fix(smartproxy.portproxy): Optimize SNI handling by simplifying context creation

This commit is contained in:
Philipp Kunz 2025-02-21 19:53:19 +00:00
parent 1a586dcbd7
commit 6181065963
3 changed files with 10 additions and 9 deletions

View File

@ -1,5 +1,11 @@
# Changelog # Changelog
## 2025-02-21 - 3.7.1 - fix(smartproxy.portproxy)
Optimize SNI handling by simplifying context creation
- Removed unnecessary SecureContext creation for SNI requests in PortProxy
- Improved handling of SNI passthrough by acknowledging requests without context creation
## 2025-02-21 - 3.7.0 - feat(PortProxy) ## 2025-02-21 - 3.7.0 - feat(PortProxy)
Add optional source IP preservation support in PortProxy Add optional source IP preservation support in PortProxy

View File

@ -3,6 +3,6 @@
*/ */
export const commitinfo = { export const commitinfo = {
name: '@push.rocks/smartproxy', name: '@push.rocks/smartproxy',
version: '3.7.0', version: '3.7.1',
description: 'a proxy for handling high workloads of proxying' description: 'a proxy for handling high workloads of proxying'
} }

View File

@ -73,14 +73,9 @@ export class PortProxy {
...this.settings, ...this.settings,
SNICallback: (serverName: string, cb: (err: Error | null, ctx?: plugins.tls.SecureContext) => void) => { SNICallback: (serverName: string, cb: (err: Error | null, ctx?: plugins.tls.SecureContext) => void) => {
console.log(`SNI request for domain: ${serverName}`); console.log(`SNI request for domain: ${serverName}`);
const domainConfig = findMatchingDomain(serverName); // For SNI passthrough, we don't need to create a context
if (!domainConfig) { // Just acknowledge the SNI request and continue
// Always allow SNI for default IPs, even if domain doesn't match cb(null);
console.log(`SNI domain ${serverName} not found, will check IP during connection`);
}
// Create context with the provided TLS settings
const ctx = plugins.tls.createSecureContext(this.settings);
cb(null, ctx);
} }
}) })
: plugins.net.createServer(); : plugins.net.createServer();