@push.rocks/smartproxy 3.37.0 → 3.37.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,45 @@
1
+ import { Buffer } from 'buffer';
2
+ /**
3
+ * SNI (Server Name Indication) handler for TLS connections.
4
+ * Provides robust extraction of SNI values from TLS ClientHello messages.
5
+ */
6
+ export declare class SniHandler {
7
+ private static readonly TLS_HANDSHAKE_RECORD_TYPE;
8
+ private static readonly TLS_CLIENT_HELLO_HANDSHAKE_TYPE;
9
+ private static readonly TLS_SNI_EXTENSION_TYPE;
10
+ private static readonly TLS_SESSION_TICKET_EXTENSION_TYPE;
11
+ private static readonly TLS_SNI_HOST_NAME_TYPE;
12
+ /**
13
+ * Checks if a buffer contains a TLS handshake message (record type 22)
14
+ * @param buffer - The buffer to check
15
+ * @returns true if the buffer starts with a TLS handshake record type
16
+ */
17
+ static isTlsHandshake(buffer: Buffer): boolean;
18
+ /**
19
+ * Checks if a buffer contains a TLS ClientHello message
20
+ * @param buffer - The buffer to check
21
+ * @returns true if the buffer appears to be a ClientHello message
22
+ */
23
+ static isClientHello(buffer: Buffer): boolean;
24
+ /**
25
+ * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
26
+ * Implements robust parsing with support for session resumption edge cases.
27
+ *
28
+ * @param buffer - The buffer containing the TLS ClientHello message
29
+ * @param enableLogging - Whether to enable detailed debug logging
30
+ * @returns The extracted server name or undefined if not found
31
+ */
32
+ static extractSNI(buffer: Buffer, enableLogging?: boolean): string | undefined;
33
+ /**
34
+ * Attempts to extract SNI from an initial ClientHello packet and handles
35
+ * session resumption edge cases more robustly than the standard extraction.
36
+ *
37
+ * This method is specifically designed for Chrome and other browsers that
38
+ * may send different ClientHello formats during session resumption.
39
+ *
40
+ * @param buffer - The buffer containing the TLS ClientHello message
41
+ * @param enableLogging - Whether to enable detailed debug logging
42
+ * @returns The extracted server name or undefined if not found
43
+ */
44
+ static extractSNIWithResumptionSupport(buffer: Buffer, enableLogging?: boolean): string | undefined;
45
+ }
@@ -0,0 +1,274 @@
1
+ import { Buffer } from 'buffer';
2
+ /**
3
+ * SNI (Server Name Indication) handler for TLS connections.
4
+ * Provides robust extraction of SNI values from TLS ClientHello messages.
5
+ */
6
+ export class SniHandler {
7
+ // TLS record types and constants
8
+ static { this.TLS_HANDSHAKE_RECORD_TYPE = 22; }
9
+ static { this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE = 1; }
10
+ static { this.TLS_SNI_EXTENSION_TYPE = 0x0000; }
11
+ static { this.TLS_SESSION_TICKET_EXTENSION_TYPE = 0x0023; }
12
+ static { this.TLS_SNI_HOST_NAME_TYPE = 0; }
13
+ /**
14
+ * Checks if a buffer contains a TLS handshake message (record type 22)
15
+ * @param buffer - The buffer to check
16
+ * @returns true if the buffer starts with a TLS handshake record type
17
+ */
18
+ static isTlsHandshake(buffer) {
19
+ return buffer.length > 0 && buffer[0] === this.TLS_HANDSHAKE_RECORD_TYPE;
20
+ }
21
+ /**
22
+ * Checks if a buffer contains a TLS ClientHello message
23
+ * @param buffer - The buffer to check
24
+ * @returns true if the buffer appears to be a ClientHello message
25
+ */
26
+ static isClientHello(buffer) {
27
+ // Minimum ClientHello size (TLS record header + handshake header)
28
+ if (buffer.length < 9) {
29
+ return false;
30
+ }
31
+ // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE)
32
+ if (buffer[0] !== this.TLS_HANDSHAKE_RECORD_TYPE) {
33
+ return false;
34
+ }
35
+ // Skip version and length in TLS record header (5 bytes total)
36
+ // Check handshake type at byte 5 (must be CLIENT_HELLO)
37
+ return buffer[5] === this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE;
38
+ }
39
+ /**
40
+ * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
41
+ * Implements robust parsing with support for session resumption edge cases.
42
+ *
43
+ * @param buffer - The buffer containing the TLS ClientHello message
44
+ * @param enableLogging - Whether to enable detailed debug logging
45
+ * @returns The extracted server name or undefined if not found
46
+ */
47
+ static extractSNI(buffer, enableLogging = false) {
48
+ // Logging helper
49
+ const log = (message) => {
50
+ if (enableLogging) {
51
+ console.log(`[SNI Extraction] ${message}`);
52
+ }
53
+ };
54
+ try {
55
+ // Buffer must be at least 5 bytes (TLS record header)
56
+ if (buffer.length < 5) {
57
+ log('Buffer too small for TLS record header');
58
+ return undefined;
59
+ }
60
+ // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE = 22)
61
+ if (buffer[0] !== this.TLS_HANDSHAKE_RECORD_TYPE) {
62
+ log(`Not a TLS handshake record: ${buffer[0]}`);
63
+ return undefined;
64
+ }
65
+ // Check TLS version
66
+ const majorVersion = buffer[1];
67
+ const minorVersion = buffer[2];
68
+ log(`TLS version: ${majorVersion}.${minorVersion}`);
69
+ // Parse record length (bytes 3-4, big-endian)
70
+ const recordLength = (buffer[3] << 8) + buffer[4];
71
+ log(`Record length: ${recordLength}`);
72
+ // Validate record length against buffer size
73
+ if (buffer.length < recordLength + 5) {
74
+ log('Buffer smaller than expected record length');
75
+ return undefined;
76
+ }
77
+ // Start of handshake message in the buffer
78
+ let pos = 5;
79
+ // Check handshake type (must be CLIENT_HELLO = 1)
80
+ if (buffer[pos] !== this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE) {
81
+ log(`Not a ClientHello message: ${buffer[pos]}`);
82
+ return undefined;
83
+ }
84
+ // Skip handshake type (1 byte)
85
+ pos += 1;
86
+ // Parse handshake length (3 bytes, big-endian)
87
+ const handshakeLength = (buffer[pos] << 16) + (buffer[pos + 1] << 8) + buffer[pos + 2];
88
+ log(`Handshake length: ${handshakeLength}`);
89
+ // Skip handshake length (3 bytes)
90
+ pos += 3;
91
+ // Check client version (2 bytes)
92
+ const clientMajorVersion = buffer[pos];
93
+ const clientMinorVersion = buffer[pos + 1];
94
+ log(`Client version: ${clientMajorVersion}.${clientMinorVersion}`);
95
+ // Skip client version (2 bytes)
96
+ pos += 2;
97
+ // Skip client random (32 bytes)
98
+ pos += 32;
99
+ // Parse session ID
100
+ if (pos + 1 > buffer.length) {
101
+ log('Buffer too small for session ID length');
102
+ return undefined;
103
+ }
104
+ const sessionIdLength = buffer[pos];
105
+ log(`Session ID length: ${sessionIdLength}`);
106
+ // Skip session ID length (1 byte) and session ID
107
+ pos += 1 + sessionIdLength;
108
+ // Check if we have enough bytes left
109
+ if (pos + 2 > buffer.length) {
110
+ log('Buffer too small for cipher suites length');
111
+ return undefined;
112
+ }
113
+ // Parse cipher suites length (2 bytes, big-endian)
114
+ const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
115
+ log(`Cipher suites length: ${cipherSuitesLength}`);
116
+ // Skip cipher suites length (2 bytes) and cipher suites
117
+ pos += 2 + cipherSuitesLength;
118
+ // Check if we have enough bytes left
119
+ if (pos + 1 > buffer.length) {
120
+ log('Buffer too small for compression methods length');
121
+ return undefined;
122
+ }
123
+ // Parse compression methods length (1 byte)
124
+ const compressionMethodsLength = buffer[pos];
125
+ log(`Compression methods length: ${compressionMethodsLength}`);
126
+ // Skip compression methods length (1 byte) and compression methods
127
+ pos += 1 + compressionMethodsLength;
128
+ // Check if we have enough bytes for extensions length
129
+ if (pos + 2 > buffer.length) {
130
+ log('No extensions present or buffer too small');
131
+ return undefined;
132
+ }
133
+ // Parse extensions length (2 bytes, big-endian)
134
+ const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
135
+ log(`Extensions length: ${extensionsLength}`);
136
+ // Skip extensions length (2 bytes)
137
+ pos += 2;
138
+ // Extensions end position
139
+ const extensionsEnd = pos + extensionsLength;
140
+ // Check if extensions length is valid
141
+ if (extensionsEnd > buffer.length) {
142
+ log('Extensions length exceeds buffer size');
143
+ return undefined;
144
+ }
145
+ // Track if we found session tickets (for improved resumption handling)
146
+ let hasSessionTicket = false;
147
+ // Iterate through extensions
148
+ while (pos + 4 <= extensionsEnd) {
149
+ // Parse extension type (2 bytes, big-endian)
150
+ const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
151
+ log(`Extension type: 0x${extensionType.toString(16).padStart(4, '0')}`);
152
+ // Skip extension type (2 bytes)
153
+ pos += 2;
154
+ // Parse extension length (2 bytes, big-endian)
155
+ const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
156
+ log(`Extension length: ${extensionLength}`);
157
+ // Skip extension length (2 bytes)
158
+ pos += 2;
159
+ // Check if this is the SNI extension
160
+ if (extensionType === this.TLS_SNI_EXTENSION_TYPE) {
161
+ log('Found SNI extension');
162
+ // Ensure we have enough bytes for the server name list
163
+ if (pos + 2 > extensionsEnd) {
164
+ log('Extension too small for server name list length');
165
+ pos += extensionLength; // Skip this extension
166
+ continue;
167
+ }
168
+ // Parse server name list length (2 bytes, big-endian)
169
+ const serverNameListLength = (buffer[pos] << 8) + buffer[pos + 1];
170
+ log(`Server name list length: ${serverNameListLength}`);
171
+ // Skip server name list length (2 bytes)
172
+ pos += 2;
173
+ // Ensure server name list length is valid
174
+ if (pos + serverNameListLength > extensionsEnd) {
175
+ log('Server name list length exceeds extension size');
176
+ break; // Exit the loop, extension parsing is broken
177
+ }
178
+ // End position of server name list
179
+ const serverNameListEnd = pos + serverNameListLength;
180
+ // Iterate through server names
181
+ while (pos + 3 <= serverNameListEnd) {
182
+ // Check name type (must be HOST_NAME_TYPE = 0 for hostname)
183
+ const nameType = buffer[pos];
184
+ log(`Name type: ${nameType}`);
185
+ if (nameType !== this.TLS_SNI_HOST_NAME_TYPE) {
186
+ log(`Unsupported name type: ${nameType}`);
187
+ pos += 1; // Skip name type (1 byte)
188
+ // Skip name length (2 bytes) and name data
189
+ if (pos + 2 <= serverNameListEnd) {
190
+ const nameLength = (buffer[pos] << 8) + buffer[pos + 1];
191
+ pos += 2 + nameLength;
192
+ }
193
+ else {
194
+ log('Invalid server name entry');
195
+ break;
196
+ }
197
+ continue;
198
+ }
199
+ // Skip name type (1 byte)
200
+ pos += 1;
201
+ // Ensure we have enough bytes for name length
202
+ if (pos + 2 > serverNameListEnd) {
203
+ log('Server name entry too small for name length');
204
+ break;
205
+ }
206
+ // Parse name length (2 bytes, big-endian)
207
+ const nameLength = (buffer[pos] << 8) + buffer[pos + 1];
208
+ log(`Name length: ${nameLength}`);
209
+ // Skip name length (2 bytes)
210
+ pos += 2;
211
+ // Ensure we have enough bytes for the name
212
+ if (pos + nameLength > serverNameListEnd) {
213
+ log('Name length exceeds server name list size');
214
+ break;
215
+ }
216
+ // Extract server name (hostname)
217
+ const serverName = buffer.slice(pos, pos + nameLength).toString('utf8');
218
+ log(`Extracted server name: ${serverName}`);
219
+ return serverName;
220
+ }
221
+ }
222
+ else if (extensionType === this.TLS_SESSION_TICKET_EXTENSION_TYPE) {
223
+ // If we encounter a session ticket extension, mark it for later
224
+ log('Found session ticket extension');
225
+ hasSessionTicket = true;
226
+ pos += extensionLength; // Skip this extension
227
+ }
228
+ else {
229
+ // Skip this extension
230
+ pos += extensionLength;
231
+ }
232
+ }
233
+ // Log if we found a session ticket but no SNI
234
+ if (hasSessionTicket) {
235
+ log('Session ticket present but no SNI found - possible resumption scenario');
236
+ }
237
+ log('No SNI extension found in ClientHello');
238
+ return undefined;
239
+ }
240
+ catch (error) {
241
+ log(`Error parsing SNI: ${error instanceof Error ? error.message : String(error)}`);
242
+ return undefined;
243
+ }
244
+ }
245
+ /**
246
+ * Attempts to extract SNI from an initial ClientHello packet and handles
247
+ * session resumption edge cases more robustly than the standard extraction.
248
+ *
249
+ * This method is specifically designed for Chrome and other browsers that
250
+ * may send different ClientHello formats during session resumption.
251
+ *
252
+ * @param buffer - The buffer containing the TLS ClientHello message
253
+ * @param enableLogging - Whether to enable detailed debug logging
254
+ * @returns The extracted server name or undefined if not found
255
+ */
256
+ static extractSNIWithResumptionSupport(buffer, enableLogging = false) {
257
+ // First try the standard SNI extraction
258
+ const standardSni = this.extractSNI(buffer, enableLogging);
259
+ if (standardSni) {
260
+ return standardSni;
261
+ }
262
+ // If standard extraction failed and we have a valid ClientHello,
263
+ // this might be a session resumption with non-standard format
264
+ if (this.isClientHello(buffer)) {
265
+ if (enableLogging) {
266
+ console.log('[SNI Extraction] Detected ClientHello without standard SNI, possible session resumption');
267
+ }
268
+ // Additional handling could be implemented here for specific browser behaviors
269
+ // For now, this is a placeholder for future improvements
270
+ }
271
+ return undefined;
272
+ }
273
+ }
274
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.snihandler.js","sourceRoot":"","sources":["../ts/classes.snihandler.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAEhC;;;GAGG;AACH,MAAM,OAAO,UAAU;IACrB,iCAAiC;aACT,8BAAyB,GAAG,EAAE,CAAC;aAC/B,oCAA+B,GAAG,CAAC,CAAC;aACpC,2BAAsB,GAAG,MAAM,CAAC;aAChC,sCAAiC,GAAG,MAAM,CAAC;aAC3C,2BAAsB,GAAG,CAAC,CAAC;IAEnD;;;;OAIG;IACI,MAAM,CAAC,cAAc,CAAC,MAAc;QACzC,OAAO,MAAM,CAAC,MAAM,GAAG,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,CAAC;IAC3E,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,aAAa,CAAC,MAAc;QACxC,kEAAkE;QAClE,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACtB,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wDAAwD;QACxD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,EAAE,CAAC;YACjD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,+DAA+D;QAC/D,wDAAwD;QACxD,OAAO,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,+BAA+B,CAAC;IAC5D,CAAC;IAED;;;;;;;OAOG;IACI,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,gBAAyB,KAAK;QACrE,iBAAiB;QACjB,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,oBAAoB,OAAO,EAAE,CAAC,CAAC;YAC7C,CAAC;QACH,CAAC,CAAC;QAEF,IAAI,CAAC;YACH,sDAAsD;YACtD,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtB,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBAC9C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,6DAA6D;YAC7D,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,EAAE,CAAC;gBACjD,GAAG,CAAC,+BAA+B,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;gBAChD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,oBAAoB;YACpB,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,GAAG,CAAC,gBAAgB,YAAY,IAAI,YAAY,EAAE,CAAC,CAAC;YAEpD,8CAA8C;YAC9C,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClD,GAAG,CAAC,kBAAkB,YAAY,EAAE,CAAC,CAAC;YAEtC,6CAA6C;YAC7C,IAAI,MAAM,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gBACrC,GAAG,CAAC,4CAA4C,CAAC,CAAC;gBAClD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,2CAA2C;YAC3C,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,kDAAkD;YAClD,IAAI,MAAM,CAAC,GAAG,CAAC,KAAK,IAAI,CAAC,+BAA+B,EAAE,CAAC;gBACzD,GAAG,CAAC,8BAA8B,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,+BAA+B;YAC/B,GAAG,IAAI,CAAC,CAAC;YAET,+CAA+C;YAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YACvF,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;YAE5C,kCAAkC;YAClC,GAAG,IAAI,CAAC,CAAC;YAET,iCAAiC;YACjC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC3C,GAAG,CAAC,mBAAmB,kBAAkB,IAAI,kBAAkB,EAAE,CAAC,CAAC;YAEnE,gCAAgC;YAChC,GAAG,IAAI,CAAC,CAAC;YAET,gCAAgC;YAChC,GAAG,IAAI,EAAE,CAAC;YAEV,mBAAmB;YACnB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBAC9C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,GAAG,CAAC,sBAAsB,eAAe,EAAE,CAAC,CAAC;YAE7C,iDAAiD;YACjD,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;YAE3B,qCAAqC;YACrC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,mDAAmD;YACnD,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,CAAC,yBAAyB,kBAAkB,EAAE,CAAC,CAAC;YAEnD,wDAAwD;YACxD,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;YAE9B,qCAAqC;YACrC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,iDAAiD,CAAC,CAAC;gBACvD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,4CAA4C;YAC5C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,CAAC,+BAA+B,wBAAwB,EAAE,CAAC,CAAC;YAE/D,mEAAmE;YACnE,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;YAEpC,sDAAsD;YACtD,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,gDAAgD;YAChD,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,CAAC,sBAAsB,gBAAgB,EAAE,CAAC,CAAC;YAE9C,mCAAmC;YACnC,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAE7C,sCAAsC;YACtC,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClC,GAAG,CAAC,uCAAuC,CAAC,CAAC;gBAC7C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,uEAAuE;YACvE,IAAI,gBAAgB,GAAG,KAAK,CAAC;YAE7B,6BAA6B;YAC7B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,6CAA6C;gBAC7C,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,CAAC,qBAAqB,aAAa,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;gBAExE,gCAAgC;gBAChC,GAAG,IAAI,CAAC,CAAC;gBAET,+CAA+C;gBAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;gBAE5C,kCAAkC;gBAClC,GAAG,IAAI,CAAC,CAAC;gBAET,qCAAqC;gBACrC,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBAClD,GAAG,CAAC,qBAAqB,CAAC,CAAC;oBAE3B,uDAAuD;oBACvD,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa,EAAE,CAAC;wBAC5B,GAAG,CAAC,iDAAiD,CAAC,CAAC;wBACvD,GAAG,IAAI,eAAe,CAAC,CAAC,sBAAsB;wBAC9C,SAAS;oBACX,CAAC;oBAED,sDAAsD;oBACtD,MAAM,oBAAoB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAClE,GAAG,CAAC,4BAA4B,oBAAoB,EAAE,CAAC,CAAC;oBAExD,yCAAyC;oBACzC,GAAG,IAAI,CAAC,CAAC;oBAET,0CAA0C;oBAC1C,IAAI,GAAG,GAAG,oBAAoB,GAAG,aAAa,EAAE,CAAC;wBAC/C,GAAG,CAAC,gDAAgD,CAAC,CAAC;wBACtD,MAAM,CAAC,6CAA6C;oBACtD,CAAC;oBAED,mCAAmC;oBACnC,MAAM,iBAAiB,GAAG,GAAG,GAAG,oBAAoB,CAAC;oBAErD,+BAA+B;oBAC/B,OAAO,GAAG,GAAG,CAAC,IAAI,iBAAiB,EAAE,CAAC;wBACpC,4DAA4D;wBAC5D,MAAM,QAAQ,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;wBAC7B,GAAG,CAAC,cAAc,QAAQ,EAAE,CAAC,CAAC;wBAE9B,IAAI,QAAQ,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;4BAC7C,GAAG,CAAC,0BAA0B,QAAQ,EAAE,CAAC,CAAC;4BAC1C,GAAG,IAAI,CAAC,CAAC,CAAC,0BAA0B;4BAEpC,2CAA2C;4BAC3C,IAAI,GAAG,GAAG,CAAC,IAAI,iBAAiB,EAAE,CAAC;gCACjC,MAAM,UAAU,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gCACxD,GAAG,IAAI,CAAC,GAAG,UAAU,CAAC;4BACxB,CAAC;iCAAM,CAAC;gCACN,GAAG,CAAC,2BAA2B,CAAC,CAAC;gCACjC,MAAM;4BACR,CAAC;4BACD,SAAS;wBACX,CAAC;wBAED,0BAA0B;wBAC1B,GAAG,IAAI,CAAC,CAAC;wBAET,8CAA8C;wBAC9C,IAAI,GAAG,GAAG,CAAC,GAAG,iBAAiB,EAAE,CAAC;4BAChC,GAAG,CAAC,6CAA6C,CAAC,CAAC;4BACnD,MAAM;wBACR,CAAC;wBAED,0CAA0C;wBAC1C,MAAM,UAAU,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;wBACxD,GAAG,CAAC,gBAAgB,UAAU,EAAE,CAAC,CAAC;wBAElC,6BAA6B;wBAC7B,GAAG,IAAI,CAAC,CAAC;wBAET,2CAA2C;wBAC3C,IAAI,GAAG,GAAG,UAAU,GAAG,iBAAiB,EAAE,CAAC;4BACzC,GAAG,CAAC,2CAA2C,CAAC,CAAC;4BACjD,MAAM;wBACR,CAAC;wBAED,iCAAiC;wBACjC,MAAM,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,UAAU,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;wBACxE,GAAG,CAAC,0BAA0B,UAAU,EAAE,CAAC,CAAC;wBAC5C,OAAO,UAAU,CAAC;oBACpB,CAAC;gBACH,CAAC;qBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,iCAAiC,EAAE,CAAC;oBACpE,gEAAgE;oBAChE,GAAG,CAAC,gCAAgC,CAAC,CAAC;oBACtC,gBAAgB,GAAG,IAAI,CAAC;oBACxB,GAAG,IAAI,eAAe,CAAC,CAAC,sBAAsB;gBAChD,CAAC;qBAAM,CAAC;oBACN,sBAAsB;oBACtB,GAAG,IAAI,eAAe,CAAC;gBACzB,CAAC;YACH,CAAC;YAED,8CAA8C;YAC9C,IAAI,gBAAgB,EAAE,CAAC;gBACrB,GAAG,CAAC,wEAAwE,CAAC,CAAC;YAChF,CAAC;YAED,GAAG,CAAC,uCAAuC,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,sBAAsB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;;OAUG;IACI,MAAM,CAAC,+BAA+B,CAC3C,MAAc,EACd,gBAAyB,KAAK;QAE9B,wCAAwC;QACxC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;QAC3D,IAAI,WAAW,EAAE,CAAC;YAChB,OAAO,WAAW,CAAC;QACrB,CAAC;QAED,iEAAiE;QACjE,8DAA8D;QAC9D,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,yFAAyF,CAAC,CAAC;YACzG,CAAC;YAED,+EAA+E;YAC/E,yDAAyD;QAC3D,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC"}
@@ -3,3 +3,4 @@ export * from './classes.networkproxy.js';
3
3
  export * from './classes.portproxy.js';
4
4
  export * from './classes.port80handler.js';
5
5
  export * from './classes.sslredirect.js';
6
+ export * from './classes.snihandler.js';
package/dist_ts/index.js CHANGED
@@ -3,4 +3,5 @@ export * from './classes.networkproxy.js';
3
3
  export * from './classes.portproxy.js';
4
4
  export * from './classes.port80handler.js';
5
5
  export * from './classes.sslredirect.js';
6
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi90cy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMkJBQTJCLENBQUM7QUFDMUMsY0FBYyx3QkFBd0IsQ0FBQztBQUN2QyxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMEJBQTBCLENBQUMifQ==
6
+ export * from './classes.snihandler.js';
7
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi90cy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMkJBQTJCLENBQUM7QUFDMUMsY0FBYyx3QkFBd0IsQ0FBQztBQUN2QyxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMEJBQTBCLENBQUM7QUFDekMsY0FBYyx5QkFBeUIsQ0FBQyJ9
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@push.rocks/smartproxy",
3
- "version": "3.37.0",
3
+ "version": "3.37.2",
4
4
  "private": false,
5
5
  "description": "A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, dynamic routing with authentication options, and automatic ACME certificate management.",
6
6
  "main": "dist_ts/index.js",
@@ -3,6 +3,6 @@
3
3
  */
4
4
  export const commitinfo = {
5
5
  name: '@push.rocks/smartproxy',
6
- version: '3.37.0',
6
+ version: '3.37.2',
7
7
  description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, dynamic routing with authentication options, and automatic ACME certificate management.'
8
8
  }