error(`Failed to setup ACME challenge for ${primaryDomain}: ${error}`);
|
|
148
|
+
this.updateCertStatus(routeName, 'error', 'acme', undefined, error.message);
|
|
149
|
+
throw error;
|
|
150
|
+
}
|
|
151
|
+
}
|
|
152
|
+
/**
|
|
153
|
+
* Provision static certificate
|
|
154
|
+
*/
|
|
155
|
+
async provisionStaticCertificate(route, domain, certConfig) {
|
|
156
|
+
const routeName = route.name || domain;
|
|
157
|
+
try {
|
|
158
|
+
let key = certConfig.key;
|
|
159
|
+
let cert = certConfig.cert;
|
|
160
|
+
// Load from files if paths are provided
|
|
161
|
+
if (certConfig.keyFile) {
|
|
162
|
+
const keyFile = await plugins.smartfile.SmartFile.fromFilePath(certConfig.keyFile);
|
|
163
|
+
key = keyFile.contents.toString();
|
|
164
|
+
}
|
|
165
|
+
if (certConfig.certFile) {
|
|
166
|
+
const certFile = await plugins.smartfile.SmartFile.fromFilePath(certConfig.certFile);
|
|
167
|
+
cert = certFile.contents.toString();
|
|
168
|
+
}
|
|
169
|
+
// Parse certificate to get dates
|
|
170
|
+
// Parse certificate to get dates - for now just use defaults
|
|
171
|
+
// TODO: Implement actual certificate parsing if needed
|
|
172
|
+
const certInfo = { validTo: new Date(Date.now() + 90 * 24 * 60 * 60 * 1000), validFrom: new Date() };
|
|
173
|
+
const certData = {
|
|
174
|
+
cert,
|
|
175
|
+
key,
|
|
176
|
+
expiryDate: certInfo.validTo,
|
|
177
|
+
issueDate: certInfo.validFrom
|
|
178
|
+
};
|
|
179
|
+
// Save to store for consistency
|
|
180
|
+
await this.certStore.saveCertificate(routeName, certData);
|
|
181
|
+
await this.applyCertificate(domain, certData);
|
|
182
|
+
this.updateCertStatus(routeName, 'valid', 'static', certData);
|
|
183
|
+
console.log(`Successfully loaded static certificate for ${domain}`);
|
|
184
|
+
}
|
|
185
|
+
catch (error) {
|
|
186
|
+
console.error(`Failed to provision static certificate for ${domain}: ${error}`);
|
|
187
|
+
this.updateCertStatus(routeName, 'error', 'static', undefined, error.message);
|
|
188
|
+
throw error;
|
|
189
|
+
}
|
|
190
|
+
}
|
|
191
|
+
/**
|
|
192
|
+
* Apply certificate to NetworkProxy
|
|
193
|
+
*/
|
|
194
|
+
async applyCertificate(domain, certData) {
|
|
195
|
+
if (!this.networkProxy) {
|
|
196
|
+
console.warn('NetworkProxy not set, cannot apply certificate');
|
|
197
|
+
return;
|
|
198
|
+
}
|
|
199
|
+
// Apply certificate to NetworkProxy
|
|
200
|
+
this.networkProxy.updateCertificate(domain, certData.cert, certData.key);
|
|
201
|
+
// Also apply for wildcard if it's a subdomain
|
|
202
|
+
if (domain.includes('.') && !domain.startsWith('*.')) {
|
|
203
|
+
const parts = domain.split('.');
|
|
204
|
+
if (parts.length >= 2) {
|
|
205
|
+
const wildcardDomain = `*.${parts.slice(-2).join('.')}`;
|
|
206
|
+
this.networkProxy.updateCertificate(wildcardDomain, certData.cert, certData.key);
|
|
207
|
+
}
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
/**
|
|
211
|
+
* Extract domains from route configuration
|
|
212
|
+
*/
|
|
213
|
+
extractDomainsFromRoute(route) {
|
|
214
|
+
if (!route.match.domains) {
|
|
215
|
+
return [];
|
|
216
|
+
}
|
|
217
|
+
const domains = Array.isArray(route.match.domains)
|
|
218
|
+
? route.match.domains
|
|
219
|
+
: [route.match.domains];
|
|
220
|
+
// Filter out wildcards and patterns
|
|
221
|
+
return domains.filter(d => !d.includes('*') &&
|
|
222
|
+
!d.includes('{') &&
|
|
223
|
+
d.includes('.'));
|
|
224
|
+
}
|
|
225
|
+
/**
|
|
226
|
+
* Check if certificate is valid
|
|
227
|
+
*/
|
|
228
|
+
isCertificateValid(cert) {
|
|
229
|
+
const now = new Date();
|
|
230
|
+
const expiryThreshold = new Date(now.getTime() + 30 * 24 * 60 * 60 * 1000); // 30 days
|
|
231
|
+
return cert.expiryDate > expiryThreshold;
|
|
232
|
+
}
|
|
233
|
+
/**
|
|
234
|
+
* Add challenge route to SmartProxy
|
|
235
|
+
*/
|
|
236
|
+
async addChallengeRoute() {
|
|
237
|
+
if (!this.updateRoutesCallback) {
|
|
238
|
+
throw new Error('No route update callback set');
|
|
239
|
+
}
|
|
240
|
+
if (!this.challengeRoute) {
|
|
241
|
+
throw new Error('Challenge route not initialized');
|
|
242
|
+
}
|
|
243
|
+
const challengeRoute = this.challengeRoute;
|
|
244
|
+
const updatedRoutes = [...this.routes, challengeRoute];
|
|
245
|
+
await this.updateRoutesCallback(updatedRoutes);
|
|
246
|
+
}
|
|
247
|
+
/**
|
|
248
|
+
* Remove challenge route from SmartProxy
|
|
249
|
+
*/
|
|
250
|
+
async removeChallengeRoute() {
|
|
251
|
+
if (!this.updateRoutesCallback) {
|
|
252
|
+
return;
|
|
253
|
+
}
|
|
254
|
+
const filteredRoutes = this.routes.filter(r => r.name !== 'acme-challenge');
|
|
255
|
+
await this.updateRoutesCallback(filteredRoutes);
|
|
256
|
+
}
|
|
257
|
+
/**
|
|
258
|
+
* Start renewal timer
|
|
259
|
+
*/
|
|
260
|
+
startRenewalTimer() {
|
|
261
|
+
// Check for renewals every 12 hours
|
|
262
|
+
this.renewalTimer = setInterval(() => {
|
|
263
|
+
this.checkAndRenewCertificates();
|
|
264
|
+
}, 12 * 60 * 60 * 1000);
|
|
265
|
+
// Also do an immediate check
|
|
266
|
+
this.checkAndRenewCertificates();
|
|
267
|
+
}
|
|
268
|
+
/**
|
|
269
|
+
* Check and renew certificates that are expiring
|
|
270
|
+
*/
|
|
271
|
+
async checkAndRenewCertificates() {
|
|
272
|
+
for (const route of this.routes) {
|
|
273
|
+
if (route.action.tls?.certificate === 'auto') {
|
|
274
|
+
const routeName = route.name || this.extractDomainsFromRoute(route)[0];
|
|
275
|
+
const cert = await this.certStore.getCertificate(routeName);
|
|
276
|
+
if (cert && !this.isCertificateValid(cert)) {
|
|
277
|
+
console.log(`Certificate for ${routeName} needs renewal`);
|
|
278
|
+
try {
|
|
279
|
+
await this.provisionCertificate(route);
|
|
280
|
+
}
|
|
281
|
+
catch (error) {
|
|
282
|
+
console.error(`Failed to renew certificate for ${routeName}: ${error}`);
|
|
283
|
+
}
|
|
284
|
+
}
|
|
285
|
+
}
|
|
286
|
+
}
|
|
287
|
+
}
|
|
288
|
+
/**
|
|
289
|
+
* Update certificate status
|
|
290
|
+
*/
|
|
291
|
+
updateCertStatus(routeName, status, source, certData, error) {
|
|
292
|
+
this.certStatus.set(routeName, {
|
|
293
|
+
domain: routeName,
|
|
294
|
+
status,
|
|
295
|
+
source,
|
|
296
|
+
expiryDate: certData?.expiryDate,
|
|
297
|
+
issueDate: certData?.issueDate,
|
|
298
|
+
error
|
|
299
|
+
});
|
|
300
|
+
}
|
|
301
|
+
/**
|
|
302
|
+
* Get certificate status for a route
|
|
303
|
+
*/
|
|
304
|
+
getCertificateStatus(routeName) {
|
|
305
|
+
return this.certStatus.get(routeName);
|
|
306
|
+
}
|
|
307
|
+
/**
|
|
308
|
+
* Force renewal of a certificate
|
|
309
|
+
*/
|
|
310
|
+
async renewCertificate(routeName) {
|
|
311
|
+
const route = this.routes.find(r => r.name === routeName);
|
|
312
|
+
if (!route) {
|
|
313
|
+
throw new Error(`Route ${routeName} not found`);
|
|
314
|
+
}
|
|
315
|
+
// Remove existing certificate to force renewal
|
|
316
|
+
await this.certStore.deleteCertificate(routeName);
|
|
317
|
+
await this.provisionCertificate(route);
|
|
318
|
+
}
|
|
319
|
+
/**
|
|
320
|
+
* Setup challenge handler integration with SmartProxy routing
|
|
321
|
+
*/
|
|
322
|
+
setupChallengeHandler(http01Handler) {
|
|
323
|
+
// Create a challenge route that delegates to SmartAcme's HTTP-01 handler
|
|
324
|
+
const challengeRoute = {
|
|
325
|
+
name: 'acme-challenge',
|
|
326
|
+
priority: 1000, // High priority
|
|
327
|
+
match: {
|
|
328
|
+
ports: 80,
|
|
329
|
+
path: '/.well-known/acme-challenge/*'
|
|
330
|
+
},
|
|
331
|
+
action: {
|
|
332
|
+
type: 'static',
|
|
333
|
+
handler: async (context) => {
|
|
334
|
+
// Extract the token from the path
|
|
335
|
+
const token = context.path?.split('/').pop();
|
|
336
|
+
if (!token) {
|
|
337
|
+
return { status: 404, body: 'Not found' };
|
|
338
|
+
}
|
|
339
|
+
// Create mock request/response objects for SmartAcme
|
|
340
|
+
const mockReq = {
|
|
341
|
+
url: context.path,
|
|
342
|
+
method: 'GET',
|
|
343
|
+
headers: context.headers || {}
|
|
344
|
+
};
|
|
345
|
+
let responseData = null;
|
|
346
|
+
const mockRes = {
|
|
347
|
+
statusCode: 200,
|
|
348
|
+
setHeader: (name, value) => { },
|
|
349
|
+
end: (data) => {
|
|
350
|
+
responseData = data;
|
|
351
|
+
}
|
|
352
|
+
};
|
|
353
|
+
// Use SmartAcme's handler
|
|
354
|
+
const handled = await new Promise((resolve) => {
|
|
355
|
+
http01Handler.handleRequest(mockReq, mockRes, () => {
|
|
356
|
+
resolve(false);
|
|
357
|
+
});
|
|
358
|
+
// Give it a moment to process
|
|
359
|
+
setTimeout(() => resolve(true), 100);
|
|
360
|
+
});
|
|
361
|
+
if (handled && responseData) {
|
|
362
|
+
return {
|
|
363
|
+
status: mockRes.statusCode,
|
|
364
|
+
headers: { 'Content-Type': 'text/plain' },
|
|
365
|
+
body: responseData
|
|
366
|
+
};
|
|
367
|
+
}
|
|
368
|
+
else {
|
|
369
|
+
return { status: 404, body: 'Not found' };
|
|
370
|
+
}
|
|
371
|
+
}
|
|
372
|
+
}
|
|
373
|
+
};
|
|
374
|
+
// Store the challenge route to add it when needed
|
|
375
|
+
this.challengeRoute = challengeRoute;
|
|
376
|
+
}
|
|
377
|
+
/**
|
|
378
|
+
* Stop certificate manager
|
|
379
|
+
*/
|
|
380
|
+
async stop() {
|
|
381
|
+
if (this.renewalTimer) {
|
|
382
|
+
clearInterval(this.renewalTimer);
|
|
383
|
+
this.renewalTimer = null;
|
|
384
|
+
}
|
|
385
|
+
if (this.smartAcme) {
|
|
386
|
+
await this.smartAcme.stop();
|
|
387
|
+
}
|
|
388
|
+
// Remove any active challenge routes
|
|
389
|
+
if (this.pendingChallenges.size > 0) {
|
|
390
|
+
this.pendingChallenges.clear();
|
|
391
|
+
await this.removeChallengeRoute();
|
|
392
|
+
}
|
|
393
|
+
}
|
|
394
|
+
/**
|
|
395
|
+
* Get ACME options (for recreating after route updates)
|
|
396
|
+
*/
|
|
397
|
+
getAcmeOptions() {
|
|
398
|
+
return this.acmeOptions;
|
|
399
|
+
}
|
|
400
|
+
}
|
|
401
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate-manager.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/certificate-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AAEzD,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAmB5C,MAAM,OAAO,gBAAgB;IAc3B,YACU,MAAsB,EACtB,UAAkB,SAAS,EAC3B,WAIP;QANO,WAAM,GAAN,MAAM,CAAgB;QACtB,YAAO,GAAP,OAAO,CAAoB;QAC3B,gBAAW,GAAX,WAAW,CAIlB;QAnBK,cAAS,GAAuC,IAAI,CAAC;QACrD,iBAAY,GAAwB,IAAI,CAAC;QACzC,iBAAY,GAA0B,IAAI,CAAC;QAC3C,sBAAiB,GAAwB,IAAI,GAAG,EAAE,CAAC;QACnD,mBAAc,GAAwB,IAAI,CAAC;QAEnD,yCAAyC;QACjC,eAAU,GAA6B,IAAI,GAAG,EAAE,CAAC;QAcvD,IAAI,CAAC,SAAS,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,CAAC;IAC1C,CAAC;IAEM,eAAe,CAAC,YAA0B;QAC/C,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;IACnC,CAAC;IAED;;OAEG;IACI,uBAAuB,CAAC,QAAmD;QAChF,IAAI,CAAC,oBAAoB,GAAG,QAAQ,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,mDAAmD;QACnD,MAAM,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;QAElC,kDAAkD;QAClD,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CACzC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,CACrC,CAAC;QAEF,IAAI,aAAa,IAAI,IAAI,CAAC,WAAW,EAAE,KAAK,EAAE,CAAC;YAC7C,mCAAmC;YACnC,MAAM,aAAa,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,mBAAmB,EAAE,CAAC;YAE3E,wDAAwD;YACxD,IAAI,CAAC,qBAAqB,CAAC,aAAa,CAAC,CAAC;YAE1C,gFAAgF;YAChF,IAAI,CAAC,SAAS,GAAG,IAAI,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC;gBAC/C,YAAY,EAAE,IAAI,CAAC,WAAW,CAAC,KAAK;gBACpC,WAAW,EAAE,IAAI,CAAC,WAAW,CAAC,aAAa,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,aAAa;gBAC1E,WAAW,EAAE,IAAI,OAAO,CAAC,SAAS,CAAC,YAAY,CAAC,iBAAiB,EAAE;gBACnE,iBAAiB,EAAE,CAAC,aAAa,CAAC;aACnC,CAAC,CAAC;YAEH,MAAM,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,CAAC;QAC/B,CAAC;QAED,wCAAwC;QACxC,MAAM,IAAI,CAAC,wBAAwB,EAAE,CAAC;QAEtC,sBAAsB;QACtB,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB;QACpC,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACxC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;YAClC,CAAC,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,yBAAyB,CACjD,CAAC;QAEF,KAAK,MAAM,KAAK,IAAI,UAAU,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,KAAK,CAAC,6CAA6C,KAAK,CAAC,IAAI,KAAK,KAAK,EAAE,CAAC,CAAC;YACrF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,oBAAoB,CAAC,KAAmB;QACnD,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC;QAC7B,IAAI,CAAC,GAAG,IAAI,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC,EAAE,CAAC;YACjF,OAAO;QACT,CAAC;QAED,MAAM,OAAO,GAAG,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC;QACpD,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACzB,OAAO,CAAC,IAAI,CAAC,SAAS,KAAK,CAAC,IAAI,qCAAqC,CAAC,CAAC;YACvE,OAAO;QACT,CAAC;QAED,MAAM,aAAa,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;QAEjC,IAAI,GAAG,CAAC,WAAW,KAAK,MAAM,EAAE,CAAC;YAC/B,mBAAmB;YACnB,MAAM,IAAI,CAAC,wBAAwB,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACtD,CAAC;aAAM,IAAI,OAAO,GAAG,CAAC,WAAW,KAAK,QAAQ,EAAE,CAAC;YAC/C,qBAAqB;YACrB,MAAM,IAAI,CAAC,0BAA0B,CAAC,KAAK,EAAE,aAAa,EAAE,GAAG,CAAC,WAAW,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB,CACpC,KAAmB,EACnB,OAAiB;QAEjB,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QAC/C,CAAC;QAED,MAAM,aAAa,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;QACjC,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,aAAa,CAAC;QAE9C,+CAA+C;QAC/C,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QACpE,IAAI,YAAY,IAAI,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,EAAE,CAAC;YAC1D,OAAO,CAAC,GAAG,CAAC,wCAAwC,aAAa,EAAE,CAAC,CAAC;YACrE,MAAM,IAAI,CAAC,gBAAgB,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC;YACzD,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,YAAY,CAAC,CAAC;YAChE,OAAO;QACT,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,mCAAmC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACrE,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;QAEpD,IAAI,CAAC;YACH,oDAAoD;YACpD,MAAM,IAAI,CAAC,iBAAiB,EAAE,CAAC;YAE/B,IAAI,CAAC;gBACH,mCAAmC;gBACnC,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAE3E,gDAAgD;gBAChD,4CAA4C;gBAC5C,2CAA2C;gBAC3C,qCAAqC;gBACrC,0CAA0C;gBAC1C,gCAAgC;gBAChC,MAAM,QAAQ,GAAqB;oBACjC,IAAI,EAAE,IAAI,CAAC,SAAS;oBACpB,GAAG,EAAE,IAAI,CAAC,UAAU;oBACpB,EAAE,EAAE,IAAI,CAAC,SAAS,EAAE,2BAA2B;oBAC/C,UAAU,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC;oBACrC,SAAS,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;iBAClC,CAAC;gBAEF,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;gBAC1D,MAAM,IAAI,CAAC,gBAAgB,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;gBACrD,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,QAAQ,CAAC,CAAC;gBAE1D,OAAO,CAAC,GAAG,CAAC,iDAAiD,aAAa,EAAE,CAAC,CAAC;YAChF,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,KAAK,CAAC,4CAA4C,aAAa,KAAK,KAAK,EAAE,CAAC,CAAC;gBACrF,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC5E,MAAM,KAAK,CAAC;YACd,CAAC;oBAAS,CAAC;gBACT,mDAAmD;gBACnD,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;YACpC,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,qDAAqD;YACrD,OAAO,CAAC,KAAK,CAAC,sCAAsC,aAAa,KAAK,KAAK,EAAE,CAAC,CAAC;YAC/E,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;YAC5E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,0BAA0B,CACtC,KAAmB,EACnB,MAAc,EACd,UAA8E;QAE9E,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,MAAM,CAAC;QAEvC,IAAI,CAAC;YACH,IAAI,GAAG,GAAW,UAAU,CAAC,GAAG,CAAC;YACjC,IAAI,IAAI,GAAW,UAAU,CAAC,IAAI,CAAC;YAEnC,wCAAwC;YACxC,IAAI,UAAU,CAAC,OAAO,EAAE,CAAC;gBACvB,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;gBACnF,GAAG,GAAG,OAAO,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;YACpC,CAAC;YACD,IAAI,UAAU,CAAC,QAAQ,EAAE,CAAC;gBACxB,MAAM,QAAQ,GAAG,MAAM,OAAO,CAAC,SAAS,CAAC,SAAS,CAAC,YAAY,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;gBACrF,IAAI,GAAG,QAAQ,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;YACtC,CAAC;YAED,iCAAiC;YACjC,6DAA6D;YAC7D,uDAAuD;YACvD,MAAM,QAAQ,GAAG,EAAE,OAAO,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,EAAE,SAAS,EAAE,IAAI,IAAI,EAAE,EAAE,CAAC;YAErG,MAAM,QAAQ,GAAqB;gBACjC,IAAI;gBACJ,GAAG;gBACH,UAAU,EAAE,QAAQ,CAAC,OAAO;gBAC5B,SAAS,EAAE,QAAQ,CAAC,SAAS;aAC9B,CAAC;YAEF,gCAAgC;YAChC,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;YAC1D,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;YAC9C,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,CAAC,CAAC;YAE9D,OAAO,CAAC,GAAG,CAAC,8CAA8C,MAAM,EAAE,CAAC,CAAC;QACtE,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,8CAA8C,MAAM,KAAK,KAAK,EAAE,CAAC,CAAC;YAChF,IAAI,CAAC,gBAAgB,CAAC,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;YAC9E,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,MAAc,EAAE,QAA0B;QACvE,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,IAAI,CAAC,gDAAgD,CAAC,CAAC;YAC/D,OAAO;QACT,CAAC;QAED,oCAAoC;QACpC,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,MAAM,EAAE,QAAQ,CAAC,IAAI,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC;QAEzE,8CAA8C;QAC9C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;YACrD,MAAM,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAChC,IAAI,KAAK,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBACtB,MAAM,cAAc,GAAG,KAAK,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;gBACxD,IAAI,CAAC,YAAY,CAAC,iBAAiB,CAAC,cAAc,EAAE,QAAQ,CAAC,IAAI,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC;YACnF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB,CAAC,KAAmB;QACjD,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YACzB,OAAO,EAAE,CAAC;QACZ,CAAC;QAED,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;YAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;YACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QAE1B,oCAAoC;QACpC,OAAO,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CACxB,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC;YAChB,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC;YAChB,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,CAChB,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,IAAsB;QAC/C,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,eAAe,GAAG,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,UAAU;QAEtF,OAAO,IAAI,CAAC,UAAU,GAAG,eAAe,CAAC;IAC3C,CAAC;IAGD;;OAEG;IACK,KAAK,CAAC,iBAAiB;QAC7B,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC/B,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;QACrD,CAAC;QACD,MAAM,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;QAE3C,MAAM,aAAa,GAAG,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;QACvD,MAAM,IAAI,CAAC,oBAAoB,CAAC,aAAa,CAAC,CAAC;IACjD,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB;QAChC,IAAI,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC;YAC/B,OAAO;QACT,CAAC;QAED,MAAM,cAAc,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,gBAAgB,CAAC,CAAC;QAC5E,MAAM,IAAI,CAAC,oBAAoB,CAAC,cAAc,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,oCAAoC;QACpC,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE;YACnC,IAAI,CAAC,yBAAyB,EAAE,CAAC;QACnC,CAAC,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAExB,6BAA6B;QAC7B,IAAI,CAAC,yBAAyB,EAAE,CAAC;IACnC,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB;QACrC,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChC,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM,EAAE,CAAC;gBAC7C,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,IAAI,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;gBACvE,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;gBAE5D,IAAI,IAAI,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC3C,OAAO,CAAC,GAAG,CAAC,mBAAmB,SAAS,gBAAgB,CAAC,CAAC;oBAC1D,IAAI,CAAC;wBACH,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;oBACzC,CAAC;oBAAC,OAAO,KAAK,EAAE,CAAC;wBACf,OAAO,CAAC,KAAK,CAAC,mCAAmC,SAAS,KAAK,KAAK,EAAE,CAAC,CAAC;oBAC1E,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB,CACtB,SAAiB,EACjB,MAA6B,EAC7B,MAA6B,EAC7B,QAA2B,EAC3B,KAAc;QAEd,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,EAAE;YAC7B,MAAM,EAAE,SAAS;YACjB,MAAM;YACN,MAAM;YACN,UAAU,EAAE,QAAQ,EAAE,UAAU;YAChC,SAAS,EAAE,QAAQ,EAAE,SAAS;YAC9B,KAAK;SACN,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,oBAAoB,CAAC,SAAiB;QAC3C,OAAO,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;IACxC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,SAAiB;QAC7C,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;QAC1D,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,SAAS,SAAS,YAAY,CAAC,CAAC;QAClD,CAAC;QAED,+CAA+C;QAC/C,MAAM,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;QAClD,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACK,qBAAqB,CAAC,aAA6D;QACzF,yEAAyE;QACzE,MAAM,cAAc,GAAiB;YACnC,IAAI,EAAE,gBAAgB;YACtB,QAAQ,EAAE,IAAI,EAAG,gBAAgB;YACjC,KAAK,EAAE;gBACL,KAAK,EAAE,EAAE;gBACT,IAAI,EAAE,+BAA+B;aACtC;YACD,MAAM,EAAE;gBACN,IAAI,EAAE,QAAQ;gBACd,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,EAAE;oBACzB,kCAAkC;oBAClC,MAAM,KAAK,GAAG,OAAO,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;oBAC7C,IAAI,CAAC,KAAK,EAAE,CAAC;wBACX,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,WAAW,EAAE,CAAC;oBAC5C,CAAC;oBAED,qDAAqD;oBACrD,MAAM,OAAO,GAAG;wBACd,GAAG,EAAE,OAAO,CAAC,IAAI;wBACjB,MAAM,EAAE,KAAK;wBACb,OAAO,EAAE,OAAO,CAAC,OAAO,IAAI,EAAE;qBAC/B,CAAC;oBAEF,IAAI,YAAY,GAAQ,IAAI,CAAC;oBAC7B,MAAM,OAAO,GAAG;wBACd,UAAU,EAAE,GAAG;wBACf,SAAS,EAAE,CAAC,IAAY,EAAE,KAAa,EAAE,EAAE,GAAE,CAAC;wBAC9C,GAAG,EAAE,CAAC,IAAS,EAAE,EAAE;4BACjB,YAAY,GAAG,IAAI,CAAC;wBACtB,CAAC;qBACF,CAAC;oBAEF,0BAA0B;oBAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,OAAO,CAAU,CAAC,OAAO,EAAE,EAAE;wBACrD,aAAa,CAAC,aAAa,CAAC,OAAc,EAAE,OAAc,EAAE,GAAG,EAAE;4BAC/D,OAAO,CAAC,KAAK,CAAC,CAAC;wBACjB,CAAC,CAAC,CAAC;wBACH,8BAA8B;wBAC9B,UAAU,CAAC,GAAG,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,GAAG,CAAC,CAAC;oBACvC,CAAC,CAAC,CAAC;oBAEH,IAAI,OAAO,IAAI,YAAY,EAAE,CAAC;wBAC5B,OAAO;4BACL,MAAM,EAAE,OAAO,CAAC,UAAU;4BAC1B,OAAO,EAAE,EAAE,cAAc,EAAE,YAAY,EAAE;4BACzC,IAAI,EAAE,YAAY;yBACnB,CAAC;oBACJ,CAAC;yBAAM,CAAC;wBACN,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,WAAW,EAAE,CAAC;oBAC5C,CAAC;gBACH,CAAC;aACF;SACF,CAAC;QAEF,kDAAkD;QAClD,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;IACvC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC;QAC3B,CAAC;QAED,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,MAAM,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;QAC9B,CAAC;QAED,qCAAqC;QACrC,IAAI,IAAI,CAAC,iBAAiB,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACpC,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QACpC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;CACF"}
|
|
@@ -0,0 +1,168 @@
|
|
|
1
|
+
import * as plugins from '../../plugins.js';
|
|
2
|
+
import { RouteManager } from './route-manager.js';
|
|
3
|
+
import type { ISmartProxyOptions } from './models/interfaces.js';
|
|
4
|
+
import type { IRouteConfig } from './models/route-types.js';
|
|
5
|
+
/**
|
|
6
|
+
* SmartProxy - Pure route-based API
|
|
7
|
+
*
|
|
8
|
+
* SmartProxy is a unified proxy system that works with routes to define connection handling behavior.
|
|
9
|
+
* Each route contains matching criteria (ports, domains, etc.) and an action to take (forward, redirect, block).
|
|
10
|
+
*
|
|
11
|
+
* Configuration is provided through a set of routes, with each route defining:
|
|
12
|
+
* - What to match (ports, domains, paths, client IPs)
|
|
13
|
+
* - What to do with matching traffic (forward, redirect, block)
|
|
14
|
+
* - How to handle TLS (passthrough, terminate, terminate-and-reencrypt)
|
|
15
|
+
* - Security settings (IP restrictions, connection limits)
|
|
16
|
+
* - Advanced options (timeout, headers, etc.)
|
|
17
|
+
*/
|
|
18
|
+
export declare class SmartProxy extends plugins.EventEmitter {
|
|
19
|
+
private portManager;
|
|
20
|
+
private connectionLogger;
|
|
21
|
+
private isShuttingDown;
|
|
22
|
+
private connectionManager;
|
|
23
|
+
private securityManager;
|
|
24
|
+
private tlsManager;
|
|
25
|
+
private networkProxyBridge;
|
|
26
|
+
private timeoutManager;
|
|
27
|
+
routeManager: RouteManager;
|
|
28
|
+
private routeConnectionHandler;
|
|
29
|
+
private nftablesManager;
|
|
30
|
+
private port80Handler;
|
|
31
|
+
private certProvisioner?;
|
|
32
|
+
/**
|
|
33
|
+
* Constructor for SmartProxy
|
|
34
|
+
*
|
|
35
|
+
* @param settingsArg Configuration options containing routes and other settings
|
|
36
|
+
* Routes define how traffic is matched and handled, with each route having:
|
|
37
|
+
* - match: criteria for matching traffic (ports, domains, paths, IPs)
|
|
38
|
+
* - action: what to do with matched traffic (forward, redirect, block)
|
|
39
|
+
*
|
|
40
|
+
* Example:
|
|
41
|
+
* ```ts
|
|
42
|
+
* const proxy = new SmartProxy({
|
|
43
|
+
* routes: [
|
|
44
|
+
* {
|
|
45
|
+
* match: {
|
|
46
|
+
* ports: 443,
|
|
47
|
+
* domains: ['example.com', '*.example.com']
|
|
48
|
+
* },
|
|
49
|
+
* action: {
|
|
50
|
+
* type: 'forward',
|
|
51
|
+
* target: { host: '10.0.0.1', port: 8443 },
|
|
52
|
+
* tls: { mode: 'passthrough' }
|
|
53
|
+
* }
|
|
54
|
+
* }
|
|
55
|
+
* ],
|
|
56
|
+
* defaults: {
|
|
57
|
+
* target: { host: 'localhost', port: 8080 },
|
|
58
|
+
* security: { ipAllowList: ['*'] }
|
|
59
|
+
* }
|
|
60
|
+
* });
|
|
61
|
+
* ```
|
|
62
|
+
*/
|
|
63
|
+
constructor(settingsArg: ISmartProxyOptions);
|
|
64
|
+
/**
|
|
65
|
+
* The settings for the SmartProxy
|
|
66
|
+
*/
|
|
67
|
+
settings: ISmartProxyOptions;
|
|
68
|
+
/**
|
|
69
|
+
* Initialize the Port80Handler for ACME certificate management
|
|
70
|
+
*/
|
|
71
|
+
private initializePort80Handler;
|
|
72
|
+
/**
|
|
73
|
+
* Start the proxy server with support for both configuration types
|
|
74
|
+
*/
|
|
75
|
+
start(): Promise<void>;
|
|
76
|
+
/**
|
|
77
|
+
* Extract domain configurations from routes for certificate provisioning
|
|
78
|
+
*
|
|
79
|
+
* Note: This method has been removed as we now work directly with routes
|
|
80
|
+
*/
|
|
81
|
+
/**
|
|
82
|
+
* Stop the proxy server
|
|
83
|
+
*/
|
|
84
|
+
stop(): Promise<void>;
|
|
85
|
+
/**
|
|
86
|
+
* Updates the domain configurations for the proxy
|
|
87
|
+
*
|
|
88
|
+
* Note: This legacy method has been removed. Use updateRoutes instead.
|
|
89
|
+
*/
|
|
90
|
+
updateDomainConfigs(): Promise<void>;
|
|
91
|
+
/**
|
|
92
|
+
* Update routes with new configuration
|
|
93
|
+
*
|
|
94
|
+
* This method replaces the current route configuration with the provided routes.
|
|
95
|
+
* It also provisions certificates for routes that require TLS termination and have
|
|
96
|
+
* `certificate: 'auto'` set in their TLS configuration.
|
|
97
|
+
*
|
|
98
|
+
* @param newRoutes Array of route configurations to use
|
|
99
|
+
*
|
|
100
|
+
* Example:
|
|
101
|
+
* ```ts
|
|
102
|
+
* proxy.updateRoutes([
|
|
103
|
+
* {
|
|
104
|
+
* match: { ports: 443, domains: 'secure.example.com' },
|
|
105
|
+
* action: {
|
|
106
|
+
* type: 'forward',
|
|
107
|
+
* target: { host: '10.0.0.1', port: 8443 },
|
|
108
|
+
* tls: { mode: 'terminate', certificate: 'auto' }
|
|
109
|
+
* }
|
|
110
|
+
* }
|
|
111
|
+
* ]);
|
|
112
|
+
* ```
|
|
113
|
+
*/
|
|
114
|
+
updateRoutes(newRoutes: IRouteConfig[]): Promise<void>;
|
|
115
|
+
/**
|
|
116
|
+
* Request a certificate for a specific domain
|
|
117
|
+
*
|
|
118
|
+
* @param domain The domain to request a certificate for
|
|
119
|
+
* @param routeName Optional route name to associate with the certificate
|
|
120
|
+
*/
|
|
121
|
+
requestCertificate(domain: string, routeName?: string): Promise<boolean>;
|
|
122
|
+
/**
|
|
123
|
+
* Validates if a domain name is valid for certificate issuance
|
|
124
|
+
*/
|
|
125
|
+
private isValidDomain;
|
|
126
|
+
/**
|
|
127
|
+
* Add a new listening port without changing the route configuration
|
|
128
|
+
*
|
|
129
|
+
* This allows you to add a port listener without updating routes.
|
|
130
|
+
* Useful for preparing to listen on a port before adding routes for it.
|
|
131
|
+
*
|
|
132
|
+
* @param port The port to start listening on
|
|
133
|
+
* @returns Promise that resolves when the port is listening
|
|
134
|
+
*/
|
|
135
|
+
addListeningPort(port: number): Promise<void>;
|
|
136
|
+
/**
|
|
137
|
+
* Stop listening on a specific port without changing the route configuration
|
|
138
|
+
*
|
|
139
|
+
* This allows you to stop a port listener without updating routes.
|
|
140
|
+
* Useful for temporary maintenance or port changes.
|
|
141
|
+
*
|
|
142
|
+
* @param port The port to stop listening on
|
|
143
|
+
* @returns Promise that resolves when the port is closed
|
|
144
|
+
*/
|
|
145
|
+
removeListeningPort(port: number): Promise<void>;
|
|
146
|
+
/**
|
|
147
|
+
* Get a list of all ports currently being listened on
|
|
148
|
+
*
|
|
149
|
+
* @returns Array of port numbers
|
|
150
|
+
*/
|
|
151
|
+
getListeningPorts(): number[];
|
|
152
|
+
/**
|
|
153
|
+
* Get statistics about current connections
|
|
154
|
+
*/
|
|
155
|
+
getStatistics(): any;
|
|
156
|
+
/**
|
|
157
|
+
* Get a list of eligible domains for ACME certificates
|
|
158
|
+
*/
|
|
159
|
+
getEligibleDomainsForCertificates(): string[];
|
|
160
|
+
/**
|
|
161
|
+
* Get NFTables status
|
|
162
|
+
*/
|
|
163
|
+
getNfTablesStatus(): Promise<Record<string, any>>;
|
|
164
|
+
/**
|
|
165
|
+
* Get status of certificates managed by Port80Handler
|
|
166
|
+
*/
|
|
167
|
+
getCertificateStatus(): any;
|
|
168
|
+
}
|