@push.rocks/smartproxy 19.3.2 → 19.3.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/forwarding/factory/forwarding-factory.js +29 -1
- package/dist_ts/http/index.d.ts +1 -3
- package/dist_ts/http/index.js +4 -10
- package/dist_ts/http/models/http-types.d.ts +4 -91
- package/dist_ts/http/models/http-types.js +5 -60
- package/dist_ts/http/router/proxy-router.d.ts +1 -1
- package/dist_ts/http/router/route-router.d.ts +1 -1
- package/dist_ts/index.d.ts +9 -7
- package/dist_ts/index.js +10 -7
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.d.ts +2 -2
- package/dist_ts/proxies/{network-proxy → http-proxy}/certificate-manager.js +1 -1
- package/dist_ts/proxies/{network-proxy → http-proxy}/connection-pool.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/connection-pool.js +210 -0
- package/dist_ts/proxies/http-proxy/context-creator.js +108 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.js +1 -1
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/handlers/index.js +6 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +18 -0
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +78 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +19 -0
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +203 -0
- package/dist_ts/proxies/{network-proxy/network-proxy.d.ts → http-proxy/http-proxy.d.ts} +10 -9
- package/dist_ts/proxies/{network-proxy/network-proxy.js → http-proxy/http-proxy.js} +13 -12
- package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.js +1 -1
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +201 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/index.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/index.js +12 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +119 -0
- package/dist_ts/proxies/http-proxy/models/http-types.js +112 -0
- package/dist_ts/proxies/http-proxy/models/index.d.ts +5 -0
- package/dist_ts/proxies/http-proxy/models/index.js +6 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/models/types.d.ts +2 -2
- package/dist_ts/proxies/http-proxy/models/types.js +276 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/request-handler.js +2 -2
- package/dist_ts/proxies/http-proxy/security-manager.js +255 -0
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.d.ts +3 -3
- package/dist_ts/proxies/{network-proxy → http-proxy}/websocket-handler.js +2 -2
- package/dist_ts/proxies/index.d.ts +5 -5
- package/dist_ts/proxies/index.js +5 -5
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +4 -4
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +11 -11
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +121 -0
- package/dist_ts/proxies/smart-proxy/index.d.ts +2 -1
- package/dist_ts/proxies/smart-proxy/index.js +4 -2
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +2 -2
- package/dist_ts/proxies/smart-proxy/port-manager.js +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +3 -3
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +24 -265
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -1
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +25 -25
- package/dist_ts/routing/index.d.ts +5 -0
- package/dist_ts/routing/index.js +8 -0
- package/dist_ts/routing/models/http-types.d.ts +6 -0
- package/dist_ts/routing/models/http-types.js +7 -0
- package/dist_ts/routing/router/index.d.ts +8 -0
- package/dist_ts/routing/router/index.js +7 -0
- package/dist_ts/{classes.router.d.ts → routing/router/proxy-router.d.ts} +14 -11
- package/dist_ts/{classes.router.js → routing/router/proxy-router.js} +2 -2
- package/dist_ts/routing/router/route-router.d.ts +108 -0
- package/dist_ts/routing/router/route-router.js +393 -0
- package/package.json +1 -1
- package/readme.md +18 -35
- package/readme.plan.md +173 -271
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/forwarding/factory/forwarding-factory.ts +28 -0
- package/ts/index.ts +13 -9
- package/ts/proxies/{network-proxy → http-proxy}/certificate-manager.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/connection-pool.ts +2 -2
- package/ts/proxies/http-proxy/handlers/index.ts +6 -0
- package/ts/proxies/http-proxy/handlers/redirect-handler.ts +105 -0
- package/ts/proxies/http-proxy/handlers/static-handler.ts +251 -0
- package/ts/proxies/{network-proxy/network-proxy.ts → http-proxy/http-proxy.ts} +15 -14
- package/ts/proxies/{network-proxy → http-proxy}/index.ts +3 -3
- package/ts/proxies/http-proxy/models/http-types.ts +165 -0
- package/ts/proxies/http-proxy/models/index.ts +5 -0
- package/ts/proxies/{network-proxy → http-proxy}/models/types.ts +2 -2
- package/ts/proxies/{network-proxy → http-proxy}/request-handler.ts +3 -3
- package/ts/proxies/{network-proxy → http-proxy}/websocket-handler.ts +3 -3
- package/ts/proxies/index.ts +7 -7
- package/ts/proxies/smart-proxy/certificate-manager.ts +10 -10
- package/ts/proxies/smart-proxy/{network-proxy-bridge.ts → http-proxy-bridge.ts} +44 -44
- package/ts/proxies/smart-proxy/index.ts +4 -1
- package/ts/proxies/smart-proxy/models/interfaces.ts +3 -3
- package/ts/proxies/smart-proxy/port-manager.ts +2 -2
- package/ts/proxies/smart-proxy/route-connection-handler.ts +23 -307
- package/ts/proxies/smart-proxy/smart-proxy.ts +25 -25
- package/ts/routing/index.ts +9 -0
- package/ts/routing/models/http-types.ts +6 -0
- package/ts/{http → routing}/router/proxy-router.ts +1 -1
- package/ts/{http → routing}/router/route-router.ts +1 -1
- package/dist_ts/certificate/acme/acme-factory.d.ts +0 -17
- package/dist_ts/certificate/acme/acme-factory.js +0 -40
- package/dist_ts/certificate/acme/challenge-handler.d.ts +0 -44
- package/dist_ts/certificate/acme/challenge-handler.js +0 -92
- package/dist_ts/certificate/acme/index.d.ts +0 -4
- package/dist_ts/certificate/acme/index.js +0 -5
- package/dist_ts/certificate/certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/certificate-manager.js +0 -505
- package/dist_ts/certificate/events/certificate-events.d.ts +0 -33
- package/dist_ts/certificate/events/certificate-events.js +0 -38
- package/dist_ts/certificate/events/simplified-events.d.ts +0 -56
- package/dist_ts/certificate/events/simplified-events.js +0 -13
- package/dist_ts/certificate/index.d.ts +0 -30
- package/dist_ts/certificate/index.js +0 -37
- package/dist_ts/certificate/models/certificate-errors.d.ts +0 -69
- package/dist_ts/certificate/models/certificate-errors.js +0 -141
- package/dist_ts/certificate/models/certificate-strategy.d.ts +0 -60
- package/dist_ts/certificate/models/certificate-strategy.js +0 -73
- package/dist_ts/certificate/models/certificate-types.d.ts +0 -97
- package/dist_ts/certificate/models/certificate-types.js +0 -2
- package/dist_ts/certificate/providers/cert-provisioner.d.ts +0 -119
- package/dist_ts/certificate/providers/cert-provisioner.js +0 -422
- package/dist_ts/certificate/providers/index.d.ts +0 -4
- package/dist_ts/certificate/providers/index.js +0 -5
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +0 -150
- package/dist_ts/certificate/simplified-certificate-manager.js +0 -501
- package/dist_ts/certificate/storage/file-storage.d.ts +0 -66
- package/dist_ts/certificate/storage/file-storage.js +0 -194
- package/dist_ts/certificate/storage/index.d.ts +0 -4
- package/dist_ts/certificate/storage/index.js +0 -5
- package/dist_ts/certificate/utils/certificate-helpers.d.ts +0 -17
- package/dist_ts/certificate/utils/certificate-helpers.js +0 -45
- package/dist_ts/classes.iptablesproxy.d.ts +0 -112
- package/dist_ts/classes.iptablesproxy.js +0 -765
- package/dist_ts/classes.networkproxy.d.ts +0 -243
- package/dist_ts/classes.networkproxy.js +0 -1424
- package/dist_ts/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/classes.nftablesproxy.js +0 -1542
- package/dist_ts/classes.port80handler.d.ts +0 -215
- package/dist_ts/classes.port80handler.js +0 -736
- package/dist_ts/classes.portproxy.d.ts +0 -171
- package/dist_ts/classes.portproxy.js +0 -1802
- package/dist_ts/classes.pp.acmemanager.d.ts +0 -34
- package/dist_ts/classes.pp.acmemanager.js +0 -123
- package/dist_ts/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/classes.pp.connectionhandler.js +0 -754
- package/dist_ts/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +0 -55
- package/dist_ts/classes.pp.domainconfigmanager.js +0 -103
- package/dist_ts/classes.pp.interfaces.d.ts +0 -133
- package/dist_ts/classes.pp.interfaces.js +0 -2
- package/dist_ts/classes.pp.networkproxybridge.d.ts +0 -57
- package/dist_ts/classes.pp.networkproxybridge.js +0 -306
- package/dist_ts/classes.pp.portproxy.d.ts +0 -64
- package/dist_ts/classes.pp.portproxy.js +0 -567
- package/dist_ts/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/classes.pp.portrangemanager.js +0 -179
- package/dist_ts/classes.pp.securitymanager.d.ts +0 -47
- package/dist_ts/classes.pp.securitymanager.js +0 -126
- package/dist_ts/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/classes.pp.snihandler.js +0 -1053
- package/dist_ts/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/classes.pp.tlsalert.js +0 -225
- package/dist_ts/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/classes.snihandler.d.ts +0 -198
- package/dist_ts/classes.snihandler.js +0 -1210
- package/dist_ts/classes.sslredirect.d.ts +0 -8
- package/dist_ts/classes.sslredirect.js +0 -28
- package/dist_ts/common/acmeFactory.d.ts +0 -9
- package/dist_ts/common/acmeFactory.js +0 -20
- package/dist_ts/common/port80-adapter.d.ts +0 -11
- package/dist_ts/common/port80-adapter.js +0 -87
- package/dist_ts/examples/forwarding-example.d.ts +0 -1
- package/dist_ts/examples/forwarding-example.js +0 -96
- package/dist_ts/forwarding/config/domain-config.d.ts +0 -12
- package/dist_ts/forwarding/config/domain-config.js +0 -12
- package/dist_ts/forwarding/config/domain-manager.d.ts +0 -86
- package/dist_ts/forwarding/config/domain-manager.js +0 -242
- package/dist_ts/helpers.certificates.d.ts +0 -5
- package/dist_ts/helpers.certificates.js +0 -23
- package/dist_ts/http/port80/acme-interfaces.d.ts +0 -108
- package/dist_ts/http/port80/acme-interfaces.js +0 -51
- package/dist_ts/http/port80/challenge-responder.d.ts +0 -53
- package/dist_ts/http/port80/challenge-responder.js +0 -203
- package/dist_ts/http/port80/index.d.ts +0 -6
- package/dist_ts/http/port80/index.js +0 -9
- package/dist_ts/http/port80/port80-handler.d.ts +0 -136
- package/dist_ts/http/port80/port80-handler.js +0 -592
- package/dist_ts/http/redirects/index.d.ts +0 -4
- package/dist_ts/http/redirects/index.js +0 -5
- package/dist_ts/networkproxy/classes.np.certificatemanager.d.ts +0 -77
- package/dist_ts/networkproxy/classes.np.certificatemanager.js +0 -372
- package/dist_ts/networkproxy/classes.np.connectionpool.d.ts +0 -47
- package/dist_ts/networkproxy/classes.np.connectionpool.js +0 -210
- package/dist_ts/networkproxy/classes.np.networkproxy.d.ts +0 -118
- package/dist_ts/networkproxy/classes.np.networkproxy.js +0 -387
- package/dist_ts/networkproxy/classes.np.requesthandler.d.ts +0 -56
- package/dist_ts/networkproxy/classes.np.requesthandler.js +0 -393
- package/dist_ts/networkproxy/classes.np.types.d.ts +0 -83
- package/dist_ts/networkproxy/classes.np.types.js +0 -35
- package/dist_ts/networkproxy/classes.np.websockethandler.d.ts +0 -38
- package/dist_ts/networkproxy/classes.np.websockethandler.js +0 -188
- package/dist_ts/networkproxy/index.d.ts +0 -1
- package/dist_ts/networkproxy/index.js +0 -4
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.d.ts +0 -219
- package/dist_ts/nfttablesproxy/classes.nftablesproxy.js +0 -1542
- package/dist_ts/port80handler/classes.port80handler.d.ts +0 -10
- package/dist_ts/port80handler/classes.port80handler.js +0 -16
- package/dist_ts/proxies/network-proxy/connection-pool.js +0 -210
- package/dist_ts/proxies/network-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/network-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/network-proxy/index.js +0 -12
- package/dist_ts/proxies/network-proxy/models/index.d.ts +0 -4
- package/dist_ts/proxies/network-proxy/models/index.js +0 -5
- package/dist_ts/proxies/network-proxy/models/types.js +0 -276
- package/dist_ts/proxies/network-proxy/security-manager.js +0 -255
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +0 -48
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +0 -76
- package/dist_ts/proxies/smart-proxy/connection-handler.d.ts +0 -39
- package/dist_ts/proxies/smart-proxy/connection-handler.js +0 -894
- package/dist_ts/proxies/smart-proxy/domain-config-manager.d.ts +0 -110
- package/dist_ts/proxies/smart-proxy/domain-config-manager.js +0 -386
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +0 -168
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +0 -642
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +0 -65
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +0 -31
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +0 -102
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +0 -73
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +0 -121
- package/dist_ts/proxies/smart-proxy/port-range-manager.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/port-range-manager.js +0 -176
- package/dist_ts/proxies/smart-proxy/route-helpers/index.d.ts +0 -9
- package/dist_ts/proxies/smart-proxy/route-helpers/index.js +0 -11
- package/dist_ts/proxies/smart-proxy/route-helpers.d.ts +0 -7
- package/dist_ts/proxies/smart-proxy/route-helpers.js +0 -9
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +0 -41
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +0 -132
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.d.ts +0 -51
- package/dist_ts/proxies/smart-proxy/utils/route-migration-utils.js +0 -124
- package/dist_ts/redirect/classes.redirect.d.ts +0 -96
- package/dist_ts/redirect/classes.redirect.js +0 -194
- package/dist_ts/smartproxy/classes.pp.certprovisioner.d.ts +0 -54
- package/dist_ts/smartproxy/classes.pp.certprovisioner.js +0 -179
- package/dist_ts/smartproxy/classes.pp.connectionhandler.d.ts +0 -39
- package/dist_ts/smartproxy/classes.pp.connectionhandler.js +0 -894
- package/dist_ts/smartproxy/classes.pp.connectionmanager.d.ts +0 -78
- package/dist_ts/smartproxy/classes.pp.connectionmanager.js +0 -378
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.d.ts +0 -94
- package/dist_ts/smartproxy/classes.pp.domainconfigmanager.js +0 -255
- package/dist_ts/smartproxy/classes.pp.interfaces.d.ts +0 -103
- package/dist_ts/smartproxy/classes.pp.interfaces.js +0 -2
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.d.ts +0 -62
- package/dist_ts/smartproxy/classes.pp.networkproxybridge.js +0 -316
- package/dist_ts/smartproxy/classes.pp.portrangemanager.d.ts +0 -56
- package/dist_ts/smartproxy/classes.pp.portrangemanager.js +0 -176
- package/dist_ts/smartproxy/classes.pp.securitymanager.d.ts +0 -64
- package/dist_ts/smartproxy/classes.pp.securitymanager.js +0 -149
- package/dist_ts/smartproxy/classes.pp.snihandler.d.ts +0 -153
- package/dist_ts/smartproxy/classes.pp.snihandler.js +0 -1053
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.d.ts +0 -47
- package/dist_ts/smartproxy/classes.pp.timeoutmanager.js +0 -154
- package/dist_ts/smartproxy/classes.pp.tlsalert.d.ts +0 -149
- package/dist_ts/smartproxy/classes.pp.tlsalert.js +0 -225
- package/dist_ts/smartproxy/classes.pp.tlsmanager.d.ts +0 -57
- package/dist_ts/smartproxy/classes.pp.tlsmanager.js +0 -132
- package/dist_ts/smartproxy/classes.smartproxy.d.ts +0 -63
- package/dist_ts/smartproxy/classes.smartproxy.js +0 -521
- package/dist_ts/smartproxy/forwarding/domain-config.d.ts +0 -12
- package/dist_ts/smartproxy/forwarding/domain-config.js +0 -12
- package/dist_ts/smartproxy/forwarding/domain-manager.d.ts +0 -86
- package/dist_ts/smartproxy/forwarding/domain-manager.js +0 -241
- package/dist_ts/smartproxy/forwarding/forwarding.factory.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/forwarding.factory.js +0 -137
- package/dist_ts/smartproxy/forwarding/forwarding.handler.d.ts +0 -55
- package/dist_ts/smartproxy/forwarding/forwarding.handler.js +0 -94
- package/dist_ts/smartproxy/forwarding/http.handler.d.ts +0 -25
- package/dist_ts/smartproxy/forwarding/http.handler.js +0 -123
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.d.ts +0 -24
- package/dist_ts/smartproxy/forwarding/https-passthrough.handler.js +0 -154
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.d.ts +0 -36
- package/dist_ts/smartproxy/forwarding/https-terminate-to-http.handler.js +0 -229
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.d.ts +0 -35
- package/dist_ts/smartproxy/forwarding/https-terminate-to-https.handler.js +0 -254
- package/dist_ts/smartproxy/forwarding/index.d.ts +0 -16
- package/dist_ts/smartproxy/forwarding/index.js +0 -23
- package/dist_ts/smartproxy/types/forwarding.types.d.ts +0 -104
- package/dist_ts/smartproxy/types/forwarding.types.js +0 -50
- package/dist_ts/smartproxy.classes.networkproxy.d.ts +0 -31
- package/dist_ts/smartproxy.classes.networkproxy.js +0 -305
- package/dist_ts/smartproxy.classes.router.d.ts +0 -13
- package/dist_ts/smartproxy.classes.router.js +0 -33
- package/dist_ts/smartproxy.classes.sslredirect.d.ts +0 -8
- package/dist_ts/smartproxy.classes.sslredirect.js +0 -28
- package/dist_ts/smartproxy.helpers.certificates.d.ts +0 -5
- package/dist_ts/smartproxy.helpers.certificates.js +0 -23
- package/dist_ts/smartproxy.plugins.d.ts +0 -18
- package/dist_ts/smartproxy.plugins.js +0 -23
- package/dist_ts/smartproxy.portproxy.d.ts +0 -26
- package/dist_ts/smartproxy.portproxy.js +0 -295
- package/ts/http/index.ts +0 -16
- package/ts/http/models/http-types.ts +0 -108
- package/ts/http/redirects/index.ts +0 -3
- package/ts/proxies/network-proxy/models/index.ts +0 -4
- package/ts/redirect/classes.redirect.ts +0 -295
- /package/dist_ts/proxies/{network-proxy → http-proxy}/context-creator.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/function-cache.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/http2-request-handler.d.ts +0 -0
- /package/dist_ts/proxies/{network-proxy → http-proxy}/security-manager.d.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/context-creator.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/function-cache.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/http2-request-handler.ts +0 -0
- /package/ts/proxies/{network-proxy → http-proxy}/security-manager.ts +0 -0
- /package/ts/{http → routing}/router/index.ts +0 -0
|
@@ -1,501 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Simplified, unified certificate manager for SmartProxy
|
|
3
|
-
*/
|
|
4
|
-
import * as plugins from '../plugins.js';
|
|
5
|
-
import * as path from 'path';
|
|
6
|
-
import * as fs from 'fs/promises';
|
|
7
|
-
import { CertificateError, CertificateErrors } from './models/certificate-errors.js';
|
|
8
|
-
import { CertificateEvent } from './events/simplified-events.js';
|
|
9
|
-
/**
|
|
10
|
-
* Unified certificate manager
|
|
11
|
-
*/
|
|
12
|
-
export class SimplifiedCertificateManager extends plugins.EventEmitter {
|
|
13
|
-
constructor(config) {
|
|
14
|
-
super();
|
|
15
|
-
this.certificateCache = new Map();
|
|
16
|
-
this.pendingRequests = new Map();
|
|
17
|
-
// Validate configuration
|
|
18
|
-
if (!config.certProvider) {
|
|
19
|
-
throw CertificateErrors.noCertProvider();
|
|
20
|
-
}
|
|
21
|
-
if (!config.acmeEmail) {
|
|
22
|
-
throw CertificateErrors.missingAcmeEmail();
|
|
23
|
-
}
|
|
24
|
-
// Set defaults
|
|
25
|
-
this.config = {
|
|
26
|
-
...config,
|
|
27
|
-
storageDir: config.storageDir || './certs',
|
|
28
|
-
renewBeforeDays: config.renewBeforeDays || 30,
|
|
29
|
-
defaultCertPath: config.defaultCertPath || path.join(process.cwd(), 'assets/certs/cert.pem'),
|
|
30
|
-
defaultKeyPath: config.defaultKeyPath || path.join(process.cwd(), 'assets/certs/key.pem')
|
|
31
|
-
};
|
|
32
|
-
// Ensure storage directory exists
|
|
33
|
-
this.ensureStorageDir();
|
|
34
|
-
}
|
|
35
|
-
/**
|
|
36
|
-
* Initialize the certificate manager
|
|
37
|
-
*/
|
|
38
|
-
async start() {
|
|
39
|
-
// Initialize ACME client
|
|
40
|
-
await this.initializeAcmeClient();
|
|
41
|
-
// Load stored certificates
|
|
42
|
-
await this.loadStoredCertificates();
|
|
43
|
-
// Start renewal timer
|
|
44
|
-
this.startRenewalTimer();
|
|
45
|
-
}
|
|
46
|
-
/**
|
|
47
|
-
* Stop the certificate manager
|
|
48
|
-
*/
|
|
49
|
-
async stop() {
|
|
50
|
-
if (this.renewalTimer) {
|
|
51
|
-
clearInterval(this.renewalTimer);
|
|
52
|
-
this.renewalTimer = undefined;
|
|
53
|
-
}
|
|
54
|
-
}
|
|
55
|
-
/**
|
|
56
|
-
* Get a certificate for a domain (main entry point)
|
|
57
|
-
*/
|
|
58
|
-
async getCertificate(domain) {
|
|
59
|
-
// Check cache first
|
|
60
|
-
const cached = this.certificateCache.get(domain);
|
|
61
|
-
if (cached && this.isCertificateValid(cached)) {
|
|
62
|
-
return cached;
|
|
63
|
-
}
|
|
64
|
-
// Check for pending request to avoid duplicates
|
|
65
|
-
const pending = this.pendingRequests.get(domain);
|
|
66
|
-
if (pending) {
|
|
67
|
-
return pending;
|
|
68
|
-
}
|
|
69
|
-
// Start new certificate request
|
|
70
|
-
const request = this.requestCertificate(domain);
|
|
71
|
-
this.pendingRequests.set(domain, request);
|
|
72
|
-
try {
|
|
73
|
-
const cert = await request;
|
|
74
|
-
this.pendingRequests.delete(domain);
|
|
75
|
-
return cert;
|
|
76
|
-
}
|
|
77
|
-
catch (error) {
|
|
78
|
-
this.pendingRequests.delete(domain);
|
|
79
|
-
throw error;
|
|
80
|
-
}
|
|
81
|
-
}
|
|
82
|
-
/**
|
|
83
|
-
* Request a new certificate
|
|
84
|
-
*/
|
|
85
|
-
async requestCertificate(domain) {
|
|
86
|
-
try {
|
|
87
|
-
// Get strategy from provider
|
|
88
|
-
let strategy;
|
|
89
|
-
try {
|
|
90
|
-
strategy = await this.config.certProvider(domain);
|
|
91
|
-
}
|
|
92
|
-
catch (providerError) {
|
|
93
|
-
throw CertificateErrors.invalidCertProvider(providerError);
|
|
94
|
-
}
|
|
95
|
-
let certificate;
|
|
96
|
-
switch (strategy.type) {
|
|
97
|
-
case 'acme-http':
|
|
98
|
-
certificate = await this.requestAcmeHttpCertificate(domain);
|
|
99
|
-
break;
|
|
100
|
-
case 'acme-dns':
|
|
101
|
-
certificate = await this.requestAcmeDnsCertificate(domain);
|
|
102
|
-
break;
|
|
103
|
-
case 'static':
|
|
104
|
-
certificate = {
|
|
105
|
-
domain,
|
|
106
|
-
certificate: strategy.cert,
|
|
107
|
-
privateKey: strategy.key,
|
|
108
|
-
expiresAt: strategy.expiresAt || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000),
|
|
109
|
-
source: 'static'
|
|
110
|
-
};
|
|
111
|
-
break;
|
|
112
|
-
case 'skip':
|
|
113
|
-
throw CertificateErrors.certificateNotFound(domain);
|
|
114
|
-
default:
|
|
115
|
-
throw CertificateErrors.invalidCertProvider(new Error('Unknown strategy type'));
|
|
116
|
-
}
|
|
117
|
-
// Cache and store
|
|
118
|
-
this.certificateCache.set(domain, certificate);
|
|
119
|
-
await this.storeCertificate(certificate);
|
|
120
|
-
// Emit success event
|
|
121
|
-
this.emit(CertificateEvent.OBTAINED, {
|
|
122
|
-
domain,
|
|
123
|
-
type: 'new',
|
|
124
|
-
expiresAt: certificate.expiresAt,
|
|
125
|
-
source: certificate.source,
|
|
126
|
-
certificate: certificate.certificate,
|
|
127
|
-
privateKey: certificate.privateKey
|
|
128
|
-
});
|
|
129
|
-
return certificate;
|
|
130
|
-
}
|
|
131
|
-
catch (error) {
|
|
132
|
-
const certError = error instanceof CertificateError
|
|
133
|
-
? error
|
|
134
|
-
: new CertificateError({
|
|
135
|
-
code: 'UNKNOWN_ERROR',
|
|
136
|
-
message: error.message || 'Unknown error',
|
|
137
|
-
domain,
|
|
138
|
-
cause: error
|
|
139
|
-
});
|
|
140
|
-
this.emit(CertificateEvent.FAILED, {
|
|
141
|
-
domain,
|
|
142
|
-
error: certError
|
|
143
|
-
});
|
|
144
|
-
throw certError;
|
|
145
|
-
}
|
|
146
|
-
}
|
|
147
|
-
/**
|
|
148
|
-
* Request certificate via ACME HTTP-01
|
|
149
|
-
*/
|
|
150
|
-
async requestAcmeHttpCertificate(domain) {
|
|
151
|
-
if (domain.includes('*')) {
|
|
152
|
-
throw CertificateErrors.wildcardNotSupported(domain);
|
|
153
|
-
}
|
|
154
|
-
try {
|
|
155
|
-
// Create ACME order
|
|
156
|
-
const order = await this.acmeClient.createOrder({
|
|
157
|
-
identifiers: [{ type: 'dns', value: domain }]
|
|
158
|
-
});
|
|
159
|
-
// Get authorization
|
|
160
|
-
const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
|
|
161
|
-
const challenge = authorization.challenges.find(c => c.type === 'http-01');
|
|
162
|
-
if (!challenge) {
|
|
163
|
-
throw new Error('No HTTP-01 challenge available');
|
|
164
|
-
}
|
|
165
|
-
// Prepare challenge response
|
|
166
|
-
const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
|
|
167
|
-
// Set up HTTP responder (this would integrate with Port80Handler)
|
|
168
|
-
await this.setupHttpChallenge(challenge.token, keyAuthorization);
|
|
169
|
-
// Notify ACME server
|
|
170
|
-
await this.acmeClient.completeChallenge(challenge);
|
|
171
|
-
await this.acmeClient.waitForValidation(challenge);
|
|
172
|
-
// Generate CSR
|
|
173
|
-
const keypair = await this.generateKeypair();
|
|
174
|
-
const csr = await this.generateCsr(domain, keypair);
|
|
175
|
-
// Finalize order
|
|
176
|
-
await this.acmeClient.finalizeOrder(order, csr);
|
|
177
|
-
const cert = await this.acmeClient.getCertificate(order);
|
|
178
|
-
// Clean up challenge
|
|
179
|
-
await this.cleanupHttpChallenge(challenge.token);
|
|
180
|
-
return {
|
|
181
|
-
domain,
|
|
182
|
-
certificate: cert,
|
|
183
|
-
privateKey: keypair.privateKey,
|
|
184
|
-
expiresAt: this.extractExpiryDate(cert),
|
|
185
|
-
source: 'acme-http'
|
|
186
|
-
};
|
|
187
|
-
}
|
|
188
|
-
catch (error) {
|
|
189
|
-
throw CertificateErrors.acmeHttpChallengeFailed(domain, error);
|
|
190
|
-
}
|
|
191
|
-
}
|
|
192
|
-
/**
|
|
193
|
-
* Request certificate via ACME DNS-01
|
|
194
|
-
*/
|
|
195
|
-
async requestAcmeDnsCertificate(domain) {
|
|
196
|
-
try {
|
|
197
|
-
// Create ACME order
|
|
198
|
-
const order = await this.acmeClient.createOrder({
|
|
199
|
-
identifiers: [{ type: 'dns', value: domain }]
|
|
200
|
-
});
|
|
201
|
-
// Get authorization
|
|
202
|
-
const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
|
|
203
|
-
const challenge = authorization.challenges.find(c => c.type === 'dns-01');
|
|
204
|
-
if (!challenge) {
|
|
205
|
-
throw new Error('No DNS-01 challenge available');
|
|
206
|
-
}
|
|
207
|
-
// Get DNS record value
|
|
208
|
-
const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
|
|
209
|
-
const dnsRecord = this.acmeClient.keyAuthorizationToDns01(keyAuthorization);
|
|
210
|
-
// Note: Actual DNS record creation would be handled externally
|
|
211
|
-
console.log(`Please create DNS TXT record: _acme-challenge.${domain} = ${dnsRecord}`);
|
|
212
|
-
// In a real implementation, we'd wait for DNS propagation
|
|
213
|
-
// For now, this is a placeholder
|
|
214
|
-
await new Promise(resolve => setTimeout(resolve, 60000)); // Wait 60 seconds
|
|
215
|
-
// Notify ACME server
|
|
216
|
-
await this.acmeClient.completeChallenge(challenge);
|
|
217
|
-
await this.acmeClient.waitForValidation(challenge);
|
|
218
|
-
// Generate CSR
|
|
219
|
-
const keypair = await this.generateKeypair();
|
|
220
|
-
const csr = await this.generateCsr(domain, keypair);
|
|
221
|
-
// Finalize order
|
|
222
|
-
await this.acmeClient.finalizeOrder(order, csr);
|
|
223
|
-
const cert = await this.acmeClient.getCertificate(order);
|
|
224
|
-
return {
|
|
225
|
-
domain,
|
|
226
|
-
certificate: cert,
|
|
227
|
-
privateKey: keypair.privateKey,
|
|
228
|
-
expiresAt: this.extractExpiryDate(cert),
|
|
229
|
-
source: 'acme-dns'
|
|
230
|
-
};
|
|
231
|
-
}
|
|
232
|
-
catch (error) {
|
|
233
|
-
throw CertificateErrors.acmeDnsChallengeFailed(domain, error);
|
|
234
|
-
}
|
|
235
|
-
}
|
|
236
|
-
/**
|
|
237
|
-
* Renew a certificate
|
|
238
|
-
*/
|
|
239
|
-
async renewCertificate(domain) {
|
|
240
|
-
const existing = this.certificateCache.get(domain);
|
|
241
|
-
if (!existing) {
|
|
242
|
-
throw CertificateErrors.certificateNotFound(domain);
|
|
243
|
-
}
|
|
244
|
-
try {
|
|
245
|
-
// Request new certificate
|
|
246
|
-
const renewed = await this.requestCertificate(domain);
|
|
247
|
-
// Emit renewal event
|
|
248
|
-
this.emit(CertificateEvent.OBTAINED, {
|
|
249
|
-
domain,
|
|
250
|
-
type: 'renewed',
|
|
251
|
-
expiresAt: renewed.expiresAt,
|
|
252
|
-
source: renewed.source,
|
|
253
|
-
certificate: renewed.certificate,
|
|
254
|
-
privateKey: renewed.privateKey
|
|
255
|
-
});
|
|
256
|
-
return renewed;
|
|
257
|
-
}
|
|
258
|
-
catch (error) {
|
|
259
|
-
throw error;
|
|
260
|
-
}
|
|
261
|
-
}
|
|
262
|
-
/**
|
|
263
|
-
* Check certificates for renewal
|
|
264
|
-
*/
|
|
265
|
-
async checkForRenewals() {
|
|
266
|
-
for (const [domain, cert] of this.certificateCache.entries()) {
|
|
267
|
-
if (this.shouldRenew(cert)) {
|
|
268
|
-
try {
|
|
269
|
-
await this.renewCertificate(domain);
|
|
270
|
-
}
|
|
271
|
-
catch (error) {
|
|
272
|
-
console.error(`Failed to renew certificate for ${domain}:`, error);
|
|
273
|
-
}
|
|
274
|
-
}
|
|
275
|
-
else if (this.isExpiringSoon(cert)) {
|
|
276
|
-
this.emit(CertificateEvent.EXPIRING, {
|
|
277
|
-
domain,
|
|
278
|
-
expiresAt: cert.expiresAt,
|
|
279
|
-
daysRemaining: this.getDaysRemaining(cert)
|
|
280
|
-
});
|
|
281
|
-
}
|
|
282
|
-
}
|
|
283
|
-
}
|
|
284
|
-
/**
|
|
285
|
-
* Initialize ACME client
|
|
286
|
-
*/
|
|
287
|
-
async initializeAcmeClient() {
|
|
288
|
-
// ACME client initialization placeholder
|
|
289
|
-
// In a real implementation, this would use an ACME library
|
|
290
|
-
console.log(`Initializing ACME client for ${this.config.acmeServer} environment`);
|
|
291
|
-
}
|
|
292
|
-
/**
|
|
293
|
-
* Load stored certificates from disk
|
|
294
|
-
*/
|
|
295
|
-
async loadStoredCertificates() {
|
|
296
|
-
try {
|
|
297
|
-
const files = await fs.readdir(this.config.storageDir);
|
|
298
|
-
const certFiles = files.filter(f => f.endsWith('.json'));
|
|
299
|
-
for (const file of certFiles) {
|
|
300
|
-
try {
|
|
301
|
-
const content = await fs.readFile(path.join(this.config.storageDir, file), 'utf-8');
|
|
302
|
-
const cert = JSON.parse(content);
|
|
303
|
-
cert.expiresAt = new Date(cert.expiresAt);
|
|
304
|
-
if (this.isCertificateValid(cert)) {
|
|
305
|
-
this.certificateCache.set(cert.domain, cert);
|
|
306
|
-
}
|
|
307
|
-
}
|
|
308
|
-
catch (error) {
|
|
309
|
-
console.error(`Failed to load certificate ${file}:`, error);
|
|
310
|
-
}
|
|
311
|
-
}
|
|
312
|
-
}
|
|
313
|
-
catch (error) {
|
|
314
|
-
console.error('Failed to load certificates:', error);
|
|
315
|
-
}
|
|
316
|
-
}
|
|
317
|
-
/**
|
|
318
|
-
* Store certificate to disk
|
|
319
|
-
*/
|
|
320
|
-
async storeCertificate(cert) {
|
|
321
|
-
const filename = `${cert.domain}.json`;
|
|
322
|
-
const filepath = path.join(this.config.storageDir, filename);
|
|
323
|
-
try {
|
|
324
|
-
await fs.writeFile(filepath, JSON.stringify(cert, null, 2));
|
|
325
|
-
// Also save individual cert and key files
|
|
326
|
-
await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.crt`), cert.certificate);
|
|
327
|
-
await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.key`), cert.privateKey);
|
|
328
|
-
// Set proper permissions on key file
|
|
329
|
-
await fs.chmod(path.join(this.config.storageDir, `${cert.domain}.key`), 0o600);
|
|
330
|
-
}
|
|
331
|
-
catch (error) {
|
|
332
|
-
throw CertificateErrors.storageError('write', filepath, error);
|
|
333
|
-
}
|
|
334
|
-
}
|
|
335
|
-
/**
|
|
336
|
-
* Ensure storage directory exists
|
|
337
|
-
*/
|
|
338
|
-
async ensureStorageDir() {
|
|
339
|
-
try {
|
|
340
|
-
await fs.mkdir(this.config.storageDir, { recursive: true });
|
|
341
|
-
}
|
|
342
|
-
catch (error) {
|
|
343
|
-
console.error('Failed to create storage directory:', error);
|
|
344
|
-
}
|
|
345
|
-
}
|
|
346
|
-
/**
|
|
347
|
-
* Get or create ACME account key
|
|
348
|
-
*/
|
|
349
|
-
async getOrCreateAccountKey() {
|
|
350
|
-
const keyPath = path.join(this.config.storageDir, 'account.key');
|
|
351
|
-
try {
|
|
352
|
-
return await fs.readFile(keyPath, 'utf-8');
|
|
353
|
-
}
|
|
354
|
-
catch {
|
|
355
|
-
// Generate new key - placeholder
|
|
356
|
-
const dummyKey = '-----BEGIN PRIVATE KEY-----\nDUMMY_KEY_FOR_TESTING\n-----END PRIVATE KEY-----';
|
|
357
|
-
await fs.writeFile(keyPath, dummyKey);
|
|
358
|
-
await fs.chmod(keyPath, 0o600);
|
|
359
|
-
return dummyKey;
|
|
360
|
-
}
|
|
361
|
-
}
|
|
362
|
-
/**
|
|
363
|
-
* Generate keypair for certificate
|
|
364
|
-
*/
|
|
365
|
-
async generateKeypair() {
|
|
366
|
-
// Keypair generation placeholder
|
|
367
|
-
return {
|
|
368
|
-
privateKey: '-----BEGIN PRIVATE KEY-----\nDUMMY_PRIVATE_KEY\n-----END PRIVATE KEY-----',
|
|
369
|
-
publicKey: '-----BEGIN PUBLIC KEY-----\nDUMMY_PUBLIC_KEY\n-----END PUBLIC KEY-----'
|
|
370
|
-
};
|
|
371
|
-
}
|
|
372
|
-
/**
|
|
373
|
-
* Generate CSR for domain
|
|
374
|
-
*/
|
|
375
|
-
async generateCsr(domain, keypair) {
|
|
376
|
-
// CSR generation placeholder
|
|
377
|
-
return `-----BEGIN CERTIFICATE REQUEST-----\nDUMMY_CSR_FOR_${domain}\n-----END CERTIFICATE REQUEST-----`;
|
|
378
|
-
}
|
|
379
|
-
/**
|
|
380
|
-
* Extract expiry date from certificate
|
|
381
|
-
*/
|
|
382
|
-
extractExpiryDate(certPem) {
|
|
383
|
-
// Certificate expiry extraction placeholder
|
|
384
|
-
// In a real implementation, this would parse the certificate
|
|
385
|
-
return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days from now
|
|
386
|
-
}
|
|
387
|
-
/**
|
|
388
|
-
* Check if certificate is valid
|
|
389
|
-
*/
|
|
390
|
-
isCertificateValid(cert) {
|
|
391
|
-
return cert.expiresAt > new Date();
|
|
392
|
-
}
|
|
393
|
-
/**
|
|
394
|
-
* Check if certificate should be renewed
|
|
395
|
-
*/
|
|
396
|
-
shouldRenew(cert) {
|
|
397
|
-
const daysRemaining = this.getDaysRemaining(cert);
|
|
398
|
-
return daysRemaining <= this.config.renewBeforeDays;
|
|
399
|
-
}
|
|
400
|
-
/**
|
|
401
|
-
* Check if certificate is expiring soon
|
|
402
|
-
*/
|
|
403
|
-
isExpiringSoon(cert) {
|
|
404
|
-
const daysRemaining = this.getDaysRemaining(cert);
|
|
405
|
-
return daysRemaining <= this.config.renewBeforeDays + 7; // Warn 7 days before renewal
|
|
406
|
-
}
|
|
407
|
-
/**
|
|
408
|
-
* Get days remaining until expiry
|
|
409
|
-
*/
|
|
410
|
-
getDaysRemaining(cert) {
|
|
411
|
-
const now = new Date();
|
|
412
|
-
const diff = cert.expiresAt.getTime() - now.getTime();
|
|
413
|
-
return Math.floor(diff / (1000 * 60 * 60 * 24));
|
|
414
|
-
}
|
|
415
|
-
/**
|
|
416
|
-
* Start renewal timer
|
|
417
|
-
*/
|
|
418
|
-
startRenewalTimer() {
|
|
419
|
-
// Check every 6 hours
|
|
420
|
-
this.renewalTimer = setInterval(() => {
|
|
421
|
-
this.checkForRenewals().catch(error => {
|
|
422
|
-
console.error('Renewal check failed:', error);
|
|
423
|
-
});
|
|
424
|
-
}, 6 * 60 * 60 * 1000);
|
|
425
|
-
// Also check immediately
|
|
426
|
-
this.checkForRenewals().catch(error => {
|
|
427
|
-
console.error('Initial renewal check failed:', error);
|
|
428
|
-
});
|
|
429
|
-
}
|
|
430
|
-
/**
|
|
431
|
-
* Get default certificate for SNI fallback
|
|
432
|
-
*/
|
|
433
|
-
async getDefaultCertificate() {
|
|
434
|
-
try {
|
|
435
|
-
const [cert, key] = await Promise.all([
|
|
436
|
-
fs.readFile(this.config.defaultCertPath, 'utf-8'),
|
|
437
|
-
fs.readFile(this.config.defaultKeyPath, 'utf-8')
|
|
438
|
-
]);
|
|
439
|
-
return { cert, key };
|
|
440
|
-
}
|
|
441
|
-
catch (error) {
|
|
442
|
-
throw new CertificateError({
|
|
443
|
-
code: 'DEFAULT_CERT_ERROR',
|
|
444
|
-
message: 'Failed to load default certificate',
|
|
445
|
-
solution: 'Ensure default certificate files exist at configured paths',
|
|
446
|
-
cause: error
|
|
447
|
-
});
|
|
448
|
-
}
|
|
449
|
-
}
|
|
450
|
-
/**
|
|
451
|
-
* Set up HTTP challenge responder
|
|
452
|
-
*/
|
|
453
|
-
async setupHttpChallenge(token, keyAuthorization) {
|
|
454
|
-
// This would integrate with Port80Handler
|
|
455
|
-
// For now, it's a placeholder
|
|
456
|
-
console.log(`HTTP Challenge: /.well-known/acme-challenge/${token} = ${keyAuthorization}`);
|
|
457
|
-
}
|
|
458
|
-
/**
|
|
459
|
-
* Clean up HTTP challenge
|
|
460
|
-
*/
|
|
461
|
-
async cleanupHttpChallenge(token) {
|
|
462
|
-
// This would integrate with Port80Handler
|
|
463
|
-
// For now, it's a placeholder
|
|
464
|
-
console.log(`Cleanup HTTP Challenge: ${token}`);
|
|
465
|
-
}
|
|
466
|
-
/**
|
|
467
|
-
* Type assertion for event emitter
|
|
468
|
-
*/
|
|
469
|
-
on(event, listener) {
|
|
470
|
-
return super.on(event, listener);
|
|
471
|
-
}
|
|
472
|
-
off(event, listener) {
|
|
473
|
-
return super.off(event, listener);
|
|
474
|
-
}
|
|
475
|
-
emit(event, data) {
|
|
476
|
-
return super.emit(event, data);
|
|
477
|
-
}
|
|
478
|
-
/**
|
|
479
|
-
* Update routes (placeholder for future implementation)
|
|
480
|
-
*/
|
|
481
|
-
async updateRoutes(routes) {
|
|
482
|
-
// Process routes to extract certificate requirements
|
|
483
|
-
for (const route of routes) {
|
|
484
|
-
if (route.action.type === 'forward' &&
|
|
485
|
-
route.action.tls?.mode === 'terminate' &&
|
|
486
|
-
route.action.tls?.certificate === 'auto' &&
|
|
487
|
-
route.match.domains) {
|
|
488
|
-
const domains = Array.isArray(route.match.domains)
|
|
489
|
-
? route.match.domains
|
|
490
|
-
: [route.match.domains];
|
|
491
|
-
for (const domain of domains) {
|
|
492
|
-
// Trigger certificate retrieval for auto domains
|
|
493
|
-
this.getCertificate(domain).catch(err => {
|
|
494
|
-
console.error(`Failed to get certificate for ${domain}:`, err);
|
|
495
|
-
});
|
|
496
|
-
}
|
|
497
|
-
}
|
|
498
|
-
}
|
|
499
|
-
}
|
|
500
|
-
}
|
|
501
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"simplified-certificate-manager.js","sourceRoot":"","sources":["../../ts/certificate/simplified-certificate-manager.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAElC,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACrF,OAAO,EAAE,gBAAgB,EAAE,MAAM,+BAA+B,CAAC;AA+BjE;;GAEG;AACH,MAAM,OAAO,4BAA6B,SAAQ,OAAO,CAAC,YAAY;IAOpE,YAAY,MAAgC;QAC1C,KAAK,EAAE,CAAC;QANF,qBAAgB,GAAG,IAAI,GAAG,EAA6B,CAAC;QAGxD,oBAAe,GAAG,IAAI,GAAG,EAAsC,CAAC;QAKtE,yBAAyB;QACzB,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,cAAc,EAAE,CAAC;QAC3C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;YACtB,MAAM,iBAAiB,CAAC,gBAAgB,EAAE,CAAC;QAC7C,CAAC;QAED,eAAe;QACf,IAAI,CAAC,MAAM,GAAG;YACZ,GAAG,MAAM;YACT,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,SAAS;YAC1C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,EAAE;YAC7C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,uBAAuB,CAAC;YAC5F,cAAc,EAAE,MAAM,CAAC,cAAc,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,sBAAsB,CAAC;SAC1F,CAAC;QAEF,kCAAkC;QAClC,IAAI,CAAC,gBAAgB,EAAE,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,yBAAyB;QACzB,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QAElC,2BAA2B;QAC3B,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAEpC,sBAAsB;QACtB,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,cAAc,CAAC,MAAc;QACxC,oBAAoB;QACpB,MAAM,MAAM,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,MAAM,IAAI,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC9C,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,gDAAgD;QAChD,MAAM,OAAO,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,OAAO,EAAE,CAAC;YACZ,OAAO,OAAO,CAAC;QACjB,CAAC;QAED,gCAAgC;QAChC,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAChD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAE1C,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC;YAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC7C,IAAI,CAAC;YACH,6BAA6B;YAC7B,IAAI,QAA6B,CAAC;YAClC,IAAI,CAAC;gBACH,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;YACpD,CAAC;YAAC,OAAO,aAAa,EAAE,CAAC;gBACvB,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,aAAa,CAAC,CAAC;YAC7D,CAAC;YAED,IAAI,WAA8B,CAAC;YAEnC,QAAQ,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACtB,KAAK,WAAW;oBACd,WAAW,GAAG,MAAM,IAAI,CAAC,0BAA0B,CAAC,MAAM,CAAC,CAAC;oBAC5D,MAAM;gBAER,KAAK,UAAU;oBACb,WAAW,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,CAAC,CAAC;oBAC3D,MAAM;gBAER,KAAK,QAAQ;oBACX,WAAW,GAAG;wBACZ,MAAM;wBACN,WAAW,EAAE,QAAQ,CAAC,IAAI;wBAC1B,UAAU,EAAE,QAAQ,CAAC,GAAG;wBACxB,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;wBAChF,MAAM,EAAE,QAAQ;qBACjB,CAAC;oBACF,MAAM;gBAER,KAAK,MAAM;oBACT,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEtD;oBACE,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC;YACpF,CAAC;YAED,kBAAkB;YAClB,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;YAC/C,MAAM,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;YAEzC,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,KAAK;gBACX,SAAS,EAAE,WAAW,CAAC,SAAS;gBAChC,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,WAAW,EAAE,WAAW,CAAC,WAAW;gBACpC,UAAU,EAAE,WAAW,CAAC,UAAU;aACnC,CAAC,CAAC;YAEH,OAAO,WAAW,CAAC;QAErB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,SAAS,GAAG,KAAK,YAAY,gBAAgB;gBACjD,CAAC,CAAC,KAAK;gBACP,CAAC,CAAC,IAAI,gBAAgB,CAAC;oBACnB,IAAI,EAAE,eAAe;oBACrB,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,eAAe;oBACzC,MAAM;oBACN,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YAEP,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE;gBACjC,MAAM;gBACN,KAAK,EAAE,SAAS;aACjB,CAAC,CAAC;YAEH,MAAM,SAAS,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,0BAA0B,CAAC,MAAc;QACrD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;QAED,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;YAE3E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACpD,CAAC;YAED,6BAA6B;YAC7B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YAEvF,kEAAkE;YAClE,MAAM,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,KAAK,EAAE,gBAAgB,CAAC,CAAC;YAEjE,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,qBAAqB;YACrB,MAAM,IAAI,CAAC,oBAAoB,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YAEjD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,WAAW;aACpB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,uBAAuB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB,CAAC,MAAc;QACpD,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC;YAE1E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,uBAAuB;YACvB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YACvF,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,uBAAuB,CAAC,gBAAgB,CAAC,CAAC;YAE5E,+DAA+D;YAC/D,OAAO,CAAC,GAAG,CAAC,iDAAiD,MAAM,MAAM,SAAS,EAAE,CAAC,CAAC;YAEtF,0DAA0D;YAC1D,iCAAiC;YACjC,MAAM,IAAI,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,kBAAkB;YAE5E,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,UAAU;aACnB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,sBAAsB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACnD,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QACtD,CAAC;QAED,IAAI,CAAC;YACH,0BAA0B;YAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAEtD,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,SAAS;gBACf,SAAS,EAAE,OAAO,CAAC,SAAS;gBAC5B,MAAM,EAAE,OAAO,CAAC,MAAM;gBACtB,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,UAAU,EAAE,OAAO,CAAC,UAAU;aAC/B,CAAC,CAAC;YAEH,OAAO,OAAO,CAAC;QAEjB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,gBAAgB,CAAC,OAAO,EAAE,EAAE,CAAC;YAC7D,IAAI,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;gBACtC,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,mCAAmC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;gBACrE,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;oBACnC,MAAM;oBACN,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,aAAa,EAAE,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC;iBAC3C,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB;QAChC,yCAAyC;QACzC,2DAA2D;QAC3D,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,MAAM,CAAC,UAAU,cAAc,CAAC,CAAC;IACpF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB;QAClC,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACvD,MAAM,SAAS,GAAG,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAEzD,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,IAAI,CAAC;oBACH,MAAM,OAAO,GAAG,MAAM,EAAE,CAAC,QAAQ,CAC/B,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,IAAI,CAAC,EACvC,OAAO,CACR,CAAC;oBACF,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAsB,CAAC;oBACtD,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBAE1C,IAAI,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;wBAClC,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;oBAC/C,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,IAAI,GAAG,EAAE,KAAK,CAAC,CAAC;gBAC9D,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,EAAE,KAAK,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,IAAuB;QACpD,MAAM,QAAQ,GAAG,GAAG,IAAI,CAAC,MAAM,OAAO,CAAC;QACvC,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;QAE7D,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;YAE5D,0CAA0C;YAC1C,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,WAAW,CACjB,CAAC;YACF,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,UAAU,CAChB,CAAC;YAEF,qCAAqC;YACrC,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QAEjF,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAC9D,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,qCAAqC,EAAE,KAAK,CAAC,CAAC;QAC9D,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB;QACjC,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;QAEjE,IAAI,CAAC;YACH,OAAO,MAAM,EAAE,CAAC,QAAQ,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC;QAC7C,CAAC;QAAC,MAAM,CAAC;YACP,iCAAiC;YACjC,MAAM,QAAQ,GAAG,+EAA+E,CAAC;YAEjG,MAAM,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;YACtC,MAAM,EAAE,CAAC,KAAK,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAE/B,OAAO,QAAQ,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,iCAAiC;QACjC,OAAO;YACL,UAAU,EAAE,2EAA2E;YACvF,SAAS,EAAE,wEAAwE;SACpF,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,OAA+B;QACvE,6BAA6B;QAC7B,OAAO,sDAAsD,MAAM,qCAAqC,CAAC;IAC3G,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,OAAe;QACvC,4CAA4C;QAC5C,6DAA6D;QAC7D,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;IAC7E,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,IAAuB;QAChD,OAAO,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAAuB;QACzC,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC;IACtD,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,IAAuB;QAC5C,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC,CAAC,6BAA6B;IACxF,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,IAAuB;QAC9C,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;QACtD,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,GAAG,CAAC,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,sBAAsB;QACtB,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE;YACnC,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;gBACpC,OAAO,CAAC,KAAK,CAAC,uBAAuB,EAAE,KAAK,CAAC,CAAC;YAChD,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAEvB,yBAAyB;QACzB,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;YACpC,OAAO,CAAC,KAAK,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,qBAAqB;QAChC,IAAI,CAAC;YACH,MAAM,CAAC,IAAI,EAAE,GAAG,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;gBACpC,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,EAAE,OAAO,CAAC;gBACjD,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,cAAc,EAAE,OAAO,CAAC;aACjD,CAAC,CAAC;YAEH,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,gBAAgB,CAAC;gBACzB,IAAI,EAAE,oBAAoB;gBAC1B,OAAO,EAAE,oCAAoC;gBAC7C,QAAQ,EAAE,4DAA4D;gBACtE,KAAK,EAAE,KAAK;aACb,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,KAAa,EAAE,gBAAwB;QACtE,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,+CAA+C,KAAK,MAAM,gBAAgB,EAAE,CAAC,CAAC;IAC5F,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,KAAa;QAC9C,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,2BAA2B,KAAK,EAAE,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACI,EAAE,CACP,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,EAAE,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACnC,CAAC;IAEM,GAAG,CACR,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACpC,CAAC;IAEM,IAAI,CACT,KAAQ,EACR,IAA4B;QAE5B,OAAO,KAAK,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,MAAsB;QAC9C,qDAAqD;QACrD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;gBACtC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM;gBACxC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;gBAExB,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;oBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBAE1B,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;oBAC7B,iDAAiD;oBACjD,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;wBACtC,OAAO,CAAC,KAAK,CAAC,iCAAiC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;oBACjE,CAAC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
|
|
@@ -1,66 +0,0 @@
|
|
|
1
|
-
import type { ICertificateData } from '../models/certificate-types.js';
|
|
2
|
-
/**
|
|
3
|
-
* FileStorage provides file system storage for certificates
|
|
4
|
-
*/
|
|
5
|
-
export declare class FileStorage {
|
|
6
|
-
private storageDir;
|
|
7
|
-
/**
|
|
8
|
-
* Creates a new file storage provider
|
|
9
|
-
* @param storageDir Directory to store certificates
|
|
10
|
-
*/
|
|
11
|
-
constructor(storageDir: string);
|
|
12
|
-
/**
|
|
13
|
-
* Save a certificate to the file system
|
|
14
|
-
* @param domain Domain name
|
|
15
|
-
* @param certData Certificate data to save
|
|
16
|
-
*/
|
|
17
|
-
saveCertificate(domain: string, certData: ICertificateData): Promise<void>;
|
|
18
|
-
/**
|
|
19
|
-
* Load a certificate from the file system
|
|
20
|
-
* @param domain Domain name
|
|
21
|
-
* @returns Certificate data if found, null otherwise
|
|
22
|
-
*/
|
|
23
|
-
loadCertificate(domain: string): Promise<ICertificateData | null>;
|
|
24
|
-
/**
|
|
25
|
-
* Delete a certificate from the file system
|
|
26
|
-
* @param domain Domain name
|
|
27
|
-
*/
|
|
28
|
-
deleteCertificate(domain: string): Promise<boolean>;
|
|
29
|
-
/**
|
|
30
|
-
* List all domains with stored certificates
|
|
31
|
-
* @returns Array of domain names
|
|
32
|
-
*/
|
|
33
|
-
listCertificates(): Promise<string[]>;
|
|
34
|
-
/**
|
|
35
|
-
* Check if a certificate is expiring soon
|
|
36
|
-
* @param domain Domain name
|
|
37
|
-
* @param thresholdDays Days threshold to consider expiring
|
|
38
|
-
* @returns Information about expiring certificate or null
|
|
39
|
-
*/
|
|
40
|
-
isExpiringSoon(domain: string, thresholdDays?: number): Promise<{
|
|
41
|
-
domain: string;
|
|
42
|
-
expiryDate: Date;
|
|
43
|
-
daysRemaining: number;
|
|
44
|
-
} | null>;
|
|
45
|
-
/**
|
|
46
|
-
* Check all certificates for expiration
|
|
47
|
-
* @param thresholdDays Days threshold to consider expiring
|
|
48
|
-
* @returns List of expiring certificates
|
|
49
|
-
*/
|
|
50
|
-
getExpiringCertificates(thresholdDays?: number): Promise<Array<{
|
|
51
|
-
domain: string;
|
|
52
|
-
expiryDate: Date;
|
|
53
|
-
daysRemaining: number;
|
|
54
|
-
}>>;
|
|
55
|
-
/**
|
|
56
|
-
* Delete a directory recursively
|
|
57
|
-
* @param directoryPath Directory to delete
|
|
58
|
-
*/
|
|
59
|
-
private deleteDirectory;
|
|
60
|
-
/**
|
|
61
|
-
* Sanitize a domain name for use as a directory name
|
|
62
|
-
* @param domain Domain name
|
|
63
|
-
* @returns Sanitized domain name
|
|
64
|
-
*/
|
|
65
|
-
private sanitizeDomain;
|
|
66
|
-
}
|