@serve.zone/dcrouter 11.0.35 → 11.0.37

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (90) hide show
  1. package/dist_serve/bundle.js +1 -1
  2. package/dist_ts_web/00_commitinfo_data.js +1 -1
  3. package/package.json +1 -1
  4. package/ts/00_commitinfo_data.ts +1 -1
  5. package/ts_web/00_commitinfo_data.ts +1 -1
  6. package/dist_ts/00_commitinfo_data.d.ts +0 -8
  7. package/dist_ts/00_commitinfo_data.js +0 -9
  8. package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
  9. package/dist_ts/cache/classes.cache.cleaner.js +0 -130
  10. package/dist_ts/cache/classes.cached.document.d.ts +0 -76
  11. package/dist_ts/cache/classes.cached.document.js +0 -100
  12. package/dist_ts/cache/classes.cachedb.d.ts +0 -60
  13. package/dist_ts/cache/classes.cachedb.js +0 -126
  14. package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
  15. package/dist_ts/cache/documents/classes.cached.email.js +0 -337
  16. package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
  17. package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
  18. package/dist_ts/cache/documents/index.d.ts +0 -2
  19. package/dist_ts/cache/documents/index.js +0 -3
  20. package/dist_ts/cache/index.d.ts +0 -4
  21. package/dist_ts/cache/index.js +0 -7
  22. package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -53
  23. package/dist_ts/classes.cert-provision-scheduler.js +0 -110
  24. package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
  25. package/dist_ts/classes.storage-cert-manager.js +0 -43
  26. package/dist_ts/errors/base.errors.js +0 -320
  27. package/dist_ts/errors/error.codes.d.ts +0 -115
  28. package/dist_ts/errors/error.codes.js +0 -136
  29. package/dist_ts/logger.d.ts +0 -21
  30. package/dist_ts/logger.js +0 -81
  31. package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
  32. package/dist_ts/monitoring/classes.metricscache.js +0 -63
  33. package/dist_ts/monitoring/classes.metricsmanager.d.ts +0 -178
  34. package/dist_ts/monitoring/classes.metricsmanager.js +0 -642
  35. package/dist_ts/monitoring/index.d.ts +0 -1
  36. package/dist_ts/monitoring/index.js +0 -2
  37. package/dist_ts/opsserver/classes.opsserver.d.ts +0 -37
  38. package/dist_ts/opsserver/classes.opsserver.js +0 -85
  39. package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
  40. package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
  41. package/dist_ts/opsserver/handlers/api-token.handler.d.ts +0 -6
  42. package/dist_ts/opsserver/handlers/api-token.handler.js +0 -62
  43. package/dist_ts/opsserver/handlers/certificate.handler.d.ts +0 -32
  44. package/dist_ts/opsserver/handlers/certificate.handler.js +0 -421
  45. package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
  46. package/dist_ts/opsserver/handlers/config.handler.js +0 -192
  47. package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +0 -30
  48. package/dist_ts/opsserver/handlers/email-ops.handler.js +0 -227
  49. package/dist_ts/opsserver/handlers/index.d.ts +0 -11
  50. package/dist_ts/opsserver/handlers/index.js +0 -12
  51. package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
  52. package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
  53. package/dist_ts/opsserver/handlers/radius.handler.d.ts +0 -6
  54. package/dist_ts/opsserver/handlers/radius.handler.js +0 -295
  55. package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +0 -6
  56. package/dist_ts/opsserver/handlers/remoteingress.handler.js +0 -156
  57. package/dist_ts/opsserver/handlers/route-management.handler.d.ts +0 -14
  58. package/dist_ts/opsserver/handlers/route-management.handler.js +0 -117
  59. package/dist_ts/opsserver/handlers/security.handler.d.ts +0 -9
  60. package/dist_ts/opsserver/handlers/security.handler.js +0 -231
  61. package/dist_ts/opsserver/handlers/stats.handler.d.ts +0 -11
  62. package/dist_ts/opsserver/handlers/stats.handler.js +0 -399
  63. package/dist_ts/opsserver/helpers/guards.d.ts +0 -27
  64. package/dist_ts/opsserver/helpers/guards.js +0 -43
  65. package/dist_ts/opsserver/index.d.ts +0 -1
  66. package/dist_ts/opsserver/index.js +0 -2
  67. package/dist_ts/paths.d.ts +0 -26
  68. package/dist_ts/paths.js +0 -45
  69. package/dist_ts/plugins.d.ts +0 -79
  70. package/dist_ts/plugins.js +0 -113
  71. package/dist_ts/radius/classes.accounting.manager.d.ts +0 -218
  72. package/dist_ts/radius/classes.accounting.manager.js +0 -417
  73. package/dist_ts/radius/classes.radius.server.d.ts +0 -171
  74. package/dist_ts/radius/classes.radius.server.js +0 -385
  75. package/dist_ts/radius/classes.vlan.manager.d.ts +0 -128
  76. package/dist_ts/radius/classes.vlan.manager.js +0 -279
  77. package/dist_ts/radius/index.d.ts +0 -13
  78. package/dist_ts/radius/index.js +0 -14
  79. package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +0 -82
  80. package/dist_ts/remoteingress/classes.remoteingress-manager.js +0 -227
  81. package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +0 -59
  82. package/dist_ts/remoteingress/classes.tunnel-manager.js +0 -165
  83. package/dist_ts/remoteingress/index.d.ts +0 -2
  84. package/dist_ts/remoteingress/index.js +0 -3
  85. package/dist_ts/security/classes.securitylogger.d.ts +0 -144
  86. package/dist_ts/security/classes.securitylogger.js +0 -233
  87. package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
  88. package/dist_ts/storage/classes.storagemanager.js +0 -350
  89. package/dist_ts/storage/index.d.ts +0 -1
  90. package/dist_ts/storage/index.js +0 -3
@@ -1,59 +0,0 @@
1
- import type { IRemoteIngressStatus } from '../../dist_ts_interfaces/data/remoteingress.js';
2
- import type { RemoteIngressManager } from './classes.remoteingress-manager.js';
3
- export interface ITunnelManagerConfig {
4
- tunnelPort?: number;
5
- targetHost?: string;
6
- tls?: {
7
- certPem?: string;
8
- keyPem?: string;
9
- };
10
- }
11
- /**
12
- * Manages the RemoteIngressHub instance and tracks connected edge statuses.
13
- */
14
- export declare class TunnelManager {
15
- private hub;
16
- private manager;
17
- private config;
18
- private edgeStatuses;
19
- private reconcileInterval;
20
- constructor(manager: RemoteIngressManager, config?: ITunnelManagerConfig);
21
- /**
22
- * Start the tunnel hub and load allowed edges.
23
- */
24
- start(): Promise<void>;
25
- /**
26
- * Stop the tunnel hub.
27
- */
28
- stop(): Promise<void>;
29
- /**
30
- * Reconcile TS-side edge statuses with the authoritative Rust hub status.
31
- * Overwrites event-derived activeTunnels with the real activeStreams count.
32
- */
33
- private reconcile;
34
- /**
35
- * Sync allowed edges from the manager to the hub.
36
- * Call this after creating/deleting/updating edges.
37
- */
38
- syncAllowedEdges(): Promise<void>;
39
- /**
40
- * Get runtime statuses for all known edges.
41
- */
42
- getEdgeStatuses(): IRemoteIngressStatus[];
43
- /**
44
- * Get status for a specific edge.
45
- */
46
- getEdgeStatus(edgeId: string): IRemoteIngressStatus | undefined;
47
- /**
48
- * Get the count of connected edges.
49
- */
50
- getConnectedCount(): number;
51
- /**
52
- * Get the public IPs of all connected edges.
53
- */
54
- getConnectedEdgeIps(): string[];
55
- /**
56
- * Get the total number of active tunnels across all edges.
57
- */
58
- getTotalActiveTunnels(): number;
59
- }
@@ -1,165 +0,0 @@
1
- import * as plugins from '../plugins.js';
2
- /**
3
- * Manages the RemoteIngressHub instance and tracks connected edge statuses.
4
- */
5
- export class TunnelManager {
6
- hub;
7
- manager;
8
- config;
9
- edgeStatuses = new Map();
10
- reconcileInterval = null;
11
- constructor(manager, config = {}) {
12
- this.manager = manager;
13
- this.config = config;
14
- this.hub = new plugins.remoteingress.RemoteIngressHub();
15
- // Listen for edge connect/disconnect events
16
- this.hub.on('edgeConnected', (data) => {
17
- this.edgeStatuses.set(data.edgeId, {
18
- edgeId: data.edgeId,
19
- connected: true,
20
- publicIp: data.peerAddr || null,
21
- activeTunnels: 0,
22
- lastHeartbeat: Date.now(),
23
- connectedAt: Date.now(),
24
- });
25
- });
26
- this.hub.on('edgeDisconnected', (data) => {
27
- this.edgeStatuses.delete(data.edgeId);
28
- });
29
- this.hub.on('streamOpened', (data) => {
30
- const existing = this.edgeStatuses.get(data.edgeId);
31
- if (existing) {
32
- existing.activeTunnels++;
33
- existing.lastHeartbeat = Date.now();
34
- }
35
- });
36
- this.hub.on('streamClosed', (data) => {
37
- const existing = this.edgeStatuses.get(data.edgeId);
38
- if (existing && existing.activeTunnels > 0) {
39
- existing.activeTunnels--;
40
- }
41
- });
42
- }
43
- /**
44
- * Start the tunnel hub and load allowed edges.
45
- */
46
- async start() {
47
- await this.hub.start({
48
- tunnelPort: this.config.tunnelPort ?? 8443,
49
- targetHost: this.config.targetHost ?? '127.0.0.1',
50
- tls: this.config.tls,
51
- });
52
- // Send allowed edges to the hub
53
- await this.syncAllowedEdges();
54
- // Periodically reconcile with authoritative Rust hub status
55
- this.reconcileInterval = setInterval(() => {
56
- this.reconcile().catch(() => { });
57
- }, 15_000);
58
- }
59
- /**
60
- * Stop the tunnel hub.
61
- */
62
- async stop() {
63
- if (this.reconcileInterval) {
64
- clearInterval(this.reconcileInterval);
65
- this.reconcileInterval = null;
66
- }
67
- // Remove event listeners before stopping to prevent leaks
68
- this.hub.removeAllListeners();
69
- await this.hub.stop();
70
- this.edgeStatuses.clear();
71
- }
72
- /**
73
- * Reconcile TS-side edge statuses with the authoritative Rust hub status.
74
- * Overwrites event-derived activeTunnels with the real activeStreams count.
75
- */
76
- async reconcile() {
77
- const hubStatus = await this.hub.getStatus();
78
- if (!hubStatus || !hubStatus.connectedEdges)
79
- return;
80
- const rustEdgeIds = new Set();
81
- for (const rustEdge of hubStatus.connectedEdges) {
82
- rustEdgeIds.add(rustEdge.edgeId);
83
- const existing = this.edgeStatuses.get(rustEdge.edgeId);
84
- if (existing) {
85
- existing.activeTunnels = rustEdge.activeStreams;
86
- existing.lastHeartbeat = Date.now();
87
- // Update peer address if available from Rust hub
88
- if (rustEdge.peerAddr) {
89
- existing.publicIp = rustEdge.peerAddr;
90
- }
91
- }
92
- else {
93
- // Missed edgeConnected event — add entry
94
- this.edgeStatuses.set(rustEdge.edgeId, {
95
- edgeId: rustEdge.edgeId,
96
- connected: true,
97
- publicIp: rustEdge.peerAddr || null,
98
- activeTunnels: rustEdge.activeStreams,
99
- lastHeartbeat: Date.now(),
100
- connectedAt: rustEdge.connectedAt * 1000,
101
- });
102
- }
103
- }
104
- // Remove entries for edges no longer connected in Rust (missed edgeDisconnected)
105
- for (const edgeId of this.edgeStatuses.keys()) {
106
- if (!rustEdgeIds.has(edgeId)) {
107
- this.edgeStatuses.delete(edgeId);
108
- }
109
- }
110
- }
111
- /**
112
- * Sync allowed edges from the manager to the hub.
113
- * Call this after creating/deleting/updating edges.
114
- */
115
- async syncAllowedEdges() {
116
- const edges = this.manager.getAllowedEdges();
117
- await this.hub.updateAllowedEdges(edges);
118
- }
119
- /**
120
- * Get runtime statuses for all known edges.
121
- */
122
- getEdgeStatuses() {
123
- return Array.from(this.edgeStatuses.values());
124
- }
125
- /**
126
- * Get status for a specific edge.
127
- */
128
- getEdgeStatus(edgeId) {
129
- return this.edgeStatuses.get(edgeId);
130
- }
131
- /**
132
- * Get the count of connected edges.
133
- */
134
- getConnectedCount() {
135
- let count = 0;
136
- for (const status of this.edgeStatuses.values()) {
137
- if (status.connected)
138
- count++;
139
- }
140
- return count;
141
- }
142
- /**
143
- * Get the public IPs of all connected edges.
144
- */
145
- getConnectedEdgeIps() {
146
- const ips = [];
147
- for (const status of this.edgeStatuses.values()) {
148
- if (status.connected && status.publicIp) {
149
- ips.push(status.publicIp);
150
- }
151
- }
152
- return ips;
153
- }
154
- /**
155
- * Get the total number of active tunnels across all edges.
156
- */
157
- getTotalActiveTunnels() {
158
- let total = 0;
159
- for (const status of this.edgeStatuses.values()) {
160
- total += status.activeTunnels;
161
- }
162
- return total;
163
- }
164
- }
165
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,2 +0,0 @@
1
- export * from './classes.remoteingress-manager.js';
2
- export * from './classes.tunnel-manager.js';
@@ -1,3 +0,0 @@
1
- export * from './classes.remoteingress-manager.js';
2
- export * from './classes.tunnel-manager.js';
3
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9yZW1vdGVpbmdyZXNzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLGNBQWMsb0NBQW9DLENBQUM7QUFDbkQsY0FBYyw2QkFBNkIsQ0FBQyJ9
@@ -1,144 +0,0 @@
1
- /**
2
- * Log level for security events
3
- */
4
- export declare enum SecurityLogLevel {
5
- INFO = "info",
6
- WARN = "warn",
7
- ERROR = "error",
8
- CRITICAL = "critical"
9
- }
10
- /**
11
- * Security event types for categorization
12
- */
13
- export declare enum SecurityEventType {
14
- AUTHENTICATION = "authentication",
15
- ACCESS_CONTROL = "access_control",
16
- EMAIL_VALIDATION = "email_validation",
17
- EMAIL_PROCESSING = "email_processing",
18
- EMAIL_FORWARDING = "email_forwarding",
19
- EMAIL_DELIVERY = "email_delivery",
20
- DKIM = "dkim",
21
- SPF = "spf",
22
- DMARC = "dmarc",
23
- RATE_LIMIT = "rate_limit",
24
- RATE_LIMITING = "rate_limiting",
25
- SPAM = "spam",
26
- MALWARE = "malware",
27
- CONNECTION = "connection",
28
- DATA_EXPOSURE = "data_exposure",
29
- CONFIGURATION = "configuration",
30
- IP_REPUTATION = "ip_reputation",
31
- REJECTED_CONNECTION = "rejected_connection"
32
- }
33
- /**
34
- * Security event interface
35
- */
36
- export interface ISecurityEvent {
37
- timestamp: number;
38
- level: SecurityLogLevel;
39
- type: SecurityEventType;
40
- message: string;
41
- details?: any;
42
- ipAddress?: string;
43
- userId?: string;
44
- sessionId?: string;
45
- emailId?: string;
46
- domain?: string;
47
- action?: string;
48
- result?: string;
49
- success?: boolean;
50
- }
51
- /**
52
- * Security logger for enhanced security monitoring
53
- */
54
- export declare class SecurityLogger {
55
- private static instance;
56
- private securityEvents;
57
- private maxEventHistory;
58
- private enableNotifications;
59
- private constructor();
60
- /**
61
- * Get singleton instance
62
- */
63
- static getInstance(options?: {
64
- maxEventHistory?: number;
65
- enableNotifications?: boolean;
66
- }): SecurityLogger;
67
- /**
68
- * Reset the singleton instance (for shutdown/testing)
69
- */
70
- static resetInstance(): void;
71
- /**
72
- * Log a security event
73
- * @param event The security event to log
74
- */
75
- logEvent(event: Omit<ISecurityEvent, 'timestamp'>): void;
76
- /**
77
- * Get recent security events
78
- * @param limit Maximum number of events to return
79
- * @param filter Filter for specific event types
80
- * @returns Recent security events
81
- */
82
- getRecentEvents(limit?: number, filter?: {
83
- level?: SecurityLogLevel;
84
- type?: SecurityEventType;
85
- fromTimestamp?: number;
86
- toTimestamp?: number;
87
- }): ISecurityEvent[];
88
- /**
89
- * Get events by security level
90
- * @param level The security level to filter by
91
- * @param limit Maximum number of events to return
92
- * @returns Security events matching the level
93
- */
94
- getEventsByLevel(level: SecurityLogLevel, limit?: number): ISecurityEvent[];
95
- /**
96
- * Get events by security type
97
- * @param type The event type to filter by
98
- * @param limit Maximum number of events to return
99
- * @returns Security events matching the type
100
- */
101
- getEventsByType(type: SecurityEventType, limit?: number): ISecurityEvent[];
102
- /**
103
- * Get security events for a specific IP address
104
- * @param ipAddress The IP address to filter by
105
- * @param limit Maximum number of events to return
106
- * @returns Security events for the IP address
107
- */
108
- getEventsByIP(ipAddress: string, limit?: number): ISecurityEvent[];
109
- /**
110
- * Get security events for a specific domain
111
- * @param domain The domain to filter by
112
- * @param limit Maximum number of events to return
113
- * @returns Security events for the domain
114
- */
115
- getEventsByDomain(domain: string, limit?: number): ISecurityEvent[];
116
- /**
117
- * Send a notification for critical security events
118
- * @param event The security event to notify about
119
- * @private
120
- */
121
- private sendNotification;
122
- /**
123
- * Clear event history
124
- */
125
- clearEvents(): void;
126
- /**
127
- * Get statistical summary of security events
128
- * @param timeWindow Optional time window in milliseconds
129
- * @returns Summary of security events
130
- */
131
- getEventsSummary(timeWindow?: number): {
132
- total: number;
133
- byLevel: Record<SecurityLogLevel, number>;
134
- byType: Record<SecurityEventType, number>;
135
- topIPs: Array<{
136
- ip: string;
137
- count: number;
138
- }>;
139
- topDomains: Array<{
140
- domain: string;
141
- count: number;
142
- }>;
143
- };
144
- }
@@ -1,233 +0,0 @@
1
- import * as plugins from '../plugins.js';
2
- import { logger } from '../logger.js';
3
- /**
4
- * Log level for security events
5
- */
6
- export var SecurityLogLevel;
7
- (function (SecurityLogLevel) {
8
- SecurityLogLevel["INFO"] = "info";
9
- SecurityLogLevel["WARN"] = "warn";
10
- SecurityLogLevel["ERROR"] = "error";
11
- SecurityLogLevel["CRITICAL"] = "critical";
12
- })(SecurityLogLevel || (SecurityLogLevel = {}));
13
- /**
14
- * Security event types for categorization
15
- */
16
- export var SecurityEventType;
17
- (function (SecurityEventType) {
18
- SecurityEventType["AUTHENTICATION"] = "authentication";
19
- SecurityEventType["ACCESS_CONTROL"] = "access_control";
20
- SecurityEventType["EMAIL_VALIDATION"] = "email_validation";
21
- SecurityEventType["EMAIL_PROCESSING"] = "email_processing";
22
- SecurityEventType["EMAIL_FORWARDING"] = "email_forwarding";
23
- SecurityEventType["EMAIL_DELIVERY"] = "email_delivery";
24
- SecurityEventType["DKIM"] = "dkim";
25
- SecurityEventType["SPF"] = "spf";
26
- SecurityEventType["DMARC"] = "dmarc";
27
- SecurityEventType["RATE_LIMIT"] = "rate_limit";
28
- SecurityEventType["RATE_LIMITING"] = "rate_limiting";
29
- SecurityEventType["SPAM"] = "spam";
30
- SecurityEventType["MALWARE"] = "malware";
31
- SecurityEventType["CONNECTION"] = "connection";
32
- SecurityEventType["DATA_EXPOSURE"] = "data_exposure";
33
- SecurityEventType["CONFIGURATION"] = "configuration";
34
- SecurityEventType["IP_REPUTATION"] = "ip_reputation";
35
- SecurityEventType["REJECTED_CONNECTION"] = "rejected_connection";
36
- })(SecurityEventType || (SecurityEventType = {}));
37
- /**
38
- * Security logger for enhanced security monitoring
39
- */
40
- export class SecurityLogger {
41
- static instance;
42
- securityEvents = [];
43
- maxEventHistory;
44
- enableNotifications;
45
- constructor(options) {
46
- this.maxEventHistory = options?.maxEventHistory || 1000;
47
- this.enableNotifications = options?.enableNotifications || false;
48
- }
49
- /**
50
- * Get singleton instance
51
- */
52
- static getInstance(options) {
53
- if (!SecurityLogger.instance) {
54
- SecurityLogger.instance = new SecurityLogger(options);
55
- }
56
- return SecurityLogger.instance;
57
- }
58
- /**
59
- * Reset the singleton instance (for shutdown/testing)
60
- */
61
- static resetInstance() {
62
- SecurityLogger.instance = undefined;
63
- }
64
- /**
65
- * Log a security event
66
- * @param event The security event to log
67
- */
68
- logEvent(event) {
69
- const fullEvent = {
70
- ...event,
71
- timestamp: Date.now()
72
- };
73
- // Store in memory buffer
74
- this.securityEvents.push(fullEvent);
75
- // Trim history if needed
76
- if (this.securityEvents.length > this.maxEventHistory) {
77
- this.securityEvents.shift();
78
- }
79
- // Log to regular logger with appropriate level
80
- switch (event.level) {
81
- case SecurityLogLevel.INFO:
82
- logger.log('info', `[SECURITY:${event.type}] ${event.message}`, event.details);
83
- break;
84
- case SecurityLogLevel.WARN:
85
- logger.log('warn', `[SECURITY:${event.type}] ${event.message}`, event.details);
86
- break;
87
- case SecurityLogLevel.ERROR:
88
- case SecurityLogLevel.CRITICAL:
89
- logger.log('error', `[SECURITY:${event.type}] ${event.message}`, event.details);
90
- // Send notification for critical events if enabled
91
- if (event.level === SecurityLogLevel.CRITICAL && this.enableNotifications) {
92
- this.sendNotification(fullEvent);
93
- }
94
- break;
95
- }
96
- }
97
- /**
98
- * Get recent security events
99
- * @param limit Maximum number of events to return
100
- * @param filter Filter for specific event types
101
- * @returns Recent security events
102
- */
103
- getRecentEvents(limit = 100, filter) {
104
- let filteredEvents = this.securityEvents;
105
- // Apply filters
106
- if (filter) {
107
- if (filter.level) {
108
- filteredEvents = filteredEvents.filter(event => event.level === filter.level);
109
- }
110
- if (filter.type) {
111
- filteredEvents = filteredEvents.filter(event => event.type === filter.type);
112
- }
113
- if (filter.fromTimestamp) {
114
- filteredEvents = filteredEvents.filter(event => event.timestamp >= filter.fromTimestamp);
115
- }
116
- if (filter.toTimestamp) {
117
- filteredEvents = filteredEvents.filter(event => event.timestamp <= filter.toTimestamp);
118
- }
119
- }
120
- // Return most recent events up to limit (slice first to avoid mutating source)
121
- return filteredEvents
122
- .slice()
123
- .sort((a, b) => b.timestamp - a.timestamp)
124
- .slice(0, limit);
125
- }
126
- /**
127
- * Get events by security level
128
- * @param level The security level to filter by
129
- * @param limit Maximum number of events to return
130
- * @returns Security events matching the level
131
- */
132
- getEventsByLevel(level, limit = 100) {
133
- return this.getRecentEvents(limit, { level });
134
- }
135
- /**
136
- * Get events by security type
137
- * @param type The event type to filter by
138
- * @param limit Maximum number of events to return
139
- * @returns Security events matching the type
140
- */
141
- getEventsByType(type, limit = 100) {
142
- return this.getRecentEvents(limit, { type });
143
- }
144
- /**
145
- * Get security events for a specific IP address
146
- * @param ipAddress The IP address to filter by
147
- * @param limit Maximum number of events to return
148
- * @returns Security events for the IP address
149
- */
150
- getEventsByIP(ipAddress, limit = 100) {
151
- return this.securityEvents
152
- .filter(event => event.ipAddress === ipAddress)
153
- .sort((a, b) => b.timestamp - a.timestamp)
154
- .slice(0, limit);
155
- }
156
- /**
157
- * Get security events for a specific domain
158
- * @param domain The domain to filter by
159
- * @param limit Maximum number of events to return
160
- * @returns Security events for the domain
161
- */
162
- getEventsByDomain(domain, limit = 100) {
163
- return this.securityEvents
164
- .filter(event => event.domain === domain)
165
- .sort((a, b) => b.timestamp - a.timestamp)
166
- .slice(0, limit);
167
- }
168
- /**
169
- * Send a notification for critical security events
170
- * @param event The security event to notify about
171
- * @private
172
- */
173
- sendNotification(event) {
174
- // In a production environment, this would integrate with a notification service
175
- // For now, we'll just log that we would send a notification
176
- logger.log('error', `[SECURITY NOTIFICATION] ${event.message}`, {
177
- ...event,
178
- notificationSent: true
179
- });
180
- // Future integration with alerting systems would go here
181
- }
182
- /**
183
- * Clear event history
184
- */
185
- clearEvents() {
186
- this.securityEvents = [];
187
- }
188
- /**
189
- * Get statistical summary of security events
190
- * @param timeWindow Optional time window in milliseconds
191
- * @returns Summary of security events
192
- */
193
- getEventsSummary(timeWindow) {
194
- const cutoff = timeWindow ? Date.now() - timeWindow : 0;
195
- // Initialize counters
196
- const byLevel = {};
197
- for (const level of Object.values(SecurityLogLevel)) {
198
- byLevel[level] = 0;
199
- }
200
- const byType = {};
201
- for (const type of Object.values(SecurityEventType)) {
202
- byType[type] = 0;
203
- }
204
- const ipCounts = new Map();
205
- const domainCounts = new Map();
206
- // Single pass over all events
207
- let total = 0;
208
- for (const e of this.securityEvents) {
209
- if (cutoff && e.timestamp < cutoff)
210
- continue;
211
- total++;
212
- byLevel[e.level]++;
213
- byType[e.type]++;
214
- if (e.ipAddress) {
215
- ipCounts.set(e.ipAddress, (ipCounts.get(e.ipAddress) || 0) + 1);
216
- }
217
- if (e.domain) {
218
- domainCounts.set(e.domain, (domainCounts.get(e.domain) || 0) + 1);
219
- }
220
- }
221
- // Sort and limit top entries
222
- const topIPs = Array.from(ipCounts.entries())
223
- .map(([ip, count]) => ({ ip, count }))
224
- .sort((a, b) => b.count - a.count)
225
- .slice(0, 10);
226
- const topDomains = Array.from(domainCounts.entries())
227
- .map(([domain, count]) => ({ domain, count }))
228
- .sort((a, b) => b.count - a.count)
229
- .slice(0, 10);
230
- return { total, byLevel, byType, topIPs, topDomains };
231
- }
232
- }
233
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.securitylogger.js","sourceRoot":"","sources":["../../../ts/security/classes.securitylogger.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AAEtC;;GAEG;AACH,MAAM,CAAN,IAAY,gBAKX;AALD,WAAY,gBAAgB;IAC1B,iCAAa,CAAA;IACb,iCAAa,CAAA;IACb,mCAAe,CAAA;IACf,yCAAqB,CAAA;AACvB,CAAC,EALW,gBAAgB,KAAhB,gBAAgB,QAK3B;AAED;;GAEG;AACH,MAAM,CAAN,IAAY,iBAmBX;AAnBD,WAAY,iBAAiB;IAC3B,sDAAiC,CAAA;IACjC,sDAAiC,CAAA;IACjC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IACrC,sDAAiC,CAAA;IACjC,kCAAa,CAAA;IACb,gCAAW,CAAA;IACX,oCAAe,CAAA;IACf,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,kCAAa,CAAA;IACb,wCAAmB,CAAA;IACnB,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,oDAA+B,CAAA;IAC/B,gEAA2C,CAAA;AAC7C,CAAC,EAnBW,iBAAiB,KAAjB,iBAAiB,QAmB5B;AAqBD;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,cAAc,GAAqB,EAAE,CAAC;IACtC,eAAe,CAAS;IACxB,mBAAmB,CAAU;IAErC,YAAoB,OAGnB;QACC,IAAI,CAAC,eAAe,GAAG,OAAO,EAAE,eAAe,IAAI,IAAI,CAAC;QACxD,IAAI,CAAC,mBAAmB,GAAG,OAAO,EAAE,mBAAmB,IAAI,KAAK,CAAC;IACnE,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,WAAW,CAAC,OAGzB;QACC,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,aAAa;QACzB,cAAc,CAAC,QAAQ,GAAG,SAAS,CAAC;IACtC,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,KAAwC;QACtD,MAAM,SAAS,GAAmB;YAChC,GAAG,KAAK;YACR,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACtB,CAAC;QAEF,yBAAyB;QACzB,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAEpC,yBAAyB;QACzB,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;YACtD,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;QAC9B,CAAC;QAED,+CAA+C;QAC/C,QAAQ,KAAK,CAAC,KAAK,EAAE,CAAC;YACpB,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,IAAI;gBACxB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAC/E,MAAM;YACR,KAAK,gBAAgB,CAAC,KAAK,CAAC;YAC5B,KAAK,gBAAgB,CAAC,QAAQ;gBAC5B,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,aAAa,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,EAAE,EAAE,KAAK,CAAC,OAAO,CAAC,CAAC;gBAEhF,mDAAmD;gBACnD,IAAI,KAAK,CAAC,KAAK,KAAK,gBAAgB,CAAC,QAAQ,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;oBAC1E,IAAI,CAAC,gBAAgB,CAAC,SAAS,CAAC,CAAC;gBACnC,CAAC;gBACD,MAAM;QACV,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,QAAgB,GAAG,EAAE,MAK3C;QACC,IAAI,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;QAEzC,gBAAgB;QAChB,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACjB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,KAAK,MAAM,CAAC,KAAK,CAAC,CAAC;YAChF,CAAC;YAED,IAAI,MAAM,CAAC,IAAI,EAAE,CAAC;gBAChB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,MAAM,CAAC,IAAI,CAAC,CAAC;YAC9E,CAAC;YAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;gBACzB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,aAAa,CAAC,CAAC;YAC3F,CAAC;YAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;gBACvB,cAAc,GAAG,cAAc,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,IAAI,MAAM,CAAC,WAAW,CAAC,CAAC;YACzF,CAAC;QACH,CAAC;QAED,+EAA+E;QAC/E,OAAO,cAAc;aAClB,KAAK,EAAE;aACP,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,gBAAgB,CAAC,KAAuB,EAAE,QAAgB,GAAG;QAClE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAChD,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,IAAuB,EAAE,QAAgB,GAAG;QACjE,OAAO,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,EAAE,IAAI,EAAE,CAAC,CAAC;IAC/C,CAAC;IAED;;;;;OAKG;IACI,aAAa,CAAC,SAAiB,EAAE,QAAgB,GAAG;QACzD,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,SAAS,KAAK,SAAS,CAAC;aAC9C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;;OAKG;IACI,iBAAiB,CAAC,MAAc,EAAE,QAAgB,GAAG;QAC1D,OAAO,IAAI,CAAC,cAAc;aACvB,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,MAAM,KAAK,MAAM,CAAC;aACxC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,CAAC,SAAS,CAAC;aACzC,KAAK,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACrB,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAqB;QAC5C,gFAAgF;QAChF,4DAA4D;QAC5D,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,KAAK,CAAC,OAAO,EAAE,EAAE;YAC9D,GAAG,KAAK;YACR,gBAAgB,EAAE,IAAI;SACvB,CAAC,CAAC;QAEH,yDAAyD;IAC3D,CAAC;IAED;;OAEG;IACI,WAAW;QAChB,IAAI,CAAC,cAAc,GAAG,EAAE,CAAC;IAC3B,CAAC;IAED;;;;OAIG;IACI,gBAAgB,CAAC,UAAmB;QAOzC,MAAM,MAAM,GAAG,UAAU,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC;QAExD,sBAAsB;QACtB,MAAM,OAAO,GAAG,EAAsC,CAAC;QACvD,KAAK,MAAM,KAAK,IAAI,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,EAAE,CAAC;YACpD,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACrB,CAAC;QACD,MAAM,MAAM,GAAG,EAAuC,CAAC;QACvD,KAAK,MAAM,IAAI,IAAI,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACpD,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACnB,CAAC;QACD,MAAM,QAAQ,GAAG,IAAI,GAAG,EAAkB,CAAC;QAC3C,MAAM,YAAY,GAAG,IAAI,GAAG,EAAkB,CAAC;QAE/C,8BAA8B;QAC9B,IAAI,KAAK,GAAG,CAAC,CAAC;QACd,KAAK,MAAM,CAAC,IAAI,IAAI,CAAC,cAAc,EAAE,CAAC;YACpC,IAAI,MAAM,IAAI,CAAC,CAAC,SAAS,GAAG,MAAM;gBAAE,SAAS;YAC7C,KAAK,EAAE,CAAC;YACR,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC;YACnB,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC;YACjB,IAAI,CAAC,CAAC,SAAS,EAAE,CAAC;gBAChB,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YAClE,CAAC;YACD,IAAI,CAAC,CAAC,MAAM,EAAE,CAAC;gBACb,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;YACpE,CAAC;QACH,CAAC;QAED,6BAA6B;QAC7B,MAAM,MAAM,GAAG,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC;aAC1C,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;aACrC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,MAAM,UAAU,GAAG,KAAK,CAAC,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,CAAC;aAClD,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC,CAAC;aAC7C,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,GAAG,CAAC,CAAC,KAAK,CAAC;aACjC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEhB,OAAO,EAAE,KAAK,EAAE,OAAO,EAAE,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;IACxD,CAAC;CACF"}