@push.rocks/smartproxy 19.3.2 → 19.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +12 -12
- package/readme.plan.md +152 -257
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,422 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import { Port80HandlerEvents, CertProvisionerEvents } from '../events/certificate-events.js';
|
|
3
|
-
import { Port80Handler } from '../../http/port80/port80-handler.js';
|
|
4
|
-
/**
|
|
5
|
-
* CertProvisioner manages certificate provisioning and renewal workflows,
|
|
6
|
-
* unifying static certificates and HTTP-01 challenges via Port80Handler.
|
|
7
|
-
*
|
|
8
|
-
* This class directly works with route configurations instead of converting to domain configs.
|
|
9
|
-
*/
|
|
10
|
-
export class CertProvisioner extends plugins.EventEmitter {
|
|
11
|
-
/**
|
|
12
|
-
* Extract routes that need certificates
|
|
13
|
-
* @param routes Route configurations
|
|
14
|
-
*/
|
|
15
|
-
extractCertificateRoutesFromRoutes(routes) {
|
|
16
|
-
const certRoutes = [];
|
|
17
|
-
// Process all HTTPS routes that need certificates
|
|
18
|
-
for (const route of routes) {
|
|
19
|
-
// Only process routes with TLS termination that need certificates
|
|
20
|
-
if (route.action.type === 'forward' &&
|
|
21
|
-
route.action.tls &&
|
|
22
|
-
(route.action.tls.mode === 'terminate' || route.action.tls.mode === 'terminate-and-reencrypt') &&
|
|
23
|
-
route.match.domains) {
|
|
24
|
-
// Extract domains from the route
|
|
25
|
-
const domains = Array.isArray(route.match.domains)
|
|
26
|
-
? route.match.domains
|
|
27
|
-
: [route.match.domains];
|
|
28
|
-
// For each domain in the route, create a certRoute entry
|
|
29
|
-
for (const domain of domains) {
|
|
30
|
-
// Skip wildcard domains that can't use ACME unless we have a certProvider
|
|
31
|
-
if (domain.includes('*') && (!this.certProvisionFunction || this.certProvisionFunction.length === 0)) {
|
|
32
|
-
console.warn(`Skipping wildcard domain that requires a certProvisionFunction: ${domain}`);
|
|
33
|
-
continue;
|
|
34
|
-
}
|
|
35
|
-
certRoutes.push({
|
|
36
|
-
domain,
|
|
37
|
-
route,
|
|
38
|
-
tlsMode: route.action.tls.mode
|
|
39
|
-
});
|
|
40
|
-
}
|
|
41
|
-
}
|
|
42
|
-
}
|
|
43
|
-
return certRoutes;
|
|
44
|
-
}
|
|
45
|
-
/**
|
|
46
|
-
* Constructor for CertProvisioner
|
|
47
|
-
*
|
|
48
|
-
* @param routeConfigs Array of route configurations
|
|
49
|
-
* @param port80Handler HTTP-01 challenge handler instance
|
|
50
|
-
* @param networkProxyBridge Bridge for applying external certificates
|
|
51
|
-
* @param certProvider Optional callback returning a static cert or 'http01'
|
|
52
|
-
* @param renewThresholdDays Days before expiry to trigger renewals
|
|
53
|
-
* @param renewCheckIntervalHours Interval in hours to check for renewals
|
|
54
|
-
* @param autoRenew Whether to automatically schedule renewals
|
|
55
|
-
* @param routeForwards Route-specific forwarding configs for ACME challenges
|
|
56
|
-
*/
|
|
57
|
-
constructor(routeConfigs, port80Handler, networkProxyBridge, certProvider, renewThresholdDays = 30, renewCheckIntervalHours = 24, autoRenew = true, routeForwards = []) {
|
|
58
|
-
super();
|
|
59
|
-
this.certRoutes = [];
|
|
60
|
-
this.routeConfigs = routeConfigs;
|
|
61
|
-
this.port80Handler = port80Handler;
|
|
62
|
-
this.networkProxyBridge = networkProxyBridge;
|
|
63
|
-
this.certProvisionFunction = certProvider;
|
|
64
|
-
this.renewThresholdDays = renewThresholdDays;
|
|
65
|
-
this.renewCheckIntervalHours = renewCheckIntervalHours;
|
|
66
|
-
this.autoRenew = autoRenew;
|
|
67
|
-
this.provisionMap = new Map();
|
|
68
|
-
this.routeForwards = routeForwards;
|
|
69
|
-
// Extract certificate routes during instantiation
|
|
70
|
-
this.certRoutes = this.extractCertificateRoutesFromRoutes(routeConfigs);
|
|
71
|
-
}
|
|
72
|
-
/**
|
|
73
|
-
* Start initial provisioning and schedule renewals.
|
|
74
|
-
*/
|
|
75
|
-
async start() {
|
|
76
|
-
// Subscribe to Port80Handler certificate events
|
|
77
|
-
this.setupEventSubscriptions();
|
|
78
|
-
// Apply route forwarding for ACME challenges
|
|
79
|
-
this.setupForwardingConfigs();
|
|
80
|
-
// Initial provisioning for all domains in routes
|
|
81
|
-
await this.provisionAllCertificates();
|
|
82
|
-
// Schedule renewals if enabled
|
|
83
|
-
if (this.autoRenew) {
|
|
84
|
-
this.scheduleRenewals();
|
|
85
|
-
}
|
|
86
|
-
}
|
|
87
|
-
/**
|
|
88
|
-
* Set up event subscriptions for certificate events
|
|
89
|
-
*/
|
|
90
|
-
setupEventSubscriptions() {
|
|
91
|
-
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_ISSUED, (data) => {
|
|
92
|
-
// Add route reference if we have it
|
|
93
|
-
const routeRef = this.findRouteForDomain(data.domain);
|
|
94
|
-
const enhancedData = {
|
|
95
|
-
...data,
|
|
96
|
-
source: 'http01',
|
|
97
|
-
isRenewal: false,
|
|
98
|
-
routeReference: routeRef ? {
|
|
99
|
-
routeId: routeRef.route.name,
|
|
100
|
-
routeName: routeRef.route.name
|
|
101
|
-
} : undefined
|
|
102
|
-
};
|
|
103
|
-
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, enhancedData);
|
|
104
|
-
});
|
|
105
|
-
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_RENEWED, (data) => {
|
|
106
|
-
// Add route reference if we have it
|
|
107
|
-
const routeRef = this.findRouteForDomain(data.domain);
|
|
108
|
-
const enhancedData = {
|
|
109
|
-
...data,
|
|
110
|
-
source: 'http01',
|
|
111
|
-
isRenewal: true,
|
|
112
|
-
routeReference: routeRef ? {
|
|
113
|
-
routeId: routeRef.route.name,
|
|
114
|
-
routeName: routeRef.route.name
|
|
115
|
-
} : undefined
|
|
116
|
-
};
|
|
117
|
-
this.emit(CertProvisionerEvents.CERTIFICATE_RENEWED, enhancedData);
|
|
118
|
-
});
|
|
119
|
-
this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_FAILED, (error) => {
|
|
120
|
-
this.emit(CertProvisionerEvents.CERTIFICATE_FAILED, error);
|
|
121
|
-
});
|
|
122
|
-
}
|
|
123
|
-
/**
|
|
124
|
-
* Find a route for a given domain
|
|
125
|
-
*/
|
|
126
|
-
findRouteForDomain(domain) {
|
|
127
|
-
return this.certRoutes.find(certRoute => certRoute.domain === domain);
|
|
128
|
-
}
|
|
129
|
-
/**
|
|
130
|
-
* Set up forwarding configurations for the Port80Handler
|
|
131
|
-
*/
|
|
132
|
-
setupForwardingConfigs() {
|
|
133
|
-
for (const config of this.routeForwards) {
|
|
134
|
-
const domainOptions = {
|
|
135
|
-
domainName: config.domain,
|
|
136
|
-
sslRedirect: config.sslRedirect || false,
|
|
137
|
-
acmeMaintenance: false,
|
|
138
|
-
forward: config.target ? {
|
|
139
|
-
ip: config.target.host,
|
|
140
|
-
port: config.target.port
|
|
141
|
-
} : undefined
|
|
142
|
-
};
|
|
143
|
-
this.port80Handler.addDomain(domainOptions);
|
|
144
|
-
}
|
|
145
|
-
}
|
|
146
|
-
/**
|
|
147
|
-
* Provision certificates for all routes that need them
|
|
148
|
-
*/
|
|
149
|
-
async provisionAllCertificates() {
|
|
150
|
-
for (const certRoute of this.certRoutes) {
|
|
151
|
-
await this.provisionCertificateForRoute(certRoute);
|
|
152
|
-
}
|
|
153
|
-
}
|
|
154
|
-
/**
|
|
155
|
-
* Provision a certificate for a route
|
|
156
|
-
*/
|
|
157
|
-
async provisionCertificateForRoute(certRoute) {
|
|
158
|
-
const { domain, route } = certRoute;
|
|
159
|
-
const isWildcard = domain.includes('*');
|
|
160
|
-
let provision = 'http01';
|
|
161
|
-
// Try to get a certificate from the provision function
|
|
162
|
-
if (this.certProvisionFunction) {
|
|
163
|
-
try {
|
|
164
|
-
provision = await this.certProvisionFunction(domain);
|
|
165
|
-
}
|
|
166
|
-
catch (err) {
|
|
167
|
-
console.error(`certProvider error for ${domain} on route ${route.name || 'unnamed'}:`, err);
|
|
168
|
-
}
|
|
169
|
-
}
|
|
170
|
-
else if (isWildcard) {
|
|
171
|
-
// No certProvider: cannot handle wildcard without DNS-01 support
|
|
172
|
-
console.warn(`Skipping wildcard domain without certProvisionFunction: ${domain}`);
|
|
173
|
-
return;
|
|
174
|
-
}
|
|
175
|
-
// Store the route reference with the provision type
|
|
176
|
-
this.provisionMap.set(domain, {
|
|
177
|
-
type: provision === 'http01' || provision === 'dns01' ? provision : 'static',
|
|
178
|
-
routeRef: certRoute
|
|
179
|
-
});
|
|
180
|
-
// Handle different provisioning methods
|
|
181
|
-
if (provision === 'http01') {
|
|
182
|
-
if (isWildcard) {
|
|
183
|
-
console.warn(`Skipping HTTP-01 for wildcard domain: ${domain}`);
|
|
184
|
-
return;
|
|
185
|
-
}
|
|
186
|
-
this.port80Handler.addDomain({
|
|
187
|
-
domainName: domain,
|
|
188
|
-
sslRedirect: true,
|
|
189
|
-
acmeMaintenance: true,
|
|
190
|
-
routeReference: {
|
|
191
|
-
routeId: route.name || domain,
|
|
192
|
-
routeName: route.name
|
|
193
|
-
}
|
|
194
|
-
});
|
|
195
|
-
}
|
|
196
|
-
else if (provision === 'dns01') {
|
|
197
|
-
// DNS-01 challenges would be handled by the certProvisionFunction
|
|
198
|
-
// DNS-01 handling would go here if implemented
|
|
199
|
-
console.log(`DNS-01 challenge type set for ${domain}`);
|
|
200
|
-
}
|
|
201
|
-
else {
|
|
202
|
-
// Static certificate (e.g., DNS-01 provisioned or user-provided)
|
|
203
|
-
const certObj = provision;
|
|
204
|
-
const certData = {
|
|
205
|
-
domain: certObj.domainName,
|
|
206
|
-
certificate: certObj.publicKey,
|
|
207
|
-
privateKey: certObj.privateKey,
|
|
208
|
-
expiryDate: new Date(certObj.validUntil),
|
|
209
|
-
source: 'static',
|
|
210
|
-
isRenewal: false,
|
|
211
|
-
routeReference: {
|
|
212
|
-
routeId: route.name || domain,
|
|
213
|
-
routeName: route.name
|
|
214
|
-
}
|
|
215
|
-
};
|
|
216
|
-
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
217
|
-
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
|
|
218
|
-
}
|
|
219
|
-
}
|
|
220
|
-
/**
|
|
221
|
-
* Schedule certificate renewals using a task manager
|
|
222
|
-
*/
|
|
223
|
-
scheduleRenewals() {
|
|
224
|
-
this.renewManager = new plugins.taskbuffer.TaskManager();
|
|
225
|
-
const renewTask = new plugins.taskbuffer.Task({
|
|
226
|
-
name: 'CertificateRenewals',
|
|
227
|
-
taskFunction: async () => await this.performRenewals()
|
|
228
|
-
});
|
|
229
|
-
const hours = this.renewCheckIntervalHours;
|
|
230
|
-
const cronExpr = `0 0 */${hours} * * *`;
|
|
231
|
-
this.renewManager.addAndScheduleTask(renewTask, cronExpr);
|
|
232
|
-
this.renewManager.start();
|
|
233
|
-
}
|
|
234
|
-
/**
|
|
235
|
-
* Perform renewals for all domains that need it
|
|
236
|
-
*/
|
|
237
|
-
async performRenewals() {
|
|
238
|
-
for (const [domain, info] of this.provisionMap.entries()) {
|
|
239
|
-
// Skip wildcard domains for HTTP-01 challenges
|
|
240
|
-
if (domain.includes('*') && info.type === 'http01')
|
|
241
|
-
continue;
|
|
242
|
-
try {
|
|
243
|
-
await this.renewCertificateForDomain(domain, info.type, info.routeRef);
|
|
244
|
-
}
|
|
245
|
-
catch (err) {
|
|
246
|
-
console.error(`Renewal error for ${domain}:`, err);
|
|
247
|
-
}
|
|
248
|
-
}
|
|
249
|
-
}
|
|
250
|
-
/**
|
|
251
|
-
* Renew a certificate for a specific domain
|
|
252
|
-
* @param domain Domain to renew
|
|
253
|
-
* @param provisionType Type of provisioning for this domain
|
|
254
|
-
* @param certRoute The route reference for this domain
|
|
255
|
-
*/
|
|
256
|
-
async renewCertificateForDomain(domain, provisionType, certRoute) {
|
|
257
|
-
if (provisionType === 'http01') {
|
|
258
|
-
await this.port80Handler.renewCertificate(domain);
|
|
259
|
-
}
|
|
260
|
-
else if ((provisionType === 'static' || provisionType === 'dns01') && this.certProvisionFunction) {
|
|
261
|
-
const provision = await this.certProvisionFunction(domain);
|
|
262
|
-
if (provision !== 'http01' && provision !== 'dns01') {
|
|
263
|
-
const certObj = provision;
|
|
264
|
-
const routeRef = certRoute?.route;
|
|
265
|
-
const certData = {
|
|
266
|
-
domain: certObj.domainName,
|
|
267
|
-
certificate: certObj.publicKey,
|
|
268
|
-
privateKey: certObj.privateKey,
|
|
269
|
-
expiryDate: new Date(certObj.validUntil),
|
|
270
|
-
source: 'static',
|
|
271
|
-
isRenewal: true,
|
|
272
|
-
routeReference: routeRef ? {
|
|
273
|
-
routeId: routeRef.name || domain,
|
|
274
|
-
routeName: routeRef.name
|
|
275
|
-
} : undefined
|
|
276
|
-
};
|
|
277
|
-
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
278
|
-
this.emit(CertProvisionerEvents.CERTIFICATE_RENEWED, certData);
|
|
279
|
-
}
|
|
280
|
-
}
|
|
281
|
-
}
|
|
282
|
-
/**
|
|
283
|
-
* Stop all scheduled renewal tasks.
|
|
284
|
-
*/
|
|
285
|
-
async stop() {
|
|
286
|
-
if (this.renewManager) {
|
|
287
|
-
this.renewManager.stop();
|
|
288
|
-
}
|
|
289
|
-
}
|
|
290
|
-
/**
|
|
291
|
-
* Request a certificate on-demand for the given domain.
|
|
292
|
-
* This will look for a matching route configuration and provision accordingly.
|
|
293
|
-
*
|
|
294
|
-
* @param domain Domain name to provision
|
|
295
|
-
*/
|
|
296
|
-
async requestCertificate(domain) {
|
|
297
|
-
const isWildcard = domain.includes('*');
|
|
298
|
-
// Find matching route
|
|
299
|
-
const certRoute = this.findRouteForDomain(domain);
|
|
300
|
-
// Determine provisioning method
|
|
301
|
-
let provision = 'http01';
|
|
302
|
-
if (this.certProvisionFunction) {
|
|
303
|
-
provision = await this.certProvisionFunction(domain);
|
|
304
|
-
}
|
|
305
|
-
else if (isWildcard) {
|
|
306
|
-
// Cannot perform HTTP-01 on wildcard without certProvider
|
|
307
|
-
throw new Error(`Cannot request certificate for wildcard domain without certProvisionFunction: ${domain}`);
|
|
308
|
-
}
|
|
309
|
-
if (provision === 'http01') {
|
|
310
|
-
if (isWildcard) {
|
|
311
|
-
throw new Error(`Cannot request HTTP-01 certificate for wildcard domain: ${domain}`);
|
|
312
|
-
}
|
|
313
|
-
await this.port80Handler.renewCertificate(domain);
|
|
314
|
-
}
|
|
315
|
-
else if (provision === 'dns01') {
|
|
316
|
-
// DNS-01 challenges would be handled by external mechanisms
|
|
317
|
-
console.log(`DNS-01 challenge requested for ${domain}`);
|
|
318
|
-
}
|
|
319
|
-
else {
|
|
320
|
-
// Static certificate (e.g., DNS-01 provisioned) supports wildcards
|
|
321
|
-
const certObj = provision;
|
|
322
|
-
const certData = {
|
|
323
|
-
domain: certObj.domainName,
|
|
324
|
-
certificate: certObj.publicKey,
|
|
325
|
-
privateKey: certObj.privateKey,
|
|
326
|
-
expiryDate: new Date(certObj.validUntil),
|
|
327
|
-
source: 'static',
|
|
328
|
-
isRenewal: false,
|
|
329
|
-
routeReference: certRoute ? {
|
|
330
|
-
routeId: certRoute.route.name || domain,
|
|
331
|
-
routeName: certRoute.route.name
|
|
332
|
-
} : undefined
|
|
333
|
-
};
|
|
334
|
-
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
335
|
-
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
|
|
336
|
-
}
|
|
337
|
-
}
|
|
338
|
-
/**
|
|
339
|
-
* Add a new domain for certificate provisioning
|
|
340
|
-
*
|
|
341
|
-
* @param domain Domain to add
|
|
342
|
-
* @param options Domain configuration options
|
|
343
|
-
*/
|
|
344
|
-
async addDomain(domain, options) {
|
|
345
|
-
const domainOptions = {
|
|
346
|
-
domainName: domain,
|
|
347
|
-
sslRedirect: options?.sslRedirect ?? true,
|
|
348
|
-
acmeMaintenance: options?.acmeMaintenance ?? true,
|
|
349
|
-
routeReference: {
|
|
350
|
-
routeId: options?.routeId,
|
|
351
|
-
routeName: options?.routeName
|
|
352
|
-
}
|
|
353
|
-
};
|
|
354
|
-
this.port80Handler.addDomain(domainOptions);
|
|
355
|
-
// Find matching route or create a generic one
|
|
356
|
-
const existingRoute = this.findRouteForDomain(domain);
|
|
357
|
-
if (existingRoute) {
|
|
358
|
-
await this.provisionCertificateForRoute(existingRoute);
|
|
359
|
-
}
|
|
360
|
-
else {
|
|
361
|
-
// We don't have a route, just provision the domain
|
|
362
|
-
const isWildcard = domain.includes('*');
|
|
363
|
-
let provision = 'http01';
|
|
364
|
-
if (this.certProvisionFunction) {
|
|
365
|
-
provision = await this.certProvisionFunction(domain);
|
|
366
|
-
}
|
|
367
|
-
else if (isWildcard) {
|
|
368
|
-
throw new Error(`Cannot request certificate for wildcard domain without certProvisionFunction: ${domain}`);
|
|
369
|
-
}
|
|
370
|
-
this.provisionMap.set(domain, {
|
|
371
|
-
type: provision === 'http01' || provision === 'dns01' ? provision : 'static'
|
|
372
|
-
});
|
|
373
|
-
if (provision !== 'http01' && provision !== 'dns01') {
|
|
374
|
-
const certObj = provision;
|
|
375
|
-
const certData = {
|
|
376
|
-
domain: certObj.domainName,
|
|
377
|
-
certificate: certObj.publicKey,
|
|
378
|
-
privateKey: certObj.privateKey,
|
|
379
|
-
expiryDate: new Date(certObj.validUntil),
|
|
380
|
-
source: 'static',
|
|
381
|
-
isRenewal: false,
|
|
382
|
-
routeReference: {
|
|
383
|
-
routeId: options?.routeId,
|
|
384
|
-
routeName: options?.routeName
|
|
385
|
-
}
|
|
386
|
-
};
|
|
387
|
-
this.networkProxyBridge.applyExternalCertificate(certData);
|
|
388
|
-
this.emit(CertProvisionerEvents.CERTIFICATE_ISSUED, certData);
|
|
389
|
-
}
|
|
390
|
-
}
|
|
391
|
-
}
|
|
392
|
-
/**
|
|
393
|
-
* Update routes with new configurations
|
|
394
|
-
* This replaces all existing routes with new ones and re-provisions certificates as needed
|
|
395
|
-
*
|
|
396
|
-
* @param newRoutes New route configurations to use
|
|
397
|
-
*/
|
|
398
|
-
async updateRoutes(newRoutes) {
|
|
399
|
-
// Store the new route configs
|
|
400
|
-
this.routeConfigs = newRoutes;
|
|
401
|
-
// Extract new certificate routes
|
|
402
|
-
const newCertRoutes = this.extractCertificateRoutesFromRoutes(newRoutes);
|
|
403
|
-
// Find domains that no longer need certificates
|
|
404
|
-
const oldDomains = new Set(this.certRoutes.map(r => r.domain));
|
|
405
|
-
const newDomains = new Set(newCertRoutes.map(r => r.domain));
|
|
406
|
-
// Domains to remove
|
|
407
|
-
const domainsToRemove = [...oldDomains].filter(d => !newDomains.has(d));
|
|
408
|
-
// Remove obsolete domains from provision map
|
|
409
|
-
for (const domain of domainsToRemove) {
|
|
410
|
-
this.provisionMap.delete(domain);
|
|
411
|
-
}
|
|
412
|
-
// Update the cert routes
|
|
413
|
-
this.certRoutes = newCertRoutes;
|
|
414
|
-
// Provision certificates for new routes
|
|
415
|
-
for (const certRoute of newCertRoutes) {
|
|
416
|
-
if (!oldDomains.has(certRoute.domain)) {
|
|
417
|
-
await this.provisionCertificateForRoute(certRoute);
|
|
418
|
-
}
|
|
419
|
-
}
|
|
420
|
-
}
|
|
421
|
-
}
|
|
422
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cert-provisioner.js","sourceRoot":"","sources":["../../../ts/certificate/providers/cert-provisioner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAG5C,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,iCAAiC,CAAC;AAC7F,OAAO,EAAE,aAAa,EAAE,MAAM,qCAAqC,CAAC;AAqBpE;;;;;GAKG;AACH,MAAM,OAAO,eAAgB,SAAQ,OAAO,CAAC,YAAY;IAcvD;;;OAGG;IACK,kCAAkC,CAAC,MAAsB;QAC/D,MAAM,UAAU,GAAiB,EAAE,CAAC;QAEpC,kDAAkD;QAClD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,kEAAkE;YAClE,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG;gBAChB,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,WAAW,IAAI,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,KAAK,yBAAyB,CAAC;gBAC9F,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;gBAExB,iCAAiC;gBACjC,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;oBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBAE1B,yDAAyD;gBACzD,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;oBAC7B,0EAA0E;oBAC1E,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,qBAAqB,CAAC,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;wBACrG,OAAO,CAAC,IAAI,CAAC,mEAAmE,MAAM,EAAE,CAAC,CAAC;wBAC1F,SAAS;oBACX,CAAC;oBAED,UAAU,CAAC,IAAI,CAAC;wBACd,MAAM;wBACN,KAAK;wBACL,OAAO,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI;qBAC/B,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,UAAU,CAAC;IACpB,CAAC;IAED;;;;;;;;;;;OAWG;IACH,YACE,YAA4B,EAC5B,aAA4B,EAC5B,kBAAuC,EACvC,YAAgE,EAChE,qBAA6B,EAAE,EAC/B,0BAAkC,EAAE,EACpC,YAAqB,IAAI,EACzB,gBAAuC,EAAE;QAEzC,KAAK,EAAE,CAAC;QA1EF,eAAU,GAAiB,EAAE,CAAC;QA2EpC,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,qBAAqB,GAAG,YAAY,CAAC;QAC1C,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,uBAAuB,GAAG,uBAAuB,CAAC;QACvD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,YAAY,GAAG,IAAI,GAAG,EAAE,CAAC;QAC9B,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QAEnC,kDAAkD;QAClD,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC,kCAAkC,CAAC,YAAY,CAAC,CAAC;IAC1E,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,gDAAgD;QAChD,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,6CAA6C;QAC7C,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAE9B,iDAAiD;QACjD,MAAM,IAAI,CAAC,wBAAwB,EAAE,CAAC;QAEtC,+BAA+B;QAC/B,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC;IAED;;OAEG;IACK,uBAAuB;QAC7B,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACvF,oCAAoC;YACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,YAAY,GAAqB;gBACrC,GAAG,IAAI;gBACP,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;oBACzB,OAAO,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;oBAC5B,SAAS,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;iBAC/B,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,YAAY,CAAC,CAAC;QACpE,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,mBAAmB,EAAE,CAAC,IAAsB,EAAE,EAAE;YACxF,oCAAoC;YACpC,MAAM,QAAQ,GAAG,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,YAAY,GAAqB;gBACrC,GAAG,IAAI;gBACP,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,IAAI;gBACf,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;oBACzB,OAAO,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;oBAC5B,SAAS,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI;iBAC/B,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,YAAY,CAAC,CAAC;QACrE,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,mBAAmB,CAAC,kBAAkB,EAAE,CAAC,KAAK,EAAE,EAAE;YACtE,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,MAAc;QACvC,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC;IACxE,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;YACxC,MAAM,aAAa,GAAmB;gBACpC,UAAU,EAAE,MAAM,CAAC,MAAM;gBACzB,WAAW,EAAE,MAAM,CAAC,WAAW,IAAI,KAAK;gBACxC,eAAe,EAAE,KAAK;gBACtB,OAAO,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;oBACvB,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI;oBACtB,IAAI,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI;iBACzB,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YACF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,wBAAwB;QACpC,KAAK,MAAM,SAAS,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;YACxC,MAAM,IAAI,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;QACrD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,4BAA4B,CAAC,SAAqB;QAC9D,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,GAAG,SAAS,CAAC;QACpC,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,uDAAuD;QACvD,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,0BAA0B,MAAM,aAAa,KAAK,CAAC,IAAI,IAAI,SAAS,GAAG,EAAE,GAAG,CAAC,CAAC;YAC9F,CAAC;QACH,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,iEAAiE;YACjE,OAAO,CAAC,IAAI,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YAClF,OAAO;QACT,CAAC;QAED,oDAAoD;QACpD,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE;YAC5B,IAAI,EAAE,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;YAC5E,QAAQ,EAAE,SAAS;SACpB,CAAC,CAAC;QAEH,wCAAwC;QACxC,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO,CAAC,IAAI,CAAC,yCAAyC,MAAM,EAAE,CAAC,CAAC;gBAChE,OAAO;YACT,CAAC;YAED,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC;gBAC3B,UAAU,EAAE,MAAM;gBAClB,WAAW,EAAE,IAAI;gBACjB,eAAe,EAAE,IAAI;gBACrB,cAAc,EAAE;oBACd,OAAO,EAAE,KAAK,CAAC,IAAI,IAAI,MAAM;oBAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;iBACtB;aACF,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,kEAAkE;YAClE,+CAA+C;YAC/C,OAAO,CAAC,GAAG,CAAC,iCAAiC,MAAM,EAAE,CAAC,CAAC;QACzD,CAAC;aAAM,CAAC;YACN,iEAAiE;YACjE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE;oBACd,OAAO,EAAE,KAAK,CAAC,IAAI,IAAI,MAAM;oBAC7B,SAAS,EAAE,KAAK,CAAC,IAAI;iBACtB;aACF,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,gBAAgB;QACtB,IAAI,CAAC,YAAY,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC;QAEzD,MAAM,SAAS,GAAG,IAAI,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC;YAC5C,IAAI,EAAE,qBAAqB;YAC3B,YAAY,EAAE,KAAK,IAAI,EAAE,CAAC,MAAM,IAAI,CAAC,eAAe,EAAE;SACvD,CAAC,CAAC;QAEH,MAAM,KAAK,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3C,MAAM,QAAQ,GAAG,SAAS,KAAK,QAAQ,CAAC;QAExC,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAC1D,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;IAC5B,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,EAAE,CAAC;YACzD,+CAA+C;YAC/C,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC,IAAI,KAAK,QAAQ;gBAAE,SAAS;YAE7D,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;YACzE,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,qBAAqB,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,yBAAyB,CACrC,MAAc,EACd,aAA4C,EAC5C,SAAsB;QAEtB,IAAI,aAAa,KAAK,QAAQ,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,CAAC,aAAa,KAAK,QAAQ,IAAI,aAAa,KAAK,OAAO,CAAC,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YACnG,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YAE3D,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAG,SAAS,EAAE,KAAK,CAAC;gBAElC,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,IAAI;oBACf,cAAc,EAAE,QAAQ,CAAC,CAAC,CAAC;wBACzB,OAAO,EAAE,QAAQ,CAAC,IAAI,IAAI,MAAM;wBAChC,SAAS,EAAE,QAAQ,CAAC,IAAI;qBACzB,CAAC,CAAC,CAAC,SAAS;iBACd,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC;YACjE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;QAC3B,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACxC,sBAAsB;QACtB,MAAM,SAAS,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAElD,gCAAgC;QAChC,IAAI,SAAS,GAAyB,QAAQ,CAAC;QAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;YAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;aAAM,IAAI,UAAU,EAAE,CAAC;YACtB,0DAA0D;YAC1D,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;QAC7G,CAAC;QAED,IAAI,SAAS,KAAK,QAAQ,EAAE,CAAC;YAC3B,IAAI,UAAU,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,2DAA2D,MAAM,EAAE,CAAC,CAAC;YACvF,CAAC;YACD,MAAM,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QACpD,CAAC;aAAM,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;YACjC,4DAA4D;YAC5D,OAAO,CAAC,GAAG,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC1D,CAAC;aAAM,CAAC;YACN,mEAAmE;YACnE,MAAM,OAAO,GAAG,SAA0C,CAAC;YAC3D,MAAM,QAAQ,GAAqB;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;gBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;gBACxC,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,KAAK;gBAChB,cAAc,EAAE,SAAS,CAAC,CAAC,CAAC;oBAC1B,OAAO,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI,IAAI,MAAM;oBACvC,SAAS,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI;iBAChC,CAAC,CAAC,CAAC,SAAS;aACd,CAAC;YAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;YAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,SAAS,CAAC,MAAc,EAAE,OAKtC;QACC,MAAM,aAAa,GAAmB;YACpC,UAAU,EAAE,MAAM;YAClB,WAAW,EAAE,OAAO,EAAE,WAAW,IAAI,IAAI;YACzC,eAAe,EAAE,OAAO,EAAE,eAAe,IAAI,IAAI;YACjD,cAAc,EAAE;gBACd,OAAO,EAAE,OAAO,EAAE,OAAO;gBACzB,SAAS,EAAE,OAAO,EAAE,SAAS;aAC9B;SACF,CAAC;QAEF,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC;QAE5C,8CAA8C;QAC9C,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QACtD,IAAI,aAAa,EAAE,CAAC;YAClB,MAAM,IAAI,CAAC,4BAA4B,CAAC,aAAa,CAAC,CAAC;QACzD,CAAC;aAAM,CAAC;YACN,mDAAmD;YACnD,MAAM,UAAU,GAAG,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;YACxC,IAAI,SAAS,GAAyB,QAAQ,CAAC;YAE/C,IAAI,IAAI,CAAC,qBAAqB,EAAE,CAAC;gBAC/B,SAAS,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;YACvD,CAAC;iBAAM,IAAI,UAAU,EAAE,CAAC;gBACtB,MAAM,IAAI,KAAK,CAAC,iFAAiF,MAAM,EAAE,CAAC,CAAC;YAC7G,CAAC;YAED,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,MAAM,EAAE;gBAC5B,IAAI,EAAE,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;aAC7E,CAAC,CAAC;YAEH,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;gBACpD,MAAM,OAAO,GAAG,SAA0C,CAAC;gBAC3D,MAAM,QAAQ,GAAqB;oBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;oBAC1B,WAAW,EAAE,OAAO,CAAC,SAAS;oBAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;oBAC9B,UAAU,EAAE,IAAI,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC;oBACxC,MAAM,EAAE,QAAQ;oBAChB,SAAS,EAAE,KAAK;oBAChB,cAAc,EAAE;wBACd,OAAO,EAAE,OAAO,EAAE,OAAO;wBACzB,SAAS,EAAE,OAAO,EAAE,SAAS;qBAC9B;iBACF,CAAC;gBAEF,IAAI,CAAC,kBAAkB,CAAC,wBAAwB,CAAC,QAAQ,CAAC,CAAC;gBAC3D,IAAI,CAAC,IAAI,CAAC,qBAAqB,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,YAAY,CAAC,SAAyB;QACjD,8BAA8B;QAC9B,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;QAE9B,iCAAiC;QACjC,MAAM,aAAa,GAAG,IAAI,CAAC,kCAAkC,CAAC,SAAS,CAAC,CAAC;QAEzE,gDAAgD;QAChD,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAC/D,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAE7D,oBAAoB;QACpB,MAAM,eAAe,GAAG,CAAC,GAAG,UAAU,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAExE,6CAA6C;QAC7C,KAAK,MAAM,MAAM,IAAI,eAAe,EAAE,CAAC;YACrC,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC;QAED,yBAAyB;QACzB,IAAI,CAAC,UAAU,GAAG,aAAa,CAAC;QAEhC,wCAAwC;QACxC,KAAK,MAAM,SAAS,IAAI,aAAa,EAAE,CAAC;YACtC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC;gBACtC,MAAM,IAAI,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
|
|
@@ -1,5 +0,0 @@
|
|
|
1
|
-
export {};
|
|
2
|
-
/**
|
|
3
|
-
* Certificate providers
|
|
4
|
-
*/
|
|
5
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9jZXJ0aWZpY2F0ZS9wcm92aWRlcnMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IjtBQUFBOztHQUVHIn0=
|
|
@@ -1,150 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Simplified, unified certificate manager for SmartProxy
|
|
3
|
-
*/
|
|
4
|
-
import * as plugins from '../plugins.js';
|
|
5
|
-
import type { CertProvider } from './models/certificate-strategy.js';
|
|
6
|
-
import type { CertificateEventMap, ICertificateEventEmitter } from './events/simplified-events.js';
|
|
7
|
-
import type { IRouteConfig } from '../proxies/smart-proxy/models/route-types.js';
|
|
8
|
-
/**
|
|
9
|
-
* Certificate storage format
|
|
10
|
-
*/
|
|
11
|
-
interface StoredCertificate {
|
|
12
|
-
domain: string;
|
|
13
|
-
certificate: string;
|
|
14
|
-
privateKey: string;
|
|
15
|
-
expiresAt: Date;
|
|
16
|
-
source: 'acme-http' | 'acme-dns' | 'static';
|
|
17
|
-
}
|
|
18
|
-
/**
|
|
19
|
-
* Certificate manager configuration
|
|
20
|
-
*/
|
|
21
|
-
export interface CertificateManagerConfig {
|
|
22
|
-
certProvider: CertProvider;
|
|
23
|
-
acmeEmail: string;
|
|
24
|
-
acmeServer: 'production' | 'staging';
|
|
25
|
-
storageDir?: string;
|
|
26
|
-
renewBeforeDays?: number;
|
|
27
|
-
defaultCertPath?: string;
|
|
28
|
-
defaultKeyPath?: string;
|
|
29
|
-
}
|
|
30
|
-
/**
|
|
31
|
-
* Unified certificate manager
|
|
32
|
-
*/
|
|
33
|
-
export declare class SimplifiedCertificateManager extends plugins.EventEmitter implements ICertificateEventEmitter {
|
|
34
|
-
private config;
|
|
35
|
-
private certificateCache;
|
|
36
|
-
private acmeClient;
|
|
37
|
-
private renewalTimer?;
|
|
38
|
-
private pendingRequests;
|
|
39
|
-
constructor(config: CertificateManagerConfig);
|
|
40
|
-
/**
|
|
41
|
-
* Initialize the certificate manager
|
|
42
|
-
*/
|
|
43
|
-
start(): Promise<void>;
|
|
44
|
-
/**
|
|
45
|
-
* Stop the certificate manager
|
|
46
|
-
*/
|
|
47
|
-
stop(): Promise<void>;
|
|
48
|
-
/**
|
|
49
|
-
* Get a certificate for a domain (main entry point)
|
|
50
|
-
*/
|
|
51
|
-
getCertificate(domain: string): Promise<StoredCertificate>;
|
|
52
|
-
/**
|
|
53
|
-
* Request a new certificate
|
|
54
|
-
*/
|
|
55
|
-
private requestCertificate;
|
|
56
|
-
/**
|
|
57
|
-
* Request certificate via ACME HTTP-01
|
|
58
|
-
*/
|
|
59
|
-
private requestAcmeHttpCertificate;
|
|
60
|
-
/**
|
|
61
|
-
* Request certificate via ACME DNS-01
|
|
62
|
-
*/
|
|
63
|
-
private requestAcmeDnsCertificate;
|
|
64
|
-
/**
|
|
65
|
-
* Renew a certificate
|
|
66
|
-
*/
|
|
67
|
-
renewCertificate(domain: string): Promise<StoredCertificate>;
|
|
68
|
-
/**
|
|
69
|
-
* Check certificates for renewal
|
|
70
|
-
*/
|
|
71
|
-
private checkForRenewals;
|
|
72
|
-
/**
|
|
73
|
-
* Initialize ACME client
|
|
74
|
-
*/
|
|
75
|
-
private initializeAcmeClient;
|
|
76
|
-
/**
|
|
77
|
-
* Load stored certificates from disk
|
|
78
|
-
*/
|
|
79
|
-
private loadStoredCertificates;
|
|
80
|
-
/**
|
|
81
|
-
* Store certificate to disk
|
|
82
|
-
*/
|
|
83
|
-
private storeCertificate;
|
|
84
|
-
/**
|
|
85
|
-
* Ensure storage directory exists
|
|
86
|
-
*/
|
|
87
|
-
private ensureStorageDir;
|
|
88
|
-
/**
|
|
89
|
-
* Get or create ACME account key
|
|
90
|
-
*/
|
|
91
|
-
private getOrCreateAccountKey;
|
|
92
|
-
/**
|
|
93
|
-
* Generate keypair for certificate
|
|
94
|
-
*/
|
|
95
|
-
private generateKeypair;
|
|
96
|
-
/**
|
|
97
|
-
* Generate CSR for domain
|
|
98
|
-
*/
|
|
99
|
-
private generateCsr;
|
|
100
|
-
/**
|
|
101
|
-
* Extract expiry date from certificate
|
|
102
|
-
*/
|
|
103
|
-
private extractExpiryDate;
|
|
104
|
-
/**
|
|
105
|
-
* Check if certificate is valid
|
|
106
|
-
*/
|
|
107
|
-
private isCertificateValid;
|
|
108
|
-
/**
|
|
109
|
-
* Check if certificate should be renewed
|
|
110
|
-
*/
|
|
111
|
-
private shouldRenew;
|
|
112
|
-
/**
|
|
113
|
-
* Check if certificate is expiring soon
|
|
114
|
-
*/
|
|
115
|
-
private isExpiringSoon;
|
|
116
|
-
/**
|
|
117
|
-
* Get days remaining until expiry
|
|
118
|
-
*/
|
|
119
|
-
private getDaysRemaining;
|
|
120
|
-
/**
|
|
121
|
-
* Start renewal timer
|
|
122
|
-
*/
|
|
123
|
-
private startRenewalTimer;
|
|
124
|
-
/**
|
|
125
|
-
* Get default certificate for SNI fallback
|
|
126
|
-
*/
|
|
127
|
-
getDefaultCertificate(): Promise<{
|
|
128
|
-
cert: string;
|
|
129
|
-
key: string;
|
|
130
|
-
}>;
|
|
131
|
-
/**
|
|
132
|
-
* Set up HTTP challenge responder
|
|
133
|
-
*/
|
|
134
|
-
private setupHttpChallenge;
|
|
135
|
-
/**
|
|
136
|
-
* Clean up HTTP challenge
|
|
137
|
-
*/
|
|
138
|
-
private cleanupHttpChallenge;
|
|
139
|
-
/**
|
|
140
|
-
* Type assertion for event emitter
|
|
141
|
-
*/
|
|
142
|
-
on<K extends keyof CertificateEventMap>(event: K, listener: (data: CertificateEventMap[K]) => void): this;
|
|
143
|
-
off<K extends keyof CertificateEventMap>(event: K, listener: (data: CertificateEventMap[K]) => void): this;
|
|
144
|
-
emit<K extends keyof CertificateEventMap>(event: K, data: CertificateEventMap[K]): boolean;
|
|
145
|
-
/**
|
|
146
|
-
* Update routes (placeholder for future implementation)
|
|
147
|
-
*/
|
|
148
|
-
updateRoutes(routes: IRouteConfig[]): Promise<void>;
|
|
149
|
-
}
|
|
150
|
-
export {};
|