@push.rocks/smartproxy 21.1.3 → 21.1.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/changelog.md +23 -0
- package/dist_ts/00_commitinfo_data.js +2 -2
- package/dist_ts/core/models/socket-augmentation.d.ts +3 -0
- package/dist_ts/core/models/socket-augmentation.js +1 -1
- package/dist_ts/core/utils/socket-tracker.d.ts +16 -0
- package/dist_ts/core/utils/socket-tracker.js +49 -0
- package/dist_ts/detection/detectors/http-detector.js +14 -2
- package/dist_ts/detection/protocol-detector.js +2 -1
- package/dist_ts/proxies/http-proxy/http-proxy.d.ts +5 -1
- package/dist_ts/proxies/http-proxy/http-proxy.js +63 -39
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +5 -0
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +20 -6
- package/dist_ts/proxies/smart-proxy/index.d.ts +1 -0
- package/dist_ts/proxies/smart-proxy/index.js +2 -1
- package/dist_ts/proxies/smart-proxy/metrics-collector.d.ts +4 -0
- package/dist_ts/proxies/smart-proxy/metrics-collector.js +52 -7
- package/dist_ts/proxies/smart-proxy/route-orchestrator.d.ts +56 -0
- package/dist_ts/proxies/smart-proxy/route-orchestrator.js +204 -0
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +1 -11
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +48 -237
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +42 -7
- package/dist_ts/proxies/smart-proxy/utils/route-validator.d.ts +58 -0
- package/dist_ts/proxies/smart-proxy/utils/route-validator.js +405 -0
- package/package.json +3 -2
- package/readme.md +321 -828
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/core/models/socket-augmentation.ts +5 -0
- package/ts/core/utils/socket-tracker.ts +63 -0
- package/ts/detection/detectors/http-detector.ts +14 -1
- package/ts/detection/protocol-detector.ts +1 -0
- package/ts/proxies/http-proxy/http-proxy.ts +73 -48
- package/ts/proxies/smart-proxy/certificate-manager.ts +21 -5
- package/ts/proxies/smart-proxy/index.ts +1 -0
- package/ts/proxies/smart-proxy/metrics-collector.ts +58 -6
- package/ts/proxies/smart-proxy/route-orchestrator.ts +297 -0
- package/ts/proxies/smart-proxy/smart-proxy.ts +66 -270
- package/ts/proxies/smart-proxy/utils/route-helpers.ts +45 -6
- package/ts/proxies/smart-proxy/utils/route-validator.ts +453 -0
|
@@ -0,0 +1,204 @@
|
|
|
1
|
+
import { logger } from '../../core/utils/logger.js';
|
|
2
|
+
import { RouteValidator } from './utils/route-validator.js';
|
|
3
|
+
import { Mutex } from './utils/mutex.js';
|
|
4
|
+
/**
|
|
5
|
+
* Orchestrates route updates and coordination between components
|
|
6
|
+
* Extracted from SmartProxy to reduce class complexity
|
|
7
|
+
*/
|
|
8
|
+
export class RouteOrchestrator {
|
|
9
|
+
constructor(portManager, routeManager, httpProxyBridge, nftablesManager, certManager, logger) {
|
|
10
|
+
this.certManager = null;
|
|
11
|
+
this.portManager = portManager;
|
|
12
|
+
this.routeManager = routeManager;
|
|
13
|
+
this.httpProxyBridge = httpProxyBridge;
|
|
14
|
+
this.nftablesManager = nftablesManager;
|
|
15
|
+
this.certManager = certManager;
|
|
16
|
+
this.logger = logger;
|
|
17
|
+
this.routeUpdateLock = new Mutex();
|
|
18
|
+
}
|
|
19
|
+
/**
|
|
20
|
+
* Set or update certificate manager reference
|
|
21
|
+
*/
|
|
22
|
+
setCertManager(certManager) {
|
|
23
|
+
this.certManager = certManager;
|
|
24
|
+
}
|
|
25
|
+
/**
|
|
26
|
+
* Get certificate manager reference
|
|
27
|
+
*/
|
|
28
|
+
getCertManager() {
|
|
29
|
+
return this.certManager;
|
|
30
|
+
}
|
|
31
|
+
/**
|
|
32
|
+
* Update routes with validation and coordination
|
|
33
|
+
*/
|
|
34
|
+
async updateRoutes(oldRoutes, newRoutes, options = {}) {
|
|
35
|
+
return this.routeUpdateLock.runExclusive(async () => {
|
|
36
|
+
// Validate route configurations
|
|
37
|
+
const validation = RouteValidator.validateRoutes(newRoutes);
|
|
38
|
+
if (!validation.valid) {
|
|
39
|
+
RouteValidator.logValidationErrors(validation.errors);
|
|
40
|
+
throw new Error(`Route validation failed: ${validation.errors.size} route(s) have errors`);
|
|
41
|
+
}
|
|
42
|
+
// Track port usage before and after updates
|
|
43
|
+
const oldPortUsage = this.updatePortUsageMap(oldRoutes);
|
|
44
|
+
const newPortUsage = this.updatePortUsageMap(newRoutes);
|
|
45
|
+
// Get the lists of currently listening ports and new ports needed
|
|
46
|
+
const currentPorts = new Set(this.portManager.getListeningPorts());
|
|
47
|
+
const newPortsSet = new Set(newPortUsage.keys());
|
|
48
|
+
// Log the port usage for debugging
|
|
49
|
+
this.logger.debug(`Current listening ports: ${Array.from(currentPorts).join(', ')}`);
|
|
50
|
+
this.logger.debug(`Ports needed for new routes: ${Array.from(newPortsSet).join(', ')}`);
|
|
51
|
+
// Find orphaned ports - ports that no longer have any routes
|
|
52
|
+
const orphanedPorts = this.findOrphanedPorts(oldPortUsage, newPortUsage);
|
|
53
|
+
// Find new ports that need binding (only ports that we aren't already listening on)
|
|
54
|
+
const newBindingPorts = Array.from(newPortsSet).filter(p => !currentPorts.has(p));
|
|
55
|
+
// Check for ACME challenge port to give it special handling
|
|
56
|
+
const acmePort = options.acmePort || 80;
|
|
57
|
+
const acmePortNeeded = newPortsSet.has(acmePort);
|
|
58
|
+
const acmePortListed = newBindingPorts.includes(acmePort);
|
|
59
|
+
if (acmePortNeeded && acmePortListed) {
|
|
60
|
+
this.logger.info(`Adding ACME challenge port ${acmePort} to routes`);
|
|
61
|
+
}
|
|
62
|
+
// Update NFTables routes
|
|
63
|
+
await this.updateNfTablesRoutes(oldRoutes, newRoutes);
|
|
64
|
+
// Update routes in RouteManager
|
|
65
|
+
this.routeManager.updateRoutes(newRoutes);
|
|
66
|
+
// Release orphaned ports first to free resources
|
|
67
|
+
if (orphanedPorts.length > 0) {
|
|
68
|
+
this.logger.info(`Releasing ${orphanedPorts.length} orphaned ports: ${orphanedPorts.join(', ')}`);
|
|
69
|
+
await this.portManager.removePorts(orphanedPorts);
|
|
70
|
+
}
|
|
71
|
+
// Add new ports if needed
|
|
72
|
+
if (newBindingPorts.length > 0) {
|
|
73
|
+
this.logger.info(`Binding to ${newBindingPorts.length} new ports: ${newBindingPorts.join(', ')}`);
|
|
74
|
+
// Handle port binding with improved error recovery
|
|
75
|
+
try {
|
|
76
|
+
await this.portManager.addPorts(newBindingPorts);
|
|
77
|
+
}
|
|
78
|
+
catch (error) {
|
|
79
|
+
// Special handling for port binding errors
|
|
80
|
+
if (error.code === 'EADDRINUSE') {
|
|
81
|
+
const port = error.port || newBindingPorts[0];
|
|
82
|
+
const isAcmePort = port === acmePort;
|
|
83
|
+
if (isAcmePort) {
|
|
84
|
+
this.logger.warn(`Could not bind to ACME challenge port ${port}. It may be in use by another application.`);
|
|
85
|
+
// Re-throw with more helpful message
|
|
86
|
+
throw new Error(`ACME challenge port ${port} is already in use by another application. ` +
|
|
87
|
+
`Configure a different port in settings.acme.port (e.g., 8080) or free up port ${port}.`);
|
|
88
|
+
}
|
|
89
|
+
}
|
|
90
|
+
// Re-throw the original error for other cases
|
|
91
|
+
throw error;
|
|
92
|
+
}
|
|
93
|
+
}
|
|
94
|
+
// If HttpProxy is initialized, resync the configurations
|
|
95
|
+
if (this.httpProxyBridge.getHttpProxy()) {
|
|
96
|
+
await this.httpProxyBridge.syncRoutesToHttpProxy(newRoutes);
|
|
97
|
+
}
|
|
98
|
+
// Update certificate manager if needed
|
|
99
|
+
let newCertManager;
|
|
100
|
+
let newChallengeRouteActive = options.globalChallengeRouteActive || false;
|
|
101
|
+
if (this.certManager && options.createCertificateManager) {
|
|
102
|
+
const existingAcmeOptions = this.certManager.getAcmeOptions();
|
|
103
|
+
const existingState = this.certManager.getState();
|
|
104
|
+
// Store global state before stopping
|
|
105
|
+
newChallengeRouteActive = existingState.challengeRouteActive;
|
|
106
|
+
// Keep certificate manager routes in sync before stopping
|
|
107
|
+
this.certManager.setRoutes(newRoutes);
|
|
108
|
+
await this.certManager.stop();
|
|
109
|
+
// Verify the challenge route has been properly removed
|
|
110
|
+
if (options.verifyChallengeRouteRemoved) {
|
|
111
|
+
await options.verifyChallengeRouteRemoved();
|
|
112
|
+
}
|
|
113
|
+
// Create new certificate manager with preserved state
|
|
114
|
+
newCertManager = await options.createCertificateManager(newRoutes, './certs', existingAcmeOptions, { challengeRouteActive: newChallengeRouteActive });
|
|
115
|
+
this.certManager = newCertManager;
|
|
116
|
+
}
|
|
117
|
+
return {
|
|
118
|
+
portUsageMap: newPortUsage,
|
|
119
|
+
newChallengeRouteActive,
|
|
120
|
+
newCertManager
|
|
121
|
+
};
|
|
122
|
+
});
|
|
123
|
+
}
|
|
124
|
+
/**
|
|
125
|
+
* Update port usage map based on the provided routes
|
|
126
|
+
*/
|
|
127
|
+
updatePortUsageMap(routes) {
|
|
128
|
+
const portUsage = new Map();
|
|
129
|
+
for (const route of routes) {
|
|
130
|
+
// Get the ports for this route
|
|
131
|
+
const portsConfig = Array.isArray(route.match.ports)
|
|
132
|
+
? route.match.ports
|
|
133
|
+
: [route.match.ports];
|
|
134
|
+
// Expand port range objects to individual port numbers
|
|
135
|
+
const expandedPorts = [];
|
|
136
|
+
for (const portConfig of portsConfig) {
|
|
137
|
+
if (typeof portConfig === 'number') {
|
|
138
|
+
expandedPorts.push(portConfig);
|
|
139
|
+
}
|
|
140
|
+
else if (typeof portConfig === 'object' && 'from' in portConfig && 'to' in portConfig) {
|
|
141
|
+
// Expand the port range
|
|
142
|
+
for (let p = portConfig.from; p <= portConfig.to; p++) {
|
|
143
|
+
expandedPorts.push(p);
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
}
|
|
147
|
+
// Use route name if available, otherwise generate a unique ID
|
|
148
|
+
const routeName = route.name || `unnamed_${Math.random().toString(36).substring(2, 9)}`;
|
|
149
|
+
// Add each port to the usage map
|
|
150
|
+
for (const port of expandedPorts) {
|
|
151
|
+
if (!portUsage.has(port)) {
|
|
152
|
+
portUsage.set(port, new Set());
|
|
153
|
+
}
|
|
154
|
+
portUsage.get(port).add(routeName);
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
// Log port usage for debugging
|
|
158
|
+
for (const [port, routes] of portUsage.entries()) {
|
|
159
|
+
this.logger.debug(`Port ${port} is used by ${routes.size} routes: ${Array.from(routes).join(', ')}`);
|
|
160
|
+
}
|
|
161
|
+
return portUsage;
|
|
162
|
+
}
|
|
163
|
+
/**
|
|
164
|
+
* Find ports that have no routes in the new configuration
|
|
165
|
+
*/
|
|
166
|
+
findOrphanedPorts(oldUsage, newUsage) {
|
|
167
|
+
const orphanedPorts = [];
|
|
168
|
+
for (const [port, routes] of oldUsage.entries()) {
|
|
169
|
+
if (!newUsage.has(port) || newUsage.get(port).size === 0) {
|
|
170
|
+
orphanedPorts.push(port);
|
|
171
|
+
}
|
|
172
|
+
}
|
|
173
|
+
return orphanedPorts;
|
|
174
|
+
}
|
|
175
|
+
/**
|
|
176
|
+
* Update NFTables routes
|
|
177
|
+
*/
|
|
178
|
+
async updateNfTablesRoutes(oldRoutes, newRoutes) {
|
|
179
|
+
// Get existing routes that use NFTables and update them
|
|
180
|
+
const oldNfTablesRoutes = oldRoutes.filter(r => r.action.forwardingEngine === 'nftables');
|
|
181
|
+
const newNfTablesRoutes = newRoutes.filter(r => r.action.forwardingEngine === 'nftables');
|
|
182
|
+
// Update existing NFTables routes
|
|
183
|
+
for (const oldRoute of oldNfTablesRoutes) {
|
|
184
|
+
const newRoute = newNfTablesRoutes.find(r => r.name === oldRoute.name);
|
|
185
|
+
if (!newRoute) {
|
|
186
|
+
// Route was removed
|
|
187
|
+
await this.nftablesManager.deprovisionRoute(oldRoute);
|
|
188
|
+
}
|
|
189
|
+
else {
|
|
190
|
+
// Route was updated
|
|
191
|
+
await this.nftablesManager.updateRoute(oldRoute, newRoute);
|
|
192
|
+
}
|
|
193
|
+
}
|
|
194
|
+
// Add new NFTables routes
|
|
195
|
+
for (const newRoute of newNfTablesRoutes) {
|
|
196
|
+
const oldRoute = oldNfTablesRoutes.find(r => r.name === newRoute.name);
|
|
197
|
+
if (!oldRoute) {
|
|
198
|
+
// New route
|
|
199
|
+
await this.nftablesManager.provisionRoute(newRoute);
|
|
200
|
+
}
|
|
201
|
+
}
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"route-orchestrator.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/route-orchestrator.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,4BAA4B,CAAC;AAGpD,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAC5D,OAAO,EAAE,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAOzC;;;GAGG;AACH,MAAM,OAAO,iBAAiB;IAS5B,YACE,WAAwB,EACxB,YAA0B,EAC1B,eAAgC,EAChC,eAAgC,EAChC,WAAoC,EACpC,MAAe;QATT,gBAAW,GAA4B,IAAI,CAAC;QAWlD,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QAC/B,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QAC/B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACI,cAAc,CAAC,WAAoC;QACxD,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CACvB,SAAyB,EACzB,SAAyB,EACzB,UAYI,EAAE;QAMN,OAAO,IAAI,CAAC,eAAe,CAAC,YAAY,CAAC,KAAK,IAAI,EAAE;YAClD,gCAAgC;YAChC,MAAM,UAAU,GAAG,cAAc,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC5D,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,CAAC;gBACtB,cAAc,CAAC,mBAAmB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBACtD,MAAM,IAAI,KAAK,CAAC,4BAA4B,UAAU,CAAC,MAAM,CAAC,IAAI,uBAAuB,CAAC,CAAC;YAC7F,CAAC;YAED,4CAA4C;YAC5C,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;YACxD,MAAM,YAAY,GAAG,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;YAExD,kEAAkE;YAClE,MAAM,YAAY,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE,CAAC,CAAC;YACnE,MAAM,WAAW,GAAG,IAAI,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC,CAAC;YAEjD,mCAAmC;YACnC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,4BAA4B,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACrF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gCAAgC,KAAK,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YAExF,6DAA6D;YAC7D,MAAM,aAAa,GAAG,IAAI,CAAC,iBAAiB,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;YAEzE,oFAAoF;YACpF,MAAM,eAAe,GAAG,KAAK,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;YAElF,4DAA4D;YAC5D,MAAM,QAAQ,GAAG,OAAO,CAAC,QAAQ,IAAI,EAAE,CAAC;YACxC,MAAM,cAAc,GAAG,WAAW,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YACjD,MAAM,cAAc,GAAG,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;YAE1D,IAAI,cAAc,IAAI,cAAc,EAAE,CAAC;gBACrC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,QAAQ,YAAY,CAAC,CAAC;YACvE,CAAC;YAED,yBAAyB;YACzB,MAAM,IAAI,CAAC,oBAAoB,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;YAEtD,gCAAgC;YAChC,IAAI,CAAC,YAAY,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC;YAE1C,iDAAiD;YACjD,IAAI,aAAa,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC7B,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,aAAa,CAAC,MAAM,oBAAoB,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAClG,MAAM,IAAI,CAAC,WAAW,CAAC,WAAW,CAAC,aAAa,CAAC,CAAC;YACpD,CAAC;YAED,0BAA0B;YAC1B,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC/B,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,eAAe,CAAC,MAAM,eAAe,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAElG,mDAAmD;gBACnD,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;gBACnD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,2CAA2C;oBAC3C,IAAK,KAAa,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;wBACzC,MAAM,IAAI,GAAI,KAAa,CAAC,IAAI,IAAI,eAAe,CAAC,CAAC,CAAC,CAAC;wBACvD,MAAM,UAAU,GAAG,IAAI,KAAK,QAAQ,CAAC;wBAErC,IAAI,UAAU,EAAE,CAAC;4BACf,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,yCAAyC,IAAI,4CAA4C,CAAC,CAAC;4BAE5G,qCAAqC;4BACrC,MAAM,IAAI,KAAK,CACb,uBAAuB,IAAI,6CAA6C;gCACxE,iFAAiF,IAAI,GAAG,CACzF,CAAC;wBACJ,CAAC;oBACH,CAAC;oBAED,8CAA8C;oBAC9C,MAAM,KAAK,CAAC;gBACd,CAAC;YACH,CAAC;YAED,yDAAyD;YACzD,IAAI,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,EAAE,CAAC;gBACxC,MAAM,IAAI,CAAC,eAAe,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAC;YAC9D,CAAC;YAED,uCAAuC;YACvC,IAAI,cAA4C,CAAC;YACjD,IAAI,uBAAuB,GAAG,OAAO,CAAC,0BAA0B,IAAI,KAAK,CAAC;YAE1E,IAAI,IAAI,CAAC,WAAW,IAAI,OAAO,CAAC,wBAAwB,EAAE,CAAC;gBACzD,MAAM,mBAAmB,GAAG,IAAI,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC;gBAC9D,MAAM,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC,QAAQ,EAAE,CAAC;gBAElD,qCAAqC;gBACrC,uBAAuB,GAAG,aAAa,CAAC,oBAAoB,CAAC;gBAE7D,0DAA0D;gBAC1D,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC;gBAEtC,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;gBAE9B,uDAAuD;gBACvD,IAAI,OAAO,CAAC,2BAA2B,EAAE,CAAC;oBACxC,MAAM,OAAO,CAAC,2BAA2B,EAAE,CAAC;gBAC9C,CAAC;gBAED,sDAAsD;gBACtD,cAAc,GAAG,MAAM,OAAO,CAAC,wBAAwB,CACrD,SAAS,EACT,SAAS,EACT,mBAAmB,EACnB,EAAE,oBAAoB,EAAE,uBAAuB,EAAE,CAClD,CAAC;gBAEF,IAAI,CAAC,WAAW,GAAG,cAAc,CAAC;YACpC,CAAC;YAED,OAAO;gBACL,YAAY,EAAE,YAAY;gBAC1B,uBAAuB;gBACvB,cAAc;aACf,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,kBAAkB,CAAC,MAAsB;QAC9C,MAAM,SAAS,GAAG,IAAI,GAAG,EAAuB,CAAC;QAEjD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,+BAA+B;YAC/B,MAAM,WAAW,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;gBAClD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK;gBACnB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YAExB,uDAAuD;YACvD,MAAM,aAAa,GAAa,EAAE,CAAC;YACnC,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE,CAAC;oBACnC,aAAa,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;gBACjC,CAAC;qBAAM,IAAI,OAAO,UAAU,KAAK,QAAQ,IAAI,MAAM,IAAI,UAAU,IAAI,IAAI,IAAI,UAAU,EAAE,CAAC;oBACxF,wBAAwB;oBACxB,KAAK,IAAI,CAAC,GAAG,UAAU,CAAC,IAAI,EAAE,CAAC,IAAI,UAAU,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBACtD,aAAa,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;oBACxB,CAAC;gBACH,CAAC;YACH,CAAC;YAED,8DAA8D;YAC9D,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,IAAI,WAAW,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC;YAExF,iCAAiC;YACjC,KAAK,MAAM,IAAI,IAAI,aAAa,EAAE,CAAC;gBACjC,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC;oBACzB,SAAS,CAAC,GAAG,CAAC,IAAI,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;gBACjC,CAAC;gBACD,SAAS,CAAC,GAAG,CAAC,IAAI,CAAE,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACtC,CAAC;QACH,CAAC;QAED,+BAA+B;QAC/B,KAAK,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC,IAAI,SAAS,CAAC,OAAO,EAAE,EAAE,CAAC;YACjD,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,QAAQ,IAAI,eAAe,MAAM,CAAC,IAAI,YAAY,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACvG,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,QAAkC,EAAE,QAAkC;QAC9F,MAAM,aAAa,GAAa,EAAE,CAAC;QAEnC,KAAK,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC,IAAI,QAAQ,CAAC,OAAO,EAAE,EAAE,CAAC;YAChD,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAE,CAAC,IAAI,KAAK,CAAC,EAAE,CAAC;gBAC1D,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC3B,CAAC;QACH,CAAC;QAED,OAAO,aAAa,CAAC;IACvB,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,SAAyB,EAAE,SAAyB;QACrF,wDAAwD;QACxD,MAAM,iBAAiB,GAAG,SAAS,CAAC,MAAM,CACxC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,gBAAgB,KAAK,UAAU,CAC9C,CAAC;QAEF,MAAM,iBAAiB,GAAG,SAAS,CAAC,MAAM,CACxC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,gBAAgB,KAAK,UAAU,CAC9C,CAAC;QAEF,kCAAkC;QAClC,KAAK,MAAM,QAAQ,IAAI,iBAAiB,EAAE,CAAC;YACzC,MAAM,QAAQ,GAAG,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,IAAI,CAAC,CAAC;YAEvE,IAAI,CAAC,QAAQ,EAAE,CAAC;gBACd,oBAAoB;gBACpB,MAAM,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YACxD,CAAC;iBAAM,CAAC;gBACN,oBAAoB;gBACpB,MAAM,IAAI,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;YAC7D,CAAC;QACH,CAAC;QAED,0BAA0B;QAC1B,KAAK,MAAM,QAAQ,IAAI,iBAAiB,EAAE,CAAC;YACzC,MAAM,QAAQ,GAAG,iBAAiB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,IAAI,CAAC,CAAC;YAEvE,IAAI,CAAC,QAAQ,EAAE,CAAC;gBACd,YAAY;gBACZ,MAAM,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YACtD,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
|
|
@@ -43,6 +43,7 @@ export declare class SmartProxy extends plugins.EventEmitter {
|
|
|
43
43
|
private routeUpdateLock;
|
|
44
44
|
acmeStateManager: AcmeStateManager;
|
|
45
45
|
metricsCollector: MetricsCollector;
|
|
46
|
+
private routeOrchestrator;
|
|
46
47
|
private portUsageMap;
|
|
47
48
|
/**
|
|
48
49
|
* Constructor for SmartProxy
|
|
@@ -144,17 +145,6 @@ export declare class SmartProxy extends plugins.EventEmitter {
|
|
|
144
145
|
* Manually provision a certificate for a route
|
|
145
146
|
*/
|
|
146
147
|
provisionCertificate(routeName: string): Promise<void>;
|
|
147
|
-
/**
|
|
148
|
-
* Update the port usage map based on the provided routes
|
|
149
|
-
*
|
|
150
|
-
* This tracks which ports are used by which routes, allowing us to
|
|
151
|
-
* detect when a port is no longer needed and can be released.
|
|
152
|
-
*/
|
|
153
|
-
private updatePortUsageMap;
|
|
154
|
-
/**
|
|
155
|
-
* Find ports that have no routes in the new configuration
|
|
156
|
-
*/
|
|
157
|
-
private findOrphanedPorts;
|
|
158
148
|
/**
|
|
159
149
|
* Force renewal of a certificate
|
|
160
150
|
*/
|