@push.rocks/smartproxy 21.1.3 → 21.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. package/changelog.md +23 -0
  2. package/dist_ts/00_commitinfo_data.js +2 -2
  3. package/dist_ts/core/models/socket-augmentation.d.ts +3 -0
  4. package/dist_ts/core/models/socket-augmentation.js +1 -1
  5. package/dist_ts/core/utils/socket-tracker.d.ts +16 -0
  6. package/dist_ts/core/utils/socket-tracker.js +49 -0
  7. package/dist_ts/detection/detectors/http-detector.js +14 -2
  8. package/dist_ts/detection/protocol-detector.js +2 -1
  9. package/dist_ts/proxies/http-proxy/http-proxy.d.ts +5 -1
  10. package/dist_ts/proxies/http-proxy/http-proxy.js +63 -39
  11. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +5 -0
  12. package/dist_ts/proxies/smart-proxy/certificate-manager.js +20 -6
  13. package/dist_ts/proxies/smart-proxy/index.d.ts +1 -0
  14. package/dist_ts/proxies/smart-proxy/index.js +2 -1
  15. package/dist_ts/proxies/smart-proxy/metrics-collector.d.ts +4 -0
  16. package/dist_ts/proxies/smart-proxy/metrics-collector.js +52 -7
  17. package/dist_ts/proxies/smart-proxy/route-orchestrator.d.ts +56 -0
  18. package/dist_ts/proxies/smart-proxy/route-orchestrator.js +204 -0
  19. package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -11
  20. package/dist_ts/proxies/smart-proxy/smart-proxy.js +48 -237
  21. package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +42 -7
  22. package/dist_ts/proxies/smart-proxy/utils/route-validator.d.ts +58 -0
  23. package/dist_ts/proxies/smart-proxy/utils/route-validator.js +405 -0
  24. package/package.json +3 -2
  25. package/readme.md +321 -828
  26. package/ts/00_commitinfo_data.ts +1 -1
  27. package/ts/core/models/socket-augmentation.ts +5 -0
  28. package/ts/core/utils/socket-tracker.ts +63 -0
  29. package/ts/detection/detectors/http-detector.ts +14 -1
  30. package/ts/detection/protocol-detector.ts +1 -0
  31. package/ts/proxies/http-proxy/http-proxy.ts +73 -48
  32. package/ts/proxies/smart-proxy/certificate-manager.ts +21 -5
  33. package/ts/proxies/smart-proxy/index.ts +1 -0
  34. package/ts/proxies/smart-proxy/metrics-collector.ts +58 -6
  35. package/ts/proxies/smart-proxy/route-orchestrator.ts +297 -0
  36. package/ts/proxies/smart-proxy/smart-proxy.ts +66 -270
  37. package/ts/proxies/smart-proxy/utils/route-helpers.ts +45 -6
  38. package/ts/proxies/smart-proxy/utils/route-validator.ts +453 -0
@@ -0,0 +1,204 @@
1
+ import { logger } from '../../core/utils/logger.js';
2
+ import { RouteValidator } from './utils/route-validator.js';
3
+ import { Mutex } from './utils/mutex.js';
4
+ /**
5
+ * Orchestrates route updates and coordination between components
6
+ * Extracted from SmartProxy to reduce class complexity
7
+ */
8
+ export class RouteOrchestrator {
9
+ constructor(portManager, routeManager, httpProxyBridge, nftablesManager, certManager, logger) {
10
+ this.certManager = null;
11
+ this.portManager = portManager;
12
+ this.routeManager = routeManager;
13
+ this.httpProxyBridge = httpProxyBridge;
14
+ this.nftablesManager = nftablesManager;
15
+ this.certManager = certManager;
16
+ this.logger = logger;
17
+ this.routeUpdateLock = new Mutex();
18
+ }
19
+ /**
20
+ * Set or update certificate manager reference
21
+ */
22
+ setCertManager(certManager) {
23
+ this.certManager = certManager;
24
+ }
25
+ /**
26
+ * Get certificate manager reference
27
+ */
28
+ getCertManager() {
29
+ return this.certManager;
30
+ }
31
+ /**
32
+ * Update routes with validation and coordination
33
+ */
34
+ async updateRoutes(oldRoutes, newRoutes, options = {}) {
35
+ return this.routeUpdateLock.runExclusive(async () => {
36
+ // Validate route configurations
37
+ const validation = RouteValidator.validateRoutes(newRoutes);
38
+ if (!validation.valid) {
39
+ RouteValidator.logValidationErrors(validation.errors);
40
+ throw new Error(`Route validation failed: ${validation.errors.size} route(s) have errors`);
41
+ }
42
+ // Track port usage before and after updates
43
+ const oldPortUsage = this.updatePortUsageMap(oldRoutes);
44
+ const newPortUsage = this.updatePortUsageMap(newRoutes);
45
+ // Get the lists of currently listening ports and new ports needed
46
+ const currentPorts = new Set(this.portManager.getListeningPorts());
47
+ const newPortsSet = new Set(newPortUsage.keys());
48
+ // Log the port usage for debugging
49
+ this.logger.debug(`Current listening ports: ${Array.from(currentPorts).join(', ')}`);
50
+ this.logger.debug(`Ports needed for new routes: ${Array.from(newPortsSet).join(', ')}`);
51
+ // Find orphaned ports - ports that no longer have any routes
52
+ const orphanedPorts = this.findOrphanedPorts(oldPortUsage, newPortUsage);
53
+ // Find new ports that need binding (only ports that we aren't already listening on)
54
+ const newBindingPorts = Array.from(newPortsSet).filter(p => !currentPorts.has(p));
55
+ // Check for ACME challenge port to give it special handling
56
+ const acmePort = options.acmePort || 80;
57
+ const acmePortNeeded = newPortsSet.has(acmePort);
58
+ const acmePortListed = newBindingPorts.includes(acmePort);
59
+ if (acmePortNeeded && acmePortListed) {
60
+ this.logger.info(`Adding ACME challenge port ${acmePort} to routes`);
61
+ }
62
+ // Update NFTables routes
63
+ await this.updateNfTablesRoutes(oldRoutes, newRoutes);
64
+ // Update routes in RouteManager
65
+ this.routeManager.updateRoutes(newRoutes);
66
+ // Release orphaned ports first to free resources
67
+ if (orphanedPorts.length > 0) {
68
+ this.logger.info(`Releasing ${orphanedPorts.length} orphaned ports: ${orphanedPorts.join(', ')}`);
69
+ await this.portManager.removePorts(orphanedPorts);
70
+ }
71
+ // Add new ports if needed
72
+ if (newBindingPorts.length > 0) {
73
+ this.logger.info(`Binding to ${newBindingPorts.length} new ports: ${newBindingPorts.join(', ')}`);
74
+ // Handle port binding with improved error recovery
75
+ try {
76
+ await this.portManager.addPorts(newBindingPorts);
77
+ }
78
+ catch (error) {
79
+ // Special handling for port binding errors
80
+ if (error.code === 'EADDRINUSE') {
81
+ const port = error.port || newBindingPorts[0];
82
+ const isAcmePort = port === acmePort;
83
+ if (isAcmePort) {
84
+ this.logger.warn(`Could not bind to ACME challenge port ${port}. It may be in use by another application.`);
85
+ // Re-throw with more helpful message
86
+ throw new Error(`ACME challenge port ${port} is already in use by another application. ` +
87
+ `Configure a different port in settings.acme.port (e.g., 8080) or free up port ${port}.`);
88
+ }
89
+ }
90
+ // Re-throw the original error for other cases
91
+ throw error;
92
+ }
93
+ }
94
+ // If HttpProxy is initialized, resync the configurations
95
+ if (this.httpProxyBridge.getHttpProxy()) {
96
+ await this.httpProxyBridge.syncRoutesToHttpProxy(newRoutes);
97
+ }
98
+ // Update certificate manager if needed
99
+ let newCertManager;
100
+ let newChallengeRouteActive = options.globalChallengeRouteActive || false;
101
+ if (this.certManager && options.createCertificateManager) {
102
+ const existingAcmeOptions = this.certManager.getAcmeOptions();
103
+ const existingState = this.certManager.getState();
104
+ // Store global state before stopping
105
+ newChallengeRouteActive = existingState.challengeRouteActive;
106
+ // Keep certificate manager routes in sync before stopping
107
+ this.certManager.setRoutes(newRoutes);
108
+ await this.certManager.stop();
109
+ // Verify the challenge route has been properly removed
110
+ if (options.verifyChallengeRouteRemoved) {
111
+ await options.verifyChallengeRouteRemoved();
112
+ }
113
+ // Create new certificate manager with preserved state
114
+ newCertManager = await options.createCertificateManager(newRoutes, './certs', existingAcmeOptions, { challengeRouteActive: newChallengeRouteActive });
115
+ this.certManager = newCertManager;
116
+ }
117
+ return {
118
+ portUsageMap: newPortUsage,
119
+ newChallengeRouteActive,
120
+ newCertManager
121
+ };
122
+ });
123
+ }
124
+ /**
125
+ * Update port usage map based on the provided routes
126
+ */
127
+ updatePortUsageMap(routes) {
128
+ const portUsage = new Map();
129
+ for (const route of routes) {
130
+ // Get the ports for this route
131
+ const portsConfig = Array.isArray(route.match.ports)
132
+ ? route.match.ports
133
+ : [route.match.ports];
134
+ // Expand port range objects to individual port numbers
135
+ const expandedPorts = [];
136
+ for (const portConfig of portsConfig) {
137
+ if (typeof portConfig === 'number') {
138
+ expandedPorts.push(portConfig);
139
+ }
140
+ else if (typeof portConfig === 'object' && 'from' in portConfig && 'to' in portConfig) {
141
+ // Expand the port range
142
+ for (let p = portConfig.from; p <= portConfig.to; p++) {
143
+ expandedPorts.push(p);
144
+ }
145
+ }
146
+ }
147
+ // Use route name if available, otherwise generate a unique ID
148
+ const routeName = route.name || `unnamed_${Math.random().toString(36).substring(2, 9)}`;
149
+ // Add each port to the usage map
150
+ for (const port of expandedPorts) {
151
+ if (!portUsage.has(port)) {
152
+ portUsage.set(port, new Set());
153
+ }
154
+ portUsage.get(port).add(routeName);
155
+ }
156
+ }
157
+ // Log port usage for debugging
158
+ for (const [port, routes] of portUsage.entries()) {
159
+ this.logger.debug(`Port ${port} is used by ${routes.size} routes: ${Array.from(routes).join(', ')}`);
160
+ }
161
+ return portUsage;
162
+ }
163
+ /**
164
+ * Find ports that have no routes in the new configuration
165
+ */
166
+ findOrphanedPorts(oldUsage, newUsage) {
167
+ const orphanedPorts = [];
168
+ for (const [port, routes] of oldUsage.entries()) {
169
+ if (!newUsage.has(port) || newUsage.get(port).size === 0) {
170
+ orphanedPorts.push(port);
171
+ }
172
+ }
173
+ return orphanedPorts;
174
+ }
175
+ /**
176
+ * Update NFTables routes
177
+ */
178
+ async updateNfTablesRoutes(oldRoutes, newRoutes) {
179
+ // Get existing routes that use NFTables and update them
180
+ const oldNfTablesRoutes = oldRoutes.filter(r => r.action.forwardingEngine === 'nftables');
181
+ const newNfTablesRoutes = newRoutes.filter(r => r.action.forwardingEngine === 'nftables');
182
+ // Update existing NFTables routes
183
+ for (const oldRoute of oldNfTablesRoutes) {
184
+ const newRoute = newNfTablesRoutes.find(r => r.name === oldRoute.name);
185
+ if (!newRoute) {
186
+ // Route was removed
187
+ await this.nftablesManager.deprovisionRoute(oldRoute);
188
+ }
189
+ else {
190
+ // Route was updated
191
+ await this.nftablesManager.updateRoute(oldRoute, newRoute);
192
+ }
193
+ }
194
+ // Add new NFTables routes
195
+ for (const newRoute of newNfTablesRoutes) {
196
+ const oldRoute = oldNfTablesRoutes.find(r => r.name === newRoute.name);
197
+ if (!oldRoute) {
198
+ // New route
199
+ await this.nftablesManager.provisionRoute(newRoute);
200
+ }
201
+ }
202
+ }
203
+ }
204
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"route-orchestrator.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/route-orchestrator.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AAGpD,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAC5D,OAAO,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAOzC;;;GAGG;AACH,MAAM,OAAO,iBAAiB;IAS5B,YACE,WAAwB,EACxB,YAA0B,EAC1B,eAAgC,EAChC,eAAgC,EAChC,WAAoC,EACpC,MAAe;QATT,gBAAW,GAA4B,IAAI,CAAC;QAWlD,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QAC/B,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QAC/B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACI,cAAc,CAAC,WAAoC;QACxD,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CACvB,SAAyB,EACzB,SAAyB,EACzB,UAYI,EAAE;QAMN,OAAO,IAAI,CAAC,eAAe,CAAC,YAAY,CAAC,KAAK,IAAI,EAAE;YAClD,gCAAgC;YAChC,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC5D,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,4BAA4B,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YAC7F,CAAC;YAED,4CAA4C;YAC5C,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;YACxD,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;YAExD,kEAAkE;YAClE,MAAM,YAAY,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE,CAAC,CAAC;YACnE,MAAM,WAAW,GAAG,IAAI,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC,CAAC;YAEjD,mCAAmC;YACnC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,4BAA4B,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACrF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gCAAgC,KAAK,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YAExF,6DAA6D;YAC7D,MAAM,aAAa,GAAG,IAAI,CAAC,iBAAiB,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;YAEzE,oFAAoF;YACpF,MAAM,eAAe,GAAG,KAAK,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;YAElF,4DAA4D;YAC5D,MAAM,QAAQ,GAAG,OAAO,CAAC,QAAQ,IAAI,EAAE,CAAC;YACxC,MAAM,cAAc,GAAG,WAAW,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YACjD,MAAM,cAAc,GAAG,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YAE1D,IAAI,cAAc,IAAI,cAAc,EAAE,CAAC;gBACrC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,QAAQ,YAAY,CAAC,CAAC;YACvE,CAAC;YAED,yBAAyB;YACzB,MAAM,IAAI,CAAC,oBAAoB,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;YAEtD,gCAAgC;YAChC,IAAI,CAAC,YAAY,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;YAE1C,iDAAiD;YACjD,IAAI,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC7B,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,aAAa,CAAC,MAAM,oBAAoB,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAClG,MAAM,IAAI,CAAC,WAAW,CAAC,WAAW,CAAC,aAAa,CAAC,CAAC;YACpD,CAAC;YAED,0BAA0B;YAC1B,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC/B,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,eAAe,CAAC,MAAM,eAAe,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAElG,mDAAmD;gBACnD,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;gBACnD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,2CAA2C;oBAC3C,IAAK,KAAa,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;wBACzC,MAAM,IAAI,GAAI,KAAa,CAAC,IAAI,IAAI,eAAe,CAAC,CAAC,CAAC,CAAC;wBACvD,MAAM,UAAU,GAAG,IAAI,KAAK,QAAQ,CAAC;wBAErC,IAAI,UAAU,EAAE,CAAC;4BACf,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,yCAAyC,IAAI,4CAA4C,CAAC,CAAC;4BAE5G,qCAAqC;4BACrC,MAAM,IAAI,KAAK,CACb,uBAAuB,IAAI,6CAA6C;gCACxE,iFAAiF,IAAI,GAAG,CACzF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,8CAA8C;oBAC9C,MAAM,KAAK,CAAC;gBACd,CAAC;YACH,CAAC;YAED,yDAAyD;YACzD,IAAI,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;gBACxC,MAAM,IAAI,CAAC,eAAe,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAC;YAC9D,CAAC;YAED,uCAAuC;YACvC,IAAI,cAA4C,CAAC;YACjD,IAAI,uBAAuB,GAAG,OAAO,CAAC,0BAA0B,IAAI,KAAK,CAAC;YAE1E,IAAI,IAAI,CAAC,WAAW,IAAI,OAAO,CAAC,wBAAwB,EAAE,CAAC;gBACzD,MAAM,mBAAmB,GAAG,IAAI,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC;gBAC9D,MAAM,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC,QAAQ,EAAE,CAAC;gBAElD,qCAAqC;gBACrC,uBAAuB,GAAG,aAAa,CAAC,oBAAoB,CAAC;gBAE7D,0DAA0D;gBAC1D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC;gBAEtC,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;gBAE9B,uDAAuD;gBACvD,IAAI,OAAO,CAAC,2BAA2B,EAAE,CAAC;oBACxC,MAAM,OAAO,CAAC,2BAA2B,EAAE,CAAC;gBAC9C,CAAC;gBAED,sDAAsD;gBACtD,cAAc,GAAG,MAAM,OAAO,CAAC,wBAAwB,CACrD,SAAS,EACT,SAAS,EACT,mBAAmB,EACnB,EAAE,oBAAoB,EAAE,uBAAuB,EAAE,CAClD,CAAC;gBAEF,IAAI,CAAC,WAAW,GAAG,cAAc,CAAC;YACpC,CAAC;YAED,OAAO;gBACL,YAAY,EAAE,YAAY;gBAC1B,uBAAuB;gBACvB,cAAc;aACf,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,kBAAkB,CAAC,MAAsB;QAC9C,MAAM,SAAS,GAAG,IAAI,GAAG,EAAuB,CAAC;QAEjD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,+BAA+B;YAC/B,MAAM,WAAW,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;gBAClD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK;gBACnB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YAExB,uDAAuD;YACvD,MAAM,aAAa,GAAa,EAAE,CAAC;YACnC,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE,CAAC;oBACnC,aAAa,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;gBACjC,CAAC;qBAAM,IAAI,OAAO,UAAU,KAAK,QAAQ,IAAI,MAAM,IAAI,UAAU,IAAI,IAAI,IAAI,UAAU,EAAE,CAAC;oBACxF,wBAAwB;oBACxB,KAAK,IAAI,CAAC,GAAG,UAAU,CAAC,IAAI,EAAE,CAAC,IAAI,UAAU,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACtD,aAAa,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;oBACxB,CAAC;gBACH,CAAC;YACH,CAAC;YAED,8DAA8D;YAC9D,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,WAAW,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;YAExF,iCAAiC;YACjC,KAAK,MAAM,IAAI,IAAI,aAAa,EAAE,CAAC;gBACjC,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC;oBACzB,SAAS,CAAC,GAAG,CAAC,IAAI,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;gBACjC,CAAC;gBACD,SAAS,CAAC,GAAG,CAAC,IAAI,CAAE,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACtC,CAAC;QACH,CAAC;QAED,+BAA+B;QAC/B,KAAK,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC,IAAI,SAAS,CAAC,OAAO,EAAE,EAAE,CAAC;YACjD,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,QAAQ,IAAI,eAAe,MAAM,CAAC,IAAI,YAAY,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACvG,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,QAAkC,EAAE,QAAkC;QAC9F,MAAM,aAAa,GAAa,EAAE,CAAC;QAEnC,KAAK,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC,IAAI,QAAQ,CAAC,OAAO,EAAE,EAAE,CAAC;YAChD,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAE,CAAC,IAAI,KAAK,CAAC,EAAE,CAAC;gBAC1D,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC3B,CAAC;QACH,CAAC;QAED,OAAO,aAAa,CAAC;IACvB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,SAAyB,EAAE,SAAyB;QACrF,wDAAwD;QACxD,MAAM,iBAAiB,GAAG,SAAS,CAAC,MAAM,CACxC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,gBAAgB,KAAK,UAAU,CAC9C,CAAC;QAEF,MAAM,iBAAiB,GAAG,SAAS,CAAC,MAAM,CACxC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,gBAAgB,KAAK,UAAU,CAC9C,CAAC;QAEF,kCAAkC;QAClC,KAAK,MAAM,QAAQ,IAAI,iBAAiB,EAAE,CAAC;YACzC,MAAM,QAAQ,GAAG,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,IAAI,CAAC,CAAC;YAEvE,IAAI,CAAC,QAAQ,EAAE,CAAC;gBACd,oBAAoB;gBACpB,MAAM,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YACxD,CAAC;iBAAM,CAAC;gBACN,oBAAoB;gBACpB,MAAM,IAAI,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;QAED,0BAA0B;QAC1B,KAAK,MAAM,QAAQ,IAAI,iBAAiB,EAAE,CAAC;YACzC,MAAM,QAAQ,GAAG,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,IAAI,CAAC,CAAC;YAEvE,IAAI,CAAC,QAAQ,EAAE,CAAC;gBACd,YAAY;gBACZ,MAAM,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YACtD,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
@@ -43,6 +43,7 @@ export declare class SmartProxy extends plugins.EventEmitter {
43
43
  private routeUpdateLock;
44
44
  acmeStateManager: AcmeStateManager;
45
45
  metricsCollector: MetricsCollector;
46
+ private routeOrchestrator;
46
47
  private portUsageMap;
47
48
  /**
48
49
  * Constructor for SmartProxy
@@ -144,17 +145,6 @@ export declare class SmartProxy extends plugins.EventEmitter {
144
145
  * Manually provision a certificate for a route
145
146
  */
146
147
  provisionCertificate(routeName: string): Promise<void>;
147
- /**
148
- * Update the port usage map based on the provided routes
149
- *
150
- * This tracks which ports are used by which routes, allowing us to
151
- * detect when a port is no longer needed and can be released.
152
- */
153
- private updatePortUsageMap;
154
- /**
155
- * Find ports that have no routes in the new configuration
156
- */
157
- private findOrphanedPorts;
158
148
  /**
159
149
  * Force renewal of a certificate
160
150
  */