@push.rocks/smartproxy 23.0.0 → 23.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (161) hide show
  1. package/changelog.md +17 -0
  2. package/dist_rust/{rustproxy → rustproxy_linux_amd64} +0 -0
  3. package/dist_rust/rustproxy_linux_arm64 +0 -0
  4. package/dist_ts/00_commitinfo_data.js +1 -1
  5. package/dist_ts/plugins.d.ts +2 -1
  6. package/dist_ts/plugins.js +3 -2
  7. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.d.ts +9 -21
  8. package/dist_ts/proxies/smart-proxy/rust-proxy-bridge.js +84 -212
  9. package/dist_ts/proxies/smart-proxy/smart-proxy.js +2 -3
  10. package/npmextra.json +3 -0
  11. package/package.json +13 -11
  12. package/readme.md +41 -11
  13. package/ts/00_commitinfo_data.ts +1 -1
  14. package/ts/plugins.ts +2 -0
  15. package/ts/proxies/smart-proxy/rust-proxy-bridge.ts +103 -233
  16. package/ts/proxies/smart-proxy/smart-proxy.ts +1 -2
  17. package/dist_ts/common/eventUtils.d.ts +0 -14
  18. package/dist_ts/common/eventUtils.js +0 -20
  19. package/dist_ts/common/types.d.ts +0 -82
  20. package/dist_ts/common/types.js +0 -15
  21. package/dist_ts/core/utils/event-system.d.ts +0 -200
  22. package/dist_ts/core/utils/event-system.js +0 -224
  23. package/dist_ts/core/utils/event-utils.d.ts +0 -15
  24. package/dist_ts/core/utils/event-utils.js +0 -11
  25. package/dist_ts/core/utils/route-manager.d.ts +0 -88
  26. package/dist_ts/core/utils/route-manager.js +0 -342
  27. package/dist_ts/core/utils/route-utils.d.ts +0 -28
  28. package/dist_ts/core/utils/route-utils.js +0 -67
  29. package/dist_ts/detection/detectors/http-detector-v2.d.ts +0 -33
  30. package/dist_ts/detection/detectors/http-detector-v2.js +0 -87
  31. package/dist_ts/detection/detectors/tls-detector-v2.d.ts +0 -33
  32. package/dist_ts/detection/detectors/tls-detector-v2.js +0 -80
  33. package/dist_ts/detection/protocol-detector-v2.d.ts +0 -46
  34. package/dist_ts/detection/protocol-detector-v2.js +0 -116
  35. package/dist_ts/forwarding/config/forwarding-types.d.ts +0 -42
  36. package/dist_ts/forwarding/config/forwarding-types.js +0 -18
  37. package/dist_ts/forwarding/config/index.d.ts +0 -9
  38. package/dist_ts/forwarding/config/index.js +0 -10
  39. package/dist_ts/forwarding/factory/forwarding-factory.d.ts +0 -25
  40. package/dist_ts/forwarding/factory/forwarding-factory.js +0 -172
  41. package/dist_ts/forwarding/factory/index.d.ts +0 -4
  42. package/dist_ts/forwarding/factory/index.js +0 -5
  43. package/dist_ts/forwarding/handlers/base-handler.d.ts +0 -62
  44. package/dist_ts/forwarding/handlers/base-handler.js +0 -121
  45. package/dist_ts/forwarding/handlers/http-handler.d.ts +0 -30
  46. package/dist_ts/forwarding/handlers/http-handler.js +0 -143
  47. package/dist_ts/forwarding/handlers/https-passthrough-handler.d.ts +0 -29
  48. package/dist_ts/forwarding/handlers/https-passthrough-handler.js +0 -156
  49. package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.d.ts +0 -36
  50. package/dist_ts/forwarding/handlers/https-terminate-to-http-handler.js +0 -276
  51. package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.d.ts +0 -35
  52. package/dist_ts/forwarding/handlers/https-terminate-to-https-handler.js +0 -261
  53. package/dist_ts/forwarding/handlers/index.d.ts +0 -8
  54. package/dist_ts/forwarding/handlers/index.js +0 -9
  55. package/dist_ts/forwarding/index.d.ts +0 -13
  56. package/dist_ts/forwarding/index.js +0 -16
  57. package/dist_ts/http/index.d.ts +0 -5
  58. package/dist_ts/http/index.js +0 -8
  59. package/dist_ts/http/models/http-types.d.ts +0 -6
  60. package/dist_ts/http/models/http-types.js +0 -7
  61. package/dist_ts/http/router/index.d.ts +0 -8
  62. package/dist_ts/http/router/index.js +0 -7
  63. package/dist_ts/http/router/proxy-router.d.ts +0 -115
  64. package/dist_ts/http/router/proxy-router.js +0 -325
  65. package/dist_ts/http/router/route-router.d.ts +0 -108
  66. package/dist_ts/http/router/route-router.js +0 -393
  67. package/dist_ts/protocols/tls/constants.d.ts +0 -122
  68. package/dist_ts/protocols/tls/constants.js +0 -135
  69. package/dist_ts/protocols/tls/parser.d.ts +0 -53
  70. package/dist_ts/protocols/tls/parser.js +0 -294
  71. package/dist_ts/protocols/tls/types.d.ts +0 -65
  72. package/dist_ts/protocols/tls/types.js +0 -5
  73. package/dist_ts/proxies/http-proxy/certificate-manager.d.ts +0 -95
  74. package/dist_ts/proxies/http-proxy/certificate-manager.js +0 -214
  75. package/dist_ts/proxies/http-proxy/connection-pool.d.ts +0 -47
  76. package/dist_ts/proxies/http-proxy/connection-pool.js +0 -195
  77. package/dist_ts/proxies/http-proxy/context-creator.d.ts +0 -34
  78. package/dist_ts/proxies/http-proxy/context-creator.js +0 -108
  79. package/dist_ts/proxies/http-proxy/default-certificates.d.ts +0 -54
  80. package/dist_ts/proxies/http-proxy/default-certificates.js +0 -127
  81. package/dist_ts/proxies/http-proxy/function-cache.d.ts +0 -95
  82. package/dist_ts/proxies/http-proxy/function-cache.js +0 -215
  83. package/dist_ts/proxies/http-proxy/handlers/index.d.ts +0 -4
  84. package/dist_ts/proxies/http-proxy/handlers/index.js +0 -6
  85. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.d.ts +0 -18
  86. package/dist_ts/proxies/http-proxy/handlers/redirect-handler.js +0 -78
  87. package/dist_ts/proxies/http-proxy/handlers/static-handler.d.ts +0 -19
  88. package/dist_ts/proxies/http-proxy/handlers/static-handler.js +0 -211
  89. package/dist_ts/proxies/http-proxy/http-proxy.d.ts +0 -117
  90. package/dist_ts/proxies/http-proxy/http-proxy.js +0 -521
  91. package/dist_ts/proxies/http-proxy/http-request-handler.d.ts +0 -40
  92. package/dist_ts/proxies/http-proxy/http-request-handler.js +0 -257
  93. package/dist_ts/proxies/http-proxy/http2-request-handler.d.ts +0 -24
  94. package/dist_ts/proxies/http-proxy/http2-request-handler.js +0 -201
  95. package/dist_ts/proxies/http-proxy/index.d.ts +0 -14
  96. package/dist_ts/proxies/http-proxy/index.js +0 -16
  97. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +0 -117
  98. package/dist_ts/proxies/http-proxy/models/http-types.js +0 -92
  99. package/dist_ts/proxies/http-proxy/models/index.d.ts +0 -5
  100. package/dist_ts/proxies/http-proxy/models/index.js +0 -6
  101. package/dist_ts/proxies/http-proxy/models/types.d.ts +0 -75
  102. package/dist_ts/proxies/http-proxy/models/types.js +0 -35
  103. package/dist_ts/proxies/http-proxy/request-handler.d.ts +0 -97
  104. package/dist_ts/proxies/http-proxy/request-handler.js +0 -737
  105. package/dist_ts/proxies/http-proxy/security-manager.d.ts +0 -98
  106. package/dist_ts/proxies/http-proxy/security-manager.js +0 -341
  107. package/dist_ts/proxies/http-proxy/websocket-handler.d.ts +0 -50
  108. package/dist_ts/proxies/http-proxy/websocket-handler.js +0 -505
  109. package/dist_ts/proxies/smart-proxy/acme-state-manager.d.ts +0 -42
  110. package/dist_ts/proxies/smart-proxy/acme-state-manager.js +0 -101
  111. package/dist_ts/proxies/smart-proxy/cert-store.d.ts +0 -10
  112. package/dist_ts/proxies/smart-proxy/cert-store.js +0 -72
  113. package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +0 -164
  114. package/dist_ts/proxies/smart-proxy/certificate-manager.js +0 -745
  115. package/dist_ts/proxies/smart-proxy/connection-manager.d.ts +0 -128
  116. package/dist_ts/proxies/smart-proxy/connection-manager.js +0 -689
  117. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.d.ts +0 -43
  118. package/dist_ts/proxies/smart-proxy/http-proxy-bridge.js +0 -180
  119. package/dist_ts/proxies/smart-proxy/metrics-collector.d.ts +0 -98
  120. package/dist_ts/proxies/smart-proxy/metrics-collector.js +0 -355
  121. package/dist_ts/proxies/smart-proxy/nftables-manager.d.ts +0 -82
  122. package/dist_ts/proxies/smart-proxy/nftables-manager.js +0 -237
  123. package/dist_ts/proxies/smart-proxy/port-manager.d.ts +0 -117
  124. package/dist_ts/proxies/smart-proxy/port-manager.js +0 -318
  125. package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +0 -60
  126. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +0 -1407
  127. package/dist_ts/proxies/smart-proxy/route-manager.d.ts +0 -112
  128. package/dist_ts/proxies/smart-proxy/route-manager.js +0 -453
  129. package/dist_ts/proxies/smart-proxy/route-orchestrator.d.ts +0 -56
  130. package/dist_ts/proxies/smart-proxy/route-orchestrator.js +0 -204
  131. package/dist_ts/proxies/smart-proxy/rust-binary-locator.d.ts +0 -23
  132. package/dist_ts/proxies/smart-proxy/rust-binary-locator.js +0 -104
  133. package/dist_ts/proxies/smart-proxy/security-manager.d.ts +0 -74
  134. package/dist_ts/proxies/smart-proxy/security-manager.js +0 -227
  135. package/dist_ts/proxies/smart-proxy/throughput-tracker.d.ts +0 -36
  136. package/dist_ts/proxies/smart-proxy/throughput-tracker.js +0 -115
  137. package/dist_ts/proxies/smart-proxy/timeout-manager.d.ts +0 -48
  138. package/dist_ts/proxies/smart-proxy/timeout-manager.js +0 -158
  139. package/dist_ts/proxies/smart-proxy/tls-manager.d.ts +0 -50
  140. package/dist_ts/proxies/smart-proxy/tls-manager.js +0 -110
  141. package/dist_ts/proxies/smart-proxy/utils/route-patterns.d.ts +0 -161
  142. package/dist_ts/proxies/smart-proxy/utils/route-patterns.js +0 -282
  143. package/dist_ts/proxies/smart-proxy/utils/route-validators.d.ts +0 -73
  144. package/dist_ts/proxies/smart-proxy/utils/route-validators.js +0 -259
  145. package/dist_ts/routing/router/proxy-router.d.ts +0 -115
  146. package/dist_ts/routing/router/proxy-router.js +0 -325
  147. package/dist_ts/routing/router/route-router.d.ts +0 -108
  148. package/dist_ts/routing/router/route-router.js +0 -393
  149. package/dist_ts/tls/alerts/index.d.ts +0 -4
  150. package/dist_ts/tls/alerts/index.js +0 -5
  151. package/dist_ts/tls/alerts/tls-alert.d.ts +0 -150
  152. package/dist_ts/tls/alerts/tls-alert.js +0 -226
  153. package/dist_ts/tls/sni/client-hello-parser.d.ts +0 -100
  154. package/dist_ts/tls/sni/client-hello-parser.js +0 -464
  155. package/dist_ts/tls/sni/sni-extraction.d.ts +0 -58
  156. package/dist_ts/tls/sni/sni-extraction.js +0 -275
  157. package/dist_ts/tls/utils/index.d.ts +0 -4
  158. package/dist_ts/tls/utils/index.js +0 -5
  159. package/dist_ts/tls/utils/tls-utils.d.ts +0 -49
  160. package/dist_ts/tls/utils/tls-utils.js +0 -75
  161. package/ts/proxies/smart-proxy/rust-binary-locator.ts +0 -112
@@ -1,112 +0,0 @@
1
- import * as plugins from '../../plugins.js';
2
- import type { IRouteConfig, TPortRange } from './models/route-types.js';
3
- import type { ISmartProxyOptions } from './models/interfaces.js';
4
- /**
5
- * Result of route matching
6
- */
7
- export interface IRouteMatchResult {
8
- route: IRouteConfig;
9
- params?: Record<string, string>;
10
- }
11
- /**
12
- * The RouteManager handles all routing decisions based on connections and attributes
13
- */
14
- export declare class RouteManager extends plugins.EventEmitter {
15
- private routes;
16
- private portMap;
17
- private options;
18
- constructor(options: ISmartProxyOptions);
19
- /**
20
- * Update routes with new configuration
21
- */
22
- updateRoutes(routes?: IRouteConfig[]): void;
23
- /**
24
- * Rebuild the port mapping for fast lookups
25
- * Also logs information about the ports being listened on
26
- */
27
- private rebuildPortMap;
28
- /**
29
- * Expand a port range specification into an array of individual ports
30
- * Uses caching to improve performance for frequently used port ranges
31
- *
32
- * @public - Made public to allow external code to interpret port ranges
33
- */
34
- expandPortRange(portRange: TPortRange): number[];
35
- /**
36
- * Memoization cache for expanded port ranges
37
- */
38
- private portRangeCache;
39
- /**
40
- * Get all ports that should be listened on
41
- * This method automatically infers all required ports from route configurations
42
- */
43
- getListeningPorts(): number[];
44
- /**
45
- * Get all routes for a given port
46
- */
47
- getRoutesForPort(port: number): IRouteConfig[];
48
- /**
49
- * Get all routes
50
- */
51
- getAllRoutes(): IRouteConfig[];
52
- /**
53
- * Test if a pattern matches a domain using glob matching
54
- */
55
- private matchDomain;
56
- /**
57
- * Match a domain against all patterns in a route
58
- */
59
- private matchRouteDomain;
60
- /**
61
- * Check if a client IP is allowed by a route's security settings
62
- * @deprecated Security is now checked in route-connection-handler.ts after route matching
63
- */
64
- private isClientIpAllowed;
65
- /**
66
- * Match an IP against a pattern
67
- */
68
- private matchIpPattern;
69
- /**
70
- * Match an IP against a CIDR pattern
71
- */
72
- private matchIpCidr;
73
- /**
74
- * Convert an IP address to a numeric value
75
- */
76
- private ipToNumber;
77
- /**
78
- * Find the matching route for a connection
79
- */
80
- findMatchingRoute(options: {
81
- port: number;
82
- domain?: string;
83
- clientIp: string;
84
- path?: string;
85
- tlsVersion?: string;
86
- skipDomainCheck?: boolean;
87
- }): IRouteMatchResult | null;
88
- /**
89
- * Match a path against a pattern
90
- */
91
- private matchPath;
92
- /**
93
- * Domain-based configuration methods have been removed
94
- * as part of the migration to pure route-based configuration
95
- */
96
- /**
97
- * Validate the route configuration and return any warnings
98
- */
99
- validateConfiguration(): string[];
100
- /**
101
- * Check if two route matches are similar (potential conflict)
102
- */
103
- private areMatchesSimilar;
104
- /**
105
- * Check if a route is completely shadowed by a higher priority route
106
- */
107
- private isRouteShadowed;
108
- /**
109
- * Check if route1 is more specific than route2
110
- */
111
- private isRouteMoreSpecific;
112
- }
@@ -1,453 +0,0 @@
1
- import * as plugins from '../../plugins.js';
2
- /**
3
- * The RouteManager handles all routing decisions based on connections and attributes
4
- */
5
- export class RouteManager extends plugins.EventEmitter {
6
- constructor(options) {
7
- super();
8
- this.routes = [];
9
- this.portMap = new Map();
10
- /**
11
- * Memoization cache for expanded port ranges
12
- */
13
- this.portRangeCache = new Map();
14
- // Store options
15
- this.options = options;
16
- // Initialize routes from either source
17
- this.updateRoutes(this.options.routes);
18
- }
19
- /**
20
- * Update routes with new configuration
21
- */
22
- updateRoutes(routes = []) {
23
- // Sort routes by priority (higher first)
24
- this.routes = [...(routes || [])].sort((a, b) => {
25
- const priorityA = a.priority ?? 0;
26
- const priorityB = b.priority ?? 0;
27
- return priorityB - priorityA;
28
- });
29
- // Rebuild port mapping for fast lookups
30
- this.rebuildPortMap();
31
- }
32
- /**
33
- * Rebuild the port mapping for fast lookups
34
- * Also logs information about the ports being listened on
35
- */
36
- rebuildPortMap() {
37
- this.portMap.clear();
38
- this.portRangeCache.clear(); // Clear cache when rebuilding
39
- // Track ports for logging
40
- const portToRoutesMap = new Map();
41
- for (const route of this.routes) {
42
- const ports = this.expandPortRange(route.match.ports);
43
- // Skip if no ports were found
44
- if (ports.length === 0) {
45
- console.warn(`Route ${route.name || 'unnamed'} has no valid ports to listen on`);
46
- continue;
47
- }
48
- for (const port of ports) {
49
- // Add to portMap for routing
50
- if (!this.portMap.has(port)) {
51
- this.portMap.set(port, []);
52
- }
53
- this.portMap.get(port).push(route);
54
- // Add to tracking for logging
55
- if (!portToRoutesMap.has(port)) {
56
- portToRoutesMap.set(port, []);
57
- }
58
- portToRoutesMap.get(port).push(route.name || 'unnamed');
59
- }
60
- }
61
- // Log summary of ports and routes
62
- const totalPorts = this.portMap.size;
63
- const totalRoutes = this.routes.length;
64
- console.log(`Route manager configured with ${totalRoutes} routes across ${totalPorts} ports`);
65
- // Log port details if detailed logging is enabled
66
- const enableDetailedLogging = this.options.enableDetailedLogging;
67
- if (enableDetailedLogging) {
68
- for (const [port, routes] of this.portMap.entries()) {
69
- console.log(`Port ${port}: ${routes.length} routes (${portToRoutesMap.get(port).join(', ')})`);
70
- }
71
- }
72
- }
73
- /**
74
- * Expand a port range specification into an array of individual ports
75
- * Uses caching to improve performance for frequently used port ranges
76
- *
77
- * @public - Made public to allow external code to interpret port ranges
78
- */
79
- expandPortRange(portRange) {
80
- // For simple number, return immediately
81
- if (typeof portRange === 'number') {
82
- return [portRange];
83
- }
84
- // Create a cache key for this port range
85
- const cacheKey = JSON.stringify(portRange);
86
- // Check if we have a cached result
87
- if (this.portRangeCache.has(cacheKey)) {
88
- return this.portRangeCache.get(cacheKey);
89
- }
90
- // Process the port range
91
- let result = [];
92
- if (Array.isArray(portRange)) {
93
- // Handle array of port objects or numbers
94
- result = portRange.flatMap(item => {
95
- if (typeof item === 'number') {
96
- return [item];
97
- }
98
- else if (typeof item === 'object' && 'from' in item && 'to' in item) {
99
- // Handle port range object - check valid range
100
- if (item.from > item.to) {
101
- console.warn(`Invalid port range: from (${item.from}) > to (${item.to})`);
102
- return [];
103
- }
104
- // Handle port range object
105
- const ports = [];
106
- for (let p = item.from; p <= item.to; p++) {
107
- ports.push(p);
108
- }
109
- return ports;
110
- }
111
- return [];
112
- });
113
- }
114
- // Cache the result
115
- this.portRangeCache.set(cacheKey, result);
116
- return result;
117
- }
118
- /**
119
- * Get all ports that should be listened on
120
- * This method automatically infers all required ports from route configurations
121
- */
122
- getListeningPorts() {
123
- // Return the unique set of ports from all routes
124
- return Array.from(this.portMap.keys());
125
- }
126
- /**
127
- * Get all routes for a given port
128
- */
129
- getRoutesForPort(port) {
130
- return this.portMap.get(port) || [];
131
- }
132
- /**
133
- * Get all routes
134
- */
135
- getAllRoutes() {
136
- return [...this.routes];
137
- }
138
- /**
139
- * Test if a pattern matches a domain using glob matching
140
- */
141
- matchDomain(pattern, domain) {
142
- // Convert glob pattern to regex
143
- const regexPattern = pattern
144
- .replace(/\./g, '\\.') // Escape dots
145
- .replace(/\*/g, '.*'); // Convert * to .*
146
- const regex = new RegExp(`^${regexPattern}$`, 'i');
147
- return regex.test(domain);
148
- }
149
- /**
150
- * Match a domain against all patterns in a route
151
- */
152
- matchRouteDomain(route, domain) {
153
- if (!route.match.domains) {
154
- // If no domains specified, match all domains
155
- return true;
156
- }
157
- const patterns = Array.isArray(route.match.domains)
158
- ? route.match.domains
159
- : [route.match.domains];
160
- return patterns.some(pattern => this.matchDomain(pattern, domain));
161
- }
162
- /**
163
- * Check if a client IP is allowed by a route's security settings
164
- * @deprecated Security is now checked in route-connection-handler.ts after route matching
165
- */
166
- isClientIpAllowed(route, clientIp) {
167
- const security = route.security;
168
- if (!security) {
169
- return true; // No security settings means allowed
170
- }
171
- // Check blocked IPs first
172
- if (security.ipBlockList && security.ipBlockList.length > 0) {
173
- for (const pattern of security.ipBlockList) {
174
- if (this.matchIpPattern(pattern, clientIp)) {
175
- return false; // IP is blocked
176
- }
177
- }
178
- }
179
- // If there are allowed IPs, check them
180
- if (security.ipAllowList && security.ipAllowList.length > 0) {
181
- for (const pattern of security.ipAllowList) {
182
- if (this.matchIpPattern(pattern, clientIp)) {
183
- return true; // IP is allowed
184
- }
185
- }
186
- return false; // IP not in allowed list
187
- }
188
- // No allowed IPs specified, so IP is allowed
189
- return true;
190
- }
191
- /**
192
- * Match an IP against a pattern
193
- */
194
- matchIpPattern(pattern, ip) {
195
- // Normalize IPv6-mapped IPv4 addresses
196
- const normalizedIp = ip.startsWith('::ffff:') ? ip.substring(7) : ip;
197
- const normalizedPattern = pattern.startsWith('::ffff:') ? pattern.substring(7) : pattern;
198
- // Handle exact match with normalized addresses
199
- if (pattern === ip || normalizedPattern === normalizedIp ||
200
- pattern === normalizedIp || normalizedPattern === ip) {
201
- return true;
202
- }
203
- // Handle CIDR notation (e.g., 192.168.1.0/24)
204
- if (pattern.includes('/')) {
205
- return this.matchIpCidr(pattern, normalizedIp) ||
206
- (normalizedPattern !== pattern && this.matchIpCidr(normalizedPattern, normalizedIp));
207
- }
208
- // Handle glob pattern (e.g., 192.168.1.*)
209
- if (pattern.includes('*')) {
210
- const regexPattern = pattern.replace(/\./g, '\\.').replace(/\*/g, '.*');
211
- const regex = new RegExp(`^${regexPattern}$`);
212
- if (regex.test(ip) || regex.test(normalizedIp)) {
213
- return true;
214
- }
215
- // If pattern was normalized, also test with normalized pattern
216
- if (normalizedPattern !== pattern) {
217
- const normalizedRegexPattern = normalizedPattern.replace(/\./g, '\\.').replace(/\*/g, '.*');
218
- const normalizedRegex = new RegExp(`^${normalizedRegexPattern}$`);
219
- return normalizedRegex.test(ip) || normalizedRegex.test(normalizedIp);
220
- }
221
- }
222
- return false;
223
- }
224
- /**
225
- * Match an IP against a CIDR pattern
226
- */
227
- matchIpCidr(cidr, ip) {
228
- try {
229
- // In a real implementation, you'd use a proper IP library
230
- // This is a simplified implementation
231
- const [subnet, bits] = cidr.split('/');
232
- const mask = parseInt(bits, 10);
233
- // Normalize IPv6-mapped IPv4 addresses
234
- const normalizedIp = ip.startsWith('::ffff:') ? ip.substring(7) : ip;
235
- const normalizedSubnet = subnet.startsWith('::ffff:') ? subnet.substring(7) : subnet;
236
- // Convert IP addresses to numeric values
237
- const ipNum = this.ipToNumber(normalizedIp);
238
- const subnetNum = this.ipToNumber(normalizedSubnet);
239
- // Calculate subnet mask
240
- const maskNum = ~(2 ** (32 - mask) - 1);
241
- // Check if IP is in subnet
242
- return (ipNum & maskNum) === (subnetNum & maskNum);
243
- }
244
- catch (e) {
245
- console.error(`Error matching IP ${ip} against CIDR ${cidr}:`, e);
246
- return false;
247
- }
248
- }
249
- /**
250
- * Convert an IP address to a numeric value
251
- */
252
- ipToNumber(ip) {
253
- // Normalize IPv6-mapped IPv4 addresses
254
- const normalizedIp = ip.startsWith('::ffff:') ? ip.substring(7) : ip;
255
- const parts = normalizedIp.split('.').map(part => parseInt(part, 10));
256
- return (parts[0] << 24) | (parts[1] << 16) | (parts[2] << 8) | parts[3];
257
- }
258
- /**
259
- * Find the matching route for a connection
260
- */
261
- findMatchingRoute(options) {
262
- const { port, domain, clientIp, path, tlsVersion, skipDomainCheck } = options;
263
- // Get all routes for this port
264
- const routesForPort = this.getRoutesForPort(port);
265
- // Find the first matching route based on priority order
266
- for (const route of routesForPort) {
267
- // Check domain match
268
- // If the route has domain restrictions and we have a domain to check
269
- if (route.match.domains && !skipDomainCheck) {
270
- // If no domain was provided (non-TLS or no SNI), this route doesn't match
271
- if (!domain) {
272
- continue;
273
- }
274
- // If domain is provided but doesn't match the route's domains, skip
275
- if (!this.matchRouteDomain(route, domain)) {
276
- continue;
277
- }
278
- }
279
- // If route has no domain restrictions, it matches all domains
280
- // If skipDomainCheck is true, we skip domain validation for HTTP connections
281
- // Check path match if specified in both route and request
282
- if (path && route.match.path) {
283
- if (!this.matchPath(route.match.path, path)) {
284
- continue;
285
- }
286
- }
287
- // Check client IP match
288
- if (route.match.clientIp && !route.match.clientIp.some(pattern => this.matchIpPattern(pattern, clientIp))) {
289
- continue;
290
- }
291
- // Check TLS version match
292
- if (tlsVersion && route.match.tlsVersion &&
293
- !route.match.tlsVersion.includes(tlsVersion)) {
294
- continue;
295
- }
296
- // All checks passed, this route matches
297
- // NOTE: Security is checked AFTER route matching in route-connection-handler.ts
298
- return { route };
299
- }
300
- return null;
301
- }
302
- /**
303
- * Match a path against a pattern
304
- */
305
- matchPath(pattern, path) {
306
- // Convert the glob pattern to a regex
307
- const regexPattern = pattern
308
- .replace(/\./g, '\\.') // Escape dots
309
- .replace(/\*/g, '.*') // Convert * to .*
310
- .replace(/\//g, '\\/'); // Escape slashes
311
- const regex = new RegExp(`^${regexPattern}$`);
312
- return regex.test(path);
313
- }
314
- /**
315
- * Domain-based configuration methods have been removed
316
- * as part of the migration to pure route-based configuration
317
- */
318
- /**
319
- * Validate the route configuration and return any warnings
320
- */
321
- validateConfiguration() {
322
- const warnings = [];
323
- const duplicatePorts = new Map();
324
- // Check for routes with the same exact match criteria
325
- for (let i = 0; i < this.routes.length; i++) {
326
- for (let j = i + 1; j < this.routes.length; j++) {
327
- const route1 = this.routes[i];
328
- const route2 = this.routes[j];
329
- // Check if route match criteria are the same
330
- if (this.areMatchesSimilar(route1.match, route2.match)) {
331
- warnings.push(`Routes "${route1.name || i}" and "${route2.name || j}" have similar match criteria. ` +
332
- `The route with higher priority (${Math.max(route1.priority || 0, route2.priority || 0)}) will be used.`);
333
- }
334
- }
335
- }
336
- // Check for routes that may never be matched due to priority
337
- for (let i = 0; i < this.routes.length; i++) {
338
- const route = this.routes[i];
339
- const higherPriorityRoutes = this.routes.filter(r => (r.priority || 0) > (route.priority || 0));
340
- for (const higherRoute of higherPriorityRoutes) {
341
- if (this.isRouteShadowed(route, higherRoute)) {
342
- warnings.push(`Route "${route.name || i}" may never be matched because it is shadowed by ` +
343
- `higher priority route "${higherRoute.name || 'unnamed'}"`);
344
- break;
345
- }
346
- }
347
- }
348
- return warnings;
349
- }
350
- /**
351
- * Check if two route matches are similar (potential conflict)
352
- */
353
- areMatchesSimilar(match1, match2) {
354
- // Check port overlap
355
- const ports1 = new Set(this.expandPortRange(match1.ports));
356
- const ports2 = new Set(this.expandPortRange(match2.ports));
357
- let havePortOverlap = false;
358
- for (const port of ports1) {
359
- if (ports2.has(port)) {
360
- havePortOverlap = true;
361
- break;
362
- }
363
- }
364
- if (!havePortOverlap) {
365
- return false;
366
- }
367
- // Check domain overlap
368
- if (match1.domains && match2.domains) {
369
- const domains1 = Array.isArray(match1.domains) ? match1.domains : [match1.domains];
370
- const domains2 = Array.isArray(match2.domains) ? match2.domains : [match2.domains];
371
- // Check if any domain pattern from match1 could match any from match2
372
- let haveDomainOverlap = false;
373
- for (const domain1 of domains1) {
374
- for (const domain2 of domains2) {
375
- if (domain1 === domain2 ||
376
- (domain1.includes('*') || domain2.includes('*'))) {
377
- haveDomainOverlap = true;
378
- break;
379
- }
380
- }
381
- if (haveDomainOverlap)
382
- break;
383
- }
384
- if (!haveDomainOverlap) {
385
- return false;
386
- }
387
- }
388
- else if (match1.domains || match2.domains) {
389
- // One has domains, the other doesn't - they could overlap
390
- // The one with domains is more specific, so it's not exactly a conflict
391
- return false;
392
- }
393
- // Check path overlap
394
- if (match1.path && match2.path) {
395
- // This is a simplified check - in a real implementation,
396
- // you'd need to check if the path patterns could match the same paths
397
- return match1.path === match2.path ||
398
- match1.path.includes('*') ||
399
- match2.path.includes('*');
400
- }
401
- else if (match1.path || match2.path) {
402
- // One has a path, the other doesn't
403
- return false;
404
- }
405
- // If we get here, the matches have significant overlap
406
- return true;
407
- }
408
- /**
409
- * Check if a route is completely shadowed by a higher priority route
410
- */
411
- isRouteShadowed(route, higherPriorityRoute) {
412
- // If they don't have similar match criteria, no shadowing occurs
413
- if (!this.areMatchesSimilar(route.match, higherPriorityRoute.match)) {
414
- return false;
415
- }
416
- // If higher priority route has more specific criteria, no shadowing
417
- if (this.isRouteMoreSpecific(higherPriorityRoute.match, route.match)) {
418
- return false;
419
- }
420
- // If higher priority route is equally or less specific but has higher priority,
421
- // it shadows the lower priority route
422
- return true;
423
- }
424
- /**
425
- * Check if route1 is more specific than route2
426
- */
427
- isRouteMoreSpecific(match1, match2) {
428
- // Check if match1 has more specific criteria
429
- let match1Points = 0;
430
- let match2Points = 0;
431
- // Path is the most specific
432
- if (match1.path)
433
- match1Points += 3;
434
- if (match2.path)
435
- match2Points += 3;
436
- // Domain is next most specific
437
- if (match1.domains)
438
- match1Points += 2;
439
- if (match2.domains)
440
- match2Points += 2;
441
- // Client IP and TLS version are least specific
442
- if (match1.clientIp)
443
- match1Points += 1;
444
- if (match2.clientIp)
445
- match2Points += 1;
446
- if (match1.tlsVersion)
447
- match1Points += 1;
448
- if (match2.tlsVersion)
449
- match2Points += 1;
450
- return match1Points > match2Points;
451
- }
452
- }
453
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"route-manager.js","sourceRoot":"","sources":["../../../ts/proxies/smart-proxy/route-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,kBAAkB,CAAC;AAoB5C;;GAEG;AACH,MAAM,OAAO,YAAa,SAAQ,OAAO,CAAC,YAAY;IAKpD,YAAY,OAA2B;QACrC,KAAK,EAAE,CAAC;QALF,WAAM,GAAmB,EAAE,CAAC;QAC5B,YAAO,GAAgC,IAAI,GAAG,EAAE,CAAC;QAiIzD;;WAEG;QACK,mBAAc,GAA0B,IAAI,GAAG,EAAE,CAAC;QA9HxD,gBAAgB;QAChB,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QAEvB,uCAAuC;QACvC,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACI,YAAY,CAAC,SAAyB,EAAE;QAC7C,yCAAyC;QACzC,IAAI,CAAC,MAAM,GAAG,CAAC,GAAG,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAC9C,MAAM,SAAS,GAAG,CAAC,CAAC,QAAQ,IAAI,CAAC,CAAC;YAClC,MAAM,SAAS,GAAG,CAAC,CAAC,QAAQ,IAAI,CAAC,CAAC;YAClC,OAAO,SAAS,GAAG,SAAS,CAAC;QAC/B,CAAC,CAAC,CAAC;QAEH,wCAAwC;QACxC,IAAI,CAAC,cAAc,EAAE,CAAC;IACxB,CAAC;IAED;;;OAGG;IACK,cAAc;QACpB,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC;QACrB,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC,CAAC,8BAA8B;QAE3D,0BAA0B;QAC1B,MAAM,eAAe,GAAG,IAAI,GAAG,EAAoB,CAAC;QAEpD,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChC,MAAM,KAAK,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YAEtD,8BAA8B;YAC9B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvB,OAAO,CAAC,IAAI,CAAC,SAAS,KAAK,CAAC,IAAI,IAAI,SAAS,kCAAkC,CAAC,CAAC;gBACjF,SAAS;YACX,CAAC;YAED,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;gBACzB,6BAA6B;gBAC7B,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC5B,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;gBAC7B,CAAC;gBACD,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;gBAEpC,8BAA8B;gBAC9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC/B,eAAe,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;gBAChC,CAAC;gBACD,eAAe,CAAC,GAAG,CAAC,IAAI,CAAE,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,IAAI,SAAS,CAAC,CAAC;YAC3D,CAAC;QACH,CAAC;QAED,kCAAkC;QAClC,MAAM,UAAU,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACrC,MAAM,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC;QACvC,OAAO,CAAC,GAAG,CAAC,iCAAiC,WAAW,kBAAkB,UAAU,QAAQ,CAAC,CAAC;QAE9F,kDAAkD;QAClD,MAAM,qBAAqB,GAAG,IAAI,CAAC,OAAO,CAAC,qBAAqB,CAAC;QACjE,IAAI,qBAAqB,EAAE,CAAC;YAC1B,KAAK,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC,IAAI,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,EAAE,CAAC;gBACpD,OAAO,CAAC,GAAG,CAAC,QAAQ,IAAI,KAAK,MAAM,CAAC,MAAM,YAAY,eAAe,CAAC,GAAG,CAAC,IAAI,CAAE,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;YAClG,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,SAAqB;QAC1C,wCAAwC;QACxC,IAAI,OAAO,SAAS,KAAK,QAAQ,EAAE,CAAC;YAClC,OAAO,CAAC,SAAS,CAAC,CAAC;QACrB,CAAC;QAED,yCAAyC;QACzC,MAAM,QAAQ,GAAG,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC;QAE3C,mCAAmC;QACnC,IAAI,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,QAAQ,CAAE,CAAC;QAC5C,CAAC;QAED,yBAAyB;QACzB,IAAI,MAAM,GAAa,EAAE,CAAC;QAE1B,IAAI,KAAK,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE,CAAC;YAC7B,0CAA0C;YAC1C,MAAM,GAAG,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE;gBAChC,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;oBAC7B,OAAO,CAAC,IAAI,CAAC,CAAC;gBAChB,CAAC;qBAAM,IAAI,OAAO,IAAI,KAAK,QAAQ,IAAI,MAAM,IAAI,IAAI,IAAI,IAAI,IAAI,IAAI,EAAE,CAAC;oBACtE,+CAA+C;oBAC/C,IAAI,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;wBACxB,OAAO,CAAC,IAAI,CAAC,6BAA6B,IAAI,CAAC,IAAI,WAAW,IAAI,CAAC,EAAE,GAAG,CAAC,CAAC;wBAC1E,OAAO,EAAE,CAAC;oBACZ,CAAC;oBAED,2BAA2B;oBAC3B,MAAM,KAAK,GAAa,EAAE,CAAC;oBAC3B,KAAK,IAAI,CAAC,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC,IAAI,IAAI,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;wBAC1C,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;oBAChB,CAAC;oBACD,OAAO,KAAK,CAAC;gBACf,CAAC;gBACD,OAAO,EAAE,CAAC;YACZ,CAAC,CAAC,CAAC;QACL,CAAC;QAED,mBAAmB;QACnB,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;QAE1C,OAAO,MAAM,CAAC;IAChB,CAAC;IAOD;;;OAGG;IACI,iBAAiB;QACtB,iDAAiD;QACjD,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;IACzC,CAAC;IAED;;OAEG;IACI,gBAAgB,CAAC,IAAY;QAClC,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC;IACtC,CAAC;IAED;;OAEG;IACI,YAAY;QACjB,OAAO,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;IAC1B,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,OAAe,EAAE,MAAc;QACjD,gCAAgC;QAChC,MAAM,YAAY,GAAG,OAAO;aACzB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAI,cAAc;aACvC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC,CAAI,kBAAkB;QAE9C,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,IAAI,YAAY,GAAG,EAAE,GAAG,CAAC,CAAC;QACnD,OAAO,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAC5B,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,KAAmB,EAAE,MAAc;QAC1D,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YACzB,6CAA6C;YAC7C,OAAO,IAAI,CAAC;QACd,CAAC;QAED,MAAM,QAAQ,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;YACjD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;YACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QAE1B,OAAO,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC,CAAC;IACrE,CAAC;IAED;;;OAGG;IACK,iBAAiB,CAAC,KAAmB,EAAE,QAAgB;QAC7D,MAAM,QAAQ,GAAG,KAAK,CAAC,QAAQ,CAAC;QAEhC,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,OAAO,IAAI,CAAC,CAAC,qCAAqC;QACpD,CAAC;QAED,0BAA0B;QAC1B,IAAI,QAAQ,CAAC,WAAW,IAAI,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC5D,KAAK,MAAM,OAAO,IAAI,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC3C,IAAI,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,CAAC;oBAC3C,OAAO,KAAK,CAAC,CAAC,gBAAgB;gBAChC,CAAC;YACH,CAAC;QACH,CAAC;QAED,uCAAuC;QACvC,IAAI,QAAQ,CAAC,WAAW,IAAI,QAAQ,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC5D,KAAK,MAAM,OAAO,IAAI,QAAQ,CAAC,WAAW,EAAE,CAAC;gBAC3C,IAAI,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,CAAC;oBAC3C,OAAO,IAAI,CAAC,CAAC,gBAAgB;gBAC/B,CAAC;YACH,CAAC;YACD,OAAO,KAAK,CAAC,CAAC,yBAAyB;QACzC,CAAC;QAED,6CAA6C;QAC7C,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,OAAe,EAAE,EAAU;QAChD,uCAAuC;QACvC,MAAM,YAAY,GAAG,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QACrE,MAAM,iBAAiB,GAAG,OAAO,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC;QAEzF,+CAA+C;QAC/C,IAAI,OAAO,KAAK,EAAE,IAAI,iBAAiB,KAAK,YAAY;YACpD,OAAO,KAAK,YAAY,IAAI,iBAAiB,KAAK,EAAE,EAAE,CAAC;YACzD,OAAO,IAAI,CAAC;QACd,CAAC;QAED,8CAA8C;QAC9C,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC1B,OAAO,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,YAAY,CAAC;gBACvC,CAAC,iBAAiB,KAAK,OAAO,IAAI,IAAI,CAAC,WAAW,CAAC,iBAAiB,EAAE,YAAY,CAAC,CAAC,CAAC;QAC9F,CAAC;QAED,0CAA0C;QAC1C,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,YAAY,GAAG,OAAO,CAAC,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;YACxE,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,IAAI,YAAY,GAAG,CAAC,CAAC;YAC9C,IAAI,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC;gBAC/C,OAAO,IAAI,CAAC;YACd,CAAC;YAED,+DAA+D;YAC/D,IAAI,iBAAiB,KAAK,OAAO,EAAE,CAAC;gBAClC,MAAM,sBAAsB,GAAG,iBAAiB,CAAC,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBAC5F,MAAM,eAAe,GAAG,IAAI,MAAM,CAAC,IAAI,sBAAsB,GAAG,CAAC,CAAC;gBAClE,OAAO,eAAe,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,eAAe,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACxE,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAAY,EAAE,EAAU;QAC1C,IAAI,CAAC;YACH,0DAA0D;YAC1D,sCAAsC;YACtC,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,IAAI,GAAG,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;YAEhC,uCAAuC;YACvC,MAAM,YAAY,GAAG,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;YACrE,MAAM,gBAAgB,GAAG,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC;YAErF,yCAAyC;YACzC,MAAM,KAAK,GAAG,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;YAC5C,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,CAAC;YAEpD,wBAAwB;YACxB,MAAM,OAAO,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;YAExC,2BAA2B;YAC3B,OAAO,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,SAAS,GAAG,OAAO,CAAC,CAAC;QACrD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,OAAO,CAAC,KAAK,CAAC,qBAAqB,EAAE,iBAAiB,IAAI,GAAG,EAAE,CAAC,CAAC,CAAC;YAClE,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;OAEG;IACK,UAAU,CAAC,EAAU;QAC3B,uCAAuC;QACvC,MAAM,YAAY,GAAG,EAAE,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAErE,MAAM,KAAK,GAAG,YAAY,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;QACtE,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;IAC1E,CAAC;IAED;;OAEG;IACI,iBAAiB,CAAC,OAOxB;QACC,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,IAAI,EAAE,UAAU,EAAE,eAAe,EAAE,GAAG,OAAO,CAAC;QAE9E,+BAA+B;QAC/B,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAElD,wDAAwD;QACxD,KAAK,MAAM,KAAK,IAAI,aAAa,EAAE,CAAC;YAClC,qBAAqB;YACrB,qEAAqE;YACrE,IAAI,KAAK,CAAC,KAAK,CAAC,OAAO,IAAI,CAAC,eAAe,EAAE,CAAC;gBAC5C,0EAA0E;gBAC1E,IAAI,CAAC,MAAM,EAAE,CAAC;oBACZ,SAAS;gBACX,CAAC;gBACD,oEAAoE;gBACpE,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,MAAM,CAAC,EAAE,CAAC;oBAC1C,SAAS;gBACX,CAAC;YACH,CAAC;YACD,8DAA8D;YAC9D,6EAA6E;YAE7E,0DAA0D;YAC1D,IAAI,IAAI,IAAI,KAAK,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC;gBAC7B,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,CAAC;oBAC5C,SAAS;gBACX,CAAC;YACH,CAAC;YAED,wBAAwB;YACxB,IAAI,KAAK,CAAC,KAAK,CAAC,QAAQ,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAC/D,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC,EAAE,CAAC;gBAC1C,SAAS;YACX,CAAC;YAED,0BAA0B;YAC1B,IAAI,UAAU,IAAI,KAAK,CAAC,KAAK,CAAC,UAAU;gBACpC,CAAC,KAAK,CAAC,KAAK,CAAC,UAAU,CAAC,QAAQ,CAAC,UAAU,CAAC,EAAE,CAAC;gBACjD,SAAS;YACX,CAAC;YAED,wCAAwC;YACxC,gFAAgF;YAChF,OAAO,EAAE,KAAK,EAAE,CAAC;QACnB,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,SAAS,CAAC,OAAe,EAAE,IAAY;QAC7C,sCAAsC;QACtC,MAAM,YAAY,GAAG,OAAO;aACzB,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAI,cAAc;aACvC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAK,kBAAkB;aAC3C,OAAO,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC,CAAG,iBAAiB;QAE7C,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,IAAI,YAAY,GAAG,CAAC,CAAC;QAC9C,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED;;;OAGG;IAEH;;OAEG;IACI,qBAAqB;QAC1B,MAAM,QAAQ,GAAa,EAAE,CAAC;QAC9B,MAAM,cAAc,GAAG,IAAI,GAAG,EAAkB,CAAC;QAEjD,sDAAsD;QACtD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YAC5C,KAAK,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBAChD,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC9B,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;gBAE9B,6CAA6C;gBAC7C,IAAI,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;oBACvD,QAAQ,CAAC,IAAI,CACX,WAAW,MAAM,CAAC,IAAI,IAAI,CAAC,UAAU,MAAM,CAAC,IAAI,IAAI,CAAC,iCAAiC;wBACtF,mCAAmC,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,IAAI,CAAC,EAAE,MAAM,CAAC,QAAQ,IAAI,CAAC,CAAC,iBAAiB,CACzG,CAAC;gBACJ,CAAC;YACH,CAAC;QACH,CAAC;QAED,6DAA6D;QAC7D,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YAC5C,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;YAC7B,MAAM,oBAAoB,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAClD,CAAC,CAAC,CAAC,QAAQ,IAAI,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,QAAQ,IAAI,CAAC,CAAC,CAAC,CAAC;YAE7C,KAAK,MAAM,WAAW,IAAI,oBAAoB,EAAE,CAAC;gBAC/C,IAAI,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,WAAW,CAAC,EAAE,CAAC;oBAC7C,QAAQ,CAAC,IAAI,CACX,UAAU,KAAK,CAAC,IAAI,IAAI,CAAC,mDAAmD;wBAC5E,0BAA0B,WAAW,CAAC,IAAI,IAAI,SAAS,GAAG,CAC3D,CAAC;oBACF,MAAM;gBACR,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,QAAQ,CAAC;IAClB,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,MAAmB,EAAE,MAAmB;QAChE,qBAAqB;QACrB,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC;QAC3D,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC;QAE3D,IAAI,eAAe,GAAG,KAAK,CAAC;QAC5B,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;YAC1B,IAAI,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrB,eAAe,GAAG,IAAI,CAAC;gBACvB,MAAM;YACR,CAAC;QACH,CAAC;QAED,IAAI,CAAC,eAAe,EAAE,CAAC;YACrB,OAAO,KAAK,CAAC;QACf,CAAC;QAED,uBAAuB;QACvB,IAAI,MAAM,CAAC,OAAO,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;YACrC,MAAM,QAAQ,GAAG,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;YACnF,MAAM,QAAQ,GAAG,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;YAEnF,sEAAsE;YACtE,IAAI,iBAAiB,GAAG,KAAK,CAAC;YAC9B,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;gBAC/B,KAAK,MAAM,OAAO,IAAI,QAAQ,EAAE,CAAC;oBAC/B,IAAI,OAAO,KAAK,OAAO;wBACnB,CAAC,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;wBACrD,iBAAiB,GAAG,IAAI,CAAC;wBACzB,MAAM;oBACR,CAAC;gBACH,CAAC;gBACD,IAAI,iBAAiB;oBAAE,MAAM;YAC/B,CAAC;YAED,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;aAAM,IAAI,MAAM,CAAC,OAAO,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;YAC5C,0DAA0D;YAC1D,wEAAwE;YACxE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,qBAAqB;QACrB,IAAI,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC;YAC/B,yDAAyD;YACzD,sEAAsE;YACtE,OAAO,MAAM,CAAC,IAAI,KAAK,MAAM,CAAC,IAAI;gBAC3B,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC;gBACzB,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;QACnC,CAAC;aAAM,IAAI,MAAM,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC;YACtC,oCAAoC;YACpC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,uDAAuD;QACvD,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,eAAe,CAAC,KAAmB,EAAE,mBAAiC;QAC5E,iEAAiE;QACjE,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,KAAK,CAAC,KAAK,EAAE,mBAAmB,CAAC,KAAK,CAAC,EAAE,CAAC;YACpE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,oEAAoE;QACpE,IAAI,IAAI,CAAC,mBAAmB,CAAC,mBAAmB,CAAC,KAAK,EAAE,KAAK,CAAC,KAAK,CAAC,EAAE,CAAC;YACrE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,gFAAgF;QAChF,sCAAsC;QACtC,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,mBAAmB,CAAC,MAAmB,EAAE,MAAmB;QAClE,6CAA6C;QAC7C,IAAI,YAAY,GAAG,CAAC,CAAC;QACrB,IAAI,YAAY,GAAG,CAAC,CAAC;QAErB,4BAA4B;QAC5B,IAAI,MAAM,CAAC,IAAI;YAAE,YAAY,IAAI,CAAC,CAAC;QACnC,IAAI,MAAM,CAAC,IAAI;YAAE,YAAY,IAAI,CAAC,CAAC;QAEnC,+BAA+B;QAC/B,IAAI,MAAM,CAAC,OAAO;YAAE,YAAY,IAAI,CAAC,CAAC;QACtC,IAAI,MAAM,CAAC,OAAO;YAAE,YAAY,IAAI,CAAC,CAAC;QAEtC,+CAA+C;QAC/C,IAAI,MAAM,CAAC,QAAQ;YAAE,YAAY,IAAI,CAAC,CAAC;QACvC,IAAI,MAAM,CAAC,QAAQ;YAAE,YAAY,IAAI,CAAC,CAAC;QAEvC,IAAI,MAAM,CAAC,UAAU;YAAE,YAAY,IAAI,CAAC,CAAC;QACzC,IAAI,MAAM,CAAC,UAAU;YAAE,YAAY,IAAI,CAAC,CAAC;QAEzC,OAAO,YAAY,GAAG,YAAY,CAAC;IACrC,CAAC;CACF"}
@@ -1,56 +0,0 @@
1
- import type { IRouteConfig } from './models/route-types.js';
2
- import type { ILogger } from '../http-proxy/models/types.js';
3
- import type { PortManager } from './port-manager.js';
4
- import type { SharedRouteManager as RouteManager } from '../../core/routing/route-manager.js';
5
- import type { HttpProxyBridge } from './http-proxy-bridge.js';
6
- import type { NFTablesManager } from './nftables-manager.js';
7
- import type { SmartCertManager } from './certificate-manager.js';
8
- /**
9
- * Orchestrates route updates and coordination between components
10
- * Extracted from SmartProxy to reduce class complexity
11
- */
12
- export declare class RouteOrchestrator {
13
- private routeUpdateLock;
14
- private portManager;
15
- private routeManager;
16
- private httpProxyBridge;
17
- private nftablesManager;
18
- private certManager;
19
- private logger;
20
- constructor(portManager: PortManager, routeManager: RouteManager, httpProxyBridge: HttpProxyBridge, nftablesManager: NFTablesManager, certManager: SmartCertManager | null, logger: ILogger);
21
- /**
22
- * Set or update certificate manager reference
23
- */
24
- setCertManager(certManager: SmartCertManager | null): void;
25
- /**
26
- * Get certificate manager reference
27
- */
28
- getCertManager(): SmartCertManager | null;
29
- /**
30
- * Update routes with validation and coordination
31
- */
32
- updateRoutes(oldRoutes: IRouteConfig[], newRoutes: IRouteConfig[], options?: {
33
- acmePort?: number;
34
- acmeOptions?: any;
35
- acmeState?: any;
36
- globalChallengeRouteActive?: boolean;
37
- createCertificateManager?: (routes: IRouteConfig[], certStore: string, acmeOptions?: any, initialState?: any) => Promise<SmartCertManager>;
38
- verifyChallengeRouteRemoved?: () => Promise<void>;
39
- }): Promise<{
40
- portUsageMap: Map<number, Set<string>>;
41
- newChallengeRouteActive: boolean;
42
- newCertManager?: SmartCertManager;
43
- }>;
44
- /**
45
- * Update port usage map based on the provided routes
46
- */
47
- updatePortUsageMap(routes: IRouteConfig[]): Map<number, Set<string>>;
48
- /**
49
- * Find ports that have no routes in the new configuration
50
- */
51
- private findOrphanedPorts;
52
- /**
53
- * Update NFTables routes
54
- */
55
- private updateNfTablesRoutes;
56
- }