@serve.zone/dcrouter 11.13.0 → 11.14.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_serve/bundle.js +2 -2
- package/package.json +1 -1
- package/readme.md +107 -3
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts_web/00_commitinfo_data.ts +1 -1
- package/ts_web/readme.md +17 -0
- package/ts_web/router.ts +1 -1
- package/dist_ts/00_commitinfo_data.d.ts +0 -8
- package/dist_ts/00_commitinfo_data.js +0 -9
- package/dist_ts/cache/classes.cache.cleaner.d.ts +0 -47
- package/dist_ts/cache/classes.cache.cleaner.js +0 -130
- package/dist_ts/cache/classes.cached.document.d.ts +0 -76
- package/dist_ts/cache/classes.cached.document.js +0 -100
- package/dist_ts/cache/classes.cachedb.d.ts +0 -60
- package/dist_ts/cache/classes.cachedb.js +0 -126
- package/dist_ts/cache/documents/classes.cached.email.d.ts +0 -125
- package/dist_ts/cache/documents/classes.cached.email.js +0 -337
- package/dist_ts/cache/documents/classes.cached.ip.reputation.d.ts +0 -119
- package/dist_ts/cache/documents/classes.cached.ip.reputation.js +0 -323
- package/dist_ts/cache/documents/index.d.ts +0 -2
- package/dist_ts/cache/documents/index.js +0 -3
- package/dist_ts/cache/index.d.ts +0 -4
- package/dist_ts/cache/index.js +0 -7
- package/dist_ts/classes.cert-provision-scheduler.d.ts +0 -54
- package/dist_ts/classes.cert-provision-scheduler.js +0 -118
- package/dist_ts/classes.dcrouter.d.ts +0 -386
- package/dist_ts/classes.dcrouter.js +0 -1682
- package/dist_ts/classes.storage-cert-manager.d.ts +0 -18
- package/dist_ts/classes.storage-cert-manager.js +0 -43
- package/dist_ts/config/classes.api-token-manager.d.ts +0 -46
- package/dist_ts/config/classes.api-token-manager.js +0 -150
- package/dist_ts/config/classes.route-config-manager.d.ts +0 -38
- package/dist_ts/config/classes.route-config-manager.js +0 -256
- package/dist_ts/config/index.d.ts +0 -3
- package/dist_ts/config/index.js +0 -5
- package/dist_ts/config/validator.d.ts +0 -104
- package/dist_ts/config/validator.js +0 -152
- package/dist_ts/errors/base.errors.d.ts +0 -224
- package/dist_ts/errors/base.errors.js +0 -320
- package/dist_ts/errors/error-handler.d.ts +0 -98
- package/dist_ts/errors/error-handler.js +0 -282
- package/dist_ts/errors/error.codes.d.ts +0 -115
- package/dist_ts/errors/error.codes.js +0 -136
- package/dist_ts/errors/index.d.ts +0 -54
- package/dist_ts/errors/index.js +0 -136
- package/dist_ts/errors/reputation.errors.d.ts +0 -183
- package/dist_ts/errors/reputation.errors.js +0 -292
- package/dist_ts/http3/http3-route-augmentation.d.ts +0 -50
- package/dist_ts/http3/http3-route-augmentation.js +0 -98
- package/dist_ts/http3/index.d.ts +0 -1
- package/dist_ts/http3/index.js +0 -2
- package/dist_ts/index.d.ts +0 -8
- package/dist_ts/index.js +0 -29
- package/dist_ts/logger.d.ts +0 -21
- package/dist_ts/logger.js +0 -81
- package/dist_ts/monitoring/classes.metricscache.d.ts +0 -32
- package/dist_ts/monitoring/classes.metricscache.js +0 -63
- package/dist_ts/monitoring/classes.metricsmanager.d.ts +0 -184
- package/dist_ts/monitoring/classes.metricsmanager.js +0 -744
- package/dist_ts/monitoring/index.d.ts +0 -1
- package/dist_ts/monitoring/index.js +0 -2
- package/dist_ts/opsserver/classes.opsserver.d.ts +0 -38
- package/dist_ts/opsserver/classes.opsserver.js +0 -87
- package/dist_ts/opsserver/handlers/admin.handler.d.ts +0 -31
- package/dist_ts/opsserver/handlers/admin.handler.js +0 -180
- package/dist_ts/opsserver/handlers/api-token.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/api-token.handler.js +0 -62
- package/dist_ts/opsserver/handlers/certificate.handler.d.ts +0 -32
- package/dist_ts/opsserver/handlers/certificate.handler.js +0 -421
- package/dist_ts/opsserver/handlers/config.handler.d.ts +0 -7
- package/dist_ts/opsserver/handlers/config.handler.js +0 -192
- package/dist_ts/opsserver/handlers/email-ops.handler.d.ts +0 -30
- package/dist_ts/opsserver/handlers/email-ops.handler.js +0 -227
- package/dist_ts/opsserver/handlers/index.d.ts +0 -12
- package/dist_ts/opsserver/handlers/index.js +0 -13
- package/dist_ts/opsserver/handlers/logs.handler.d.ts +0 -25
- package/dist_ts/opsserver/handlers/logs.handler.js +0 -256
- package/dist_ts/opsserver/handlers/radius.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/radius.handler.js +0 -295
- package/dist_ts/opsserver/handlers/remoteingress.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/remoteingress.handler.js +0 -156
- package/dist_ts/opsserver/handlers/route-management.handler.d.ts +0 -14
- package/dist_ts/opsserver/handlers/route-management.handler.js +0 -117
- package/dist_ts/opsserver/handlers/security.handler.d.ts +0 -9
- package/dist_ts/opsserver/handlers/security.handler.js +0 -233
- package/dist_ts/opsserver/handlers/stats.handler.d.ts +0 -11
- package/dist_ts/opsserver/handlers/stats.handler.js +0 -403
- package/dist_ts/opsserver/handlers/vpn.handler.d.ts +0 -6
- package/dist_ts/opsserver/handlers/vpn.handler.js +0 -199
- package/dist_ts/opsserver/helpers/guards.d.ts +0 -27
- package/dist_ts/opsserver/helpers/guards.js +0 -43
- package/dist_ts/opsserver/index.d.ts +0 -1
- package/dist_ts/opsserver/index.js +0 -2
- package/dist_ts/paths.d.ts +0 -26
- package/dist_ts/paths.js +0 -45
- package/dist_ts/plugins.d.ts +0 -81
- package/dist_ts/plugins.js +0 -115
- package/dist_ts/radius/classes.accounting.manager.d.ts +0 -231
- package/dist_ts/radius/classes.accounting.manager.js +0 -462
- package/dist_ts/radius/classes.radius.server.d.ts +0 -171
- package/dist_ts/radius/classes.radius.server.js +0 -386
- package/dist_ts/radius/classes.vlan.manager.d.ts +0 -128
- package/dist_ts/radius/classes.vlan.manager.js +0 -279
- package/dist_ts/radius/index.d.ts +0 -13
- package/dist_ts/radius/index.js +0 -14
- package/dist_ts/remoteingress/classes.remoteingress-manager.d.ts +0 -94
- package/dist_ts/remoteingress/classes.remoteingress-manager.js +0 -271
- package/dist_ts/remoteingress/classes.tunnel-manager.d.ts +0 -59
- package/dist_ts/remoteingress/classes.tunnel-manager.js +0 -165
- package/dist_ts/remoteingress/index.d.ts +0 -2
- package/dist_ts/remoteingress/index.js +0 -3
- package/dist_ts/security/classes.contentscanner.d.ts +0 -164
- package/dist_ts/security/classes.contentscanner.js +0 -642
- package/dist_ts/security/classes.ipreputationchecker.d.ts +0 -160
- package/dist_ts/security/classes.ipreputationchecker.js +0 -537
- package/dist_ts/security/classes.securitylogger.d.ts +0 -144
- package/dist_ts/security/classes.securitylogger.js +0 -235
- package/dist_ts/security/index.d.ts +0 -3
- package/dist_ts/security/index.js +0 -4
- package/dist_ts/sms/classes.smsservice.d.ts +0 -15
- package/dist_ts/sms/classes.smsservice.js +0 -72
- package/dist_ts/sms/config/sms.config.d.ts +0 -93
- package/dist_ts/sms/config/sms.config.js +0 -2
- package/dist_ts/sms/config/sms.schema.d.ts +0 -5
- package/dist_ts/sms/config/sms.schema.js +0 -121
- package/dist_ts/sms/index.d.ts +0 -1
- package/dist_ts/sms/index.js +0 -2
- package/dist_ts/storage/classes.storagemanager.d.ts +0 -83
- package/dist_ts/storage/classes.storagemanager.js +0 -348
- package/dist_ts/storage/index.d.ts +0 -1
- package/dist_ts/storage/index.js +0 -3
- package/dist_ts/vpn/classes.vpn-manager.d.ts +0 -113
- package/dist_ts/vpn/classes.vpn-manager.js +0 -297
- package/dist_ts/vpn/index.d.ts +0 -1
- package/dist_ts/vpn/index.js +0 -2
- package/dist_ts_apiclient/classes.apitoken.d.ts +0 -41
- package/dist_ts_apiclient/classes.apitoken.js +0 -115
- package/dist_ts_apiclient/classes.certificate.d.ts +0 -57
- package/dist_ts_apiclient/classes.certificate.js +0 -69
- package/dist_ts_apiclient/classes.config.d.ts +0 -7
- package/dist_ts_apiclient/classes.config.js +0 -11
- package/dist_ts_apiclient/classes.dcrouterapiclient.d.ts +0 -41
- package/dist_ts_apiclient/classes.dcrouterapiclient.js +0 -81
- package/dist_ts_apiclient/classes.email.d.ts +0 -30
- package/dist_ts_apiclient/classes.email.js +0 -52
- package/dist_ts_apiclient/classes.logs.d.ts +0 -21
- package/dist_ts_apiclient/classes.logs.js +0 -14
- package/dist_ts_apiclient/classes.radius.d.ts +0 -59
- package/dist_ts_apiclient/classes.radius.js +0 -95
- package/dist_ts_apiclient/classes.remoteingress.d.ts +0 -54
- package/dist_ts_apiclient/classes.remoteingress.js +0 -136
- package/dist_ts_apiclient/classes.route.d.ts +0 -42
- package/dist_ts_apiclient/classes.route.js +0 -154
- package/dist_ts_apiclient/classes.stats.d.ts +0 -47
- package/dist_ts_apiclient/classes.stats.js +0 -38
- package/dist_ts_apiclient/index.d.ts +0 -10
- package/dist_ts_apiclient/index.js +0 -14
- package/dist_ts_apiclient/plugins.d.ts +0 -3
- package/dist_ts_apiclient/plugins.js +0 -5
- package/dist_ts_web/00_commitinfo_data.d.ts +0 -8
- package/dist_ts_web/00_commitinfo_data.js +0 -9
- package/dist_ts_web/appstate.d.ts +0 -238
- package/dist_ts_web/appstate.js +0 -1174
- package/dist_ts_web/elements/index.d.ts +0 -13
- package/dist_ts_web/elements/index.js +0 -14
- package/dist_ts_web/elements/ops-dashboard.d.ts +0 -23
- package/dist_ts_web/elements/ops-dashboard.js +0 -323
- package/dist_ts_web/elements/ops-view-apitokens.d.ts +0 -13
- package/dist_ts_web/elements/ops-view-apitokens.js +0 -371
- package/dist_ts_web/elements/ops-view-certificates.d.ts +0 -22
- package/dist_ts_web/elements/ops-view-certificates.js +0 -528
- package/dist_ts_web/elements/ops-view-config.d.ts +0 -19
- package/dist_ts_web/elements/ops-view-config.js +0 -339
- package/dist_ts_web/elements/ops-view-emails.d.ts +0 -21
- package/dist_ts_web/elements/ops-view-emails.js +0 -165
- package/dist_ts_web/elements/ops-view-logs.d.ts +0 -13
- package/dist_ts_web/elements/ops-view-logs.js +0 -159
- package/dist_ts_web/elements/ops-view-network.d.ts +0 -71
- package/dist_ts_web/elements/ops-view-network.js +0 -764
- package/dist_ts_web/elements/ops-view-overview.d.ts +0 -22
- package/dist_ts_web/elements/ops-view-overview.js +0 -456
- package/dist_ts_web/elements/ops-view-remoteingress.d.ts +0 -20
- package/dist_ts_web/elements/ops-view-remoteingress.js +0 -494
- package/dist_ts_web/elements/ops-view-routes.d.ts +0 -12
- package/dist_ts_web/elements/ops-view-routes.js +0 -404
- package/dist_ts_web/elements/ops-view-security.d.ts +0 -21
- package/dist_ts_web/elements/ops-view-security.js +0 -574
- package/dist_ts_web/elements/ops-view-vpn.d.ts +0 -14
- package/dist_ts_web/elements/ops-view-vpn.js +0 -369
- package/dist_ts_web/elements/shared/css.d.ts +0 -1
- package/dist_ts_web/elements/shared/css.js +0 -10
- package/dist_ts_web/elements/shared/index.d.ts +0 -2
- package/dist_ts_web/elements/shared/index.js +0 -3
- package/dist_ts_web/elements/shared/ops-sectionheading.d.ts +0 -5
- package/dist_ts_web/elements/shared/ops-sectionheading.js +0 -82
- package/dist_ts_web/index.d.ts +0 -1
- package/dist_ts_web/index.js +0 -10
- package/dist_ts_web/plugins.d.ts +0 -6
- package/dist_ts_web/plugins.js +0 -11
- package/dist_ts_web/router.d.ts +0 -19
- package/dist_ts_web/router.js +0 -91
|
@@ -1,113 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../plugins.js';
|
|
2
|
-
import type { StorageManager } from '../storage/classes.storagemanager.js';
|
|
3
|
-
export interface IVpnManagerConfig {
|
|
4
|
-
/** VPN subnet CIDR (default: '10.8.0.0/24') */
|
|
5
|
-
subnet?: string;
|
|
6
|
-
/** WireGuard UDP listen port (default: 51820) */
|
|
7
|
-
wgListenPort?: number;
|
|
8
|
-
/** DNS servers pushed to VPN clients */
|
|
9
|
-
dns?: string[];
|
|
10
|
-
/** Server endpoint hostname for client configs (e.g. 'vpn.example.com') */
|
|
11
|
-
serverEndpoint?: string;
|
|
12
|
-
/** Override forwarding mode. Default: auto-detect (tun if root, socket otherwise) */
|
|
13
|
-
forwardingMode?: 'tun' | 'socket';
|
|
14
|
-
}
|
|
15
|
-
interface IPersistedClient {
|
|
16
|
-
clientId: string;
|
|
17
|
-
enabled: boolean;
|
|
18
|
-
tags?: string[];
|
|
19
|
-
description?: string;
|
|
20
|
-
assignedIp?: string;
|
|
21
|
-
noisePublicKey: string;
|
|
22
|
-
wgPublicKey: string;
|
|
23
|
-
createdAt: number;
|
|
24
|
-
updatedAt: number;
|
|
25
|
-
expiresAt?: string;
|
|
26
|
-
}
|
|
27
|
-
/**
|
|
28
|
-
* Manages the SmartVPN server lifecycle and VPN client CRUD.
|
|
29
|
-
* Persists server keys and client registrations via StorageManager.
|
|
30
|
-
*/
|
|
31
|
-
export declare class VpnManager {
|
|
32
|
-
private storageManager;
|
|
33
|
-
private config;
|
|
34
|
-
private vpnServer?;
|
|
35
|
-
private clients;
|
|
36
|
-
private serverKeys?;
|
|
37
|
-
private _forwardingMode;
|
|
38
|
-
constructor(storageManager: StorageManager, config: IVpnManagerConfig);
|
|
39
|
-
/** The effective forwarding mode (tun or socket). */
|
|
40
|
-
get forwardingMode(): 'tun' | 'socket';
|
|
41
|
-
/** The VPN subnet CIDR. */
|
|
42
|
-
getSubnet(): string;
|
|
43
|
-
/** Whether the VPN server is running. */
|
|
44
|
-
get running(): boolean;
|
|
45
|
-
/**
|
|
46
|
-
* Start the VPN server.
|
|
47
|
-
* Loads or generates server keys, loads persisted clients, starts VpnServer.
|
|
48
|
-
*/
|
|
49
|
-
start(): Promise<void>;
|
|
50
|
-
/**
|
|
51
|
-
* Stop the VPN server.
|
|
52
|
-
*/
|
|
53
|
-
stop(): Promise<void>;
|
|
54
|
-
/**
|
|
55
|
-
* Create a new VPN client. Returns the config bundle (secrets only shown once).
|
|
56
|
-
*/
|
|
57
|
-
createClient(opts: {
|
|
58
|
-
clientId: string;
|
|
59
|
-
tags?: string[];
|
|
60
|
-
description?: string;
|
|
61
|
-
}): Promise<plugins.smartvpn.IClientConfigBundle>;
|
|
62
|
-
/**
|
|
63
|
-
* Remove a VPN client.
|
|
64
|
-
*/
|
|
65
|
-
removeClient(clientId: string): Promise<void>;
|
|
66
|
-
/**
|
|
67
|
-
* List all registered clients (without secrets).
|
|
68
|
-
*/
|
|
69
|
-
listClients(): IPersistedClient[];
|
|
70
|
-
/**
|
|
71
|
-
* Enable a client.
|
|
72
|
-
*/
|
|
73
|
-
enableClient(clientId: string): Promise<void>;
|
|
74
|
-
/**
|
|
75
|
-
* Disable a client.
|
|
76
|
-
*/
|
|
77
|
-
disableClient(clientId: string): Promise<void>;
|
|
78
|
-
/**
|
|
79
|
-
* Rotate a client's keys. Returns the new config bundle.
|
|
80
|
-
*/
|
|
81
|
-
rotateClientKey(clientId: string): Promise<plugins.smartvpn.IClientConfigBundle>;
|
|
82
|
-
/**
|
|
83
|
-
* Export a client config (without secrets).
|
|
84
|
-
*/
|
|
85
|
-
exportClientConfig(clientId: string, format: 'smartvpn' | 'wireguard'): Promise<string>;
|
|
86
|
-
/**
|
|
87
|
-
* Get server status.
|
|
88
|
-
*/
|
|
89
|
-
getStatus(): Promise<plugins.smartvpn.IVpnStatus | null>;
|
|
90
|
-
/**
|
|
91
|
-
* Get server statistics.
|
|
92
|
-
*/
|
|
93
|
-
getStatistics(): Promise<plugins.smartvpn.IVpnServerStatistics | null>;
|
|
94
|
-
/**
|
|
95
|
-
* List currently connected clients.
|
|
96
|
-
*/
|
|
97
|
-
getConnectedClients(): Promise<plugins.smartvpn.IVpnClientInfo[]>;
|
|
98
|
-
/**
|
|
99
|
-
* Get telemetry for a specific client.
|
|
100
|
-
*/
|
|
101
|
-
getClientTelemetry(clientId: string): Promise<plugins.smartvpn.IVpnClientTelemetry | null>;
|
|
102
|
-
/**
|
|
103
|
-
* Get server public keys (for display/info).
|
|
104
|
-
*/
|
|
105
|
-
getServerPublicKeys(): {
|
|
106
|
-
noisePublicKey: string;
|
|
107
|
-
wgPublicKey: string;
|
|
108
|
-
} | null;
|
|
109
|
-
private loadOrGenerateServerKeys;
|
|
110
|
-
private loadPersistedClients;
|
|
111
|
-
private persistClient;
|
|
112
|
-
}
|
|
113
|
-
export {};
|
|
@@ -1,297 +0,0 @@
|
|
|
1
|
-
import * as plugins from '../plugins.js';
|
|
2
|
-
import { logger } from '../logger.js';
|
|
3
|
-
const STORAGE_PREFIX_KEYS = '/vpn/server-keys';
|
|
4
|
-
const STORAGE_PREFIX_CLIENTS = '/vpn/clients/';
|
|
5
|
-
/**
|
|
6
|
-
* Manages the SmartVPN server lifecycle and VPN client CRUD.
|
|
7
|
-
* Persists server keys and client registrations via StorageManager.
|
|
8
|
-
*/
|
|
9
|
-
export class VpnManager {
|
|
10
|
-
storageManager;
|
|
11
|
-
config;
|
|
12
|
-
vpnServer;
|
|
13
|
-
clients = new Map();
|
|
14
|
-
serverKeys;
|
|
15
|
-
_forwardingMode;
|
|
16
|
-
constructor(storageManager, config) {
|
|
17
|
-
this.storageManager = storageManager;
|
|
18
|
-
this.config = config;
|
|
19
|
-
// Auto-detect forwarding mode: tun if root, socket otherwise
|
|
20
|
-
this._forwardingMode = config.forwardingMode
|
|
21
|
-
?? (process.getuid?.() === 0 ? 'tun' : 'socket');
|
|
22
|
-
}
|
|
23
|
-
/** The effective forwarding mode (tun or socket). */
|
|
24
|
-
get forwardingMode() {
|
|
25
|
-
return this._forwardingMode;
|
|
26
|
-
}
|
|
27
|
-
/** The VPN subnet CIDR. */
|
|
28
|
-
getSubnet() {
|
|
29
|
-
return this.config.subnet || '10.8.0.0/24';
|
|
30
|
-
}
|
|
31
|
-
/** Whether the VPN server is running. */
|
|
32
|
-
get running() {
|
|
33
|
-
return this.vpnServer?.running ?? false;
|
|
34
|
-
}
|
|
35
|
-
/**
|
|
36
|
-
* Start the VPN server.
|
|
37
|
-
* Loads or generates server keys, loads persisted clients, starts VpnServer.
|
|
38
|
-
*/
|
|
39
|
-
async start() {
|
|
40
|
-
// Load or generate server keys
|
|
41
|
-
this.serverKeys = await this.loadOrGenerateServerKeys();
|
|
42
|
-
// Load persisted clients
|
|
43
|
-
await this.loadPersistedClients();
|
|
44
|
-
// Build client entries for the daemon
|
|
45
|
-
const clientEntries = [];
|
|
46
|
-
for (const client of this.clients.values()) {
|
|
47
|
-
clientEntries.push({
|
|
48
|
-
clientId: client.clientId,
|
|
49
|
-
publicKey: client.noisePublicKey,
|
|
50
|
-
wgPublicKey: client.wgPublicKey,
|
|
51
|
-
enabled: client.enabled,
|
|
52
|
-
tags: client.tags,
|
|
53
|
-
description: client.description,
|
|
54
|
-
assignedIp: client.assignedIp,
|
|
55
|
-
expiresAt: client.expiresAt,
|
|
56
|
-
});
|
|
57
|
-
}
|
|
58
|
-
const subnet = this.getSubnet();
|
|
59
|
-
const wgListenPort = this.config.wgListenPort ?? 51820;
|
|
60
|
-
// Create and start VpnServer
|
|
61
|
-
this.vpnServer = new plugins.smartvpn.VpnServer({
|
|
62
|
-
transport: { transport: 'stdio' },
|
|
63
|
-
});
|
|
64
|
-
const serverConfig = {
|
|
65
|
-
listenAddr: '0.0.0.0:0', // WS listener not strictly needed but required field
|
|
66
|
-
privateKey: this.serverKeys.noisePrivateKey,
|
|
67
|
-
publicKey: this.serverKeys.noisePublicKey,
|
|
68
|
-
subnet,
|
|
69
|
-
dns: this.config.dns,
|
|
70
|
-
forwardingMode: this._forwardingMode,
|
|
71
|
-
transportMode: 'all',
|
|
72
|
-
wgPrivateKey: this.serverKeys.wgPrivateKey,
|
|
73
|
-
wgListenPort,
|
|
74
|
-
clients: clientEntries,
|
|
75
|
-
socketForwardProxyProtocol: this._forwardingMode === 'socket',
|
|
76
|
-
};
|
|
77
|
-
await this.vpnServer.start(serverConfig);
|
|
78
|
-
logger.log('info', `VPN server started: mode=${this._forwardingMode}, subnet=${subnet}, wg=:${wgListenPort}, clients=${this.clients.size}`);
|
|
79
|
-
}
|
|
80
|
-
/**
|
|
81
|
-
* Stop the VPN server.
|
|
82
|
-
*/
|
|
83
|
-
async stop() {
|
|
84
|
-
if (this.vpnServer) {
|
|
85
|
-
try {
|
|
86
|
-
await this.vpnServer.stopServer();
|
|
87
|
-
}
|
|
88
|
-
catch {
|
|
89
|
-
// Ignore stop errors
|
|
90
|
-
}
|
|
91
|
-
this.vpnServer.stop();
|
|
92
|
-
this.vpnServer = undefined;
|
|
93
|
-
}
|
|
94
|
-
logger.log('info', 'VPN server stopped');
|
|
95
|
-
}
|
|
96
|
-
// ── Client CRUD ────────────────────────────────────────────────────────
|
|
97
|
-
/**
|
|
98
|
-
* Create a new VPN client. Returns the config bundle (secrets only shown once).
|
|
99
|
-
*/
|
|
100
|
-
async createClient(opts) {
|
|
101
|
-
if (!this.vpnServer) {
|
|
102
|
-
throw new Error('VPN server not running');
|
|
103
|
-
}
|
|
104
|
-
const bundle = await this.vpnServer.createClient({
|
|
105
|
-
clientId: opts.clientId,
|
|
106
|
-
tags: opts.tags,
|
|
107
|
-
description: opts.description,
|
|
108
|
-
});
|
|
109
|
-
// Update WireGuard config endpoint if serverEndpoint is configured
|
|
110
|
-
if (this.config.serverEndpoint && bundle.wireguardConfig) {
|
|
111
|
-
const wgPort = this.config.wgListenPort ?? 51820;
|
|
112
|
-
bundle.wireguardConfig = bundle.wireguardConfig.replace(/Endpoint\s*=\s*.+/, `Endpoint = ${this.config.serverEndpoint}:${wgPort}`);
|
|
113
|
-
}
|
|
114
|
-
// Persist client entry (without private keys)
|
|
115
|
-
const persisted = {
|
|
116
|
-
clientId: bundle.entry.clientId,
|
|
117
|
-
enabled: bundle.entry.enabled ?? true,
|
|
118
|
-
tags: bundle.entry.tags,
|
|
119
|
-
description: bundle.entry.description,
|
|
120
|
-
assignedIp: bundle.entry.assignedIp,
|
|
121
|
-
noisePublicKey: bundle.entry.publicKey,
|
|
122
|
-
wgPublicKey: bundle.entry.wgPublicKey || '',
|
|
123
|
-
createdAt: Date.now(),
|
|
124
|
-
updatedAt: Date.now(),
|
|
125
|
-
expiresAt: bundle.entry.expiresAt,
|
|
126
|
-
};
|
|
127
|
-
this.clients.set(persisted.clientId, persisted);
|
|
128
|
-
await this.persistClient(persisted);
|
|
129
|
-
return bundle;
|
|
130
|
-
}
|
|
131
|
-
/**
|
|
132
|
-
* Remove a VPN client.
|
|
133
|
-
*/
|
|
134
|
-
async removeClient(clientId) {
|
|
135
|
-
if (!this.vpnServer) {
|
|
136
|
-
throw new Error('VPN server not running');
|
|
137
|
-
}
|
|
138
|
-
await this.vpnServer.removeClient(clientId);
|
|
139
|
-
this.clients.delete(clientId);
|
|
140
|
-
await this.storageManager.delete(`${STORAGE_PREFIX_CLIENTS}${clientId}`);
|
|
141
|
-
}
|
|
142
|
-
/**
|
|
143
|
-
* List all registered clients (without secrets).
|
|
144
|
-
*/
|
|
145
|
-
listClients() {
|
|
146
|
-
return [...this.clients.values()];
|
|
147
|
-
}
|
|
148
|
-
/**
|
|
149
|
-
* Enable a client.
|
|
150
|
-
*/
|
|
151
|
-
async enableClient(clientId) {
|
|
152
|
-
if (!this.vpnServer)
|
|
153
|
-
throw new Error('VPN server not running');
|
|
154
|
-
await this.vpnServer.enableClient(clientId);
|
|
155
|
-
const client = this.clients.get(clientId);
|
|
156
|
-
if (client) {
|
|
157
|
-
client.enabled = true;
|
|
158
|
-
client.updatedAt = Date.now();
|
|
159
|
-
await this.persistClient(client);
|
|
160
|
-
}
|
|
161
|
-
}
|
|
162
|
-
/**
|
|
163
|
-
* Disable a client.
|
|
164
|
-
*/
|
|
165
|
-
async disableClient(clientId) {
|
|
166
|
-
if (!this.vpnServer)
|
|
167
|
-
throw new Error('VPN server not running');
|
|
168
|
-
await this.vpnServer.disableClient(clientId);
|
|
169
|
-
const client = this.clients.get(clientId);
|
|
170
|
-
if (client) {
|
|
171
|
-
client.enabled = false;
|
|
172
|
-
client.updatedAt = Date.now();
|
|
173
|
-
await this.persistClient(client);
|
|
174
|
-
}
|
|
175
|
-
}
|
|
176
|
-
/**
|
|
177
|
-
* Rotate a client's keys. Returns the new config bundle.
|
|
178
|
-
*/
|
|
179
|
-
async rotateClientKey(clientId) {
|
|
180
|
-
if (!this.vpnServer)
|
|
181
|
-
throw new Error('VPN server not running');
|
|
182
|
-
const bundle = await this.vpnServer.rotateClientKey(clientId);
|
|
183
|
-
// Update endpoint in WireGuard config
|
|
184
|
-
if (this.config.serverEndpoint && bundle.wireguardConfig) {
|
|
185
|
-
const wgPort = this.config.wgListenPort ?? 51820;
|
|
186
|
-
bundle.wireguardConfig = bundle.wireguardConfig.replace(/Endpoint\s*=\s*.+/, `Endpoint = ${this.config.serverEndpoint}:${wgPort}`);
|
|
187
|
-
}
|
|
188
|
-
// Update persisted entry with new public keys
|
|
189
|
-
const client = this.clients.get(clientId);
|
|
190
|
-
if (client) {
|
|
191
|
-
client.noisePublicKey = bundle.entry.publicKey;
|
|
192
|
-
client.wgPublicKey = bundle.entry.wgPublicKey || '';
|
|
193
|
-
client.updatedAt = Date.now();
|
|
194
|
-
await this.persistClient(client);
|
|
195
|
-
}
|
|
196
|
-
return bundle;
|
|
197
|
-
}
|
|
198
|
-
/**
|
|
199
|
-
* Export a client config (without secrets).
|
|
200
|
-
*/
|
|
201
|
-
async exportClientConfig(clientId, format) {
|
|
202
|
-
if (!this.vpnServer)
|
|
203
|
-
throw new Error('VPN server not running');
|
|
204
|
-
let config = await this.vpnServer.exportClientConfig(clientId, format);
|
|
205
|
-
// Update endpoint in WireGuard config
|
|
206
|
-
if (format === 'wireguard' && this.config.serverEndpoint) {
|
|
207
|
-
const wgPort = this.config.wgListenPort ?? 51820;
|
|
208
|
-
config = config.replace(/Endpoint\s*=\s*.+/, `Endpoint = ${this.config.serverEndpoint}:${wgPort}`);
|
|
209
|
-
}
|
|
210
|
-
return config;
|
|
211
|
-
}
|
|
212
|
-
// ── Status and telemetry ───────────────────────────────────────────────
|
|
213
|
-
/**
|
|
214
|
-
* Get server status.
|
|
215
|
-
*/
|
|
216
|
-
async getStatus() {
|
|
217
|
-
if (!this.vpnServer)
|
|
218
|
-
return null;
|
|
219
|
-
return this.vpnServer.getStatus();
|
|
220
|
-
}
|
|
221
|
-
/**
|
|
222
|
-
* Get server statistics.
|
|
223
|
-
*/
|
|
224
|
-
async getStatistics() {
|
|
225
|
-
if (!this.vpnServer)
|
|
226
|
-
return null;
|
|
227
|
-
return this.vpnServer.getStatistics();
|
|
228
|
-
}
|
|
229
|
-
/**
|
|
230
|
-
* List currently connected clients.
|
|
231
|
-
*/
|
|
232
|
-
async getConnectedClients() {
|
|
233
|
-
if (!this.vpnServer)
|
|
234
|
-
return [];
|
|
235
|
-
return this.vpnServer.listClients();
|
|
236
|
-
}
|
|
237
|
-
/**
|
|
238
|
-
* Get telemetry for a specific client.
|
|
239
|
-
*/
|
|
240
|
-
async getClientTelemetry(clientId) {
|
|
241
|
-
if (!this.vpnServer)
|
|
242
|
-
return null;
|
|
243
|
-
return this.vpnServer.getClientTelemetry(clientId);
|
|
244
|
-
}
|
|
245
|
-
/**
|
|
246
|
-
* Get server public keys (for display/info).
|
|
247
|
-
*/
|
|
248
|
-
getServerPublicKeys() {
|
|
249
|
-
if (!this.serverKeys)
|
|
250
|
-
return null;
|
|
251
|
-
return {
|
|
252
|
-
noisePublicKey: this.serverKeys.noisePublicKey,
|
|
253
|
-
wgPublicKey: this.serverKeys.wgPublicKey,
|
|
254
|
-
};
|
|
255
|
-
}
|
|
256
|
-
// ── Private helpers ────────────────────────────────────────────────────
|
|
257
|
-
async loadOrGenerateServerKeys() {
|
|
258
|
-
const stored = await this.storageManager.getJSON(STORAGE_PREFIX_KEYS);
|
|
259
|
-
if (stored?.noisePrivateKey && stored?.wgPrivateKey) {
|
|
260
|
-
logger.log('info', 'Loaded VPN server keys from storage');
|
|
261
|
-
return stored;
|
|
262
|
-
}
|
|
263
|
-
// Generate new keys via the daemon
|
|
264
|
-
const tempServer = new plugins.smartvpn.VpnServer({
|
|
265
|
-
transport: { transport: 'stdio' },
|
|
266
|
-
});
|
|
267
|
-
await tempServer.start();
|
|
268
|
-
const noiseKeys = await tempServer.generateKeypair();
|
|
269
|
-
const wgKeys = await tempServer.generateWgKeypair();
|
|
270
|
-
tempServer.stop();
|
|
271
|
-
const keys = {
|
|
272
|
-
noisePrivateKey: noiseKeys.privateKey,
|
|
273
|
-
noisePublicKey: noiseKeys.publicKey,
|
|
274
|
-
wgPrivateKey: wgKeys.privateKey,
|
|
275
|
-
wgPublicKey: wgKeys.publicKey,
|
|
276
|
-
};
|
|
277
|
-
await this.storageManager.setJSON(STORAGE_PREFIX_KEYS, keys);
|
|
278
|
-
logger.log('info', 'Generated and persisted new VPN server keys');
|
|
279
|
-
return keys;
|
|
280
|
-
}
|
|
281
|
-
async loadPersistedClients() {
|
|
282
|
-
const keys = await this.storageManager.list(STORAGE_PREFIX_CLIENTS);
|
|
283
|
-
for (const key of keys) {
|
|
284
|
-
const client = await this.storageManager.getJSON(key);
|
|
285
|
-
if (client) {
|
|
286
|
-
this.clients.set(client.clientId, client);
|
|
287
|
-
}
|
|
288
|
-
}
|
|
289
|
-
if (this.clients.size > 0) {
|
|
290
|
-
logger.log('info', `Loaded ${this.clients.size} persisted VPN client(s)`);
|
|
291
|
-
}
|
|
292
|
-
}
|
|
293
|
-
async persistClient(client) {
|
|
294
|
-
await this.storageManager.setJSON(`${STORAGE_PREFIX_CLIENTS}${client.clientId}`, client);
|
|
295
|
-
}
|
|
296
|
-
}
|
|
297
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.vpn-manager.js","sourceRoot":"","sources":["../../../ts/vpn/classes.vpn-manager.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AAGtC,MAAM,mBAAmB,GAAG,kBAAkB,CAAC;AAC/C,MAAM,sBAAsB,GAAG,eAAe,CAAC;AAmC/C;;;GAGG;AACH,MAAM,OAAO,UAAU;IACb,cAAc,CAAiB;IAC/B,MAAM,CAAoB;IAC1B,SAAS,CAA8B;IACvC,OAAO,GAAkC,IAAI,GAAG,EAAE,CAAC;IACnD,UAAU,CAAwB;IAClC,eAAe,CAAmB;IAE1C,YAAY,cAA8B,EAAE,MAAyB;QACnE,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QACrC,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,6DAA6D;QAC7D,IAAI,CAAC,eAAe,GAAG,MAAM,CAAC,cAAc;eACvC,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC;IACrD,CAAC;IAED,qDAAqD;IACrD,IAAW,cAAc;QACvB,OAAO,IAAI,CAAC,eAAe,CAAC;IAC9B,CAAC;IAED,2BAA2B;IACpB,SAAS;QACd,OAAO,IAAI,CAAC,MAAM,CAAC,MAAM,IAAI,aAAa,CAAC;IAC7C,CAAC;IAED,yCAAyC;IACzC,IAAW,OAAO;QAChB,OAAO,IAAI,CAAC,SAAS,EAAE,OAAO,IAAI,KAAK,CAAC;IAC1C,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,KAAK;QAChB,+BAA+B;QAC/B,IAAI,CAAC,UAAU,GAAG,MAAM,IAAI,CAAC,wBAAwB,EAAE,CAAC;QAExD,yBAAyB;QACzB,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QAElC,sCAAsC;QACtC,MAAM,aAAa,GAAoC,EAAE,CAAC;QAC1D,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC;YAC3C,aAAa,CAAC,IAAI,CAAC;gBACjB,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,SAAS,EAAE,MAAM,CAAC,cAAc;gBAChC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,OAAO,EAAE,MAAM,CAAC,OAAO;gBACvB,IAAI,EAAE,MAAM,CAAC,IAAI;gBACjB,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,SAAS,EAAE,MAAM,CAAC,SAAS;aAC5B,CAAC,CAAC;QACL,CAAC;QAED,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,EAAE,CAAC;QAChC,MAAM,YAAY,GAAG,IAAI,CAAC,MAAM,CAAC,YAAY,IAAI,KAAK,CAAC;QAEvD,6BAA6B;QAC7B,IAAI,CAAC,SAAS,GAAG,IAAI,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAC;YAC9C,SAAS,EAAE,EAAE,SAAS,EAAE,OAAO,EAAE;SAClC,CAAC,CAAC;QAEH,MAAM,YAAY,GAAsC;YACtD,UAAU,EAAE,WAAW,EAAE,qDAAqD;YAC9E,UAAU,EAAE,IAAI,CAAC,UAAU,CAAC,eAAe;YAC3C,SAAS,EAAE,IAAI,CAAC,UAAU,CAAC,cAAc;YACzC,MAAM;YACN,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,GAAG;YACpB,cAAc,EAAE,IAAI,CAAC,eAAe;YACpC,aAAa,EAAE,KAAK;YACpB,YAAY,EAAE,IAAI,CAAC,UAAU,CAAC,YAAY;YAC1C,YAAY;YACZ,OAAO,EAAE,aAAa;YACtB,0BAA0B,EAAE,IAAI,CAAC,eAAe,KAAK,QAAQ;SAC9D,CAAC;QAEF,MAAM,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC;QACzC,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,IAAI,CAAC,eAAe,YAAY,MAAM,SAAS,YAAY,aAAa,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC,CAAC;IAC9I,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,SAAS,EAAE,CAAC;YACnB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC;YACpC,CAAC;YAAC,MAAM,CAAC;gBACP,qBAAqB;YACvB,CAAC;YACD,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;YACtB,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC7B,CAAC;QACD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,oBAAoB,CAAC,CAAC;IAC3C,CAAC;IAED,0EAA0E;IAE1E;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,IAIzB;QACC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;QAC5C,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC;YAC/C,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,WAAW,EAAE,IAAI,CAAC,WAAW;SAC9B,CAAC,CAAC;QAEH,mEAAmE;QACnE,IAAI,IAAI,CAAC,MAAM,CAAC,cAAc,IAAI,MAAM,CAAC,eAAe,EAAE,CAAC;YACzD,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,YAAY,IAAI,KAAK,CAAC;YACjD,MAAM,CAAC,eAAe,GAAG,MAAM,CAAC,eAAe,CAAC,OAAO,CACrD,mBAAmB,EACnB,cAAc,IAAI,CAAC,MAAM,CAAC,cAAc,IAAI,MAAM,EAAE,CACrD,CAAC;QACJ,CAAC;QAED,8CAA8C;QAC9C,MAAM,SAAS,GAAqB;YAClC,QAAQ,EAAE,MAAM,CAAC,KAAK,CAAC,QAAQ;YAC/B,OAAO,EAAE,MAAM,CAAC,KAAK,CAAC,OAAO,IAAI,IAAI;YACrC,IAAI,EAAE,MAAM,CAAC,KAAK,CAAC,IAAI;YACvB,WAAW,EAAE,MAAM,CAAC,KAAK,CAAC,WAAW;YACrC,UAAU,EAAE,MAAM,CAAC,KAAK,CAAC,UAAU;YACnC,cAAc,EAAE,MAAM,CAAC,KAAK,CAAC,SAAS;YACtC,WAAW,EAAE,MAAM,CAAC,KAAK,CAAC,WAAW,IAAI,EAAE;YAC3C,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;YACrB,SAAS,EAAE,MAAM,CAAC,KAAK,CAAC,SAAS;SAClC,CAAC;QACF,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAChD,MAAM,IAAI,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;QAEpC,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,QAAgB;QACxC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;QAC5C,CAAC;QACD,MAAM,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC;QAC5C,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAC9B,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,GAAG,sBAAsB,GAAG,QAAQ,EAAE,CAAC,CAAC;IAC3E,CAAC;IAED;;OAEG;IACI,WAAW;QAChB,OAAO,CAAC,GAAG,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IACpC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,QAAgB;QACxC,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;QAC/D,MAAM,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC;QAC5C,MAAM,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC1C,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,CAAC,OAAO,GAAG,IAAI,CAAC;YACtB,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,aAAa,CAAC,QAAgB;QACzC,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;QAC/D,MAAM,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;QAC7C,MAAM,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC1C,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,CAAC,OAAO,GAAG,KAAK,CAAC;YACvB,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,eAAe,CAAC,QAAgB;QAC3C,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;QAC/D,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC;QAE9D,sCAAsC;QACtC,IAAI,IAAI,CAAC,MAAM,CAAC,cAAc,IAAI,MAAM,CAAC,eAAe,EAAE,CAAC;YACzD,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,YAAY,IAAI,KAAK,CAAC;YACjD,MAAM,CAAC,eAAe,GAAG,MAAM,CAAC,eAAe,CAAC,OAAO,CACrD,mBAAmB,EACnB,cAAc,IAAI,CAAC,MAAM,CAAC,cAAc,IAAI,MAAM,EAAE,CACrD,CAAC;QACJ,CAAC;QAED,8CAA8C;QAC9C,MAAM,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC1C,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,CAAC,cAAc,GAAG,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC;YAC/C,MAAM,CAAC,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC,WAAW,IAAI,EAAE,CAAC;YACpD,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YAC9B,MAAM,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,QAAgB,EAAE,MAAgC;QAChF,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;QAC/D,IAAI,MAAM,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,kBAAkB,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;QAEvE,sCAAsC;QACtC,IAAI,MAAM,KAAK,WAAW,IAAI,IAAI,CAAC,MAAM,CAAC,cAAc,EAAE,CAAC;YACzD,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,YAAY,IAAI,KAAK,CAAC;YACjD,MAAM,GAAG,MAAM,CAAC,OAAO,CACrB,mBAAmB,EACnB,cAAc,IAAI,CAAC,MAAM,CAAC,cAAc,IAAI,MAAM,EAAE,CACrD,CAAC;QACJ,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,0EAA0E;IAE1E;;OAEG;IACI,KAAK,CAAC,SAAS;QACpB,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,OAAO,IAAI,CAAC;QACjC,OAAO,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,CAAC;IACpC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,aAAa;QACxB,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,OAAO,IAAI,CAAC;QACjC,OAAO,IAAI,CAAC,SAAS,CAAC,aAAa,EAAE,CAAC;IACxC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,mBAAmB;QAC9B,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,OAAO,EAAE,CAAC;QAC/B,OAAO,IAAI,CAAC,SAAS,CAAC,WAAW,EAAE,CAAC;IACtC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,kBAAkB,CAAC,QAAgB;QAC9C,IAAI,CAAC,IAAI,CAAC,SAAS;YAAE,OAAO,IAAI,CAAC;QACjC,OAAO,IAAI,CAAC,SAAS,CAAC,kBAAkB,CAAC,QAAQ,CAAC,CAAC;IACrD,CAAC;IAED;;OAEG;IACI,mBAAmB;QACxB,IAAI,CAAC,IAAI,CAAC,UAAU;YAAE,OAAO,IAAI,CAAC;QAClC,OAAO;YACL,cAAc,EAAE,IAAI,CAAC,UAAU,CAAC,cAAc;YAC9C,WAAW,EAAE,IAAI,CAAC,UAAU,CAAC,WAAW;SACzC,CAAC;IACJ,CAAC;IAED,0EAA0E;IAElE,KAAK,CAAC,wBAAwB;QACpC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,OAAO,CAAuB,mBAAmB,CAAC,CAAC;QAC5F,IAAI,MAAM,EAAE,eAAe,IAAI,MAAM,EAAE,YAAY,EAAE,CAAC;YACpD,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,qCAAqC,CAAC,CAAC;YAC1D,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,mCAAmC;QACnC,MAAM,UAAU,GAAG,IAAI,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAC;YAChD,SAAS,EAAE,EAAE,SAAS,EAAE,OAAO,EAAE;SAClC,CAAC,CAAC;QACH,MAAM,UAAU,CAAC,KAAK,EAAE,CAAC;QAEzB,MAAM,SAAS,GAAG,MAAM,UAAU,CAAC,eAAe,EAAE,CAAC;QACrD,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,iBAAiB,EAAE,CAAC;QACpD,UAAU,CAAC,IAAI,EAAE,CAAC;QAElB,MAAM,IAAI,GAAyB;YACjC,eAAe,EAAE,SAAS,CAAC,UAAU;YACrC,cAAc,EAAE,SAAS,CAAC,SAAS;YACnC,YAAY,EAAE,MAAM,CAAC,UAAU;YAC/B,WAAW,EAAE,MAAM,CAAC,SAAS;SAC9B,CAAC;QAEF,MAAM,IAAI,CAAC,cAAc,CAAC,OAAO,CAAC,mBAAmB,EAAE,IAAI,CAAC,CAAC;QAC7D,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,6CAA6C,CAAC,CAAC;QAClE,OAAO,IAAI,CAAC;IACd,CAAC;IAEO,KAAK,CAAC,oBAAoB;QAChC,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC;QACpE,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;YACvB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,OAAO,CAAmB,GAAG,CAAC,CAAC;YACxE,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;YAC5C,CAAC;QACH,CAAC;QACD,IAAI,IAAI,CAAC,OAAO,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,UAAU,IAAI,CAAC,OAAO,CAAC,IAAI,0BAA0B,CAAC,CAAC;QAC5E,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,aAAa,CAAC,MAAwB;QAClD,MAAM,IAAI,CAAC,cAAc,CAAC,OAAO,CAAC,GAAG,sBAAsB,GAAG,MAAM,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,CAAC;IAC3F,CAAC;CACF"}
|
package/dist_ts/vpn/index.d.ts
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export * from './classes.vpn-manager.js';
|
package/dist_ts/vpn/index.js
DELETED
|
@@ -1,41 +0,0 @@
|
|
|
1
|
-
import * as interfaces from '../dist_ts_interfaces/index.js';
|
|
2
|
-
import type { DcRouterApiClient } from './classes.dcrouterapiclient.js';
|
|
3
|
-
export declare class ApiToken {
|
|
4
|
-
private clientRef;
|
|
5
|
-
id: string;
|
|
6
|
-
name: string;
|
|
7
|
-
scopes: interfaces.data.TApiTokenScope[];
|
|
8
|
-
createdAt: number;
|
|
9
|
-
expiresAt: number | null;
|
|
10
|
-
lastUsedAt: number | null;
|
|
11
|
-
enabled: boolean;
|
|
12
|
-
/** Only set on creation or roll. Not persisted on server side. */
|
|
13
|
-
tokenValue?: string;
|
|
14
|
-
constructor(clientRef: DcRouterApiClient, data: interfaces.data.IApiTokenInfo, tokenValue?: string);
|
|
15
|
-
revoke(): Promise<void>;
|
|
16
|
-
roll(): Promise<string>;
|
|
17
|
-
toggle(enabled: boolean): Promise<void>;
|
|
18
|
-
}
|
|
19
|
-
export declare class ApiTokenBuilder {
|
|
20
|
-
private clientRef;
|
|
21
|
-
private tokenName;
|
|
22
|
-
private tokenScopes;
|
|
23
|
-
private tokenExpiresInDays?;
|
|
24
|
-
constructor(clientRef: DcRouterApiClient);
|
|
25
|
-
setName(name: string): this;
|
|
26
|
-
setScopes(scopes: interfaces.data.TApiTokenScope[]): this;
|
|
27
|
-
addScope(scope: interfaces.data.TApiTokenScope): this;
|
|
28
|
-
setExpiresInDays(days: number | null): this;
|
|
29
|
-
save(): Promise<ApiToken>;
|
|
30
|
-
}
|
|
31
|
-
export declare class ApiTokenManager {
|
|
32
|
-
private clientRef;
|
|
33
|
-
constructor(clientRef: DcRouterApiClient);
|
|
34
|
-
list(): Promise<ApiToken[]>;
|
|
35
|
-
create(options: {
|
|
36
|
-
name: string;
|
|
37
|
-
scopes: interfaces.data.TApiTokenScope[];
|
|
38
|
-
expiresInDays?: number | null;
|
|
39
|
-
}): Promise<ApiToken>;
|
|
40
|
-
build(): ApiTokenBuilder;
|
|
41
|
-
}
|
|
@@ -1,115 +0,0 @@
|
|
|
1
|
-
import * as interfaces from '../dist_ts_interfaces/index.js';
|
|
2
|
-
export class ApiToken {
|
|
3
|
-
clientRef;
|
|
4
|
-
// Data from IApiTokenInfo
|
|
5
|
-
id;
|
|
6
|
-
name;
|
|
7
|
-
scopes;
|
|
8
|
-
createdAt;
|
|
9
|
-
expiresAt;
|
|
10
|
-
lastUsedAt;
|
|
11
|
-
enabled;
|
|
12
|
-
/** Only set on creation or roll. Not persisted on server side. */
|
|
13
|
-
tokenValue;
|
|
14
|
-
constructor(clientRef, data, tokenValue) {
|
|
15
|
-
this.clientRef = clientRef;
|
|
16
|
-
this.id = data.id;
|
|
17
|
-
this.name = data.name;
|
|
18
|
-
this.scopes = data.scopes;
|
|
19
|
-
this.createdAt = data.createdAt;
|
|
20
|
-
this.expiresAt = data.expiresAt;
|
|
21
|
-
this.lastUsedAt = data.lastUsedAt;
|
|
22
|
-
this.enabled = data.enabled;
|
|
23
|
-
this.tokenValue = tokenValue;
|
|
24
|
-
}
|
|
25
|
-
async revoke() {
|
|
26
|
-
const response = await this.clientRef.request('revokeApiToken', this.clientRef.buildRequestPayload({ id: this.id }));
|
|
27
|
-
if (!response.success) {
|
|
28
|
-
throw new Error(response.message || 'Failed to revoke token');
|
|
29
|
-
}
|
|
30
|
-
}
|
|
31
|
-
async roll() {
|
|
32
|
-
const response = await this.clientRef.request('rollApiToken', this.clientRef.buildRequestPayload({ id: this.id }));
|
|
33
|
-
if (!response.success) {
|
|
34
|
-
throw new Error(response.message || 'Failed to roll token');
|
|
35
|
-
}
|
|
36
|
-
this.tokenValue = response.tokenValue;
|
|
37
|
-
return response.tokenValue;
|
|
38
|
-
}
|
|
39
|
-
async toggle(enabled) {
|
|
40
|
-
const response = await this.clientRef.request('toggleApiToken', this.clientRef.buildRequestPayload({ id: this.id, enabled }));
|
|
41
|
-
if (!response.success) {
|
|
42
|
-
throw new Error(response.message || 'Failed to toggle token');
|
|
43
|
-
}
|
|
44
|
-
this.enabled = enabled;
|
|
45
|
-
}
|
|
46
|
-
}
|
|
47
|
-
export class ApiTokenBuilder {
|
|
48
|
-
clientRef;
|
|
49
|
-
tokenName = '';
|
|
50
|
-
tokenScopes = [];
|
|
51
|
-
tokenExpiresInDays;
|
|
52
|
-
constructor(clientRef) {
|
|
53
|
-
this.clientRef = clientRef;
|
|
54
|
-
}
|
|
55
|
-
setName(name) {
|
|
56
|
-
this.tokenName = name;
|
|
57
|
-
return this;
|
|
58
|
-
}
|
|
59
|
-
setScopes(scopes) {
|
|
60
|
-
this.tokenScopes = scopes;
|
|
61
|
-
return this;
|
|
62
|
-
}
|
|
63
|
-
addScope(scope) {
|
|
64
|
-
if (!this.tokenScopes.includes(scope)) {
|
|
65
|
-
this.tokenScopes.push(scope);
|
|
66
|
-
}
|
|
67
|
-
return this;
|
|
68
|
-
}
|
|
69
|
-
setExpiresInDays(days) {
|
|
70
|
-
this.tokenExpiresInDays = days;
|
|
71
|
-
return this;
|
|
72
|
-
}
|
|
73
|
-
async save() {
|
|
74
|
-
const response = await this.clientRef.request('createApiToken', this.clientRef.buildRequestPayload({
|
|
75
|
-
name: this.tokenName,
|
|
76
|
-
scopes: this.tokenScopes,
|
|
77
|
-
expiresInDays: this.tokenExpiresInDays,
|
|
78
|
-
}));
|
|
79
|
-
if (!response.success) {
|
|
80
|
-
throw new Error(response.message || 'Failed to create API token');
|
|
81
|
-
}
|
|
82
|
-
return new ApiToken(this.clientRef, {
|
|
83
|
-
id: response.tokenId,
|
|
84
|
-
name: this.tokenName,
|
|
85
|
-
scopes: this.tokenScopes,
|
|
86
|
-
createdAt: Date.now(),
|
|
87
|
-
expiresAt: this.tokenExpiresInDays
|
|
88
|
-
? Date.now() + this.tokenExpiresInDays * 24 * 60 * 60 * 1000
|
|
89
|
-
: null,
|
|
90
|
-
lastUsedAt: null,
|
|
91
|
-
enabled: true,
|
|
92
|
-
}, response.tokenValue);
|
|
93
|
-
}
|
|
94
|
-
}
|
|
95
|
-
export class ApiTokenManager {
|
|
96
|
-
clientRef;
|
|
97
|
-
constructor(clientRef) {
|
|
98
|
-
this.clientRef = clientRef;
|
|
99
|
-
}
|
|
100
|
-
async list() {
|
|
101
|
-
const response = await this.clientRef.request('listApiTokens', this.clientRef.buildRequestPayload());
|
|
102
|
-
return response.tokens.map((t) => new ApiToken(this.clientRef, t));
|
|
103
|
-
}
|
|
104
|
-
async create(options) {
|
|
105
|
-
return this.build()
|
|
106
|
-
.setName(options.name)
|
|
107
|
-
.setScopes(options.scopes)
|
|
108
|
-
.setExpiresInDays(options.expiresInDays ?? null)
|
|
109
|
-
.save();
|
|
110
|
-
}
|
|
111
|
-
build() {
|
|
112
|
-
return new ApiTokenBuilder(this.clientRef);
|
|
113
|
-
}
|
|
114
|
-
}
|
|
115
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,57 +0,0 @@
|
|
|
1
|
-
import * as interfaces from '../dist_ts_interfaces/index.js';
|
|
2
|
-
import type { DcRouterApiClient } from './classes.dcrouterapiclient.js';
|
|
3
|
-
export declare class Certificate {
|
|
4
|
-
private clientRef;
|
|
5
|
-
domain: string;
|
|
6
|
-
routeNames: string[];
|
|
7
|
-
status: interfaces.requests.TCertificateStatus;
|
|
8
|
-
source: interfaces.requests.TCertificateSource;
|
|
9
|
-
tlsMode: 'terminate' | 'terminate-and-reencrypt' | 'passthrough';
|
|
10
|
-
expiryDate?: string;
|
|
11
|
-
issuer?: string;
|
|
12
|
-
issuedAt?: string;
|
|
13
|
-
error?: string;
|
|
14
|
-
canReprovision: boolean;
|
|
15
|
-
backoffInfo?: {
|
|
16
|
-
failures: number;
|
|
17
|
-
retryAfter?: string;
|
|
18
|
-
lastError?: string;
|
|
19
|
-
};
|
|
20
|
-
constructor(clientRef: DcRouterApiClient, data: interfaces.requests.ICertificateInfo);
|
|
21
|
-
reprovision(): Promise<void>;
|
|
22
|
-
delete(): Promise<void>;
|
|
23
|
-
export(): Promise<{
|
|
24
|
-
id: string;
|
|
25
|
-
domainName: string;
|
|
26
|
-
created: number;
|
|
27
|
-
validUntil: number;
|
|
28
|
-
privateKey: string;
|
|
29
|
-
publicKey: string;
|
|
30
|
-
csr: string;
|
|
31
|
-
} | undefined>;
|
|
32
|
-
}
|
|
33
|
-
export interface ICertificateSummary {
|
|
34
|
-
total: number;
|
|
35
|
-
valid: number;
|
|
36
|
-
expiring: number;
|
|
37
|
-
expired: number;
|
|
38
|
-
failed: number;
|
|
39
|
-
unknown: number;
|
|
40
|
-
}
|
|
41
|
-
export declare class CertificateManager {
|
|
42
|
-
private clientRef;
|
|
43
|
-
constructor(clientRef: DcRouterApiClient);
|
|
44
|
-
list(): Promise<{
|
|
45
|
-
certificates: Certificate[];
|
|
46
|
-
summary: ICertificateSummary;
|
|
47
|
-
}>;
|
|
48
|
-
import(cert: {
|
|
49
|
-
id: string;
|
|
50
|
-
domainName: string;
|
|
51
|
-
created: number;
|
|
52
|
-
validUntil: number;
|
|
53
|
-
privateKey: string;
|
|
54
|
-
publicKey: string;
|
|
55
|
-
csr: string;
|
|
56
|
-
}): Promise<void>;
|
|
57
|
-
}
|