@push.rocks/smartproxy 19.3.2 → 19.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +12 -12
- package/readme.plan.md +152 -257
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,276 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../../plugins.js';
|
|
2
|
-
/**
|
|
3
|
-
* Convert a legacy IReverseProxyConfig to the modern IRouteConfig format
|
|
4
|
-
*
|
|
5
|
-
* @deprecated This function is maintained for backward compatibility.
|
|
6
|
-
* New code should create IRouteConfig objects directly.
|
|
7
|
-
*
|
|
8
|
-
* @param legacyConfig The legacy configuration to convert
|
|
9
|
-
* @param proxyPort The port the proxy listens on
|
|
10
|
-
* @returns A modern route configuration equivalent to the legacy config
|
|
11
|
-
*/
|
|
12
|
-
export function convertLegacyConfigToRouteConfig(legacyConfig, proxyPort) {
|
|
13
|
-
// Create basic route configuration
|
|
14
|
-
const routeConfig = {
|
|
15
|
-
// Match properties
|
|
16
|
-
match: {
|
|
17
|
-
ports: proxyPort,
|
|
18
|
-
domains: legacyConfig.hostName
|
|
19
|
-
},
|
|
20
|
-
// Action properties
|
|
21
|
-
action: {
|
|
22
|
-
type: 'forward',
|
|
23
|
-
target: {
|
|
24
|
-
host: legacyConfig.destinationIps,
|
|
25
|
-
port: legacyConfig.destinationPorts[0]
|
|
26
|
-
},
|
|
27
|
-
// TLS mode is always 'terminate' for legacy configs
|
|
28
|
-
tls: {
|
|
29
|
-
mode: 'terminate',
|
|
30
|
-
certificate: {
|
|
31
|
-
key: legacyConfig.privateKey,
|
|
32
|
-
cert: legacyConfig.publicKey
|
|
33
|
-
}
|
|
34
|
-
},
|
|
35
|
-
// Advanced options
|
|
36
|
-
advanced: {
|
|
37
|
-
// Rewrite host header if specified
|
|
38
|
-
headers: legacyConfig.rewriteHostHeader ? { 'host': '{domain}' } : {}
|
|
39
|
-
}
|
|
40
|
-
},
|
|
41
|
-
// Metadata
|
|
42
|
-
name: `Legacy Config - ${legacyConfig.hostName}`,
|
|
43
|
-
priority: 0, // Default priority
|
|
44
|
-
enabled: true
|
|
45
|
-
};
|
|
46
|
-
// Add authentication if present
|
|
47
|
-
if (legacyConfig.authentication) {
|
|
48
|
-
routeConfig.action.security = {
|
|
49
|
-
authentication: {
|
|
50
|
-
type: 'basic',
|
|
51
|
-
credentials: [{
|
|
52
|
-
username: legacyConfig.authentication.user,
|
|
53
|
-
password: legacyConfig.authentication.pass
|
|
54
|
-
}]
|
|
55
|
-
}
|
|
56
|
-
};
|
|
57
|
-
}
|
|
58
|
-
// Add backend protocol if specified
|
|
59
|
-
if (legacyConfig.backendProtocol) {
|
|
60
|
-
if (!routeConfig.action.options) {
|
|
61
|
-
routeConfig.action.options = {};
|
|
62
|
-
}
|
|
63
|
-
routeConfig.action.options.backendProtocol = legacyConfig.backendProtocol;
|
|
64
|
-
}
|
|
65
|
-
return routeConfig;
|
|
66
|
-
}
|
|
67
|
-
/**
|
|
68
|
-
* Route manager for NetworkProxy
|
|
69
|
-
* Handles route matching and configuration
|
|
70
|
-
*/
|
|
71
|
-
export class RouteManager {
|
|
72
|
-
constructor(logger) {
|
|
73
|
-
this.routes = [];
|
|
74
|
-
this.logger = logger;
|
|
75
|
-
}
|
|
76
|
-
/**
|
|
77
|
-
* Update the routes configuration
|
|
78
|
-
*/
|
|
79
|
-
updateRoutes(routes) {
|
|
80
|
-
// Sort routes by priority (higher first)
|
|
81
|
-
this.routes = [...routes].sort((a, b) => {
|
|
82
|
-
const priorityA = a.priority ?? 0;
|
|
83
|
-
const priorityB = b.priority ?? 0;
|
|
84
|
-
return priorityB - priorityA;
|
|
85
|
-
});
|
|
86
|
-
this.logger.info(`Updated RouteManager with ${this.routes.length} routes`);
|
|
87
|
-
}
|
|
88
|
-
/**
|
|
89
|
-
* Get all routes
|
|
90
|
-
*/
|
|
91
|
-
getRoutes() {
|
|
92
|
-
return [...this.routes];
|
|
93
|
-
}
|
|
94
|
-
/**
|
|
95
|
-
* Find the first matching route for a context
|
|
96
|
-
*/
|
|
97
|
-
findMatchingRoute(context) {
|
|
98
|
-
for (const route of this.routes) {
|
|
99
|
-
if (this.matchesRoute(route, context)) {
|
|
100
|
-
return route;
|
|
101
|
-
}
|
|
102
|
-
}
|
|
103
|
-
return null;
|
|
104
|
-
}
|
|
105
|
-
/**
|
|
106
|
-
* Check if a route matches the given context
|
|
107
|
-
*/
|
|
108
|
-
matchesRoute(route, context) {
|
|
109
|
-
// Skip disabled routes
|
|
110
|
-
if (route.enabled === false) {
|
|
111
|
-
return false;
|
|
112
|
-
}
|
|
113
|
-
// Check domain match if specified
|
|
114
|
-
if (route.match.domains && context.domain) {
|
|
115
|
-
const domains = Array.isArray(route.match.domains)
|
|
116
|
-
? route.match.domains
|
|
117
|
-
: [route.match.domains];
|
|
118
|
-
if (!domains.some(domainPattern => this.matchDomain(domainPattern, context.domain))) {
|
|
119
|
-
return false;
|
|
120
|
-
}
|
|
121
|
-
}
|
|
122
|
-
// Check path match if specified
|
|
123
|
-
if (route.match.path && context.path) {
|
|
124
|
-
if (!this.matchPath(route.match.path, context.path)) {
|
|
125
|
-
return false;
|
|
126
|
-
}
|
|
127
|
-
}
|
|
128
|
-
// Check client IP match if specified
|
|
129
|
-
if (route.match.clientIp && context.clientIp) {
|
|
130
|
-
if (!route.match.clientIp.some(ip => this.matchIp(ip, context.clientIp))) {
|
|
131
|
-
return false;
|
|
132
|
-
}
|
|
133
|
-
}
|
|
134
|
-
// Check TLS version match if specified
|
|
135
|
-
if (route.match.tlsVersion && context.tlsVersion) {
|
|
136
|
-
if (!route.match.tlsVersion.includes(context.tlsVersion)) {
|
|
137
|
-
return false;
|
|
138
|
-
}
|
|
139
|
-
}
|
|
140
|
-
// All criteria matched
|
|
141
|
-
return true;
|
|
142
|
-
}
|
|
143
|
-
/**
|
|
144
|
-
* Match a domain pattern against a domain
|
|
145
|
-
*/
|
|
146
|
-
matchDomain(pattern, domain) {
|
|
147
|
-
if (pattern === domain) {
|
|
148
|
-
return true;
|
|
149
|
-
}
|
|
150
|
-
if (pattern.includes('*')) {
|
|
151
|
-
const regexPattern = pattern
|
|
152
|
-
.replace(/\./g, '\\.')
|
|
153
|
-
.replace(/\*/g, '.*');
|
|
154
|
-
const regex = new RegExp(`^${regexPattern}$`, 'i');
|
|
155
|
-
return regex.test(domain);
|
|
156
|
-
}
|
|
157
|
-
return false;
|
|
158
|
-
}
|
|
159
|
-
/**
|
|
160
|
-
* Match a path pattern against a path
|
|
161
|
-
*/
|
|
162
|
-
matchPath(pattern, path) {
|
|
163
|
-
if (pattern === path) {
|
|
164
|
-
return true;
|
|
165
|
-
}
|
|
166
|
-
if (pattern.endsWith('*')) {
|
|
167
|
-
const prefix = pattern.slice(0, -1);
|
|
168
|
-
return path.startsWith(prefix);
|
|
169
|
-
}
|
|
170
|
-
return false;
|
|
171
|
-
}
|
|
172
|
-
/**
|
|
173
|
-
* Match an IP pattern against an IP
|
|
174
|
-
* Supports exact matches, wildcard patterns, and CIDR notation
|
|
175
|
-
*/
|
|
176
|
-
matchIp(pattern, ip) {
|
|
177
|
-
// Exact match
|
|
178
|
-
if (pattern === ip) {
|
|
179
|
-
return true;
|
|
180
|
-
}
|
|
181
|
-
// Wildcard matching (e.g., 192.168.0.*)
|
|
182
|
-
if (pattern.includes('*')) {
|
|
183
|
-
const regexPattern = pattern
|
|
184
|
-
.replace(/\./g, '\\.')
|
|
185
|
-
.replace(/\*/g, '.*');
|
|
186
|
-
const regex = new RegExp(`^${regexPattern}$`);
|
|
187
|
-
return regex.test(ip);
|
|
188
|
-
}
|
|
189
|
-
// CIDR matching (e.g., 192.168.0.0/24)
|
|
190
|
-
if (pattern.includes('/')) {
|
|
191
|
-
try {
|
|
192
|
-
const [subnet, bits] = pattern.split('/');
|
|
193
|
-
// Convert IP addresses to numeric format for comparison
|
|
194
|
-
const ipBinary = this.ipToBinary(ip);
|
|
195
|
-
const subnetBinary = this.ipToBinary(subnet);
|
|
196
|
-
if (!ipBinary || !subnetBinary) {
|
|
197
|
-
return false;
|
|
198
|
-
}
|
|
199
|
-
// Get the subnet mask from CIDR notation
|
|
200
|
-
const mask = parseInt(bits, 10);
|
|
201
|
-
if (isNaN(mask) || mask < 0 || mask > 32) {
|
|
202
|
-
return false;
|
|
203
|
-
}
|
|
204
|
-
// Check if the first 'mask' bits match between IP and subnet
|
|
205
|
-
return ipBinary.slice(0, mask) === subnetBinary.slice(0, mask);
|
|
206
|
-
}
|
|
207
|
-
catch (error) {
|
|
208
|
-
// If we encounter any error during CIDR matching, return false
|
|
209
|
-
return false;
|
|
210
|
-
}
|
|
211
|
-
}
|
|
212
|
-
return false;
|
|
213
|
-
}
|
|
214
|
-
/**
|
|
215
|
-
* Convert an IP address to its binary representation
|
|
216
|
-
* @param ip The IP address to convert
|
|
217
|
-
* @returns Binary string representation or null if invalid
|
|
218
|
-
*/
|
|
219
|
-
ipToBinary(ip) {
|
|
220
|
-
// Handle IPv4 addresses only for now
|
|
221
|
-
const parts = ip.split('.');
|
|
222
|
-
// Validate IP format
|
|
223
|
-
if (parts.length !== 4) {
|
|
224
|
-
return null;
|
|
225
|
-
}
|
|
226
|
-
// Convert each octet to 8-bit binary and concatenate
|
|
227
|
-
try {
|
|
228
|
-
return parts
|
|
229
|
-
.map(part => {
|
|
230
|
-
const num = parseInt(part, 10);
|
|
231
|
-
if (isNaN(num) || num < 0 || num > 255) {
|
|
232
|
-
throw new Error('Invalid IP octet');
|
|
233
|
-
}
|
|
234
|
-
return num.toString(2).padStart(8, '0');
|
|
235
|
-
})
|
|
236
|
-
.join('');
|
|
237
|
-
}
|
|
238
|
-
catch (error) {
|
|
239
|
-
return null;
|
|
240
|
-
}
|
|
241
|
-
}
|
|
242
|
-
}
|
|
243
|
-
/**
|
|
244
|
-
* Creates a logger based on the specified log level
|
|
245
|
-
*/
|
|
246
|
-
export function createLogger(logLevel = 'info') {
|
|
247
|
-
const logLevels = {
|
|
248
|
-
error: 0,
|
|
249
|
-
warn: 1,
|
|
250
|
-
info: 2,
|
|
251
|
-
debug: 3
|
|
252
|
-
};
|
|
253
|
-
return {
|
|
254
|
-
debug: (message, data) => {
|
|
255
|
-
if (logLevels[logLevel] >= logLevels.debug) {
|
|
256
|
-
console.log(`[DEBUG] ${message}`, data || '');
|
|
257
|
-
}
|
|
258
|
-
},
|
|
259
|
-
info: (message, data) => {
|
|
260
|
-
if (logLevels[logLevel] >= logLevels.info) {
|
|
261
|
-
console.log(`[INFO] ${message}`, data || '');
|
|
262
|
-
}
|
|
263
|
-
},
|
|
264
|
-
warn: (message, data) => {
|
|
265
|
-
if (logLevels[logLevel] >= logLevels.warn) {
|
|
266
|
-
console.warn(`[WARN] ${message}`, data || '');
|
|
267
|
-
}
|
|
268
|
-
},
|
|
269
|
-
error: (message, data) => {
|
|
270
|
-
if (logLevels[logLevel] >= logLevels.error) {
|
|
271
|
-
console.error(`[ERROR] ${message}`, data || '');
|
|
272
|
-
}
|
|
273
|
-
}
|
|
274
|
-
};
|
|
275
|
-
}
|
|
276
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../../ts/proxies/network-proxy/models/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,qBAAqB,CAAC;AAqG/C;;;;;;;;;GASG;AACH,MAAM,UAAU,gCAAgC,CAC9C,YAAiC,EACjC,SAAiB;IAEjB,mCAAmC;IACnC,MAAM,WAAW,GAAiB;QAChC,mBAAmB;QACnB,KAAK,EAAE;YACL,KAAK,EAAE,SAAS;YAChB,OAAO,EAAE,YAAY,CAAC,QAAQ;SAC/B;QAED,oBAAoB;QACpB,MAAM,EAAE;YACN,IAAI,EAAE,SAAS;YACf,MAAM,EAAE;gBACN,IAAI,EAAE,YAAY,CAAC,cAAc;gBACjC,IAAI,EAAE,YAAY,CAAC,gBAAgB,CAAC,CAAC,CAAC;aACvC;YAED,oDAAoD;YACpD,GAAG,EAAE;gBACH,IAAI,EAAE,WAAW;gBACjB,WAAW,EAAE;oBACX,GAAG,EAAE,YAAY,CAAC,UAAU;oBAC5B,IAAI,EAAE,YAAY,CAAC,SAAS;iBAC7B;aACF;YAED,mBAAmB;YACnB,QAAQ,EAAE;gBACR,mCAAmC;gBACnC,OAAO,EAAE,YAAY,CAAC,iBAAiB,CAAC,CAAC,CAAC,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC,CAAC,CAAC,EAAE;aACtE;SACF;QAED,WAAW;QACX,IAAI,EAAE,mBAAmB,YAAY,CAAC,QAAQ,EAAE;QAChD,QAAQ,EAAE,CAAC,EAAE,mBAAmB;QAChC,OAAO,EAAE,IAAI;KACd,CAAC;IAEF,gCAAgC;IAChC,IAAI,YAAY,CAAC,cAAc,EAAE,CAAC;QAChC,WAAW,CAAC,MAAM,CAAC,QAAQ,GAAG;YAC5B,cAAc,EAAE;gBACd,IAAI,EAAE,OAAO;gBACb,WAAW,EAAE,CAAC;wBACZ,QAAQ,EAAE,YAAY,CAAC,cAAc,CAAC,IAAI;wBAC1C,QAAQ,EAAE,YAAY,CAAC,cAAc,CAAC,IAAI;qBAC3C,CAAC;aACH;SACF,CAAC;IACJ,CAAC;IAED,oCAAoC;IACpC,IAAI,YAAY,CAAC,eAAe,EAAE,CAAC;QACjC,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YAChC,WAAW,CAAC,MAAM,CAAC,OAAO,GAAG,EAAE,CAAC;QAClC,CAAC;QACD,WAAW,CAAC,MAAM,CAAC,OAAO,CAAC,eAAe,GAAG,YAAY,CAAC,eAAe,CAAC;IAC5E,CAAC;IAED,OAAO,WAAW,CAAC;AACrB,CAAC;AAED;;;GAGG;AACH,MAAM,OAAO,YAAY;IAIvB,YAAY,MAAe;QAHnB,WAAM,GAAmB,EAAE,CAAC;QAIlC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;IACvB,CAAC;IAED;;OAEG;IACI,YAAY,CAAC,MAAsB;QACxC,yCAAyC;QACzC,IAAI,CAAC,MAAM,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YACtC,MAAM,SAAS,GAAG,CAAC,CAAC,QAAQ,IAAI,CAAC,CAAC;YAClC,MAAM,SAAS,GAAG,CAAC,CAAC,QAAQ,IAAI,CAAC,CAAC;YAClC,OAAO,SAAS,GAAG,SAAS,CAAC;QAC/B,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,6BAA6B,IAAI,CAAC,MAAM,CAAC,MAAM,SAAS,CAAC,CAAC;IAC7E,CAAC;IAED;;OAEG;IACI,SAAS;QACd,OAAO,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,iBAAiB,CAAC,OAAsB;QAC7C,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChC,IAAI,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,OAAO,CAAC,EAAE,CAAC;gBACtC,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,YAAY,CAAC,KAAmB,EAAE,OAAsB;QAC9D,uBAAuB;QACvB,IAAI,KAAK,CAAC,OAAO,KAAK,KAAK,EAAE,CAAC;YAC5B,OAAO,KAAK,CAAC;QACf,CAAC;QAED,kCAAkC;QAClC,IAAI,KAAK,CAAC,KAAK,CAAC,OAAO,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;YAC1C,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;gBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;gBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YAE1B,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,IAAI,CAAC,WAAW,CAAC,aAAa,EAAE,OAAO,CAAC,MAAO,CAAC,CAAC,EAAE,CAAC;gBACrF,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,gCAAgC;QAChC,IAAI,KAAK,CAAC,KAAK,CAAC,IAAI,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;YACrC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,EAAE,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;gBACpD,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,qCAAqC;QACrC,IAAI,KAAK,CAAC,KAAK,CAAC,QAAQ,IAAI,OAAO,CAAC,QAAQ,EAAE,CAAC;YAC7C,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC,EAAE,CAAC;gBACzE,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,uCAAuC;QACvC,IAAI,KAAK,CAAC,KAAK,CAAC,UAAU,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACjD,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,UAAU,CAAC,QAAQ,CAAC,OAAO,CAAC,UAAU,CAAC,EAAE,CAAC;gBACzD,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,uBAAuB;QACvB,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,OAAe,EAAE,MAAc;QACjD,IAAI,OAAO,KAAK,MAAM,EAAE,CAAC;YACvB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,YAAY,GAAG,OAAO;iBACzB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC;iBACrB,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;YAExB,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,IAAI,YAAY,GAAG,EAAE,GAAG,CAAC,CAAC;YACnD,OAAO,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC5B,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACK,SAAS,CAAC,OAAe,EAAE,IAAY;QAC7C,IAAI,OAAO,KAAK,IAAI,EAAE,CAAC;YACrB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,MAAM,GAAG,OAAO,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YACpC,OAAO,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;QACjC,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;OAGG;IACK,OAAO,CAAC,OAAe,EAAE,EAAU;QACzC,cAAc;QACd,IAAI,OAAO,KAAK,EAAE,EAAE,CAAC;YACnB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,wCAAwC;QACxC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,YAAY,GAAG,OAAO;iBACzB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC;iBACrB,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;YAExB,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,IAAI,YAAY,GAAG,CAAC,CAAC;YAC9C,OAAO,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACxB,CAAC;QAED,uCAAuC;QACvC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC1B,IAAI,CAAC;gBACH,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBAE1C,wDAAwD;gBACxD,MAAM,QAAQ,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;gBACrC,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBAE7C,IAAI,CAAC,QAAQ,IAAI,CAAC,YAAY,EAAE,CAAC;oBAC/B,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,yCAAyC;gBACzC,MAAM,IAAI,GAAG,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;gBAChC,IAAI,KAAK,CAAC,IAAI,CAAC,IAAI,IAAI,GAAG,CAAC,IAAI,IAAI,GAAG,EAAE,EAAE,CAAC;oBACzC,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,6DAA6D;gBAC7D,OAAO,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,IAAI,CAAC,KAAK,YAAY,CAAC,KAAK,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;YACjE,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,+DAA+D;gBAC/D,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,UAAU,CAAC,EAAU;QAC3B,qCAAqC;QACrC,MAAM,KAAK,GAAG,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAE5B,qBAAqB;QACrB,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvB,OAAO,IAAI,CAAC;QACd,CAAC;QAED,qDAAqD;QACrD,IAAI,CAAC;YACH,OAAO,KAAK;iBACT,GAAG,CAAC,IAAI,CAAC,EAAE;gBACV,MAAM,GAAG,GAAG,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;gBAC/B,IAAI,KAAK,CAAC,GAAG,CAAC,IAAI,GAAG,GAAG,CAAC,IAAI,GAAG,GAAG,GAAG,EAAE,CAAC;oBACvC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBACD,OAAO,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC;YAC1C,CAAC,CAAC;iBACD,IAAI,CAAC,EAAE,CAAC,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;CACF;AA6BD;;GAEG;AACH,MAAM,UAAU,YAAY,CAAC,WAAmB,MAAM;IACpD,MAAM,SAAS,GAAG;QAChB,KAAK,EAAE,CAAC;QACR,IAAI,EAAE,CAAC;QACP,IAAI,EAAE,CAAC;QACP,KAAK,EAAE,CAAC;KACT,CAAC;IAEF,OAAO;QACL,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE;YACrC,IAAI,SAAS,CAAC,QAAQ,CAAC,IAAI,SAAS,CAAC,KAAK,EAAE,CAAC;gBAC3C,OAAO,CAAC,GAAG,CAAC,WAAW,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;YAChD,CAAC;QACH,CAAC;QACD,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE;YACpC,IAAI,SAAS,CAAC,QAAQ,CAAC,IAAI,SAAS,CAAC,IAAI,EAAE,CAAC;gBAC1C,OAAO,CAAC,GAAG,CAAC,UAAU,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;QACD,IAAI,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE;YACpC,IAAI,SAAS,CAAC,QAAQ,CAAC,IAAI,SAAS,CAAC,IAAI,EAAE,CAAC;gBAC1C,OAAO,CAAC,IAAI,CAAC,UAAU,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;YAChD,CAAC;QACH,CAAC;QACD,KAAK,EAAE,CAAC,OAAe,EAAE,IAAU,EAAE,EAAE;YACrC,IAAI,SAAS,CAAC,QAAQ,CAAC,IAAI,SAAS,CAAC,KAAK,EAAE,CAAC;gBAC3C,OAAO,CAAC,KAAK,CAAC,WAAW,OAAO,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;YAClD,CAAC;QACH,CAAC;KACF,CAAC;AACJ,CAAC"}
|
|
@@ -1,255 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
/**
|
|
3
|
-
* Manages security features for the NetworkProxy
|
|
4
|
-
* Implements Phase 5.4: Security features like IP filtering and rate limiting
|
|
5
|
-
*/
|
|
6
|
-
export class SecurityManager {
|
|
7
|
-
constructor(logger, routes = []) {
|
|
8
|
-
this.logger = logger;
|
|
9
|
-
this.routes = routes;
|
|
10
|
-
// Cache IP filtering results to avoid constant regex matching
|
|
11
|
-
this.ipFilterCache = new Map();
|
|
12
|
-
// Store rate limits per route and key
|
|
13
|
-
this.rateLimits = new Map();
|
|
14
|
-
}
|
|
15
|
-
/**
|
|
16
|
-
* Update the routes configuration
|
|
17
|
-
*/
|
|
18
|
-
setRoutes(routes) {
|
|
19
|
-
this.routes = routes;
|
|
20
|
-
// Reset caches when routes change
|
|
21
|
-
this.ipFilterCache.clear();
|
|
22
|
-
}
|
|
23
|
-
/**
|
|
24
|
-
* Check if a client is allowed to access a specific route
|
|
25
|
-
*
|
|
26
|
-
* @param route The route to check access for
|
|
27
|
-
* @param context The route context with client information
|
|
28
|
-
* @returns True if access is allowed, false otherwise
|
|
29
|
-
*/
|
|
30
|
-
isAllowed(route, context) {
|
|
31
|
-
if (!route.security) {
|
|
32
|
-
return true; // No security restrictions
|
|
33
|
-
}
|
|
34
|
-
// --- IP filtering ---
|
|
35
|
-
if (!this.isIpAllowed(route, context.clientIp)) {
|
|
36
|
-
this.logger.debug(`IP ${context.clientIp} is blocked for route ${route.name || route.id || 'unnamed'}`);
|
|
37
|
-
return false;
|
|
38
|
-
}
|
|
39
|
-
// --- Rate limiting ---
|
|
40
|
-
if (route.security.rateLimit?.enabled && !this.isWithinRateLimit(route, context)) {
|
|
41
|
-
this.logger.debug(`Rate limit exceeded for route ${route.name || route.id || 'unnamed'}`);
|
|
42
|
-
return false;
|
|
43
|
-
}
|
|
44
|
-
// --- Basic Auth (handled at HTTP level) ---
|
|
45
|
-
// Basic auth is not checked here as it requires HTTP headers
|
|
46
|
-
// and is handled in the RequestHandler
|
|
47
|
-
return true;
|
|
48
|
-
}
|
|
49
|
-
/**
|
|
50
|
-
* Check if an IP is allowed based on route security settings
|
|
51
|
-
*/
|
|
52
|
-
isIpAllowed(route, clientIp) {
|
|
53
|
-
if (!route.security) {
|
|
54
|
-
return true; // No security restrictions
|
|
55
|
-
}
|
|
56
|
-
const routeId = route.id || route.name || 'unnamed';
|
|
57
|
-
// Check cache first
|
|
58
|
-
if (!this.ipFilterCache.has(routeId)) {
|
|
59
|
-
this.ipFilterCache.set(routeId, new Map());
|
|
60
|
-
}
|
|
61
|
-
const routeCache = this.ipFilterCache.get(routeId);
|
|
62
|
-
if (routeCache.has(clientIp)) {
|
|
63
|
-
return routeCache.get(clientIp);
|
|
64
|
-
}
|
|
65
|
-
let allowed = true;
|
|
66
|
-
// Check block list first (deny has priority over allow)
|
|
67
|
-
if (route.security.ipBlockList && route.security.ipBlockList.length > 0) {
|
|
68
|
-
if (this.ipMatchesPattern(clientIp, route.security.ipBlockList)) {
|
|
69
|
-
allowed = false;
|
|
70
|
-
}
|
|
71
|
-
}
|
|
72
|
-
// Then check allow list (overrides block list if specified)
|
|
73
|
-
if (route.security.ipAllowList && route.security.ipAllowList.length > 0) {
|
|
74
|
-
// If allow list is specified, IP must match an entry to be allowed
|
|
75
|
-
allowed = this.ipMatchesPattern(clientIp, route.security.ipAllowList);
|
|
76
|
-
}
|
|
77
|
-
// Cache the result
|
|
78
|
-
routeCache.set(clientIp, allowed);
|
|
79
|
-
return allowed;
|
|
80
|
-
}
|
|
81
|
-
/**
|
|
82
|
-
* Check if IP matches any pattern in the list
|
|
83
|
-
*/
|
|
84
|
-
ipMatchesPattern(ip, patterns) {
|
|
85
|
-
for (const pattern of patterns) {
|
|
86
|
-
// CIDR notation
|
|
87
|
-
if (pattern.includes('/')) {
|
|
88
|
-
if (this.ipMatchesCidr(ip, pattern)) {
|
|
89
|
-
return true;
|
|
90
|
-
}
|
|
91
|
-
}
|
|
92
|
-
// Wildcard notation
|
|
93
|
-
else if (pattern.includes('*')) {
|
|
94
|
-
const regex = new RegExp('^' + pattern.replace(/\./g, '\\.').replace(/\*/g, '.*') + '$');
|
|
95
|
-
if (regex.test(ip)) {
|
|
96
|
-
return true;
|
|
97
|
-
}
|
|
98
|
-
}
|
|
99
|
-
// Exact match
|
|
100
|
-
else if (pattern === ip) {
|
|
101
|
-
return true;
|
|
102
|
-
}
|
|
103
|
-
}
|
|
104
|
-
return false;
|
|
105
|
-
}
|
|
106
|
-
/**
|
|
107
|
-
* Check if IP matches CIDR notation
|
|
108
|
-
* Very basic implementation - for production use, consider a dedicated IP library
|
|
109
|
-
*/
|
|
110
|
-
ipMatchesCidr(ip, cidr) {
|
|
111
|
-
try {
|
|
112
|
-
const [subnet, bits] = cidr.split('/');
|
|
113
|
-
const mask = parseInt(bits, 10);
|
|
114
|
-
// Convert IP to numeric format
|
|
115
|
-
const ipParts = ip.split('.').map(part => parseInt(part, 10));
|
|
116
|
-
const subnetParts = subnet.split('.').map(part => parseInt(part, 10));
|
|
117
|
-
// Calculate the numeric IP and subnet
|
|
118
|
-
const ipNum = (ipParts[0] << 24) | (ipParts[1] << 16) | (ipParts[2] << 8) | ipParts[3];
|
|
119
|
-
const subnetNum = (subnetParts[0] << 24) | (subnetParts[1] << 16) | (subnetParts[2] << 8) | subnetParts[3];
|
|
120
|
-
// Calculate the mask
|
|
121
|
-
const maskNum = ~((1 << (32 - mask)) - 1);
|
|
122
|
-
// Check if IP is in subnet
|
|
123
|
-
return (ipNum & maskNum) === (subnetNum & maskNum);
|
|
124
|
-
}
|
|
125
|
-
catch (e) {
|
|
126
|
-
this.logger.error(`Invalid CIDR notation: ${cidr}`);
|
|
127
|
-
return false;
|
|
128
|
-
}
|
|
129
|
-
}
|
|
130
|
-
/**
|
|
131
|
-
* Check if request is within rate limit
|
|
132
|
-
*/
|
|
133
|
-
isWithinRateLimit(route, context) {
|
|
134
|
-
if (!route.security?.rateLimit?.enabled) {
|
|
135
|
-
return true;
|
|
136
|
-
}
|
|
137
|
-
const rateLimit = route.security.rateLimit;
|
|
138
|
-
const routeId = route.id || route.name || 'unnamed';
|
|
139
|
-
// Determine rate limit key (by IP, path, or header)
|
|
140
|
-
let key = context.clientIp; // Default to IP
|
|
141
|
-
if (rateLimit.keyBy === 'path' && context.path) {
|
|
142
|
-
key = `${context.clientIp}:${context.path}`;
|
|
143
|
-
}
|
|
144
|
-
else if (rateLimit.keyBy === 'header' && rateLimit.headerName && context.headers) {
|
|
145
|
-
const headerValue = context.headers[rateLimit.headerName.toLowerCase()];
|
|
146
|
-
if (headerValue) {
|
|
147
|
-
key = `${context.clientIp}:${headerValue}`;
|
|
148
|
-
}
|
|
149
|
-
}
|
|
150
|
-
// Get or create rate limit tracking for this route
|
|
151
|
-
if (!this.rateLimits.has(routeId)) {
|
|
152
|
-
this.rateLimits.set(routeId, new Map());
|
|
153
|
-
}
|
|
154
|
-
const routeLimits = this.rateLimits.get(routeId);
|
|
155
|
-
const now = Date.now();
|
|
156
|
-
// Get or create rate limit tracking for this key
|
|
157
|
-
let limit = routeLimits.get(key);
|
|
158
|
-
if (!limit || limit.expiry < now) {
|
|
159
|
-
// Create new rate limit or reset expired one
|
|
160
|
-
limit = {
|
|
161
|
-
count: 1,
|
|
162
|
-
expiry: now + (rateLimit.window * 1000)
|
|
163
|
-
};
|
|
164
|
-
routeLimits.set(key, limit);
|
|
165
|
-
return true;
|
|
166
|
-
}
|
|
167
|
-
// Increment the counter
|
|
168
|
-
limit.count++;
|
|
169
|
-
// Check if rate limit is exceeded
|
|
170
|
-
return limit.count <= rateLimit.maxRequests;
|
|
171
|
-
}
|
|
172
|
-
/**
|
|
173
|
-
* Clean up expired rate limits
|
|
174
|
-
* Should be called periodically to prevent memory leaks
|
|
175
|
-
*/
|
|
176
|
-
cleanupExpiredRateLimits() {
|
|
177
|
-
const now = Date.now();
|
|
178
|
-
for (const [routeId, routeLimits] of this.rateLimits.entries()) {
|
|
179
|
-
let removed = 0;
|
|
180
|
-
for (const [key, limit] of routeLimits.entries()) {
|
|
181
|
-
if (limit.expiry < now) {
|
|
182
|
-
routeLimits.delete(key);
|
|
183
|
-
removed++;
|
|
184
|
-
}
|
|
185
|
-
}
|
|
186
|
-
if (removed > 0) {
|
|
187
|
-
this.logger.debug(`Cleaned up ${removed} expired rate limits for route ${routeId}`);
|
|
188
|
-
}
|
|
189
|
-
}
|
|
190
|
-
}
|
|
191
|
-
/**
|
|
192
|
-
* Check basic auth credentials
|
|
193
|
-
*
|
|
194
|
-
* @param route The route to check auth for
|
|
195
|
-
* @param username The provided username
|
|
196
|
-
* @param password The provided password
|
|
197
|
-
* @returns True if credentials are valid, false otherwise
|
|
198
|
-
*/
|
|
199
|
-
checkBasicAuth(route, username, password) {
|
|
200
|
-
if (!route.security?.basicAuth?.enabled) {
|
|
201
|
-
return true;
|
|
202
|
-
}
|
|
203
|
-
const basicAuth = route.security.basicAuth;
|
|
204
|
-
// Check credentials against configured users
|
|
205
|
-
for (const user of basicAuth.users) {
|
|
206
|
-
if (user.username === username && user.password === password) {
|
|
207
|
-
return true;
|
|
208
|
-
}
|
|
209
|
-
}
|
|
210
|
-
return false;
|
|
211
|
-
}
|
|
212
|
-
/**
|
|
213
|
-
* Verify a JWT token
|
|
214
|
-
*
|
|
215
|
-
* @param route The route to verify the token for
|
|
216
|
-
* @param token The JWT token to verify
|
|
217
|
-
* @returns True if the token is valid, false otherwise
|
|
218
|
-
*/
|
|
219
|
-
verifyJwtToken(route, token) {
|
|
220
|
-
if (!route.security?.jwtAuth?.enabled) {
|
|
221
|
-
return true;
|
|
222
|
-
}
|
|
223
|
-
try {
|
|
224
|
-
// This is a simplified version - in production you'd use a proper JWT library
|
|
225
|
-
const jwtAuth = route.security.jwtAuth;
|
|
226
|
-
// Verify structure
|
|
227
|
-
const parts = token.split('.');
|
|
228
|
-
if (parts.length !== 3) {
|
|
229
|
-
return false;
|
|
230
|
-
}
|
|
231
|
-
// Decode payload
|
|
232
|
-
const payload = JSON.parse(Buffer.from(parts[1], 'base64').toString());
|
|
233
|
-
// Check expiration
|
|
234
|
-
if (payload.exp && payload.exp < Math.floor(Date.now() / 1000)) {
|
|
235
|
-
return false;
|
|
236
|
-
}
|
|
237
|
-
// Check issuer
|
|
238
|
-
if (jwtAuth.issuer && payload.iss !== jwtAuth.issuer) {
|
|
239
|
-
return false;
|
|
240
|
-
}
|
|
241
|
-
// Check audience
|
|
242
|
-
if (jwtAuth.audience && payload.aud !== jwtAuth.audience) {
|
|
243
|
-
return false;
|
|
244
|
-
}
|
|
245
|
-
// In a real implementation, you'd also verify the signature
|
|
246
|
-
// using the secret and algorithm specified in jwtAuth
|
|
247
|
-
return true;
|
|
248
|
-
}
|
|
249
|
-
catch (err) {
|
|
250
|
-
this.logger.error(`Error verifying JWT: ${err}`);
|
|
251
|
-
return false;
|
|
252
|
-
}
|
|
253
|
-
}
|
|
254
|
-
}
|
|
255
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"security-manager.js","sourceRoot":"","sources":["../../../ts/proxies/network-proxy/security-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAK5C;;;GAGG;AACH,MAAM,OAAO,eAAe;IAO1B,YAAoB,MAAe,EAAU,SAAyB,EAAE;QAApD,WAAM,GAAN,MAAM,CAAS;QAAU,WAAM,GAAN,MAAM,CAAqB;QANxE,8DAA8D;QACtD,kBAAa,GAAsC,IAAI,GAAG,EAAE,CAAC;QAErE,sCAAsC;QAC9B,eAAU,GAAgE,IAAI,GAAG,EAAE,CAAC;IAEjB,CAAC;IAE5E;;OAEG;IACI,SAAS,CAAC,MAAsB;QACrC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,kCAAkC;QAClC,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,CAAC;IAC7B,CAAC;IAED;;;;;;OAMG;IACI,SAAS,CAAC,KAAmB,EAAE,OAAsB;QAC1D,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,uBAAuB;QACvB,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC/C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,OAAO,CAAC,QAAQ,yBAAyB,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,IAAI,SAAS,EAAE,CAAC,CAAC;YACxG,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,IAAI,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,OAAO,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,OAAO,CAAC,EAAE,CAAC;YACjF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,iCAAiC,KAAK,CAAC,IAAI,IAAI,KAAK,CAAC,EAAE,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,OAAO,KAAK,CAAC;QACf,CAAC;QAED,6CAA6C;QAC7C,6DAA6D;QAC7D,uCAAuC;QAEvC,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,KAAmB,EAAE,QAAgB;QACvD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,MAAM,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAEpD,oBAAoB;QACpB,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC7C,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QACpD,IAAI,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC7B,OAAO,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAE,CAAC;QACnC,CAAC;QAED,IAAI,OAAO,GAAG,IAAI,CAAC;QAEnB,wDAAwD;QACxD,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,IAAI,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,EAAE,CAAC;gBAChE,OAAO,GAAG,KAAK,CAAC;YAClB,CAAC;QACH,CAAC;QAED,4DAA4D;QAC5D,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,IAAI,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,mEAAmE;YACnE,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QACxE,CAAC;QAED,mBAAmB;QACnB,UAAU,CAAC,GAAG,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,EAAU,EAAE,QAAkB;QACrD,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,gBAAgB;YAChB,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC1B,IAAI,IAAI,CAAC,aAAa,CAAC,EAAE,EAAE,OAAO,CAAC,EAAE,CAAC;oBACpC,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YACD,oBAAoB;iBACf,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC/B,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,GAAG,GAAG,OAAO,CAAC,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC;gBACzF,IAAI,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,EAAE,CAAC;oBACnB,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YACD,cAAc;iBACT,IAAI,OAAO,KAAK,EAAE,EAAE,CAAC;gBACxB,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;OAGG;IACK,aAAa,CAAC,EAAU,EAAE,IAAY;QAC5C,IAAI,CAAC;YACH,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,IAAI,GAAG,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;YAEhC,+BAA+B;YAC/B,MAAM,OAAO,GAAG,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;YAC9D,MAAM,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;YAEtE,sCAAsC;YACtC,MAAM,KAAK,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;YACvF,MAAM,SAAS,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,WAAW,CAAC,CAAC,CAAC,CAAC;YAE3G,qBAAqB;YACrB,MAAM,OAAO,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,GAAG,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YAE1C,2BAA2B;YAC3B,OAAO,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,SAAS,GAAG,OAAO,CAAC,CAAC;QACrD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,IAAI,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,KAAmB,EAAE,OAAsB;QACnE,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAC3C,MAAM,OAAO,GAAG,KAAK,CAAC,EAAE,IAAI,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAEpD,oDAAoD;QACpD,IAAI,GAAG,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC,gBAAgB;QAE5C,IAAI,SAAS,CAAC,KAAK,KAAK,MAAM,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;YAC/C,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;QAC9C,CAAC;aAAM,IAAI,SAAS,CAAC,KAAK,KAAK,QAAQ,IAAI,SAAS,CAAC,UAAU,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACnF,MAAM,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,CAAC;YACxE,IAAI,WAAW,EAAE,CAAC;gBAChB,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,WAAW,EAAE,CAAC;YAC7C,CAAC;QACH,CAAC;QAED,mDAAmD;QACnD,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YAClC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC1C,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QAClD,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,iDAAiD;QACjD,IAAI,KAAK,GAAG,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACjC,IAAI,CAAC,KAAK,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;YACjC,6CAA6C;YAC7C,KAAK,GAAG;gBACN,KAAK,EAAE,CAAC;gBACR,MAAM,EAAE,GAAG,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,IAAI,CAAC;aACxC,CAAC;YACF,WAAW,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YAC5B,OAAO,IAAI,CAAC;QACd,CAAC;QAED,wBAAwB;QACxB,KAAK,CAAC,KAAK,EAAE,CAAC;QAEd,kCAAkC;QAClC,OAAO,KAAK,CAAC,KAAK,IAAI,SAAS,CAAC,WAAW,CAAC;IAC9C,CAAC;IAED;;;OAGG;IACI,wBAAwB;QAC7B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,KAAK,MAAM,CAAC,OAAO,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;YAC/D,IAAI,OAAO,GAAG,CAAC,CAAC;YAChB,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,WAAW,CAAC,OAAO,EAAE,EAAE,CAAC;gBACjD,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;oBACvB,WAAW,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;oBACxB,OAAO,EAAE,CAAC;gBACZ,CAAC;YACH,CAAC;YACD,IAAI,OAAO,GAAG,CAAC,EAAE,CAAC;gBAChB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,cAAc,OAAO,kCAAkC,OAAO,EAAE,CAAC,CAAC;YACtF,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACI,cAAc,CAAC,KAAmB,EAAE,QAAgB,EAAE,QAAgB;QAC3E,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAE3C,6CAA6C;QAC7C,KAAK,MAAM,IAAI,IAAI,SAAS,CAAC,KAAK,EAAE,CAAC;YACnC,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;gBAC7D,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;OAMG;IACI,cAAc,CAAC,KAAmB,EAAE,KAAa;QACtD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,OAAO,EAAE,OAAO,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,IAAI,CAAC;YACH,8EAA8E;YAC9E,MAAM,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC;YAEvC,mBAAmB;YACnB,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvB,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC;YAEvE,mBAAmB;YACnB,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,EAAE,CAAC;gBAC/D,OAAO,KAAK,CAAC;YACf,CAAC;YAED,eAAe;YACf,IAAI,OAAO,CAAC,MAAM,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,MAAM,EAAE,CAAC;gBACrD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,IAAI,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,QAAQ,EAAE,CAAC;gBACzD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,4DAA4D;YAC5D,sDAAsD;YAEtD,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,wBAAwB,GAAG,EAAE,CAAC,CAAC;YACjD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
|
|
@@ -1,48 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Bridge between NetworkProxy and SimplifiedCertificateManager
|
|
3
|
-
*/
|
|
4
|
-
import type { SimplifiedCertificateManager } from '../../certificate/simplified-certificate-manager.js';
|
|
5
|
-
import type { NetworkProxy } from './network-proxy.js';
|
|
6
|
-
/**
|
|
7
|
-
* Interface for certificate management in NetworkProxy
|
|
8
|
-
*/
|
|
9
|
-
export interface ISimplifiedCertificateBridge {
|
|
10
|
-
getCertificate(domain: string): Promise<{
|
|
11
|
-
cert: string;
|
|
12
|
-
key: string;
|
|
13
|
-
}>;
|
|
14
|
-
getDefaultCertificate(): Promise<{
|
|
15
|
-
cert: string;
|
|
16
|
-
key: string;
|
|
17
|
-
}>;
|
|
18
|
-
}
|
|
19
|
-
/**
|
|
20
|
-
* Adapter to connect SimplifiedCertificateManager to NetworkProxy
|
|
21
|
-
*/
|
|
22
|
-
export declare class SimplifiedCertificateBridge implements ISimplifiedCertificateBridge {
|
|
23
|
-
private certificateManager;
|
|
24
|
-
private networkProxy;
|
|
25
|
-
constructor(certificateManager: SimplifiedCertificateManager, networkProxy: NetworkProxy);
|
|
26
|
-
/**
|
|
27
|
-
* Get certificate for a domain
|
|
28
|
-
*/
|
|
29
|
-
getCertificate(domain: string): Promise<{
|
|
30
|
-
cert: string;
|
|
31
|
-
key: string;
|
|
32
|
-
}>;
|
|
33
|
-
/**
|
|
34
|
-
* Get default certificate
|
|
35
|
-
*/
|
|
36
|
-
getDefaultCertificate(): Promise<{
|
|
37
|
-
cert: string;
|
|
38
|
-
key: string;
|
|
39
|
-
}>;
|
|
40
|
-
/**
|
|
41
|
-
* Set up event forwarding from certificate manager to network proxy
|
|
42
|
-
*/
|
|
43
|
-
private setupEventForwarding;
|
|
44
|
-
}
|
|
45
|
-
/**
|
|
46
|
-
* Extension to NetworkProxy for simplified certificate management
|
|
47
|
-
*/
|
|
48
|
-
export declare function extendNetworkProxyWithSimplifiedCerts(networkProxy: NetworkProxy, certificateManager: SimplifiedCertificateManager): void;
|