@push.rocks/smartproxy 3.41.8 → 4.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +2 -2
- package/dist_ts/classes.pp.acmemanager.d.ts +34 -0
- package/dist_ts/classes.pp.acmemanager.js +123 -0
- package/dist_ts/classes.pp.connectionhandler.d.ts +39 -0
- package/dist_ts/classes.pp.connectionhandler.js +693 -0
- package/dist_ts/classes.pp.connectionmanager.d.ts +78 -0
- package/dist_ts/classes.pp.connectionmanager.js +378 -0
- package/dist_ts/classes.pp.domainconfigmanager.d.ts +55 -0
- package/dist_ts/classes.pp.domainconfigmanager.js +103 -0
- package/dist_ts/classes.pp.interfaces.d.ts +109 -0
- package/dist_ts/classes.pp.interfaces.js +2 -0
- package/dist_ts/classes.pp.networkproxybridge.d.ts +43 -0
- package/dist_ts/classes.pp.networkproxybridge.js +211 -0
- package/dist_ts/classes.pp.portproxy.d.ts +48 -0
- package/dist_ts/classes.pp.portproxy.js +268 -0
- package/dist_ts/classes.pp.portrangemanager.d.ts +56 -0
- package/dist_ts/classes.pp.portrangemanager.js +179 -0
- package/dist_ts/classes.pp.securitymanager.d.ts +47 -0
- package/dist_ts/classes.pp.securitymanager.js +126 -0
- package/dist_ts/classes.pp.snihandler.d.ts +160 -0
- package/dist_ts/classes.pp.snihandler.js +1073 -0
- package/dist_ts/classes.pp.timeoutmanager.d.ts +47 -0
- package/dist_ts/classes.pp.timeoutmanager.js +154 -0
- package/dist_ts/classes.pp.tlsmanager.d.ts +57 -0
- package/dist_ts/classes.pp.tlsmanager.js +132 -0
- package/dist_ts/index.d.ts +2 -2
- package/dist_ts/index.js +3 -3
- package/package.json +1 -1
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/classes.pp.acmemanager.ts +149 -0
- package/ts/classes.pp.connectionhandler.ts +982 -0
- package/ts/classes.pp.connectionmanager.ts +446 -0
- package/ts/classes.pp.domainconfigmanager.ts +123 -0
- package/ts/classes.pp.interfaces.ts +136 -0
- package/ts/classes.pp.networkproxybridge.ts +258 -0
- package/ts/classes.pp.portproxy.ts +344 -0
- package/ts/classes.pp.portrangemanager.ts +214 -0
- package/ts/classes.pp.securitymanager.ts +147 -0
- package/ts/{classes.snihandler.ts → classes.pp.snihandler.ts} +2 -169
- package/ts/classes.pp.timeoutmanager.ts +190 -0
- package/ts/classes.pp.tlsmanager.ts +206 -0
- package/ts/index.ts +2 -2
- package/ts/classes.portproxy.ts +0 -2503
|
@@ -0,0 +1,109 @@
|
|
|
1
|
+
import * as plugins from './plugins.js';
|
|
2
|
+
/** Domain configuration with per-domain allowed port ranges */
|
|
3
|
+
export interface IDomainConfig {
|
|
4
|
+
domains: string[];
|
|
5
|
+
allowedIPs: string[];
|
|
6
|
+
blockedIPs?: string[];
|
|
7
|
+
targetIPs?: string[];
|
|
8
|
+
portRanges?: Array<{
|
|
9
|
+
from: number;
|
|
10
|
+
to: number;
|
|
11
|
+
}>;
|
|
12
|
+
connectionTimeout?: number;
|
|
13
|
+
useNetworkProxy?: boolean;
|
|
14
|
+
networkProxyPort?: number;
|
|
15
|
+
}
|
|
16
|
+
/** Port proxy settings including global allowed port ranges */
|
|
17
|
+
export interface IPortProxySettings {
|
|
18
|
+
fromPort: number;
|
|
19
|
+
toPort: number;
|
|
20
|
+
targetIP?: string;
|
|
21
|
+
domainConfigs: IDomainConfig[];
|
|
22
|
+
sniEnabled?: boolean;
|
|
23
|
+
defaultAllowedIPs?: string[];
|
|
24
|
+
defaultBlockedIPs?: string[];
|
|
25
|
+
preserveSourceIP?: boolean;
|
|
26
|
+
pfx?: Buffer;
|
|
27
|
+
key?: string | Buffer | Array<Buffer | string>;
|
|
28
|
+
passphrase?: string;
|
|
29
|
+
cert?: string | Buffer | Array<string | Buffer>;
|
|
30
|
+
ca?: string | Buffer | Array<string | Buffer>;
|
|
31
|
+
ciphers?: string;
|
|
32
|
+
honorCipherOrder?: boolean;
|
|
33
|
+
rejectUnauthorized?: boolean;
|
|
34
|
+
secureProtocol?: string;
|
|
35
|
+
servername?: string;
|
|
36
|
+
minVersion?: string;
|
|
37
|
+
maxVersion?: string;
|
|
38
|
+
initialDataTimeout?: number;
|
|
39
|
+
socketTimeout?: number;
|
|
40
|
+
inactivityCheckInterval?: number;
|
|
41
|
+
maxConnectionLifetime?: number;
|
|
42
|
+
inactivityTimeout?: number;
|
|
43
|
+
gracefulShutdownTimeout?: number;
|
|
44
|
+
globalPortRanges: Array<{
|
|
45
|
+
from: number;
|
|
46
|
+
to: number;
|
|
47
|
+
}>;
|
|
48
|
+
forwardAllGlobalRanges?: boolean;
|
|
49
|
+
noDelay?: boolean;
|
|
50
|
+
keepAlive?: boolean;
|
|
51
|
+
keepAliveInitialDelay?: number;
|
|
52
|
+
maxPendingDataSize?: number;
|
|
53
|
+
disableInactivityCheck?: boolean;
|
|
54
|
+
enableKeepAliveProbes?: boolean;
|
|
55
|
+
enableDetailedLogging?: boolean;
|
|
56
|
+
enableTlsDebugLogging?: boolean;
|
|
57
|
+
enableRandomizedTimeouts?: boolean;
|
|
58
|
+
allowSessionTicket?: boolean;
|
|
59
|
+
maxConnectionsPerIP?: number;
|
|
60
|
+
connectionRateLimitPerMinute?: number;
|
|
61
|
+
keepAliveTreatment?: 'standard' | 'extended' | 'immortal';
|
|
62
|
+
keepAliveInactivityMultiplier?: number;
|
|
63
|
+
extendedKeepAliveLifetime?: number;
|
|
64
|
+
useNetworkProxy?: number[];
|
|
65
|
+
networkProxyPort?: number;
|
|
66
|
+
acme?: {
|
|
67
|
+
enabled?: boolean;
|
|
68
|
+
port?: number;
|
|
69
|
+
contactEmail?: string;
|
|
70
|
+
useProduction?: boolean;
|
|
71
|
+
renewThresholdDays?: number;
|
|
72
|
+
autoRenew?: boolean;
|
|
73
|
+
certificateStore?: string;
|
|
74
|
+
skipConfiguredCerts?: boolean;
|
|
75
|
+
};
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* Enhanced connection record
|
|
79
|
+
*/
|
|
80
|
+
export interface IConnectionRecord {
|
|
81
|
+
id: string;
|
|
82
|
+
incoming: plugins.net.Socket;
|
|
83
|
+
outgoing: plugins.net.Socket | null;
|
|
84
|
+
incomingStartTime: number;
|
|
85
|
+
outgoingStartTime?: number;
|
|
86
|
+
outgoingClosedTime?: number;
|
|
87
|
+
lockedDomain?: string;
|
|
88
|
+
connectionClosed: boolean;
|
|
89
|
+
cleanupTimer?: NodeJS.Timeout;
|
|
90
|
+
lastActivity: number;
|
|
91
|
+
pendingData: Buffer[];
|
|
92
|
+
pendingDataSize: number;
|
|
93
|
+
bytesReceived: number;
|
|
94
|
+
bytesSent: number;
|
|
95
|
+
remoteIP: string;
|
|
96
|
+
localPort: number;
|
|
97
|
+
isTLS: boolean;
|
|
98
|
+
tlsHandshakeComplete: boolean;
|
|
99
|
+
hasReceivedInitialData: boolean;
|
|
100
|
+
domainConfig?: IDomainConfig;
|
|
101
|
+
hasKeepAlive: boolean;
|
|
102
|
+
inactivityWarningIssued?: boolean;
|
|
103
|
+
incomingTerminationReason?: string | null;
|
|
104
|
+
outgoingTerminationReason?: string | null;
|
|
105
|
+
usingNetworkProxy?: boolean;
|
|
106
|
+
renegotiationHandler?: (chunk: Buffer) => void;
|
|
107
|
+
isBrowserConnection?: boolean;
|
|
108
|
+
domainSwitches?: number;
|
|
109
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import * as plugins from './plugins.js';
|
|
2
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2xhc3Nlcy5wcC5pbnRlcmZhY2VzLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vdHMvY2xhc3Nlcy5wcC5pbnRlcmZhY2VzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sS0FBSyxPQUFPLE1BQU0sY0FBYyxDQUFDIn0=
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
import * as plugins from './plugins.js';
|
|
2
|
+
import { NetworkProxy } from './classes.networkproxy.js';
|
|
3
|
+
import type { IConnectionRecord, IPortProxySettings } from './classes.pp.interfaces.js';
|
|
4
|
+
/**
|
|
5
|
+
* Manages NetworkProxy integration for TLS termination
|
|
6
|
+
*/
|
|
7
|
+
export declare class NetworkProxyBridge {
|
|
8
|
+
private settings;
|
|
9
|
+
private networkProxy;
|
|
10
|
+
constructor(settings: IPortProxySettings);
|
|
11
|
+
/**
|
|
12
|
+
* Initialize NetworkProxy instance
|
|
13
|
+
*/
|
|
14
|
+
initialize(): Promise<void>;
|
|
15
|
+
/**
|
|
16
|
+
* Get the NetworkProxy instance
|
|
17
|
+
*/
|
|
18
|
+
getNetworkProxy(): NetworkProxy | null;
|
|
19
|
+
/**
|
|
20
|
+
* Get the NetworkProxy port
|
|
21
|
+
*/
|
|
22
|
+
getNetworkProxyPort(): number;
|
|
23
|
+
/**
|
|
24
|
+
* Start NetworkProxy
|
|
25
|
+
*/
|
|
26
|
+
start(): Promise<void>;
|
|
27
|
+
/**
|
|
28
|
+
* Stop NetworkProxy
|
|
29
|
+
*/
|
|
30
|
+
stop(): Promise<void>;
|
|
31
|
+
/**
|
|
32
|
+
* Forwards a TLS connection to a NetworkProxy for handling
|
|
33
|
+
*/
|
|
34
|
+
forwardToNetworkProxy(connectionId: string, socket: plugins.net.Socket, record: IConnectionRecord, initialData: Buffer, customProxyPort?: number, onError?: (reason: string) => void): void;
|
|
35
|
+
/**
|
|
36
|
+
* Synchronizes domain configurations to NetworkProxy
|
|
37
|
+
*/
|
|
38
|
+
syncDomainConfigsToNetworkProxy(): Promise<void>;
|
|
39
|
+
/**
|
|
40
|
+
* Request a certificate for a specific domain
|
|
41
|
+
*/
|
|
42
|
+
requestCertificate(domain: string): Promise<boolean>;
|
|
43
|
+
}
|
|
@@ -0,0 +1,211 @@
|
|
|
1
|
+
import * as plugins from './plugins.js';
|
|
2
|
+
import { NetworkProxy } from './classes.networkproxy.js';
|
|
3
|
+
/**
|
|
4
|
+
* Manages NetworkProxy integration for TLS termination
|
|
5
|
+
*/
|
|
6
|
+
export class NetworkProxyBridge {
|
|
7
|
+
constructor(settings) {
|
|
8
|
+
this.settings = settings;
|
|
9
|
+
this.networkProxy = null;
|
|
10
|
+
}
|
|
11
|
+
/**
|
|
12
|
+
* Initialize NetworkProxy instance
|
|
13
|
+
*/
|
|
14
|
+
async initialize() {
|
|
15
|
+
if (!this.networkProxy && this.settings.useNetworkProxy && this.settings.useNetworkProxy.length > 0) {
|
|
16
|
+
// Configure NetworkProxy options based on PortProxy settings
|
|
17
|
+
const networkProxyOptions = {
|
|
18
|
+
port: this.settings.networkProxyPort,
|
|
19
|
+
portProxyIntegration: true,
|
|
20
|
+
logLevel: this.settings.enableDetailedLogging ? 'debug' : 'info',
|
|
21
|
+
};
|
|
22
|
+
// Add ACME settings if configured
|
|
23
|
+
if (this.settings.acme) {
|
|
24
|
+
networkProxyOptions.acme = { ...this.settings.acme };
|
|
25
|
+
}
|
|
26
|
+
this.networkProxy = new NetworkProxy(networkProxyOptions);
|
|
27
|
+
console.log(`Initialized NetworkProxy on port ${this.settings.networkProxyPort}`);
|
|
28
|
+
// Convert and apply domain configurations to NetworkProxy
|
|
29
|
+
await this.syncDomainConfigsToNetworkProxy();
|
|
30
|
+
}
|
|
31
|
+
}
|
|
32
|
+
/**
|
|
33
|
+
* Get the NetworkProxy instance
|
|
34
|
+
*/
|
|
35
|
+
getNetworkProxy() {
|
|
36
|
+
return this.networkProxy;
|
|
37
|
+
}
|
|
38
|
+
/**
|
|
39
|
+
* Get the NetworkProxy port
|
|
40
|
+
*/
|
|
41
|
+
getNetworkProxyPort() {
|
|
42
|
+
return this.networkProxy ? this.networkProxy.getListeningPort() : this.settings.networkProxyPort || 8443;
|
|
43
|
+
}
|
|
44
|
+
/**
|
|
45
|
+
* Start NetworkProxy
|
|
46
|
+
*/
|
|
47
|
+
async start() {
|
|
48
|
+
if (this.networkProxy) {
|
|
49
|
+
await this.networkProxy.start();
|
|
50
|
+
console.log(`NetworkProxy started on port ${this.settings.networkProxyPort}`);
|
|
51
|
+
// Log ACME status
|
|
52
|
+
if (this.settings.acme?.enabled) {
|
|
53
|
+
console.log(`ACME certificate management is enabled (${this.settings.acme.useProduction ? 'Production' : 'Staging'} mode)`);
|
|
54
|
+
console.log(`ACME HTTP challenge server on port ${this.settings.acme.port}`);
|
|
55
|
+
// Register domains for ACME certificates if enabled
|
|
56
|
+
if (this.networkProxy.options.acme?.enabled) {
|
|
57
|
+
console.log('Registering domains with ACME certificate manager...');
|
|
58
|
+
// The NetworkProxy will handle this internally via registerDomainsWithAcmeManager()
|
|
59
|
+
}
|
|
60
|
+
}
|
|
61
|
+
}
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* Stop NetworkProxy
|
|
65
|
+
*/
|
|
66
|
+
async stop() {
|
|
67
|
+
if (this.networkProxy) {
|
|
68
|
+
try {
|
|
69
|
+
console.log('Stopping NetworkProxy...');
|
|
70
|
+
await this.networkProxy.stop();
|
|
71
|
+
console.log('NetworkProxy stopped successfully');
|
|
72
|
+
// Log ACME shutdown if it was enabled
|
|
73
|
+
if (this.settings.acme?.enabled) {
|
|
74
|
+
console.log('ACME certificate manager stopped');
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
catch (err) {
|
|
78
|
+
console.log(`Error stopping NetworkProxy: ${err}`);
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
/**
|
|
83
|
+
* Forwards a TLS connection to a NetworkProxy for handling
|
|
84
|
+
*/
|
|
85
|
+
forwardToNetworkProxy(connectionId, socket, record, initialData, customProxyPort, onError) {
|
|
86
|
+
// Ensure NetworkProxy is initialized
|
|
87
|
+
if (!this.networkProxy) {
|
|
88
|
+
console.log(`[${connectionId}] NetworkProxy not initialized. Cannot forward connection.`);
|
|
89
|
+
if (onError) {
|
|
90
|
+
onError('network_proxy_not_initialized');
|
|
91
|
+
}
|
|
92
|
+
return;
|
|
93
|
+
}
|
|
94
|
+
// Use the custom port if provided, otherwise use the default NetworkProxy port
|
|
95
|
+
const proxyPort = customProxyPort || this.networkProxy.getListeningPort();
|
|
96
|
+
const proxyHost = 'localhost'; // Assuming NetworkProxy runs locally
|
|
97
|
+
if (this.settings.enableDetailedLogging) {
|
|
98
|
+
console.log(`[${connectionId}] Forwarding TLS connection to NetworkProxy at ${proxyHost}:${proxyPort}`);
|
|
99
|
+
}
|
|
100
|
+
// Create a connection to the NetworkProxy
|
|
101
|
+
const proxySocket = plugins.net.connect({
|
|
102
|
+
host: proxyHost,
|
|
103
|
+
port: proxyPort,
|
|
104
|
+
});
|
|
105
|
+
// Store the outgoing socket in the record
|
|
106
|
+
record.outgoing = proxySocket;
|
|
107
|
+
record.outgoingStartTime = Date.now();
|
|
108
|
+
record.usingNetworkProxy = true;
|
|
109
|
+
// Set up error handlers
|
|
110
|
+
proxySocket.on('error', (err) => {
|
|
111
|
+
console.log(`[${connectionId}] Error connecting to NetworkProxy: ${err.message}`);
|
|
112
|
+
if (onError) {
|
|
113
|
+
onError('network_proxy_connect_error');
|
|
114
|
+
}
|
|
115
|
+
});
|
|
116
|
+
// Handle connection to NetworkProxy
|
|
117
|
+
proxySocket.on('connect', () => {
|
|
118
|
+
if (this.settings.enableDetailedLogging) {
|
|
119
|
+
console.log(`[${connectionId}] Connected to NetworkProxy at ${proxyHost}:${proxyPort}`);
|
|
120
|
+
}
|
|
121
|
+
// First send the initial data that contains the TLS ClientHello
|
|
122
|
+
proxySocket.write(initialData);
|
|
123
|
+
// Now set up bidirectional piping between client and NetworkProxy
|
|
124
|
+
socket.pipe(proxySocket);
|
|
125
|
+
proxySocket.pipe(socket);
|
|
126
|
+
// Update activity on data transfer (caller should handle this)
|
|
127
|
+
if (this.settings.enableDetailedLogging) {
|
|
128
|
+
console.log(`[${connectionId}] TLS connection successfully forwarded to NetworkProxy`);
|
|
129
|
+
}
|
|
130
|
+
});
|
|
131
|
+
}
|
|
132
|
+
/**
|
|
133
|
+
* Synchronizes domain configurations to NetworkProxy
|
|
134
|
+
*/
|
|
135
|
+
async syncDomainConfigsToNetworkProxy() {
|
|
136
|
+
if (!this.networkProxy) {
|
|
137
|
+
console.log('Cannot sync configurations - NetworkProxy not initialized');
|
|
138
|
+
return;
|
|
139
|
+
}
|
|
140
|
+
try {
|
|
141
|
+
// Get SSL certificates from assets
|
|
142
|
+
// Import fs directly since it's not in plugins
|
|
143
|
+
const fs = await import('fs');
|
|
144
|
+
let certPair;
|
|
145
|
+
try {
|
|
146
|
+
certPair = {
|
|
147
|
+
key: fs.readFileSync('assets/certs/key.pem', 'utf8'),
|
|
148
|
+
cert: fs.readFileSync('assets/certs/cert.pem', 'utf8'),
|
|
149
|
+
};
|
|
150
|
+
}
|
|
151
|
+
catch (certError) {
|
|
152
|
+
console.log(`Warning: Could not read default certificates: ${certError}`);
|
|
153
|
+
console.log('Using empty certificate placeholders - ACME will generate proper certificates if enabled');
|
|
154
|
+
// Use empty placeholders - NetworkProxy will use its internal defaults
|
|
155
|
+
// or ACME will generate proper ones if enabled
|
|
156
|
+
certPair = {
|
|
157
|
+
key: '',
|
|
158
|
+
cert: '',
|
|
159
|
+
};
|
|
160
|
+
}
|
|
161
|
+
// Convert domain configs to NetworkProxy configs
|
|
162
|
+
const proxyConfigs = this.networkProxy.convertPortProxyConfigs(this.settings.domainConfigs, certPair);
|
|
163
|
+
// Log ACME-eligible domains if ACME is enabled
|
|
164
|
+
if (this.settings.acme?.enabled) {
|
|
165
|
+
const acmeEligibleDomains = proxyConfigs
|
|
166
|
+
.filter((config) => !config.hostName.includes('*')) // Exclude wildcards
|
|
167
|
+
.map((config) => config.hostName);
|
|
168
|
+
if (acmeEligibleDomains.length > 0) {
|
|
169
|
+
console.log(`Domains eligible for ACME certificates: ${acmeEligibleDomains.join(', ')}`);
|
|
170
|
+
}
|
|
171
|
+
else {
|
|
172
|
+
console.log('No domains eligible for ACME certificates found in configuration');
|
|
173
|
+
}
|
|
174
|
+
}
|
|
175
|
+
// Update NetworkProxy with the converted configs
|
|
176
|
+
await this.networkProxy.updateProxyConfigs(proxyConfigs);
|
|
177
|
+
console.log(`Successfully synchronized ${proxyConfigs.length} domain configurations to NetworkProxy`);
|
|
178
|
+
}
|
|
179
|
+
catch (err) {
|
|
180
|
+
console.log(`Failed to sync configurations: ${err}`);
|
|
181
|
+
}
|
|
182
|
+
}
|
|
183
|
+
/**
|
|
184
|
+
* Request a certificate for a specific domain
|
|
185
|
+
*/
|
|
186
|
+
async requestCertificate(domain) {
|
|
187
|
+
if (!this.networkProxy) {
|
|
188
|
+
console.log('Cannot request certificate - NetworkProxy not initialized');
|
|
189
|
+
return false;
|
|
190
|
+
}
|
|
191
|
+
if (!this.settings.acme?.enabled) {
|
|
192
|
+
console.log('Cannot request certificate - ACME is not enabled');
|
|
193
|
+
return false;
|
|
194
|
+
}
|
|
195
|
+
try {
|
|
196
|
+
const result = await this.networkProxy.requestCertificate(domain);
|
|
197
|
+
if (result) {
|
|
198
|
+
console.log(`Certificate request for ${domain} submitted successfully`);
|
|
199
|
+
}
|
|
200
|
+
else {
|
|
201
|
+
console.log(`Certificate request for ${domain} failed`);
|
|
202
|
+
}
|
|
203
|
+
return result;
|
|
204
|
+
}
|
|
205
|
+
catch (err) {
|
|
206
|
+
console.log(`Error requesting certificate: ${err}`);
|
|
207
|
+
return false;
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.pp.networkproxybridge.js","sourceRoot":"","sources":["../ts/classes.pp.networkproxybridge.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,cAAc,CAAC;AACxC,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AAGzD;;GAEG;AACH,MAAM,OAAO,kBAAkB;IAG7B,YAAoB,QAA4B;QAA5B,aAAQ,GAAR,QAAQ,CAAoB;QAFxC,iBAAY,GAAwB,IAAI,CAAC;IAEE,CAAC;IAEpD;;OAEG;IACI,KAAK,CAAC,UAAU;QACrB,IAAI,CAAC,IAAI,CAAC,YAAY,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,IAAI,IAAI,CAAC,QAAQ,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACpG,6DAA6D;YAC7D,MAAM,mBAAmB,GAAQ;gBAC/B,IAAI,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAiB;gBACrC,oBAAoB,EAAE,IAAI;gBAC1B,QAAQ,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM;aACjE,CAAC;YAEF,kCAAkC;YAClC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACvB,mBAAmB,CAAC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;YACvD,CAAC;YAED,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,CAAC,mBAAmB,CAAC,CAAC;YAE1D,OAAO,CAAC,GAAG,CAAC,oCAAoC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAElF,0DAA0D;YAC1D,MAAM,IAAI,CAAC,+BAA+B,EAAE,CAAC;QAC/C,CAAC;IACH,CAAC;IAED;;OAEG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,IAAI,IAAI,CAAC;IAC3G,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,CAAC;YAChC,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAE9E,kBAAkB;YAClB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;gBAChC,OAAO,CAAC,GAAG,CACT,2CACE,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,SACpD,QAAQ,CACT,CAAC;gBACF,OAAO,CAAC,GAAG,CAAC,sCAAsC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC;gBAE7E,oDAAoD;gBACpD,IAAI,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;oBAC5C,OAAO,CAAC,GAAG,CAAC,sDAAsD,CAAC,CAAC;oBACpE,oFAAoF;gBACtF,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,IAAI,CAAC;gBACH,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC;gBAC/B,OAAO,CAAC,GAAG,CAAC,mCAAmC,CAAC,CAAC;gBAEjD,sCAAsC;gBACtC,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;oBAChC,OAAO,CAAC,GAAG,CAAC,kCAAkC,CAAC,CAAC;gBAClD,CAAC;YACH,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACb,OAAO,CAAC,GAAG,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;YACrD,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACI,qBAAqB,CAC1B,YAAoB,EACpB,MAA0B,EAC1B,MAAyB,EACzB,WAAmB,EACnB,eAAwB,EACxB,OAAkC;QAElC,qCAAqC;QACrC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,4DAA4D,CAC7E,CAAC;YACF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,+BAA+B,CAAC,CAAC;YAC3C,CAAC;YACD,OAAO;QACT,CAAC;QAED,+EAA+E;QAC/E,MAAM,SAAS,GAAG,eAAe,IAAI,IAAI,CAAC,YAAY,CAAC,gBAAgB,EAAE,CAAC;QAC1E,MAAM,SAAS,GAAG,WAAW,CAAC,CAAC,qCAAqC;QAEpE,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACxC,OAAO,CAAC,GAAG,CACT,IAAI,YAAY,kDAAkD,SAAS,IAAI,SAAS,EAAE,CAC3F,CAAC;QACJ,CAAC;QAED,0CAA0C;QAC1C,MAAM,WAAW,GAAG,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC;YACtC,IAAI,EAAE,SAAS;YACf,IAAI,EAAE,SAAS;SAChB,CAAC,CAAC;QAEH,0CAA0C;QAC1C,MAAM,CAAC,QAAQ,GAAG,WAAW,CAAC;QAC9B,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACtC,MAAM,CAAC,iBAAiB,GAAG,IAAI,CAAC;QAEhC,wBAAwB;QACxB,WAAW,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,EAAE;YAC9B,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,uCAAuC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YAClF,IAAI,OAAO,EAAE,CAAC;gBACZ,OAAO,CAAC,6BAA6B,CAAC,CAAC;YACzC,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,oCAAoC;QACpC,WAAW,CAAC,EAAE,CAAC,SAAS,EAAE,GAAG,EAAE;YAC7B,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,kCAAkC,SAAS,IAAI,SAAS,EAAE,CAAC,CAAC;YAC1F,CAAC;YAED,gEAAgE;YAChE,WAAW,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAE/B,kEAAkE;YAClE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YACzB,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEzB,+DAA+D;YAC/D,IAAI,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;gBACxC,OAAO,CAAC,GAAG,CAAC,IAAI,YAAY,yDAAyD,CAAC,CAAC;YACzF,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,+BAA+B;QAC1C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO;QACT,CAAC;QAED,IAAI,CAAC;YACH,mCAAmC;YACnC,+CAA+C;YAC/C,MAAM,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;YAE9B,IAAI,QAAQ,CAAC;YACb,IAAI,CAAC;gBACH,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE,CAAC,YAAY,CAAC,sBAAsB,EAAE,MAAM,CAAC;oBACpD,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,uBAAuB,EAAE,MAAM,CAAC;iBACvD,CAAC;YACJ,CAAC;YAAC,OAAO,SAAS,EAAE,CAAC;gBACnB,OAAO,CAAC,GAAG,CAAC,iDAAiD,SAAS,EAAE,CAAC,CAAC;gBAC1E,OAAO,CAAC,GAAG,CACT,0FAA0F,CAC3F,CAAC;gBAEF,uEAAuE;gBACvE,+CAA+C;gBAC/C,QAAQ,GAAG;oBACT,GAAG,EAAE,EAAE;oBACP,IAAI,EAAE,EAAE;iBACT,CAAC;YACJ,CAAC;YAED,iDAAiD;YACjD,MAAM,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC,uBAAuB,CAC5D,IAAI,CAAC,QAAQ,CAAC,aAAa,EAC3B,QAAQ,CACT,CAAC;YAEF,+CAA+C;YAC/C,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;gBAChC,MAAM,mBAAmB,GAAG,YAAY;qBACrC,MAAM,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,oBAAoB;qBACvE,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAEpC,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACnC,OAAO,CAAC,GAAG,CAAC,2CAA2C,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAC3F,CAAC;qBAAM,CAAC;oBACN,OAAO,CAAC,GAAG,CAAC,kEAAkE,CAAC,CAAC;gBAClF,CAAC;YACH,CAAC;YAED,iDAAiD;YACjD,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;YACzD,OAAO,CAAC,GAAG,CAAC,6BAA6B,YAAY,CAAC,MAAM,wCAAwC,CAAC,CAAC;QACxG,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,kCAAkC,GAAG,EAAE,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC5C,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,2DAA2D,CAAC,CAAC;YACzE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAClE,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,yBAAyB,CAAC,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,2BAA2B,MAAM,SAAS,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,iCAAiC,GAAG,EAAE,CAAC,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF"}
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
import type { IPortProxySettings, IDomainConfig } from './classes.pp.interfaces.js';
|
|
2
|
+
import { DomainConfigManager } from './classes.pp.domainconfigmanager.js';
|
|
3
|
+
/**
|
|
4
|
+
* PortProxy - Main class that coordinates all components
|
|
5
|
+
*/
|
|
6
|
+
export declare class PortProxy {
|
|
7
|
+
private netServers;
|
|
8
|
+
private connectionLogger;
|
|
9
|
+
private isShuttingDown;
|
|
10
|
+
private connectionManager;
|
|
11
|
+
private securityManager;
|
|
12
|
+
domainConfigManager: DomainConfigManager;
|
|
13
|
+
private tlsManager;
|
|
14
|
+
private networkProxyBridge;
|
|
15
|
+
private timeoutManager;
|
|
16
|
+
private acmeManager;
|
|
17
|
+
private portRangeManager;
|
|
18
|
+
private connectionHandler;
|
|
19
|
+
constructor(settingsArg: IPortProxySettings);
|
|
20
|
+
/**
|
|
21
|
+
* The settings for the port proxy
|
|
22
|
+
*/
|
|
23
|
+
settings: IPortProxySettings;
|
|
24
|
+
/**
|
|
25
|
+
* Start the proxy server
|
|
26
|
+
*/
|
|
27
|
+
start(): Promise<void>;
|
|
28
|
+
/**
|
|
29
|
+
* Stop the proxy server
|
|
30
|
+
*/
|
|
31
|
+
stop(): Promise<void>;
|
|
32
|
+
/**
|
|
33
|
+
* Updates the domain configurations for the proxy
|
|
34
|
+
*/
|
|
35
|
+
updateDomainConfigs(newDomainConfigs: IDomainConfig[]): Promise<void>;
|
|
36
|
+
/**
|
|
37
|
+
* Updates the ACME certificate settings
|
|
38
|
+
*/
|
|
39
|
+
updateAcmeSettings(acmeSettings: IPortProxySettings['acme']): Promise<void>;
|
|
40
|
+
/**
|
|
41
|
+
* Requests a certificate for a specific domain
|
|
42
|
+
*/
|
|
43
|
+
requestCertificate(domain: string): Promise<boolean>;
|
|
44
|
+
/**
|
|
45
|
+
* Get statistics about current connections
|
|
46
|
+
*/
|
|
47
|
+
getStatistics(): any;
|
|
48
|
+
}
|