@push.rocks/smartproxy 3.10.4 → 3.11.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,7 +3,7 @@
3
3
  */
4
4
  export const commitinfo = {
5
5
  name: '@push.rocks/smartproxy',
6
- version: '3.10.4',
6
+ version: '3.11.0',
7
7
  description: 'a proxy for handling high workloads of proxying'
8
8
  };
9
9
  //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiMDBfY29tbWl0aW5mb19kYXRhLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vdHMvMDBfY29tbWl0aW5mb19kYXRhLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHO0FBQ0gsTUFBTSxDQUFDLE1BQU0sVUFBVSxHQUFHO0lBQ3hCLElBQUksRUFBRSx3QkFBd0I7SUFDOUIsT0FBTyxFQUFFLFFBQVE7SUFDakIsV0FBVyxFQUFFLGlEQUFpRDtDQUMvRCxDQUFBIn0=
@@ -0,0 +1,31 @@
1
+ import * as plugins from './plugins.js';
2
+ import { ProxyRouter } from './classes.router.js';
3
+ export interface INetworkProxyOptions {
4
+ port: number;
5
+ }
6
+ export declare class NetworkProxy {
7
+ options: INetworkProxyOptions;
8
+ proxyConfigs: plugins.tsclass.network.IReverseProxyConfig[];
9
+ httpsServer: plugins.https.Server;
10
+ router: ProxyRouter;
11
+ socketMap: plugins.lik.ObjectMap<plugins.net.Socket>;
12
+ defaultHeaders: {
13
+ [key: string]: string;
14
+ };
15
+ heartbeatInterval: NodeJS.Timeout;
16
+ private defaultCertificates;
17
+ alreadyAddedReverseConfigs: {
18
+ [hostName: string]: plugins.tsclass.network.IReverseProxyConfig;
19
+ };
20
+ constructor(optionsArg: INetworkProxyOptions);
21
+ start(): Promise<void>;
22
+ /**
23
+ * Internal async handler for processing HTTP/HTTPS requests.
24
+ */
25
+ private handleRequest;
26
+ updateProxyConfigs(proxyConfigsArg: plugins.tsclass.network.IReverseProxyConfig[]): Promise<void>;
27
+ addDefaultHeaders(headersArg: {
28
+ [key: string]: string;
29
+ }): Promise<void>;
30
+ stop(): Promise<void>;
31
+ }
@@ -0,0 +1,305 @@
1
+ import * as plugins from './plugins.js';
2
+ import { ProxyRouter } from './classes.router.js';
3
+ import * as fs from 'fs';
4
+ import * as path from 'path';
5
+ import { fileURLToPath } from 'url';
6
+ export class NetworkProxy {
7
+ constructor(optionsArg) {
8
+ this.proxyConfigs = [];
9
+ this.router = new ProxyRouter();
10
+ this.socketMap = new plugins.lik.ObjectMap();
11
+ this.defaultHeaders = {};
12
+ this.alreadyAddedReverseConfigs = {};
13
+ this.options = optionsArg;
14
+ const __dirname = path.dirname(fileURLToPath(import.meta.url));
15
+ const certPath = path.join(__dirname, '..', 'assets', 'certs');
16
+ try {
17
+ this.defaultCertificates = {
18
+ key: fs.readFileSync(path.join(certPath, 'key.pem'), 'utf8'),
19
+ cert: fs.readFileSync(path.join(certPath, 'cert.pem'), 'utf8')
20
+ };
21
+ }
22
+ catch (error) {
23
+ console.error('Error loading certificates:', error);
24
+ throw error;
25
+ }
26
+ }
27
+ async start() {
28
+ // Instead of marking the callback async (which Node won't await),
29
+ // we call our async handler and catch errors.
30
+ this.httpsServer = plugins.https.createServer({
31
+ key: this.defaultCertificates.key,
32
+ cert: this.defaultCertificates.cert
33
+ }, (originRequest, originResponse) => {
34
+ this.handleRequest(originRequest, originResponse).catch((error) => {
35
+ console.error('Unhandled error in request handler:', error);
36
+ try {
37
+ originResponse.end();
38
+ }
39
+ catch (err) {
40
+ // ignore errors during cleanup
41
+ }
42
+ });
43
+ });
44
+ // Enable websockets
45
+ const wsServer = new plugins.ws.WebSocketServer({ server: this.httpsServer });
46
+ // Set up the heartbeat interval
47
+ this.heartbeatInterval = setInterval(() => {
48
+ wsServer.clients.forEach((ws) => {
49
+ const wsIncoming = ws;
50
+ if (!wsIncoming.lastPong) {
51
+ wsIncoming.lastPong = Date.now();
52
+ }
53
+ if (Date.now() - wsIncoming.lastPong > 5 * 60 * 1000) {
54
+ console.log('Terminating websocket due to missing pong for 5 minutes.');
55
+ wsIncoming.terminate();
56
+ }
57
+ else {
58
+ wsIncoming.ping();
59
+ }
60
+ });
61
+ }, 60000); // runs every 1 minute
62
+ wsServer.on('connection', (wsIncoming, reqArg) => {
63
+ console.log(`wss proxy: got connection for wsc for https://${reqArg.headers.host}${reqArg.url}`);
64
+ wsIncoming.lastPong = Date.now();
65
+ wsIncoming.on('pong', () => {
66
+ wsIncoming.lastPong = Date.now();
67
+ });
68
+ let wsOutgoing;
69
+ const outGoingDeferred = plugins.smartpromise.defer();
70
+ // --- Improvement 2: Only call routeReq once ---
71
+ const wsDestinationConfig = this.router.routeReq(reqArg);
72
+ if (!wsDestinationConfig) {
73
+ wsIncoming.terminate();
74
+ return;
75
+ }
76
+ try {
77
+ wsOutgoing = new plugins.wsDefault(`ws://${wsDestinationConfig.destinationIp}:${wsDestinationConfig.destinationPort}${reqArg.url}`);
78
+ console.log('wss proxy: initiated outgoing proxy');
79
+ wsOutgoing.on('open', async () => {
80
+ outGoingDeferred.resolve();
81
+ });
82
+ }
83
+ catch (err) {
84
+ console.error('Error initiating outgoing WebSocket:', err);
85
+ wsIncoming.terminate();
86
+ return;
87
+ }
88
+ wsIncoming.on('message', async (message, isBinary) => {
89
+ try {
90
+ await outGoingDeferred.promise;
91
+ wsOutgoing.send(message, { binary: isBinary });
92
+ }
93
+ catch (error) {
94
+ console.error('Error sending message to wsOutgoing:', error);
95
+ }
96
+ });
97
+ wsOutgoing.on('message', async (message, isBinary) => {
98
+ try {
99
+ wsIncoming.send(message, { binary: isBinary });
100
+ }
101
+ catch (error) {
102
+ console.error('Error sending message to wsIncoming:', error);
103
+ }
104
+ });
105
+ const terminateWsOutgoing = () => {
106
+ if (wsOutgoing) {
107
+ wsOutgoing.terminate();
108
+ console.log('Terminated outgoing ws.');
109
+ }
110
+ };
111
+ wsIncoming.on('error', terminateWsOutgoing);
112
+ wsIncoming.on('close', terminateWsOutgoing);
113
+ const terminateWsIncoming = () => {
114
+ if (wsIncoming) {
115
+ wsIncoming.terminate();
116
+ console.log('Terminated incoming ws.');
117
+ }
118
+ };
119
+ wsOutgoing.on('error', terminateWsIncoming);
120
+ wsOutgoing.on('close', terminateWsIncoming);
121
+ });
122
+ this.httpsServer.keepAliveTimeout = 600 * 1000;
123
+ this.httpsServer.headersTimeout = 600 * 1000;
124
+ this.httpsServer.on('connection', (connection) => {
125
+ this.socketMap.add(connection);
126
+ console.log(`Added connection. Now ${this.socketMap.getArray().length} sockets connected.`);
127
+ const cleanupConnection = () => {
128
+ if (this.socketMap.checkForObject(connection)) {
129
+ this.socketMap.remove(connection);
130
+ console.log(`Removed connection. ${this.socketMap.getArray().length} sockets remaining.`);
131
+ connection.destroy();
132
+ }
133
+ };
134
+ connection.on('close', cleanupConnection);
135
+ connection.on('error', cleanupConnection);
136
+ connection.on('end', cleanupConnection);
137
+ connection.on('timeout', cleanupConnection);
138
+ });
139
+ this.httpsServer.listen(this.options.port);
140
+ console.log(`NetworkProxy -> OK: now listening for new connections on port ${this.options.port}`);
141
+ }
142
+ /**
143
+ * Internal async handler for processing HTTP/HTTPS requests.
144
+ */
145
+ async handleRequest(originRequest, originResponse) {
146
+ const endOriginReqRes = (statusArg = 404, messageArg = 'This route is not available on this server.', headers = {}) => {
147
+ originResponse.writeHead(statusArg, messageArg);
148
+ originResponse.end(messageArg);
149
+ if (originRequest.socket !== originResponse.socket) {
150
+ console.log('hey, something is strange.');
151
+ }
152
+ originResponse.destroy();
153
+ };
154
+ console.log(`got request: ${originRequest.headers.host}${plugins.url.parse(originRequest.url).path}`);
155
+ const destinationConfig = this.router.routeReq(originRequest);
156
+ if (!destinationConfig) {
157
+ console.log(`${originRequest.headers.host} can't be routed properly. Terminating request.`);
158
+ endOriginReqRes();
159
+ return;
160
+ }
161
+ // authentication
162
+ if (destinationConfig.authentication) {
163
+ const authInfo = destinationConfig.authentication;
164
+ switch (authInfo.type) {
165
+ case 'Basic': {
166
+ const authHeader = originRequest.headers.authorization;
167
+ if (!authHeader) {
168
+ return endOriginReqRes(401, 'Authentication required', {
169
+ 'WWW-Authenticate': 'Basic realm="Access to the staging site", charset="UTF-8"',
170
+ });
171
+ }
172
+ if (!authHeader.includes('Basic ')) {
173
+ return endOriginReqRes(401, 'Authentication required', {
174
+ 'WWW-Authenticate': 'Basic realm="Access to the staging site", charset="UTF-8"',
175
+ });
176
+ }
177
+ const authStringBase64 = authHeader.replace('Basic ', '');
178
+ const authString = plugins.smartstring.base64.decode(authStringBase64);
179
+ const userPassArray = authString.split(':');
180
+ const user = userPassArray[0];
181
+ const pass = userPassArray[1];
182
+ if (user === authInfo.user && pass === authInfo.pass) {
183
+ console.log('Request successfully authenticated');
184
+ }
185
+ else {
186
+ return endOriginReqRes(403, 'Forbidden: Wrong credentials');
187
+ }
188
+ break;
189
+ }
190
+ default:
191
+ return endOriginReqRes(403, 'Forbidden: unsupported authentication method configured. Please report to the admin.');
192
+ }
193
+ }
194
+ let destinationUrl;
195
+ if (destinationConfig) {
196
+ destinationUrl = `http://${destinationConfig.destinationIp}:${destinationConfig.destinationPort}${originRequest.url}`;
197
+ }
198
+ else {
199
+ return endOriginReqRes();
200
+ }
201
+ console.log(destinationUrl);
202
+ try {
203
+ const proxyResponse = await plugins.smartrequest.request(destinationUrl, {
204
+ method: originRequest.method,
205
+ headers: {
206
+ ...originRequest.headers,
207
+ 'X-Forwarded-Host': originRequest.headers.host,
208
+ 'X-Forwarded-Proto': 'https',
209
+ },
210
+ keepAlive: true,
211
+ }, true, // streaming (keepAlive)
212
+ (proxyRequest) => {
213
+ originRequest.on('data', (data) => {
214
+ proxyRequest.write(data);
215
+ });
216
+ originRequest.on('end', () => {
217
+ proxyRequest.end();
218
+ });
219
+ originRequest.on('error', () => {
220
+ proxyRequest.end();
221
+ });
222
+ originRequest.on('close', () => {
223
+ proxyRequest.end();
224
+ });
225
+ originRequest.on('timeout', () => {
226
+ proxyRequest.end();
227
+ originRequest.destroy();
228
+ });
229
+ proxyRequest.on('error', () => {
230
+ endOriginReqRes();
231
+ });
232
+ });
233
+ originResponse.statusCode = proxyResponse.statusCode;
234
+ console.log(proxyResponse.statusCode);
235
+ for (const defaultHeader of Object.keys(this.defaultHeaders)) {
236
+ originResponse.setHeader(defaultHeader, this.defaultHeaders[defaultHeader]);
237
+ }
238
+ for (const header of Object.keys(proxyResponse.headers)) {
239
+ originResponse.setHeader(header, proxyResponse.headers[header]);
240
+ }
241
+ proxyResponse.on('data', (data) => {
242
+ originResponse.write(data);
243
+ });
244
+ proxyResponse.on('end', () => {
245
+ originResponse.end();
246
+ });
247
+ proxyResponse.on('error', () => {
248
+ originResponse.destroy();
249
+ });
250
+ proxyResponse.on('close', () => {
251
+ originResponse.end();
252
+ });
253
+ proxyResponse.on('timeout', () => {
254
+ originResponse.end();
255
+ originResponse.destroy();
256
+ });
257
+ }
258
+ catch (error) {
259
+ console.error('Error while processing request:', error);
260
+ endOriginReqRes(502, 'Bad Gateway: Error processing the request');
261
+ }
262
+ }
263
+ async updateProxyConfigs(proxyConfigsArg) {
264
+ console.log(`got new proxy configs`);
265
+ this.proxyConfigs = proxyConfigsArg;
266
+ this.router.setNewProxyConfigs(proxyConfigsArg);
267
+ for (const hostCandidate of this.proxyConfigs) {
268
+ const existingHostNameConfig = this.alreadyAddedReverseConfigs[hostCandidate.hostName];
269
+ if (!existingHostNameConfig) {
270
+ this.alreadyAddedReverseConfigs[hostCandidate.hostName] = hostCandidate;
271
+ }
272
+ else {
273
+ if (existingHostNameConfig.publicKey === hostCandidate.publicKey &&
274
+ existingHostNameConfig.privateKey === hostCandidate.privateKey) {
275
+ continue;
276
+ }
277
+ else {
278
+ this.alreadyAddedReverseConfigs[hostCandidate.hostName] = hostCandidate;
279
+ }
280
+ }
281
+ this.httpsServer.addContext(hostCandidate.hostName, {
282
+ cert: hostCandidate.publicKey,
283
+ key: hostCandidate.privateKey,
284
+ });
285
+ }
286
+ }
287
+ async addDefaultHeaders(headersArg) {
288
+ for (const headerKey of Object.keys(headersArg)) {
289
+ this.defaultHeaders[headerKey] = headersArg[headerKey];
290
+ }
291
+ }
292
+ async stop() {
293
+ const done = plugins.smartpromise.defer();
294
+ this.httpsServer.close(() => {
295
+ done.resolve();
296
+ });
297
+ for (const socket of this.socketMap.getArray()) {
298
+ socket.destroy();
299
+ }
300
+ await done.promise;
301
+ clearInterval(this.heartbeatInterval);
302
+ console.log('NetworkProxy -> OK: Server has been stopped and all connections closed.');
303
+ }
304
+ }
305
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.networkproxy.js","sourceRoot":"","sources":["../ts/classes.networkproxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,cAAc,CAAC;AACxC,OAAO,EAAE,WAAW,EAAE,MAAM,qBAAqB,CAAC;AAClD,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,EAAE,aAAa,EAAE,MAAM,KAAK,CAAC;AAUpC,MAAM,OAAO,YAAY;IAcvB,YAAY,UAAgC;QAZrC,iBAAY,GAAkD,EAAE,CAAC;QAEjE,WAAM,GAAG,IAAI,WAAW,EAAE,CAAC;QAC3B,cAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,EAAsB,CAAC;QAC5D,mBAAc,GAA8B,EAAE,CAAC;QAI/C,+BAA0B,GAE7B,EAAE,CAAC;QAGL,IAAI,CAAC,OAAO,GAAG,UAAU,CAAC;QAC1B,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;QAE/D,IAAI,CAAC;YACH,IAAI,CAAC,mBAAmB,GAAG;gBACzB,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,SAAS,CAAC,EAAE,MAAM,CAAC;gBAC5D,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,UAAU,CAAC,EAAE,MAAM,CAAC;aAC/D,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,6BAA6B,EAAE,KAAK,CAAC,CAAC;YACpD,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,KAAK;QAChB,kEAAkE;QAClE,8CAA8C;QAC9C,IAAI,CAAC,WAAW,GAAG,OAAO,CAAC,KAAK,CAAC,YAAY,CAC3C;YACE,GAAG,EAAE,IAAI,CAAC,mBAAmB,CAAC,GAAG;YACjC,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI;SACpC,EACD,CAAC,aAAa,EAAE,cAAc,EAAE,EAAE;YAChC,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE,cAAc,CAAC,CAAC,KAAK,CAAC,CAAC,KAAK,EAAE,EAAE;gBAChE,OAAO,CAAC,KAAK,CAAC,qCAAqC,EAAE,KAAK,CAAC,CAAC;gBAC5D,IAAI,CAAC;oBACH,cAAc,CAAC,GAAG,EAAE,CAAC;gBACvB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,+BAA+B;gBACjC,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,CACF,CAAC;QAEF,oBAAoB;QACpB,MAAM,QAAQ,GAAG,IAAI,OAAO,CAAC,EAAE,CAAC,eAAe,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;QAE9E,gCAAgC;QAChC,IAAI,CAAC,iBAAiB,GAAG,WAAW,CAAC,GAAG,EAAE;YACxC,QAAQ,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,EAAqB,EAAE,EAAE;gBACjD,MAAM,UAAU,GAAG,EAA6B,CAAC;gBACjD,IAAI,CAAC,UAAU,CAAC,QAAQ,EAAE,CAAC;oBACzB,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACnC,CAAC;gBACD,IAAI,IAAI,CAAC,GAAG,EAAE,GAAG,UAAU,CAAC,QAAQ,GAAG,CAAC,GAAG,EAAE,GAAG,IAAI,EAAE,CAAC;oBACrD,OAAO,CAAC,GAAG,CAAC,0DAA0D,CAAC,CAAC;oBACxE,UAAU,CAAC,SAAS,EAAE,CAAC;gBACzB,CAAC;qBAAM,CAAC;oBACN,UAAU,CAAC,IAAI,EAAE,CAAC;gBACpB,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,sBAAsB;QAEjC,QAAQ,CAAC,EAAE,CACT,YAAY,EACZ,CAAC,UAAmC,EAAE,MAAoC,EAAE,EAAE;YAC5E,OAAO,CAAC,GAAG,CACT,iDAAiD,MAAM,CAAC,OAAO,CAAC,IAAI,GAAG,MAAM,CAAC,GAAG,EAAE,CACpF,CAAC;YAEF,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACjC,UAAU,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE;gBACzB,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACnC,CAAC,CAAC,CAAC;YAEH,IAAI,UAA6B,CAAC;YAClC,MAAM,gBAAgB,GAAG,OAAO,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAEtD,iDAAiD;YACjD,MAAM,mBAAmB,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACzD,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,UAAU,CAAC,SAAS,EAAE,CAAC;gBACvB,OAAO;YACT,CAAC;YACD,IAAI,CAAC;gBACH,UAAU,GAAG,IAAI,OAAO,CAAC,SAAS,CAChC,QAAQ,mBAAmB,CAAC,aAAa,IAAI,mBAAmB,CAAC,eAAe,GAAG,MAAM,CAAC,GAAG,EAAE,CAChG,CAAC;gBACF,OAAO,CAAC,GAAG,CAAC,qCAAqC,CAAC,CAAC;gBACnD,UAAU,CAAC,EAAE,CAAC,MAAM,EAAE,KAAK,IAAI,EAAE;oBAC/B,gBAAgB,CAAC,OAAO,EAAE,CAAC;gBAC7B,CAAC,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,sCAAsC,EAAE,GAAG,CAAC,CAAC;gBAC3D,UAAU,CAAC,SAAS,EAAE,CAAC;gBACvB,OAAO;YACT,CAAC;YAED,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;gBACnD,IAAI,CAAC;oBACH,MAAM,gBAAgB,CAAC,OAAO,CAAC;oBAC/B,UAAU,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,CAAC;gBACjD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,sCAAsC,EAAE,KAAK,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;gBACnD,IAAI,CAAC;oBACH,UAAU,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,CAAC;gBACjD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,sCAAsC,EAAE,KAAK,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,MAAM,mBAAmB,GAAG,GAAG,EAAE;gBAC/B,IAAI,UAAU,EAAE,CAAC;oBACf,UAAU,CAAC,SAAS,EAAE,CAAC;oBACvB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;gBACzC,CAAC;YACH,CAAC,CAAC;YACF,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;YAC5C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;YAE5C,MAAM,mBAAmB,GAAG,GAAG,EAAE;gBAC/B,IAAI,UAAU,EAAE,CAAC;oBACf,UAAU,CAAC,SAAS,EAAE,CAAC;oBACvB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;gBACzC,CAAC;YACH,CAAC,CAAC;YACF,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;YAC5C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;QAC9C,CAAC,CACF,CAAC;QAEF,IAAI,CAAC,WAAW,CAAC,gBAAgB,GAAG,GAAG,GAAG,IAAI,CAAC;QAC/C,IAAI,CAAC,WAAW,CAAC,cAAc,GAAG,GAAG,GAAG,IAAI,CAAC;QAE7C,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,YAAY,EAAE,CAAC,UAA8B,EAAE,EAAE;YACnE,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YAC/B,OAAO,CAAC,GAAG,CAAC,yBAAyB,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,MAAM,qBAAqB,CAAC,CAAC;YAC5F,MAAM,iBAAiB,GAAG,GAAG,EAAE;gBAC7B,IAAI,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,UAAU,CAAC,EAAE,CAAC;oBAC9C,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;oBAClC,OAAO,CAAC,GAAG,CAAC,uBAAuB,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,MAAM,qBAAqB,CAAC,CAAC;oBAC1F,UAAU,CAAC,OAAO,EAAE,CAAC;gBACvB,CAAC;YACH,CAAC,CAAC;YACF,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,iBAAiB,CAAC,CAAC;YAC1C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,iBAAiB,CAAC,CAAC;YAC1C,UAAU,CAAC,EAAE,CAAC,KAAK,EAAE,iBAAiB,CAAC,CAAC;YACxC,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,iBAAiB,CAAC,CAAC;QAC9C,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAC3C,OAAO,CAAC,GAAG,CACT,iEAAiE,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CACrF,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,aAAa,CACzB,aAA2C,EAC3C,cAA2C;QAE3C,MAAM,eAAe,GAAG,CACtB,YAAoB,GAAG,EACvB,aAAqB,6CAA6C,EAClE,UAA4C,EAAE,EAC9C,EAAE;YACF,cAAc,CAAC,SAAS,CAAC,SAAS,EAAE,UAAU,CAAC,CAAC;YAChD,cAAc,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YAC/B,IAAI,aAAa,CAAC,MAAM,KAAK,cAAc,CAAC,MAAM,EAAE,CAAC;gBACnD,OAAO,CAAC,GAAG,CAAC,4BAA4B,CAAC,CAAC;YAC5C,CAAC;YACD,cAAc,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC,CAAC;QAEF,OAAO,CAAC,GAAG,CACT,gBAAgB,aAAa,CAAC,OAAO,CAAC,IAAI,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,CACzF,CAAC;QACF,MAAM,iBAAiB,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAE9D,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,GAAG,aAAa,CAAC,OAAO,CAAC,IAAI,iDAAiD,CAC/E,CAAC;YACF,eAAe,EAAE,CAAC;YAClB,OAAO;QACT,CAAC;QAED,iBAAiB;QACjB,IAAI,iBAAiB,CAAC,cAAc,EAAE,CAAC;YACrC,MAAM,QAAQ,GAAG,iBAAiB,CAAC,cAAc,CAAC;YAClD,QAAQ,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACtB,KAAK,OAAO,CAAC,CAAC,CAAC;oBACb,MAAM,UAAU,GAAG,aAAa,CAAC,OAAO,CAAC,aAAa,CAAC;oBACvD,IAAI,CAAC,UAAU,EAAE,CAAC;wBAChB,OAAO,eAAe,CAAC,GAAG,EAAE,yBAAyB,EAAE;4BACrD,kBAAkB,EAAE,2DAA2D;yBAChF,CAAC,CAAC;oBACL,CAAC;oBACD,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;wBACnC,OAAO,eAAe,CAAC,GAAG,EAAE,yBAAyB,EAAE;4BACrD,kBAAkB,EAAE,2DAA2D;yBAChF,CAAC,CAAC;oBACL,CAAC;oBACD,MAAM,gBAAgB,GAAG,UAAU,CAAC,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;oBAC1D,MAAM,UAAU,GAAW,OAAO,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC;oBAC/E,MAAM,aAAa,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBAC5C,MAAM,IAAI,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;oBAC9B,MAAM,IAAI,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;oBAC9B,IAAI,IAAI,KAAK,QAAQ,CAAC,IAAI,IAAI,IAAI,KAAK,QAAQ,CAAC,IAAI,EAAE,CAAC;wBACrD,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;oBACpD,CAAC;yBAAM,CAAC;wBACN,OAAO,eAAe,CAAC,GAAG,EAAE,8BAA8B,CAAC,CAAC;oBAC9D,CAAC;oBACD,MAAM;gBACR,CAAC;gBACD;oBACE,OAAO,eAAe,CACpB,GAAG,EACH,sFAAsF,CACvF,CAAC;YACN,CAAC;QACH,CAAC;QAED,IAAI,cAAsB,CAAC;QAC3B,IAAI,iBAAiB,EAAE,CAAC;YACtB,cAAc,GAAG,UAAU,iBAAiB,CAAC,aAAa,IAAI,iBAAiB,CAAC,eAAe,GAAG,aAAa,CAAC,GAAG,EAAE,CAAC;QACxH,CAAC;aAAM,CAAC;YACN,OAAO,eAAe,EAAE,CAAC;QAC3B,CAAC;QACD,OAAO,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,aAAa,GAAG,MAAM,OAAO,CAAC,YAAY,CAAC,OAAO,CACtD,cAAc,EACd;gBACE,MAAM,EAAE,aAAa,CAAC,MAAM;gBAC5B,OAAO,EAAE;oBACP,GAAG,aAAa,CAAC,OAAO;oBACxB,kBAAkB,EAAE,aAAa,CAAC,OAAO,CAAC,IAAI;oBAC9C,mBAAmB,EAAE,OAAO;iBAC7B;gBACD,SAAS,EAAE,IAAI;aAChB,EACD,IAAI,EAAE,wBAAwB;YAC9B,CAAC,YAAY,EAAE,EAAE;gBACf,aAAa,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE;oBAChC,YAAY,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;gBAC3B,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;oBAC3B,YAAY,CAAC,GAAG,EAAE,CAAC;gBACrB,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;oBAC7B,YAAY,CAAC,GAAG,EAAE,CAAC;gBACrB,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;oBAC7B,YAAY,CAAC,GAAG,EAAE,CAAC;gBACrB,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;oBAC/B,YAAY,CAAC,GAAG,EAAE,CAAC;oBACnB,aAAa,CAAC,OAAO,EAAE,CAAC;gBAC1B,CAAC,CAAC,CAAC;gBACH,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;oBAC5B,eAAe,EAAE,CAAC;gBACpB,CAAC,CAAC,CAAC;YACL,CAAC,CACF,CAAC;YACF,cAAc,CAAC,UAAU,GAAG,aAAa,CAAC,UAAU,CAAC;YACrD,OAAO,CAAC,GAAG,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;YACtC,KAAK,MAAM,aAAa,IAAI,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;gBAC7D,cAAc,CAAC,SAAS,CAAC,aAAa,EAAE,IAAI,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,CAAC;YAC9E,CAAC;YACD,KAAK,MAAM,MAAM,IAAI,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,EAAE,CAAC;gBACxD,cAAc,CAAC,SAAS,CAAC,MAAM,EAAE,aAAa,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC;YAClE,CAAC;YACD,aAAa,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE;gBAChC,cAAc,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YAC7B,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;gBAC3B,cAAc,CAAC,GAAG,EAAE,CAAC;YACvB,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC7B,cAAc,CAAC,OAAO,EAAE,CAAC;YAC3B,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC7B,cAAc,CAAC,GAAG,EAAE,CAAC;YACvB,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBAC/B,cAAc,CAAC,GAAG,EAAE,CAAC;gBACrB,cAAc,CAAC,OAAO,EAAE,CAAC;YAC3B,CAAC,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,iCAAiC,EAAE,KAAK,CAAC,CAAC;YACxD,eAAe,CAAC,GAAG,EAAE,2CAA2C,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,kBAAkB,CAC7B,eAA8D;QAE9D,OAAO,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;QACrC,IAAI,CAAC,YAAY,GAAG,eAAe,CAAC;QACpC,IAAI,CAAC,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAAC,CAAC;QAChD,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YAC9C,MAAM,sBAAsB,GAAG,IAAI,CAAC,0BAA0B,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;YAEvF,IAAI,CAAC,sBAAsB,EAAE,CAAC;gBAC5B,IAAI,CAAC,0BAA0B,CAAC,aAAa,CAAC,QAAQ,CAAC,GAAG,aAAa,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,IACE,sBAAsB,CAAC,SAAS,KAAK,aAAa,CAAC,SAAS;oBAC5D,sBAAsB,CAAC,UAAU,KAAK,aAAa,CAAC,UAAU,EAC9D,CAAC;oBACD,SAAS;gBACX,CAAC;qBAAM,CAAC;oBACN,IAAI,CAAC,0BAA0B,CAAC,aAAa,CAAC,QAAQ,CAAC,GAAG,aAAa,CAAC;gBAC1E,CAAC;YACH,CAAC;YAED,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,aAAa,CAAC,QAAQ,EAAE;gBAClD,IAAI,EAAE,aAAa,CAAC,SAAS;gBAC7B,GAAG,EAAE,aAAa,CAAC,UAAU;aAC9B,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,iBAAiB,CAAC,UAAqC;QAClE,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YAChD,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,GAAG,UAAU,CAAC,SAAS,CAAC,CAAC;QACzD,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,IAAI;QACf,MAAM,IAAI,GAAG,OAAO,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;QAC1C,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,GAAG,EAAE;YAC1B,IAAI,CAAC,OAAO,EAAE,CAAC;QACjB,CAAC,CAAC,CAAC;QACH,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;YAC/C,MAAM,CAAC,OAAO,EAAE,CAAC;QACnB,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,CAAC;QACnB,aAAa,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC;QACtC,OAAO,CAAC,GAAG,CAAC,yEAAyE,CAAC,CAAC;IACzF,CAAC;CACF"}
@@ -0,0 +1,37 @@
1
+ export declare class Port80Handler {
2
+ private domainCertificates;
3
+ private server;
4
+ private acmeClient;
5
+ private accountKey;
6
+ constructor();
7
+ /**
8
+ * Adds a domain to be managed.
9
+ * @param domain The domain to add.
10
+ */
11
+ addDomain(domain: string): void;
12
+ /**
13
+ * Removes a domain from management.
14
+ * @param domain The domain to remove.
15
+ */
16
+ removeDomain(domain: string): void;
17
+ /**
18
+ * Lazy initialization of the ACME client.
19
+ * Uses Let’s Encrypt’s production directory (for testing you might switch to staging).
20
+ */
21
+ private getAcmeClient;
22
+ /**
23
+ * Handles incoming HTTP requests on port 80.
24
+ * If the request is for an ACME challenge, it responds with the key authorization.
25
+ * If the domain has a certificate, it redirects to HTTPS; otherwise, it initiates certificate issuance.
26
+ */
27
+ private handleRequest;
28
+ /**
29
+ * Serves the ACME HTTP-01 challenge response.
30
+ */
31
+ private handleAcmeChallenge;
32
+ /**
33
+ * Uses acme-client to perform a full ACME HTTP-01 challenge to obtain a certificate.
34
+ * On success, it stores the certificate and key in memory and clears challenge data.
35
+ */
36
+ private obtainCertificate;
37
+ }
@@ -0,0 +1,186 @@
1
+ import * as http from 'http';
2
+ import * as acme from 'acme-client';
3
+ export class Port80Handler {
4
+ constructor() {
5
+ this.acmeClient = null;
6
+ this.accountKey = null;
7
+ this.domainCertificates = new Map();
8
+ // Create and start an HTTP server on port 80.
9
+ this.server = http.createServer((req, res) => this.handleRequest(req, res));
10
+ this.server.listen(80, () => {
11
+ console.log('Port80Handler is listening on port 80');
12
+ });
13
+ }
14
+ /**
15
+ * Adds a domain to be managed.
16
+ * @param domain The domain to add.
17
+ */
18
+ addDomain(domain) {
19
+ if (!this.domainCertificates.has(domain)) {
20
+ this.domainCertificates.set(domain, { certObtained: false, obtainingInProgress: false });
21
+ console.log(`Domain added: ${domain}`);
22
+ }
23
+ }
24
+ /**
25
+ * Removes a domain from management.
26
+ * @param domain The domain to remove.
27
+ */
28
+ removeDomain(domain) {
29
+ if (this.domainCertificates.delete(domain)) {
30
+ console.log(`Domain removed: ${domain}`);
31
+ }
32
+ }
33
+ /**
34
+ * Lazy initialization of the ACME client.
35
+ * Uses Let’s Encrypt’s production directory (for testing you might switch to staging).
36
+ */
37
+ async getAcmeClient() {
38
+ if (this.acmeClient) {
39
+ return this.acmeClient;
40
+ }
41
+ // Generate a new account key and convert Buffer to string.
42
+ this.accountKey = (await acme.forge.createPrivateKey()).toString();
43
+ this.acmeClient = new acme.Client({
44
+ directoryUrl: acme.directory.letsencrypt.production, // Use production for a real certificate
45
+ // For testing, you could use:
46
+ // directoryUrl: acme.directory.letsencrypt.staging,
47
+ accountKey: this.accountKey,
48
+ });
49
+ // Create a new account. Make sure to update the contact email.
50
+ await this.acmeClient.createAccount({
51
+ termsOfServiceAgreed: true,
52
+ contact: ['mailto:admin@example.com'],
53
+ });
54
+ return this.acmeClient;
55
+ }
56
+ /**
57
+ * Handles incoming HTTP requests on port 80.
58
+ * If the request is for an ACME challenge, it responds with the key authorization.
59
+ * If the domain has a certificate, it redirects to HTTPS; otherwise, it initiates certificate issuance.
60
+ */
61
+ handleRequest(req, res) {
62
+ const hostHeader = req.headers.host;
63
+ if (!hostHeader) {
64
+ res.statusCode = 400;
65
+ res.end('Bad Request: Host header is missing');
66
+ return;
67
+ }
68
+ // Extract domain (ignoring any port in the Host header)
69
+ const domain = hostHeader.split(':')[0];
70
+ // If the request is for an ACME HTTP-01 challenge, handle it.
71
+ if (req.url && req.url.startsWith('/.well-known/acme-challenge/')) {
72
+ this.handleAcmeChallenge(req, res, domain);
73
+ return;
74
+ }
75
+ if (!this.domainCertificates.has(domain)) {
76
+ res.statusCode = 404;
77
+ res.end('Domain not configured');
78
+ return;
79
+ }
80
+ const domainInfo = this.domainCertificates.get(domain);
81
+ // If certificate exists, redirect to HTTPS on port 443.
82
+ if (domainInfo.certObtained) {
83
+ const redirectUrl = `https://${domain}:443${req.url}`;
84
+ res.statusCode = 301;
85
+ res.setHeader('Location', redirectUrl);
86
+ res.end(`Redirecting to ${redirectUrl}`);
87
+ }
88
+ else {
89
+ // Trigger certificate issuance if not already running.
90
+ if (!domainInfo.obtainingInProgress) {
91
+ domainInfo.obtainingInProgress = true;
92
+ this.obtainCertificate(domain).catch(err => {
93
+ console.error(`Error obtaining certificate for ${domain}:`, err);
94
+ });
95
+ }
96
+ res.statusCode = 503;
97
+ res.end('Certificate issuance in progress, please try again later.');
98
+ }
99
+ }
100
+ /**
101
+ * Serves the ACME HTTP-01 challenge response.
102
+ */
103
+ handleAcmeChallenge(req, res, domain) {
104
+ const domainInfo = this.domainCertificates.get(domain);
105
+ if (!domainInfo) {
106
+ res.statusCode = 404;
107
+ res.end('Domain not configured');
108
+ return;
109
+ }
110
+ // The token is the last part of the URL.
111
+ const urlParts = req.url?.split('/');
112
+ const token = urlParts ? urlParts[urlParts.length - 1] : '';
113
+ if (domainInfo.challengeToken === token && domainInfo.challengeKeyAuthorization) {
114
+ res.statusCode = 200;
115
+ res.setHeader('Content-Type', 'text/plain');
116
+ res.end(domainInfo.challengeKeyAuthorization);
117
+ console.log(`Served ACME challenge response for ${domain}`);
118
+ }
119
+ else {
120
+ res.statusCode = 404;
121
+ res.end('Challenge token not found');
122
+ }
123
+ }
124
+ /**
125
+ * Uses acme-client to perform a full ACME HTTP-01 challenge to obtain a certificate.
126
+ * On success, it stores the certificate and key in memory and clears challenge data.
127
+ */
128
+ async obtainCertificate(domain) {
129
+ try {
130
+ const client = await this.getAcmeClient();
131
+ // Create a new order for the domain.
132
+ const order = await client.createOrder({
133
+ identifiers: [{ type: 'dns', value: domain }],
134
+ });
135
+ // Get the authorizations for the order.
136
+ const authorizations = await client.getAuthorizations(order);
137
+ for (const authz of authorizations) {
138
+ const challenge = authz.challenges.find(ch => ch.type === 'http-01');
139
+ if (!challenge) {
140
+ throw new Error('HTTP-01 challenge not found');
141
+ }
142
+ // Get the key authorization for the challenge.
143
+ const keyAuthorization = await client.getChallengeKeyAuthorization(challenge);
144
+ const domainInfo = this.domainCertificates.get(domain);
145
+ domainInfo.challengeToken = challenge.token;
146
+ domainInfo.challengeKeyAuthorization = keyAuthorization;
147
+ // Notify the ACME server that the challenge is ready.
148
+ // The acme-client examples show that verifyChallenge takes three arguments:
149
+ // (authorization, challenge, keyAuthorization). However, the official TypeScript
150
+ // types appear to be out-of-sync. As a workaround, we cast client to 'any'.
151
+ await client.verifyChallenge(authz, challenge, keyAuthorization);
152
+ await client.completeChallenge(challenge);
153
+ // Wait until the challenge is validated.
154
+ await client.waitForValidStatus(challenge);
155
+ console.log(`HTTP-01 challenge completed for ${domain}`);
156
+ }
157
+ // Generate a CSR and a new private key for the domain.
158
+ // Convert the resulting Buffers to strings.
159
+ const [csrBuffer, privateKeyBuffer] = await acme.forge.createCsr({
160
+ commonName: domain,
161
+ });
162
+ const csr = csrBuffer.toString();
163
+ const privateKey = privateKeyBuffer.toString();
164
+ // Finalize the order and obtain the certificate.
165
+ await client.finalizeOrder(order, csr);
166
+ const certificate = await client.getCertificate(order);
167
+ const domainInfo = this.domainCertificates.get(domain);
168
+ domainInfo.certificate = certificate;
169
+ domainInfo.privateKey = privateKey;
170
+ domainInfo.certObtained = true;
171
+ domainInfo.obtainingInProgress = false;
172
+ delete domainInfo.challengeToken;
173
+ delete domainInfo.challengeKeyAuthorization;
174
+ console.log(`Certificate obtained for ${domain}`);
175
+ // In a production system, persist the certificate and key and reload your TLS server.
176
+ }
177
+ catch (error) {
178
+ console.error(`Error during certificate issuance for ${domain}:`, error);
179
+ const domainInfo = this.domainCertificates.get(domain);
180
+ if (domainInfo) {
181
+ domainInfo.obtainingInProgress = false;
182
+ }
183
+ }
184
+ }
185
+ }
186
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,26 @@
1
+ import * as plugins from './plugins.js';
2
+ export interface IDomainConfig {
3
+ domain: string;
4
+ allowedIPs: string[];
5
+ targetIP?: string;
6
+ }
7
+ export interface IProxySettings extends plugins.tls.TlsOptions {
8
+ fromPort: number;
9
+ toPort: number;
10
+ toHost?: string;
11
+ domains: IDomainConfig[];
12
+ sniEnabled?: boolean;
13
+ defaultAllowedIPs?: string[];
14
+ preserveSourceIP?: boolean;
15
+ }
16
+ export declare class PortProxy {
17
+ netServer: plugins.net.Server;
18
+ settings: IProxySettings;
19
+ private connectionRecords;
20
+ private connectionLogger;
21
+ private terminationStats;
22
+ constructor(settings: IProxySettings);
23
+ private incrementTerminationStat;
24
+ start(): Promise<void>;
25
+ stop(): Promise<void>;
26
+ }