local-traffic 0.0.50 → 0.0.52

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -5,7 +5,7 @@ That is a secure http/2 (or insecure http1.1) reverse-proxy installed on your ma
5
5
  - without any library,
6
6
  - without startup time
7
7
  - without boring steps
8
- - just a tiny 9.5kb file.
8
+ - just a single 23kb index.js file.
9
9
 
10
10
  ## pre-requisite
11
11
 
@@ -26,8 +26,9 @@ npx local-traffic
26
26
  ```json
27
27
  {
28
28
  "mapping": {
29
- "/npm": "https://www.npmjs.com/",
30
- "/my-static-webapp": "file:///home/user/projects/my-static-webapp",
29
+ "/npm/": "https://www.npmjs.com/",
30
+ "/my-static-webapp/": "file:///home/user/projects/my-static-webapp/",
31
+ "/logs/": "logs://",
31
32
  "": "https://github.com/"
32
33
  }
33
34
  }
@@ -35,10 +36,11 @@ npx local-traffic
35
36
 
36
37
  > "" mapping must always come last
37
38
 
38
- 2. Go to [https://localhost/prettier](https://localhost/prettier) with your browser
39
- 3. Go to [https://localhost/npm](https://localhost/npm) with your browser
40
- 4. Go to [https://localhost/my-static-webapp](https://localhost/my-static-webapp/index.html) with your browser (given your project name is my-static-webapp, but I am not 100% sure)
41
- 5. Your server now proxies the mapping that you have configured
39
+ 2. Go to [http://localhost:8080/prettier](http://localhost:8080/prettier) with your browser
40
+ 3. Go to [http://localhost:8080/npm/](http://localhost:8080/npm) with your browser
41
+ 4. Go to [http://localhost:8080/my-static-webapp/index.html](http://localhost:8080/my-static-webapp/index.html) with your browser (given your project name is my-static-webapp, but I am not 100% sure)
42
+ 5. Go to [http://localhost:8080/logs/](http://localhost:8080/logs/) to watch the request logs
43
+ 6. Your server now proxies the mapping that you have configured
42
44
 
43
45
  ## usage
44
46
 
@@ -61,8 +63,9 @@ npx local-traffic [location-of-the-local-traffic-config-file]
61
63
  - "ssl.cert" : (string) Certificate (PEM format)
62
64
  - "ssl.key" : (string) Private Key (PEM format)
63
65
  - "port" : (number) port number
66
+ - "replaceRequestBodyUrls": (boolean) replace every matching string from the mapping in the request body.
64
67
  - "replaceResponseBodyUrls": (boolean) replace every matching string from the mapping in the response body.
65
68
  - "dontUseHttp2Downstream": (boolean) force calling downstream services in http1.1 only (to save some time)
66
69
  - "simpleLogs": (boolean) disable colored logs for text terminals
67
- - "websocket": (boolean) true to activate websocket connections proxying via sockets
70
+ - "websocket": (boolean) true to activate websocket connections proxying via sockets. Required for logs UI.
68
71
  - "disableWebSecurity": (boolean) true for easygoing values in cross origin requests or content security policy headers
@@ -1,2 +1,2 @@
1
1
  #!/usr/bin/env node
2
- "use strict";var e=this&&this.__awaiter||function(e,t,n,r){return new(n||(n=Promise))((function(o,s){function a(e){try{l(r.next(e))}catch(e){s(e)}}function i(e){try{l(r.throw(e))}catch(e){s(e)}}function l(e){var t;e.done?o(e.value):(t=e.value,t instanceof n?t:new n((function(e){e(t)}))).then(a,i)}l((r=r.apply(e,t||[])).next())}))};Object.defineProperty(exports,"__esModule",{value:!0});const t=require("http2"),n=require("http"),r=require("https"),o=require("url"),s=require("fs"),a=require("zlib"),i=require("path"),l=require("crypto");var c,d,p;!function(e){e[e.ERROR=124]="ERROR",e[e.INFO=93]="INFO",e[e.WARNING=172]="WARNING"}(c||(c={})),function(e){e.INBOUND="↘️ ",e.PORT="☎️ ",e.OUTBOUND="↗️ ",e.RULES="🔗",e.REWRITE="✒️ ",e.RESTART="🔄",e.WEBSOCKET="☄️ ",e.COLORED="✨",e.SHIELD="🛡️ ",e.NO="⛔",e.ERROR_1="❌",e.ERROR_2="⛈️ ",e.ERROR_3="☢️ ",e.ERROR_4="⁉️ ",e.ERROR_5="⚡",e.ERROR_6="☠️ "}(d||(d={})),function(e){e.INBOUND="INBOUND",e.OUTBOUND="OUTBOUND"}(p||(p={}));const u=(0,i.resolve)(process.env.HOME,".local-traffic.json"),h=(0,i.resolve)(process.cwd(),process.argv.slice(-1)[0].endsWith(".json")?process.argv.slice(-1)[0]:u),m={mapping:{},port:8080,replaceRequestBodyUrls:!1,replaceResponseBodyUrls:!1,dontUseHttp2Downstream:!1,simpleLogs:!1,websocket:!1,disableWebSecurity:!1};let g,f,y=[];const v=e=>e===c.ERROR?"error":e===c.WARNING?"warning":"info",R=(e,t,n)=>{const r=(null==g?void 0:g.simpleLogs)||y.length?e.replace(/⎸/g,"|").replace(/⎹/g,"|").replace(/\u001b\[[^m]*m/g,"").replace(new RegExp(d.INBOUND,"g"),"inbound:").replace(new RegExp(d.PORT,"g"),"port:").replace(new RegExp(d.OUTBOUND,"g"),"outbound:").replace(new RegExp(d.RULES,"g"),"rules:").replace(new RegExp(d.NO,"g"),"").replace(new RegExp(d.REWRITE,"g"),"+rewrite").replace(new RegExp(d.WEBSOCKET,"g"),"websocket").replace(new RegExp(d.SHIELD,"g"),"web-security").replace(/\|+/g,"|"):e;console.log(`${(e=>{const t=new Date;return`${e?"":""}${`${t.getHours()}`.padStart(2,"0")}${e?":":":"}${`${t.getMinutes()}`.padStart(2,"0")}${e?":":":"}${`${t.getSeconds()}`.padStart(2,"0")}${e?"":""}`})(null==g?void 0:g.simpleLogs)} ${(null==g?void 0:g.simpleLogs)?r:t?`[48;5;${t}m⎸ ${process.stdout.isTTY&&n||""} ${e.padEnd(40)} ⎹`:e}`),b({logEvent:r,level:v(t)})},b=e=>{if(!y.length)return;const t=JSON.stringify(e),n=Array(4).fill(0).map((()=>Math.floor(256*Math.random()))),r=[...t.substring(0,65536)].map(((e,t)=>e.charCodeAt(0)^n[3&t])),o=Math.min(65535,t.length),s=t.length<126?Buffer.from(Uint8Array.from([129,128+o]).buffer):Buffer.concat([Buffer.from(Uint8Array.from([129,254]).buffer),Buffer.from(Uint8Array.from([o>>8]).buffer),Buffer.from(Uint8Array.from([255&o]).buffer)]),a=Buffer.from(Int8Array.from(n).buffer),i=Buffer.from(Int8Array.from(r).buffer),l=Buffer.concat([s,a,i]);y.forEach((e=>{try{e.write(l)}catch(e){}}))},O=e=>{R(`⎸${d.PORT} ${e.port.toString().padStart(5)} ⎸${d.INBOUND} ${e.ssl?"H/2 ":"H1.1"}${e.replaceRequestBodyUrls?d.REWRITE:" "}⎹⎸${d.OUTBOUND} ${e.dontUseHttp2Downstream?"H1.1":"H/2 "}${e.replaceResponseBodyUrls?d.REWRITE:" "}⎹⎸${d.RULES}${Object.keys(g.mapping).length.toString().padStart(3)}⎹⎸${g.websocket?d.WEBSOCKET:d.NO}⎹⎸${g.simpleLogs?d.NO:d.COLORED}⎹⎸${g.disableWebSecurity?d.NO:d.SHIELD}⎹`)},w=(t=!0)=>e(void 0,void 0,void 0,(function*(){return new Promise((e=>(0,s.readFile)(h,((n,r)=>{n&&!t&&R("config error. Using default value",c.ERROR,d.ERROR_1);try{g=Object.assign({},m,JSON.parse((r||"{}").toString()))}catch(t){return R("config syntax incorrect, aborting",c.ERROR,d.ERROR_2),g=g||Object.assign({},m),void e(g)}g.mapping[""]||R('default mapping "" not provided.',c.WARNING,d.ERROR_3),n&&"ENOENT"===n.code&&t&&h===u?(0,s.writeFile)(h,JSON.stringify(m),(t=>{t?R("config file NOT created",c.ERROR,d.ERROR_4):R("config file created",c.INFO,d.COLORED),e(g)})):e(g)})))).then((()=>{t&&(0,s.watchFile)(h,$)}))})),$=()=>e(void 0,void 0,void 0,(function*(){const e=Object.assign({},g);return yield w(!1),isNaN(g.port)||g.port>65535||g.port<0?(g=e,void R("port number invalid. Not refreshing",c.ERROR,d.PORT)):"object"!=typeof g.mapping?(g=e,void R("mapping should be an object. Aborting",c.ERROR,d.ERROR_5)):(g.replaceRequestBodyUrls!==e.replaceRequestBodyUrls&&R(`request body url ${g.replaceRequestBodyUrls?"":"NO "}rewriting`,c.INFO,d.REWRITE),g.replaceResponseBodyUrls!==e.replaceResponseBodyUrls&&R(`response body url ${g.replaceResponseBodyUrls?"":"NO "}rewriting`,c.INFO,d.REWRITE),g.dontUseHttp2Downstream!==e.dontUseHttp2Downstream&&R(`http/2 ${g.dontUseHttp2Downstream?"de":""}activated downstream`,c.INFO,d.OUTBOUND),g.disableWebSecurity!==e.disableWebSecurity&&R(`web security ${g.disableWebSecurity?"de":""}activated`,c.INFO,d.SHIELD),g.websocket!==e.websocket&&R(`websocket ${g.websocket?"":"de"}activated`,c.INFO,d.WEBSOCKET),g.simpleLogs!==e.simpleLogs&&R("simple logs "+(g.simpleLogs?"on":"off"),c.INFO,d.COLORED),Object.keys(g.mapping).join("\n")!==Object.keys(e.mapping).join("\n")&&R(`${Object.keys(g.mapping).length.toString().padStart(5)} loaded mapping rules`,c.INFO,d.RULES),g.port!==e.port&&R(`port changed from ${e.port} to ${g.port}`,c.INFO,d.PORT),g.ssl&&!e.ssl&&R("ssl configuration added",c.INFO,d.INBOUND),!g.ssl&&e.ssl&&R("ssl configuration removed",c.INFO,d.INBOUND),void(g.port!==e.port||JSON.stringify(g.ssl)!==JSON.stringify(e.ssl)?(yield new Promise((e=>f?f.close(e):e(void 0))),R("restarting server",c.INFO,d.RESTART),I()):O(g)))})),E=e=>""==e?"":(0,i.normalize)(e).replace(/\\/g,"/"),N=e=>{const t=(0,i.resolve)("/",e.hostname,...e.pathname.replace(/[?#].*$/,"").replace(/^\/+/,"").split("/"));return{error:null,data:null,hasRun:!1,run:function(){return this.hasRun?Promise.resolve():new Promise((n=>(0,s.readFile)(t,((r,o)=>{if(this.hasRun=!0,!r||"EISDIR"!==r.code)return this.error=r,this.data=o,void n(void 0);(0,s.readdir)(t,((t,r)=>{this.error=t,this.data=r,t?n(void 0):Promise.all(r.map((t=>new Promise((n=>(0,s.lstat)((0,i.resolve)(e.pathname,t),((e,r)=>n([t,r,e])))))))).then((t=>{const r=t.filter((e=>!e[2]&&e[1].isDirectory())).concat(t.filter((e=>!e[2]&&e[1].isFile())));this.data=`${B(128194,"directory",e.href)}<p>Directory content of <i>${e.href.replace(/\//g,"&#x002F;")}</i></p><ul class="list-group"><li class="list-group-item">&#x1F4C1;<a href="${e.pathname.endsWith("/")?"..":"."}">&lt;parent&gt;</a></li>${r.filter((e=>!e[2])).map((t=>`<li class="list-group-item">&#x${(t[1].isDirectory()?128193:128196).toString(16)};<a href="${e.pathname.endsWith("/")?"":`${e.pathname.split("/").slice(-1)[0]}/`}${t[0]}">${t[0]}</a></li>`)).join("\n")}</li></ul></body></html>`,n(void 0)}))}))}))))},events:{},on:function(e,n){return this.events[e]=n,this.run().then((()=>{"response"===e&&this.events.response(t.endsWith(".svg")?{Server:"local","Content-Type":"image/svg+xml"}:{Server:"local"},0),"data"===e&&this.data&&(this.events.data(this.data),this.events.end()),"error"===e&&this.error&&this.events.error(this.error)})),this},end:function(){return this},request:function(){return this}}},S=e=>({error:null,data:null,run:function(){return new Promise((t=>{this.data=`${B(128250,"logs","")}<p>Logs page, limited to <select id="limit" onchange="javascript:cleanup()">\n <option value="-1">0 (clear)</option><option value="10">10</option>\n <option value="50">50</option><option value="100">100</option><option value="200">200</option>\n <option selected="selected" value="500">500</option><option value="0">Infinity (discouraged)</option>\n </select></p>\n <table id="table" class="table table-striped" style="display: block; width: 100%; overflow-y: auto">\n <thead>\n <tr>\n <th scope="col">Date</th>\n <th scope="col">Level</th>\n <th scope="col">Message</th>\n </tr>\n </thead>\n <tbody id="logs">\n </tbody>\n </table>\n <script type="text/javascript">\n function start() {\n document.getElementById('table').style.height =\n (document.documentElement.clientHeight - 150) + 'px';\n const socket = new WebSocket("ws${g.ssl?"s":""}://${e}/local-traffic-logs");\n socket.onmessage = function(event) {\n let data = event.data\n let uniqueHash;\n try {\n const { uniqueHash: uniqueHash1, ...data1 } = JSON.parse(event.data);\n data = data1;\n uniqueHash = uniqueHash1;\n } catch(e) { }\n const eventText = typeof data === 'object' ? '<pre>' + JSON.stringify(data, null, 3)\n .replace(/&/g, '&amp;').replace(/\\\\"/g, '&quot;')\n .replace(/</g, '&lt;').replace(/>/g, '&gt;')\n .replace(/^( *)("[\\w]+": )?("[^"]*"|[\\w.+-]*)?([,[{])?$/mg, (match, pIndent, pKey, pVal, pEnd) => {\n const key = '<span class="json-key">';\n const val = '<span class="json-value">';\n const str = '<span class="json-string">';\n let r = pIndent || '';\n if (pKey)\n r = r + key + pKey.replace(/[": ]/g, '') + '</span>: ';\n if (pVal)\n r = r + (pVal[0] == '"' ? str : val) + pVal + '</span>';\n return r + (pEnd || '');\n }) + '</pre>'\n : data;\n const button = uniqueHash ? '<button data-uniquehash="'+uniqueHash+'" onclick="javascript:replay(event)" ' +\n 'type="button" class="btn btn-primary">Replay</button>' : '';\n document.getElementById("logs")\n .insertAdjacentHTML('afterbegin', '<tr><td scope="col">' + new Date().toUTCString() + '</td>' +\n '<td scope="col">' + (data.level || 'info')+ '</td>' + \n '<td scope="col">' + eventText + button + '</td></tr>');\n cleanup();\n };\n socket.onerror = function(error) {\n console.log(\`[error] \${error}\`);\n setTimeout(start, 5000);\n };\n };\n function cleanup() {\n const currentLimit = parseInt(document.getElementById('limit').value)\n while (currentLimit && document.getElementById('logs').childNodes.length && \n document.getElementById('logs').childNodes.length > currentLimit) {\n [...document.getElementById('logs').childNodes].slice(-1)[0].remove();\n }\n }\n function replay(event) {\n const uniqueHash = event.target.dataset.uniquehash;\n const { method, url, headers, body } = JSON.parse(atob(uniqueHash));\n fetch(url, {\n method,\n headers,\n body: !body.data || !body.data.length \n ? undefined\n : new TextDecoder().decode(new Int8Array(body.data))\n });\n }\n window.addEventListener("DOMContentLoaded", start);\n <\/script>\n <style type="text/css">\n pre {\n background-color: ghostwhite;\n border: 1px solid silver;\n padding: 10px 20px;\n margin: 20px; \n }\n .json-key {\n color: brown;\n }\n .json-value {\n color: navy;\n }\n .json-string {\n color: olive;\n }\n </style>\n </body></html>`,t(void 0)}))},events:{},on:function(e,t){return this.events[e]=t,this.run().then((()=>{"response"===e&&this.events.response({Server:"local","Content-Type":"text/html"},0),"data"===e&&this.data&&(this.events.data(this.data),this.events.end()),"error"===e&&this.error&&this.events.error(this.error)})),this},end:function(){return this},request:function(){return this}}),B=(e,t,n)=>`<!doctype html>\n<html lang="en">\n<head>\n<title>&#x${e.toString(16)}; local-traffic ${t} | ${n}</title>\n<link href="https://cdn.jsdelivr.net/npm/bootstrap@latest/dist/css/bootstrap.min.css" rel="stylesheet"/>\n<script src="https://cdn.jsdelivr.net/npm/jquery@latest/dist/jquery.min.js"><\/script>\n<script src="https://cdn.jsdelivr.net/npm/bootstrap@latest/dist/js/bootstrap.bundle.min.js"><\/script>\n</head>\n<body><div class="container"><h1>&#x${e.toString(16)}; local-traffic ${t}</h1>\n<br/>`,U=(e,t,n,r)=>`${B(128163,"error",e.message)}\n<p>An error happened while trying to proxy a remote exchange</p>\n<div class="alert alert-warning" role="alert">\n &#x24D8;&nbsp;This is not an error from the downstream service.\n</div>\n<div class="alert alert-danger" role="alert">\n<pre><code>${e.stack||`<i>${e.name} : ${e.message}</i>`}${e.errno?`<br/>(code : ${e.errno})`:""}</code></pre>\n</div>\nMore information about the request :\n<table class="table">\n <tbody>\n <tr>\n <td>phase</td>\n <td>${t}</td>\n </tr>\n <tr>\n <td>requested URL</td>\n <td>${n}</td>\n </tr>\n <tr>\n <td>downstream URL</td>\n <td>${r||"&lt;no-target-url&gt;"}</td>\n </tr>\n </tbody>\n</table>\n</div></body></html>`,j=(t,n,r)=>e(void 0,void 0,void 0,(function*(){var o,s;return(null!==(s=null===(o=n["content-encoding"])||void 0===o?void 0:o.toString())&&void 0!==s?s:"").split(",").reduce(((t,n)=>e(void 0,void 0,void 0,(function*(){const e=n.trim().toLowerCase(),r="gzip"===e||"x-gzip"===e?a.gunzip:"deflate"===e?a.inflate:"br"===e?a.brotliDecompress:"identity"===e||""===e?(e,t)=>{t(null,e)}:null;if(null===r)throw new Error(`${e} compression not supported by the proxy`);const o=yield t;return yield new Promise(((e,t)=>r(o,((n,r)=>{n&&t(n),e(r)}))))}))),Promise.resolve(t)).then((e=>{const t=e.length>1e7,o=["text/html","application/javascript","application/json"].some((e=>{var t;return(null!==(t=n["content-type"])&&void 0!==t?t:"").toString().includes(e)}));return!t&&(o||!/[^\x00-\x7F]/.test(e.toString()))?g.replaceResponseBodyUrls?Object.entries(g.mapping).reduce(((e,[t,n])=>n.startsWith("logs:")||""!==t&&!t.match(/^[-a-zA-Z0-9()@:%_\+.~#?&//=]*$/)?e:r.direction===p.INBOUND?e.replace(new RegExp(n.replace(/^(file|logs):\/\//,"").replace(/[*+?^${}()|[\]\\]/g,"").replace(/^https/,"https?")+"/*","ig"),`http${g.ssl?"s":""}://${r.proxyHostnameAndPort}${t.replace(/\/+$/,"")}/`):e.split(`http${g.ssl?"s":""}://${r.proxyHostnameAndPort}${t.replace(/\/+$/,"")}`).join(n)),e.toString()).split(`${r.proxyHostnameAndPort}/:`).join(`${r.proxyHostnameAndPort}:`).replace(/\?protocol=wss?%3A&hostname=[^&]+&port=[0-9]+&pathname=/g,`?protocol=ws${g.ssl?"s":""}%3A&hostname=${r.proxyHostname}&port=${g.port}&pathname=${encodeURIComponent(r.key.replace(/\/+$/,""))}`):e.toString():e})).then((e=>{var t,r;return(null!==(r=null===(t=n["content-encoding"])||void 0===t?void 0:t.toString())&&void 0!==r?r:"").split(",").reduce(((e,t)=>{const n=t.trim().toLowerCase(),r="gzip"===n||"x-gzip"===n?a.gzip:"deflate"===n?a.deflate:"br"===n?a.brotliCompress:"identity"===n||""===n?(e,t)=>{t(null,e)}:null;if(null===r)throw new Error(`${n} compression not supported by the proxy`);return e.then((e=>new Promise((t=>r(e,((e,n)=>{if(e)throw e;t(n)}))))))}),Promise.resolve(Buffer.from(e)))}))})),x=(e,t,n)=>{t.writeHead(e,void 0,{"content-type":"text/html","content-length":n.length}),t.end(n)},H=e=>{var t,n,r;const s=(null!==(r=null!==(n=null===(t=e.headers[":authority"])||void 0===t?void 0:t.toString())&&void 0!==n?n:e.headers.host)&&void 0!==r?r:"localhost").replace(/:.*/,""),a=e.headers[":authority"]||`${e.headers.host}${e.headers.host.match(/:[0-9]+$/)?"":80!==g.port||g.ssl?443===g.port&&g.ssl?"":`:${g.port}`:""}`,i=new o.URL(`http${g.ssl?"s":""}://${a}${e.url}`),l=i.href.substring(i.origin.length),[c,d]=Object.entries(Object.assign({},Object.assign({},...Object.entries(g.mapping).map((([e,t])=>({[e]:new o.URL(E(t))})))))).find((([e])=>l.match(RegExp(e.replace(/^\//,"^/")))))||[];return{proxyHostname:s,proxyHostnameAndPort:a,url:i,path:l,key:c,target:d}},I=()=>{f=(g.ssl?t.createSecureServer.bind(null,Object.assign(Object.assign({},g.ssl),{allowHTTP1:!0})):n.createServer)(((s,a)=>e(void 0,void 0,void 0,(function*(){var e,i,l,c;if(!s.headers.host&&!s.headers[":authority"])return void x(400,a,Buffer.from(U(new Error("client must supply a 'host' header"),"proxy",new o.URL(`http${g.ssl?"s":""}://unknowndomain${s.url}`))));const{proxyHostname:d,proxyHostnameAndPort:u,url:m,path:f,key:v,target:R}=H(s);if(!R)return void x(502,a,Buffer.from(U(new Error(`No mapping found in config file ${h}`),"proxy",m)));const O=R.host.replace(RegExp(/\/+$/),""),w=`${R.href.substring("https://".length+R.host.length)}${E(f.replace(RegExp(E(v)),""))}`.replace(/^\/*/,"/"),$=new o.URL(`${R.protocol}//${O}${w}`);let B=null,I=!g.dontUseHttp2Downstream;const T="file:"===R.protocol?N($):"logs:"===R.protocol?S(u):I?yield Promise.race([new Promise((e=>{const n=(0,t.connect)($,{rejectUnauthorized:!1,protocol:R.protocol},((t,r)=>{I=I&&!!r.alpnProtocol,e(I?n:null)}));n.on("error",(e=>{B=I&&Buffer.from(U(e,"connection",m,$))}))})),new Promise((e=>setTimeout((()=>{I=!1,e(null)}),3e3)))]):null;B instanceof Buffer||(B=null);const D=null==s?void 0:s.readableLength,L=null===(e=null==s?void 0:s.stream)||void 0===e?void 0:e.readableLength;let A=null;const k=g.replaceRequestBodyUrls||y.length;if(k){const e=null!==(i=null==s?void 0:s.stream)&&void 0!==i?i:s;let t=Buffer.from([]);yield new Promise((n=>{0===L&&n(void 0),e.on("data",(e=>{t=Buffer.concat([t,e])})),e.on("end",n),e.on("error",n)})),A=yield j(t,s.headers,{proxyHostnameAndPort:u,proxyHostname:d,key:v,direction:p.OUTBOUND})}const q=Object.assign(Object.assign({},[...Object.entries(s.headers)].filter((([e])=>!["host","connection","keep-alive"].includes(e.toLowerCase()))).reduce(((e,[t,n])=>(e[t]=(e[t]||"")+(Array.isArray(n)?n:[n]).map((e=>e.replace(m.hostname,O))).join(", "),e)),{})),{origin:R.href,referer:$.toString(),"content-length":null!==(c=null!==(l=null==A?void 0:A.length)&&void 0!==l?l:s.headers["content-length"])&&void 0!==c?c:0,":authority":O,":method":s.method,":path":w,":scheme":R.protocol.replace(":","")}),P=T&&!B&&T.request(q,{endStream:g.ssl?!(null==L||L):!D});null==P||P.on("error",(e=>{const t=-505===e.errno;B=Buffer.from(U(e,"stream"+(t?" (error -505 usually means that the downstream service does not support this http version)":""),m,$))}));const W={hostname:R.hostname,path:w,port:R.port,protocol:R.protocol,rejectUnauthorized:!1,method:s.method,headers:Object.assign(Object.assign({},Object.assign({},...Object.entries(q).filter((([e])=>!e.startsWith(":")&&"transfer-encoding"!==e.toLowerCase())).map((([e,t])=>({[e]:t}))))),{host:R.hostname})},C=!B&&!I&&!["file:","logs:"].includes(R.protocol)&&(yield new Promise((e=>{const t="https:"===R.protocol?(0,r.request)(W,e):(0,n.request)(W,e);t.on("error",(t=>{B=Buffer.from(U(t,"request",m,$)),e(null)})),k&&(t.write(A),t.end()),k||(s.on("data",(e=>t.write(e))),s.on("end",(()=>t.end())))})));if(B)return void x(502,a,B);B=null,g.ssl&&L&&P&&(k&&(P.write(A),P.end()),k||(s.stream.on("data",(e=>{P.write(e)})),s.stream.on("end",(()=>P.end())))),!g.ssl&&D&&P&&(k&&(P.write(A),P.end()),k||(s.on("data",(e=>{P.write(e)})),s.on("end",(()=>P.end()))));const{outboundResponseHeaders:F}=yield new Promise((e=>P?P.on("response",(t=>{e({outboundResponseHeaders:t})})):e(!P&&C?{outboundResponseHeaders:C.headers}:{outboundResponseHeaders:{}})));b({level:"info",protocol:I?"HTTP/2":"HTTP1.1",method:s.method,path:w,uniqueHash:Buffer.from(JSON.stringify({method:s.method,url:s.url,headers:Object.assign({},...Object.entries(s.headers).filter((([e])=>!e.startsWith(":"))).map((([e,t])=>({[e]:t})))),body:null==A?void 0:A.toJSON()})).toString("base64")});const _=F.location?new o.URL(F.location.startsWith("/")?`${R.href}${F.location.replace(/^\/+/,"")}`:F.location):null,M=_?_.href.substring(_.origin.length):null,z=m.origin,J=_?`${z}${M}`:null,K=P||C,G=null!=B?B:yield new Promise((e=>{let t=Buffer.alloc(0);K?(K.on("data",(e=>t=Buffer.concat([t,"string"==typeof e?Buffer.from(e):e]))),K.on("end",(()=>{e(t)}))):e(t)})).then((e=>g.replaceResponseBodyUrls&&e.length?j(e,F,{proxyHostnameAndPort:u,proxyHostname:d,key:v,direction:p.INBOUND}).catch((e=>(x(502,a,Buffer.from(U(e,"stream",m,$))),Buffer.from("")))):e)),V=Object.assign(Object.assign({},Object.entries(Object.assign(Object.assign(Object.assign({},F),g.replaceResponseBodyUrls?{"content-length":`${G.byteLength}`}:{}),g.disableWebSecurity?{"content-security-policy":"report only","access-control-allow-headers":"*","access-control-allow-method":"*","access-control-allow-origin":"*"}:{})).filter((([e])=>!e.startsWith(":")&&"transfer-encoding"!==e.toLowerCase()&&"connection"!==e.toLowerCase()&&"keep-alive"!==e.toLowerCase())).reduce(((e,[t,n])=>{const r=O.split("").map(((e,t)=>O.substring(t).startsWith(".")&&O.substring(t))).filter((e=>e)),o=[O].concat(r).reduce(((e,t)=>(Array.isArray(e)?e:[e]).map((e=>"string"==typeof e?e.replace(`Domain=${t}`,`Domain=${m.hostname}`):e))),n);return e[t]=(e[t]||[]).concat(o),e}),{})),J?{location:[J]}:{});try{Object.entries(V).forEach((([e,t])=>t&&a.setHeader(e,t)))}catch(e){}a.writeHead(F[":status"]||C.statusCode||200,g.ssl?void 0:C.statusMessage||"Status read from http/2",V),G?a.end(G):a.end()})))).addListener("error",(e=>{"EACCES"===e.code&&R("permission denied for this port",c.ERROR,d.NO),"EADDRINUSE"===e.code&&R("port is already used. NOT started",c.ERROR,d.ERROR_6)})).addListener("listening",(()=>{O(g)})).on("upgrade",((e,t)=>{if(!g.websocket)return void t.end("HTTP/1.1 503 Service Unavailable\r\n\r\n");const{key:s,target:a,path:i}=H(e);if("/local-traffic-logs"===i){const n=(0,l.createHash)("sha1");n.update(e.headers["sec-websocket-key"]+"258EAFA5-E914-47DA-95CA-C5AB0DC85B11");const r=n.digest("base64");return t.allowHalfOpen=!0,t.write(`HTTP/1.1 101 Switching Protocols\r\ndate: ${(new Date).toUTCString()}\r\nconnection: upgrade\r\nupgrade: websocket\r\nserver: local\r\nsec-websocket-accept: ${r}\r\n\r\n`),t.on("close",(()=>{y=y.filter((e=>t!==e))})),void y.push(t)}const p=new o.URL(`${a.protocol}//${a.host}${e.url.endsWith("/_next/webpack-hmr")?e.url:e.url.replace(new RegExp(`^${s}`,"g"),"").replace(/^\/*/,"/")}`),u={hostname:p.hostname,path:p.pathname,port:p.port,protocol:p.protocol,rejectUnauthorized:!1,method:e.method,headers:e.headers,host:p.hostname},h="https:"===p.protocol?(0,r.request)(u):(0,n.request)(u);h.end(),h.on("error",(e=>{R("websocket request has errored "+(e.errno?`(${e.errno})`:""),c.WARNING,d.WEBSOCKET)})),h.on("upgrade",((e,n)=>{const r=`HTTP/${e.httpVersion} ${e.statusCode} ${e.statusMessage}\r\n${Object.entries(e.headers).flatMap((([e,t])=>(Array.isArray(t)?t:[t]).map((t=>[e,t])))).map((([e,t])=>`${e}: ${t}\r\n`)).join("")}\r\n`;t.write(r),t.allowHalfOpen=!0,n.allowHalfOpen=!0,n.on("data",(e=>t.write(e))),t.on("data",(e=>n.write(e))),n.on("error",(e=>{R("downstream socket has errored "+(e.errno?`(${e.errno})`:""),c.WARNING,d.WEBSOCKET)})),t.on("error",(e=>{R("upstream socket has errored "+(e.errno?`(${e.errno})`:""),c.WARNING,d.WEBSOCKET)}))}))})).listen(g.port)};w().then(I);
2
+ "use strict";var e=this&&this.__awaiter||function(e,t,n,r){return new(n||(n=Promise))((function(o,s){function a(e){try{l(r.next(e))}catch(e){s(e)}}function i(e){try{l(r.throw(e))}catch(e){s(e)}}function l(e){var t;e.done?o(e.value):(t=e.value,t instanceof n?t:new n((function(e){e(t)}))).then(a,i)}l((r=r.apply(e,t||[])).next())}))};Object.defineProperty(exports,"__esModule",{value:!0});const t=require("http2"),n=require("http"),r=require("https"),o=require("url"),s=require("fs"),a=require("zlib"),i=require("path"),l=require("crypto");var c,d,p;!function(e){e[e.ERROR=124]="ERROR",e[e.INFO=93]="INFO",e[e.WARNING=172]="WARNING"}(c||(c={})),function(e){e.INBOUND="↘️ ",e.PORT="☎️ ",e.OUTBOUND="↗️ ",e.RULES="🔗",e.REWRITE="✒️ ",e.RESTART="🔄",e.WEBSOCKET="☄️ ",e.COLORED="✨",e.SHIELD="🛡️ ",e.NO="⛔",e.ERROR_1="❌",e.ERROR_2="⛈️ ",e.ERROR_3="☢️ ",e.ERROR_4="⁉️ ",e.ERROR_5="⚡",e.ERROR_6="☠️ "}(d||(d={})),function(e){e.INBOUND="INBOUND",e.OUTBOUND="OUTBOUND"}(p||(p={}));const u=(0,i.resolve)(process.env.HOME,".local-traffic.json"),h=(0,i.resolve)(process.cwd(),process.argv.slice(-1)[0].endsWith(".json")?process.argv.slice(-1)[0]:u),m={mapping:{"/logs/":"logs://"},port:8080,replaceRequestBodyUrls:!1,replaceResponseBodyUrls:!1,dontUseHttp2Downstream:!1,simpleLogs:!1,websocket:!0,disableWebSecurity:!1};let g,f,y=[];const v=e=>e===c.ERROR?"error":e===c.WARNING?"warning":"info",R=(e,t,n)=>{const r=(null==g?void 0:g.simpleLogs)||y.length?e.replace(/⎸/g,"|").replace(/⎹/g,"|").replace(/\u001b\[[^m]*m/g,"").replace(new RegExp(d.INBOUND,"g"),"inbound:").replace(new RegExp(d.PORT,"g"),"port:").replace(new RegExp(d.OUTBOUND,"g"),"outbound:").replace(new RegExp(d.RULES,"g"),"rules:").replace(new RegExp(d.NO,"g"),"").replace(new RegExp(d.REWRITE,"g"),"+rewrite").replace(new RegExp(d.WEBSOCKET,"g"),"websocket").replace(new RegExp(d.SHIELD,"g"),"web-security").replace(/\|+/g,"|"):e;console.log(`${(e=>{const t=new Date;return`${e?"":""}${`${t.getHours()}`.padStart(2,"0")}${e?":":":"}${`${t.getMinutes()}`.padStart(2,"0")}${e?":":":"}${`${t.getSeconds()}`.padStart(2,"0")}${e?"":""}`})(null==g?void 0:g.simpleLogs)} ${(null==g?void 0:g.simpleLogs)?r:t?`[48;5;${t}m⎸ ${process.stdout.isTTY&&n||""} ${e.padEnd(40)} ⎹`:e}`),b({logEvent:r,level:v(t)})},b=e=>{if(!y.length)return;const t=JSON.stringify(e),n=Array(4).fill(0).map((()=>Math.floor(256*Math.random()))),r=[...t.substring(0,65536)].map(((e,t)=>e.charCodeAt(0)^n[3&t])),o=Math.min(65535,t.length),s=t.length<126?Buffer.from(Uint8Array.from([129,128+o]).buffer):Buffer.concat([Buffer.from(Uint8Array.from([129,254]).buffer),Buffer.from(Uint8Array.from([o>>8]).buffer),Buffer.from(Uint8Array.from([255&o]).buffer)]),a=Buffer.from(Int8Array.from(n).buffer),i=Buffer.from(Int8Array.from(r).buffer),l=Buffer.concat([s,a,i]);y.forEach((e=>{try{e.write(l)}catch(e){}}))},O=e=>{R(`⎸${d.PORT} ${e.port.toString().padStart(5)} ⎸${d.INBOUND} ${e.ssl?"H/2 ":"H1.1"}${e.replaceRequestBodyUrls?d.REWRITE:" "}⎹⎸${d.OUTBOUND} ${e.dontUseHttp2Downstream?"H1.1":"H/2 "}${e.replaceResponseBodyUrls?d.REWRITE:" "}⎹⎸${d.RULES}${Object.keys(g.mapping).length.toString().padStart(3)}⎹⎸${g.websocket?d.WEBSOCKET:d.NO}⎹⎸${g.simpleLogs?d.NO:d.COLORED}⎹⎸${g.disableWebSecurity?d.NO:d.SHIELD}⎹`)},w=(t=!0)=>e(void 0,void 0,void 0,(function*(){return new Promise((e=>(0,s.readFile)(h,((n,r)=>{n&&!t&&R("config error. Using default value",c.ERROR,d.ERROR_1);try{g=Object.assign({},m,JSON.parse((r||"{}").toString()))}catch(t){return R("config syntax incorrect, aborting",c.ERROR,d.ERROR_2),g=g||Object.assign({},m),void e(g)}g.mapping[""]||R('default mapping "" not provided.',c.WARNING,d.ERROR_3),n&&"ENOENT"===n.code&&t&&h===u?(0,s.writeFile)(h,JSON.stringify(m),(t=>{t?R("config file NOT created",c.ERROR,d.ERROR_4):R("config file created",c.INFO,d.COLORED),e(g)})):e(g)})))).then((()=>{t&&(0,s.watchFile)(h,$)}))})),$=()=>e(void 0,void 0,void 0,(function*(){const e=Object.assign({},g);if(yield w(!1),isNaN(g.port)||g.port>65535||g.port<0)return g=e,void R("port number invalid. Not refreshing",c.ERROR,d.PORT);if("object"!=typeof g.mapping)return g=e,void R("mapping should be an object. Aborting",c.ERROR,d.ERROR_5);if(g.replaceRequestBodyUrls!==e.replaceRequestBodyUrls&&R(`request body url ${g.replaceRequestBodyUrls?"":"NO "}rewriting`,c.INFO,d.REWRITE),g.replaceResponseBodyUrls!==e.replaceResponseBodyUrls&&R(`response body url ${g.replaceResponseBodyUrls?"":"NO "}rewriting`,c.INFO,d.REWRITE),g.dontUseHttp2Downstream!==e.dontUseHttp2Downstream&&R(`http/2 ${g.dontUseHttp2Downstream?"de":""}activated downstream`,c.INFO,d.OUTBOUND),g.disableWebSecurity!==e.disableWebSecurity&&R(`web security ${g.disableWebSecurity?"de":""}activated`,c.INFO,d.SHIELD),g.websocket!==e.websocket&&R(`websocket ${g.websocket?"":"de"}activated`,c.INFO,d.WEBSOCKET),g.simpleLogs!==e.simpleLogs&&R("simple logs "+(g.simpleLogs?"on":"off"),c.INFO,d.COLORED),Object.keys(g.mapping).join("\n")!==Object.keys(e.mapping).join("\n")&&R(`${Object.keys(g.mapping).length.toString().padStart(5)} loaded mapping rules`,c.INFO,d.RULES),g.port!==e.port&&R(`port changed from ${e.port} to ${g.port}`,c.INFO,d.PORT),g.ssl&&!e.ssl&&R("ssl configuration added",c.INFO,d.INBOUND),!g.ssl&&e.ssl&&R("ssl configuration removed",c.INFO,d.INBOUND),g.port!==e.port||JSON.stringify(g.ssl)!==JSON.stringify(e.ssl)){R("restarting server",c.INFO,d.RESTART),yield Promise.all(y.map((e=>new Promise((t=>e.end(t)))))),y=[];(yield Promise.race([new Promise((e=>f?f.close(e):e(void 0))).then((()=>!0)),new Promise((e=>setTimeout(e,5e3))).then((()=>!1))]))||R("error during restart (websockets ?)",c.WARNING,d.RESTART),H()}else O(g)})),E=e=>""==e?"":(0,i.normalize)(e).replace(/\\/g,"/"),N=e=>{const t=(0,i.resolve)("/",e.hostname,...e.pathname.replace(/[?#].*$/,"").replace(/^\/+/,"").split("/"));return{error:null,data:null,hasRun:!1,run:function(){return this.hasRun?Promise.resolve():new Promise((n=>(0,s.readFile)(t,((r,o)=>{if(this.hasRun=!0,!r||"EISDIR"!==r.code)return this.error=r,this.data=o,void n(void 0);(0,s.readdir)(t,((t,r)=>{this.error=t,this.data=r,t?n(void 0):Promise.all(r.map((t=>new Promise((n=>(0,s.lstat)((0,i.resolve)(e.pathname,t),((e,r)=>n([t,r,e])))))))).then((t=>{const r=t.filter((e=>!e[2]&&e[1].isDirectory())).concat(t.filter((e=>!e[2]&&e[1].isFile())));this.data=`${B(128194,"directory",e.href)}<p>Directory content of <i>${e.href.replace(/\//g,"&#x002F;")}</i></p><ul class="list-group"><li class="list-group-item">&#x1F4C1;<a href="${e.pathname.endsWith("/")?"..":"."}">&lt;parent&gt;</a></li>${r.filter((e=>!e[2])).map((t=>`<li class="list-group-item">&#x${(t[1].isDirectory()?128193:128196).toString(16)};<a href="${e.pathname.endsWith("/")?"":`${e.pathname.split("/").slice(-1)[0]}/`}${t[0]}">${t[0]}</a></li>`)).join("\n")}</li></ul></body></html>`,n(void 0)}))}))}))))},events:{},on:function(e,n){return this.events[e]=n,this.run().then((()=>{"response"===e&&this.events.response(t.endsWith(".svg")?{Server:"local","Content-Type":"image/svg+xml"}:{Server:"local"},0),"data"===e&&this.data&&(this.events.data(this.data),this.events.end()),"error"===e&&this.error&&this.events.error(this.error)})),this},end:function(){return this},request:function(){return this}}},S=e=>({error:null,data:null,run:function(){return new Promise((t=>{this.data=`${B(128250,"logs","")}<p>Logs page, limited to <select id="limit" onchange="javascript:cleanup()">\n <option value="-1">0 (clear)</option><option value="10">10</option>\n <option value="50">50</option><option value="100">100</option><option value="200">200</option>\n <option selected="selected" value="500">500</option><option value="0">Infinity (discouraged)</option>\n </select></p>\n <table id="table" class="table table-striped" style="display: block; width: 100%; overflow-y: auto">\n <thead>\n <tr>\n <th scope="col">Date</th>\n <th scope="col">Level</th>\n <th scope="col">Message</th>\n </tr>\n </thead>\n <tbody id="logs">\n </tbody>\n </table>\n <script type="text/javascript">\n function start() {\n document.getElementById('table').style.height =\n (document.documentElement.clientHeight - 150) + 'px';\n const socket = new WebSocket("ws${g.ssl?"s":""}://${e}/local-traffic-logs");\n socket.onmessage = function(event) {\n let data = event.data\n let uniqueHash;\n try {\n const { uniqueHash: uniqueHash1, ...data1 } = JSON.parse(event.data);\n data = data1;\n uniqueHash = uniqueHash1;\n } catch(e) { }\n const eventText = typeof data === 'object' ? '<pre>' + JSON.stringify(data, null, 3)\n .replace(/&/g, '&amp;').replace(/\\\\"/g, '&quot;')\n .replace(/</g, '&lt;').replace(/>/g, '&gt;')\n .replace(/^( *)("[\\w]+": )?("[^"]*"|[\\w.+-]*)?([,[{])?$/mg, (match, pIndent, pKey, pVal, pEnd) => {\n const key = '<span class="json-key">';\n const val = '<span class="json-value">';\n const str = '<span class="json-string">';\n let r = pIndent || '';\n if (pKey)\n r = r + key + pKey.replace(/[": ]/g, '') + '</span>: ';\n if (pVal)\n r = r + (pVal[0] == '"' ? str : val) + pVal + '</span>';\n return r + (pEnd || '');\n }) + '</pre>'\n : data;\n const button = uniqueHash ? '<button data-uniquehash="'+uniqueHash+'" onclick="javascript:replay(event)" ' +\n 'type="button" class="btn btn-primary">Replay</button>' : '';\n document.getElementById("logs")\n .insertAdjacentHTML('afterbegin', '<tr><td scope="col">' + new Date().toUTCString() + '</td>' +\n '<td scope="col">' + (data.level || 'info')+ '</td>' + \n '<td scope="col">' + eventText + button + '</td></tr>');\n cleanup();\n };\n socket.onerror = function(error) {\n console.log(\`[error] \${error}\`);\n setTimeout(start, 5000);\n };\n };\n function cleanup() {\n const currentLimit = parseInt(document.getElementById('limit').value)\n while (currentLimit && document.getElementById('logs').childNodes.length && \n document.getElementById('logs').childNodes.length > currentLimit) {\n [...document.getElementById('logs').childNodes].slice(-1)[0].remove();\n }\n }\n function replay(event) {\n const uniqueHash = event.target.dataset.uniquehash;\n const { method, url, headers, body } = JSON.parse(atob(uniqueHash));\n fetch(url, {\n method,\n headers,\n body: !body.data || !body.data.length \n ? undefined\n : new TextDecoder().decode(new Int8Array(body.data))\n });\n }\n window.addEventListener("DOMContentLoaded", start);\n <\/script>\n <style type="text/css">\n pre {\n background-color: ghostwhite;\n border: 1px solid silver;\n padding: 10px 20px;\n margin: 20px; \n }\n .json-key {\n color: brown;\n }\n .json-value {\n color: navy;\n }\n .json-string {\n color: olive;\n }\n </style>\n </body></html>`,t(void 0)}))},events:{},on:function(e,t){return this.events[e]=t,this.run().then((()=>{"response"===e&&this.events.response({Server:"local","Content-Type":"text/html"},0),"data"===e&&this.data&&(this.events.data(this.data),this.events.end()),"error"===e&&this.error&&this.events.error(this.error)})),this},end:function(){return this},request:function(){return this}}),B=(e,t,n)=>`<!doctype html>\n<html lang="en">\n<head>\n<title>&#x${e.toString(16)}; local-traffic ${t} | ${n}</title>\n<link href="https://cdn.jsdelivr.net/npm/bootstrap@latest/dist/css/bootstrap.min.css" rel="stylesheet"/>\n<script src="https://cdn.jsdelivr.net/npm/jquery@latest/dist/jquery.min.js"><\/script>\n<script src="https://cdn.jsdelivr.net/npm/bootstrap@latest/dist/js/bootstrap.bundle.min.js"><\/script>\n</head>\n<body><div class="container"><h1>&#x${e.toString(16)}; local-traffic ${t}</h1>\n<br/>`,U=(e,t,n,r)=>`${B(128163,"error",e.message)}\n<p>An error happened while trying to proxy a remote exchange</p>\n<div class="alert alert-warning" role="alert">\n &#x24D8;&nbsp;This is not an error from the downstream service.\n</div>\n<div class="alert alert-danger" role="alert">\n<pre><code>${e.stack||`<i>${e.name} : ${e.message}</i>`}${e.errno?`<br/>(code : ${e.errno})`:""}</code></pre>\n</div>\nMore information about the request :\n<table class="table">\n <tbody>\n <tr>\n <td>phase</td>\n <td>${t}</td>\n </tr>\n <tr>\n <td>requested URL</td>\n <td>${n}</td>\n </tr>\n <tr>\n <td>downstream URL</td>\n <td>${r||"&lt;no-target-url&gt;"}</td>\n </tr>\n </tbody>\n</table>\n</div></body></html>`,j=(t,n,r)=>e(void 0,void 0,void 0,(function*(){var o,s;return(null!==(s=null===(o=n["content-encoding"])||void 0===o?void 0:o.toString())&&void 0!==s?s:"").split(",").reduce(((t,n)=>e(void 0,void 0,void 0,(function*(){const e=n.trim().toLowerCase(),r="gzip"===e||"x-gzip"===e?a.gunzip:"deflate"===e?a.inflate:"br"===e?a.brotliDecompress:"identity"===e||""===e?(e,t)=>{t(null,e)}:null;if(null===r)throw new Error(`${e} compression not supported by the proxy`);const o=yield t;return yield new Promise(((e,t)=>r(o,((n,r)=>{n&&t(n),e(r)}))))}))),Promise.resolve(t)).then((e=>{const t=e.length>1e7,o=["text/html","application/javascript","application/json"].some((e=>{var t;return(null!==(t=n["content-type"])&&void 0!==t?t:"").toString().includes(e)}));return!t&&(o||!/[^\x00-\x7F]/.test(e.toString()))?g.replaceResponseBodyUrls?Object.entries(g.mapping).reduce(((e,[t,n])=>n.startsWith("logs:")||""!==t&&!t.match(/^[-a-zA-Z0-9()@:%_\+.~#?&//=]*$/)?e:r.direction===p.INBOUND?e.replace(new RegExp(n.replace(/^(file|logs):\/\//,"").replace(/[*+?^${}()|[\]\\]/g,"").replace(/^https/,"https?")+"/*","ig"),`http${g.ssl?"s":""}://${r.proxyHostnameAndPort}${t.replace(/\/+$/,"")}/`):e.split(`http${g.ssl?"s":""}://${r.proxyHostnameAndPort}${t.replace(/\/+$/,"")}`).join(n)),e.toString()).split(`${r.proxyHostnameAndPort}/:`).join(`${r.proxyHostnameAndPort}:`).replace(/\?protocol=wss?%3A&hostname=[^&]+&port=[0-9]+&pathname=/g,`?protocol=ws${g.ssl?"s":""}%3A&hostname=${r.proxyHostname}&port=${g.port}&pathname=${encodeURIComponent(r.key.replace(/\/+$/,""))}`):e.toString():e})).then((e=>{var t,r;return(null!==(r=null===(t=n["content-encoding"])||void 0===t?void 0:t.toString())&&void 0!==r?r:"").split(",").reduce(((e,t)=>{const n=t.trim().toLowerCase(),r="gzip"===n||"x-gzip"===n?a.gzip:"deflate"===n?a.deflate:"br"===n?a.brotliCompress:"identity"===n||""===n?(e,t)=>{t(null,e)}:null;if(null===r)throw new Error(`${n} compression not supported by the proxy`);return e.then((e=>new Promise((t=>r(e,((e,n)=>{if(e)throw e;t(n)}))))))}),Promise.resolve(Buffer.from(e)))}))})),x=(e,t,n)=>{t.writeHead(e,void 0,{"content-type":"text/html","content-length":n.length}),t.end(n)},T=e=>{var t,n,r;const s=(null!==(r=null!==(n=null===(t=e.headers[":authority"])||void 0===t?void 0:t.toString())&&void 0!==n?n:e.headers.host)&&void 0!==r?r:"localhost").replace(/:.*/,""),a=e.headers[":authority"]||`${e.headers.host}${e.headers.host.match(/:[0-9]+$/)?"":80!==g.port||g.ssl?443===g.port&&g.ssl?"":`:${g.port}`:""}`,i=new o.URL(`http${g.ssl?"s":""}://${a}${e.url}`),l=i.href.substring(i.origin.length),[c,d]=Object.entries(Object.assign({},Object.assign({},...Object.entries(g.mapping).map((([e,t])=>({[e]:new o.URL(E(t))})))))).find((([e])=>l.match(RegExp(e.replace(/^\//,"^/")))))||[];return{proxyHostname:s,proxyHostnameAndPort:a,url:i,path:l,key:c,target:d}},H=()=>{f=(g.ssl?t.createSecureServer.bind(null,Object.assign(Object.assign({},g.ssl),{allowHTTP1:!0})):n.createServer)(((s,a)=>e(void 0,void 0,void 0,(function*(){var e,i,l,c;if(!s.headers.host&&!s.headers[":authority"])return void x(400,a,Buffer.from(U(new Error("client must supply a 'host' header"),"proxy",new o.URL(`http${g.ssl?"s":""}://unknowndomain${s.url}`))));const{proxyHostname:d,proxyHostnameAndPort:u,url:m,path:f,key:v,target:R}=T(s);if(!R)return void x(502,a,Buffer.from(U(new Error(`No mapping found in config file ${h}`),"proxy",m)));const O=R.host.replace(RegExp(/\/+$/),""),w=`${R.href.substring(8+R.host.length)}${E(f.replace(RegExp(E(v)),""))}`.replace(/^\/*/,"/"),$=new o.URL(`${R.protocol}//${O}${w}`);let B=null,H=!g.dontUseHttp2Downstream;const I="file:"===R.protocol?N($):"logs:"===R.protocol?S(u):H?yield Promise.race([new Promise((e=>{const n=(0,t.connect)($,{rejectUnauthorized:!1,protocol:R.protocol},((t,r)=>{H=H&&!!r.alpnProtocol,e(H?n:null)}));n.on("error",(e=>{B=H&&Buffer.from(U(e,"connection",m,$))}))})),new Promise((e=>setTimeout((()=>{H=!1,e(null)}),3e3)))]):null;B instanceof Buffer||(B=null);const D=null==s?void 0:s.readableLength,L=null===(e=null==s?void 0:s.stream)||void 0===e?void 0:e.readableLength;let A=null;const P=g.replaceRequestBodyUrls||y.length;if(P){const e=null!==(i=null==s?void 0:s.stream)&&void 0!==i?i:s;let t=Buffer.from([]);yield new Promise((n=>{0===L&&n(void 0),e.on("data",(e=>{t=Buffer.concat([t,e])})),e.on("end",n),e.on("error",n)})),A=yield j(t,s.headers,{proxyHostnameAndPort:u,proxyHostname:d,key:v,direction:p.OUTBOUND})}const k=Object.assign(Object.assign({},[...Object.entries(s.headers)].filter((([e])=>!["host","connection","keep-alive"].includes(e.toLowerCase()))).reduce(((e,[t,n])=>(e[t]=(e[t]||"")+(Array.isArray(n)?n:[n]).map((e=>e.replace(m.hostname,O))).join(", "),e)),{})),{origin:R.href,referer:$.toString(),"content-length":null!==(c=null!==(l=null==A?void 0:A.length)&&void 0!==l?l:s.headers["content-length"])&&void 0!==c?c:0,":authority":O,":method":s.method,":path":w,":scheme":R.protocol.replace(":","")}),q=I&&!B&&I.request(k,{endStream:g.ssl?!(null==L||L):!D});null==q||q.on("error",(e=>{const t=-505===e.errno;B=Buffer.from(U(e,"stream"+(t?" (error -505 usually means that the downstream service does not support this http version)":""),m,$))}));const W={hostname:R.hostname,path:w,port:R.port,protocol:R.protocol,rejectUnauthorized:!1,method:s.method,headers:Object.assign(Object.assign({},Object.assign({},...Object.entries(k).filter((([e])=>!e.startsWith(":")&&"transfer-encoding"!==e.toLowerCase())).map((([e,t])=>({[e]:t}))))),{host:R.hostname})},C=!B&&!H&&!["file:","logs:"].includes(R.protocol)&&(yield new Promise((e=>{const t="https:"===R.protocol?(0,r.request)(W,e):(0,n.request)(W,e);t.on("error",(t=>{B=Buffer.from(U(t,"request",m,$)),e(null)})),P&&(t.write(A),t.end()),P||(s.on("data",(e=>t.write(e))),s.on("end",(()=>t.end())))})));if(B)return void x(502,a,B);B=null,g.ssl&&L&&q&&(P&&(q.write(A),q.end()),P||(s.stream.on("data",(e=>{q.write(e)})),s.stream.on("end",(()=>q.end())))),!g.ssl&&D&&q&&(P&&(q.write(A),q.end()),P||(s.on("data",(e=>{q.write(e)})),s.on("end",(()=>q.end()))));const{outboundResponseHeaders:F}=yield new Promise((e=>q?q.on("response",(t=>{e({outboundResponseHeaders:t})})):e(!q&&C?{outboundResponseHeaders:C.headers}:{outboundResponseHeaders:{}})));b({level:"info",protocol:H?"HTTP/2":"HTTP1.1",method:s.method,path:w,uniqueHash:Buffer.from(JSON.stringify({method:s.method,url:s.url,headers:Object.assign({},...Object.entries(s.headers).filter((([e])=>!e.startsWith(":"))).map((([e,t])=>({[e]:t})))),body:null==A?void 0:A.toJSON()})).toString("base64")});const _=F.location?new o.URL(F.location.startsWith("/")?`${R.href}${F.location.replace(/^\/+/,"")}`:F.location):null,M=_?_.href.substring(_.origin.length):null,z=m.origin,J=_?`${z}${M}`:null,K=q||C,G=null!=B?B:yield new Promise((e=>{let t=Buffer.alloc(0);K?(K.on("data",(e=>t=Buffer.concat([t,"string"==typeof e?Buffer.from(e):e]))),K.on("end",(()=>{e(t)}))):e(t)})).then((e=>g.replaceResponseBodyUrls&&e.length?j(e,F,{proxyHostnameAndPort:u,proxyHostname:d,key:v,direction:p.INBOUND}).catch((e=>(x(502,a,Buffer.from(U(e,"stream",m,$))),Buffer.from("")))):e)),V=Object.assign(Object.assign({},Object.entries(Object.assign(Object.assign(Object.assign({},F),g.replaceResponseBodyUrls?{"content-length":`${G.byteLength}`}:{}),g.disableWebSecurity?{"content-security-policy":"report only","access-control-allow-headers":"*","access-control-allow-method":"*","access-control-allow-origin":"*"}:{})).filter((([e])=>!e.startsWith(":")&&"transfer-encoding"!==e.toLowerCase()&&"connection"!==e.toLowerCase()&&"keep-alive"!==e.toLowerCase())).reduce(((e,[t,n])=>{const r=O.split("").map(((e,t)=>O.substring(t).startsWith(".")&&O.substring(t))).filter((e=>e)),o=[O].concat(r).reduce(((e,t)=>(Array.isArray(e)?e:[e]).map((e=>"string"==typeof e?e.replace(`Domain=${t}`,`Domain=${m.hostname}`):e))),n);return e[t]=(e[t]||[]).concat(o),e}),{})),J?{location:[J]}:{});try{Object.entries(V).forEach((([e,t])=>t&&a.setHeader(e,t)))}catch(e){}a.writeHead(F[":status"]||C.statusCode||200,g.ssl?void 0:C.statusMessage||"Status read from http/2",V),G?a.end(G):a.end()})))).addListener("error",(e=>{"EACCES"===e.code&&R("permission denied for this port",c.ERROR,d.NO),"EADDRINUSE"===e.code&&R("port is already used. NOT started",c.ERROR,d.ERROR_6)})).addListener("listening",(()=>{O(g)})).on("upgrade",((e,t)=>{if(!g.websocket)return void t.end("HTTP/1.1 503 Service Unavailable\r\n\r\n");const{key:s,target:a,path:i}=T(e);if("/local-traffic-logs"===i){const n=(0,l.createHash)("sha1");n.update(e.headers["sec-websocket-key"]+"258EAFA5-E914-47DA-95CA-C5AB0DC85B11");const r=n.digest("base64");return t.allowHalfOpen=!0,t.write(`HTTP/1.1 101 Switching Protocols\r\ndate: ${(new Date).toUTCString()}\r\nconnection: upgrade\r\nupgrade: websocket\r\nserver: local\r\nsec-websocket-accept: ${r}\r\n\r\n`),t.on("close",(()=>{y=y.filter((e=>t!==e))})),void y.push(t)}const p=new o.URL(`${a.protocol}//${a.host}${e.url.endsWith("/_next/webpack-hmr")?e.url:e.url.replace(new RegExp(`^${s}`,"g"),"").replace(/^\/*/,"/")}`),u={hostname:p.hostname,path:p.pathname,port:p.port,protocol:p.protocol,rejectUnauthorized:!1,method:e.method,headers:e.headers,host:p.hostname},h="https:"===p.protocol?(0,r.request)(u):(0,n.request)(u);h.end(),h.on("error",(e=>{R("websocket request has errored "+(e.errno?`(${e.errno})`:""),c.WARNING,d.WEBSOCKET)})),h.on("upgrade",((e,n)=>{const r=`HTTP/${e.httpVersion} ${e.statusCode} ${e.statusMessage}\r\n${Object.entries(e.headers).flatMap((([e,t])=>(Array.isArray(t)?t:[t]).map((t=>[e,t])))).map((([e,t])=>`${e}: ${t}\r\n`)).join("")}\r\n`;t.write(r),t.allowHalfOpen=!0,n.allowHalfOpen=!0,n.on("data",(e=>t.write(e))),t.on("data",(e=>n.write(e))),n.on("error",(e=>{R("downstream socket has errored "+(e.errno?`(${e.errno})`:""),c.WARNING,d.WEBSOCKET)})),t.on("error",(e=>{R("upstream socket has errored "+(e.errno?`(${e.errno})`:""),c.WARNING,d.WEBSOCKET)}))}))})).listen(g.port)};w().then(H);
package/index.ts CHANGED
@@ -87,13 +87,15 @@ const filename = resolve(
87
87
  : userHomeConfigFile,
88
88
  );
89
89
  const defaultConfig: LocalConfiguration = {
90
- mapping: {},
90
+ mapping: {
91
+ "/logs/": "logs://",
92
+ },
91
93
  port: 8080,
92
94
  replaceRequestBodyUrls: false,
93
95
  replaceResponseBodyUrls: false,
94
96
  dontUseHttp2Downstream: false,
95
97
  simpleLogs: false,
96
- websocket: false,
98
+ websocket: true,
97
99
  disableWebSecurity: false,
98
100
  };
99
101
 
@@ -186,15 +188,15 @@ const quickStatus = (thisConfig: LocalConfiguration) => {
186
188
  log(
187
189
  `\u001b[48;5;52m⎸${EMOJIS.PORT} ${thisConfig.port
188
190
  .toString()
189
- .padStart(5)} \u001b[48;5;53m⎸${EMOJIS.INBOUND} ${
190
- thisConfig.ssl ? "H/2 " : "H1.1"
191
+ .padStart(5)} \u001b[48;5;53m⎸${EMOJIS.OUTBOUND} ${
192
+ thisConfig.dontUseHttp2Downstream ? "H1.1" : "H/2 "
191
193
  }${
192
194
  thisConfig.replaceRequestBodyUrls ? EMOJIS.REWRITE : " "
193
- }⎹\u001b[48;5;54m⎸${EMOJIS.OUTBOUND} ${
194
- thisConfig.dontUseHttp2Downstream ? "H1.1" : "H/2 "
195
+ }⎹⎸${EMOJIS.INBOUND} ${
196
+ thisConfig.ssl ? "H/2 " : "H1.1"
195
197
  }${
196
198
  thisConfig.replaceResponseBodyUrls ? EMOJIS.REWRITE : " "
197
- }⎹\u001b[48;5;55m⎸${EMOJIS.RULES}${Object.keys(config.mapping)
199
+ }⎹\u001b[48;5;54m\u001b[48;5;55m⎸${EMOJIS.RULES}${Object.keys(config.mapping)
198
200
  .length.toString()
199
201
  .padStart(3)}⎹\u001b[48;5;56m⎸${
200
202
  config.websocket ? EMOJIS.WEBSOCKET : EMOJIS.NO
@@ -351,10 +353,26 @@ const onWatch = async () => {
351
353
  config.port !== previousConfig.port ||
352
354
  JSON.stringify(config.ssl) !== JSON.stringify(previousConfig.ssl)
353
355
  ) {
354
- await new Promise(resolve =>
355
- !server ? resolve(void 0) : server.close(resolve),
356
- );
357
356
  log(`restarting server`, LogLevel.INFO, EMOJIS.RESTART);
357
+ await Promise.all(
358
+ logsListeners.map(
359
+ logsListener => new Promise(resolve => logsListener.end(resolve)),
360
+ ),
361
+ );
362
+ logsListeners = [];
363
+ const stopped = await Promise.race([
364
+ new Promise(resolve =>
365
+ !server ? resolve(void 0) : server.close(resolve),
366
+ ).then(() => true),
367
+ new Promise(resolve => setTimeout(resolve, 5000)).then(() => false),
368
+ ]);
369
+ if (!stopped) {
370
+ log(
371
+ `error during restart (websockets ?)`,
372
+ LogLevel.WARNING,
373
+ EMOJIS.RESTART,
374
+ );
375
+ }
358
376
  start();
359
377
  } else quickStatus(config);
360
378
  };
@@ -1169,10 +1187,11 @@ const start = () => {
1169
1187
  JSON.stringify({
1170
1188
  method: inboundRequest.method,
1171
1189
  url: inboundRequest.url,
1172
- headers: Object.assign({},
1173
- ...Object.entries(inboundRequest.headers).filter(
1174
- ([headerName]) => !headerName.startsWith(":"),
1175
- ).map(([key, value]) => ({[key]: value})),
1190
+ headers: Object.assign(
1191
+ {},
1192
+ ...Object.entries(inboundRequest.headers)
1193
+ .filter(([headerName]) => !headerName.startsWith(":"))
1194
+ .map(([key, value]) => ({ [key]: value })),
1176
1195
  ),
1177
1196
  body: requestBody?.toJSON(),
1178
1197
  }),
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "local-traffic",
3
- "version": "0.0.50",
3
+ "version": "0.0.52",
4
4
  "main": "index.ts",
5
5
  "private": false,
6
6
  "keywords": [
@@ -25,7 +25,7 @@
25
25
  },
26
26
  "devDependencies": {
27
27
  "@types/node": "^18.15.11",
28
- "terser": "^5.16.9",
28
+ "terser": "^5.17.1",
29
29
  "typescript": "^5.0.4"
30
30
  },
31
31
  "bin": {
package/renovate.json ADDED
@@ -0,0 +1,7 @@
1
+ {
2
+ "$schema": "https://docs.renovatebot.com/renovate-schema.json",
3
+ "extends": [
4
+ "config:base"
5
+ ],
6
+ "branchPrefix": "renovate-"
7
+ }