@push.rocks/smartproxy 3.10.4 → 3.12.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/classes.iptablesproxy.d.ts +23 -0
- package/dist_ts/classes.iptablesproxy.js +78 -0
- package/dist_ts/classes.networkproxy.d.ts +31 -0
- package/dist_ts/classes.networkproxy.js +305 -0
- package/dist_ts/classes.port80handler.d.ts +37 -0
- package/dist_ts/classes.port80handler.js +186 -0
- package/dist_ts/classes.portproxy.d.ts +26 -0
- package/dist_ts/classes.portproxy.js +295 -0
- package/dist_ts/classes.router.d.ts +13 -0
- package/dist_ts/classes.router.js +33 -0
- package/dist_ts/classes.sslredirect.d.ts +8 -0
- package/dist_ts/classes.sslredirect.js +28 -0
- package/dist_ts/helpers.certificates.d.ts +5 -0
- package/dist_ts/helpers.certificates.js +23 -0
- package/dist_ts/index.d.ts +5 -3
- package/dist_ts/index.js +6 -4
- package/package.json +2 -1
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/classes.iptablesproxy.ts +88 -0
- package/ts/{smartproxy.classes.networkproxy.ts → classes.networkproxy.ts} +1 -1
- package/ts/classes.port80handler.ts +214 -0
- package/ts/{smartproxy.portproxy.ts → classes.portproxy.ts} +3 -3
- package/ts/index.ts +5 -3
- /package/ts/{smartproxy.classes.router.ts → classes.router.ts} +0 -0
- /package/ts/{smartproxy.classes.sslredirect.ts → classes.sslredirect.ts} +0 -0
- /package/ts/{smartproxy.helpers.certificates.ts → helpers.certificates.ts} +0 -0
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
*/
|
|
4
4
|
export const commitinfo = {
|
|
5
5
|
name: '@push.rocks/smartproxy',
|
|
6
|
-
version: '3.
|
|
6
|
+
version: '3.12.0',
|
|
7
7
|
description: 'a proxy for handling high workloads of proxying'
|
|
8
8
|
};
|
|
9
9
|
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiMDBfY29tbWl0aW5mb19kYXRhLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vdHMvMDBfY29tbWl0aW5mb19kYXRhLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHO0FBQ0gsTUFBTSxDQUFDLE1BQU0sVUFBVSxHQUFHO0lBQ3hCLElBQUksRUFBRSx3QkFBd0I7SUFDOUIsT0FBTyxFQUFFLFFBQVE7SUFDakIsV0FBVyxFQUFFLGlEQUFpRDtDQUMvRCxDQUFBIn0=
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
export interface IIpTableProxySettings {
|
|
2
|
+
fromPort: number;
|
|
3
|
+
toPort: number;
|
|
4
|
+
toHost?: string;
|
|
5
|
+
preserveSourceIP?: boolean;
|
|
6
|
+
}
|
|
7
|
+
/**
|
|
8
|
+
* IPTablesProxy sets up iptables NAT rules to forward TCP traffic.
|
|
9
|
+
* It only supports basic port forwarding.
|
|
10
|
+
*/
|
|
11
|
+
export declare class IPTablesProxy {
|
|
12
|
+
settings: IIpTableProxySettings;
|
|
13
|
+
private rulesInstalled;
|
|
14
|
+
constructor(settings: IIpTableProxySettings);
|
|
15
|
+
/**
|
|
16
|
+
* Sets up iptables rules for port forwarding.
|
|
17
|
+
*/
|
|
18
|
+
start(): Promise<void>;
|
|
19
|
+
/**
|
|
20
|
+
* Removes the iptables rules that were added in start().
|
|
21
|
+
*/
|
|
22
|
+
stop(): Promise<void>;
|
|
23
|
+
}
|
|
@@ -0,0 +1,78 @@
|
|
|
1
|
+
import { exec } from 'child_process';
|
|
2
|
+
import { promisify } from 'util';
|
|
3
|
+
const execAsync = promisify(exec);
|
|
4
|
+
/**
|
|
5
|
+
* IPTablesProxy sets up iptables NAT rules to forward TCP traffic.
|
|
6
|
+
* It only supports basic port forwarding.
|
|
7
|
+
*/
|
|
8
|
+
export class IPTablesProxy {
|
|
9
|
+
constructor(settings) {
|
|
10
|
+
this.rulesInstalled = false;
|
|
11
|
+
this.settings = {
|
|
12
|
+
...settings,
|
|
13
|
+
toHost: settings.toHost || 'localhost',
|
|
14
|
+
};
|
|
15
|
+
}
|
|
16
|
+
/**
|
|
17
|
+
* Sets up iptables rules for port forwarding.
|
|
18
|
+
*/
|
|
19
|
+
async start() {
|
|
20
|
+
const dnatCmd = `iptables -t nat -A PREROUTING -p tcp --dport ${this.settings.fromPort} -j DNAT --to-destination ${this.settings.toHost}:${this.settings.toPort}`;
|
|
21
|
+
try {
|
|
22
|
+
await execAsync(dnatCmd);
|
|
23
|
+
console.log(`Added iptables rule: ${dnatCmd}`);
|
|
24
|
+
this.rulesInstalled = true;
|
|
25
|
+
}
|
|
26
|
+
catch (err) {
|
|
27
|
+
console.error(`Failed to add iptables DNAT rule: ${err}`);
|
|
28
|
+
throw err;
|
|
29
|
+
}
|
|
30
|
+
if (!this.settings.preserveSourceIP) {
|
|
31
|
+
const masqueradeCmd = `iptables -t nat -A POSTROUTING -p tcp -d ${this.settings.toHost} --dport ${this.settings.toPort} -j MASQUERADE`;
|
|
32
|
+
try {
|
|
33
|
+
await execAsync(masqueradeCmd);
|
|
34
|
+
console.log(`Added iptables rule: ${masqueradeCmd}`);
|
|
35
|
+
}
|
|
36
|
+
catch (err) {
|
|
37
|
+
console.error(`Failed to add iptables MASQUERADE rule: ${err}`);
|
|
38
|
+
// Roll back the DNAT rule if MASQUERADE fails.
|
|
39
|
+
try {
|
|
40
|
+
const rollbackCmd = `iptables -t nat -D PREROUTING -p tcp --dport ${this.settings.fromPort} -j DNAT --to-destination ${this.settings.toHost}:${this.settings.toPort}`;
|
|
41
|
+
await execAsync(rollbackCmd);
|
|
42
|
+
this.rulesInstalled = false;
|
|
43
|
+
}
|
|
44
|
+
catch (rollbackErr) {
|
|
45
|
+
console.error(`Rollback failed: ${rollbackErr}`);
|
|
46
|
+
}
|
|
47
|
+
throw err;
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Removes the iptables rules that were added in start().
|
|
53
|
+
*/
|
|
54
|
+
async stop() {
|
|
55
|
+
if (!this.rulesInstalled)
|
|
56
|
+
return;
|
|
57
|
+
const dnatDelCmd = `iptables -t nat -D PREROUTING -p tcp --dport ${this.settings.fromPort} -j DNAT --to-destination ${this.settings.toHost}:${this.settings.toPort}`;
|
|
58
|
+
try {
|
|
59
|
+
await execAsync(dnatDelCmd);
|
|
60
|
+
console.log(`Removed iptables rule: ${dnatDelCmd}`);
|
|
61
|
+
}
|
|
62
|
+
catch (err) {
|
|
63
|
+
console.error(`Failed to remove iptables DNAT rule: ${err}`);
|
|
64
|
+
}
|
|
65
|
+
if (!this.settings.preserveSourceIP) {
|
|
66
|
+
const masqueradeDelCmd = `iptables -t nat -D POSTROUTING -p tcp -d ${this.settings.toHost} --dport ${this.settings.toPort} -j MASQUERADE`;
|
|
67
|
+
try {
|
|
68
|
+
await execAsync(masqueradeDelCmd);
|
|
69
|
+
console.log(`Removed iptables rule: ${masqueradeDelCmd}`);
|
|
70
|
+
}
|
|
71
|
+
catch (err) {
|
|
72
|
+
console.error(`Failed to remove iptables MASQUERADE rule: ${err}`);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
this.rulesInstalled = false;
|
|
76
|
+
}
|
|
77
|
+
}
|
|
78
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
import * as plugins from './plugins.js';
|
|
2
|
+
import { ProxyRouter } from './classes.router.js';
|
|
3
|
+
export interface INetworkProxyOptions {
|
|
4
|
+
port: number;
|
|
5
|
+
}
|
|
6
|
+
export declare class NetworkProxy {
|
|
7
|
+
options: INetworkProxyOptions;
|
|
8
|
+
proxyConfigs: plugins.tsclass.network.IReverseProxyConfig[];
|
|
9
|
+
httpsServer: plugins.https.Server;
|
|
10
|
+
router: ProxyRouter;
|
|
11
|
+
socketMap: plugins.lik.ObjectMap<plugins.net.Socket>;
|
|
12
|
+
defaultHeaders: {
|
|
13
|
+
[key: string]: string;
|
|
14
|
+
};
|
|
15
|
+
heartbeatInterval: NodeJS.Timeout;
|
|
16
|
+
private defaultCertificates;
|
|
17
|
+
alreadyAddedReverseConfigs: {
|
|
18
|
+
[hostName: string]: plugins.tsclass.network.IReverseProxyConfig;
|
|
19
|
+
};
|
|
20
|
+
constructor(optionsArg: INetworkProxyOptions);
|
|
21
|
+
start(): Promise<void>;
|
|
22
|
+
/**
|
|
23
|
+
* Internal async handler for processing HTTP/HTTPS requests.
|
|
24
|
+
*/
|
|
25
|
+
private handleRequest;
|
|
26
|
+
updateProxyConfigs(proxyConfigsArg: plugins.tsclass.network.IReverseProxyConfig[]): Promise<void>;
|
|
27
|
+
addDefaultHeaders(headersArg: {
|
|
28
|
+
[key: string]: string;
|
|
29
|
+
}): Promise<void>;
|
|
30
|
+
stop(): Promise<void>;
|
|
31
|
+
}
|
|
@@ -0,0 +1,305 @@
|
|
|
1
|
+
import * as plugins from './plugins.js';
|
|
2
|
+
import { ProxyRouter } from './classes.router.js';
|
|
3
|
+
import * as fs from 'fs';
|
|
4
|
+
import * as path from 'path';
|
|
5
|
+
import { fileURLToPath } from 'url';
|
|
6
|
+
export class NetworkProxy {
|
|
7
|
+
constructor(optionsArg) {
|
|
8
|
+
this.proxyConfigs = [];
|
|
9
|
+
this.router = new ProxyRouter();
|
|
10
|
+
this.socketMap = new plugins.lik.ObjectMap();
|
|
11
|
+
this.defaultHeaders = {};
|
|
12
|
+
this.alreadyAddedReverseConfigs = {};
|
|
13
|
+
this.options = optionsArg;
|
|
14
|
+
const __dirname = path.dirname(fileURLToPath(import.meta.url));
|
|
15
|
+
const certPath = path.join(__dirname, '..', 'assets', 'certs');
|
|
16
|
+
try {
|
|
17
|
+
this.defaultCertificates = {
|
|
18
|
+
key: fs.readFileSync(path.join(certPath, 'key.pem'), 'utf8'),
|
|
19
|
+
cert: fs.readFileSync(path.join(certPath, 'cert.pem'), 'utf8')
|
|
20
|
+
};
|
|
21
|
+
}
|
|
22
|
+
catch (error) {
|
|
23
|
+
console.error('Error loading certificates:', error);
|
|
24
|
+
throw error;
|
|
25
|
+
}
|
|
26
|
+
}
|
|
27
|
+
async start() {
|
|
28
|
+
// Instead of marking the callback async (which Node won't await),
|
|
29
|
+
// we call our async handler and catch errors.
|
|
30
|
+
this.httpsServer = plugins.https.createServer({
|
|
31
|
+
key: this.defaultCertificates.key,
|
|
32
|
+
cert: this.defaultCertificates.cert
|
|
33
|
+
}, (originRequest, originResponse) => {
|
|
34
|
+
this.handleRequest(originRequest, originResponse).catch((error) => {
|
|
35
|
+
console.error('Unhandled error in request handler:', error);
|
|
36
|
+
try {
|
|
37
|
+
originResponse.end();
|
|
38
|
+
}
|
|
39
|
+
catch (err) {
|
|
40
|
+
// ignore errors during cleanup
|
|
41
|
+
}
|
|
42
|
+
});
|
|
43
|
+
});
|
|
44
|
+
// Enable websockets
|
|
45
|
+
const wsServer = new plugins.ws.WebSocketServer({ server: this.httpsServer });
|
|
46
|
+
// Set up the heartbeat interval
|
|
47
|
+
this.heartbeatInterval = setInterval(() => {
|
|
48
|
+
wsServer.clients.forEach((ws) => {
|
|
49
|
+
const wsIncoming = ws;
|
|
50
|
+
if (!wsIncoming.lastPong) {
|
|
51
|
+
wsIncoming.lastPong = Date.now();
|
|
52
|
+
}
|
|
53
|
+
if (Date.now() - wsIncoming.lastPong > 5 * 60 * 1000) {
|
|
54
|
+
console.log('Terminating websocket due to missing pong for 5 minutes.');
|
|
55
|
+
wsIncoming.terminate();
|
|
56
|
+
}
|
|
57
|
+
else {
|
|
58
|
+
wsIncoming.ping();
|
|
59
|
+
}
|
|
60
|
+
});
|
|
61
|
+
}, 60000); // runs every 1 minute
|
|
62
|
+
wsServer.on('connection', (wsIncoming, reqArg) => {
|
|
63
|
+
console.log(`wss proxy: got connection for wsc for https://${reqArg.headers.host}${reqArg.url}`);
|
|
64
|
+
wsIncoming.lastPong = Date.now();
|
|
65
|
+
wsIncoming.on('pong', () => {
|
|
66
|
+
wsIncoming.lastPong = Date.now();
|
|
67
|
+
});
|
|
68
|
+
let wsOutgoing;
|
|
69
|
+
const outGoingDeferred = plugins.smartpromise.defer();
|
|
70
|
+
// --- Improvement 2: Only call routeReq once ---
|
|
71
|
+
const wsDestinationConfig = this.router.routeReq(reqArg);
|
|
72
|
+
if (!wsDestinationConfig) {
|
|
73
|
+
wsIncoming.terminate();
|
|
74
|
+
return;
|
|
75
|
+
}
|
|
76
|
+
try {
|
|
77
|
+
wsOutgoing = new plugins.wsDefault(`ws://${wsDestinationConfig.destinationIp}:${wsDestinationConfig.destinationPort}${reqArg.url}`);
|
|
78
|
+
console.log('wss proxy: initiated outgoing proxy');
|
|
79
|
+
wsOutgoing.on('open', async () => {
|
|
80
|
+
outGoingDeferred.resolve();
|
|
81
|
+
});
|
|
82
|
+
}
|
|
83
|
+
catch (err) {
|
|
84
|
+
console.error('Error initiating outgoing WebSocket:', err);
|
|
85
|
+
wsIncoming.terminate();
|
|
86
|
+
return;
|
|
87
|
+
}
|
|
88
|
+
wsIncoming.on('message', async (message, isBinary) => {
|
|
89
|
+
try {
|
|
90
|
+
await outGoingDeferred.promise;
|
|
91
|
+
wsOutgoing.send(message, { binary: isBinary });
|
|
92
|
+
}
|
|
93
|
+
catch (error) {
|
|
94
|
+
console.error('Error sending message to wsOutgoing:', error);
|
|
95
|
+
}
|
|
96
|
+
});
|
|
97
|
+
wsOutgoing.on('message', async (message, isBinary) => {
|
|
98
|
+
try {
|
|
99
|
+
wsIncoming.send(message, { binary: isBinary });
|
|
100
|
+
}
|
|
101
|
+
catch (error) {
|
|
102
|
+
console.error('Error sending message to wsIncoming:', error);
|
|
103
|
+
}
|
|
104
|
+
});
|
|
105
|
+
const terminateWsOutgoing = () => {
|
|
106
|
+
if (wsOutgoing) {
|
|
107
|
+
wsOutgoing.terminate();
|
|
108
|
+
console.log('Terminated outgoing ws.');
|
|
109
|
+
}
|
|
110
|
+
};
|
|
111
|
+
wsIncoming.on('error', terminateWsOutgoing);
|
|
112
|
+
wsIncoming.on('close', terminateWsOutgoing);
|
|
113
|
+
const terminateWsIncoming = () => {
|
|
114
|
+
if (wsIncoming) {
|
|
115
|
+
wsIncoming.terminate();
|
|
116
|
+
console.log('Terminated incoming ws.');
|
|
117
|
+
}
|
|
118
|
+
};
|
|
119
|
+
wsOutgoing.on('error', terminateWsIncoming);
|
|
120
|
+
wsOutgoing.on('close', terminateWsIncoming);
|
|
121
|
+
});
|
|
122
|
+
this.httpsServer.keepAliveTimeout = 600 * 1000;
|
|
123
|
+
this.httpsServer.headersTimeout = 600 * 1000;
|
|
124
|
+
this.httpsServer.on('connection', (connection) => {
|
|
125
|
+
this.socketMap.add(connection);
|
|
126
|
+
console.log(`Added connection. Now ${this.socketMap.getArray().length} sockets connected.`);
|
|
127
|
+
const cleanupConnection = () => {
|
|
128
|
+
if (this.socketMap.checkForObject(connection)) {
|
|
129
|
+
this.socketMap.remove(connection);
|
|
130
|
+
console.log(`Removed connection. ${this.socketMap.getArray().length} sockets remaining.`);
|
|
131
|
+
connection.destroy();
|
|
132
|
+
}
|
|
133
|
+
};
|
|
134
|
+
connection.on('close', cleanupConnection);
|
|
135
|
+
connection.on('error', cleanupConnection);
|
|
136
|
+
connection.on('end', cleanupConnection);
|
|
137
|
+
connection.on('timeout', cleanupConnection);
|
|
138
|
+
});
|
|
139
|
+
this.httpsServer.listen(this.options.port);
|
|
140
|
+
console.log(`NetworkProxy -> OK: now listening for new connections on port ${this.options.port}`);
|
|
141
|
+
}
|
|
142
|
+
/**
|
|
143
|
+
* Internal async handler for processing HTTP/HTTPS requests.
|
|
144
|
+
*/
|
|
145
|
+
async handleRequest(originRequest, originResponse) {
|
|
146
|
+
const endOriginReqRes = (statusArg = 404, messageArg = 'This route is not available on this server.', headers = {}) => {
|
|
147
|
+
originResponse.writeHead(statusArg, messageArg);
|
|
148
|
+
originResponse.end(messageArg);
|
|
149
|
+
if (originRequest.socket !== originResponse.socket) {
|
|
150
|
+
console.log('hey, something is strange.');
|
|
151
|
+
}
|
|
152
|
+
originResponse.destroy();
|
|
153
|
+
};
|
|
154
|
+
console.log(`got request: ${originRequest.headers.host}${plugins.url.parse(originRequest.url).path}`);
|
|
155
|
+
const destinationConfig = this.router.routeReq(originRequest);
|
|
156
|
+
if (!destinationConfig) {
|
|
157
|
+
console.log(`${originRequest.headers.host} can't be routed properly. Terminating request.`);
|
|
158
|
+
endOriginReqRes();
|
|
159
|
+
return;
|
|
160
|
+
}
|
|
161
|
+
// authentication
|
|
162
|
+
if (destinationConfig.authentication) {
|
|
163
|
+
const authInfo = destinationConfig.authentication;
|
|
164
|
+
switch (authInfo.type) {
|
|
165
|
+
case 'Basic': {
|
|
166
|
+
const authHeader = originRequest.headers.authorization;
|
|
167
|
+
if (!authHeader) {
|
|
168
|
+
return endOriginReqRes(401, 'Authentication required', {
|
|
169
|
+
'WWW-Authenticate': 'Basic realm="Access to the staging site", charset="UTF-8"',
|
|
170
|
+
});
|
|
171
|
+
}
|
|
172
|
+
if (!authHeader.includes('Basic ')) {
|
|
173
|
+
return endOriginReqRes(401, 'Authentication required', {
|
|
174
|
+
'WWW-Authenticate': 'Basic realm="Access to the staging site", charset="UTF-8"',
|
|
175
|
+
});
|
|
176
|
+
}
|
|
177
|
+
const authStringBase64 = authHeader.replace('Basic ', '');
|
|
178
|
+
const authString = plugins.smartstring.base64.decode(authStringBase64);
|
|
179
|
+
const userPassArray = authString.split(':');
|
|
180
|
+
const user = userPassArray[0];
|
|
181
|
+
const pass = userPassArray[1];
|
|
182
|
+
if (user === authInfo.user && pass === authInfo.pass) {
|
|
183
|
+
console.log('Request successfully authenticated');
|
|
184
|
+
}
|
|
185
|
+
else {
|
|
186
|
+
return endOriginReqRes(403, 'Forbidden: Wrong credentials');
|
|
187
|
+
}
|
|
188
|
+
break;
|
|
189
|
+
}
|
|
190
|
+
default:
|
|
191
|
+
return endOriginReqRes(403, 'Forbidden: unsupported authentication method configured. Please report to the admin.');
|
|
192
|
+
}
|
|
193
|
+
}
|
|
194
|
+
let destinationUrl;
|
|
195
|
+
if (destinationConfig) {
|
|
196
|
+
destinationUrl = `http://${destinationConfig.destinationIp}:${destinationConfig.destinationPort}${originRequest.url}`;
|
|
197
|
+
}
|
|
198
|
+
else {
|
|
199
|
+
return endOriginReqRes();
|
|
200
|
+
}
|
|
201
|
+
console.log(destinationUrl);
|
|
202
|
+
try {
|
|
203
|
+
const proxyResponse = await plugins.smartrequest.request(destinationUrl, {
|
|
204
|
+
method: originRequest.method,
|
|
205
|
+
headers: {
|
|
206
|
+
...originRequest.headers,
|
|
207
|
+
'X-Forwarded-Host': originRequest.headers.host,
|
|
208
|
+
'X-Forwarded-Proto': 'https',
|
|
209
|
+
},
|
|
210
|
+
keepAlive: true,
|
|
211
|
+
}, true, // streaming (keepAlive)
|
|
212
|
+
(proxyRequest) => {
|
|
213
|
+
originRequest.on('data', (data) => {
|
|
214
|
+
proxyRequest.write(data);
|
|
215
|
+
});
|
|
216
|
+
originRequest.on('end', () => {
|
|
217
|
+
proxyRequest.end();
|
|
218
|
+
});
|
|
219
|
+
originRequest.on('error', () => {
|
|
220
|
+
proxyRequest.end();
|
|
221
|
+
});
|
|
222
|
+
originRequest.on('close', () => {
|
|
223
|
+
proxyRequest.end();
|
|
224
|
+
});
|
|
225
|
+
originRequest.on('timeout', () => {
|
|
226
|
+
proxyRequest.end();
|
|
227
|
+
originRequest.destroy();
|
|
228
|
+
});
|
|
229
|
+
proxyRequest.on('error', () => {
|
|
230
|
+
endOriginReqRes();
|
|
231
|
+
});
|
|
232
|
+
});
|
|
233
|
+
originResponse.statusCode = proxyResponse.statusCode;
|
|
234
|
+
console.log(proxyResponse.statusCode);
|
|
235
|
+
for (const defaultHeader of Object.keys(this.defaultHeaders)) {
|
|
236
|
+
originResponse.setHeader(defaultHeader, this.defaultHeaders[defaultHeader]);
|
|
237
|
+
}
|
|
238
|
+
for (const header of Object.keys(proxyResponse.headers)) {
|
|
239
|
+
originResponse.setHeader(header, proxyResponse.headers[header]);
|
|
240
|
+
}
|
|
241
|
+
proxyResponse.on('data', (data) => {
|
|
242
|
+
originResponse.write(data);
|
|
243
|
+
});
|
|
244
|
+
proxyResponse.on('end', () => {
|
|
245
|
+
originResponse.end();
|
|
246
|
+
});
|
|
247
|
+
proxyResponse.on('error', () => {
|
|
248
|
+
originResponse.destroy();
|
|
249
|
+
});
|
|
250
|
+
proxyResponse.on('close', () => {
|
|
251
|
+
originResponse.end();
|
|
252
|
+
});
|
|
253
|
+
proxyResponse.on('timeout', () => {
|
|
254
|
+
originResponse.end();
|
|
255
|
+
originResponse.destroy();
|
|
256
|
+
});
|
|
257
|
+
}
|
|
258
|
+
catch (error) {
|
|
259
|
+
console.error('Error while processing request:', error);
|
|
260
|
+
endOriginReqRes(502, 'Bad Gateway: Error processing the request');
|
|
261
|
+
}
|
|
262
|
+
}
|
|
263
|
+
async updateProxyConfigs(proxyConfigsArg) {
|
|
264
|
+
console.log(`got new proxy configs`);
|
|
265
|
+
this.proxyConfigs = proxyConfigsArg;
|
|
266
|
+
this.router.setNewProxyConfigs(proxyConfigsArg);
|
|
267
|
+
for (const hostCandidate of this.proxyConfigs) {
|
|
268
|
+
const existingHostNameConfig = this.alreadyAddedReverseConfigs[hostCandidate.hostName];
|
|
269
|
+
if (!existingHostNameConfig) {
|
|
270
|
+
this.alreadyAddedReverseConfigs[hostCandidate.hostName] = hostCandidate;
|
|
271
|
+
}
|
|
272
|
+
else {
|
|
273
|
+
if (existingHostNameConfig.publicKey === hostCandidate.publicKey &&
|
|
274
|
+
existingHostNameConfig.privateKey === hostCandidate.privateKey) {
|
|
275
|
+
continue;
|
|
276
|
+
}
|
|
277
|
+
else {
|
|
278
|
+
this.alreadyAddedReverseConfigs[hostCandidate.hostName] = hostCandidate;
|
|
279
|
+
}
|
|
280
|
+
}
|
|
281
|
+
this.httpsServer.addContext(hostCandidate.hostName, {
|
|
282
|
+
cert: hostCandidate.publicKey,
|
|
283
|
+
key: hostCandidate.privateKey,
|
|
284
|
+
});
|
|
285
|
+
}
|
|
286
|
+
}
|
|
287
|
+
async addDefaultHeaders(headersArg) {
|
|
288
|
+
for (const headerKey of Object.keys(headersArg)) {
|
|
289
|
+
this.defaultHeaders[headerKey] = headersArg[headerKey];
|
|
290
|
+
}
|
|
291
|
+
}
|
|
292
|
+
async stop() {
|
|
293
|
+
const done = plugins.smartpromise.defer();
|
|
294
|
+
this.httpsServer.close(() => {
|
|
295
|
+
done.resolve();
|
|
296
|
+
});
|
|
297
|
+
for (const socket of this.socketMap.getArray()) {
|
|
298
|
+
socket.destroy();
|
|
299
|
+
}
|
|
300
|
+
await done.promise;
|
|
301
|
+
clearInterval(this.heartbeatInterval);
|
|
302
|
+
console.log('NetworkProxy -> OK: Server has been stopped and all connections closed.');
|
|
303
|
+
}
|
|
304
|
+
}
|
|
305
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.networkproxy.js","sourceRoot":"","sources":["../ts/classes.networkproxy.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,cAAc,CAAC;AACxC,OAAO,EAAE,WAAW,EAAE,MAAM,qBAAqB,CAAC;AAClD,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,EAAE,aAAa,EAAE,MAAM,KAAK,CAAC;AAUpC,MAAM,OAAO,YAAY;IAcvB,YAAY,UAAgC;QAZrC,iBAAY,GAAkD,EAAE,CAAC;QAEjE,WAAM,GAAG,IAAI,WAAW,EAAE,CAAC;QAC3B,cAAS,GAAG,IAAI,OAAO,CAAC,GAAG,CAAC,SAAS,EAAsB,CAAC;QAC5D,mBAAc,GAA8B,EAAE,CAAC;QAI/C,+BAA0B,GAE7B,EAAE,CAAC;QAGL,IAAI,CAAC,OAAO,GAAG,UAAU,CAAC;QAC1B,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;QAE/D,IAAI,CAAC;YACH,IAAI,CAAC,mBAAmB,GAAG;gBACzB,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,SAAS,CAAC,EAAE,MAAM,CAAC;gBAC5D,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,UAAU,CAAC,EAAE,MAAM,CAAC;aAC/D,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,6BAA6B,EAAE,KAAK,CAAC,CAAC;YACpD,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,KAAK;QAChB,kEAAkE;QAClE,8CAA8C;QAC9C,IAAI,CAAC,WAAW,GAAG,OAAO,CAAC,KAAK,CAAC,YAAY,CAC3C;YACE,GAAG,EAAE,IAAI,CAAC,mBAAmB,CAAC,GAAG;YACjC,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI;SACpC,EACD,CAAC,aAAa,EAAE,cAAc,EAAE,EAAE;YAChC,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE,cAAc,CAAC,CAAC,KAAK,CAAC,CAAC,KAAK,EAAE,EAAE;gBAChE,OAAO,CAAC,KAAK,CAAC,qCAAqC,EAAE,KAAK,CAAC,CAAC;gBAC5D,IAAI,CAAC;oBACH,cAAc,CAAC,GAAG,EAAE,CAAC;gBACvB,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,+BAA+B;gBACjC,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,CACF,CAAC;QAEF,oBAAoB;QACpB,MAAM,QAAQ,GAAG,IAAI,OAAO,CAAC,EAAE,CAAC,eAAe,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,WAAW,EAAE,CAAC,CAAC;QAE9E,gCAAgC;QAChC,IAAI,CAAC,iBAAiB,GAAG,WAAW,CAAC,GAAG,EAAE;YACxC,QAAQ,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,EAAqB,EAAE,EAAE;gBACjD,MAAM,UAAU,GAAG,EAA6B,CAAC;gBACjD,IAAI,CAAC,UAAU,CAAC,QAAQ,EAAE,CAAC;oBACzB,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACnC,CAAC;gBACD,IAAI,IAAI,CAAC,GAAG,EAAE,GAAG,UAAU,CAAC,QAAQ,GAAG,CAAC,GAAG,EAAE,GAAG,IAAI,EAAE,CAAC;oBACrD,OAAO,CAAC,GAAG,CAAC,0DAA0D,CAAC,CAAC;oBACxE,UAAU,CAAC,SAAS,EAAE,CAAC;gBACzB,CAAC;qBAAM,CAAC;oBACN,UAAU,CAAC,IAAI,EAAE,CAAC;gBACpB,CAAC;YACH,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,KAAK,CAAC,CAAC,CAAC,sBAAsB;QAEjC,QAAQ,CAAC,EAAE,CACT,YAAY,EACZ,CAAC,UAAmC,EAAE,MAAoC,EAAE,EAAE;YAC5E,OAAO,CAAC,GAAG,CACT,iDAAiD,MAAM,CAAC,OAAO,CAAC,IAAI,GAAG,MAAM,CAAC,GAAG,EAAE,CACpF,CAAC;YAEF,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACjC,UAAU,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,EAAE;gBACzB,UAAU,CAAC,QAAQ,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACnC,CAAC,CAAC,CAAC;YAEH,IAAI,UAA6B,CAAC;YAClC,MAAM,gBAAgB,GAAG,OAAO,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAEtD,iDAAiD;YACjD,MAAM,mBAAmB,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACzD,IAAI,CAAC,mBAAmB,EAAE,CAAC;gBACzB,UAAU,CAAC,SAAS,EAAE,CAAC;gBACvB,OAAO;YACT,CAAC;YACD,IAAI,CAAC;gBACH,UAAU,GAAG,IAAI,OAAO,CAAC,SAAS,CAChC,QAAQ,mBAAmB,CAAC,aAAa,IAAI,mBAAmB,CAAC,eAAe,GAAG,MAAM,CAAC,GAAG,EAAE,CAChG,CAAC;gBACF,OAAO,CAAC,GAAG,CAAC,qCAAqC,CAAC,CAAC;gBACnD,UAAU,CAAC,EAAE,CAAC,MAAM,EAAE,KAAK,IAAI,EAAE;oBAC/B,gBAAgB,CAAC,OAAO,EAAE,CAAC;gBAC7B,CAAC,CAAC,CAAC;YACL,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,KAAK,CAAC,sCAAsC,EAAE,GAAG,CAAC,CAAC;gBAC3D,UAAU,CAAC,SAAS,EAAE,CAAC;gBACvB,OAAO;YACT,CAAC;YAED,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;gBACnD,IAAI,CAAC;oBACH,MAAM,gBAAgB,CAAC,OAAO,CAAC;oBAC/B,UAAU,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,CAAC;gBACjD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,sCAAsC,EAAE,KAAK,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,EAAE;gBACnD,IAAI,CAAC;oBACH,UAAU,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,CAAC;gBACjD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,sCAAsC,EAAE,KAAK,CAAC,CAAC;gBAC/D,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,MAAM,mBAAmB,GAAG,GAAG,EAAE;gBAC/B,IAAI,UAAU,EAAE,CAAC;oBACf,UAAU,CAAC,SAAS,EAAE,CAAC;oBACvB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;gBACzC,CAAC;YACH,CAAC,CAAC;YACF,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;YAC5C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;YAE5C,MAAM,mBAAmB,GAAG,GAAG,EAAE;gBAC/B,IAAI,UAAU,EAAE,CAAC;oBACf,UAAU,CAAC,SAAS,EAAE,CAAC;oBACvB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;gBACzC,CAAC;YACH,CAAC,CAAC;YACF,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;YAC5C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC,CAAC;QAC9C,CAAC,CACF,CAAC;QAEF,IAAI,CAAC,WAAW,CAAC,gBAAgB,GAAG,GAAG,GAAG,IAAI,CAAC;QAC/C,IAAI,CAAC,WAAW,CAAC,cAAc,GAAG,GAAG,GAAG,IAAI,CAAC;QAE7C,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,YAAY,EAAE,CAAC,UAA8B,EAAE,EAAE;YACnE,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YAC/B,OAAO,CAAC,GAAG,CAAC,yBAAyB,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,MAAM,qBAAqB,CAAC,CAAC;YAC5F,MAAM,iBAAiB,GAAG,GAAG,EAAE;gBAC7B,IAAI,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,UAAU,CAAC,EAAE,CAAC;oBAC9C,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;oBAClC,OAAO,CAAC,GAAG,CAAC,uBAAuB,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,CAAC,MAAM,qBAAqB,CAAC,CAAC;oBAC1F,UAAU,CAAC,OAAO,EAAE,CAAC;gBACvB,CAAC;YACH,CAAC,CAAC;YACF,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,iBAAiB,CAAC,CAAC;YAC1C,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,iBAAiB,CAAC,CAAC;YAC1C,UAAU,CAAC,EAAE,CAAC,KAAK,EAAE,iBAAiB,CAAC,CAAC;YACxC,UAAU,CAAC,EAAE,CAAC,SAAS,EAAE,iBAAiB,CAAC,CAAC;QAC9C,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAC3C,OAAO,CAAC,GAAG,CACT,iEAAiE,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CACrF,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,aAAa,CACzB,aAA2C,EAC3C,cAA2C;QAE3C,MAAM,eAAe,GAAG,CACtB,YAAoB,GAAG,EACvB,aAAqB,6CAA6C,EAClE,UAA4C,EAAE,EAC9C,EAAE;YACF,cAAc,CAAC,SAAS,CAAC,SAAS,EAAE,UAAU,CAAC,CAAC;YAChD,cAAc,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YAC/B,IAAI,aAAa,CAAC,MAAM,KAAK,cAAc,CAAC,MAAM,EAAE,CAAC;gBACnD,OAAO,CAAC,GAAG,CAAC,4BAA4B,CAAC,CAAC;YAC5C,CAAC;YACD,cAAc,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC,CAAC;QAEF,OAAO,CAAC,GAAG,CACT,gBAAgB,aAAa,CAAC,OAAO,CAAC,IAAI,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,CACzF,CAAC;QACF,MAAM,iBAAiB,GAAG,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAE9D,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,GAAG,aAAa,CAAC,OAAO,CAAC,IAAI,iDAAiD,CAC/E,CAAC;YACF,eAAe,EAAE,CAAC;YAClB,OAAO;QACT,CAAC;QAED,iBAAiB;QACjB,IAAI,iBAAiB,CAAC,cAAc,EAAE,CAAC;YACrC,MAAM,QAAQ,GAAG,iBAAiB,CAAC,cAAc,CAAC;YAClD,QAAQ,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACtB,KAAK,OAAO,CAAC,CAAC,CAAC;oBACb,MAAM,UAAU,GAAG,aAAa,CAAC,OAAO,CAAC,aAAa,CAAC;oBACvD,IAAI,CAAC,UAAU,EAAE,CAAC;wBAChB,OAAO,eAAe,CAAC,GAAG,EAAE,yBAAyB,EAAE;4BACrD,kBAAkB,EAAE,2DAA2D;yBAChF,CAAC,CAAC;oBACL,CAAC;oBACD,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;wBACnC,OAAO,eAAe,CAAC,GAAG,EAAE,yBAAyB,EAAE;4BACrD,kBAAkB,EAAE,2DAA2D;yBAChF,CAAC,CAAC;oBACL,CAAC;oBACD,MAAM,gBAAgB,GAAG,UAAU,CAAC,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;oBAC1D,MAAM,UAAU,GAAW,OAAO,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC;oBAC/E,MAAM,aAAa,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBAC5C,MAAM,IAAI,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;oBAC9B,MAAM,IAAI,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;oBAC9B,IAAI,IAAI,KAAK,QAAQ,CAAC,IAAI,IAAI,IAAI,KAAK,QAAQ,CAAC,IAAI,EAAE,CAAC;wBACrD,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;oBACpD,CAAC;yBAAM,CAAC;wBACN,OAAO,eAAe,CAAC,GAAG,EAAE,8BAA8B,CAAC,CAAC;oBAC9D,CAAC;oBACD,MAAM;gBACR,CAAC;gBACD;oBACE,OAAO,eAAe,CACpB,GAAG,EACH,sFAAsF,CACvF,CAAC;YACN,CAAC;QACH,CAAC;QAED,IAAI,cAAsB,CAAC;QAC3B,IAAI,iBAAiB,EAAE,CAAC;YACtB,cAAc,GAAG,UAAU,iBAAiB,CAAC,aAAa,IAAI,iBAAiB,CAAC,eAAe,GAAG,aAAa,CAAC,GAAG,EAAE,CAAC;QACxH,CAAC;aAAM,CAAC;YACN,OAAO,eAAe,EAAE,CAAC;QAC3B,CAAC;QACD,OAAO,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,aAAa,GAAG,MAAM,OAAO,CAAC,YAAY,CAAC,OAAO,CACtD,cAAc,EACd;gBACE,MAAM,EAAE,aAAa,CAAC,MAAM;gBAC5B,OAAO,EAAE;oBACP,GAAG,aAAa,CAAC,OAAO;oBACxB,kBAAkB,EAAE,aAAa,CAAC,OAAO,CAAC,IAAI;oBAC9C,mBAAmB,EAAE,OAAO;iBAC7B;gBACD,SAAS,EAAE,IAAI;aAChB,EACD,IAAI,EAAE,wBAAwB;YAC9B,CAAC,YAAY,EAAE,EAAE;gBACf,aAAa,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE;oBAChC,YAAY,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;gBAC3B,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;oBAC3B,YAAY,CAAC,GAAG,EAAE,CAAC;gBACrB,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;oBAC7B,YAAY,CAAC,GAAG,EAAE,CAAC;gBACrB,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;oBAC7B,YAAY,CAAC,GAAG,EAAE,CAAC;gBACrB,CAAC,CAAC,CAAC;gBACH,aAAa,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;oBAC/B,YAAY,CAAC,GAAG,EAAE,CAAC;oBACnB,aAAa,CAAC,OAAO,EAAE,CAAC;gBAC1B,CAAC,CAAC,CAAC;gBACH,YAAY,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;oBAC5B,eAAe,EAAE,CAAC;gBACpB,CAAC,CAAC,CAAC;YACL,CAAC,CACF,CAAC;YACF,cAAc,CAAC,UAAU,GAAG,aAAa,CAAC,UAAU,CAAC;YACrD,OAAO,CAAC,GAAG,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;YACtC,KAAK,MAAM,aAAa,IAAI,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;gBAC7D,cAAc,CAAC,SAAS,CAAC,aAAa,EAAE,IAAI,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,CAAC;YAC9E,CAAC;YACD,KAAK,MAAM,MAAM,IAAI,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,EAAE,CAAC;gBACxD,cAAc,CAAC,SAAS,CAAC,MAAM,EAAE,aAAa,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC;YAClE,CAAC;YACD,aAAa,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE;gBAChC,cAAc,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YAC7B,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,KAAK,EAAE,GAAG,EAAE;gBAC3B,cAAc,CAAC,GAAG,EAAE,CAAC;YACvB,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC7B,cAAc,CAAC,OAAO,EAAE,CAAC;YAC3B,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,GAAG,EAAE;gBAC7B,cAAc,CAAC,GAAG,EAAE,CAAC;YACvB,CAAC,CAAC,CAAC;YACH,aAAa,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;gBAC/B,cAAc,CAAC,GAAG,EAAE,CAAC;gBACrB,cAAc,CAAC,OAAO,EAAE,CAAC;YAC3B,CAAC,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,iCAAiC,EAAE,KAAK,CAAC,CAAC;YACxD,eAAe,CAAC,GAAG,EAAE,2CAA2C,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,kBAAkB,CAC7B,eAA8D;QAE9D,OAAO,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;QACrC,IAAI,CAAC,YAAY,GAAG,eAAe,CAAC;QACpC,IAAI,CAAC,MAAM,CAAC,kBAAkB,CAAC,eAAe,CAAC,CAAC;QAChD,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YAC9C,MAAM,sBAAsB,GAAG,IAAI,CAAC,0BAA0B,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;YAEvF,IAAI,CAAC,sBAAsB,EAAE,CAAC;gBAC5B,IAAI,CAAC,0BAA0B,CAAC,aAAa,CAAC,QAAQ,CAAC,GAAG,aAAa,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,IACE,sBAAsB,CAAC,SAAS,KAAK,aAAa,CAAC,SAAS;oBAC5D,sBAAsB,CAAC,UAAU,KAAK,aAAa,CAAC,UAAU,EAC9D,CAAC;oBACD,SAAS;gBACX,CAAC;qBAAM,CAAC;oBACN,IAAI,CAAC,0BAA0B,CAAC,aAAa,CAAC,QAAQ,CAAC,GAAG,aAAa,CAAC;gBAC1E,CAAC;YACH,CAAC;YAED,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,aAAa,CAAC,QAAQ,EAAE;gBAClD,IAAI,EAAE,aAAa,CAAC,SAAS;gBAC7B,GAAG,EAAE,aAAa,CAAC,UAAU;aAC9B,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,iBAAiB,CAAC,UAAqC;QAClE,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YAChD,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,GAAG,UAAU,CAAC,SAAS,CAAC,CAAC;QACzD,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,IAAI;QACf,MAAM,IAAI,GAAG,OAAO,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;QAC1C,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,GAAG,EAAE;YAC1B,IAAI,CAAC,OAAO,EAAE,CAAC;QACjB,CAAC,CAAC,CAAC;QACH,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;YAC/C,MAAM,CAAC,OAAO,EAAE,CAAC;QACnB,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,CAAC;QACnB,aAAa,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC;QACtC,OAAO,CAAC,GAAG,CAAC,yEAAyE,CAAC,CAAC;IACzF,CAAC;CACF"}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
export declare class Port80Handler {
|
|
2
|
+
private domainCertificates;
|
|
3
|
+
private server;
|
|
4
|
+
private acmeClient;
|
|
5
|
+
private accountKey;
|
|
6
|
+
constructor();
|
|
7
|
+
/**
|
|
8
|
+
* Adds a domain to be managed.
|
|
9
|
+
* @param domain The domain to add.
|
|
10
|
+
*/
|
|
11
|
+
addDomain(domain: string): void;
|
|
12
|
+
/**
|
|
13
|
+
* Removes a domain from management.
|
|
14
|
+
* @param domain The domain to remove.
|
|
15
|
+
*/
|
|
16
|
+
removeDomain(domain: string): void;
|
|
17
|
+
/**
|
|
18
|
+
* Lazy initialization of the ACME client.
|
|
19
|
+
* Uses Let’s Encrypt’s production directory (for testing you might switch to staging).
|
|
20
|
+
*/
|
|
21
|
+
private getAcmeClient;
|
|
22
|
+
/**
|
|
23
|
+
* Handles incoming HTTP requests on port 80.
|
|
24
|
+
* If the request is for an ACME challenge, it responds with the key authorization.
|
|
25
|
+
* If the domain has a certificate, it redirects to HTTPS; otherwise, it initiates certificate issuance.
|
|
26
|
+
*/
|
|
27
|
+
private handleRequest;
|
|
28
|
+
/**
|
|
29
|
+
* Serves the ACME HTTP-01 challenge response.
|
|
30
|
+
*/
|
|
31
|
+
private handleAcmeChallenge;
|
|
32
|
+
/**
|
|
33
|
+
* Uses acme-client to perform a full ACME HTTP-01 challenge to obtain a certificate.
|
|
34
|
+
* On success, it stores the certificate and key in memory and clears challenge data.
|
|
35
|
+
*/
|
|
36
|
+
private obtainCertificate;
|
|
37
|
+
}
|