@push.rocks/smartproxy 22.6.0 → 23.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/changelog.md +18 -0
- package/dist_rust/{rustproxy → rustproxy_linux_amd64} +0 -0
- package/dist_rust/rustproxy_linux_arm64 +0 -0
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/index.d.ts +0 -1
- package/dist_ts/index.js +1 -3
- package/dist_ts/plugins.d.ts +2 -1
- package/dist_ts/plugins.js +3 -2
- package/dist_ts/proxies/index.d.ts +0 -1
- package/dist_ts/proxies/index.js +1 -3
- package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
- package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.d.ts +9 -21
- package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.js +83 -212
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +2 -3
- package/npmextra.json +3 -0
- package/package.json +13 -11
- package/readme.md +35 -31
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/index.ts +0 -3
- package/ts/plugins.ts +2 -0
- package/ts/proxies/index.ts +0 -3
- package/ts/proxies/smart-proxy/models/route-types.ts +0 -2
- package/ts/proxies/smart-proxy/rust-proxy-bridge.ts +102 -233
- package/ts/proxies/smart-proxy/smart-proxy.ts +1 -2
- package/dist_ts/common/eventUtils.d.ts +0 -14
- package/dist_ts/common/eventUtils.js +0 -20
- package/dist_ts/common/types.d.ts +0 -82
- package/dist_ts/common/types.js +0 -15
- package/dist_ts/core/utils/event-system.d.ts +0 -200
- package/dist_ts/core/utils/event-system.js +0 -224
- package/dist_ts/core/utils/event-utils.d.ts +0 -15
- package/dist_ts/core/utils/event-utils.js +0 -11
- package/dist_ts/core/utils/route-manager.d.ts +0 -88
- package/dist_ts/core/utils/route-manager.js +0 -342
- package/dist_ts/core/utils/route-utils.d.ts +0 -28
- package/dist_ts/core/utils/route-utils.js +0 -67
- package/dist_ts/detection/detectors/http-detector-v2.d.ts +0 -33
- package/dist_ts/detection/detectors/http-detector-v2.js +0 -87
- package/dist_ts/detection/detectors/tls-detector-v2.d.ts +0 -33
- package/dist_ts/detection/detectors/tls-detector-v2.js +0 -80
- package/dist_ts/detection/protocol-detector-v2.d.ts +0 -46
- package/dist_ts/detection/protocol-detector-v2.js +0 -116
- package/dist_ts/forwarding/config/forwarding-types.d.ts +0 -42
- package/dist_ts/forwarding/config/forwarding-types.js +0 -18
- package/dist_ts/forwarding/config/index.d.ts +0 -9
- package/dist_ts/forwarding/config/index.js +0 -10
- package/dist_ts/forwarding/factory/forwarding-factory.d.ts +0 -25
- package/dist_ts/forwarding/factory/forwarding-factory.js +0 -172
- package/dist_ts/forwarding/factory/index.d.ts +0 -4
- package/dist_ts/forwarding/factory/index.js +0 -5
- package/dist_ts/forwarding/handlers/base-handler.d.ts +0 -62
- package/dist_ts/forwarding/handlers/base-handler.js +0 -121
- package/dist_ts/forwarding/handlers/http-handler.d.ts +0 -30
- package/dist_ts/forwarding/handlers/http-handler.js +0 -143
- package/dist_ts/forwarding/handlers/https-passthrough-handler.d.ts +0 -29
- package/dist_ts/forwarding/handlers/https-passthrough-handler.js +0 -156
- package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.d.ts +0 -36
- package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.js +0 -276
- package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.d.ts +0 -35
- package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.js +0 -261
- package/dist_ts/forwarding/handlers/index.d.ts +0 -8
- package/dist_ts/forwarding/handlers/index.js +0 -9
- package/dist_ts/forwarding/index.d.ts +0 -13
- package/dist_ts/forwarding/index.js +0 -16
- package/dist_ts/http/index.d.ts +0 -5
- package/dist_ts/http/index.js +0 -8
- package/dist_ts/http/models/http-types.d.ts +0 -6
- package/dist_ts/http/models/http-types.js +0 -7
- package/dist_ts/http/router/index.d.ts +0 -8
- package/dist_ts/http/router/index.js +0 -7
- package/dist_ts/http/router/proxy-router.d.ts +0 -115
- package/dist_ts/http/router/proxy-router.js +0 -325
- package/dist_ts/http/router/route-router.d.ts +0 -108
- package/dist_ts/http/router/route-router.js +0 -393
- package/dist_ts/protocols/tls/constants.d.ts +0 -122
- package/dist_ts/protocols/tls/constants.js +0 -135
- package/dist_ts/protocols/tls/parser.d.ts +0 -53
- package/dist_ts/protocols/tls/parser.js +0 -294
- package/dist_ts/protocols/tls/types.d.ts +0 -65
- package/dist_ts/protocols/tls/types.js +0 -5
- package/dist_ts/proxies/http-proxy/certificate-manager.d.ts +0 -95
- package/dist_ts/proxies/http-proxy/certificate-manager.js +0 -214
- package/dist_ts/proxies/http-proxy/connection-pool.d.ts +0 -47
- package/dist_ts/proxies/http-proxy/connection-pool.js +0 -195
- package/dist_ts/proxies/http-proxy/context-creator.d.ts +0 -34
- package/dist_ts/proxies/http-proxy/context-creator.js +0 -108
- package/dist_ts/proxies/http-proxy/default-certificates.d.ts +0 -54
- package/dist_ts/proxies/http-proxy/default-certificates.js +0 -127
- package/dist_ts/proxies/http-proxy/function-cache.d.ts +0 -95
- package/dist_ts/proxies/http-proxy/function-cache.js +0 -215
- package/dist_ts/proxies/http-proxy/handlers/index.d.ts +0 -4
- package/dist_ts/proxies/http-proxy/handlers/index.js +0 -6
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +0 -18
- package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +0 -78
- package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +0 -19
- package/dist_ts/proxies/http-proxy/handlers/static-handler.js +0 -211
- package/dist_ts/proxies/http-proxy/http-proxy.d.ts +0 -117
- package/dist_ts/proxies/http-proxy/http-proxy.js +0 -521
- package/dist_ts/proxies/http-proxy/http-request-handler.d.ts +0 -40
- package/dist_ts/proxies/http-proxy/http-request-handler.js +0 -257
- package/dist_ts/proxies/http-proxy/http2-request-handler.d.ts +0 -24
- package/dist_ts/proxies/http-proxy/http2-request-handler.js +0 -201
- package/dist_ts/proxies/http-proxy/index.d.ts +0 -14
- package/dist_ts/proxies/http-proxy/index.js +0 -16
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +0 -117
- package/dist_ts/proxies/http-proxy/models/http-types.js +0 -92
- package/dist_ts/proxies/http-proxy/models/index.d.ts +0 -5
- package/dist_ts/proxies/http-proxy/models/index.js +0 -6
- package/dist_ts/proxies/http-proxy/models/types.d.ts +0 -75
- package/dist_ts/proxies/http-proxy/models/types.js +0 -35
- package/dist_ts/proxies/http-proxy/request-handler.d.ts +0 -97
- package/dist_ts/proxies/http-proxy/request-handler.js +0 -737
- package/dist_ts/proxies/http-proxy/security-manager.d.ts +0 -98
- package/dist_ts/proxies/http-proxy/security-manager.js +0 -341
- package/dist_ts/proxies/http-proxy/websocket-handler.d.ts +0 -50
- package/dist_ts/proxies/http-proxy/websocket-handler.js +0 -505
- package/dist_ts/proxies/nftables-proxy/index.d.ts +0 -6
- package/dist_ts/proxies/nftables-proxy/index.js +0 -7
- package/dist_ts/proxies/nftables-proxy/models/errors.d.ts +0 -15
- package/dist_ts/proxies/nftables-proxy/models/errors.js +0 -28
- package/dist_ts/proxies/nftables-proxy/models/index.d.ts +0 -5
- package/dist_ts/proxies/nftables-proxy/models/index.js +0 -6
- package/dist_ts/proxies/nftables-proxy/models/interfaces.d.ts +0 -75
- package/dist_ts/proxies/nftables-proxy/models/interfaces.js +0 -5
- package/dist_ts/proxies/nftables-proxy/nftables-proxy.d.ts +0 -124
- package/dist_ts/proxies/nftables-proxy/nftables-proxy.js +0 -1374
- package/dist_ts/proxies/nftables-proxy/utils/index.d.ts +0 -9
- package/dist_ts/proxies/nftables-proxy/utils/index.js +0 -12
- package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.d.ts +0 -66
- package/dist_ts/proxies/nftables-proxy/utils/nft-command-executor.js +0 -131
- package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.d.ts +0 -39
- package/dist_ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.js +0 -112
- package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.d.ts +0 -59
- package/dist_ts/proxies/nftables-proxy/utils/nft-rule-validator.js +0 -130
- package/dist_ts/proxies/smart-proxy/acme-state-manager.d.ts +0 -42
- package/dist_ts/proxies/smart-proxy/acme-state-manager.js +0 -101
- package/dist_ts/proxies/smart-proxy/cert-store.d.ts +0 -10
- package/dist_ts/proxies/smart-proxy/cert-store.js +0 -72
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +0 -164
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +0 -745
- package/dist_ts/proxies/smart-proxy/connection-manager.d.ts +0 -128
- package/dist_ts/proxies/smart-proxy/connection-manager.js +0 -689
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +0 -43
- package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +0 -180
- package/dist_ts/proxies/smart-proxy/metrics-collector.d.ts +0 -98
- package/dist_ts/proxies/smart-proxy/metrics-collector.js +0 -355
- package/dist_ts/proxies/smart-proxy/nftables-manager.d.ts +0 -82
- package/dist_ts/proxies/smart-proxy/nftables-manager.js +0 -237
- package/dist_ts/proxies/smart-proxy/port-manager.d.ts +0 -117
- package/dist_ts/proxies/smart-proxy/port-manager.js +0 -318
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +0 -60
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +0 -1407
- package/dist_ts/proxies/smart-proxy/route-manager.d.ts +0 -112
- package/dist_ts/proxies/smart-proxy/route-manager.js +0 -453
- package/dist_ts/proxies/smart-proxy/route-orchestrator.d.ts +0 -56
- package/dist_ts/proxies/smart-proxy/route-orchestrator.js +0 -204
- package/dist_ts/proxies/smart-proxy/rust-binary-locator.d.ts +0 -23
- package/dist_ts/proxies/smart-proxy/rust-binary-locator.js +0 -104
- package/dist_ts/proxies/smart-proxy/security-manager.d.ts +0 -74
- package/dist_ts/proxies/smart-proxy/security-manager.js +0 -227
- package/dist_ts/proxies/smart-proxy/throughput-tracker.d.ts +0 -36
- package/dist_ts/proxies/smart-proxy/throughput-tracker.js +0 -115
- package/dist_ts/proxies/smart-proxy/timeout-manager.d.ts +0 -48
- package/dist_ts/proxies/smart-proxy/timeout-manager.js +0 -158
- package/dist_ts/proxies/smart-proxy/tls-manager.d.ts +0 -50
- package/dist_ts/proxies/smart-proxy/tls-manager.js +0 -110
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +0 -161
- package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +0 -282
- package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +0 -73
- package/dist_ts/proxies/smart-proxy/utils/route-validators.js +0 -259
- package/dist_ts/routing/router/proxy-router.d.ts +0 -115
- package/dist_ts/routing/router/proxy-router.js +0 -325
- package/dist_ts/routing/router/route-router.d.ts +0 -108
- package/dist_ts/routing/router/route-router.js +0 -393
- package/dist_ts/tls/alerts/index.d.ts +0 -4
- package/dist_ts/tls/alerts/index.js +0 -5
- package/dist_ts/tls/alerts/tls-alert.d.ts +0 -150
- package/dist_ts/tls/alerts/tls-alert.js +0 -226
- package/dist_ts/tls/sni/client-hello-parser.d.ts +0 -100
- package/dist_ts/tls/sni/client-hello-parser.js +0 -464
- package/dist_ts/tls/sni/sni-extraction.d.ts +0 -58
- package/dist_ts/tls/sni/sni-extraction.js +0 -275
- package/dist_ts/tls/utils/index.d.ts +0 -4
- package/dist_ts/tls/utils/index.js +0 -5
- package/dist_ts/tls/utils/tls-utils.d.ts +0 -49
- package/dist_ts/tls/utils/tls-utils.js +0 -75
- package/ts/proxies/nftables-proxy/index.ts +0 -6
- package/ts/proxies/nftables-proxy/models/errors.ts +0 -30
- package/ts/proxies/nftables-proxy/models/index.ts +0 -5
- package/ts/proxies/nftables-proxy/models/interfaces.ts +0 -94
- package/ts/proxies/nftables-proxy/nftables-proxy.ts +0 -1754
- package/ts/proxies/nftables-proxy/utils/index.ts +0 -38
- package/ts/proxies/nftables-proxy/utils/nft-command-executor.ts +0 -162
- package/ts/proxies/nftables-proxy/utils/nft-port-spec-normalizer.ts +0 -125
- package/ts/proxies/nftables-proxy/utils/nft-rule-validator.ts +0 -156
- package/ts/proxies/smart-proxy/rust-binary-locator.ts +0 -112
|
@@ -1,98 +0,0 @@
|
|
|
1
|
-
import type { ILogger } from './models/types.js';
|
|
2
|
-
import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
|
|
3
|
-
import type { IRouteContext } from '../../core/models/route-context.js';
|
|
4
|
-
/**
|
|
5
|
-
* Manages security features for the HttpProxy
|
|
6
|
-
* Implements IP filtering, rate limiting, and authentication.
|
|
7
|
-
* Uses shared utilities from security-utils.ts.
|
|
8
|
-
*/
|
|
9
|
-
export declare class SecurityManager {
|
|
10
|
-
private logger;
|
|
11
|
-
private routes;
|
|
12
|
-
private maxConnectionsPerIP;
|
|
13
|
-
private connectionRateLimitPerMinute;
|
|
14
|
-
private ipFilterCache;
|
|
15
|
-
private rateLimits;
|
|
16
|
-
private connectionsByIP;
|
|
17
|
-
private connectionRateByIP;
|
|
18
|
-
constructor(logger: ILogger, routes?: IRouteConfig[], maxConnectionsPerIP?: number, connectionRateLimitPerMinute?: number);
|
|
19
|
-
/**
|
|
20
|
-
* Update the routes configuration
|
|
21
|
-
*/
|
|
22
|
-
setRoutes(routes: IRouteConfig[]): void;
|
|
23
|
-
/**
|
|
24
|
-
* Check if a client is allowed to access a specific route
|
|
25
|
-
*
|
|
26
|
-
* @param route The route to check access for
|
|
27
|
-
* @param context The route context with client information
|
|
28
|
-
* @returns True if access is allowed, false otherwise
|
|
29
|
-
*/
|
|
30
|
-
isAllowed(route: IRouteConfig, context: IRouteContext): boolean;
|
|
31
|
-
/**
|
|
32
|
-
* Check if an IP is allowed based on route security settings
|
|
33
|
-
*/
|
|
34
|
-
private isIpAllowed;
|
|
35
|
-
/**
|
|
36
|
-
* Check if request is within rate limit
|
|
37
|
-
*/
|
|
38
|
-
private isWithinRateLimit;
|
|
39
|
-
/**
|
|
40
|
-
* Clean up expired rate limits
|
|
41
|
-
* Should be called periodically to prevent memory leaks
|
|
42
|
-
*/
|
|
43
|
-
cleanupExpiredRateLimits(): void;
|
|
44
|
-
/**
|
|
45
|
-
* Check basic auth credentials
|
|
46
|
-
*
|
|
47
|
-
* @param route The route to check auth for
|
|
48
|
-
* @param username The provided username
|
|
49
|
-
* @param password The provided password
|
|
50
|
-
* @returns True if credentials are valid, false otherwise
|
|
51
|
-
*/
|
|
52
|
-
checkBasicAuth(route: IRouteConfig, username: string, password: string): boolean;
|
|
53
|
-
/**
|
|
54
|
-
* Verify a JWT token
|
|
55
|
-
*
|
|
56
|
-
* @param route The route to verify the token for
|
|
57
|
-
* @param token The JWT token to verify
|
|
58
|
-
* @returns True if the token is valid, false otherwise
|
|
59
|
-
*/
|
|
60
|
-
verifyJwtToken(route: IRouteConfig, token: string): boolean;
|
|
61
|
-
/**
|
|
62
|
-
* Get connections count by IP (checks normalized variants)
|
|
63
|
-
*/
|
|
64
|
-
getConnectionCountByIP(ip: string): number;
|
|
65
|
-
/**
|
|
66
|
-
* Check and update connection rate for an IP
|
|
67
|
-
* @returns true if within rate limit, false if exceeding limit
|
|
68
|
-
*/
|
|
69
|
-
checkConnectionRate(ip: string): boolean;
|
|
70
|
-
/**
|
|
71
|
-
* Track connection by IP
|
|
72
|
-
*/
|
|
73
|
-
trackConnectionByIP(ip: string, connectionId: string): void;
|
|
74
|
-
/**
|
|
75
|
-
* Remove connection tracking for an IP
|
|
76
|
-
*/
|
|
77
|
-
removeConnectionByIP(ip: string, connectionId: string): void;
|
|
78
|
-
/**
|
|
79
|
-
* Check if IP should be allowed considering connection rate and max connections
|
|
80
|
-
* @returns Object with result and reason
|
|
81
|
-
*/
|
|
82
|
-
validateIP(ip: string): {
|
|
83
|
-
allowed: boolean;
|
|
84
|
-
reason?: string;
|
|
85
|
-
};
|
|
86
|
-
/**
|
|
87
|
-
* Clears all IP tracking data (for shutdown)
|
|
88
|
-
*/
|
|
89
|
-
clearIPTracking(): void;
|
|
90
|
-
/**
|
|
91
|
-
* Start periodic cleanup of IP tracking data
|
|
92
|
-
*/
|
|
93
|
-
private startPeriodicIpCleanup;
|
|
94
|
-
/**
|
|
95
|
-
* Perform cleanup of expired IP data
|
|
96
|
-
*/
|
|
97
|
-
private performIpCleanup;
|
|
98
|
-
}
|
|
@@ -1,341 +0,0 @@
|
|
|
1
|
-
import { isIPAuthorized, normalizeIP, parseBasicAuthHeader, cleanupExpiredRateLimits } from '../../core/utils/security-utils.js';
|
|
2
|
-
/**
|
|
3
|
-
* Manages security features for the HttpProxy
|
|
4
|
-
* Implements IP filtering, rate limiting, and authentication.
|
|
5
|
-
* Uses shared utilities from security-utils.ts.
|
|
6
|
-
*/
|
|
7
|
-
export class SecurityManager {
|
|
8
|
-
constructor(logger, routes = [], maxConnectionsPerIP = 100, connectionRateLimitPerMinute = 300) {
|
|
9
|
-
this.logger = logger;
|
|
10
|
-
this.routes = routes;
|
|
11
|
-
this.maxConnectionsPerIP = maxConnectionsPerIP;
|
|
12
|
-
this.connectionRateLimitPerMinute = connectionRateLimitPerMinute;
|
|
13
|
-
// Cache IP filtering results to avoid constant regex matching
|
|
14
|
-
this.ipFilterCache = new Map();
|
|
15
|
-
// Store rate limits per route and key
|
|
16
|
-
this.rateLimits = new Map();
|
|
17
|
-
// Connection tracking by IP
|
|
18
|
-
this.connectionsByIP = new Map();
|
|
19
|
-
this.connectionRateByIP = new Map();
|
|
20
|
-
// Start periodic cleanup for connection tracking
|
|
21
|
-
this.startPeriodicIpCleanup();
|
|
22
|
-
}
|
|
23
|
-
/**
|
|
24
|
-
* Update the routes configuration
|
|
25
|
-
*/
|
|
26
|
-
setRoutes(routes) {
|
|
27
|
-
this.routes = routes;
|
|
28
|
-
// Reset caches when routes change
|
|
29
|
-
this.ipFilterCache.clear();
|
|
30
|
-
}
|
|
31
|
-
/**
|
|
32
|
-
* Check if a client is allowed to access a specific route
|
|
33
|
-
*
|
|
34
|
-
* @param route The route to check access for
|
|
35
|
-
* @param context The route context with client information
|
|
36
|
-
* @returns True if access is allowed, false otherwise
|
|
37
|
-
*/
|
|
38
|
-
isAllowed(route, context) {
|
|
39
|
-
if (!route.security) {
|
|
40
|
-
return true; // No security restrictions
|
|
41
|
-
}
|
|
42
|
-
// --- IP filtering ---
|
|
43
|
-
if (!this.isIpAllowed(route, context.clientIp)) {
|
|
44
|
-
this.logger.debug(`IP ${context.clientIp} is blocked for route ${route.name || 'unnamed'}`);
|
|
45
|
-
return false;
|
|
46
|
-
}
|
|
47
|
-
// --- Rate limiting ---
|
|
48
|
-
if (route.security.rateLimit?.enabled && !this.isWithinRateLimit(route, context)) {
|
|
49
|
-
this.logger.debug(`Rate limit exceeded for route ${route.name || 'unnamed'}`);
|
|
50
|
-
return false;
|
|
51
|
-
}
|
|
52
|
-
// --- Basic Auth (handled at HTTP level) ---
|
|
53
|
-
// Basic auth is not checked here as it requires HTTP headers
|
|
54
|
-
// and is handled in the RequestHandler
|
|
55
|
-
return true;
|
|
56
|
-
}
|
|
57
|
-
/**
|
|
58
|
-
* Check if an IP is allowed based on route security settings
|
|
59
|
-
*/
|
|
60
|
-
isIpAllowed(route, clientIp) {
|
|
61
|
-
if (!route.security) {
|
|
62
|
-
return true; // No security restrictions
|
|
63
|
-
}
|
|
64
|
-
const routeId = route.name || 'unnamed';
|
|
65
|
-
// Check cache first
|
|
66
|
-
if (!this.ipFilterCache.has(routeId)) {
|
|
67
|
-
this.ipFilterCache.set(routeId, new Map());
|
|
68
|
-
}
|
|
69
|
-
const routeCache = this.ipFilterCache.get(routeId);
|
|
70
|
-
if (routeCache.has(clientIp)) {
|
|
71
|
-
return routeCache.get(clientIp);
|
|
72
|
-
}
|
|
73
|
-
// Use shared utility for IP authorization
|
|
74
|
-
const allowed = isIPAuthorized(clientIp, route.security.ipAllowList, route.security.ipBlockList);
|
|
75
|
-
// Cache the result
|
|
76
|
-
routeCache.set(clientIp, allowed);
|
|
77
|
-
return allowed;
|
|
78
|
-
}
|
|
79
|
-
/**
|
|
80
|
-
* Check if request is within rate limit
|
|
81
|
-
*/
|
|
82
|
-
isWithinRateLimit(route, context) {
|
|
83
|
-
if (!route.security?.rateLimit?.enabled) {
|
|
84
|
-
return true;
|
|
85
|
-
}
|
|
86
|
-
const rateLimit = route.security.rateLimit;
|
|
87
|
-
const routeId = route.name || 'unnamed';
|
|
88
|
-
// Determine rate limit key (by IP, path, or header)
|
|
89
|
-
let key = context.clientIp; // Default to IP
|
|
90
|
-
if (rateLimit.keyBy === 'path' && context.path) {
|
|
91
|
-
key = `${context.clientIp}:${context.path}`;
|
|
92
|
-
}
|
|
93
|
-
else if (rateLimit.keyBy === 'header' && rateLimit.headerName && context.headers) {
|
|
94
|
-
const headerValue = context.headers[rateLimit.headerName.toLowerCase()];
|
|
95
|
-
if (headerValue) {
|
|
96
|
-
key = `${context.clientIp}:${headerValue}`;
|
|
97
|
-
}
|
|
98
|
-
}
|
|
99
|
-
// Get or create rate limit tracking for this route
|
|
100
|
-
if (!this.rateLimits.has(routeId)) {
|
|
101
|
-
this.rateLimits.set(routeId, new Map());
|
|
102
|
-
}
|
|
103
|
-
const routeLimits = this.rateLimits.get(routeId);
|
|
104
|
-
const now = Date.now();
|
|
105
|
-
// Get or create rate limit tracking for this key
|
|
106
|
-
let limit = routeLimits.get(key);
|
|
107
|
-
if (!limit || limit.expiry < now) {
|
|
108
|
-
// Create new rate limit or reset expired one
|
|
109
|
-
limit = {
|
|
110
|
-
count: 1,
|
|
111
|
-
expiry: now + (rateLimit.window * 1000)
|
|
112
|
-
};
|
|
113
|
-
routeLimits.set(key, limit);
|
|
114
|
-
return true;
|
|
115
|
-
}
|
|
116
|
-
// Increment the counter
|
|
117
|
-
limit.count++;
|
|
118
|
-
// Check if rate limit is exceeded
|
|
119
|
-
return limit.count <= rateLimit.maxRequests;
|
|
120
|
-
}
|
|
121
|
-
/**
|
|
122
|
-
* Clean up expired rate limits
|
|
123
|
-
* Should be called periodically to prevent memory leaks
|
|
124
|
-
*/
|
|
125
|
-
cleanupExpiredRateLimits() {
|
|
126
|
-
cleanupExpiredRateLimits(this.rateLimits, {
|
|
127
|
-
info: this.logger.info.bind(this.logger),
|
|
128
|
-
warn: this.logger.warn.bind(this.logger),
|
|
129
|
-
error: this.logger.error.bind(this.logger),
|
|
130
|
-
debug: this.logger.debug?.bind(this.logger)
|
|
131
|
-
});
|
|
132
|
-
}
|
|
133
|
-
/**
|
|
134
|
-
* Check basic auth credentials
|
|
135
|
-
*
|
|
136
|
-
* @param route The route to check auth for
|
|
137
|
-
* @param username The provided username
|
|
138
|
-
* @param password The provided password
|
|
139
|
-
* @returns True if credentials are valid, false otherwise
|
|
140
|
-
*/
|
|
141
|
-
checkBasicAuth(route, username, password) {
|
|
142
|
-
if (!route.security?.basicAuth?.enabled) {
|
|
143
|
-
return true;
|
|
144
|
-
}
|
|
145
|
-
const basicAuth = route.security.basicAuth;
|
|
146
|
-
// Check credentials against configured users
|
|
147
|
-
for (const user of basicAuth.users) {
|
|
148
|
-
if (user.username === username && user.password === password) {
|
|
149
|
-
return true;
|
|
150
|
-
}
|
|
151
|
-
}
|
|
152
|
-
return false;
|
|
153
|
-
}
|
|
154
|
-
/**
|
|
155
|
-
* Verify a JWT token
|
|
156
|
-
*
|
|
157
|
-
* @param route The route to verify the token for
|
|
158
|
-
* @param token The JWT token to verify
|
|
159
|
-
* @returns True if the token is valid, false otherwise
|
|
160
|
-
*/
|
|
161
|
-
verifyJwtToken(route, token) {
|
|
162
|
-
if (!route.security?.jwtAuth?.enabled) {
|
|
163
|
-
return true;
|
|
164
|
-
}
|
|
165
|
-
try {
|
|
166
|
-
const jwtAuth = route.security.jwtAuth;
|
|
167
|
-
// Verify structure
|
|
168
|
-
const parts = token.split('.');
|
|
169
|
-
if (parts.length !== 3) {
|
|
170
|
-
return false;
|
|
171
|
-
}
|
|
172
|
-
// Decode payload
|
|
173
|
-
const payload = JSON.parse(Buffer.from(parts[1], 'base64').toString());
|
|
174
|
-
// Check expiration
|
|
175
|
-
if (payload.exp && payload.exp < Math.floor(Date.now() / 1000)) {
|
|
176
|
-
return false;
|
|
177
|
-
}
|
|
178
|
-
// Check issuer
|
|
179
|
-
if (jwtAuth.issuer && payload.iss !== jwtAuth.issuer) {
|
|
180
|
-
return false;
|
|
181
|
-
}
|
|
182
|
-
// Check audience
|
|
183
|
-
if (jwtAuth.audience && payload.aud !== jwtAuth.audience) {
|
|
184
|
-
return false;
|
|
185
|
-
}
|
|
186
|
-
// Note: In a real implementation, you'd also verify the signature
|
|
187
|
-
// using the secret and algorithm specified in jwtAuth
|
|
188
|
-
return true;
|
|
189
|
-
}
|
|
190
|
-
catch (err) {
|
|
191
|
-
this.logger.error(`Error verifying JWT: ${err}`);
|
|
192
|
-
return false;
|
|
193
|
-
}
|
|
194
|
-
}
|
|
195
|
-
/**
|
|
196
|
-
* Get connections count by IP (checks normalized variants)
|
|
197
|
-
*/
|
|
198
|
-
getConnectionCountByIP(ip) {
|
|
199
|
-
// Check all normalized variants of the IP
|
|
200
|
-
const variants = normalizeIP(ip);
|
|
201
|
-
for (const variant of variants) {
|
|
202
|
-
const connections = this.connectionsByIP.get(variant);
|
|
203
|
-
if (connections) {
|
|
204
|
-
return connections.size;
|
|
205
|
-
}
|
|
206
|
-
}
|
|
207
|
-
return 0;
|
|
208
|
-
}
|
|
209
|
-
/**
|
|
210
|
-
* Check and update connection rate for an IP
|
|
211
|
-
* @returns true if within rate limit, false if exceeding limit
|
|
212
|
-
*/
|
|
213
|
-
checkConnectionRate(ip) {
|
|
214
|
-
const now = Date.now();
|
|
215
|
-
const minute = 60 * 1000;
|
|
216
|
-
// Find existing rate tracking (check normalized variants)
|
|
217
|
-
const variants = normalizeIP(ip);
|
|
218
|
-
let existingKey = null;
|
|
219
|
-
for (const variant of variants) {
|
|
220
|
-
if (this.connectionRateByIP.has(variant)) {
|
|
221
|
-
existingKey = variant;
|
|
222
|
-
break;
|
|
223
|
-
}
|
|
224
|
-
}
|
|
225
|
-
const key = existingKey || ip;
|
|
226
|
-
if (!this.connectionRateByIP.has(key)) {
|
|
227
|
-
this.connectionRateByIP.set(key, [now]);
|
|
228
|
-
return true;
|
|
229
|
-
}
|
|
230
|
-
// Get timestamps and filter out entries older than 1 minute
|
|
231
|
-
const timestamps = this.connectionRateByIP.get(key).filter((time) => now - time < minute);
|
|
232
|
-
timestamps.push(now);
|
|
233
|
-
this.connectionRateByIP.set(key, timestamps);
|
|
234
|
-
// Check if rate exceeds limit
|
|
235
|
-
return timestamps.length <= this.connectionRateLimitPerMinute;
|
|
236
|
-
}
|
|
237
|
-
/**
|
|
238
|
-
* Track connection by IP
|
|
239
|
-
*/
|
|
240
|
-
trackConnectionByIP(ip, connectionId) {
|
|
241
|
-
// Check if any variant already exists
|
|
242
|
-
const variants = normalizeIP(ip);
|
|
243
|
-
let existingKey = null;
|
|
244
|
-
for (const variant of variants) {
|
|
245
|
-
if (this.connectionsByIP.has(variant)) {
|
|
246
|
-
existingKey = variant;
|
|
247
|
-
break;
|
|
248
|
-
}
|
|
249
|
-
}
|
|
250
|
-
const key = existingKey || ip;
|
|
251
|
-
if (!this.connectionsByIP.has(key)) {
|
|
252
|
-
this.connectionsByIP.set(key, new Set());
|
|
253
|
-
}
|
|
254
|
-
this.connectionsByIP.get(key).add(connectionId);
|
|
255
|
-
}
|
|
256
|
-
/**
|
|
257
|
-
* Remove connection tracking for an IP
|
|
258
|
-
*/
|
|
259
|
-
removeConnectionByIP(ip, connectionId) {
|
|
260
|
-
// Check all variants to find where the connection is tracked
|
|
261
|
-
const variants = normalizeIP(ip);
|
|
262
|
-
for (const variant of variants) {
|
|
263
|
-
if (this.connectionsByIP.has(variant)) {
|
|
264
|
-
const connections = this.connectionsByIP.get(variant);
|
|
265
|
-
connections.delete(connectionId);
|
|
266
|
-
if (connections.size === 0) {
|
|
267
|
-
this.connectionsByIP.delete(variant);
|
|
268
|
-
}
|
|
269
|
-
break;
|
|
270
|
-
}
|
|
271
|
-
}
|
|
272
|
-
}
|
|
273
|
-
/**
|
|
274
|
-
* Check if IP should be allowed considering connection rate and max connections
|
|
275
|
-
* @returns Object with result and reason
|
|
276
|
-
*/
|
|
277
|
-
validateIP(ip) {
|
|
278
|
-
// Check connection count limit
|
|
279
|
-
if (this.getConnectionCountByIP(ip) >= this.maxConnectionsPerIP) {
|
|
280
|
-
return {
|
|
281
|
-
allowed: false,
|
|
282
|
-
reason: `Maximum connections per IP (${this.maxConnectionsPerIP}) exceeded`
|
|
283
|
-
};
|
|
284
|
-
}
|
|
285
|
-
// Check connection rate limit
|
|
286
|
-
if (!this.checkConnectionRate(ip)) {
|
|
287
|
-
return {
|
|
288
|
-
allowed: false,
|
|
289
|
-
reason: `Connection rate limit (${this.connectionRateLimitPerMinute}/min) exceeded`
|
|
290
|
-
};
|
|
291
|
-
}
|
|
292
|
-
return { allowed: true };
|
|
293
|
-
}
|
|
294
|
-
/**
|
|
295
|
-
* Clears all IP tracking data (for shutdown)
|
|
296
|
-
*/
|
|
297
|
-
clearIPTracking() {
|
|
298
|
-
this.connectionsByIP.clear();
|
|
299
|
-
this.connectionRateByIP.clear();
|
|
300
|
-
}
|
|
301
|
-
/**
|
|
302
|
-
* Start periodic cleanup of IP tracking data
|
|
303
|
-
*/
|
|
304
|
-
startPeriodicIpCleanup() {
|
|
305
|
-
// Clean up IP tracking data every minute
|
|
306
|
-
setInterval(() => {
|
|
307
|
-
this.performIpCleanup();
|
|
308
|
-
}, 60000).unref();
|
|
309
|
-
}
|
|
310
|
-
/**
|
|
311
|
-
* Perform cleanup of expired IP data
|
|
312
|
-
*/
|
|
313
|
-
performIpCleanup() {
|
|
314
|
-
const now = Date.now();
|
|
315
|
-
const minute = 60 * 1000;
|
|
316
|
-
let cleanedRateLimits = 0;
|
|
317
|
-
let cleanedIPs = 0;
|
|
318
|
-
// Clean up expired rate limit timestamps
|
|
319
|
-
for (const [ip, timestamps] of this.connectionRateByIP.entries()) {
|
|
320
|
-
const validTimestamps = timestamps.filter((time) => now - time < minute);
|
|
321
|
-
if (validTimestamps.length === 0) {
|
|
322
|
-
this.connectionRateByIP.delete(ip);
|
|
323
|
-
cleanedRateLimits++;
|
|
324
|
-
}
|
|
325
|
-
else if (validTimestamps.length < timestamps.length) {
|
|
326
|
-
this.connectionRateByIP.set(ip, validTimestamps);
|
|
327
|
-
}
|
|
328
|
-
}
|
|
329
|
-
// Clean up IPs with no active connections
|
|
330
|
-
for (const [ip, connections] of this.connectionsByIP.entries()) {
|
|
331
|
-
if (connections.size === 0) {
|
|
332
|
-
this.connectionsByIP.delete(ip);
|
|
333
|
-
cleanedIPs++;
|
|
334
|
-
}
|
|
335
|
-
}
|
|
336
|
-
if (cleanedRateLimits > 0 || cleanedIPs > 0) {
|
|
337
|
-
this.logger.debug(`IP cleanup: removed ${cleanedIPs} IPs and ${cleanedRateLimits} rate limits`);
|
|
338
|
-
}
|
|
339
|
-
}
|
|
340
|
-
}
|
|
341
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"security-manager.js","sourceRoot":"","sources":["../../../ts/proxies/http-proxy/security-manager.ts"],"names":[],"mappings":"AAGA,OAAO,EACL,cAAc,EACd,WAAW,EACX,oBAAoB,EACpB,wBAAwB,EAEzB,MAAM,oCAAoC,CAAC;AAE5C;;;;GAIG;AACH,MAAM,OAAO,eAAe;IAW1B,YACU,MAAe,EACf,SAAyB,EAAE,EAC3B,sBAA8B,GAAG,EACjC,+BAAuC,GAAG;QAH1C,WAAM,GAAN,MAAM,CAAS;QACf,WAAM,GAAN,MAAM,CAAqB;QAC3B,wBAAmB,GAAnB,mBAAmB,CAAc;QACjC,iCAA4B,GAA5B,4BAA4B,CAAc;QAdpD,8DAA8D;QACtD,kBAAa,GAAsC,IAAI,GAAG,EAAE,CAAC;QAErE,sCAAsC;QAC9B,eAAU,GAA6C,IAAI,GAAG,EAAE,CAAC;QAEzE,4BAA4B;QACpB,oBAAe,GAA6B,IAAI,GAAG,EAAE,CAAC;QACtD,uBAAkB,GAA0B,IAAI,GAAG,EAAE,CAAC;QAQ5D,iDAAiD;QACjD,IAAI,CAAC,sBAAsB,EAAE,CAAC;IAChC,CAAC;IAED;;OAEG;IACI,SAAS,CAAC,MAAsB;QACrC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,kCAAkC;QAClC,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,CAAC;IAC7B,CAAC;IAED;;;;;;OAMG;IACI,SAAS,CAAC,KAAmB,EAAE,OAAsB;QAC1D,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,uBAAuB;QACvB,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,OAAO,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC/C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,OAAO,CAAC,QAAQ,yBAAyB,KAAK,CAAC,IAAI,IAAI,SAAS,EAAE,CAAC,CAAC;YAC5F,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,IAAI,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,OAAO,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,OAAO,CAAC,EAAE,CAAC;YACjF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,iCAAiC,KAAK,CAAC,IAAI,IAAI,SAAS,EAAE,CAAC,CAAC;YAC9E,OAAO,KAAK,CAAC;QACf,CAAC;QAED,6CAA6C;QAC7C,6DAA6D;QAC7D,uCAAuC;QAEvC,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,KAAmB,EAAE,QAAgB;QACvD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC;YACpB,OAAO,IAAI,CAAC,CAAC,2BAA2B;QAC1C,CAAC;QAED,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAExC,oBAAoB;QACpB,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YACrC,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC7C,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QACpD,IAAI,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC7B,OAAO,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAE,CAAC;QACnC,CAAC;QAED,0CAA0C;QAC1C,MAAM,OAAO,GAAG,cAAc,CAC5B,QAAQ,EACR,KAAK,CAAC,QAAQ,CAAC,WAAW,EAC1B,KAAK,CAAC,QAAQ,CAAC,WAAW,CAC3B,CAAC;QAEF,mBAAmB;QACnB,UAAU,CAAC,GAAG,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,KAAmB,EAAE,OAAsB;QACnE,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAC3C,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC;QAExC,oDAAoD;QACpD,IAAI,GAAG,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAC,gBAAgB;QAE5C,IAAI,SAAS,CAAC,KAAK,KAAK,MAAM,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;YAC/C,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;QAC9C,CAAC;aAAM,IAAI,SAAS,CAAC,KAAK,KAAK,QAAQ,IAAI,SAAS,CAAC,UAAU,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACnF,MAAM,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,CAAC;YACxE,IAAI,WAAW,EAAE,CAAC;gBAChB,GAAG,GAAG,GAAG,OAAO,CAAC,QAAQ,IAAI,WAAW,EAAE,CAAC;YAC7C,CAAC;QACH,CAAC;QAED,mDAAmD;QACnD,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;YAClC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC1C,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;QAClD,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAEvB,iDAAiD;QACjD,IAAI,KAAK,GAAG,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACjC,IAAI,CAAC,KAAK,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;YACjC,6CAA6C;YAC7C,KAAK,GAAG;gBACN,KAAK,EAAE,CAAC;gBACR,MAAM,EAAE,GAAG,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,IAAI,CAAC;aACxC,CAAC;YACF,WAAW,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;YAC5B,OAAO,IAAI,CAAC;QACd,CAAC;QAED,wBAAwB;QACxB,KAAK,CAAC,KAAK,EAAE,CAAC;QAEd,kCAAkC;QAClC,OAAO,KAAK,CAAC,KAAK,IAAI,SAAS,CAAC,WAAW,CAAC;IAC9C,CAAC;IAED;;;OAGG;IACI,wBAAwB;QAC7B,wBAAwB,CAAC,IAAI,CAAC,UAAU,EAAE;YACxC,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;YACxC,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;YACxC,KAAK,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;YAC1C,KAAK,EAAE,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;SAC5C,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;OAOG;IACI,cAAc,CAAC,KAAmB,EAAE,QAAgB,EAAE,QAAgB;QAC3E,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,SAAS,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;QAE3C,6CAA6C;QAC7C,KAAK,MAAM,IAAI,IAAI,SAAS,CAAC,KAAK,EAAE,CAAC;YACnC,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,IAAI,IAAI,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;gBAC7D,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;;;OAMG;IACI,cAAc,CAAC,KAAmB,EAAE,KAAa;QACtD,IAAI,CAAC,KAAK,CAAC,QAAQ,EAAE,OAAO,EAAE,OAAO,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,IAAI,CAAC;YACH,MAAM,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC;YAEvC,mBAAmB;YACnB,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvB,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC;YAEvE,mBAAmB;YACnB,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,EAAE,CAAC;gBAC/D,OAAO,KAAK,CAAC;YACf,CAAC;YAED,eAAe;YACf,IAAI,OAAO,CAAC,MAAM,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,MAAM,EAAE,CAAC;gBACrD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,iBAAiB;YACjB,IAAI,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,GAAG,KAAK,OAAO,CAAC,QAAQ,EAAE,CAAC;gBACzD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,kEAAkE;YAClE,sDAAsD;YAEtD,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,wBAAwB,GAAG,EAAE,CAAC,CAAC;YACjD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACI,sBAAsB,CAAC,EAAU;QACtC,0CAA0C;QAC1C,MAAM,QAAQ,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;QACjC,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,MAAM,WAAW,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;YACtD,IAAI,WAAW,EAAE,CAAC;gBAChB,OAAO,WAAW,CAAC,IAAI,CAAC;YAC1B,CAAC;QACH,CAAC;QACD,OAAO,CAAC,CAAC;IACX,CAAC;IAED;;;OAGG;IACI,mBAAmB,CAAC,EAAU;QACnC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,EAAE,GAAG,IAAI,CAAC;QAEzB,0DAA0D;QAC1D,MAAM,QAAQ,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;QACjC,IAAI,WAAW,GAAkB,IAAI,CAAC;QACtC,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,IAAI,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;gBACzC,WAAW,GAAG,OAAO,CAAC;gBACtB,MAAM;YACR,CAAC;QACH,CAAC;QAED,MAAM,GAAG,GAAG,WAAW,IAAI,EAAE,CAAC;QAE9B,IAAI,CAAC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC;YACtC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;YACxC,OAAO,IAAI,CAAC;QACd,CAAC;QAED,4DAA4D;QAC5D,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,GAAG,CAAE,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,GAAG,GAAG,IAAI,GAAG,MAAM,CAAC,CAAC;QAC3F,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACrB,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,GAAG,EAAE,UAAU,CAAC,CAAC;QAE7C,8BAA8B;QAC9B,OAAO,UAAU,CAAC,MAAM,IAAI,IAAI,CAAC,4BAA4B,CAAC;IAChE,CAAC;IAED;;OAEG;IACI,mBAAmB,CAAC,EAAU,EAAE,YAAoB;QACzD,sCAAsC;QACtC,MAAM,QAAQ,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;QACjC,IAAI,WAAW,GAAkB,IAAI,CAAC;QAEtC,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,IAAI,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;gBACtC,WAAW,GAAG,OAAO,CAAC;gBACtB,MAAM;YACR,CAAC;QACH,CAAC;QAED,MAAM,GAAG,GAAG,WAAW,IAAI,EAAE,CAAC;QAC9B,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC;YACnC,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,GAAG,EAAE,IAAI,GAAG,EAAE,CAAC,CAAC;QAC3C,CAAC;QACD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,GAAG,CAAE,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;IACnD,CAAC;IAED;;OAEG;IACI,oBAAoB,CAAC,EAAU,EAAE,YAAoB;QAC1D,6DAA6D;QAC7D,MAAM,QAAQ,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;QAEjC,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;YAC/B,IAAI,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,OAAO,CAAC,EAAE,CAAC;gBACtC,MAAM,WAAW,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,OAAO,CAAE,CAAC;gBACvD,WAAW,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;gBACjC,IAAI,WAAW,CAAC,IAAI,KAAK,CAAC,EAAE,CAAC;oBAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;gBACvC,CAAC;gBACD,MAAM;YACR,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;OAGG;IACI,UAAU,CAAC,EAAU;QAC1B,+BAA+B;QAC/B,IAAI,IAAI,CAAC,sBAAsB,CAAC,EAAE,CAAC,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAChE,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,+BAA+B,IAAI,CAAC,mBAAmB,YAAY;aAC5E,CAAC;QACJ,CAAC;QAED,8BAA8B;QAC9B,IAAI,CAAC,IAAI,CAAC,mBAAmB,CAAC,EAAE,CAAC,EAAE,CAAC;YAClC,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,0BAA0B,IAAI,CAAC,4BAA4B,gBAAgB;aACpF,CAAC;QACJ,CAAC;QAED,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,eAAe;QACpB,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;QAC7B,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,CAAC;IAClC,CAAC;IAED;;OAEG;IACK,sBAAsB;QAC5B,yCAAyC;QACzC,WAAW,CAAC,GAAG,EAAE;YACf,IAAI,CAAC,gBAAgB,EAAE,CAAC;QAC1B,CAAC,EAAE,KAAK,CAAC,CAAC,KAAK,EAAE,CAAC;IACpB,CAAC;IAED;;OAEG;IACK,gBAAgB;QACtB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,EAAE,GAAG,IAAI,CAAC;QACzB,IAAI,iBAAiB,GAAG,CAAC,CAAC;QAC1B,IAAI,UAAU,GAAG,CAAC,CAAC;QAEnB,yCAAyC;QACzC,KAAK,MAAM,CAAC,EAAE,EAAE,UAAU,CAAC,IAAI,IAAI,CAAC,kBAAkB,CAAC,OAAO,EAAE,EAAE,CAAC;YACjE,MAAM,eAAe,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,GAAG,GAAG,IAAI,GAAG,MAAM,CAAC,CAAC;YAEzE,IAAI,eAAe,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACjC,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBACnC,iBAAiB,EAAE,CAAC;YACtB,CAAC;iBAAM,IAAI,eAAe,CAAC,MAAM,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;gBACtD,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,EAAE,EAAE,eAAe,CAAC,CAAC;YACnD,CAAC;QACH,CAAC;QAED,0CAA0C;QAC1C,KAAK,MAAM,CAAC,EAAE,EAAE,WAAW,CAAC,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE,EAAE,CAAC;YAC/D,IAAI,WAAW,CAAC,IAAI,KAAK,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAChC,UAAU,EAAE,CAAC;YACf,CAAC;QACH,CAAC;QAED,IAAI,iBAAiB,GAAG,CAAC,IAAI,UAAU,GAAG,CAAC,EAAE,CAAC;YAC5C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,uBAAuB,UAAU,YAAY,iBAAiB,cAAc,CAAC,CAAC;QAClG,CAAC;IACH,CAAC;CACF"}
|
|
@@ -1,50 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../../plugins.js';
|
|
2
|
-
import '../../core/models/socket-augmentation.js';
|
|
3
|
-
import { type IHttpProxyOptions } from './models/types.js';
|
|
4
|
-
import { ConnectionPool } from './connection-pool.js';
|
|
5
|
-
import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
|
|
6
|
-
/**
|
|
7
|
-
* Handles WebSocket connections and proxying
|
|
8
|
-
*/
|
|
9
|
-
export declare class WebSocketHandler {
|
|
10
|
-
private options;
|
|
11
|
-
private connectionPool;
|
|
12
|
-
private routes;
|
|
13
|
-
private heartbeatInterval;
|
|
14
|
-
private wsServer;
|
|
15
|
-
private logger;
|
|
16
|
-
private contextCreator;
|
|
17
|
-
private router;
|
|
18
|
-
private securityManager;
|
|
19
|
-
constructor(options: IHttpProxyOptions, connectionPool: ConnectionPool, routes?: IRouteConfig[]);
|
|
20
|
-
/**
|
|
21
|
-
* Set the route configurations
|
|
22
|
-
*/
|
|
23
|
-
setRoutes(routes: IRouteConfig[]): void;
|
|
24
|
-
/**
|
|
25
|
-
* Select the appropriate target from the targets array based on sub-matching criteria
|
|
26
|
-
*/
|
|
27
|
-
private selectTarget;
|
|
28
|
-
/**
|
|
29
|
-
* Initialize WebSocket server on an existing HTTPS server
|
|
30
|
-
*/
|
|
31
|
-
initialize(server: plugins.https.Server): void;
|
|
32
|
-
/**
|
|
33
|
-
* Start the heartbeat interval to check for inactive WebSocket connections
|
|
34
|
-
*/
|
|
35
|
-
private startHeartbeat;
|
|
36
|
-
/**
|
|
37
|
-
* Handle a new WebSocket connection
|
|
38
|
-
*/
|
|
39
|
-
private handleWebSocketConnection;
|
|
40
|
-
/**
|
|
41
|
-
* Get information about active WebSocket connections
|
|
42
|
-
*/
|
|
43
|
-
getConnectionInfo(): {
|
|
44
|
-
activeConnections: number;
|
|
45
|
-
};
|
|
46
|
-
/**
|
|
47
|
-
* Shutdown the WebSocket handler
|
|
48
|
-
*/
|
|
49
|
-
shutdown(): void;
|
|
50
|
-
}
|