Compare commits
37 Commits
Author | SHA1 | Date | |
---|---|---|---|
b5e985eaf9 | |||
669cc2809c | |||
3b1531d4a2 | |||
018a49dbc2 | |||
b30464a612 | |||
c9abdea556 | |||
e61766959f | |||
62dc067a2a | |||
91018173b0 | |||
84c5d0a69e | |||
42fe1e5d15 | |||
85bd448858 | |||
da061292ae | |||
6387b32d4b | |||
3bf4e97e71 | |||
98ef91b6ea | |||
1b4d215cd4 | |||
70448af5b4 | |||
33732c2361 | |||
8d821b4e25 | |||
4b381915e1 | |||
5c6437c5b3 | |||
a31c68b03f | |||
465148d553 | |||
8fb67922a5 | |||
6d3e72c948 | |||
e317fd9d7e | |||
4134d2842c | |||
02e77655ad | |||
f9bcbf4bfc | |||
ec81678651 | |||
9646dba601 | |||
0faca5e256 | |||
26529baef2 | |||
3fcdce611c | |||
0bd35c4fb3 | |||
094edfafd1 |
@ -1,5 +1,5 @@
|
||||
{
|
||||
"expiryDate": "2025-08-16T18:25:31.732Z",
|
||||
"issueDate": "2025-05-18T18:25:31.732Z",
|
||||
"savedAt": "2025-05-18T18:25:31.734Z"
|
||||
"expiryDate": "2025-08-17T16:58:47.999Z",
|
||||
"issueDate": "2025-05-19T16:58:47.999Z",
|
||||
"savedAt": "2025-05-19T16:58:48.001Z"
|
||||
}
|
186
changelog.md
186
changelog.md
@ -1,5 +1,191 @@
|
||||
# Changelog
|
||||
|
||||
## 2025-05-20 - 19.3.13 - fix(port-manager, certificate-manager)
|
||||
Improve port binding and ACME challenge route integration in SmartProxy
|
||||
|
||||
- Added reference counting in PortManager so that routes sharing the same port reuse the existing binding.
|
||||
- Enhanced error handling to distinguish internal port conflicts from external ones, with more descriptive messages.
|
||||
- Adjusted ACME challenge route addition to merge with existing port bindings when port is already in use.
|
||||
- Refactored updateRoutes to release orphaned ports and bind only new required ports, minimizing rebinding operations.
|
||||
- Improved certificate-manager logic to provide clearer error notifications when ACME port conflicts occur.
|
||||
|
||||
## 2025-05-19 - 19.3.12 - fix(tests)
|
||||
Update test mocks to include provisionAllCertificates methods in certificate manager stubs and related objects.
|
||||
|
||||
- Added async provisionAllCertificates functions to several test mocks (e.g. in test.port80-management.node.ts, test.route-callback-simple.ts, test.route-update-callback.node.ts, and test.simple-acme-mock.ts) to simulate ACME certificate provisioning.
|
||||
- Enhanced logging and port-add history debugging for ACME challenge port addition.
|
||||
|
||||
## 2025-05-19 - 19.3.11 - fix(logger)
|
||||
Replace raw console logging calls with structured logger usage across certificate management, connection handling, and route processing for improved observability.
|
||||
|
||||
- Replaced console.log, console.warn, and console.error in SmartCertManager with logger.log for more consistent logging.
|
||||
- Updated ConnectionManager and RouteConnectionHandler to log detailed connection events using a structured logger.
|
||||
- Enhanced logging statements with contextual metadata such as connection IDs, remote IPs, target information, and component identifiers.
|
||||
- Standardized log output across proxy modules to aid in debugging and monitoring.
|
||||
|
||||
## 2025-05-19 - 19.3.10 - fix(certificate-manager, smart-proxy)
|
||||
Fix race condition in ACME certificate provisioning and refactor certificate manager initialization to defer provisioning until after port listeners are active
|
||||
|
||||
- Removed superfluous provisionCertificatesAfterPortsReady method
|
||||
- Made provisionAllCertificates public so that SmartProxy.start() calls it after ports are listening
|
||||
- Updated SmartProxy.start() to wait for port setup (via PortManager) before triggering certificate provisioning
|
||||
- Improved ACME HTTP-01 challenge timing so that port 80 (or configured ACME port) is guaranteed to be ready
|
||||
- Updated documentation (changelog and Acme timing docs) and tests to reflect the change
|
||||
|
||||
## 2025-05-19 - 19.3.10 - refactor(certificate-manager, smart-proxy)
|
||||
Simplify certificate provisioning code by removing unnecessary wrapper method
|
||||
|
||||
- Removed superfluous SmartCertManager.provisionCertificatesAfterPortsReady() method
|
||||
- Made SmartCertManager.provisionAllCertificates() public instead
|
||||
- Updated SmartProxy.start() to call provisionAllCertificates() directly
|
||||
- Updated documentation and tests to reflect the change
|
||||
- No functional changes, just code simplification
|
||||
|
||||
## 2025-05-19 - 19.3.9 - fix(certificate-manager, smart-proxy)
|
||||
Fix ACME certificate provisioning timing to ensure ports are listening first
|
||||
|
||||
- Fixed race condition where certificate provisioning would start before ports were listening
|
||||
- Modified SmartCertManager.initialize() to defer certificate provisioning
|
||||
- Added SmartCertManager.provisionCertificatesAfterPortsReady() for delayed provisioning
|
||||
- Updated SmartProxy.start() to call certificate provisioning after ports are ready
|
||||
- This fix prevents ACME HTTP-01 challenges from failing due to port 80 not being ready
|
||||
- Added test/test.acme-timing-simple.ts to verify the timing synchronization
|
||||
|
||||
## 2025-05-19 - 19.3.9 - fix(route-connection-handler)
|
||||
Forward non-TLS connections on HttpProxy ports to fix ACME HTTP-01 challenge handling
|
||||
|
||||
- Added a check in RouteConnectionHandler.handleForwardAction to see if the incoming connection is non-TLS and if its port is in useHttpProxy, then forward to HttpProxy.
|
||||
- Non-TLS connections on explicitly configured HttpProxy ports are now correctly forwarded, ensuring ACME HTTP-01 challenges succeed.
|
||||
- Updated tests in test.http-fix-unit.ts, test.http-fix-verification.ts, and test.http-port8080-forwarding.ts to verify that non-TLS connections on the configured ports are handled properly.
|
||||
|
||||
## 2025-05-19 - 19.3.8 - fix(route-connection-handler)
|
||||
Fix HTTP-01 ACME challenges on port 80 by properly forwarding non-TLS connections to HttpProxy
|
||||
|
||||
- Fixed a bug where non-TLS connections on ports configured in useHttpProxy were not being forwarded to HttpProxy
|
||||
- Added check for non-TLS connections on HttpProxy ports in handleForwardAction method
|
||||
- This fix resolves ACME HTTP-01 challenges failing on port 80 when useHttpProxy includes port 80
|
||||
- Added test/test.http-fix-unit.ts to verify the fix works correctly
|
||||
|
||||
## 2025-05-19 - 19.3.8 - fix(certificate-manager)
|
||||
Preserve certificate manager update callback in updateRoutes
|
||||
|
||||
- Update the test in test/route-callback-simple.ts to override createCertificateManager and ensure the updateRoutes callback is set
|
||||
- Ensure that the mock certificate manager always sets the updateRoutes callback, preserving behavior for ACME challenges
|
||||
|
||||
## 2025-05-19 - 19.3.7 - fix(smartproxy)
|
||||
Improve error handling in forwarding connection handler and refine domain matching logic
|
||||
|
||||
- Add new test 'test.forwarding-fix-verification.ts' to ensure NFTables forwarded connections remain open
|
||||
- Introduce setupOutgoingErrorHandler in route-connection-handler.ts for clearer, unified error reporting during outgoing connection setup
|
||||
- Simplify direct connection piping by removing manual data queue processing in route-connection-handler.ts
|
||||
- Enhance domain matching in route-manager.ts by explicitly handling routes with and without domain restrictions
|
||||
|
||||
## 2025-05-19 - 19.3.6 - fix(tests)
|
||||
Fix route configuration property names in tests: replace 'acceptedRoutes' with 'routes' in nftables tests and update 'match: { port: ... }' to 'match: { ports: ... }' in port forwarding tests.
|
||||
|
||||
- Renamed 'acceptedRoutes' to 'routes' in test/nftables-forwarding.ts for alignment with the current SmartProxy API.
|
||||
- Changed port matching in test/port-forwarding-fix.ts from 'match: { port: ... }' to 'match: { ports: ... }' for consistency.
|
||||
|
||||
## 2025-05-19 - 19.3.6 - fix(tests)
|
||||
Update test route config properties: replace 'acceptedRoutes' with 'routes' in nftables tests and change 'match: { port: ... }' to 'match: { ports: ... }' in port forwarding tests
|
||||
|
||||
- In test/nftables-forwarding.ts, renamed property 'acceptedRoutes' to 'routes' to align with current SmartProxy API.
|
||||
- In test/port-forwarding-fix.ts, updated 'match: { port: 9999 }' to 'match: { ports: 9999 }' for consistency.
|
||||
|
||||
## 2025-05-19 - 19.3.5 - fix(smartproxy)
|
||||
Correct NFTables forwarding handling to avoid premature connection termination and add comprehensive tests
|
||||
|
||||
- Removed overly aggressive socket closing for routes using NFTables forwarding in route-connection-handler.ts
|
||||
- Now logs NFTables-handled connections for monitoring while letting kernel-level forwarding operate transparently
|
||||
- Added and updated tests for connection forwarding, NFTables integration and port forwarding fixes
|
||||
- Enhanced logging and error handling in NFTables and TLS handling functions
|
||||
|
||||
## 2025-05-19 - 19.3.4 - fix(docs, tests, acme)
|
||||
fix: update changelog, documentation, examples and tests for v19.4.0 release. Adjust global ACME configuration to use ssl@bleu.de and add non-privileged port examples.
|
||||
|
||||
- Updated changelog with new v19.4.0 entry detailing fixes in tests and docs
|
||||
- Revised README and certificate-management.md to demonstrate global ACME settings (using ssl@bleu.de, non-privileged port support, auto-renewal configuration, and renewCheckIntervalHours)
|
||||
- Added new examples (certificate-management-v19.ts and complete-example-v19.ts) and updated existing examples (dynamic port management, NFTables integration) to reflect v19.4.0 features
|
||||
- Fixed test exports and port mapping issues in several test files (acme-state-manager, port80-management, race-conditions, etc.)
|
||||
- Updated readme.plan.md to reflect completed refactoring and breaking changes from v19.3.3
|
||||
|
||||
## 2025-05-19 - 19.4.0 - fix(tests) & docs
|
||||
Fix failing tests and update documentation for v19+ features
|
||||
|
||||
- Fix ForwardingHandlerFactory.applyDefaults to set port and socket properties correctly
|
||||
- Fix route finding logic in forwarding tests to properly identify redirect routes
|
||||
- Fix test exports in acme-state-manager.node.ts, port80-management.node.ts, and race-conditions.node.ts
|
||||
- Update ACME email configuration to use ssl@bleu.de instead of test domains
|
||||
- Update README with v19.4.0 features including global ACME configuration
|
||||
- Update certificate-management.md documentation to reflect v19+ changes
|
||||
- Add new examples: certificate-management-v19.ts and complete-example-v19.ts
|
||||
- Update existing examples to demonstrate global ACME configuration
|
||||
- Update readme.plan.md to reflect completed refactoring
|
||||
|
||||
## 2025-05-19 - 19.3.3 - fix(core)
|
||||
No changes detected – project structure and documentation remain unchanged.
|
||||
|
||||
- Git diff indicates no modifications.
|
||||
- All source code, tests, and documentation files are intact with no alterations.
|
||||
|
||||
## 2025-05-19 - 19.3.2 - fix(SmartCertManager)
|
||||
Preserve certificate manager update callback during route updates
|
||||
|
||||
- Modify test cases (test.fix-verification.ts, test.route-callback-simple.ts, test.route-update-callback.node.ts) to verify that the updateRoutesCallback is preserved upon route updates.
|
||||
- Ensure that a new certificate manager created during updateRoutes correctly sets the update callback.
|
||||
- Expose getState() in certificate-manager for reliable state retrieval.
|
||||
|
||||
## 2025-05-19 - 19.3.1 - fix(certificates)
|
||||
Update static-route certificate metadata for ACME challenges
|
||||
|
||||
- Updated expiryDate and issueDate in certs/static-route/meta.json to reflect new certificate issuance information
|
||||
|
||||
## 2025-05-19 - 19.3.0 - feat(smartproxy)
|
||||
Update dependencies and enhance ACME certificate provisioning with wildcard support
|
||||
|
||||
- Bump @types/node from ^22.15.18 to ^22.15.19
|
||||
- Bump @push.rocks/smartacme from ^7.3.4 to ^8.0.0
|
||||
- Bump @push.rocks/smartnetwork from ^4.0.1 to ^4.0.2
|
||||
- Add new test (test.certificate-acme-update.ts) to verify wildcard certificate logic
|
||||
- Update SmartCertManager to request wildcard certificates if DNS-01 challenge is available
|
||||
|
||||
## 2025-05-19 - 19.2.6 - fix(tests)
|
||||
Adjust test cases for ACME challenge route handling, mutex locking in route updates, and port management. Remove obsolete challenge-route lifecycle tests and update expected outcomes in port80 management and race condition tests.
|
||||
|
||||
- Remove test file 'test.challenge-route-lifecycle.node.ts'
|
||||
- Rename 'acme-route' to 'secure-route' in port80 management tests to avoid confusion
|
||||
- Ensure port 80 is added only once when both user routes and ACME challenge use the same port
|
||||
- Improve mutex locking tests to guarantee serialized route updates with no concurrent execution
|
||||
- Adjust expected certificate manager recreation counts in race conditions tests
|
||||
|
||||
## 2025-05-19 - 19.2.5 - fix(acme)
|
||||
Fix port 80 ACME management and challenge route concurrency issues by deduplicating port listeners, preserving challenge route state across certificate manager recreations, and adding mutex locks to route updates.
|
||||
|
||||
- Updated docs/port80-acme-management.md with detailed troubleshooting and best practices for shared port handling.
|
||||
- Enhanced SmartCertManager and AcmeStateManager to preserve challenge route state and globally track ACME port allocations.
|
||||
- Added mutex locks in updateRoutes to prevent race conditions and duplicate challenge route creation.
|
||||
- Improved cleanup verification to ensure challenge routes are correctly removed and ports released.
|
||||
- Introduced additional tests for ACME configuration, race conditions, and state preservation.
|
||||
|
||||
## 2025-05-19 - 19.2.4 - fix(acme)
|
||||
Refactor ACME challenge route lifecycle to prevent port 80 EADDRINUSE errors
|
||||
|
||||
- Challenge route is now added only once during initialization and remains active through the entire certificate provisioning process
|
||||
- Introduced concurrency controls to prevent duplicate challenge route operations during simultaneous certificate provisioning
|
||||
- Enhanced error handling for port conflicts on port 80 with explicit error messages
|
||||
- Updated tests to cover challenge route lifecycle, concurrent provisioning, and proper cleanup on errors
|
||||
- Documentation updated with troubleshooting guidelines for port 80 conflicts and challenge route lifecycle
|
||||
|
||||
## 2025-05-19 - 19.2.4 - fix(acme)
|
||||
Fix port 80 EADDRINUSE error during concurrent ACME certificate provisioning
|
||||
|
||||
- Refactored challenge route lifecycle to add route once during initialization instead of per certificate
|
||||
- Implemented concurrency controls to prevent race conditions during certificate provisioning
|
||||
- Added proper cleanup of challenge route on certificate manager shutdown
|
||||
- Enhanced error handling with specific messages for port conflicts
|
||||
- Created comprehensive tests for challenge route lifecycle
|
||||
- Updated documentation with troubleshooting guide for port 80 conflicts
|
||||
|
||||
## 2025-05-18 - 19.2.3 - fix(certificate-management)
|
||||
Fix loss of route update callback during dynamic route updates in certificate manager
|
||||
|
||||
|
@ -1,297 +0,0 @@
|
||||
# Certificate Management in SmartProxy v19+
|
||||
|
||||
## Overview
|
||||
|
||||
SmartProxy v19+ enhances certificate management with support for both global and route-level ACME configuration. This guide covers the updated certificate management system, which now supports flexible configuration hierarchies.
|
||||
|
||||
## Key Changes from Previous Versions
|
||||
|
||||
### v19.0.0 Changes
|
||||
- **Global ACME configuration**: Set default ACME settings for all routes with `certificate: 'auto'`
|
||||
- **Configuration hierarchy**: Top-level ACME settings serve as defaults, route-level settings override
|
||||
- **Better error messages**: Clear guidance when ACME configuration is missing
|
||||
- **Improved validation**: Configuration validation warns about common issues
|
||||
|
||||
### v18.0.0 Changes (from v17)
|
||||
- **No backward compatibility**: Clean break from the legacy certificate system
|
||||
- **No separate Port80Handler**: ACME challenges handled as regular SmartProxy routes
|
||||
- **Unified route-based configuration**: Certificates configured directly in route definitions
|
||||
- **Direct integration with @push.rocks/smartacme**: Leverages SmartAcme's built-in capabilities
|
||||
|
||||
## Configuration
|
||||
|
||||
### Global ACME Configuration (New in v19+)
|
||||
|
||||
Set default ACME settings at the top level that apply to all routes with `certificate: 'auto'`:
|
||||
|
||||
```typescript
|
||||
const proxy = new SmartProxy({
|
||||
// Global ACME defaults
|
||||
acme: {
|
||||
email: 'ssl@example.com', // Required for Let's Encrypt
|
||||
useProduction: false, // Use staging by default
|
||||
port: 80, // Port for HTTP-01 challenges
|
||||
renewThresholdDays: 30, // Renew 30 days before expiry
|
||||
certificateStore: './certs', // Certificate storage directory
|
||||
autoRenew: true, // Enable automatic renewal
|
||||
renewCheckIntervalHours: 24 // Check for renewals daily
|
||||
},
|
||||
|
||||
routes: [
|
||||
// Routes using certificate: 'auto' will inherit global settings
|
||||
{
|
||||
name: 'website',
|
||||
match: { ports: 443, domains: 'example.com' },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto' // Uses global ACME configuration
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
});
|
||||
```
|
||||
|
||||
### Route-Level Certificate Configuration
|
||||
|
||||
Certificates are now configured at the route level using the `tls` property:
|
||||
|
||||
```typescript
|
||||
const route: IRouteConfig = {
|
||||
name: 'secure-website',
|
||||
match: {
|
||||
ports: 443,
|
||||
domains: ['example.com', 'www.example.com']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto', // Use ACME (Let's Encrypt)
|
||||
acme: {
|
||||
email: 'admin@example.com',
|
||||
useProduction: true,
|
||||
renewBeforeDays: 30
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
```
|
||||
|
||||
### Static Certificate Configuration
|
||||
|
||||
For manually managed certificates:
|
||||
|
||||
```typescript
|
||||
const route: IRouteConfig = {
|
||||
name: 'api-endpoint',
|
||||
match: {
|
||||
ports: 443,
|
||||
domains: 'api.example.com'
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 9000 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: {
|
||||
certFile: './certs/api.crt',
|
||||
keyFile: './certs/api.key',
|
||||
ca: '...' // Optional CA chain
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
```
|
||||
|
||||
## TLS Modes
|
||||
|
||||
SmartProxy supports three TLS modes:
|
||||
|
||||
1. **terminate**: Decrypt TLS at the proxy and forward plain HTTP
|
||||
2. **passthrough**: Pass encrypted TLS traffic directly to the backend
|
||||
3. **terminate-and-reencrypt**: Decrypt at proxy, then re-encrypt to backend
|
||||
|
||||
## Certificate Storage
|
||||
|
||||
Certificates are stored in the `./certs` directory by default:
|
||||
|
||||
```
|
||||
./certs/
|
||||
├── route-name/
|
||||
│ ├── cert.pem
|
||||
│ ├── key.pem
|
||||
│ ├── ca.pem (if available)
|
||||
│ └── meta.json
|
||||
```
|
||||
|
||||
## ACME Integration
|
||||
|
||||
### How It Works
|
||||
|
||||
1. SmartProxy creates a high-priority route for ACME challenges
|
||||
2. When ACME server makes requests to `/.well-known/acme-challenge/*`, SmartProxy handles them automatically
|
||||
3. Certificates are obtained and stored locally
|
||||
4. Automatic renewal checks every 12 hours
|
||||
|
||||
### Configuration Options
|
||||
|
||||
```typescript
|
||||
export interface IRouteAcme {
|
||||
email: string; // Contact email for ACME account
|
||||
useProduction?: boolean; // Use production servers (default: false)
|
||||
challengePort?: number; // Port for HTTP-01 challenges (default: 80)
|
||||
renewBeforeDays?: number; // Days before expiry to renew (default: 30)
|
||||
}
|
||||
```
|
||||
|
||||
## Advanced Usage
|
||||
|
||||
### Manual Certificate Operations
|
||||
|
||||
```typescript
|
||||
// Get certificate status
|
||||
const status = proxy.getCertificateStatus('route-name');
|
||||
console.log(status);
|
||||
// {
|
||||
// domain: 'example.com',
|
||||
// status: 'valid',
|
||||
// source: 'acme',
|
||||
// expiryDate: Date,
|
||||
// issueDate: Date
|
||||
// }
|
||||
|
||||
// Force certificate renewal
|
||||
await proxy.renewCertificate('route-name');
|
||||
|
||||
// Manually provision a certificate
|
||||
await proxy.provisionCertificate('route-name');
|
||||
```
|
||||
|
||||
### Events
|
||||
|
||||
SmartProxy emits certificate-related events:
|
||||
|
||||
```typescript
|
||||
proxy.on('certificate:issued', (event) => {
|
||||
console.log(`New certificate for ${event.domain}`);
|
||||
});
|
||||
|
||||
proxy.on('certificate:renewed', (event) => {
|
||||
console.log(`Certificate renewed for ${event.domain}`);
|
||||
});
|
||||
|
||||
proxy.on('certificate:expiring', (event) => {
|
||||
console.log(`Certificate expiring soon for ${event.domain}`);
|
||||
});
|
||||
```
|
||||
|
||||
## Migration from Previous Versions
|
||||
|
||||
### Before (v17 and earlier)
|
||||
|
||||
```typescript
|
||||
// Old approach with Port80Handler
|
||||
const smartproxy = new SmartProxy({
|
||||
port: 443,
|
||||
acme: {
|
||||
enabled: true,
|
||||
accountEmail: 'admin@example.com',
|
||||
// ... other ACME options
|
||||
}
|
||||
});
|
||||
|
||||
// Certificate provisioning was automatic or via certProvisionFunction
|
||||
```
|
||||
|
||||
### After (v18+)
|
||||
|
||||
```typescript
|
||||
// New approach with route-based configuration
|
||||
const smartproxy = new SmartProxy({
|
||||
routes: [{
|
||||
match: { ports: 443, domains: 'example.com' },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: {
|
||||
email: 'admin@example.com',
|
||||
useProduction: true
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
```
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
### Common Issues
|
||||
|
||||
1. **Certificate not provisioning**: Ensure port 80 is accessible for ACME challenges
|
||||
2. **ACME rate limits**: Use staging environment for testing
|
||||
3. **Permission errors**: Ensure the certificate directory is writable
|
||||
|
||||
### Debug Mode
|
||||
|
||||
Enable detailed logging to troubleshoot certificate issues:
|
||||
|
||||
```typescript
|
||||
const proxy = new SmartProxy({
|
||||
enableDetailedLogging: true,
|
||||
// ... other options
|
||||
});
|
||||
```
|
||||
|
||||
## Dynamic Route Updates
|
||||
|
||||
When routes are updated dynamically using `updateRoutes()`, SmartProxy maintains certificate management continuity:
|
||||
|
||||
```typescript
|
||||
// Update routes with new domains
|
||||
await proxy.updateRoutes([
|
||||
{
|
||||
name: 'new-domain',
|
||||
match: { ports: 443, domains: 'newsite.example.com' },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto' // Will use global ACME config
|
||||
}
|
||||
}
|
||||
}
|
||||
]);
|
||||
```
|
||||
|
||||
### Important Notes on Route Updates
|
||||
|
||||
1. **Certificate Manager Recreation**: When routes are updated, the certificate manager is recreated to reflect the new configuration
|
||||
2. **ACME Callbacks Preserved**: The ACME route update callback is automatically preserved during route updates
|
||||
3. **Existing Certificates**: Certificates already provisioned are retained in the certificate store
|
||||
4. **New Route Certificates**: New routes with `certificate: 'auto'` will trigger certificate provisioning
|
||||
|
||||
### Route Update Best Practices
|
||||
|
||||
1. **Batch Updates**: Update multiple routes in a single `updateRoutes()` call for efficiency
|
||||
2. **Monitor Certificate Status**: Check certificate status after route updates
|
||||
3. **Handle ACME Errors**: Implement error handling for certificate provisioning failures
|
||||
4. **Test Updates**: Test route updates in staging environment first
|
||||
|
||||
## Best Practices
|
||||
|
||||
1. **Always test with staging ACME servers first**
|
||||
2. **Set up monitoring for certificate expiration**
|
||||
3. **Use meaningful route names for easier certificate management**
|
||||
4. **Store static certificates securely with appropriate permissions**
|
||||
5. **Implement certificate status monitoring in production**
|
||||
6. **Batch route updates when possible to minimize disruption**
|
||||
7. **Monitor certificate provisioning after route updates**
|
@ -1,468 +0,0 @@
|
||||
# SmartProxy Port Handling
|
||||
|
||||
This document covers all the port handling capabilities in SmartProxy, including port range specification, dynamic port mapping, and runtime port management.
|
||||
|
||||
## Port Range Syntax
|
||||
|
||||
SmartProxy offers flexible port range specification through the `TPortRange` type, which can be defined in three different ways:
|
||||
|
||||
### 1. Single Port
|
||||
|
||||
```typescript
|
||||
// Match a single port
|
||||
{
|
||||
match: {
|
||||
ports: 443
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 2. Array of Specific Ports
|
||||
|
||||
```typescript
|
||||
// Match multiple specific ports
|
||||
{
|
||||
match: {
|
||||
ports: [80, 443, 8080]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 3. Port Range
|
||||
|
||||
```typescript
|
||||
// Match a range of ports
|
||||
{
|
||||
match: {
|
||||
ports: [{ from: 8000, to: 8100 }]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 4. Mixed Port Specifications
|
||||
|
||||
You can combine different port specification methods in a single rule:
|
||||
|
||||
```typescript
|
||||
// Match both specific ports and port ranges
|
||||
{
|
||||
match: {
|
||||
ports: [80, 443, { from: 8000, to: 8100 }]
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## Port Forwarding Options
|
||||
|
||||
SmartProxy offers several ways to handle port forwarding from source to target:
|
||||
|
||||
### 1. Static Port Forwarding
|
||||
|
||||
Forward to a fixed target port:
|
||||
|
||||
```typescript
|
||||
{
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: 8080
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 2. Preserve Source Port
|
||||
|
||||
Forward to the same port on the target:
|
||||
|
||||
```typescript
|
||||
{
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: 'preserve'
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 3. Dynamic Port Mapping
|
||||
|
||||
Use a function to determine the target port based on connection context:
|
||||
|
||||
```typescript
|
||||
{
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: (context) => {
|
||||
// Calculate port based on request details
|
||||
return 8000 + (context.port % 100);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## Port Selection Context
|
||||
|
||||
When using dynamic port mapping functions, you have access to a rich context object that provides details about the connection:
|
||||
|
||||
```typescript
|
||||
interface IRouteContext {
|
||||
// Connection information
|
||||
port: number; // The matched incoming port
|
||||
domain?: string; // The domain from SNI or Host header
|
||||
clientIp: string; // The client's IP address
|
||||
serverIp: string; // The server's IP address
|
||||
path?: string; // URL path (for HTTP connections)
|
||||
query?: string; // Query string (for HTTP connections)
|
||||
headers?: Record<string, string>; // HTTP headers (for HTTP connections)
|
||||
|
||||
// TLS information
|
||||
isTls: boolean; // Whether the connection is TLS
|
||||
tlsVersion?: string; // TLS version if applicable
|
||||
|
||||
// Route information
|
||||
routeName?: string; // The name of the matched route
|
||||
routeId?: string; // The ID of the matched route
|
||||
|
||||
// Additional properties
|
||||
timestamp: number; // The request timestamp
|
||||
connectionId: string; // Unique connection identifier
|
||||
}
|
||||
```
|
||||
|
||||
## Common Port Mapping Patterns
|
||||
|
||||
### 1. Port Offset Mapping
|
||||
|
||||
Forward traffic to target ports with a fixed offset:
|
||||
|
||||
```typescript
|
||||
{
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: (context) => context.port + 1000
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 2. Domain-Based Port Mapping
|
||||
|
||||
Forward to different backend ports based on the domain:
|
||||
|
||||
```typescript
|
||||
{
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: (context) => {
|
||||
switch (context.domain) {
|
||||
case 'api.example.com': return 8001;
|
||||
case 'admin.example.com': return 8002;
|
||||
case 'staging.example.com': return 8003;
|
||||
default: return 8000;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 3. Load Balancing with Hash-Based Distribution
|
||||
|
||||
Distribute connections across a port range using a deterministic hash function:
|
||||
|
||||
```typescript
|
||||
{
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: (context) => {
|
||||
// Simple hash function to ensure consistent mapping
|
||||
const hostname = context.domain || '';
|
||||
const hash = hostname.split('').reduce((a, b) => a + b.charCodeAt(0), 0);
|
||||
return 8000 + (hash % 10); // Map to ports 8000-8009
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## IPv6-Mapped IPv4 Compatibility
|
||||
|
||||
SmartProxy automatically handles IPv6-mapped IPv4 addresses for optimal compatibility. When a connection from an IPv4 address (e.g., `192.168.1.1`) arrives as an IPv6-mapped address (`::ffff:192.168.1.1`), the system normalizes these addresses for consistent matching.
|
||||
|
||||
This is particularly important when:
|
||||
|
||||
1. Matching client IP restrictions in route configurations
|
||||
2. Preserving source IP for outgoing connections
|
||||
3. Tracking connections and rate limits
|
||||
|
||||
No special configuration is needed - the system handles this normalization automatically.
|
||||
|
||||
## Dynamic Port Management
|
||||
|
||||
SmartProxy allows for runtime port configuration changes without requiring a restart.
|
||||
|
||||
### Adding and Removing Ports
|
||||
|
||||
```typescript
|
||||
// Get the SmartProxy instance
|
||||
const proxy = new SmartProxy({ /* config */ });
|
||||
|
||||
// Add a new listening port
|
||||
await proxy.addListeningPort(8081);
|
||||
|
||||
// Remove a listening port
|
||||
await proxy.removeListeningPort(8082);
|
||||
```
|
||||
|
||||
### Runtime Route Updates
|
||||
|
||||
```typescript
|
||||
// Get current routes
|
||||
const currentRoutes = proxy.getRoutes();
|
||||
|
||||
// Add new route for the new port
|
||||
const newRoute = {
|
||||
name: 'New Dynamic Route',
|
||||
match: {
|
||||
ports: 8081,
|
||||
domains: ['dynamic.example.com']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: 9000
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
// Update the route configuration
|
||||
await proxy.updateRoutes([...currentRoutes, newRoute]);
|
||||
|
||||
// Remove routes for a specific port
|
||||
const routesWithout8082 = currentRoutes.filter(route => {
|
||||
const ports = proxy.routeManager.expandPortRange(route.match.ports);
|
||||
return !ports.includes(8082);
|
||||
});
|
||||
await proxy.updateRoutes(routesWithout8082);
|
||||
```
|
||||
|
||||
## Performance Considerations
|
||||
|
||||
### Port Range Expansion
|
||||
|
||||
When using large port ranges, SmartProxy uses internal caching to optimize performance. For example, a range like `{ from: 1000, to: 2000 }` is expanded only once and then cached for future use.
|
||||
|
||||
### Port Range Validation
|
||||
|
||||
The system automatically validates port ranges to ensure:
|
||||
|
||||
1. Port numbers are within the valid range (1-65535)
|
||||
2. The "from" value is not greater than the "to" value in range specifications
|
||||
3. Port ranges do not contain duplicate entries
|
||||
|
||||
Invalid port ranges will be logged as warnings and skipped during configuration.
|
||||
|
||||
## Configuration Recipes
|
||||
|
||||
### Global Port Range
|
||||
|
||||
Listen on a large range of ports and forward to the same ports on a backend:
|
||||
|
||||
```typescript
|
||||
{
|
||||
name: 'Global port range forwarding',
|
||||
match: {
|
||||
ports: [{ from: 8000, to: 9000 }]
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'backend.example.com',
|
||||
port: 'preserve'
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Domain-Specific Port Ranges
|
||||
|
||||
Different port ranges for different domain groups:
|
||||
|
||||
```typescript
|
||||
[
|
||||
{
|
||||
name: 'API port range',
|
||||
match: {
|
||||
ports: [{ from: 8000, to: 8099 }]
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'api.backend.example.com',
|
||||
port: 'preserve'
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
name: 'Admin port range',
|
||||
match: {
|
||||
ports: [{ from: 9000, to: 9099 }]
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'admin.backend.example.com',
|
||||
port: 'preserve'
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
```
|
||||
|
||||
### Mixed Internal/External Port Forwarding
|
||||
|
||||
Forward specific high-numbered ports to standard ports on internal servers:
|
||||
|
||||
```typescript
|
||||
[
|
||||
{
|
||||
name: 'Web server forwarding',
|
||||
match: {
|
||||
ports: [8080, 8443]
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'web.internal',
|
||||
port: (context) => context.port === 8080 ? 80 : 443
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
name: 'Database forwarding',
|
||||
match: {
|
||||
ports: [15432]
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'db.internal',
|
||||
port: 5432
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
```
|
||||
|
||||
## Debugging Port Configurations
|
||||
|
||||
When troubleshooting port forwarding issues, enable detailed logging:
|
||||
|
||||
```typescript
|
||||
const proxy = new SmartProxy({
|
||||
routes: [ /* your routes */ ],
|
||||
enableDetailedLogging: true
|
||||
});
|
||||
```
|
||||
|
||||
This will log:
|
||||
- Port configuration during startup
|
||||
- Port matching decisions during routing
|
||||
- Dynamic port function results
|
||||
- Connection details including source and target ports
|
||||
|
||||
## Port Security Considerations
|
||||
|
||||
### Restricting Ports
|
||||
|
||||
For security, you may want to restrict which ports can be accessed by specific clients:
|
||||
|
||||
```typescript
|
||||
{
|
||||
name: 'Restricted port range',
|
||||
match: {
|
||||
ports: [{ from: 8000, to: 9000 }],
|
||||
clientIp: ['10.0.0.0/8'] // Only internal network can access these ports
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'internal.example.com',
|
||||
port: 'preserve'
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Rate Limiting by Port
|
||||
|
||||
Apply different rate limits for different port ranges:
|
||||
|
||||
```typescript
|
||||
{
|
||||
name: 'API ports with rate limiting',
|
||||
match: {
|
||||
ports: [{ from: 8000, to: 8100 }]
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'api.example.com',
|
||||
port: 'preserve'
|
||||
},
|
||||
security: {
|
||||
rateLimit: {
|
||||
enabled: true,
|
||||
maxRequests: 100,
|
||||
window: 60 // 60 seconds
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## Best Practices
|
||||
|
||||
1. **Use Specific Port Ranges**: Instead of large ranges (e.g., 1-65535), use specific ranges for specific purposes
|
||||
|
||||
2. **Prioritize Routes**: When multiple routes could match, use the `priority` field to ensure the most specific route is matched first
|
||||
|
||||
3. **Name Your Routes**: Use descriptive names to make debugging easier, especially when using port ranges
|
||||
|
||||
4. **Use Preserve Port Where Possible**: Using `port: 'preserve'` is more efficient and easier to maintain than creating multiple specific mappings
|
||||
|
||||
5. **Limit Dynamic Port Functions**: While powerful, complex port functions can be harder to debug; prefer simple map or math-based functions
|
||||
|
||||
6. **Use Port Variables**: For complex setups, define your port ranges as variables for easier maintenance:
|
||||
|
||||
```typescript
|
||||
const API_PORTS = [{ from: 8000, to: 8099 }];
|
||||
const ADMIN_PORTS = [{ from: 9000, to: 9099 }];
|
||||
|
||||
const routes = [
|
||||
{
|
||||
name: 'API Routes',
|
||||
match: { ports: API_PORTS, /* ... */ },
|
||||
// ...
|
||||
},
|
||||
{
|
||||
name: 'Admin Routes',
|
||||
match: { ports: ADMIN_PORTS, /* ... */ },
|
||||
// ...
|
||||
}
|
||||
];
|
||||
```
|
@ -1,131 +0,0 @@
|
||||
/**
|
||||
* Dynamic Port Management Example
|
||||
*
|
||||
* This example demonstrates how to dynamically add and remove ports
|
||||
* while SmartProxy is running, without requiring a restart.
|
||||
*/
|
||||
|
||||
import { SmartProxy } from '../dist_ts/index.js';
|
||||
import type { IRouteConfig } from '../dist_ts/index.js';
|
||||
|
||||
async function main() {
|
||||
// Create a SmartProxy instance with initial routes
|
||||
const proxy = new SmartProxy({
|
||||
routes: [
|
||||
// Initial route on port 8080
|
||||
{
|
||||
match: {
|
||||
ports: 8080,
|
||||
domains: ['example.com', '*.example.com']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 3000 }
|
||||
},
|
||||
name: 'Initial HTTP Route'
|
||||
}
|
||||
]
|
||||
});
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
console.log('SmartProxy started with initial configuration');
|
||||
console.log('Listening on ports:', proxy.getListeningPorts());
|
||||
|
||||
// Wait 3 seconds
|
||||
console.log('Waiting 3 seconds before adding a new port...');
|
||||
await new Promise(resolve => setTimeout(resolve, 3000));
|
||||
|
||||
// Add a new port listener without changing routes yet
|
||||
await proxy.addListeningPort(8081);
|
||||
console.log('Added port 8081 without any routes yet');
|
||||
console.log('Now listening on ports:', proxy.getListeningPorts());
|
||||
|
||||
// Wait 3 more seconds
|
||||
console.log('Waiting 3 seconds before adding a route for the new port...');
|
||||
await new Promise(resolve => setTimeout(resolve, 3000));
|
||||
|
||||
// Get current routes and add a new one for port 8081
|
||||
const currentRoutes = proxy.settings.routes;
|
||||
|
||||
// Create a new route for port 8081
|
||||
const newRoute: IRouteConfig = {
|
||||
match: {
|
||||
ports: 8081,
|
||||
domains: ['api.example.com']
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 4000 }
|
||||
},
|
||||
name: 'API Route'
|
||||
};
|
||||
|
||||
// Update routes to include the new one
|
||||
await proxy.updateRoutes([...currentRoutes, newRoute]);
|
||||
console.log('Added new route for port 8081');
|
||||
|
||||
// Wait 3 more seconds
|
||||
console.log('Waiting 3 seconds before adding another port through updateRoutes...');
|
||||
await new Promise(resolve => setTimeout(resolve, 3000));
|
||||
|
||||
// Add a completely new port via updateRoutes, which will automatically start listening
|
||||
const thirdRoute: IRouteConfig = {
|
||||
match: {
|
||||
ports: 8082,
|
||||
domains: ['admin.example.com']
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 5000 }
|
||||
},
|
||||
name: 'Admin Route'
|
||||
};
|
||||
|
||||
// Update routes again to include the third route
|
||||
await proxy.updateRoutes([...currentRoutes, newRoute, thirdRoute]);
|
||||
console.log('Added new route for port 8082 through updateRoutes');
|
||||
console.log('Now listening on ports:', proxy.getListeningPorts());
|
||||
|
||||
// Wait 3 more seconds
|
||||
console.log('Waiting 3 seconds before removing port 8081...');
|
||||
await new Promise(resolve => setTimeout(resolve, 3000));
|
||||
|
||||
// Remove a port without changing routes
|
||||
await proxy.removeListeningPort(8081);
|
||||
console.log('Removed port 8081 (but route still exists)');
|
||||
console.log('Now listening on ports:', proxy.getListeningPorts());
|
||||
|
||||
// Wait 3 more seconds
|
||||
console.log('Waiting 3 seconds before stopping all routes on port 8082...');
|
||||
await new Promise(resolve => setTimeout(resolve, 3000));
|
||||
|
||||
// Remove all routes for port 8082
|
||||
const routesWithout8082 = currentRoutes.filter(route => {
|
||||
// Check if this route includes port 8082
|
||||
const ports = proxy.routeManager.expandPortRange(route.match.ports);
|
||||
return !ports.includes(8082);
|
||||
});
|
||||
|
||||
// Update routes without any for port 8082
|
||||
await proxy.updateRoutes([...routesWithout8082, newRoute]);
|
||||
console.log('Removed routes for port 8082 through updateRoutes');
|
||||
console.log('Now listening on ports:', proxy.getListeningPorts());
|
||||
|
||||
// Show statistics
|
||||
console.log('Statistics:', proxy.getStatistics());
|
||||
|
||||
// Wait 3 more seconds, then shut down
|
||||
console.log('Waiting 3 seconds before shutdown...');
|
||||
await new Promise(resolve => setTimeout(resolve, 3000));
|
||||
|
||||
// Stop the proxy
|
||||
await proxy.stop();
|
||||
console.log('SmartProxy stopped');
|
||||
}
|
||||
|
||||
// Run the example
|
||||
main().catch(err => {
|
||||
console.error('Error in example:', err);
|
||||
process.exit(1);
|
||||
});
|
@ -1,214 +0,0 @@
|
||||
/**
|
||||
* NFTables Integration Example
|
||||
*
|
||||
* This example demonstrates how to use the NFTables forwarding engine with SmartProxy
|
||||
* for high-performance network routing that operates at the kernel level.
|
||||
*
|
||||
* NOTE: This requires elevated privileges to run (sudo) as it interacts with nftables.
|
||||
*/
|
||||
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import {
|
||||
createNfTablesRoute,
|
||||
createNfTablesTerminateRoute,
|
||||
createCompleteNfTablesHttpsServer
|
||||
} from '../ts/proxies/smart-proxy/utils/route-helpers.js';
|
||||
|
||||
// Simple NFTables-based HTTP forwarding example
|
||||
async function simpleForwardingExample() {
|
||||
console.log('Starting simple NFTables forwarding example...');
|
||||
|
||||
// Create a SmartProxy instance with a simple NFTables route
|
||||
const proxy = new SmartProxy({
|
||||
routes: [
|
||||
createNfTablesRoute('example.com', {
|
||||
host: 'localhost',
|
||||
port: 8080
|
||||
}, {
|
||||
ports: 80,
|
||||
protocol: 'tcp',
|
||||
preserveSourceIP: true,
|
||||
tableName: 'smartproxy_example'
|
||||
})
|
||||
],
|
||||
enableDetailedLogging: true
|
||||
});
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
console.log('NFTables proxy started. Press Ctrl+C to stop.');
|
||||
|
||||
// Handle shutdown
|
||||
process.on('SIGINT', async () => {
|
||||
console.log('Stopping proxy...');
|
||||
await proxy.stop();
|
||||
process.exit(0);
|
||||
});
|
||||
}
|
||||
|
||||
// HTTPS termination example with NFTables
|
||||
async function httpsTerminationExample() {
|
||||
console.log('Starting HTTPS termination with NFTables example...');
|
||||
|
||||
// Create a SmartProxy instance with an HTTPS termination route using NFTables
|
||||
const proxy = new SmartProxy({
|
||||
routes: [
|
||||
createNfTablesTerminateRoute('secure.example.com', {
|
||||
host: 'localhost',
|
||||
port: 8443
|
||||
}, {
|
||||
ports: 443,
|
||||
certificate: 'auto', // Automatic certificate provisioning
|
||||
tableName: 'smartproxy_https'
|
||||
})
|
||||
],
|
||||
enableDetailedLogging: true
|
||||
});
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
console.log('HTTPS termination proxy started. Press Ctrl+C to stop.');
|
||||
|
||||
// Handle shutdown
|
||||
process.on('SIGINT', async () => {
|
||||
console.log('Stopping proxy...');
|
||||
await proxy.stop();
|
||||
process.exit(0);
|
||||
});
|
||||
}
|
||||
|
||||
// Complete HTTPS server with HTTP redirects using NFTables
|
||||
async function completeHttpsServerExample() {
|
||||
console.log('Starting complete HTTPS server with NFTables example...');
|
||||
|
||||
// Create a SmartProxy instance with a complete HTTPS server
|
||||
const proxy = new SmartProxy({
|
||||
routes: createCompleteNfTablesHttpsServer('complete.example.com', {
|
||||
host: 'localhost',
|
||||
port: 8443
|
||||
}, {
|
||||
certificate: 'auto',
|
||||
tableName: 'smartproxy_complete'
|
||||
}),
|
||||
enableDetailedLogging: true
|
||||
});
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
console.log('Complete HTTPS server started. Press Ctrl+C to stop.');
|
||||
|
||||
// Handle shutdown
|
||||
process.on('SIGINT', async () => {
|
||||
console.log('Stopping proxy...');
|
||||
await proxy.stop();
|
||||
process.exit(0);
|
||||
});
|
||||
}
|
||||
|
||||
// Load balancing example with NFTables
|
||||
async function loadBalancingExample() {
|
||||
console.log('Starting load balancing with NFTables example...');
|
||||
|
||||
// Create a SmartProxy instance with a load balancing configuration
|
||||
const proxy = new SmartProxy({
|
||||
routes: [
|
||||
createNfTablesRoute('lb.example.com', {
|
||||
// NFTables will automatically distribute connections to these hosts
|
||||
host: 'backend1.example.com',
|
||||
port: 8080
|
||||
}, {
|
||||
ports: 80,
|
||||
tableName: 'smartproxy_lb'
|
||||
})
|
||||
],
|
||||
enableDetailedLogging: true
|
||||
});
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
console.log('Load balancing proxy started. Press Ctrl+C to stop.');
|
||||
|
||||
// Handle shutdown
|
||||
process.on('SIGINT', async () => {
|
||||
console.log('Stopping proxy...');
|
||||
await proxy.stop();
|
||||
process.exit(0);
|
||||
});
|
||||
}
|
||||
|
||||
// Advanced example with QoS and security settings
|
||||
async function advancedExample() {
|
||||
console.log('Starting advanced NFTables example with QoS and security...');
|
||||
|
||||
// Create a SmartProxy instance with advanced settings
|
||||
const proxy = new SmartProxy({
|
||||
routes: [
|
||||
createNfTablesRoute('advanced.example.com', {
|
||||
host: 'localhost',
|
||||
port: 8080
|
||||
}, {
|
||||
ports: 80,
|
||||
protocol: 'tcp',
|
||||
preserveSourceIP: true,
|
||||
maxRate: '10mbps', // QoS rate limiting
|
||||
priority: 2, // QoS priority (1-10, lower is higher priority)
|
||||
ipAllowList: ['192.168.1.0/24'], // Only allow this subnet
|
||||
ipBlockList: ['192.168.1.100'], // Block this specific IP
|
||||
useIPSets: true, // Use IP sets for more efficient rule processing
|
||||
useAdvancedNAT: true, // Use connection tracking for stateful NAT
|
||||
tableName: 'smartproxy_advanced'
|
||||
})
|
||||
],
|
||||
enableDetailedLogging: true
|
||||
});
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
console.log('Advanced NFTables proxy started. Press Ctrl+C to stop.');
|
||||
|
||||
// Handle shutdown
|
||||
process.on('SIGINT', async () => {
|
||||
console.log('Stopping proxy...');
|
||||
await proxy.stop();
|
||||
process.exit(0);
|
||||
});
|
||||
}
|
||||
|
||||
// Run one of the examples based on the command line argument
|
||||
async function main() {
|
||||
const example = process.argv[2] || 'simple';
|
||||
|
||||
switch (example) {
|
||||
case 'simple':
|
||||
await simpleForwardingExample();
|
||||
break;
|
||||
case 'https':
|
||||
await httpsTerminationExample();
|
||||
break;
|
||||
case 'complete':
|
||||
await completeHttpsServerExample();
|
||||
break;
|
||||
case 'lb':
|
||||
await loadBalancingExample();
|
||||
break;
|
||||
case 'advanced':
|
||||
await advancedExample();
|
||||
break;
|
||||
default:
|
||||
console.error('Unknown example:', example);
|
||||
console.log('Available examples: simple, https, complete, lb, advanced');
|
||||
process.exit(1);
|
||||
}
|
||||
}
|
||||
|
||||
// Check if running as root/sudo
|
||||
if (process.getuid && process.getuid() !== 0) {
|
||||
console.error('This example requires root privileges to modify nftables rules.');
|
||||
console.log('Please run with sudo: sudo tsx examples/nftables-integration.ts');
|
||||
process.exit(1);
|
||||
}
|
||||
|
||||
main().catch(err => {
|
||||
console.error('Error running example:', err);
|
||||
process.exit(1);
|
||||
});
|
@ -1,92 +0,0 @@
|
||||
# SmartProxy ACME Simplification Implementation Summary
|
||||
|
||||
## Overview
|
||||
|
||||
We successfully implemented comprehensive support for both global and route-level ACME configuration in SmartProxy v19.0.0, addressing the certificate acquisition issues and improving the developer experience.
|
||||
|
||||
## What Was Implemented
|
||||
|
||||
### 1. Enhanced Configuration Support
|
||||
- Added global ACME configuration at the SmartProxy level
|
||||
- Maintained support for route-level ACME configuration
|
||||
- Implemented configuration hierarchy where global settings serve as defaults
|
||||
- Route-level settings override global defaults when specified
|
||||
|
||||
### 2. Updated Core Components
|
||||
|
||||
#### SmartProxy Class (`smart-proxy.ts`)
|
||||
- Enhanced ACME configuration normalization in constructor
|
||||
- Added support for both `email` and `accountEmail` fields
|
||||
- Updated `initializeCertificateManager` to prioritize configurations correctly
|
||||
- Added `validateAcmeConfiguration` method for comprehensive validation
|
||||
|
||||
#### SmartCertManager Class (`certificate-manager.ts`)
|
||||
- Added `globalAcmeDefaults` property to store top-level configuration
|
||||
- Implemented `setGlobalAcmeDefaults` method
|
||||
- Updated `provisionAcmeCertificate` to use global defaults
|
||||
- Enhanced error messages to guide users to correct configuration
|
||||
|
||||
#### ISmartProxyOptions Interface (`interfaces.ts`)
|
||||
- Added comprehensive documentation for global ACME configuration
|
||||
- Enhanced IAcmeOptions interface with better field descriptions
|
||||
- Added example usage in JSDoc comments
|
||||
|
||||
### 3. Configuration Validation
|
||||
- Checks for missing ACME email configuration
|
||||
- Validates port 80 availability for HTTP-01 challenges
|
||||
- Warns about wildcard domains with auto certificates
|
||||
- Detects environment mismatches between global and route configs
|
||||
|
||||
### 4. Test Coverage
|
||||
Created comprehensive test suite (`test.acme-configuration.node.ts`):
|
||||
- Top-level ACME configuration
|
||||
- Route-level ACME configuration
|
||||
- Mixed configuration with overrides
|
||||
- Error handling for missing email
|
||||
- Support for accountEmail alias
|
||||
|
||||
### 5. Documentation Updates
|
||||
|
||||
#### Main README (`readme.md`)
|
||||
- Added global ACME configuration example
|
||||
- Updated code examples to show both configuration styles
|
||||
- Added dedicated ACME configuration section
|
||||
|
||||
#### Certificate Management Guide (`certificate-management.md`)
|
||||
- Updated for v19.0.0 changes
|
||||
- Added configuration hierarchy explanation
|
||||
- Included troubleshooting section
|
||||
- Added migration guide from v18
|
||||
|
||||
#### Readme Hints (`readme.hints.md`)
|
||||
- Added breaking change warning for ACME configuration
|
||||
- Included correct configuration example
|
||||
- Added migration considerations
|
||||
|
||||
## Key Benefits
|
||||
|
||||
1. **Reduced Configuration Duplication**: Global ACME settings eliminate need to repeat configuration
|
||||
2. **Better Developer Experience**: Clear error messages guide users to correct configuration
|
||||
3. **Backward Compatibility**: Route-level configuration still works as before
|
||||
4. **Flexible Configuration**: Can mix global defaults with route-specific overrides
|
||||
5. **Improved Validation**: Warns about common configuration issues
|
||||
|
||||
## Testing Results
|
||||
|
||||
All tests pass successfully:
|
||||
- Global ACME configuration works correctly
|
||||
- Route-level configuration continues to function
|
||||
- Configuration hierarchy behaves as expected
|
||||
- Error messages provide clear guidance
|
||||
|
||||
## Migration Path
|
||||
|
||||
For users upgrading from v18:
|
||||
1. Existing route-level ACME configuration continues to work
|
||||
2. Can optionally move common settings to global level
|
||||
3. Route-specific overrides remain available
|
||||
4. No breaking changes for existing configurations
|
||||
|
||||
## Conclusion
|
||||
|
||||
The implementation successfully addresses the original issue where SmartAcme was not initialized due to missing configuration. Users now have flexible options for configuring ACME, with clear error messages and comprehensive documentation to guide them.
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@push.rocks/smartproxy",
|
||||
"version": "19.2.3",
|
||||
"version": "19.3.13",
|
||||
"private": false,
|
||||
"description": "A powerful proxy package with unified route-based configuration for high traffic management. Features include SSL/TLS support, flexible routing patterns, WebSocket handling, advanced security options, and automatic ACME certificate management.",
|
||||
"main": "dist_ts/index.js",
|
||||
@ -18,16 +18,17 @@
|
||||
"@git.zone/tsbuild": "^2.5.1",
|
||||
"@git.zone/tsrun": "^1.2.44",
|
||||
"@git.zone/tstest": "^1.9.0",
|
||||
"@types/node": "^22.15.18",
|
||||
"@types/node": "^22.15.19",
|
||||
"typescript": "^5.8.3"
|
||||
},
|
||||
"dependencies": {
|
||||
"@push.rocks/lik": "^6.2.2",
|
||||
"@push.rocks/smartacme": "^7.3.4",
|
||||
"@push.rocks/smartacme": "^8.0.0",
|
||||
"@push.rocks/smartcrypto": "^2.0.4",
|
||||
"@push.rocks/smartdelay": "^3.0.5",
|
||||
"@push.rocks/smartfile": "^11.2.0",
|
||||
"@push.rocks/smartnetwork": "^4.0.1",
|
||||
"@push.rocks/smartlog": "^3.1.2",
|
||||
"@push.rocks/smartnetwork": "^4.0.2",
|
||||
"@push.rocks/smartpromise": "^4.2.3",
|
||||
"@push.rocks/smartrequest": "^2.1.0",
|
||||
"@push.rocks/smartstring": "^4.0.15",
|
||||
|
1412
pnpm-lock.yaml
generated
1412
pnpm-lock.yaml
generated
File diff suppressed because it is too large
Load Diff
@ -91,4 +91,68 @@ const proxy = new SmartProxy({
|
||||
- Update `plugins.ts` when adding new dependencies.
|
||||
- Maintain test coverage for new routing or proxy features.
|
||||
- Keep `ts/` and `dist_ts/` in sync after refactors.
|
||||
- Consider implementing top-level ACME config support for backward compatibility
|
||||
- Consider implementing top-level ACME config support for backward compatibility
|
||||
|
||||
## HTTP-01 ACME Challenge Fix (v19.3.8)
|
||||
|
||||
### Issue
|
||||
Non-TLS connections on ports configured in `useHttpProxy` were not being forwarded to HttpProxy. This caused ACME HTTP-01 challenges to fail when the ACME port (usually 80) was included in `useHttpProxy`.
|
||||
|
||||
### Root Cause
|
||||
In the `RouteConnectionHandler.handleForwardAction` method, only connections with TLS settings (mode: 'terminate' or 'terminate-and-reencrypt') were being forwarded to HttpProxy. Non-TLS connections were always handled as direct connections, even when the port was configured for HttpProxy.
|
||||
|
||||
### Solution
|
||||
Added a check for non-TLS connections on ports listed in `useHttpProxy`:
|
||||
```typescript
|
||||
// No TLS settings - check if this port should use HttpProxy
|
||||
const isHttpProxyPort = this.settings.useHttpProxy?.includes(record.localPort);
|
||||
|
||||
if (isHttpProxyPort && this.httpProxyBridge.getHttpProxy()) {
|
||||
// Forward non-TLS connections to HttpProxy if configured
|
||||
this.httpProxyBridge.forwardToHttpProxy(/*...*/);
|
||||
return;
|
||||
}
|
||||
```
|
||||
|
||||
### Test Coverage
|
||||
- `test/test.http-fix-unit.ts` - Unit tests verifying the fix
|
||||
- Tests confirm that non-TLS connections on HttpProxy ports are properly forwarded
|
||||
- Tests verify that non-HttpProxy ports still use direct connections
|
||||
|
||||
### Configuration Example
|
||||
```typescript
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [80], // Enable HttpProxy for port 80
|
||||
httpProxyPort: 8443,
|
||||
acme: {
|
||||
email: 'ssl@example.com',
|
||||
port: 80
|
||||
},
|
||||
routes: [
|
||||
// Your routes here
|
||||
]
|
||||
});
|
||||
```
|
||||
|
||||
## ACME Certificate Provisioning Timing Fix (v19.3.9)
|
||||
|
||||
### Issue
|
||||
Certificate provisioning would start before ports were listening, causing ACME HTTP-01 challenges to fail with connection refused errors.
|
||||
|
||||
### Root Cause
|
||||
SmartProxy initialization sequence:
|
||||
1. Certificate manager initialized → immediately starts provisioning
|
||||
2. Ports start listening (too late for ACME challenges)
|
||||
|
||||
### Solution
|
||||
Deferred certificate provisioning until after ports are ready:
|
||||
```typescript
|
||||
// SmartCertManager.initialize() now skips automatic provisioning
|
||||
// SmartProxy.start() calls provisionAllCertificates() directly after ports are listening
|
||||
```
|
||||
|
||||
### Test Coverage
|
||||
- `test/test.acme-timing-simple.ts` - Verifies proper timing sequence
|
||||
|
||||
### Migration
|
||||
Update to v19.3.9+, no configuration changes needed.
|
77
readme.md
77
readme.md
@ -43,7 +43,7 @@ SmartProxy has been restructured using a modern, modular architecture with a uni
|
||||
│ │ ├── route-manager.ts # Route management system
|
||||
│ │ ├── smart-proxy.ts # Main SmartProxy class
|
||||
│ │ └── ... # Supporting classes
|
||||
│ ├── /network-proxy # NetworkProxy implementation
|
||||
│ ├── /http-proxy # HttpProxy implementation (HTTP/HTTPS handling)
|
||||
│ └── /nftables-proxy # NfTablesProxy implementation
|
||||
├── /tls # TLS-specific functionality
|
||||
│ ├── /sni # SNI handling components
|
||||
@ -79,7 +79,7 @@ SmartProxy has been restructured using a modern, modular architecture with a uni
|
||||
|
||||
### Specialized Components
|
||||
|
||||
- **NetworkProxy** (`ts/proxies/network-proxy/network-proxy.ts`)
|
||||
- **HttpProxy** (`ts/proxies/http-proxy/http-proxy.ts`)
|
||||
HTTP/HTTPS reverse proxy with TLS termination and WebSocket support
|
||||
- **Port80Handler** (`ts/http/port80/port80-handler.ts`)
|
||||
ACME HTTP-01 challenge handler for Let's Encrypt certificates
|
||||
@ -101,7 +101,7 @@ SmartProxy has been restructured using a modern, modular architecture with a uni
|
||||
|
||||
- `IRouteConfig`, `IRouteMatch`, `IRouteAction` (`ts/proxies/smart-proxy/models/route-types.ts`)
|
||||
- `IRoutedSmartProxyOptions` (`ts/proxies/smart-proxy/models/route-types.ts`)
|
||||
- `INetworkProxyOptions` (`ts/proxies/network-proxy/models/types.ts`)
|
||||
- `IHttpProxyOptions` (`ts/proxies/http-proxy/models/types.ts`)
|
||||
- `IAcmeOptions`, `IDomainOptions` (`ts/certificate/models/certificate-types.ts`)
|
||||
- `INfTableProxySettings` (`ts/proxies/nftables-proxy/models/interfaces.ts`)
|
||||
|
||||
@ -113,7 +113,7 @@ npm install @push.rocks/smartproxy
|
||||
|
||||
## Quick Start with SmartProxy
|
||||
|
||||
SmartProxy v18.0.0 continues the evolution of the unified route-based configuration system making your proxy setup more flexible and intuitive with improved helper functions and NFTables integration for high-performance kernel-level routing.
|
||||
SmartProxy v19.4.0 provides a unified route-based configuration system with enhanced certificate management, NFTables integration for high-performance kernel-level routing, and improved helper functions for common proxy setups.
|
||||
|
||||
```typescript
|
||||
import {
|
||||
@ -136,10 +136,12 @@ import {
|
||||
const proxy = new SmartProxy({
|
||||
// Global ACME settings for all routes with certificate: 'auto'
|
||||
acme: {
|
||||
email: 'ssl@example.com', // Required for Let's Encrypt
|
||||
email: 'ssl@bleu.de', // Required for Let's Encrypt
|
||||
useProduction: false, // Use staging by default
|
||||
renewThresholdDays: 30, // Renew 30 days before expiry
|
||||
port: 80 // Port for HTTP-01 challenges
|
||||
port: 80, // Port for HTTP-01 challenges (use 8080 for non-privileged)
|
||||
autoRenew: true, // Enable automatic renewal
|
||||
renewCheckIntervalHours: 24 // Check for renewals daily
|
||||
},
|
||||
|
||||
// Define all your routing rules in a single array
|
||||
@ -216,26 +218,7 @@ const proxy = new SmartProxy({
|
||||
certificate: 'auto',
|
||||
maxRate: '100mbps'
|
||||
})
|
||||
],
|
||||
|
||||
// Global settings that apply to all routes
|
||||
defaults: {
|
||||
security: {
|
||||
maxConnections: 500
|
||||
}
|
||||
},
|
||||
|
||||
// Automatic Let's Encrypt integration
|
||||
acme: {
|
||||
enabled: true,
|
||||
contactEmail: 'admin@example.com',
|
||||
useProduction: true
|
||||
}
|
||||
});
|
||||
|
||||
// Listen for certificate events
|
||||
proxy.on('certificate', evt => {
|
||||
console.log(`Certificate for ${evt.domain} ready, expires: ${evt.expiryDate}`);
|
||||
]
|
||||
});
|
||||
|
||||
// Start the proxy
|
||||
@ -749,14 +732,14 @@ Available helper functions:
|
||||
|
||||
While SmartProxy provides a unified API for most needs, you can also use individual components:
|
||||
|
||||
### NetworkProxy
|
||||
### HttpProxy
|
||||
For HTTP/HTTPS reverse proxy with TLS termination and WebSocket support. Now with native route-based configuration support:
|
||||
|
||||
```typescript
|
||||
import { NetworkProxy } from '@push.rocks/smartproxy';
|
||||
import { HttpProxy } from '@push.rocks/smartproxy';
|
||||
import * as fs from 'fs';
|
||||
|
||||
const proxy = new NetworkProxy({ port: 443 });
|
||||
const proxy = new HttpProxy({ port: 443 });
|
||||
await proxy.start();
|
||||
|
||||
// Modern route-based configuration (recommended)
|
||||
@ -781,7 +764,7 @@ await proxy.updateRouteConfigs([
|
||||
},
|
||||
advanced: {
|
||||
headers: {
|
||||
'X-Forwarded-By': 'NetworkProxy'
|
||||
'X-Forwarded-By': 'HttpProxy'
|
||||
},
|
||||
urlRewrite: {
|
||||
pattern: '^/old/(.*)$',
|
||||
@ -1053,7 +1036,7 @@ flowchart TB
|
||||
direction TB
|
||||
RouteConfig["Route Configuration<br>(Match/Action)"]
|
||||
RouteManager["Route Manager"]
|
||||
HTTPS443["HTTPS Port 443<br>NetworkProxy"]
|
||||
HTTPS443["HTTPS Port 443<br>HttpProxy"]
|
||||
SmartProxy["SmartProxy<br>(TCP/SNI Proxy)"]
|
||||
ACME["Port80Handler<br>(ACME HTTP-01)"]
|
||||
Certs[(SSL Certificates)]
|
||||
@ -1429,6 +1412,8 @@ createRedirectRoute({
|
||||
- `routes` (IRouteConfig[], required) - Array of route configurations
|
||||
- `defaults` (object) - Default settings for all routes
|
||||
- `acme` (IAcmeOptions) - ACME certificate options
|
||||
- `useHttpProxy` (number[], optional) - Array of ports to forward to HttpProxy (e.g. `[80, 443]`)
|
||||
- `httpProxyPort` (number, default 8443) - Port where HttpProxy listens for forwarded connections
|
||||
- Connection timeouts: `initialDataTimeout`, `socketTimeout`, `inactivityTimeout`, etc.
|
||||
- Socket opts: `noDelay`, `keepAlive`, `enableKeepAliveProbes`
|
||||
- `certProvisionFunction` (callback) - Custom certificate provisioning
|
||||
@ -1439,7 +1424,7 @@ createRedirectRoute({
|
||||
- `getListeningPorts()` - Get all ports currently being listened on
|
||||
- `async updateRoutes(routes: IRouteConfig[])` - Update routes and automatically adjust port listeners
|
||||
|
||||
### NetworkProxy (INetworkProxyOptions)
|
||||
### HttpProxy (IHttpProxyOptions)
|
||||
- `port` (number, required) - Main port to listen on
|
||||
- `backendProtocol` ('http1'|'http2', default 'http1') - Protocol to use with backend servers
|
||||
- `maxConnections` (number, default 10000) - Maximum concurrent connections
|
||||
@ -1452,8 +1437,8 @@ createRedirectRoute({
|
||||
- `useExternalPort80Handler` (boolean) - Use external port 80 handler for ACME challenges
|
||||
- `portProxyIntegration` (boolean) - Integration with other proxies
|
||||
|
||||
#### NetworkProxy Enhanced Features
|
||||
NetworkProxy now supports full route-based configuration including:
|
||||
#### HttpProxy Enhanced Features
|
||||
HttpProxy now supports full route-based configuration including:
|
||||
- Advanced request and response header manipulation
|
||||
- URL rewriting with RegExp pattern matching
|
||||
- Template variable resolution for dynamic values (e.g. `{domain}`, `{clientIp}`)
|
||||
@ -1495,6 +1480,28 @@ NetworkProxy now supports full route-based configuration including:
|
||||
- Use higher priority for block routes to ensure they take precedence
|
||||
- Enable `enableDetailedLogging` or `enableTlsDebugLogging` for debugging
|
||||
|
||||
### ACME HTTP-01 Challenges
|
||||
- If ACME HTTP-01 challenges fail, ensure:
|
||||
1. Port 80 (or configured ACME port) is included in `useHttpProxy`
|
||||
2. You're using SmartProxy v19.3.9+ for proper timing (ports must be listening before provisioning)
|
||||
- Since v19.3.8: Non-TLS connections on ports listed in `useHttpProxy` are properly forwarded to HttpProxy
|
||||
- Since v19.3.9: Certificate provisioning waits for ports to be ready before starting ACME challenges
|
||||
- Example configuration for ACME on port 80:
|
||||
```typescript
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [80], // Ensure port 80 is forwarded to HttpProxy
|
||||
httpProxyPort: 8443,
|
||||
acme: {
|
||||
email: 'ssl@example.com',
|
||||
port: 80
|
||||
},
|
||||
routes: [/* your routes */]
|
||||
});
|
||||
```
|
||||
- Common issues:
|
||||
- "Connection refused" during challenges → Update to v19.3.9+ for timing fix
|
||||
- HTTP requests not parsed → Ensure port is in `useHttpProxy` array
|
||||
|
||||
### NFTables Integration
|
||||
- Ensure NFTables is installed: `apt install nftables` or `yum install nftables`
|
||||
- Verify root/sudo permissions for NFTables operations
|
||||
@ -1507,7 +1514,7 @@ NetworkProxy now supports full route-based configuration including:
|
||||
- Ensure domains are publicly accessible for Let's Encrypt validation
|
||||
- For TLS handshake issues, increase `initialDataTimeout` and `maxPendingDataSize`
|
||||
|
||||
### NetworkProxy
|
||||
### HttpProxy
|
||||
- Verify ports, certificates and `rejectUnauthorized` for TLS errors
|
||||
- Configure CORS for preflight issues
|
||||
- Increase `maxConnections` or `connectionPoolSize` under load
|
||||
|
433
readme.plan.md
433
readme.plan.md
@ -1,101 +1,384 @@
|
||||
# SmartProxy Development Plan
|
||||
|
||||
cat /home/philkunz/.claude/CLAUDE.md
|
||||
|
||||
## Critical Bug Fix: Missing Route Update Callback in updateRoutes Method
|
||||
## ACME Route Port Binding Intelligence Improvement
|
||||
|
||||
### Problem Statement
|
||||
SmartProxy v19.2.2 has a bug where the ACME certificate manager loses its route update callback when routes are dynamically updated. This causes the error "No route update callback set" and prevents automatic certificate acquisition.
|
||||
Currently, SmartProxy has an issue with port binding conflicts between regular routes and ACME challenge routes. While SmartProxy is designed to support multiple routes sharing the same port (differentiated by host, path, etc.), there's a specific conflict when adding ACME challenge routes to a port that is already in use by other routes.
|
||||
|
||||
### Root Cause
|
||||
When `updateRoutes()` creates a new SmartCertManager instance, it fails to set the route update callback that's required for ACME challenges. This callback is properly set in `initializeCertificateManager()` but is missing from the route update flow.
|
||||
This results in the error: `Port 80 is already in use for ACME challenges` when SmartProxy tries to bind the ACME challenge route to a port that it's already using.
|
||||
|
||||
### Root Cause Analysis
|
||||
1. **Double Binding Attempt**: SmartProxy tries to bind to port 80 twice - once for application routes and once for ACME challenge routes.
|
||||
2. **Overlapping Route Updates**: When adding a challenge route, it triggers a port binding operation without checking if the port is already bound.
|
||||
3. **Naive Error Handling**: The code detects EADDRINUSE but doesn't distinguish between external conflicts and internal conflicts.
|
||||
4. **Port Binding Semantics**: The port manager doesn't recognize that a port already bound by SmartProxy can be reused for additional routes.
|
||||
|
||||
### Solution Architecture
|
||||
We need a more intelligent approach to port binding that understands when a port can be shared between routes vs. when a new binding is needed:
|
||||
|
||||
1. **Port Binding Awareness**: Track what ports are already bound by SmartProxy itself.
|
||||
2. **Smart Route Updates**: Only attempt to bind to ports that aren't already bound by SmartProxy.
|
||||
3. **Route Merging Logic**: When adding ACME challenge routes, merge them with existing routes on the same ports.
|
||||
4. **Dynamic Port Management**: Release port bindings when no routes are using them and rebind when needed.
|
||||
5. **Improved Error Recovery**: Handle port conflicts gracefully, with distinct handling for internal vs. external conflicts.
|
||||
|
||||
### Implementation Plan
|
||||
|
||||
#### Phase 1: Fix the Bug
|
||||
1. **Update the updateRoutes method** in `/mnt/data/lossless/push.rocks/smartproxy/ts/proxies/smart-proxy/smart-proxy.ts`
|
||||
- [ ] Add the missing callback setup before initializing the new certificate manager
|
||||
- [ ] Ensure the callback is set after creating the new SmartCertManager instance
|
||||
#### Phase 1: Improve Port Manager Intelligence
|
||||
- [ ] Enhance `PortManager` to distinguish between ports that need new bindings vs ports that can reuse existing bindings
|
||||
- [ ] Add an internal tracking mechanism to detect when a requested port is already bound internally
|
||||
- [ ] Modify port addition logic to skip binding operations for ports already bound by SmartProxy
|
||||
- [ ] Implement reference counting for port bindings to track how many routes use each port
|
||||
- [ ] Add logic to release port bindings when no routes are using them anymore
|
||||
- [ ] Update error handling to provide more context for port binding failures
|
||||
|
||||
#### Phase 2: Create Tests
|
||||
2. **Write comprehensive tests** for the route update functionality
|
||||
- [ ] Create test file: `test/test.route-update-callback.node.ts`
|
||||
- [ ] Test that callback is preserved when routes are updated
|
||||
- [ ] Test that ACME challenges work after route updates
|
||||
- [ ] Test edge cases (multiple updates, no cert manager, etc.)
|
||||
#### Phase 2: Refine ACME Challenge Route Integration
|
||||
- [ ] Modify `addChallengeRoute()` to check if the port is already in use by SmartProxy
|
||||
- [ ] Ensure route updates don't trigger unnecessary port binding operations
|
||||
- [ ] Implement a merging strategy for ACME routes with existing routes on the same port
|
||||
- [ ] Add diagnostic logging to track route and port binding relationships
|
||||
|
||||
#### Phase 3: Enhance Documentation
|
||||
3. **Update documentation** to clarify the route update behavior
|
||||
- [ ] Add section to certificate-management.md about dynamic route updates
|
||||
- [ ] Document the callback requirement for ACME challenges
|
||||
- [ ] Include example of proper route update implementation
|
||||
#### Phase 3: Enhance Proxy Route Management
|
||||
- [ ] Restructure route update process to group routes by port
|
||||
- [ ] Implement a more efficient route update mechanism that minimizes port binding operations
|
||||
- [ ] Develop port lifecycle management to track usage across route changes
|
||||
- [ ] Add validation to detect potential binding conflicts before attempting operations
|
||||
- [ ] Create a proper route dependency graph to understand the relationships between routes
|
||||
- [ ] Implement efficient detection of "orphaned" ports that no longer have associated routes
|
||||
|
||||
#### Phase 4: Prevent Future Regressions
|
||||
4. **Refactor for better maintainability**
|
||||
- [ ] Consider extracting certificate manager setup to a shared method
|
||||
- [ ] Add code comments explaining the callback requirement
|
||||
- [ ] Consider making the callback setup more explicit in the API
|
||||
#### Phase 4: Improve Error Handling and Recovery
|
||||
- [ ] Enhance error messages to be more specific about the nature of port conflicts
|
||||
- [ ] Add recovery mechanisms for common port binding scenarios
|
||||
- [ ] Implement a fallback port selection strategy for ACME challenges
|
||||
- [ ] Create a more robust validation system to catch issues before they cause runtime errors
|
||||
|
||||
### Technical Details
|
||||
### Detailed Technical Tasks
|
||||
|
||||
#### Specific Code Changes
|
||||
1. In `updateRoutes()` method (around line 535), add:
|
||||
#### Phase 1: Improve Port Manager Intelligence
|
||||
1. Modify `/ts/proxies/smart-proxy/port-manager.ts`:
|
||||
- Add a new method `isPortBoundBySmartProxy(port: number): boolean`
|
||||
- Refactor `addPort()` to check if the port is already bound
|
||||
- Update `updatePorts()` to be more intelligent about which ports need binding
|
||||
- Add reference counting for port usage
|
||||
|
||||
2. Implement Port Reference Counting:
|
||||
```typescript
|
||||
// Set route update callback for ACME challenges
|
||||
this.certManager.setUpdateRoutesCallback(async (routes) => {
|
||||
await this.updateRoutes(routes);
|
||||
});
|
||||
```
|
||||
|
||||
2. Consider refactoring the certificate manager setup into a helper method to avoid duplication:
|
||||
```typescript
|
||||
private async setupCertificateManager(
|
||||
routes: IRouteConfig[],
|
||||
certStore: string,
|
||||
acmeOptions?: any
|
||||
): Promise<SmartCertManager> {
|
||||
const certManager = new SmartCertManager(routes, certStore, acmeOptions);
|
||||
|
||||
// Always set up the route update callback
|
||||
certManager.setUpdateRoutesCallback(async (routes) => {
|
||||
await this.updateRoutes(routes);
|
||||
});
|
||||
|
||||
if (this.networkProxyBridge.getNetworkProxy()) {
|
||||
certManager.setNetworkProxy(this.networkProxyBridge.getNetworkProxy());
|
||||
// Add to PortManager class
|
||||
private portRefCounts: Map<number, number> = new Map();
|
||||
|
||||
public incrementPortRefCount(port: number): void {
|
||||
const currentCount = this.portRefCounts.get(port) || 0;
|
||||
this.portRefCounts.set(port, currentCount + 1);
|
||||
logger.log('debug', `Port ${port} reference count increased to ${currentCount + 1}`, { port, refCount: currentCount + 1 });
|
||||
}
|
||||
|
||||
public decrementPortRefCount(port: number): number {
|
||||
const currentCount = this.portRefCounts.get(port) || 0;
|
||||
if (currentCount <= 0) {
|
||||
logger.log('warn', `Attempted to decrement reference count for port ${port} below zero`, { port });
|
||||
return 0;
|
||||
}
|
||||
|
||||
return certManager;
|
||||
const newCount = currentCount - 1;
|
||||
this.portRefCounts.set(port, newCount);
|
||||
logger.log('debug', `Port ${port} reference count decreased to ${newCount}`, { port, refCount: newCount });
|
||||
return newCount;
|
||||
}
|
||||
|
||||
public getPortRefCount(port: number): number {
|
||||
return this.portRefCounts.get(port) || 0;
|
||||
}
|
||||
```
|
||||
|
||||
### Success Criteria
|
||||
- [x] ACME certificate acquisition works after route updates
|
||||
- [x] No "No route update callback set" errors occur
|
||||
- [x] All tests pass
|
||||
- [x] Documentation clearly explains the behavior
|
||||
- [x] Code is more maintainable and less prone to regression
|
||||
3. Port Binding Logic Enhancements:
|
||||
```typescript
|
||||
public async addPort(port: number): Promise<void> {
|
||||
// If already bound by this instance, just increment ref count and return
|
||||
if (this.servers.has(port)) {
|
||||
this.incrementPortRefCount(port);
|
||||
logger.log('debug', `Port ${port} is already bound by SmartProxy, reusing binding`, { port });
|
||||
return;
|
||||
}
|
||||
|
||||
// Initialize ref count for new port
|
||||
this.portRefCounts.set(port, 1);
|
||||
|
||||
// Continue with normal binding...
|
||||
}
|
||||
|
||||
public async removePort(port: number): Promise<void> {
|
||||
// Decrement reference count
|
||||
const newCount = this.decrementPortRefCount(port);
|
||||
|
||||
// If port is still in use by other routes, keep it
|
||||
if (newCount > 0) {
|
||||
logger.log('debug', `Port ${port} still in use by ${newCount} routes, keeping binding open`, { port, refCount: newCount });
|
||||
return;
|
||||
}
|
||||
|
||||
// No more references, can actually close the port
|
||||
const server = this.servers.get(port);
|
||||
if (!server) {
|
||||
logger.log('warn', `Port ${port} not found in servers map`, { port });
|
||||
return;
|
||||
}
|
||||
|
||||
// Continue with normal unbinding logic...
|
||||
}
|
||||
```
|
||||
|
||||
### Implementation Summary
|
||||
4. Add Smarter Port Conflict Detection:
|
||||
```typescript
|
||||
private isPortConflict(error: any): { isConflict: boolean; isExternal: boolean } {
|
||||
if (error.code !== 'EADDRINUSE') {
|
||||
return { isConflict: false, isExternal: false };
|
||||
}
|
||||
|
||||
// Check if we already have this port
|
||||
const isBoundInternally = this.servers.has(Number(error.port));
|
||||
return { isConflict: true, isExternal: !isBoundInternally };
|
||||
}
|
||||
```
|
||||
|
||||
The bug has been successfully fixed through the following steps:
|
||||
#### Phase 2: Refine ACME Challenge Route Integration
|
||||
1. Modify `/ts/proxies/smart-proxy/certificate-manager.ts`:
|
||||
- Enhance `addChallengeRoute()` to be aware of existing port bindings
|
||||
- Add port verification before attempting to add challenge routes
|
||||
|
||||
1. **Bug Fix Applied**: Added the missing `setUpdateRoutesCallback` call in the `updateRoutes` method
|
||||
2. **Tests Created**: Comprehensive test suite validates the fix and prevents regression
|
||||
3. **Documentation Updated**: Added section on dynamic route updates to the certificate management guide
|
||||
4. **Code Refactored**: Extracted certificate manager creation into a helper method for better maintainability
|
||||
2. Smart Route Merging Logic:
|
||||
```typescript
|
||||
private async addChallengeRoute(): Promise<void> {
|
||||
// Check if route is already active
|
||||
if (this.challengeRouteActive) {
|
||||
return;
|
||||
}
|
||||
|
||||
The fix ensures that when routes are dynamically updated, the certificate manager maintains its ability to update routes for ACME challenges, preventing the "No route update callback set" error.
|
||||
// Create challenge route
|
||||
const challengeRoute = this.challengeRoute;
|
||||
const challengePort = this.globalAcmeDefaults?.port || 80;
|
||||
|
||||
// Check if port is already in use by another route
|
||||
const portAlreadyUsed = this.routes.some(r =>
|
||||
Array.isArray(r.match.ports)
|
||||
? r.match.ports.includes(challengePort)
|
||||
: r.match.ports === challengePort
|
||||
);
|
||||
|
||||
if (portAlreadyUsed) {
|
||||
logger.log('info', `Port ${challengePort} is already used by an existing route, merging ACME challenge route`);
|
||||
}
|
||||
|
||||
// Continue with route update...
|
||||
}
|
||||
```
|
||||
|
||||
### Timeline
|
||||
- Phase 1: Immediate fix (30 minutes)
|
||||
- Phase 2: Test creation (1 hour)
|
||||
- Phase 3: Documentation (30 minutes)
|
||||
- Phase 4: Refactoring (1 hour)
|
||||
3. Update Route Manager Communication:
|
||||
```typescript
|
||||
// Add this method to smart-proxy.ts
|
||||
private async addRouteWithoutRebinding(route: IRouteConfig): Promise<void> {
|
||||
// Add route to configuration without triggering a port rebind
|
||||
this.settings.routes.push(route);
|
||||
this.routeManager.updateRoutes(this.settings.routes);
|
||||
|
||||
// Update HttpProxy if needed, but skip port binding updates
|
||||
if (this.httpProxyBridge.getHttpProxy()) {
|
||||
await this.httpProxyBridge.syncRoutesToHttpProxy(this.settings.routes);
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
Total estimated time: 3 hours
|
||||
#### Phase 3: Enhance Proxy Route Management
|
||||
1. Modify `/ts/proxies/smart-proxy/smart-proxy.ts`:
|
||||
- Refactor `updateRoutes()` to group routes by port
|
||||
- Implement incremental updates that preserve port bindings
|
||||
- Add orphaned port detection and cleanup
|
||||
|
||||
### Notes
|
||||
- This is a critical bug that affects production use of SmartProxy
|
||||
- The fix is straightforward but requires careful testing
|
||||
- Consider backporting to v19.2.x branch if maintaining multiple versions
|
||||
2. Group Routes by Port:
|
||||
```typescript
|
||||
private groupRoutesByPort(routes: IRouteConfig[]): Map<number, IRouteConfig[]> {
|
||||
const portMap = new Map<number, IRouteConfig[]>();
|
||||
|
||||
for (const route of routes) {
|
||||
const ports = Array.isArray(route.match.ports)
|
||||
? route.match.ports
|
||||
: [route.match.ports];
|
||||
|
||||
for (const port of ports) {
|
||||
if (!portMap.has(port)) {
|
||||
portMap.set(port, []);
|
||||
}
|
||||
portMap.get(port)!.push(route);
|
||||
}
|
||||
}
|
||||
|
||||
return portMap;
|
||||
}
|
||||
```
|
||||
|
||||
3. Implement Port Usage Tracking:
|
||||
```typescript
|
||||
private updatePortUsageMap(routes: IRouteConfig[]): Map<number, Set<string>> {
|
||||
// Map of port -> Set of route names using that port
|
||||
const portUsage = new Map<number, Set<string>>();
|
||||
|
||||
for (const route of routes) {
|
||||
const ports = Array.isArray(route.match.ports)
|
||||
? route.match.ports
|
||||
: [route.match.ports];
|
||||
|
||||
const routeName = route.name || `unnamed_${Math.random().toString(36).substring(2, 9)}`;
|
||||
|
||||
for (const port of ports) {
|
||||
if (!portUsage.has(port)) {
|
||||
portUsage.set(port, new Set());
|
||||
}
|
||||
portUsage.get(port)!.add(routeName);
|
||||
}
|
||||
}
|
||||
|
||||
return portUsage;
|
||||
}
|
||||
|
||||
private findOrphanedPorts(oldUsage: Map<number, Set<string>>, newUsage: Map<number, Set<string>>): number[] {
|
||||
// Find ports that have no routes in new configuration
|
||||
const orphanedPorts: number[] = [];
|
||||
|
||||
for (const [port, routes] of oldUsage.entries()) {
|
||||
if (!newUsage.has(port) || newUsage.get(port)!.size === 0) {
|
||||
orphanedPorts.push(port);
|
||||
logger.log('info', `Port ${port} no longer has any associated routes, will be released`, { port });
|
||||
}
|
||||
}
|
||||
|
||||
return orphanedPorts;
|
||||
}
|
||||
```
|
||||
|
||||
4. Implement Incremental Update Logic:
|
||||
```typescript
|
||||
public async updateRoutesIncremental(newRoutes: IRouteConfig[]): Promise<void> {
|
||||
// Track port usage before and after update
|
||||
const oldPortUsage = this.updatePortUsageMap(this.settings.routes);
|
||||
const newPortUsage = this.updatePortUsageMap(newRoutes);
|
||||
|
||||
// Find orphaned ports - ports that no longer have any routes
|
||||
const orphanedPorts = this.findOrphanedPorts(oldPortUsage, newPortUsage);
|
||||
|
||||
// Ports that need new bindings - not in old configuration
|
||||
const newBindingPorts = [...newPortUsage.keys()].filter(p => !oldPortUsage.has(p));
|
||||
|
||||
// Close orphaned ports
|
||||
if (orphanedPorts.length > 0) {
|
||||
logger.log('info', `Releasing ${orphanedPorts.length} orphaned ports: ${orphanedPorts.join(', ')}`, { ports: orphanedPorts });
|
||||
await this.portManager.removePorts(orphanedPorts);
|
||||
}
|
||||
|
||||
// Bind to new ports
|
||||
if (newBindingPorts.length > 0) {
|
||||
logger.log('info', `Binding to ${newBindingPorts.length} new ports: ${newBindingPorts.join(', ')}`, { ports: newBindingPorts });
|
||||
await this.portManager.addPorts(newBindingPorts);
|
||||
}
|
||||
|
||||
// Update route configuration
|
||||
this.settings.routes = newRoutes;
|
||||
this.routeManager.updateRoutes(newRoutes);
|
||||
|
||||
// Update other components...
|
||||
}
|
||||
```
|
||||
|
||||
#### Phase 4: Improve Error Handling and Recovery
|
||||
1. Enhance Error Reporting:
|
||||
```typescript
|
||||
private handlePortBindingError(port: number, error: any): void {
|
||||
if (error.code === 'EADDRINUSE') {
|
||||
const isInternalConflict = this.portManager.isPortBoundBySmartProxy(port);
|
||||
if (isInternalConflict) {
|
||||
logger.log('warn', `Port ${port} is already bound by SmartProxy. This is likely a route configuration issue.`, { port });
|
||||
} else {
|
||||
logger.log('error', `Port ${port} is in use by another application. Please choose a different port.`, { port });
|
||||
}
|
||||
} else {
|
||||
logger.log('error', `Failed to bind to port ${port}: ${error.message}`, { port, error });
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
2. Implement ACME Port Fallback Strategy:
|
||||
```typescript
|
||||
private async selectAcmePort(): Promise<number> {
|
||||
const preferredPort = this.globalAcmeDefaults?.port || 80;
|
||||
|
||||
// Check if preferred port is already bound internally
|
||||
if (this.portManager.isPortBoundBySmartProxy(preferredPort)) {
|
||||
// We can use it without a new binding
|
||||
return preferredPort;
|
||||
}
|
||||
|
||||
// Try to bind to preferred port
|
||||
try {
|
||||
// Temporary test binding
|
||||
const server = plugins.net.createServer();
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
server.listen(preferredPort, () => {
|
||||
server.close();
|
||||
resolve();
|
||||
}).on('error', reject);
|
||||
});
|
||||
|
||||
// If we get here, port is available
|
||||
return preferredPort;
|
||||
} catch (error) {
|
||||
if (error.code === 'EADDRINUSE') {
|
||||
// Port is unavailable, try fallback ports
|
||||
for (const fallbackPort of [8080, 8081, 8082, 8083, 8084]) {
|
||||
try {
|
||||
// Test if we can bind to fallback
|
||||
const server = plugins.net.createServer();
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
server.listen(fallbackPort, () => {
|
||||
server.close();
|
||||
resolve();
|
||||
}).on('error', reject);
|
||||
});
|
||||
|
||||
logger.log('warn', `Primary ACME port ${preferredPort} is unavailable, using fallback port ${fallbackPort}`);
|
||||
return fallbackPort;
|
||||
} catch {
|
||||
// Try next fallback
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// All attempts failed
|
||||
throw new Error(`Could not find an available port for ACME challenges`);
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Testing Strategy
|
||||
1. **Unit Tests**:
|
||||
- Test port binding intelligence
|
||||
- Test route merging logic
|
||||
- Test error handling mechanisms
|
||||
- Test port reference counting
|
||||
- Test orphaned port detection and cleanup
|
||||
|
||||
2. **Integration Tests**:
|
||||
- Test multiple routes on the same port
|
||||
- Test ACME challenges on ports with existing routes
|
||||
- Test dynamic route addition and removal
|
||||
- Test port lifecycle (bind → share → release)
|
||||
- Test various recovery scenarios
|
||||
|
||||
3. **Stress Tests**:
|
||||
- Test rapid route updates
|
||||
- Test concurrent operations
|
||||
- Test large scale route changes (add/remove many at once)
|
||||
- Test frequent changes to see if ports are properly released
|
||||
- Test recovery from port conflicts
|
||||
|
||||
### Release Plan
|
||||
1. **19.4.0** - Phase 1 & 2: Port Manager and ACME Route Improvements
|
||||
2. **19.5.0** - Phase 3: Enhanced Route Management
|
||||
3. **19.6.0** - Phase 4: Improved Error Handling and Recovery
|
@ -1,86 +0,0 @@
|
||||
# ACME/Certificate Simplification Summary
|
||||
|
||||
## What Was Done
|
||||
|
||||
We successfully implemented the ACME/Certificate simplification plan for SmartProxy:
|
||||
|
||||
### 1. Created New Certificate Management System
|
||||
|
||||
- **SmartCertManager** (`ts/proxies/smart-proxy/certificate-manager.ts`): A unified certificate manager that handles both ACME and static certificates
|
||||
- **CertStore** (`ts/proxies/smart-proxy/cert-store.ts`): File-based certificate storage system
|
||||
|
||||
### 2. Updated Route Types
|
||||
|
||||
- Added `IRouteAcme` interface for ACME configuration
|
||||
- Added `IStaticResponse` interface for static route responses
|
||||
- Extended `IRouteTls` with comprehensive certificate options
|
||||
- Added `handler` property to `IRouteAction` for static routes
|
||||
|
||||
### 3. Implemented Static Route Handler
|
||||
|
||||
- Added `handleStaticAction` method to route-connection-handler.ts
|
||||
- Added support for 'static' route type in the action switch statement
|
||||
- Implemented proper HTTP response formatting
|
||||
|
||||
### 4. Updated SmartProxy Integration
|
||||
|
||||
- Removed old CertProvisioner and Port80Handler dependencies
|
||||
- Added `initializeCertificateManager` method
|
||||
- Updated `start` and `stop` methods to use new certificate manager
|
||||
- Added `provisionCertificate`, `renewCertificate`, and `getCertificateStatus` methods
|
||||
|
||||
### 5. Simplified NetworkProxyBridge
|
||||
|
||||
- Removed all certificate-related logic
|
||||
- Simplified to only handle network proxy forwarding
|
||||
- Updated to use port-based matching for network proxy routes
|
||||
|
||||
### 6. Cleaned Up HTTP Module
|
||||
|
||||
- Removed exports for port80 subdirectory
|
||||
- Kept only router and redirect functionality
|
||||
|
||||
### 7. Created Tests
|
||||
|
||||
- Created simplified test for certificate functionality
|
||||
- Test demonstrates static route handling and basic certificate configuration
|
||||
|
||||
## Key Improvements
|
||||
|
||||
1. **No Backward Compatibility**: Clean break from legacy implementations
|
||||
2. **Direct SmartAcme Integration**: Uses @push.rocks/smartacme directly without custom wrappers
|
||||
3. **Route-Based ACME Challenges**: No separate HTTP server needed
|
||||
4. **Simplified Architecture**: Removed unnecessary abstraction layers
|
||||
5. **Unified Configuration**: Certificate configuration is part of route definitions
|
||||
|
||||
## Configuration Example
|
||||
|
||||
```typescript
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'secure-site',
|
||||
match: { ports: 443, domains: 'example.com' },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'backend', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: {
|
||||
email: 'admin@example.com',
|
||||
useProduction: true
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
```
|
||||
|
||||
## Next Steps
|
||||
|
||||
1. Remove old certificate module and port80 directory
|
||||
2. Update documentation with new configuration format
|
||||
3. Test with real ACME certificates in staging environment
|
||||
4. Add more comprehensive tests for renewal and edge cases
|
||||
|
||||
The implementation is complete and builds successfully!
|
@ -1,34 +0,0 @@
|
||||
# NFTables Naming Consolidation Summary
|
||||
|
||||
This document summarizes the changes made to consolidate the naming convention for IP allow/block lists in the NFTables integration.
|
||||
|
||||
## Changes Made
|
||||
|
||||
1. **Updated NFTablesProxy interface** (`ts/proxies/nftables-proxy/models/interfaces.ts`):
|
||||
- Changed `allowedSourceIPs` to `ipAllowList`
|
||||
- Changed `bannedSourceIPs` to `ipBlockList`
|
||||
|
||||
2. **Updated NFTablesProxy implementation** (`ts/proxies/nftables-proxy/nftables-proxy.ts`):
|
||||
- Updated all references from `allowedSourceIPs` to `ipAllowList`
|
||||
- Updated all references from `bannedSourceIPs` to `ipBlockList`
|
||||
|
||||
3. **Updated NFTablesManager** (`ts/proxies/smart-proxy/nftables-manager.ts`):
|
||||
- Changed mapping from `allowedSourceIPs` to `ipAllowList`
|
||||
- Changed mapping from `bannedSourceIPs` to `ipBlockList`
|
||||
|
||||
## Files Already Using Consistent Naming
|
||||
|
||||
The following files already used the consistent naming convention `ipAllowList` and `ipBlockList`:
|
||||
|
||||
1. **Route helpers** (`ts/proxies/smart-proxy/utils/route-helpers.ts`)
|
||||
2. **Integration test** (`test/test.nftables-integration.ts`)
|
||||
3. **NFTables example** (`examples/nftables-integration.ts`)
|
||||
4. **Route types** (`ts/proxies/smart-proxy/models/route-types.ts`)
|
||||
|
||||
## Result
|
||||
|
||||
The naming is now consistent throughout the codebase:
|
||||
- `ipAllowList` is used for lists of allowed IP addresses
|
||||
- `ipBlockList` is used for lists of blocked IP addresses
|
||||
|
||||
This matches the naming convention already established in SmartProxy's core routing system.
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import {
|
||||
EventSystem,
|
||||
ProxyEvents,
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { IpUtils } from '../../../ts/core/utils/ip-utils.js';
|
||||
|
||||
tap.test('ip-utils - normalizeIP', async () => {
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as routeUtils from '../../../ts/core/utils/route-utils.js';
|
||||
|
||||
// Test domain matching
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { SharedSecurityManager } from '../../../ts/core/utils/shared-security-manager.js';
|
||||
import type { IRouteConfig, IRouteContext } from '../../../ts/proxies/smart-proxy/models/route-types.js';
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { ValidationUtils } from '../../../ts/core/utils/validation-utils.js';
|
||||
import type { IDomainOptions, IAcmeOptions } from '../../../ts/core/models/common-types.js';
|
||||
|
||||
|
21
test/helpers/test-cert.pem
Normal file
21
test/helpers/test-cert.pem
Normal file
@ -0,0 +1,21 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDizCCAnOgAwIBAgIUAzpwtk6k5v/7LfY1KR7PreezvsswDQYJKoZIhvcNAQEL
|
||||
BQAwVTELMAkGA1UEBhMCVVMxDTALBgNVBAgMBFRlc3QxDTALBgNVBAcMBFRlc3Qx
|
||||
DTALBgNVBAoMBFRlc3QxGTAXBgNVBAMMEHRlc3QuZXhhbXBsZS5jb20wHhcNMjUw
|
||||
NTE5MTc1MDM0WhcNMjYwNTE5MTc1MDM0WjBVMQswCQYDVQQGEwJVUzENMAsGA1UE
|
||||
CAwEVGVzdDENMAsGA1UEBwwEVGVzdDENMAsGA1UECgwEVGVzdDEZMBcGA1UEAwwQ
|
||||
dGVzdC5leGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
|
||||
AK9FivUNjXz5q+snqKLCno0i3cYzJ+LTzSf+x+a/G7CA/rtigIvSYEqWC4+/MXPM
|
||||
ifpU/iIRtj7RzoPKH44uJie7mS5kKSHsMnh/qixaxxJph+tVYdNGi9hNvL12T/5n
|
||||
ihXkpMAK8MV6z3Y+ObiaKbCe4w19sLu2IIpff0U0mo6rTKOQwAfGa/N1dtzFaogP
|
||||
f/iO5kcksWUPqZowM3lwXXgy8vg5ZeU7IZk9fRTBfrEJAr9TCQ8ivdluxq59Ax86
|
||||
0AMmlbeu/dUMBcujLiTVjzqD3jz/Hr+iHq2y48NiF3j5oE/1qsD04d+QDWAygdmd
|
||||
bQOy0w/W1X0ppnuPhLILQzcCAwEAAaNTMFEwHQYDVR0OBBYEFID88wvDJXrQyTsx
|
||||
s+zl/wwx5BCMMB8GA1UdIwQYMBaAFID88wvDJXrQyTsxs+zl/wwx5BCMMA8GA1Ud
|
||||
EwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAIRp9bUxAip5s0dx700PPVAd
|
||||
mrS7kDCZ+KFD6UgF/F3ykshh33MfYNLghJCfhcWvUHQgiPKohWcZq1g4oMuDZPFW
|
||||
EHTr2wkX9j6A3KNjgFT5OVkLdjNPYdxMbTvmKbsJPc82C9AFN/Xz97XlZvmE4mKc
|
||||
JCKqTz9hK3JpoayEUrf9g4TJcVwNnl/UnMp2sZX3aId4wD2+jSb40H/5UPFO2stv
|
||||
SvCSdMcq0ZOQ/g/P56xOKV/5RAdIYV+0/3LWNGU/dH0nUfJO9K31e3eR+QZ1Iyn3
|
||||
iGPcaSKPDptVx+2hxcvhFuRgRjfJ0mu6/hnK5wvhrXrSm43FBgvmlo4MaX0HVss=
|
||||
-----END CERTIFICATE-----
|
28
test/helpers/test-key.pem
Normal file
28
test/helpers/test-key.pem
Normal file
@ -0,0 +1,28 @@
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCvRYr1DY18+avr
|
||||
J6iiwp6NIt3GMyfi080n/sfmvxuwgP67YoCL0mBKlguPvzFzzIn6VP4iEbY+0c6D
|
||||
yh+OLiYnu5kuZCkh7DJ4f6osWscSaYfrVWHTRovYTby9dk/+Z4oV5KTACvDFes92
|
||||
Pjm4mimwnuMNfbC7tiCKX39FNJqOq0yjkMAHxmvzdXbcxWqID3/4juZHJLFlD6ma
|
||||
MDN5cF14MvL4OWXlOyGZPX0UwX6xCQK/UwkPIr3ZbsaufQMfOtADJpW3rv3VDAXL
|
||||
oy4k1Y86g948/x6/oh6tsuPDYhd4+aBP9arA9OHfkA1gMoHZnW0DstMP1tV9KaZ7
|
||||
j4SyC0M3AgMBAAECggEAKfW6ng74C+7TtxDAAPMZtQ0fTcdKabWt/EC1B6tBzEAd
|
||||
e6vJvW+IaOLB8tBhXOkfMSRu0KYv3Jsq1wcpBcdLkCCLu/zzkfDzZkCd809qMCC+
|
||||
jtraeBOAADEgGbV80hlkh/g8btNPr99GUnb0J5sUlvl6vuyTxmSEJsxU8jL1O2km
|
||||
YgK34fS5NS73h138P3UQAGC0dGK8Rt61EsFIKWTyH/r8tlz9nQrYcDG3LwTbFQQf
|
||||
bsRLAjolxTRV6t1CzcjsSGtrAqm/4QNypP5McCyOXAqajb3pNGaJyGg1nAEOZclK
|
||||
oagU7PPwaFmSquwo7Y1Uov72XuLJLVryBl0fOCen7QKBgQDieqvaL9gHsfaZKNoY
|
||||
+0Cnul/Dw0kjuqJIKhar/mfLY7NwYmFSgH17r26g+X7mzuzaN0rnEhjh7L3j6xQJ
|
||||
qhs9zL+/OIa581Ptvb8H/42O+mxnqx7Z8s5JwH0+f5EriNkU3euoAe/W9x4DqJiE
|
||||
2VyvlM1gngxI+vFo+iewmg+vOwKBgQDGHiPKxXWD50tXvvDdRTjH+/4GQuXhEQjl
|
||||
Po59AJ/PLc/AkQkVSzr8Fspf7MHN6vufr3tS45tBuf5Qf2Y9GPBRKR3e+M1CJdoi
|
||||
1RXy0nMsnR0KujxgiIe6WQFumcT81AsIVXtDYk11Sa057tYPeeOmgtmUMJZb6lek
|
||||
wqUxrFw0NQKBgQCs/p7+jsUpO5rt6vKNWn5MoGQ+GJFppUoIbX3b6vxFs+aA1eUZ
|
||||
K+St8ZdDhtCUZUMufEXOs1gmWrvBuPMZXsJoNlnRKtBegat+Ug31ghMTP95GYcOz
|
||||
H3DLjSkd8DtnUaTf95PmRXR6c1CN4t59u7q8s6EdSByCMozsbwiaMVQBuQKBgQCY
|
||||
QxG/BYMLnPeKuHTlmg3JpSHWLhP+pdjwVuOrro8j61F/7ffNJcRvehSPJKbOW4qH
|
||||
b5aYXdU07n1F4KPy0PfhaHhMpWsbK3w6yQnVVWivIRDw7bD5f/TQgxdWqVd7+HuC
|
||||
LDBP2X0uZzF7FNPvkP4lOut9uNnWSoSRXAcZ5h33AQKBgQDWJYKGNoA8/IT9+e8n
|
||||
v1Fy0RNL/SmBfGZW9pFGFT2pcu6TrzVSugQeWY/YFO2X6FqLPbL4p72Ar4rF0Uxl
|
||||
31aYIjy3jDGzMabdIuW7mBogvtNjBG+0UgcLQzbdG6JkvTkQgqUjwIn/+Jo+0sS5
|
||||
dEylNM0zC6zx1f1U1dGGZaNcLg==
|
||||
-----END PRIVATE KEY-----
|
@ -1,144 +0,0 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
|
||||
let smartProxy: SmartProxy;
|
||||
|
||||
tap.test('should create SmartProxy with top-level ACME configuration', async () => {
|
||||
smartProxy = new SmartProxy({
|
||||
// Top-level ACME configuration
|
||||
acme: {
|
||||
email: 'test@example.com',
|
||||
useProduction: false,
|
||||
port: 80,
|
||||
renewThresholdDays: 30
|
||||
},
|
||||
routes: [{
|
||||
name: 'example.com',
|
||||
match: { domains: 'example.com', ports: 443 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto' // Uses top-level ACME config
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
expect(smartProxy).toBeInstanceOf(SmartProxy);
|
||||
expect(smartProxy.settings.acme?.email).toEqual('test@example.com');
|
||||
expect(smartProxy.settings.acme?.useProduction).toEqual(false);
|
||||
});
|
||||
|
||||
tap.test('should support route-level ACME configuration', async () => {
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'custom.com',
|
||||
match: { domains: 'custom.com', ports: 443 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: { // Route-specific ACME config
|
||||
email: 'custom@example.com',
|
||||
useProduction: true
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
expect(proxy).toBeInstanceOf(SmartProxy);
|
||||
});
|
||||
|
||||
tap.test('should use top-level ACME as defaults and allow route overrides', async () => {
|
||||
const proxy = new SmartProxy({
|
||||
acme: {
|
||||
email: 'default@example.com',
|
||||
useProduction: false
|
||||
},
|
||||
routes: [{
|
||||
name: 'default-route',
|
||||
match: { domains: 'default.com', ports: 443 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto' // Uses top-level defaults
|
||||
}
|
||||
}
|
||||
}, {
|
||||
name: 'custom-route',
|
||||
match: { domains: 'custom.com', ports: 443 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8081 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: { // Override for this route
|
||||
email: 'special@example.com',
|
||||
useProduction: true
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
expect(proxy.settings.acme?.email).toEqual('default@example.com');
|
||||
});
|
||||
|
||||
tap.test('should validate ACME configuration warnings', async () => {
|
||||
// Test missing email
|
||||
let errorThrown = false;
|
||||
try {
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'no-email',
|
||||
match: { domains: 'test.com', ports: 443 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto' // No ACME email configured
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
await proxy.start();
|
||||
} catch (error) {
|
||||
errorThrown = true;
|
||||
expect(error.message).toInclude('ACME email is required');
|
||||
}
|
||||
expect(errorThrown).toBeTrue();
|
||||
});
|
||||
|
||||
tap.test('should support accountEmail alias', async () => {
|
||||
const proxy = new SmartProxy({
|
||||
acme: {
|
||||
accountEmail: 'account@example.com', // Using alias
|
||||
useProduction: false
|
||||
},
|
||||
routes: [{
|
||||
name: 'alias-test',
|
||||
match: { domains: 'alias.com', ports: 443 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto'
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
expect(proxy.settings.acme?.email).toEqual('account@example.com');
|
||||
});
|
||||
|
||||
tap.start();
|
129
test/test.acme-http-challenge.ts
Normal file
129
test/test.acme-http-challenge.ts
Normal file
@ -0,0 +1,129 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
|
||||
tap.test('should handle HTTP requests on port 80 for ACME challenges', async (tools) => {
|
||||
tools.timeout(10000);
|
||||
|
||||
// Track HTTP requests that are handled
|
||||
const handledRequests: any[] = [];
|
||||
|
||||
const settings = {
|
||||
routes: [
|
||||
{
|
||||
name: 'acme-test-route',
|
||||
match: {
|
||||
ports: [18080], // Use high port to avoid permission issues
|
||||
path: '/.well-known/acme-challenge/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static' as const,
|
||||
handler: async (context) => {
|
||||
handledRequests.push({
|
||||
path: context.path,
|
||||
method: context.method,
|
||||
headers: context.headers
|
||||
});
|
||||
|
||||
// Simulate ACME challenge response
|
||||
const token = context.path?.split('/').pop() || '';
|
||||
return {
|
||||
status: 200,
|
||||
headers: { 'Content-Type': 'text/plain' },
|
||||
body: `challenge-response-for-${token}`
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Mock NFTables manager
|
||||
(proxy as any).nftablesManager = {
|
||||
ensureNFTablesSetup: async () => {},
|
||||
stop: async () => {}
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Make an HTTP request to the challenge endpoint
|
||||
const response = await fetch('http://localhost:18080/.well-known/acme-challenge/test-token', {
|
||||
method: 'GET'
|
||||
});
|
||||
|
||||
// Verify response
|
||||
expect(response.status).toEqual(200);
|
||||
const body = await response.text();
|
||||
expect(body).toEqual('challenge-response-for-test-token');
|
||||
|
||||
// Verify request was handled
|
||||
expect(handledRequests.length).toEqual(1);
|
||||
expect(handledRequests[0].path).toEqual('/.well-known/acme-challenge/test-token');
|
||||
expect(handledRequests[0].method).toEqual('GET');
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.test('should parse HTTP headers correctly', async (tools) => {
|
||||
tools.timeout(10000);
|
||||
|
||||
const capturedContext: any = {};
|
||||
|
||||
const settings = {
|
||||
routes: [
|
||||
{
|
||||
name: 'header-test-route',
|
||||
match: {
|
||||
ports: [18081]
|
||||
},
|
||||
action: {
|
||||
type: 'static' as const,
|
||||
handler: async (context) => {
|
||||
Object.assign(capturedContext, context);
|
||||
return {
|
||||
status: 200,
|
||||
headers: { 'Content-Type': 'application/json' },
|
||||
body: JSON.stringify({
|
||||
received: context.headers
|
||||
})
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Mock NFTables manager
|
||||
(proxy as any).nftablesManager = {
|
||||
ensureNFTablesSetup: async () => {},
|
||||
stop: async () => {}
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Make request with custom headers
|
||||
const response = await fetch('http://localhost:18081/test', {
|
||||
method: 'POST',
|
||||
headers: {
|
||||
'X-Custom-Header': 'test-value',
|
||||
'User-Agent': 'test-agent'
|
||||
}
|
||||
});
|
||||
|
||||
expect(response.status).toEqual(200);
|
||||
const body = await response.json();
|
||||
|
||||
// Verify headers were parsed correctly
|
||||
expect(capturedContext.headers['x-custom-header']).toEqual('test-value');
|
||||
expect(capturedContext.headers['user-agent']).toEqual('test-agent');
|
||||
expect(capturedContext.method).toEqual('POST');
|
||||
expect(capturedContext.path).toEqual('/test');
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.start();
|
174
test/test.acme-http01-challenge.ts
Normal file
174
test/test.acme-http01-challenge.ts
Normal file
@ -0,0 +1,174 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
import * as net from 'net';
|
||||
|
||||
// Test that HTTP-01 challenges are properly processed when the initial data arrives
|
||||
tap.test('should correctly handle HTTP-01 challenge requests with initial data chunk', async (tapTest) => {
|
||||
// Prepare test data
|
||||
const challengeToken = 'test-acme-http01-challenge-token';
|
||||
const challengeResponse = 'mock-response-for-challenge';
|
||||
const challengePath = `/.well-known/acme-challenge/${challengeToken}`;
|
||||
|
||||
// Create a handler function that responds to ACME challenges
|
||||
const acmeHandler = (context: any) => {
|
||||
// Log request details for debugging
|
||||
console.log(`Received request: ${context.method} ${context.path}`);
|
||||
|
||||
// Check if this is an ACME challenge request
|
||||
if (context.path.startsWith('/.well-known/acme-challenge/')) {
|
||||
const token = context.path.substring('/.well-known/acme-challenge/'.length);
|
||||
|
||||
// If the token matches our test token, return the response
|
||||
if (token === challengeToken) {
|
||||
return {
|
||||
status: 200,
|
||||
headers: {
|
||||
'Content-Type': 'text/plain'
|
||||
},
|
||||
body: challengeResponse
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
// For any other requests, return 404
|
||||
return {
|
||||
status: 404,
|
||||
headers: {
|
||||
'Content-Type': 'text/plain'
|
||||
},
|
||||
body: 'Not found'
|
||||
};
|
||||
};
|
||||
|
||||
// Create a proxy with the ACME challenge route
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'acme-challenge-route',
|
||||
match: {
|
||||
ports: 8080,
|
||||
paths: ['/.well-known/acme-challenge/*']
|
||||
},
|
||||
action: {
|
||||
type: 'static',
|
||||
handler: acmeHandler
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Create a client to test the HTTP-01 challenge
|
||||
const testClient = new net.Socket();
|
||||
let responseData = '';
|
||||
|
||||
// Set up client handlers
|
||||
testClient.on('data', (data) => {
|
||||
responseData += data.toString();
|
||||
});
|
||||
|
||||
// Connect to the proxy and send the HTTP-01 challenge request
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
testClient.connect(8080, 'localhost', () => {
|
||||
// Send HTTP request for the challenge token
|
||||
testClient.write(
|
||||
`GET ${challengePath} HTTP/1.1\r\n` +
|
||||
'Host: test.example.com\r\n' +
|
||||
'User-Agent: ACME Challenge Test\r\n' +
|
||||
'Accept: */*\r\n' +
|
||||
'\r\n'
|
||||
);
|
||||
resolve();
|
||||
});
|
||||
|
||||
testClient.on('error', reject);
|
||||
});
|
||||
|
||||
// Wait for the response
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// Verify that we received a valid HTTP response with the challenge token
|
||||
expect(responseData).toContain('HTTP/1.1 200');
|
||||
expect(responseData).toContain('Content-Type: text/plain');
|
||||
expect(responseData).toContain(challengeResponse);
|
||||
|
||||
// Cleanup
|
||||
testClient.destroy();
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
// Test that non-existent challenge tokens return 404
|
||||
tap.test('should return 404 for non-existent challenge tokens', async (tapTest) => {
|
||||
// Create a handler function that behaves like a real ACME handler
|
||||
const acmeHandler = (context: any) => {
|
||||
if (context.path.startsWith('/.well-known/acme-challenge/')) {
|
||||
const token = context.path.substring('/.well-known/acme-challenge/'.length);
|
||||
// In this test, we only recognize one specific token
|
||||
if (token === 'valid-token') {
|
||||
return {
|
||||
status: 200,
|
||||
headers: { 'Content-Type': 'text/plain' },
|
||||
body: 'valid-response'
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
// For all other paths or unrecognized tokens, return 404
|
||||
return {
|
||||
status: 404,
|
||||
headers: { 'Content-Type': 'text/plain' },
|
||||
body: 'Not found'
|
||||
};
|
||||
};
|
||||
|
||||
// Create a proxy with the ACME challenge route
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'acme-challenge-route',
|
||||
match: {
|
||||
ports: 8081,
|
||||
paths: ['/.well-known/acme-challenge/*']
|
||||
},
|
||||
action: {
|
||||
type: 'static',
|
||||
handler: acmeHandler
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Create a client to test the invalid challenge request
|
||||
const testClient = new net.Socket();
|
||||
let responseData = '';
|
||||
|
||||
testClient.on('data', (data) => {
|
||||
responseData += data.toString();
|
||||
});
|
||||
|
||||
// Connect and send a request for a non-existent token
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
testClient.connect(8081, 'localhost', () => {
|
||||
testClient.write(
|
||||
'GET /.well-known/acme-challenge/invalid-token HTTP/1.1\r\n' +
|
||||
'Host: test.example.com\r\n' +
|
||||
'\r\n'
|
||||
);
|
||||
resolve();
|
||||
});
|
||||
|
||||
testClient.on('error', reject);
|
||||
});
|
||||
|
||||
// Wait for the response
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// Verify we got a 404 Not Found
|
||||
expect(responseData).toContain('HTTP/1.1 404');
|
||||
expect(responseData).toContain('Not found');
|
||||
|
||||
// Cleanup
|
||||
testClient.destroy();
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.start();
|
141
test/test.acme-route-creation.ts
Normal file
141
test/test.acme-route-creation.ts
Normal file
@ -0,0 +1,141 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
|
||||
/**
|
||||
* Test that verifies ACME challenge routes are properly created
|
||||
*/
|
||||
tap.test('should create ACME challenge route with high ports', async (tools) => {
|
||||
tools.timeout(5000);
|
||||
|
||||
const capturedRoutes: any[] = [];
|
||||
|
||||
const settings = {
|
||||
routes: [
|
||||
{
|
||||
name: 'secure-route',
|
||||
match: {
|
||||
ports: [18443], // High port to avoid permission issues
|
||||
domains: 'test.local'
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate' as const,
|
||||
certificate: 'auto' as const
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
acme: {
|
||||
email: 'test@example.com',
|
||||
port: 18080, // High port for ACME challenges
|
||||
useProduction: false // Use staging environment
|
||||
}
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Capture route updates
|
||||
const originalUpdateRoutes = (proxy as any).updateRoutes.bind(proxy);
|
||||
(proxy as any).updateRoutes = async function(routes: any[]) {
|
||||
capturedRoutes.push([...routes]);
|
||||
return originalUpdateRoutes(routes);
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Check that ACME challenge route was added
|
||||
const finalRoutes = capturedRoutes[capturedRoutes.length - 1];
|
||||
const challengeRoute = finalRoutes.find((r: any) => r.name === 'acme-challenge');
|
||||
|
||||
expect(challengeRoute).toBeDefined();
|
||||
expect(challengeRoute.match.path).toEqual('/.well-known/acme-challenge/*');
|
||||
expect(challengeRoute.match.ports).toEqual(18080);
|
||||
expect(challengeRoute.action.type).toEqual('static');
|
||||
expect(challengeRoute.priority).toEqual(1000);
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.test('should handle HTTP request parsing correctly', async (tools) => {
|
||||
tools.timeout(5000);
|
||||
|
||||
let handlerCalled = false;
|
||||
let receivedContext: any;
|
||||
|
||||
const settings = {
|
||||
routes: [
|
||||
{
|
||||
name: 'test-static',
|
||||
match: {
|
||||
ports: [18090],
|
||||
path: '/test/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static' as const,
|
||||
handler: async (context) => {
|
||||
handlerCalled = true;
|
||||
receivedContext = context;
|
||||
return {
|
||||
status: 200,
|
||||
headers: { 'Content-Type': 'text/plain' },
|
||||
body: 'OK'
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Mock NFTables manager
|
||||
(proxy as any).nftablesManager = {
|
||||
ensureNFTablesSetup: async () => {},
|
||||
stop: async () => {}
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Create a simple HTTP request
|
||||
const client = new plugins.net.Socket();
|
||||
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
client.connect(18090, 'localhost', () => {
|
||||
// Send HTTP request
|
||||
const request = [
|
||||
'GET /test/example HTTP/1.1',
|
||||
'Host: localhost:18090',
|
||||
'User-Agent: test-client',
|
||||
'',
|
||||
''
|
||||
].join('\r\n');
|
||||
|
||||
client.write(request);
|
||||
|
||||
// Wait for response
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
expect(response).toContain('HTTP/1.1 200');
|
||||
expect(response).toContain('OK');
|
||||
client.end();
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
client.on('error', reject);
|
||||
});
|
||||
|
||||
// Verify handler was called
|
||||
expect(handlerCalled).toBeTrue();
|
||||
expect(receivedContext).toBeDefined();
|
||||
expect(receivedContext.path).toEqual('/test/example');
|
||||
expect(receivedContext.method).toEqual('GET');
|
||||
expect(receivedContext.headers.host).toEqual('localhost:18090');
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.start();
|
116
test/test.acme-simple.ts
Normal file
116
test/test.acme-simple.ts
Normal file
@ -0,0 +1,116 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import * as net from 'net';
|
||||
|
||||
/**
|
||||
* Simple test to verify HTTP parsing works for ACME challenges
|
||||
*/
|
||||
tap.test('should parse HTTP requests correctly', async (tools) => {
|
||||
tools.timeout(15000);
|
||||
|
||||
let receivedRequest = '';
|
||||
|
||||
// Create a simple HTTP server to test the parsing
|
||||
const server = net.createServer((socket) => {
|
||||
socket.on('data', (data) => {
|
||||
receivedRequest = data.toString();
|
||||
|
||||
// Send response
|
||||
const response = [
|
||||
'HTTP/1.1 200 OK',
|
||||
'Content-Type: text/plain',
|
||||
'Content-Length: 2',
|
||||
'',
|
||||
'OK'
|
||||
].join('\r\n');
|
||||
|
||||
socket.write(response);
|
||||
socket.end();
|
||||
});
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
server.listen(18091, () => {
|
||||
console.log('Test server listening on port 18091');
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Connect and send request
|
||||
const client = net.connect(18091, 'localhost');
|
||||
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
client.on('connect', () => {
|
||||
const request = [
|
||||
'GET /.well-known/acme-challenge/test-token HTTP/1.1',
|
||||
'Host: localhost:18091',
|
||||
'User-Agent: test-client',
|
||||
'',
|
||||
''
|
||||
].join('\r\n');
|
||||
|
||||
client.write(request);
|
||||
});
|
||||
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
expect(response).toContain('200 OK');
|
||||
client.end();
|
||||
});
|
||||
|
||||
client.on('end', () => {
|
||||
resolve();
|
||||
});
|
||||
|
||||
client.on('error', reject);
|
||||
});
|
||||
|
||||
// Verify we received the request
|
||||
expect(receivedRequest).toContain('GET /.well-known/acme-challenge/test-token');
|
||||
expect(receivedRequest).toContain('Host: localhost:18091');
|
||||
|
||||
server.close();
|
||||
});
|
||||
|
||||
/**
|
||||
* Test to verify ACME route configuration
|
||||
*/
|
||||
tap.test('should configure ACME challenge route', async () => {
|
||||
// Simple test to verify the route configuration structure
|
||||
const challengeRoute = {
|
||||
name: 'acme-challenge',
|
||||
priority: 1000,
|
||||
match: {
|
||||
ports: 80,
|
||||
path: '/.well-known/acme-challenge/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static',
|
||||
handler: async (context: any) => {
|
||||
const token = context.path?.split('/').pop() || '';
|
||||
return {
|
||||
status: 200,
|
||||
headers: { 'Content-Type': 'text/plain' },
|
||||
body: `challenge-response-${token}`
|
||||
};
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
expect(challengeRoute.name).toEqual('acme-challenge');
|
||||
expect(challengeRoute.match.path).toEqual('/.well-known/acme-challenge/*');
|
||||
expect(challengeRoute.match.ports).toEqual(80);
|
||||
expect(challengeRoute.priority).toEqual(1000);
|
||||
|
||||
// Test the handler
|
||||
const context = {
|
||||
path: '/.well-known/acme-challenge/test-token',
|
||||
method: 'GET',
|
||||
headers: {}
|
||||
};
|
||||
|
||||
const response = await challengeRoute.action.handler(context);
|
||||
expect(response.status).toEqual(200);
|
||||
expect(response.body).toEqual('challenge-response-test-token');
|
||||
});
|
||||
|
||||
tap.start();
|
185
test/test.acme-state-manager.node.ts
Normal file
185
test/test.acme-state-manager.node.ts
Normal file
@ -0,0 +1,185 @@
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { AcmeStateManager } from '../ts/proxies/smart-proxy/acme-state-manager.js';
|
||||
import type { IRouteConfig } from '../ts/proxies/smart-proxy/models/route-types.js';
|
||||
|
||||
tap.test('AcmeStateManager should track challenge routes correctly', async (tools) => {
|
||||
const stateManager = new AcmeStateManager();
|
||||
|
||||
const challengeRoute: IRouteConfig = {
|
||||
name: 'acme-challenge',
|
||||
priority: 1000,
|
||||
match: {
|
||||
ports: 80,
|
||||
path: '/.well-known/acme-challenge/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static',
|
||||
handler: async () => ({ status: 200, body: 'challenge' })
|
||||
}
|
||||
};
|
||||
|
||||
// Initially no challenge routes
|
||||
expect(stateManager.isChallengeRouteActive()).toBeFalse();
|
||||
expect(stateManager.getActiveChallengeRoutes()).toEqual([]);
|
||||
|
||||
// Add challenge route
|
||||
stateManager.addChallengeRoute(challengeRoute);
|
||||
expect(stateManager.isChallengeRouteActive()).toBeTrue();
|
||||
expect(stateManager.getActiveChallengeRoutes()).toHaveProperty("length", 1);
|
||||
expect(stateManager.getPrimaryChallengeRoute()).toEqual(challengeRoute);
|
||||
|
||||
// Remove challenge route
|
||||
stateManager.removeChallengeRoute('acme-challenge');
|
||||
expect(stateManager.isChallengeRouteActive()).toBeFalse();
|
||||
expect(stateManager.getActiveChallengeRoutes()).toEqual([]);
|
||||
expect(stateManager.getPrimaryChallengeRoute()).toBeNull();
|
||||
});
|
||||
|
||||
tap.test('AcmeStateManager should track port allocations', async (tools) => {
|
||||
const stateManager = new AcmeStateManager();
|
||||
|
||||
const challengeRoute1: IRouteConfig = {
|
||||
name: 'acme-challenge-1',
|
||||
priority: 1000,
|
||||
match: {
|
||||
ports: 80,
|
||||
path: '/.well-known/acme-challenge/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
const challengeRoute2: IRouteConfig = {
|
||||
name: 'acme-challenge-2',
|
||||
priority: 900,
|
||||
match: {
|
||||
ports: [80, 8080],
|
||||
path: '/.well-known/acme-challenge/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
// Add first route
|
||||
stateManager.addChallengeRoute(challengeRoute1);
|
||||
expect(stateManager.isPortAllocatedForAcme(80)).toBeTrue();
|
||||
expect(stateManager.isPortAllocatedForAcme(8080)).toBeFalse();
|
||||
expect(stateManager.getAcmePorts()).toEqual([80]);
|
||||
|
||||
// Add second route
|
||||
stateManager.addChallengeRoute(challengeRoute2);
|
||||
expect(stateManager.isPortAllocatedForAcme(80)).toBeTrue();
|
||||
expect(stateManager.isPortAllocatedForAcme(8080)).toBeTrue();
|
||||
expect(stateManager.getAcmePorts()).toContain(80);
|
||||
expect(stateManager.getAcmePorts()).toContain(8080);
|
||||
|
||||
// Remove first route - port 80 should still be allocated
|
||||
stateManager.removeChallengeRoute('acme-challenge-1');
|
||||
expect(stateManager.isPortAllocatedForAcme(80)).toBeTrue();
|
||||
expect(stateManager.isPortAllocatedForAcme(8080)).toBeTrue();
|
||||
|
||||
// Remove second route - all ports should be deallocated
|
||||
stateManager.removeChallengeRoute('acme-challenge-2');
|
||||
expect(stateManager.isPortAllocatedForAcme(80)).toBeFalse();
|
||||
expect(stateManager.isPortAllocatedForAcme(8080)).toBeFalse();
|
||||
expect(stateManager.getAcmePorts()).toEqual([]);
|
||||
});
|
||||
|
||||
tap.test('AcmeStateManager should select primary route by priority', async (tools) => {
|
||||
const stateManager = new AcmeStateManager();
|
||||
|
||||
const lowPriorityRoute: IRouteConfig = {
|
||||
name: 'low-priority',
|
||||
priority: 100,
|
||||
match: {
|
||||
ports: 80
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
const highPriorityRoute: IRouteConfig = {
|
||||
name: 'high-priority',
|
||||
priority: 2000,
|
||||
match: {
|
||||
ports: 80
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
const defaultPriorityRoute: IRouteConfig = {
|
||||
name: 'default-priority',
|
||||
// No priority specified - should default to 0
|
||||
match: {
|
||||
ports: 80
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
// Add low priority first
|
||||
stateManager.addChallengeRoute(lowPriorityRoute);
|
||||
expect(stateManager.getPrimaryChallengeRoute()?.name).toEqual('low-priority');
|
||||
|
||||
// Add high priority - should become primary
|
||||
stateManager.addChallengeRoute(highPriorityRoute);
|
||||
expect(stateManager.getPrimaryChallengeRoute()?.name).toEqual('high-priority');
|
||||
|
||||
// Add default priority - primary should remain high priority
|
||||
stateManager.addChallengeRoute(defaultPriorityRoute);
|
||||
expect(stateManager.getPrimaryChallengeRoute()?.name).toEqual('high-priority');
|
||||
|
||||
// Remove high priority - primary should fall back to low priority
|
||||
stateManager.removeChallengeRoute('high-priority');
|
||||
expect(stateManager.getPrimaryChallengeRoute()?.name).toEqual('low-priority');
|
||||
});
|
||||
|
||||
tap.test('AcmeStateManager should handle clear operation', async (tools) => {
|
||||
const stateManager = new AcmeStateManager();
|
||||
|
||||
const challengeRoute1: IRouteConfig = {
|
||||
name: 'route-1',
|
||||
match: {
|
||||
ports: [80, 443]
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
const challengeRoute2: IRouteConfig = {
|
||||
name: 'route-2',
|
||||
match: {
|
||||
ports: 8080
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
// Add routes
|
||||
stateManager.addChallengeRoute(challengeRoute1);
|
||||
stateManager.addChallengeRoute(challengeRoute2);
|
||||
|
||||
// Verify state before clear
|
||||
expect(stateManager.isChallengeRouteActive()).toBeTrue();
|
||||
expect(stateManager.getActiveChallengeRoutes()).toHaveProperty("length", 2);
|
||||
expect(stateManager.getAcmePorts()).toHaveProperty("length", 3);
|
||||
|
||||
// Clear all state
|
||||
stateManager.clear();
|
||||
|
||||
// Verify state after clear
|
||||
expect(stateManager.isChallengeRouteActive()).toBeFalse();
|
||||
expect(stateManager.getActiveChallengeRoutes()).toEqual([]);
|
||||
expect(stateManager.getAcmePorts()).toEqual([]);
|
||||
expect(stateManager.getPrimaryChallengeRoute()).toBeNull();
|
||||
});
|
||||
|
||||
export default tap.start();
|
103
test/test.acme-timing-simple.ts
Normal file
103
test/test.acme-timing-simple.ts
Normal file
@ -0,0 +1,103 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
|
||||
// Test that certificate provisioning is deferred until after ports are listening
|
||||
tap.test('should defer certificate provisioning until ports are ready', async (tapTest) => {
|
||||
// Track when operations happen
|
||||
let portsListening = false;
|
||||
let certProvisioningStarted = false;
|
||||
let operationOrder: string[] = [];
|
||||
|
||||
// Create proxy with certificate route but without real ACME
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: {
|
||||
ports: 8443,
|
||||
domains: ['test.local']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8181 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: {
|
||||
email: 'test@local.dev',
|
||||
useProduction: false
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
// Override the certificate manager creation to avoid real ACME
|
||||
const originalCreateCertManager = proxy['createCertificateManager'];
|
||||
proxy['createCertificateManager'] = async function(...args: any[]) {
|
||||
console.log('Creating mock cert manager');
|
||||
operationOrder.push('create-cert-manager');
|
||||
const mockCertManager = {
|
||||
initialize: async () => {
|
||||
operationOrder.push('cert-manager-init');
|
||||
console.log('Mock cert manager initialized');
|
||||
},
|
||||
provisionAllCertificates: async () => {
|
||||
operationOrder.push('cert-provisioning');
|
||||
certProvisioningStarted = true;
|
||||
// Check that ports are listening when provisioning starts
|
||||
if (!portsListening) {
|
||||
throw new Error('Certificate provisioning started before ports ready!');
|
||||
}
|
||||
console.log('Mock certificate provisioning (ports are ready)');
|
||||
},
|
||||
stop: async () => {},
|
||||
setHttpProxy: () => {},
|
||||
setGlobalAcmeDefaults: () => {},
|
||||
setAcmeStateManager: () => {},
|
||||
setUpdateRoutesCallback: () => {},
|
||||
getAcmeOptions: () => ({}),
|
||||
getState: () => ({ challengeRouteActive: false })
|
||||
};
|
||||
|
||||
// Call initialize immediately as the real createCertificateManager does
|
||||
await mockCertManager.initialize();
|
||||
|
||||
return mockCertManager;
|
||||
};
|
||||
|
||||
// Track port manager operations
|
||||
const originalAddPorts = proxy['portManager'].addPorts;
|
||||
proxy['portManager'].addPorts = async function(ports: number[]) {
|
||||
operationOrder.push('ports-starting');
|
||||
const result = await originalAddPorts.call(this, ports);
|
||||
operationOrder.push('ports-ready');
|
||||
portsListening = true;
|
||||
console.log('Ports are now listening');
|
||||
return result;
|
||||
};
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
|
||||
// Log the operation order for debugging
|
||||
console.log('Operation order:', operationOrder);
|
||||
|
||||
// Verify operations happened in the correct order
|
||||
expect(operationOrder).toContain('create-cert-manager');
|
||||
expect(operationOrder).toContain('cert-manager-init');
|
||||
expect(operationOrder).toContain('ports-starting');
|
||||
expect(operationOrder).toContain('ports-ready');
|
||||
expect(operationOrder).toContain('cert-provisioning');
|
||||
|
||||
// Verify ports were ready before certificate provisioning
|
||||
const portsReadyIndex = operationOrder.indexOf('ports-ready');
|
||||
const certProvisioningIndex = operationOrder.indexOf('cert-provisioning');
|
||||
|
||||
expect(portsReadyIndex).toBeLessThan(certProvisioningIndex);
|
||||
expect(certProvisioningStarted).toEqual(true);
|
||||
expect(portsListening).toEqual(true);
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.start();
|
159
test/test.acme-timing.ts
Normal file
159
test/test.acme-timing.ts
Normal file
@ -0,0 +1,159 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
import * as net from 'net';
|
||||
|
||||
// Test that certificate provisioning waits for ports to be ready
|
||||
tap.test('should defer certificate provisioning until after ports are listening', async (tapTest) => {
|
||||
// Track the order of operations
|
||||
const operationLog: string[] = [];
|
||||
|
||||
// Create a mock server to verify ports are listening
|
||||
let port80Listening = false;
|
||||
const testServer = net.createServer(() => {
|
||||
// We don't need to handle connections, just track that we're listening
|
||||
});
|
||||
|
||||
// Try to use port 8080 instead of 80 to avoid permission issues in testing
|
||||
const acmePort = 8080;
|
||||
|
||||
// Create proxy with ACME certificate requirement
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [acmePort],
|
||||
httpProxyPort: 8844,
|
||||
acme: {
|
||||
email: 'test@example.com',
|
||||
useProduction: false,
|
||||
port: acmePort
|
||||
},
|
||||
routes: [{
|
||||
name: 'test-acme-route',
|
||||
match: {
|
||||
ports: 8443,
|
||||
domains: ['test.local']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8181 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: {
|
||||
email: 'test@example.com',
|
||||
useProduction: false
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
// Mock some internal methods to track operation order
|
||||
const originalAddPorts = proxy['portManager'].addPorts;
|
||||
proxy['portManager'].addPorts = async function(ports: number[]) {
|
||||
operationLog.push('Starting port listeners');
|
||||
const result = await originalAddPorts.call(this, ports);
|
||||
operationLog.push('Port listeners started');
|
||||
port80Listening = true;
|
||||
return result;
|
||||
};
|
||||
|
||||
// Track certificate provisioning
|
||||
const originalProvisionAll = proxy['certManager'] ?
|
||||
proxy['certManager']['provisionAllCertificates'] : null;
|
||||
|
||||
if (proxy['certManager']) {
|
||||
proxy['certManager']['provisionAllCertificates'] = async function() {
|
||||
operationLog.push('Starting certificate provisioning');
|
||||
// Check if port 80 is listening
|
||||
if (!port80Listening) {
|
||||
operationLog.push('ERROR: Certificate provisioning started before ports ready');
|
||||
}
|
||||
// Don't actually provision certificates in the test
|
||||
operationLog.push('Certificate provisioning completed');
|
||||
};
|
||||
}
|
||||
|
||||
// Start the proxy
|
||||
await proxy.start();
|
||||
|
||||
// Verify the order of operations
|
||||
expect(operationLog).toContain('Starting port listeners');
|
||||
expect(operationLog).toContain('Port listeners started');
|
||||
expect(operationLog).toContain('Starting certificate provisioning');
|
||||
|
||||
// Ensure port listeners started before certificate provisioning
|
||||
const portStartIndex = operationLog.indexOf('Port listeners started');
|
||||
const certStartIndex = operationLog.indexOf('Starting certificate provisioning');
|
||||
|
||||
expect(portStartIndex).toBeLessThan(certStartIndex);
|
||||
expect(operationLog).not.toContain('ERROR: Certificate provisioning started before ports ready');
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
// Test that ACME challenge route is available when certificate is requested
|
||||
tap.test('should have ACME challenge route ready before certificate provisioning', async (tapTest) => {
|
||||
let challengeRouteActive = false;
|
||||
let certificateProvisioningStarted = false;
|
||||
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [8080],
|
||||
httpProxyPort: 8844,
|
||||
acme: {
|
||||
email: 'test@example.com',
|
||||
useProduction: false,
|
||||
port: 8080
|
||||
},
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: {
|
||||
ports: 8443,
|
||||
domains: ['test.example.com']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8181 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto'
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
// Mock the certificate manager to track operations
|
||||
const originalInitialize = proxy['certManager'] ?
|
||||
proxy['certManager'].initialize : null;
|
||||
|
||||
if (proxy['certManager']) {
|
||||
const certManager = proxy['certManager'];
|
||||
|
||||
// Track when challenge route is added
|
||||
const originalAddChallenge = certManager['addChallengeRoute'];
|
||||
certManager['addChallengeRoute'] = async function() {
|
||||
await originalAddChallenge.call(this);
|
||||
challengeRouteActive = true;
|
||||
};
|
||||
|
||||
// Track when certificate provisioning starts
|
||||
const originalProvisionAcme = certManager['provisionAcmeCertificate'];
|
||||
certManager['provisionAcmeCertificate'] = async function(...args: any[]) {
|
||||
certificateProvisioningStarted = true;
|
||||
// Verify challenge route is active
|
||||
expect(challengeRouteActive).toEqual(true);
|
||||
// Don't actually provision in test
|
||||
return;
|
||||
};
|
||||
}
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Give it a moment to complete initialization
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// Verify challenge route was added before any certificate provisioning
|
||||
expect(challengeRouteActive).toEqual(true);
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.start();
|
77
test/test.certificate-acme-update.ts
Normal file
77
test/test.certificate-acme-update.ts
Normal file
@ -0,0 +1,77 @@
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
import * as smartproxy from '../ts/index.js';
|
||||
|
||||
// This test verifies that SmartProxy correctly uses the updated SmartAcme v8.0.0 API
|
||||
// with the optional wildcard parameter
|
||||
|
||||
tap.test('SmartCertManager should call getCertificateForDomain with wildcard option', async () => {
|
||||
console.log('Testing SmartCertManager with SmartAcme v8.0.0 API...');
|
||||
|
||||
// Create a mock route with ACME certificate configuration
|
||||
const mockRoute: smartproxy.IRouteConfig = {
|
||||
match: {
|
||||
domains: ['test.example.com'],
|
||||
ports: 443
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: 'localhost',
|
||||
port: 8080
|
||||
},
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: {
|
||||
email: 'test@example.com',
|
||||
useProduction: false
|
||||
}
|
||||
}
|
||||
},
|
||||
name: 'test-route'
|
||||
};
|
||||
|
||||
// Create a certificate manager
|
||||
const certManager = new smartproxy.SmartCertManager(
|
||||
[mockRoute],
|
||||
'./test-certs',
|
||||
{
|
||||
email: 'test@example.com',
|
||||
useProduction: false
|
||||
}
|
||||
);
|
||||
|
||||
// Since we can't actually test ACME in a unit test, we'll just verify the logic
|
||||
// The actual test would be that it builds and runs without errors
|
||||
|
||||
// Test the wildcard logic for different domain types and challenge handlers
|
||||
const testCases = [
|
||||
{ domain: 'example.com', hasDnsChallenge: true, shouldIncludeWildcard: true },
|
||||
{ domain: 'example.com', hasDnsChallenge: false, shouldIncludeWildcard: false },
|
||||
{ domain: 'sub.example.com', hasDnsChallenge: true, shouldIncludeWildcard: true },
|
||||
{ domain: 'sub.example.com', hasDnsChallenge: false, shouldIncludeWildcard: false },
|
||||
{ domain: '*.example.com', hasDnsChallenge: true, shouldIncludeWildcard: false },
|
||||
{ domain: '*.example.com', hasDnsChallenge: false, shouldIncludeWildcard: false },
|
||||
{ domain: 'test', hasDnsChallenge: true, shouldIncludeWildcard: false }, // single label domain
|
||||
{ domain: 'test', hasDnsChallenge: false, shouldIncludeWildcard: false },
|
||||
{ domain: 'my.sub.example.com', hasDnsChallenge: true, shouldIncludeWildcard: true },
|
||||
{ domain: 'my.sub.example.com', hasDnsChallenge: false, shouldIncludeWildcard: false }
|
||||
];
|
||||
|
||||
for (const testCase of testCases) {
|
||||
const shouldIncludeWildcard = !testCase.domain.startsWith('*.') &&
|
||||
testCase.domain.includes('.') &&
|
||||
testCase.domain.split('.').length >= 2 &&
|
||||
testCase.hasDnsChallenge;
|
||||
|
||||
console.log(`Domain: ${testCase.domain}, DNS-01: ${testCase.hasDnsChallenge}, Should include wildcard: ${shouldIncludeWildcard}`);
|
||||
expect(shouldIncludeWildcard).toEqual(testCase.shouldIncludeWildcard);
|
||||
}
|
||||
|
||||
console.log('All wildcard logic tests passed!');
|
||||
});
|
||||
|
||||
tap.start({
|
||||
throwOnError: true
|
||||
});
|
@ -1,5 +1,5 @@
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
|
||||
const testProxy = new SmartProxy({
|
||||
routes: [{
|
||||
|
@ -1,5 +1,5 @@
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
|
||||
tap.test('should create SmartProxy with certificate routes', async () => {
|
||||
const proxy = new SmartProxy({
|
||||
|
294
test/test.connection-forwarding.ts
Normal file
294
test/test.connection-forwarding.ts
Normal file
@ -0,0 +1,294 @@
|
||||
import { expect, tap } from '@git.zone/tapbundle';
|
||||
import * as net from 'net';
|
||||
import * as tls from 'tls';
|
||||
import * as fs from 'fs';
|
||||
import * as path from 'path';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/smart-proxy.js';
|
||||
import type { IRouteConfig } from '../ts/proxies/smart-proxy/models/route-types.js';
|
||||
|
||||
// Setup test infrastructure
|
||||
const testCertPath = path.join(process.cwd(), 'test', 'helpers', 'test-cert.pem');
|
||||
const testKeyPath = path.join(process.cwd(), 'test', 'helpers', 'test-key.pem');
|
||||
|
||||
let testServer: net.Server;
|
||||
let tlsTestServer: tls.Server;
|
||||
let smartProxy: SmartProxy;
|
||||
|
||||
tap.test('setup test servers', async () => {
|
||||
// Create TCP test server
|
||||
testServer = net.createServer((socket) => {
|
||||
socket.write('Connected to TCP test server\n');
|
||||
socket.on('data', (data) => {
|
||||
socket.write(`TCP Echo: ${data}`);
|
||||
});
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
testServer.listen(7001, '127.0.0.1', () => {
|
||||
console.log('TCP test server listening on port 7001');
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Create TLS test server for SNI testing
|
||||
tlsTestServer = tls.createServer(
|
||||
{
|
||||
cert: fs.readFileSync(testCertPath),
|
||||
key: fs.readFileSync(testKeyPath),
|
||||
},
|
||||
(socket) => {
|
||||
socket.write('Connected to TLS test server\n');
|
||||
socket.on('data', (data) => {
|
||||
socket.write(`TLS Echo: ${data}`);
|
||||
});
|
||||
}
|
||||
);
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
tlsTestServer.listen(7002, '127.0.0.1', () => {
|
||||
console.log('TLS test server listening on port 7002');
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
tap.test('should forward TCP connections correctly', async () => {
|
||||
// Create SmartProxy with forward route
|
||||
smartProxy = new SmartProxy({
|
||||
enableDetailedLogging: true,
|
||||
routes: [
|
||||
{
|
||||
id: 'tcp-forward',
|
||||
name: 'TCP Forward Route',
|
||||
match: {
|
||||
port: 8080,
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: '127.0.0.1',
|
||||
port: 7001,
|
||||
},
|
||||
},
|
||||
},
|
||||
],
|
||||
});
|
||||
|
||||
await smartProxy.start();
|
||||
|
||||
// Test TCP forwarding
|
||||
const client = await new Promise<net.Socket>((resolve, reject) => {
|
||||
const socket = net.connect(8080, '127.0.0.1', () => {
|
||||
console.log('Connected to proxy');
|
||||
resolve(socket);
|
||||
});
|
||||
socket.on('error', reject);
|
||||
});
|
||||
|
||||
// Test data transmission
|
||||
await new Promise<void>((resolve) => {
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
console.log('Received:', response);
|
||||
expect(response).toContain('Connected to TCP test server');
|
||||
client.end();
|
||||
resolve();
|
||||
});
|
||||
|
||||
client.write('Hello from client');
|
||||
});
|
||||
|
||||
await smartProxy.stop();
|
||||
});
|
||||
|
||||
tap.test('should handle TLS passthrough correctly', async () => {
|
||||
// Create SmartProxy with TLS passthrough route
|
||||
smartProxy = new SmartProxy({
|
||||
enableDetailedLogging: true,
|
||||
routes: [
|
||||
{
|
||||
id: 'tls-passthrough',
|
||||
name: 'TLS Passthrough Route',
|
||||
match: {
|
||||
port: 8443,
|
||||
domain: 'test.example.com',
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
tls: {
|
||||
mode: 'passthrough',
|
||||
},
|
||||
target: {
|
||||
host: '127.0.0.1',
|
||||
port: 7002,
|
||||
},
|
||||
},
|
||||
},
|
||||
],
|
||||
});
|
||||
|
||||
await smartProxy.start();
|
||||
|
||||
// Test TLS passthrough
|
||||
const client = await new Promise<tls.TLSSocket>((resolve, reject) => {
|
||||
const socket = tls.connect(
|
||||
{
|
||||
port: 8443,
|
||||
host: '127.0.0.1',
|
||||
servername: 'test.example.com',
|
||||
rejectUnauthorized: false,
|
||||
},
|
||||
() => {
|
||||
console.log('Connected via TLS');
|
||||
resolve(socket);
|
||||
}
|
||||
);
|
||||
socket.on('error', reject);
|
||||
});
|
||||
|
||||
// Test data transmission over TLS
|
||||
await new Promise<void>((resolve) => {
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
console.log('TLS Received:', response);
|
||||
expect(response).toContain('Connected to TLS test server');
|
||||
client.end();
|
||||
resolve();
|
||||
});
|
||||
|
||||
client.write('Hello from TLS client');
|
||||
});
|
||||
|
||||
await smartProxy.stop();
|
||||
});
|
||||
|
||||
tap.test('should handle SNI-based forwarding', async () => {
|
||||
// Create SmartProxy with multiple domain routes
|
||||
smartProxy = new SmartProxy({
|
||||
enableDetailedLogging: true,
|
||||
routes: [
|
||||
{
|
||||
id: 'domain-a',
|
||||
name: 'Domain A Route',
|
||||
match: {
|
||||
port: 8443,
|
||||
domain: 'a.example.com',
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
tls: {
|
||||
mode: 'passthrough',
|
||||
},
|
||||
target: {
|
||||
host: '127.0.0.1',
|
||||
port: 7002,
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
id: 'domain-b',
|
||||
name: 'Domain B Route',
|
||||
match: {
|
||||
port: 8443,
|
||||
domain: 'b.example.com',
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: '127.0.0.1',
|
||||
port: 7001,
|
||||
},
|
||||
},
|
||||
},
|
||||
],
|
||||
});
|
||||
|
||||
await smartProxy.start();
|
||||
|
||||
// Test domain A (TLS passthrough)
|
||||
const clientA = await new Promise<tls.TLSSocket>((resolve, reject) => {
|
||||
const socket = tls.connect(
|
||||
{
|
||||
port: 8443,
|
||||
host: '127.0.0.1',
|
||||
servername: 'a.example.com',
|
||||
rejectUnauthorized: false,
|
||||
},
|
||||
() => {
|
||||
console.log('Connected to domain A');
|
||||
resolve(socket);
|
||||
}
|
||||
);
|
||||
socket.on('error', reject);
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
clientA.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
console.log('Domain A response:', response);
|
||||
expect(response).toContain('Connected to TLS test server');
|
||||
clientA.end();
|
||||
resolve();
|
||||
});
|
||||
|
||||
clientA.write('Hello from domain A');
|
||||
});
|
||||
|
||||
// Test domain B (non-TLS forward)
|
||||
const clientB = await new Promise<net.Socket>((resolve, reject) => {
|
||||
const socket = net.connect(8443, '127.0.0.1', () => {
|
||||
// Send TLS ClientHello with SNI for b.example.com
|
||||
const clientHello = Buffer.from([
|
||||
0x16, 0x03, 0x01, 0x00, 0x4e, // TLS Record header
|
||||
0x01, 0x00, 0x00, 0x4a, // Handshake header
|
||||
0x03, 0x03, // TLS version
|
||||
// Random bytes
|
||||
...Array(32).fill(0),
|
||||
0x00, // Session ID length
|
||||
0x00, 0x02, // Cipher suites length
|
||||
0x00, 0x35, // Cipher suite
|
||||
0x01, 0x00, // Compression methods
|
||||
0x00, 0x1f, // Extensions length
|
||||
0x00, 0x00, // SNI extension
|
||||
0x00, 0x1b, // Extension length
|
||||
0x00, 0x19, // SNI list length
|
||||
0x00, // SNI type (hostname)
|
||||
0x00, 0x16, // SNI length
|
||||
// "b.example.com" in ASCII
|
||||
0x62, 0x2e, 0x65, 0x78, 0x61, 0x6d, 0x70, 0x6c, 0x65, 0x2e, 0x63, 0x6f, 0x6d,
|
||||
]);
|
||||
|
||||
socket.write(clientHello);
|
||||
|
||||
setTimeout(() => {
|
||||
resolve(socket);
|
||||
}, 100);
|
||||
});
|
||||
socket.on('error', reject);
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
clientB.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
console.log('Domain B response:', response);
|
||||
// Should be forwarded to TCP server
|
||||
expect(response).toContain('Connected to TCP test server');
|
||||
clientB.end();
|
||||
resolve();
|
||||
});
|
||||
|
||||
// Send regular data after initial handshake
|
||||
setTimeout(() => {
|
||||
clientB.write('Hello from domain B');
|
||||
}, 200);
|
||||
});
|
||||
|
||||
await smartProxy.stop();
|
||||
});
|
||||
|
||||
tap.test('cleanup', async () => {
|
||||
testServer.close();
|
||||
tlsTestServer.close();
|
||||
});
|
||||
|
||||
export default tap.start();
|
81
test/test.fix-verification.ts
Normal file
81
test/test.fix-verification.ts
Normal file
@ -0,0 +1,81 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
|
||||
tap.test('should verify certificate manager callback is preserved on updateRoutes', async () => {
|
||||
// Create proxy with initial cert routes
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'cert-route',
|
||||
match: { ports: [18443], domains: ['test.local'] },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 3000 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: { email: 'test@local.test' }
|
||||
}
|
||||
}
|
||||
}],
|
||||
acme: { email: 'test@local.test', port: 18080 }
|
||||
});
|
||||
|
||||
// Track callback preservation
|
||||
let initialCallbackSet = false;
|
||||
let updateCallbackSet = false;
|
||||
|
||||
// Mock certificate manager creation
|
||||
(proxy as any).createCertificateManager = async function(...args: any[]) {
|
||||
const certManager = {
|
||||
updateRoutesCallback: null as any,
|
||||
setUpdateRoutesCallback: function(callback: any) {
|
||||
this.updateRoutesCallback = callback;
|
||||
if (!initialCallbackSet) {
|
||||
initialCallbackSet = true;
|
||||
} else {
|
||||
updateCallbackSet = true;
|
||||
}
|
||||
},
|
||||
setHttpProxy: () => {},
|
||||
setGlobalAcmeDefaults: () => {},
|
||||
setAcmeStateManager: () => {},
|
||||
initialize: async () => {},
|
||||
stop: async () => {},
|
||||
getAcmeOptions: () => ({ email: 'test@local.test' }),
|
||||
getState: () => ({ challengeRouteActive: false })
|
||||
};
|
||||
|
||||
// Set callback as in real implementation
|
||||
certManager.setUpdateRoutesCallback(async (routes) => {
|
||||
await this.updateRoutes(routes);
|
||||
});
|
||||
|
||||
return certManager;
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
expect(initialCallbackSet).toEqual(true);
|
||||
|
||||
// Update routes - this should preserve the callback
|
||||
await proxy.updateRoutes([{
|
||||
name: 'updated-route',
|
||||
match: { ports: [18444], domains: ['test2.local'] },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 3001 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: { email: 'test@local.test' }
|
||||
}
|
||||
}
|
||||
}]);
|
||||
|
||||
expect(updateCallbackSet).toEqual(true);
|
||||
|
||||
await proxy.stop();
|
||||
|
||||
console.log('Fix verified: Certificate manager callback is preserved on updateRoutes');
|
||||
});
|
||||
|
||||
tap.start();
|
131
test/test.forwarding-fix-verification.ts
Normal file
131
test/test.forwarding-fix-verification.ts
Normal file
@ -0,0 +1,131 @@
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as net from 'net';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/smart-proxy.js';
|
||||
|
||||
let testServer: net.Server;
|
||||
let smartProxy: SmartProxy;
|
||||
|
||||
tap.test('setup test server', async () => {
|
||||
// Create a test server that handles connections
|
||||
testServer = await new Promise<net.Server>((resolve) => {
|
||||
const server = net.createServer((socket) => {
|
||||
console.log('Test server: Client connected');
|
||||
socket.write('Welcome from test server\n');
|
||||
|
||||
socket.on('data', (data) => {
|
||||
console.log(`Test server received: ${data.toString().trim()}`);
|
||||
socket.write(`Echo: ${data}`);
|
||||
});
|
||||
|
||||
socket.on('close', () => {
|
||||
console.log('Test server: Client disconnected');
|
||||
});
|
||||
});
|
||||
|
||||
server.listen(6789, () => {
|
||||
console.log('Test server listening on port 6789');
|
||||
resolve(server);
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
tap.test('regular forward route should work correctly', async () => {
|
||||
smartProxy = new SmartProxy({
|
||||
routes: [{
|
||||
id: 'test-forward',
|
||||
name: 'Test Forward Route',
|
||||
match: { ports: 7890 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 6789 }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await smartProxy.start();
|
||||
|
||||
// Create a client connection
|
||||
const client = await new Promise<net.Socket>((resolve, reject) => {
|
||||
const socket = net.connect(7890, 'localhost', () => {
|
||||
console.log('Client connected to proxy');
|
||||
resolve(socket);
|
||||
});
|
||||
socket.on('error', reject);
|
||||
});
|
||||
|
||||
// Test data exchange
|
||||
const response = await new Promise<string>((resolve) => {
|
||||
client.on('data', (data) => {
|
||||
resolve(data.toString());
|
||||
});
|
||||
});
|
||||
|
||||
expect(response).toContain('Welcome from test server');
|
||||
|
||||
// Send data through proxy
|
||||
client.write('Test message');
|
||||
|
||||
const echo = await new Promise<string>((resolve) => {
|
||||
client.once('data', (data) => {
|
||||
resolve(data.toString());
|
||||
});
|
||||
});
|
||||
|
||||
expect(echo).toContain('Echo: Test message');
|
||||
|
||||
client.end();
|
||||
await smartProxy.stop();
|
||||
});
|
||||
|
||||
tap.test('NFTables forward route should not terminate connections', async () => {
|
||||
smartProxy = new SmartProxy({
|
||||
routes: [{
|
||||
id: 'nftables-test',
|
||||
name: 'NFTables Test Route',
|
||||
match: { ports: 7891 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
forwardingEngine: 'nftables',
|
||||
target: { host: 'localhost', port: 6789 }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await smartProxy.start();
|
||||
|
||||
// Create a client connection
|
||||
const client = await new Promise<net.Socket>((resolve, reject) => {
|
||||
const socket = net.connect(7891, 'localhost', () => {
|
||||
console.log('Client connected to NFTables proxy');
|
||||
resolve(socket);
|
||||
});
|
||||
socket.on('error', reject);
|
||||
});
|
||||
|
||||
// With NFTables, the connection should stay open at the application level
|
||||
// even though forwarding happens at kernel level
|
||||
let connectionClosed = false;
|
||||
client.on('close', () => {
|
||||
connectionClosed = true;
|
||||
});
|
||||
|
||||
// Wait a bit to ensure connection isn't immediately closed
|
||||
await new Promise(resolve => setTimeout(resolve, 1000));
|
||||
|
||||
expect(connectionClosed).toBe(false);
|
||||
console.log('NFTables connection stayed open as expected');
|
||||
|
||||
client.end();
|
||||
await smartProxy.stop();
|
||||
});
|
||||
|
||||
tap.test('cleanup', async () => {
|
||||
if (testServer) {
|
||||
testServer.close();
|
||||
}
|
||||
if (smartProxy) {
|
||||
await smartProxy.stop();
|
||||
}
|
||||
});
|
||||
|
||||
export default tap.start();
|
105
test/test.forwarding-regression.ts
Normal file
105
test/test.forwarding-regression.ts
Normal file
@ -0,0 +1,105 @@
|
||||
import { expect, tap } from '@git.zone/tapbundle';
|
||||
import * as net from 'net';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/smart-proxy.js';
|
||||
|
||||
// Test to verify port forwarding works correctly
|
||||
tap.test('forward connections should not be immediately closed', async (t) => {
|
||||
// Create a backend server that accepts connections
|
||||
const testServer = net.createServer((socket) => {
|
||||
console.log('Client connected to test server');
|
||||
socket.write('Welcome from test server\n');
|
||||
|
||||
socket.on('data', (data) => {
|
||||
console.log('Test server received:', data.toString());
|
||||
socket.write(`Echo: ${data}`);
|
||||
});
|
||||
|
||||
socket.on('error', (err) => {
|
||||
console.error('Test server socket error:', err);
|
||||
});
|
||||
});
|
||||
|
||||
// Listen on a non-privileged port
|
||||
await new Promise<void>((resolve) => {
|
||||
testServer.listen(9090, '127.0.0.1', () => {
|
||||
console.log('Test server listening on port 9090');
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Create SmartProxy with a forward route
|
||||
const smartProxy = new SmartProxy({
|
||||
enableDetailedLogging: true,
|
||||
routes: [
|
||||
{
|
||||
id: 'forward-test',
|
||||
name: 'Forward Test Route',
|
||||
match: {
|
||||
port: 8080,
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: '127.0.0.1',
|
||||
port: 9090,
|
||||
},
|
||||
},
|
||||
},
|
||||
],
|
||||
});
|
||||
|
||||
await smartProxy.start();
|
||||
|
||||
// Create a client connection through the proxy
|
||||
const client = net.createConnection({
|
||||
port: 8080,
|
||||
host: '127.0.0.1',
|
||||
});
|
||||
|
||||
let connectionClosed = false;
|
||||
let dataReceived = false;
|
||||
let welcomeMessage = '';
|
||||
|
||||
client.on('connect', () => {
|
||||
console.log('Client connected to proxy');
|
||||
});
|
||||
|
||||
client.on('data', (data) => {
|
||||
console.log('Client received:', data.toString());
|
||||
dataReceived = true;
|
||||
welcomeMessage = data.toString();
|
||||
});
|
||||
|
||||
client.on('close', () => {
|
||||
console.log('Client connection closed');
|
||||
connectionClosed = true;
|
||||
});
|
||||
|
||||
client.on('error', (err) => {
|
||||
console.error('Client error:', err);
|
||||
});
|
||||
|
||||
// Wait for the welcome message
|
||||
await t.waitForExpect(() => {
|
||||
return dataReceived;
|
||||
}, 'Data should be received from the server', 2000);
|
||||
|
||||
// Verify we got the welcome message
|
||||
expect(welcomeMessage).toContain('Welcome from test server');
|
||||
|
||||
// Send some data
|
||||
client.write('Hello from client');
|
||||
|
||||
// Wait a bit to make sure connection isn't immediately closed
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// Connection should still be open
|
||||
expect(connectionClosed).toBe(false);
|
||||
|
||||
// Clean up
|
||||
client.end();
|
||||
await smartProxy.stop();
|
||||
testServer.close();
|
||||
});
|
||||
|
||||
export default tap.start();
|
@ -1,5 +1,5 @@
|
||||
import * as path from 'path';
|
||||
import { tap, expect } from '@push.rocks/tapbundle';
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import {
|
||||
@ -175,7 +175,7 @@ tap.test('Route-based configuration examples', async (tools) => {
|
||||
|
||||
// Just verify that all routes are configured correctly
|
||||
console.log(`Created ${allRoutes.length} example routes`);
|
||||
expect(allRoutes.length).toEqual(8);
|
||||
expect(allRoutes.length).toEqual(10);
|
||||
});
|
||||
|
||||
export default tap.start();
|
@ -1,4 +1,4 @@
|
||||
import { tap, expect } from '@push.rocks/tapbundle';
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
import type { IForwardConfig, TForwardingType } from '../ts/forwarding/config/forwarding-types.js';
|
||||
|
||||
@ -72,8 +72,8 @@ tap.test('Route Helpers - Create complete HTTPS server with redirect', async ()
|
||||
|
||||
expect(routes.length).toEqual(2);
|
||||
|
||||
// Check HTTP to HTTPS redirect
|
||||
const redirectRoute = findRouteForDomain(routes, 'full.example.com');
|
||||
// Check HTTP to HTTPS redirect - find route by action type
|
||||
const redirectRoute = routes.find(r => r.action.type === 'redirect');
|
||||
expect(redirectRoute.action.type).toEqual('redirect');
|
||||
expect(redirectRoute.match.ports).toEqual(80);
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { tap, expect } from '@push.rocks/tapbundle';
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
|
||||
// First, import the components directly to avoid issues with compiled modules
|
||||
|
183
test/test.http-fix-unit.ts
Normal file
183
test/test.http-fix-unit.ts
Normal file
@ -0,0 +1,183 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import * as net from 'net';
|
||||
|
||||
// Unit test for the HTTP forwarding fix
|
||||
tap.test('should forward non-TLS connections on HttpProxy ports', async (tapTest) => {
|
||||
// Test configuration
|
||||
const testPort = 8080;
|
||||
const httpProxyPort = 8844;
|
||||
|
||||
// Track forwarding logic
|
||||
let forwardedToHttpProxy = false;
|
||||
let setupDirectConnection = false;
|
||||
|
||||
// Create mock settings
|
||||
const mockSettings = {
|
||||
useHttpProxy: [testPort],
|
||||
httpProxyPort: httpProxyPort,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: { ports: testPort },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8181 }
|
||||
}
|
||||
}]
|
||||
};
|
||||
|
||||
// Create mock connection record
|
||||
const mockRecord = {
|
||||
id: 'test-connection',
|
||||
localPort: testPort,
|
||||
remoteIP: '127.0.0.1',
|
||||
isTLS: false
|
||||
};
|
||||
|
||||
// Mock HttpProxyBridge
|
||||
const mockHttpProxyBridge = {
|
||||
getHttpProxy: () => ({ available: true }),
|
||||
forwardToHttpProxy: async () => {
|
||||
forwardedToHttpProxy = true;
|
||||
}
|
||||
};
|
||||
|
||||
// Test the logic from handleForwardAction
|
||||
const route = mockSettings.routes[0];
|
||||
const action = route.action;
|
||||
|
||||
// Simulate the fixed logic
|
||||
if (!action.tls) {
|
||||
// No TLS settings - check if this port should use HttpProxy
|
||||
const isHttpProxyPort = mockSettings.useHttpProxy?.includes(mockRecord.localPort);
|
||||
|
||||
if (isHttpProxyPort && mockHttpProxyBridge.getHttpProxy()) {
|
||||
// Forward non-TLS connections to HttpProxy if configured
|
||||
console.log(`Using HttpProxy for non-TLS connection on port ${mockRecord.localPort}`);
|
||||
await mockHttpProxyBridge.forwardToHttpProxy();
|
||||
} else {
|
||||
// Basic forwarding
|
||||
console.log(`Using basic forwarding`);
|
||||
setupDirectConnection = true;
|
||||
}
|
||||
}
|
||||
|
||||
// Verify the fix works correctly
|
||||
expect(forwardedToHttpProxy).toEqual(true);
|
||||
expect(setupDirectConnection).toEqual(false);
|
||||
|
||||
console.log('Test passed: Non-TLS connections on HttpProxy ports are forwarded correctly');
|
||||
});
|
||||
|
||||
// Test that non-HttpProxy ports still use direct connection
|
||||
tap.test('should use direct connection for non-HttpProxy ports', async (tapTest) => {
|
||||
let forwardedToHttpProxy = false;
|
||||
let setupDirectConnection = false;
|
||||
|
||||
const mockSettings = {
|
||||
useHttpProxy: [80, 443], // Different ports
|
||||
httpProxyPort: 8844,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: { ports: 8080 }, // Not in useHttpProxy
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8181 }
|
||||
}
|
||||
}]
|
||||
};
|
||||
|
||||
const mockRecord = {
|
||||
id: 'test-connection-2',
|
||||
localPort: 8080, // Not in useHttpProxy
|
||||
remoteIP: '127.0.0.1',
|
||||
isTLS: false
|
||||
};
|
||||
|
||||
const mockHttpProxyBridge = {
|
||||
getHttpProxy: () => ({ available: true }),
|
||||
forwardToHttpProxy: async () => {
|
||||
forwardedToHttpProxy = true;
|
||||
}
|
||||
};
|
||||
|
||||
const route = mockSettings.routes[0];
|
||||
const action = route.action;
|
||||
|
||||
// Test the logic
|
||||
if (!action.tls) {
|
||||
const isHttpProxyPort = mockSettings.useHttpProxy?.includes(mockRecord.localPort);
|
||||
|
||||
if (isHttpProxyPort && mockHttpProxyBridge.getHttpProxy()) {
|
||||
console.log(`Using HttpProxy for non-TLS connection on port ${mockRecord.localPort}`);
|
||||
await mockHttpProxyBridge.forwardToHttpProxy();
|
||||
} else {
|
||||
console.log(`Using basic forwarding for port ${mockRecord.localPort}`);
|
||||
setupDirectConnection = true;
|
||||
}
|
||||
}
|
||||
|
||||
// Verify port 8080 uses direct connection when not in useHttpProxy
|
||||
expect(forwardedToHttpProxy).toEqual(false);
|
||||
expect(setupDirectConnection).toEqual(true);
|
||||
|
||||
console.log('Test passed: Non-HttpProxy ports use direct connection');
|
||||
});
|
||||
|
||||
// Test HTTP-01 ACME challenge scenario
|
||||
tap.test('should handle ACME HTTP-01 challenges on port 80 with HttpProxy', async (tapTest) => {
|
||||
let forwardedToHttpProxy = false;
|
||||
|
||||
const mockSettings = {
|
||||
useHttpProxy: [80], // Port 80 configured for HttpProxy
|
||||
httpProxyPort: 8844,
|
||||
acme: {
|
||||
port: 80,
|
||||
email: 'test@example.com'
|
||||
},
|
||||
routes: [{
|
||||
name: 'acme-challenge',
|
||||
match: {
|
||||
ports: 80,
|
||||
paths: ['/.well-known/acme-challenge/*']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8080 }
|
||||
}
|
||||
}]
|
||||
};
|
||||
|
||||
const mockRecord = {
|
||||
id: 'acme-connection',
|
||||
localPort: 80,
|
||||
remoteIP: '127.0.0.1',
|
||||
isTLS: false
|
||||
};
|
||||
|
||||
const mockHttpProxyBridge = {
|
||||
getHttpProxy: () => ({ available: true }),
|
||||
forwardToHttpProxy: async () => {
|
||||
forwardedToHttpProxy = true;
|
||||
}
|
||||
};
|
||||
|
||||
const route = mockSettings.routes[0];
|
||||
const action = route.action;
|
||||
|
||||
// Test the fix for ACME HTTP-01 challenges
|
||||
if (!action.tls) {
|
||||
const isHttpProxyPort = mockSettings.useHttpProxy?.includes(mockRecord.localPort);
|
||||
|
||||
if (isHttpProxyPort && mockHttpProxyBridge.getHttpProxy()) {
|
||||
console.log(`Using HttpProxy for ACME challenge on port ${mockRecord.localPort}`);
|
||||
await mockHttpProxyBridge.forwardToHttpProxy();
|
||||
}
|
||||
}
|
||||
|
||||
// Verify HTTP-01 challenges on port 80 go through HttpProxy
|
||||
expect(forwardedToHttpProxy).toEqual(true);
|
||||
|
||||
console.log('Test passed: ACME HTTP-01 challenges on port 80 use HttpProxy');
|
||||
});
|
||||
|
||||
tap.start();
|
168
test/test.http-fix-verification.ts
Normal file
168
test/test.http-fix-verification.ts
Normal file
@ -0,0 +1,168 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { RouteConnectionHandler } from '../ts/proxies/smart-proxy/route-connection-handler.js';
|
||||
import { ISmartProxyOptions } from '../ts/proxies/smart-proxy/models/interfaces.js';
|
||||
import * as net from 'net';
|
||||
|
||||
// Direct test of the fix in RouteConnectionHandler
|
||||
tap.test('should detect and forward non-TLS connections on useHttpProxy ports', async (tapTest) => {
|
||||
// Create mock objects
|
||||
const mockSettings: ISmartProxyOptions = {
|
||||
useHttpProxy: [8080],
|
||||
httpProxyPort: 8844,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: { ports: 8080 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8181 }
|
||||
}
|
||||
}]
|
||||
};
|
||||
|
||||
let httpProxyForwardCalled = false;
|
||||
let directConnectionCalled = false;
|
||||
|
||||
// Create mocks for dependencies
|
||||
const mockHttpProxyBridge = {
|
||||
getHttpProxy: () => ({ available: true }),
|
||||
forwardToHttpProxy: async (...args: any[]) => {
|
||||
console.log('Mock: forwardToHttpProxy called');
|
||||
httpProxyForwardCalled = true;
|
||||
}
|
||||
};
|
||||
|
||||
// Mock connection manager
|
||||
const mockConnectionManager = {
|
||||
createConnection: (socket: any) => ({
|
||||
id: 'test-connection',
|
||||
localPort: 8080,
|
||||
remoteIP: '127.0.0.1',
|
||||
isTLS: false
|
||||
}),
|
||||
initiateCleanupOnce: () => {},
|
||||
cleanupConnection: () => {}
|
||||
};
|
||||
|
||||
// Mock route manager that returns a matching route
|
||||
const mockRouteManager = {
|
||||
findMatchingRoute: (criteria: any) => ({
|
||||
route: mockSettings.routes[0]
|
||||
})
|
||||
};
|
||||
|
||||
// Create route connection handler instance
|
||||
const handler = new RouteConnectionHandler(
|
||||
mockSettings,
|
||||
mockConnectionManager as any,
|
||||
{} as any, // security manager
|
||||
{} as any, // tls manager
|
||||
mockHttpProxyBridge as any,
|
||||
{} as any, // timeout manager
|
||||
mockRouteManager as any
|
||||
);
|
||||
|
||||
// Override setupDirectConnection to track if it's called
|
||||
handler['setupDirectConnection'] = (...args: any[]) => {
|
||||
console.log('Mock: setupDirectConnection called');
|
||||
directConnectionCalled = true;
|
||||
};
|
||||
|
||||
// Test: Create a mock socket representing non-TLS connection on port 8080
|
||||
const mockSocket = new net.Socket();
|
||||
mockSocket.localPort = 8080;
|
||||
mockSocket.remoteAddress = '127.0.0.1';
|
||||
|
||||
// Simulate the handler processing the connection
|
||||
handler.handleConnection(mockSocket);
|
||||
|
||||
// Simulate receiving non-TLS data
|
||||
mockSocket.emit('data', Buffer.from('GET / HTTP/1.1\r\nHost: test.local\r\n\r\n'));
|
||||
|
||||
// Give it a moment to process
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// Verify that the connection was forwarded to HttpProxy, not direct connection
|
||||
expect(httpProxyForwardCalled).toEqual(true);
|
||||
expect(directConnectionCalled).toEqual(false);
|
||||
|
||||
mockSocket.destroy();
|
||||
});
|
||||
|
||||
// Test that verifies TLS connections still work normally
|
||||
tap.test('should handle TLS connections normally', async (tapTest) => {
|
||||
const mockSettings: ISmartProxyOptions = {
|
||||
useHttpProxy: [443],
|
||||
httpProxyPort: 8844,
|
||||
routes: [{
|
||||
name: 'tls-route',
|
||||
match: { ports: 443 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8443 },
|
||||
tls: { mode: 'terminate' }
|
||||
}
|
||||
}]
|
||||
};
|
||||
|
||||
let httpProxyForwardCalled = false;
|
||||
|
||||
const mockHttpProxyBridge = {
|
||||
getHttpProxy: () => ({ available: true }),
|
||||
forwardToHttpProxy: async (...args: any[]) => {
|
||||
httpProxyForwardCalled = true;
|
||||
}
|
||||
};
|
||||
|
||||
const mockConnectionManager = {
|
||||
createConnection: (socket: any) => ({
|
||||
id: 'test-tls-connection',
|
||||
localPort: 443,
|
||||
remoteIP: '127.0.0.1',
|
||||
isTLS: true,
|
||||
tlsHandshakeComplete: false
|
||||
}),
|
||||
initiateCleanupOnce: () => {},
|
||||
cleanupConnection: () => {}
|
||||
};
|
||||
|
||||
const mockTlsManager = {
|
||||
isTlsHandshake: (chunk: Buffer) => true,
|
||||
isClientHello: (chunk: Buffer) => true,
|
||||
extractSNI: (chunk: Buffer) => 'test.local'
|
||||
};
|
||||
|
||||
const mockRouteManager = {
|
||||
findMatchingRoute: (criteria: any) => ({
|
||||
route: mockSettings.routes[0]
|
||||
})
|
||||
};
|
||||
|
||||
const handler = new RouteConnectionHandler(
|
||||
mockSettings,
|
||||
mockConnectionManager as any,
|
||||
{} as any,
|
||||
mockTlsManager as any,
|
||||
mockHttpProxyBridge as any,
|
||||
{} as any,
|
||||
mockRouteManager as any
|
||||
);
|
||||
|
||||
const mockSocket = new net.Socket();
|
||||
mockSocket.localPort = 443;
|
||||
mockSocket.remoteAddress = '127.0.0.1';
|
||||
|
||||
handler.handleConnection(mockSocket);
|
||||
|
||||
// Simulate TLS handshake
|
||||
const tlsHandshake = Buffer.from([0x16, 0x03, 0x01, 0x00, 0x05]);
|
||||
mockSocket.emit('data', tlsHandshake);
|
||||
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// TLS connections with 'terminate' mode should go to HttpProxy
|
||||
expect(httpProxyForwardCalled).toEqual(true);
|
||||
|
||||
mockSocket.destroy();
|
||||
});
|
||||
|
||||
tap.start();
|
150
test/test.http-forwarding-fix.ts
Normal file
150
test/test.http-forwarding-fix.ts
Normal file
@ -0,0 +1,150 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
import * as net from 'net';
|
||||
|
||||
// Test that verifies HTTP connections on ports configured in useHttpProxy are properly forwarded
|
||||
tap.test('should detect and forward non-TLS connections on HttpProxy ports', async (tapTest) => {
|
||||
// Track whether the connection was forwarded to HttpProxy
|
||||
let forwardedToHttpProxy = false;
|
||||
let connectionPath = '';
|
||||
|
||||
// Mock the HttpProxy forwarding
|
||||
const originalForward = SmartProxy.prototype['httpProxyBridge'].prototype.forwardToHttpProxy;
|
||||
SmartProxy.prototype['httpProxyBridge'].prototype.forwardToHttpProxy = function(...args: any[]) {
|
||||
forwardedToHttpProxy = true;
|
||||
connectionPath = 'httpproxy';
|
||||
console.log('Mock: Connection forwarded to HttpProxy');
|
||||
// Just close the connection for the test
|
||||
args[1].end(); // socket.end()
|
||||
};
|
||||
|
||||
// Create a SmartProxy with useHttpProxy configured
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [8080],
|
||||
httpProxyPort: 8844,
|
||||
enableDetailedLogging: true,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: {
|
||||
ports: 8080
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8181 }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
// Override the HttpProxy initialization to avoid actual HttpProxy setup
|
||||
proxy['httpProxyBridge'].getHttpProxy = () => ({} as any);
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Make a connection to port 8080
|
||||
const client = new net.Socket();
|
||||
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
client.connect(8080, 'localhost', () => {
|
||||
console.log('Client connected to proxy on port 8080');
|
||||
// Send a non-TLS HTTP request
|
||||
client.write('GET / HTTP/1.1\r\nHost: test.local\r\n\r\n');
|
||||
resolve();
|
||||
});
|
||||
|
||||
client.on('error', reject);
|
||||
});
|
||||
|
||||
// Give it a moment to process
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// Verify the connection was forwarded to HttpProxy
|
||||
expect(forwardedToHttpProxy).toEqual(true);
|
||||
expect(connectionPath).toEqual('httpproxy');
|
||||
|
||||
client.destroy();
|
||||
await proxy.stop();
|
||||
|
||||
// Restore original method
|
||||
SmartProxy.prototype['httpProxyBridge'].prototype.forwardToHttpProxy = originalForward;
|
||||
});
|
||||
|
||||
// Test that verifies the fix detects non-TLS connections
|
||||
tap.test('should properly detect non-TLS connections on HttpProxy ports', async (tapTest) => {
|
||||
const targetPort = 8182;
|
||||
let receivedConnection = false;
|
||||
|
||||
// Create a target server that never receives the connection (because it goes to HttpProxy)
|
||||
const targetServer = net.createServer((socket) => {
|
||||
receivedConnection = true;
|
||||
socket.end();
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.listen(targetPort, () => {
|
||||
console.log(`Target server listening on port ${targetPort}`);
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Mock HttpProxyBridge to track forwarding
|
||||
let httpProxyForwardCalled = false;
|
||||
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [8080],
|
||||
httpProxyPort: 8844,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: {
|
||||
ports: 8080
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: targetPort }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
// Override the forwardToHttpProxy method to track calls
|
||||
const originalForward = proxy['httpProxyBridge'].forwardToHttpProxy;
|
||||
proxy['httpProxyBridge'].forwardToHttpProxy = async function(...args: any[]) {
|
||||
httpProxyForwardCalled = true;
|
||||
console.log('HttpProxy forward called with connectionId:', args[0]);
|
||||
// Just end the connection
|
||||
args[1].end();
|
||||
};
|
||||
|
||||
// Mock getHttpProxy to return a truthy value
|
||||
proxy['httpProxyBridge'].getHttpProxy = () => ({} as any);
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Make a non-TLS connection
|
||||
const client = new net.Socket();
|
||||
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
client.connect(8080, 'localhost', () => {
|
||||
console.log('Connected to proxy');
|
||||
client.write('GET / HTTP/1.1\r\nHost: test.local\r\n\r\n');
|
||||
resolve();
|
||||
});
|
||||
|
||||
client.on('error', () => resolve()); // Ignore errors since we're ending the connection
|
||||
});
|
||||
|
||||
await new Promise(resolve => setTimeout(resolve, 100));
|
||||
|
||||
// Verify that HttpProxy was called, not direct connection
|
||||
expect(httpProxyForwardCalled).toEqual(true);
|
||||
expect(receivedConnection).toEqual(false); // Target should not receive direct connection
|
||||
|
||||
client.destroy();
|
||||
await proxy.stop();
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.close(() => resolve());
|
||||
});
|
||||
|
||||
// Restore original method
|
||||
proxy['httpProxyBridge'].forwardToHttpProxy = originalForward;
|
||||
});
|
||||
|
||||
tap.start();
|
160
test/test.http-port8080-forwarding.ts
Normal file
160
test/test.http-port8080-forwarding.ts
Normal file
@ -0,0 +1,160 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
import * as http from 'http';
|
||||
|
||||
tap.test('should forward HTTP connections on port 8080 to HttpProxy', async (tapTest) => {
|
||||
// Create a mock HTTP server to act as our target
|
||||
const targetPort = 8181;
|
||||
let receivedRequest = false;
|
||||
let receivedPath = '';
|
||||
|
||||
const targetServer = http.createServer((req, res) => {
|
||||
// Log request details for debugging
|
||||
console.log(`Target server received: ${req.method} ${req.url}`);
|
||||
receivedPath = req.url || '';
|
||||
|
||||
if (req.url === '/.well-known/acme-challenge/test-token') {
|
||||
receivedRequest = true;
|
||||
res.writeHead(200, { 'Content-Type': 'text/plain' });
|
||||
res.end('test-challenge-response');
|
||||
} else {
|
||||
res.writeHead(200);
|
||||
res.end('OK');
|
||||
}
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.listen(targetPort, () => {
|
||||
console.log(`Target server listening on port ${targetPort}`);
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Create SmartProxy with port 8080 configured for HttpProxy
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [8080], // Enable HttpProxy for port 8080
|
||||
httpProxyPort: 8844,
|
||||
enableDetailedLogging: true,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: {
|
||||
ports: 8080,
|
||||
domains: ['test.local']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: targetPort }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Give the proxy a moment to fully initialize
|
||||
await new Promise(resolve => setTimeout(resolve, 500));
|
||||
|
||||
// Make an HTTP request to port 8080
|
||||
const options = {
|
||||
hostname: 'localhost',
|
||||
port: 8080,
|
||||
path: '/.well-known/acme-challenge/test-token',
|
||||
method: 'GET',
|
||||
headers: {
|
||||
'Host': 'test.local'
|
||||
}
|
||||
};
|
||||
|
||||
const response = await new Promise<http.IncomingMessage>((resolve, reject) => {
|
||||
const req = http.request(options, (res) => resolve(res));
|
||||
req.on('error', reject);
|
||||
req.end();
|
||||
});
|
||||
|
||||
// Collect response data
|
||||
let responseData = '';
|
||||
response.setEncoding('utf8');
|
||||
response.on('data', chunk => responseData += chunk);
|
||||
await new Promise(resolve => response.on('end', resolve));
|
||||
|
||||
// Verify the request was properly forwarded
|
||||
expect(response.statusCode).toEqual(200);
|
||||
expect(receivedPath).toEqual('/.well-known/acme-challenge/test-token');
|
||||
expect(responseData).toEqual('test-challenge-response');
|
||||
expect(receivedRequest).toEqual(true);
|
||||
|
||||
await proxy.stop();
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.close(() => resolve());
|
||||
});
|
||||
});
|
||||
|
||||
tap.test('should handle basic HTTP request forwarding', async (tapTest) => {
|
||||
// Create a simple target server
|
||||
const targetPort = 8182;
|
||||
let receivedRequest = false;
|
||||
|
||||
const targetServer = http.createServer((req, res) => {
|
||||
console.log(`Target received: ${req.method} ${req.url} from ${req.headers.host}`);
|
||||
receivedRequest = true;
|
||||
res.writeHead(200, { 'Content-Type': 'text/plain' });
|
||||
res.end('Hello from target');
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.listen(targetPort, () => {
|
||||
console.log(`Target server listening on port ${targetPort}`);
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Create a simple proxy without HttpProxy
|
||||
const proxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'simple-forward',
|
||||
match: {
|
||||
ports: 8081,
|
||||
domains: ['test.local']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: targetPort }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await proxy.start();
|
||||
await new Promise(resolve => setTimeout(resolve, 500));
|
||||
|
||||
// Make request
|
||||
const options = {
|
||||
hostname: 'localhost',
|
||||
port: 8081,
|
||||
path: '/test',
|
||||
method: 'GET',
|
||||
headers: {
|
||||
'Host': 'test.local'
|
||||
}
|
||||
};
|
||||
|
||||
const response = await new Promise<http.IncomingMessage>((resolve, reject) => {
|
||||
const req = http.request(options, (res) => resolve(res));
|
||||
req.on('error', reject);
|
||||
req.end();
|
||||
});
|
||||
|
||||
let responseData = '';
|
||||
response.setEncoding('utf8');
|
||||
response.on('data', chunk => responseData += chunk);
|
||||
await new Promise(resolve => response.on('end', resolve));
|
||||
|
||||
expect(response.statusCode).toEqual(200);
|
||||
expect(responseData).toEqual('Hello from target');
|
||||
expect(receivedRequest).toEqual(true);
|
||||
|
||||
await proxy.stop();
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.close(() => resolve());
|
||||
});
|
||||
});
|
||||
|
||||
tap.start();
|
96
test/test.http-port8080-simple.ts
Normal file
96
test/test.http-port8080-simple.ts
Normal file
@ -0,0 +1,96 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
import * as net from 'net';
|
||||
|
||||
tap.test('should forward HTTP connections on port 8080 to HttpProxy', async (tapTest) => {
|
||||
// Create a simple echo server to act as our target
|
||||
const targetPort = 8181;
|
||||
let receivedData = '';
|
||||
|
||||
const targetServer = net.createServer((socket) => {
|
||||
console.log('Target server received connection');
|
||||
|
||||
socket.on('data', (data) => {
|
||||
receivedData += data.toString();
|
||||
console.log('Target server received data:', data.toString().split('\n')[0]);
|
||||
|
||||
// Send a simple HTTP response
|
||||
const response = 'HTTP/1.1 200 OK\r\nContent-Type: text/plain\r\nContent-Length: 13\r\n\r\nHello, World!';
|
||||
socket.write(response);
|
||||
});
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.listen(targetPort, () => {
|
||||
console.log(`Target server listening on port ${targetPort}`);
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Create SmartProxy with port 8080 configured for HttpProxy
|
||||
const proxy = new SmartProxy({
|
||||
useHttpProxy: [8080], // Enable HttpProxy for port 8080
|
||||
httpProxyPort: 8844,
|
||||
enableDetailedLogging: true,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: {
|
||||
ports: 8080
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: targetPort }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Give the proxy a moment to fully initialize
|
||||
await new Promise(resolve => setTimeout(resolve, 500));
|
||||
|
||||
console.log('Making test connection to proxy on port 8080...');
|
||||
|
||||
// Create a simple TCP connection to test
|
||||
const client = new net.Socket();
|
||||
const responsePromise = new Promise<string>((resolve, reject) => {
|
||||
let response = '';
|
||||
|
||||
client.on('data', (data) => {
|
||||
response += data.toString();
|
||||
console.log('Client received:', data.toString());
|
||||
});
|
||||
|
||||
client.on('end', () => {
|
||||
resolve(response);
|
||||
});
|
||||
|
||||
client.on('error', reject);
|
||||
});
|
||||
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
client.connect(8080, 'localhost', () => {
|
||||
console.log('Client connected to proxy');
|
||||
// Send a simple HTTP request
|
||||
client.write('GET / HTTP/1.1\r\nHost: test.local\r\n\r\n');
|
||||
resolve();
|
||||
});
|
||||
|
||||
client.on('error', reject);
|
||||
});
|
||||
|
||||
// Wait for response
|
||||
const response = await responsePromise;
|
||||
|
||||
// Check that we got the response
|
||||
expect(response).toContain('Hello, World!');
|
||||
expect(receivedData).toContain('GET / HTTP/1.1');
|
||||
|
||||
client.destroy();
|
||||
await proxy.stop();
|
||||
await new Promise<void>((resolve) => {
|
||||
targetServer.close(() => resolve());
|
||||
});
|
||||
});
|
||||
|
||||
tap.start();
|
@ -1,20 +1,20 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
import { NetworkProxy } from '../ts/proxies/network-proxy/index.js';
|
||||
import { HttpProxy } from '../ts/proxies/http-proxy/index.js';
|
||||
import type { IRouteConfig } from '../ts/proxies/smart-proxy/models/route-types.js';
|
||||
import type { IRouteContext } from '../ts/core/models/route-context.js';
|
||||
|
||||
// Declare variables for tests
|
||||
let networkProxy: NetworkProxy;
|
||||
let httpProxy: HttpProxy;
|
||||
let testServer: plugins.http.Server;
|
||||
let testServerHttp2: plugins.http2.Http2Server;
|
||||
let serverPort: number;
|
||||
let serverPortHttp2: number;
|
||||
|
||||
// Setup test environment
|
||||
tap.test('setup NetworkProxy function-based targets test environment', async (tools) => {
|
||||
tap.test('setup HttpProxy function-based targets test environment', async (tools) => {
|
||||
// Set a reasonable timeout for the test
|
||||
tools.timeout = 30000; // 30 seconds
|
||||
tools.timeout(30000); // 30 seconds
|
||||
// Create simple HTTP server to respond to requests
|
||||
testServer = plugins.http.createServer((req, res) => {
|
||||
res.writeHead(200, { 'Content-Type': 'application/json' });
|
||||
@ -63,8 +63,8 @@ tap.test('setup NetworkProxy function-based targets test environment', async (to
|
||||
});
|
||||
});
|
||||
|
||||
// Create NetworkProxy instance
|
||||
networkProxy = new NetworkProxy({
|
||||
// Create HttpProxy instance
|
||||
httpProxy = new HttpProxy({
|
||||
port: 0, // Use dynamic port
|
||||
logLevel: 'info', // Use info level to see more logs
|
||||
// Disable ACME to avoid trying to bind to port 80
|
||||
@ -73,11 +73,11 @@ tap.test('setup NetworkProxy function-based targets test environment', async (to
|
||||
}
|
||||
});
|
||||
|
||||
await networkProxy.start();
|
||||
await httpProxy.start();
|
||||
|
||||
// Log the actual port being used
|
||||
const actualPort = networkProxy.getListeningPort();
|
||||
console.log(`NetworkProxy actual listening port: ${actualPort}`);
|
||||
const actualPort = httpProxy.getListeningPort();
|
||||
console.log(`HttpProxy actual listening port: ${actualPort}`);
|
||||
});
|
||||
|
||||
// Test static host/port routes
|
||||
@ -100,10 +100,10 @@ tap.test('should support static host/port routes', async () => {
|
||||
}
|
||||
];
|
||||
|
||||
await networkProxy.updateRouteConfigs(routes);
|
||||
await httpProxy.updateRouteConfigs(routes);
|
||||
|
||||
// Get proxy port using the improved getListeningPort() method
|
||||
const proxyPort = networkProxy.getListeningPort();
|
||||
const proxyPort = httpProxy.getListeningPort();
|
||||
|
||||
// Make request to proxy
|
||||
const response = await makeRequest({
|
||||
@ -145,10 +145,10 @@ tap.test('should support function-based host', async () => {
|
||||
}
|
||||
];
|
||||
|
||||
await networkProxy.updateRouteConfigs(routes);
|
||||
await httpProxy.updateRouteConfigs(routes);
|
||||
|
||||
// Get proxy port using the improved getListeningPort() method
|
||||
const proxyPort = networkProxy.getListeningPort();
|
||||
const proxyPort = httpProxy.getListeningPort();
|
||||
|
||||
// Make request to proxy
|
||||
const response = await makeRequest({
|
||||
@ -190,10 +190,10 @@ tap.test('should support function-based port', async () => {
|
||||
}
|
||||
];
|
||||
|
||||
await networkProxy.updateRouteConfigs(routes);
|
||||
await httpProxy.updateRouteConfigs(routes);
|
||||
|
||||
// Get proxy port using the improved getListeningPort() method
|
||||
const proxyPort = networkProxy.getListeningPort();
|
||||
const proxyPort = httpProxy.getListeningPort();
|
||||
|
||||
// Make request to proxy
|
||||
const response = await makeRequest({
|
||||
@ -236,10 +236,10 @@ tap.test('should support function-based host AND port', async () => {
|
||||
}
|
||||
];
|
||||
|
||||
await networkProxy.updateRouteConfigs(routes);
|
||||
await httpProxy.updateRouteConfigs(routes);
|
||||
|
||||
// Get proxy port using the improved getListeningPort() method
|
||||
const proxyPort = networkProxy.getListeningPort();
|
||||
const proxyPort = httpProxy.getListeningPort();
|
||||
|
||||
// Make request to proxy
|
||||
const response = await makeRequest({
|
||||
@ -285,10 +285,10 @@ tap.test('should support context-based routing with path', async () => {
|
||||
}
|
||||
];
|
||||
|
||||
await networkProxy.updateRouteConfigs(routes);
|
||||
await httpProxy.updateRouteConfigs(routes);
|
||||
|
||||
// Get proxy port using the improved getListeningPort() method
|
||||
const proxyPort = networkProxy.getListeningPort();
|
||||
const proxyPort = httpProxy.getListeningPort();
|
||||
|
||||
// Make request to proxy with /api path
|
||||
const apiResponse = await makeRequest({
|
||||
@ -322,9 +322,9 @@ tap.test('should support context-based routing with path', async () => {
|
||||
});
|
||||
|
||||
// Cleanup test environment
|
||||
tap.test('cleanup NetworkProxy function-based targets test environment', async () => {
|
||||
tap.test('cleanup HttpProxy function-based targets test environment', async () => {
|
||||
// Skip cleanup if setup failed
|
||||
if (!networkProxy && !testServer && !testServerHttp2) {
|
||||
if (!httpProxy && !testServer && !testServerHttp2) {
|
||||
console.log('Skipping cleanup - setup failed');
|
||||
return;
|
||||
}
|
||||
@ -358,11 +358,11 @@ tap.test('cleanup NetworkProxy function-based targets test environment', async (
|
||||
});
|
||||
}
|
||||
|
||||
// Stop NetworkProxy last
|
||||
if (networkProxy) {
|
||||
console.log('Stopping NetworkProxy...');
|
||||
await networkProxy.stop();
|
||||
console.log('NetworkProxy stopped successfully');
|
||||
// Stop HttpProxy last
|
||||
if (httpProxy) {
|
||||
console.log('Stopping HttpProxy...');
|
||||
await httpProxy.stop();
|
||||
console.log('HttpProxy stopped successfully');
|
||||
}
|
||||
|
||||
// Force exit after a short delay to ensure cleanup
|
@ -1,11 +1,11 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as smartproxy from '../ts/index.js';
|
||||
import { loadTestCertificates } from './helpers/certificates.js';
|
||||
import * as https from 'https';
|
||||
import * as http from 'http';
|
||||
import { WebSocket, WebSocketServer } from 'ws';
|
||||
|
||||
let testProxy: smartproxy.NetworkProxy;
|
||||
let testProxy: smartproxy.HttpProxy;
|
||||
let testServer: http.Server;
|
||||
let wsServer: WebSocketServer;
|
||||
let testCertificates: { privateKey: string; publicKey: string };
|
||||
@ -187,7 +187,7 @@ tap.test('setup test environment', async () => {
|
||||
|
||||
tap.test('should create proxy instance', async () => {
|
||||
// Test with the original minimal options (only port)
|
||||
testProxy = new smartproxy.NetworkProxy({
|
||||
testProxy = new smartproxy.HttpProxy({
|
||||
port: 3001,
|
||||
});
|
||||
expect(testProxy).toEqual(testProxy); // Instance equality check
|
||||
@ -195,7 +195,7 @@ tap.test('should create proxy instance', async () => {
|
||||
|
||||
tap.test('should create proxy instance with extended options', async () => {
|
||||
// Test with extended options to verify backward compatibility
|
||||
testProxy = new smartproxy.NetworkProxy({
|
||||
testProxy = new smartproxy.HttpProxy({
|
||||
port: 3001,
|
||||
maxConnections: 5000,
|
||||
keepAliveTimeout: 120000,
|
||||
@ -214,7 +214,7 @@ tap.test('should create proxy instance with extended options', async () => {
|
||||
|
||||
tap.test('should start the proxy server', async () => {
|
||||
// Create a new proxy instance
|
||||
testProxy = new smartproxy.NetworkProxy({
|
||||
testProxy = new smartproxy.HttpProxy({
|
||||
port: 3001,
|
||||
maxConnections: 5000,
|
||||
backendProtocol: 'http1',
|
116
test/test.nftables-forwarding.ts
Normal file
116
test/test.nftables-forwarding.ts
Normal file
@ -0,0 +1,116 @@
|
||||
import { expect, tap } from '@git.zone/tapbundle';
|
||||
import * as net from 'net';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/smart-proxy.js';
|
||||
import type { IRouteConfig } from '../ts/proxies/smart-proxy/models/route-types.js';
|
||||
|
||||
// Test to verify NFTables forwarding doesn't terminate connections
|
||||
tap.test('NFTables forwarding should not terminate connections', async () => {
|
||||
// Create a test server that receives connections
|
||||
const testServer = net.createServer((socket) => {
|
||||
socket.write('Connected to test server\n');
|
||||
socket.on('data', (data) => {
|
||||
socket.write(`Echo: ${data}`);
|
||||
});
|
||||
});
|
||||
|
||||
// Start test server
|
||||
await new Promise<void>((resolve) => {
|
||||
testServer.listen(8001, '127.0.0.1', () => {
|
||||
console.log('Test server listening on port 8001');
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Create SmartProxy with NFTables route
|
||||
const smartProxy = new SmartProxy({
|
||||
enableDetailedLogging: true,
|
||||
routes: [
|
||||
{
|
||||
id: 'nftables-test',
|
||||
name: 'NFTables Test Route',
|
||||
match: {
|
||||
port: 8080,
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
forwardingEngine: 'nftables',
|
||||
target: {
|
||||
host: '127.0.0.1',
|
||||
port: 8001,
|
||||
},
|
||||
},
|
||||
},
|
||||
// Also add regular forwarding route for comparison
|
||||
{
|
||||
id: 'regular-test',
|
||||
name: 'Regular Forward Route',
|
||||
match: {
|
||||
port: 8081,
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
host: '127.0.0.1',
|
||||
port: 8001,
|
||||
},
|
||||
},
|
||||
},
|
||||
],
|
||||
});
|
||||
|
||||
await smartProxy.start();
|
||||
|
||||
// Test NFTables route
|
||||
const nftablesConnection = await new Promise<net.Socket>((resolve, reject) => {
|
||||
const client = net.connect(8080, '127.0.0.1', () => {
|
||||
console.log('Connected to NFTables route');
|
||||
resolve(client);
|
||||
});
|
||||
client.on('error', reject);
|
||||
});
|
||||
|
||||
// Add timeout to check if connection stays alive
|
||||
await new Promise<void>((resolve) => {
|
||||
let dataReceived = false;
|
||||
nftablesConnection.on('data', (data) => {
|
||||
console.log('NFTables route data:', data.toString());
|
||||
dataReceived = true;
|
||||
});
|
||||
|
||||
// Send test data
|
||||
nftablesConnection.write('Test NFTables');
|
||||
|
||||
// Check connection after 100ms
|
||||
setTimeout(() => {
|
||||
// Connection should still be alive even if app doesn't handle it
|
||||
expect(nftablesConnection.destroyed).toBe(false);
|
||||
nftablesConnection.end();
|
||||
resolve();
|
||||
}, 100);
|
||||
});
|
||||
|
||||
// Test regular forwarding route for comparison
|
||||
const regularConnection = await new Promise<net.Socket>((resolve, reject) => {
|
||||
const client = net.connect(8081, '127.0.0.1', () => {
|
||||
console.log('Connected to regular route');
|
||||
resolve(client);
|
||||
});
|
||||
client.on('error', reject);
|
||||
});
|
||||
|
||||
// Test regular connection works
|
||||
await new Promise<void>((resolve) => {
|
||||
regularConnection.on('data', (data) => {
|
||||
console.log('Regular route data:', data.toString());
|
||||
expect(data.toString()).toContain('Connected to test server');
|
||||
regularConnection.end();
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
|
||||
// Cleanup
|
||||
await smartProxy.stop();
|
||||
testServer.close();
|
||||
});
|
||||
|
||||
export default tap.start();
|
@ -1,6 +1,6 @@
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import { createNfTablesRoute, createNfTablesTerminateRoute } from '../ts/proxies/smart-proxy/utils/route-helpers.js';
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as child_process from 'child_process';
|
||||
import { promisify } from 'util';
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import { createNfTablesRoute, createNfTablesTerminateRoute } from '../ts/proxies/smart-proxy/utils/route-helpers.js';
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as net from 'net';
|
||||
import * as http from 'http';
|
||||
import * as https from 'https';
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { NFTablesManager } from '../ts/proxies/smart-proxy/nftables-manager.js';
|
||||
import type { IRouteConfig } from '../ts/proxies/smart-proxy/models/route-types.js';
|
||||
import type { ISmartProxyOptions } from '../ts/proxies/smart-proxy/models/interfaces.js';
|
||||
|
@ -1,7 +1,7 @@
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import { NFTablesManager } from '../ts/proxies/smart-proxy/nftables-manager.js';
|
||||
import { createNfTablesRoute } from '../ts/proxies/smart-proxy/utils/route-helpers.js';
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as child_process from 'child_process';
|
||||
import { promisify } from 'util';
|
||||
|
||||
|
100
test/test.port-forwarding-fix.ts
Normal file
100
test/test.port-forwarding-fix.ts
Normal file
@ -0,0 +1,100 @@
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as net from 'net';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/smart-proxy.js';
|
||||
|
||||
let echoServer: net.Server;
|
||||
let proxy: SmartProxy;
|
||||
|
||||
tap.test('port forwarding should not immediately close connections', async (tools) => {
|
||||
// Set a timeout for this test
|
||||
tools.timeout(10000); // 10 seconds
|
||||
// Create an echo server
|
||||
echoServer = await new Promise<net.Server>((resolve) => {
|
||||
const server = net.createServer((socket) => {
|
||||
socket.on('data', (data) => {
|
||||
socket.write(`ECHO: ${data}`);
|
||||
});
|
||||
});
|
||||
|
||||
server.listen(8888, () => {
|
||||
console.log('Echo server listening on port 8888');
|
||||
resolve(server);
|
||||
});
|
||||
});
|
||||
|
||||
// Create proxy with forwarding route
|
||||
proxy = new SmartProxy({
|
||||
routes: [{
|
||||
id: 'test',
|
||||
match: { ports: 9999 },
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 8888 }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Test connection through proxy
|
||||
const client = net.createConnection(9999, 'localhost');
|
||||
|
||||
const result = await new Promise<string>((resolve, reject) => {
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
client.end(); // Close the connection after receiving data
|
||||
resolve(response);
|
||||
});
|
||||
|
||||
client.on('error', reject);
|
||||
|
||||
client.write('Hello');
|
||||
});
|
||||
|
||||
expect(result).toEqual('ECHO: Hello');
|
||||
});
|
||||
|
||||
tap.test('TLS passthrough should work correctly', async () => {
|
||||
// Create proxy with TLS passthrough
|
||||
proxy = new SmartProxy({
|
||||
routes: [{
|
||||
id: 'tls-test',
|
||||
match: { ports: 8443, domains: 'test.example.com' },
|
||||
action: {
|
||||
type: 'forward',
|
||||
tls: { mode: 'passthrough' },
|
||||
target: { host: 'localhost', port: 443 }
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// For now just verify the proxy starts correctly with TLS passthrough route
|
||||
expect(proxy).toBeDefined();
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.test('cleanup', async () => {
|
||||
if (echoServer) {
|
||||
await new Promise<void>((resolve) => {
|
||||
echoServer.close(() => {
|
||||
console.log('Echo server closed');
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
}
|
||||
if (proxy) {
|
||||
await proxy.stop();
|
||||
console.log('Proxy stopped');
|
||||
}
|
||||
});
|
||||
|
||||
export default tap.start().then(() => {
|
||||
// Force exit after tests complete
|
||||
setTimeout(() => {
|
||||
console.log('Forcing process exit');
|
||||
process.exit(0);
|
||||
}, 1000);
|
||||
});
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as net from 'net';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import {
|
||||
|
281
test/test.port80-management.node.ts
Normal file
281
test/test.port80-management.node.ts
Normal file
@ -0,0 +1,281 @@
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
|
||||
/**
|
||||
* Test that verifies port 80 is not double-registered when both
|
||||
* user routes and ACME challenges use the same port
|
||||
*/
|
||||
tap.test('should not double-register port 80 when user route and ACME use same port', async (tools) => {
|
||||
tools.timeout(5000);
|
||||
|
||||
let port80AddCount = 0;
|
||||
const activePorts = new Set<number>();
|
||||
|
||||
const settings = {
|
||||
port: 9901,
|
||||
routes: [
|
||||
{
|
||||
name: 'user-route',
|
||||
match: {
|
||||
ports: [80]
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 3000 }
|
||||
}
|
||||
},
|
||||
{
|
||||
name: 'secure-route',
|
||||
match: {
|
||||
ports: [443]
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 3001 },
|
||||
tls: {
|
||||
mode: 'terminate' as const,
|
||||
certificate: 'auto' as const
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
acme: {
|
||||
email: 'test@test.com',
|
||||
port: 80 // ACME on same port as user route
|
||||
}
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Mock the port manager to track port additions
|
||||
const mockPortManager = {
|
||||
addPort: async (port: number) => {
|
||||
if (activePorts.has(port)) {
|
||||
return; // Simulate deduplication
|
||||
}
|
||||
activePorts.add(port);
|
||||
if (port === 80) {
|
||||
port80AddCount++;
|
||||
}
|
||||
},
|
||||
addPorts: async (ports: number[]) => {
|
||||
for (const port of ports) {
|
||||
await mockPortManager.addPort(port);
|
||||
}
|
||||
},
|
||||
updatePorts: async (requiredPorts: Set<number>) => {
|
||||
for (const port of requiredPorts) {
|
||||
await mockPortManager.addPort(port);
|
||||
}
|
||||
},
|
||||
setShuttingDown: () => {},
|
||||
closeAll: async () => { activePorts.clear(); },
|
||||
stop: async () => { await mockPortManager.closeAll(); }
|
||||
};
|
||||
|
||||
// Inject mock
|
||||
(proxy as any).portManager = mockPortManager;
|
||||
|
||||
// Mock certificate manager to prevent ACME calls
|
||||
(proxy as any).createCertificateManager = async function(routes: any[], certDir: string, acmeOptions: any, initialState?: any) {
|
||||
const mockCertManager = {
|
||||
setUpdateRoutesCallback: function(callback: any) { /* noop */ },
|
||||
setHttpProxy: function() {},
|
||||
setGlobalAcmeDefaults: function() {},
|
||||
setAcmeStateManager: function() {},
|
||||
initialize: async function() {
|
||||
// Simulate ACME route addition
|
||||
const challengeRoute = {
|
||||
name: 'acme-challenge',
|
||||
priority: 1000,
|
||||
match: {
|
||||
ports: acmeOptions?.port || 80,
|
||||
path: '/.well-known/acme-challenge/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
// This would trigger route update in real implementation
|
||||
},
|
||||
provisionAllCertificates: async function() {
|
||||
// Mock implementation to satisfy the call in SmartProxy.start()
|
||||
// Add the ACME challenge port here too in case initialize was skipped
|
||||
const challengePort = acmeOptions?.port || 80;
|
||||
await mockPortManager.addPort(challengePort);
|
||||
console.log(`Added ACME challenge port from provisionAllCertificates: ${challengePort}`);
|
||||
},
|
||||
getAcmeOptions: () => acmeOptions,
|
||||
getState: () => ({ challengeRouteActive: false }),
|
||||
stop: async () => {}
|
||||
};
|
||||
return mockCertManager;
|
||||
};
|
||||
|
||||
// Mock NFTables
|
||||
(proxy as any).nftablesManager = {
|
||||
ensureNFTablesSetup: async () => {},
|
||||
stop: async () => {}
|
||||
};
|
||||
|
||||
// Mock admin server
|
||||
(proxy as any).startAdminServer = async function() {
|
||||
(this as any).servers.set(this.settings.port, {
|
||||
port: this.settings.port,
|
||||
close: async () => {}
|
||||
});
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Verify that port 80 was added only once
|
||||
expect(port80AddCount).toEqual(1);
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
/**
|
||||
* Test that verifies ACME can use a different port than user routes
|
||||
*/
|
||||
tap.test('should handle ACME on different port than user routes', async (tools) => {
|
||||
tools.timeout(5000);
|
||||
|
||||
const portAddHistory: number[] = [];
|
||||
const activePorts = new Set<number>();
|
||||
|
||||
const settings = {
|
||||
port: 9902,
|
||||
routes: [
|
||||
{
|
||||
name: 'user-route',
|
||||
match: {
|
||||
ports: [80]
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 3000 }
|
||||
}
|
||||
},
|
||||
{
|
||||
name: 'secure-route',
|
||||
match: {
|
||||
ports: [443]
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 3001 },
|
||||
tls: {
|
||||
mode: 'terminate' as const,
|
||||
certificate: 'auto' as const
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
acme: {
|
||||
email: 'test@test.com',
|
||||
port: 8080 // ACME on different port than user routes
|
||||
}
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Mock the port manager
|
||||
const mockPortManager = {
|
||||
addPort: async (port: number) => {
|
||||
console.log(`Attempting to add port: ${port}`);
|
||||
if (!activePorts.has(port)) {
|
||||
activePorts.add(port);
|
||||
portAddHistory.push(port);
|
||||
console.log(`Port ${port} added to history`);
|
||||
} else {
|
||||
console.log(`Port ${port} already active, not adding to history`);
|
||||
}
|
||||
},
|
||||
addPorts: async (ports: number[]) => {
|
||||
for (const port of ports) {
|
||||
await mockPortManager.addPort(port);
|
||||
}
|
||||
},
|
||||
updatePorts: async (requiredPorts: Set<number>) => {
|
||||
for (const port of requiredPorts) {
|
||||
await mockPortManager.addPort(port);
|
||||
}
|
||||
},
|
||||
setShuttingDown: () => {},
|
||||
closeAll: async () => { activePorts.clear(); },
|
||||
stop: async () => { await mockPortManager.closeAll(); }
|
||||
};
|
||||
|
||||
// Inject mocks
|
||||
(proxy as any).portManager = mockPortManager;
|
||||
|
||||
// Mock certificate manager
|
||||
(proxy as any).createCertificateManager = async function(routes: any[], certDir: string, acmeOptions: any, initialState?: any) {
|
||||
const mockCertManager = {
|
||||
setUpdateRoutesCallback: function(callback: any) { /* noop */ },
|
||||
setHttpProxy: function() {},
|
||||
setGlobalAcmeDefaults: function() {},
|
||||
setAcmeStateManager: function() {},
|
||||
initialize: async function() {
|
||||
// Simulate ACME route addition on different port
|
||||
const challengePort = acmeOptions?.port || 80;
|
||||
const challengeRoute = {
|
||||
name: 'acme-challenge',
|
||||
priority: 1000,
|
||||
match: {
|
||||
ports: challengePort,
|
||||
path: '/.well-known/acme-challenge/*'
|
||||
},
|
||||
action: {
|
||||
type: 'static'
|
||||
}
|
||||
};
|
||||
|
||||
// Add the ACME port to our port tracking
|
||||
await mockPortManager.addPort(challengePort);
|
||||
|
||||
// For debugging
|
||||
console.log(`Added ACME challenge port: ${challengePort}`);
|
||||
},
|
||||
provisionAllCertificates: async function() {
|
||||
// Mock implementation to satisfy the call in SmartProxy.start()
|
||||
// Add the ACME challenge port here too in case initialize was skipped
|
||||
const challengePort = acmeOptions?.port || 80;
|
||||
await mockPortManager.addPort(challengePort);
|
||||
console.log(`Added ACME challenge port from provisionAllCertificates: ${challengePort}`);
|
||||
},
|
||||
getAcmeOptions: () => acmeOptions,
|
||||
getState: () => ({ challengeRouteActive: false }),
|
||||
stop: async () => {}
|
||||
};
|
||||
return mockCertManager;
|
||||
};
|
||||
|
||||
// Mock NFTables
|
||||
(proxy as any).nftablesManager = {
|
||||
ensureNFTablesSetup: async () => {},
|
||||
stop: async () => {}
|
||||
};
|
||||
|
||||
// Mock admin server
|
||||
(proxy as any).startAdminServer = async function() {
|
||||
(this as any).servers.set(this.settings.port, {
|
||||
port: this.settings.port,
|
||||
close: async () => {}
|
||||
});
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Log the port history for debugging
|
||||
console.log('Port add history:', portAddHistory);
|
||||
|
||||
// Verify that all expected ports were added
|
||||
expect(portAddHistory.includes(80)).toBeTrue(); // User route
|
||||
expect(portAddHistory.includes(443)).toBeTrue(); // TLS route
|
||||
expect(portAddHistory.includes(8080)).toBeTrue(); // ACME challenge on different port
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
export default tap.start();
|
197
test/test.race-conditions.node.ts
Normal file
197
test/test.race-conditions.node.ts
Normal file
@ -0,0 +1,197 @@
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy, type IRouteConfig } from '../ts/index.js';
|
||||
|
||||
/**
|
||||
* Test that verifies mutex prevents race conditions during concurrent route updates
|
||||
*/
|
||||
tap.test('should handle concurrent route updates without race conditions', async (tools) => {
|
||||
tools.timeout(10000);
|
||||
|
||||
const settings = {
|
||||
port: 6001,
|
||||
routes: [
|
||||
{
|
||||
name: 'initial-route',
|
||||
match: {
|
||||
ports: 80
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
targetUrl: 'http://localhost:3000'
|
||||
}
|
||||
}
|
||||
],
|
||||
acme: {
|
||||
email: 'test@test.com',
|
||||
port: 80
|
||||
}
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
await proxy.start();
|
||||
|
||||
// Simulate concurrent route updates
|
||||
const updates = [];
|
||||
for (let i = 0; i < 5; i++) {
|
||||
updates.push(proxy.updateRoutes([
|
||||
...settings.routes,
|
||||
{
|
||||
name: `route-${i}`,
|
||||
match: {
|
||||
ports: [443]
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 3001 + i },
|
||||
tls: {
|
||||
mode: 'terminate' as const,
|
||||
certificate: 'auto' as const
|
||||
}
|
||||
}
|
||||
}
|
||||
]));
|
||||
}
|
||||
|
||||
// All updates should complete without errors
|
||||
await Promise.all(updates);
|
||||
|
||||
// Verify final state
|
||||
const currentRoutes = proxy['settings'].routes;
|
||||
expect(currentRoutes.length).toEqual(2); // Initial route + last update
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
/**
|
||||
* Test that verifies mutex serializes route updates
|
||||
*/
|
||||
tap.test('should serialize route updates with mutex', async (tools) => {
|
||||
tools.timeout(10000);
|
||||
|
||||
const settings = {
|
||||
port: 6002,
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: { ports: [80] },
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
targetUrl: 'http://localhost:3000'
|
||||
}
|
||||
}]
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
await proxy.start();
|
||||
|
||||
let updateStartCount = 0;
|
||||
let updateEndCount = 0;
|
||||
let maxConcurrent = 0;
|
||||
|
||||
// Wrap updateRoutes to track concurrent execution
|
||||
const originalUpdateRoutes = proxy['updateRoutes'].bind(proxy);
|
||||
proxy['updateRoutes'] = async (routes: any[]) => {
|
||||
updateStartCount++;
|
||||
const concurrent = updateStartCount - updateEndCount;
|
||||
maxConcurrent = Math.max(maxConcurrent, concurrent);
|
||||
|
||||
// If mutex is working, only one update should run at a time
|
||||
expect(concurrent).toEqual(1);
|
||||
|
||||
const result = await originalUpdateRoutes(routes);
|
||||
updateEndCount++;
|
||||
return result;
|
||||
};
|
||||
|
||||
// Trigger multiple concurrent updates
|
||||
const updates = [];
|
||||
for (let i = 0; i < 5; i++) {
|
||||
updates.push(proxy.updateRoutes([
|
||||
...settings.routes,
|
||||
{
|
||||
name: `concurrent-route-${i}`,
|
||||
match: { ports: [2000 + i] },
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
targetUrl: `http://localhost:${3000 + i}`
|
||||
}
|
||||
}
|
||||
]));
|
||||
}
|
||||
|
||||
await Promise.all(updates);
|
||||
|
||||
// All updates should have completed
|
||||
expect(updateStartCount).toEqual(5);
|
||||
expect(updateEndCount).toEqual(5);
|
||||
expect(maxConcurrent).toEqual(1); // Mutex ensures only one at a time
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
/**
|
||||
* Test that challenge route state is preserved across certificate manager recreations
|
||||
*/
|
||||
tap.test('should preserve challenge route state during cert manager recreation', async (tools) => {
|
||||
tools.timeout(10000);
|
||||
|
||||
const settings = {
|
||||
port: 6003,
|
||||
routes: [{
|
||||
name: 'acme-route',
|
||||
match: { ports: [443] },
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 3001 },
|
||||
tls: {
|
||||
mode: 'terminate' as const,
|
||||
certificate: 'auto' as const
|
||||
}
|
||||
}
|
||||
}],
|
||||
acme: {
|
||||
email: 'test@test.com',
|
||||
port: 80
|
||||
}
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Track certificate manager recreations
|
||||
let certManagerCreationCount = 0;
|
||||
const originalCreateCertManager = proxy['createCertificateManager'].bind(proxy);
|
||||
proxy['createCertificateManager'] = async (...args: any[]) => {
|
||||
certManagerCreationCount++;
|
||||
return originalCreateCertManager(...args);
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Initial creation
|
||||
expect(certManagerCreationCount).toEqual(1);
|
||||
|
||||
// Multiple route updates
|
||||
for (let i = 0; i < 3; i++) {
|
||||
await proxy.updateRoutes([
|
||||
...settings.routes as IRouteConfig[],
|
||||
{
|
||||
name: `dynamic-route-${i}`,
|
||||
match: { ports: [9000 + i] },
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 5000 + i }
|
||||
}
|
||||
}
|
||||
]);
|
||||
}
|
||||
|
||||
// Certificate manager should be recreated for each update
|
||||
expect(certManagerCreationCount).toEqual(4); // 1 initial + 3 updates
|
||||
|
||||
// State should be preserved (challenge route active)
|
||||
const globalState = proxy['globalChallengeRouteActive'];
|
||||
expect(globalState).toBeDefined();
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
export default tap.start();
|
116
test/test.route-callback-simple.ts
Normal file
116
test/test.route-callback-simple.ts
Normal file
@ -0,0 +1,116 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
|
||||
tap.test('should set update routes callback on certificate manager', async () => {
|
||||
// Create a simple proxy with a route requiring certificates
|
||||
const proxy = new SmartProxy({
|
||||
acme: {
|
||||
email: 'test@local.dev',
|
||||
useProduction: false,
|
||||
port: 8080 // Use non-privileged port for ACME challenges globally
|
||||
},
|
||||
routes: [{
|
||||
name: 'test-route',
|
||||
match: {
|
||||
ports: [8443],
|
||||
domains: ['test.local']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 3000 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: {
|
||||
email: 'test@local.dev',
|
||||
useProduction: false
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
});
|
||||
|
||||
// Track callback setting
|
||||
let callbackSet = false;
|
||||
|
||||
// Override createCertificateManager to track callback setting
|
||||
(proxy as any).createCertificateManager = async function(
|
||||
routes: any,
|
||||
certStore: string,
|
||||
acmeOptions?: any,
|
||||
initialState?: any
|
||||
) {
|
||||
// Create a mock certificate manager
|
||||
const mockCertManager = {
|
||||
setUpdateRoutesCallback: function(callback: any) {
|
||||
callbackSet = true;
|
||||
},
|
||||
setHttpProxy: function() {},
|
||||
setGlobalAcmeDefaults: function() {},
|
||||
setAcmeStateManager: function() {},
|
||||
initialize: async function() {},
|
||||
provisionAllCertificates: async function() {},
|
||||
stop: async function() {},
|
||||
getAcmeOptions: function() { return acmeOptions || {}; },
|
||||
getState: function() { return initialState || { challengeRouteActive: false }; }
|
||||
};
|
||||
|
||||
// Mimic the real createCertificateManager behavior
|
||||
// Always set up the route update callback for ACME challenges
|
||||
mockCertManager.setUpdateRoutesCallback(async (routes) => {
|
||||
await this.updateRoutes(routes);
|
||||
});
|
||||
|
||||
// Connect with HttpProxy if available (mimic real behavior)
|
||||
if ((this as any).httpProxyBridge.getHttpProxy()) {
|
||||
mockCertManager.setHttpProxy((this as any).httpProxyBridge.getHttpProxy());
|
||||
}
|
||||
|
||||
// Set the ACME state manager
|
||||
mockCertManager.setAcmeStateManager((this as any).acmeStateManager);
|
||||
|
||||
// Pass down the global ACME config if available
|
||||
if ((this as any).settings.acme) {
|
||||
mockCertManager.setGlobalAcmeDefaults((this as any).settings.acme);
|
||||
}
|
||||
|
||||
await mockCertManager.initialize();
|
||||
return mockCertManager;
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// The callback should have been set during initialization
|
||||
expect(callbackSet).toEqual(true);
|
||||
|
||||
// Reset tracking
|
||||
callbackSet = false;
|
||||
|
||||
// Update routes - this should recreate the certificate manager
|
||||
await proxy.updateRoutes([{
|
||||
name: 'new-route',
|
||||
match: {
|
||||
ports: [8444],
|
||||
domains: ['new.local']
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: { host: 'localhost', port: 3001 },
|
||||
tls: {
|
||||
mode: 'terminate',
|
||||
certificate: 'auto',
|
||||
acme: {
|
||||
email: 'test@local.dev',
|
||||
useProduction: false
|
||||
}
|
||||
}
|
||||
}
|
||||
}]);
|
||||
|
||||
// The callback should have been set again after update
|
||||
expect(callbackSet).toEqual(true);
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.start();
|
@ -1,7 +1,7 @@
|
||||
/**
|
||||
* Tests for the unified route-based configuration system
|
||||
*/
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
|
||||
// Import from core modules
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
|
98
test/test.route-redirects.ts
Normal file
98
test/test.route-redirects.ts
Normal file
@ -0,0 +1,98 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
import { createHttpToHttpsRedirect } from '../ts/proxies/smart-proxy/utils/route-helpers.js';
|
||||
import type { IRouteConfig } from '../ts/proxies/smart-proxy/models/route-types.js';
|
||||
|
||||
// Test that HTTP to HTTPS redirects work correctly
|
||||
tap.test('should handle HTTP to HTTPS redirects', async (tools) => {
|
||||
// Create a simple HTTP to HTTPS redirect route
|
||||
const redirectRoute = createHttpToHttpsRedirect(
|
||||
'example.com',
|
||||
443,
|
||||
{
|
||||
name: 'HTTP to HTTPS Redirect Test'
|
||||
}
|
||||
);
|
||||
|
||||
// Verify the route is configured correctly
|
||||
expect(redirectRoute.action.type).toEqual('redirect');
|
||||
expect(redirectRoute.action.redirect).toBeTruthy();
|
||||
expect(redirectRoute.action.redirect?.to).toEqual('https://{domain}:443{path}');
|
||||
expect(redirectRoute.action.redirect?.status).toEqual(301);
|
||||
expect(redirectRoute.match.ports).toEqual(80);
|
||||
expect(redirectRoute.match.domains).toEqual('example.com');
|
||||
});
|
||||
|
||||
tap.test('should handle custom redirect configurations', async (tools) => {
|
||||
// Create a custom redirect route
|
||||
const customRedirect: IRouteConfig = {
|
||||
name: 'custom-redirect',
|
||||
match: {
|
||||
ports: [8080],
|
||||
domains: ['old.example.com']
|
||||
},
|
||||
action: {
|
||||
type: 'redirect',
|
||||
redirect: {
|
||||
to: 'https://new.example.com{path}',
|
||||
status: 302
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
// Verify the route structure
|
||||
expect(customRedirect.action.redirect?.to).toEqual('https://new.example.com{path}');
|
||||
expect(customRedirect.action.redirect?.status).toEqual(302);
|
||||
});
|
||||
|
||||
tap.test('should support multiple redirect scenarios', async (tools) => {
|
||||
const routes: IRouteConfig[] = [
|
||||
// HTTP to HTTPS redirect
|
||||
createHttpToHttpsRedirect(['example.com', 'www.example.com']),
|
||||
|
||||
// Custom redirect with different port
|
||||
{
|
||||
name: 'custom-port-redirect',
|
||||
match: {
|
||||
ports: 8080,
|
||||
domains: 'api.example.com'
|
||||
},
|
||||
action: {
|
||||
type: 'redirect',
|
||||
redirect: {
|
||||
to: 'https://{domain}:8443{path}',
|
||||
status: 308
|
||||
}
|
||||
}
|
||||
},
|
||||
|
||||
// Redirect to different domain entirely
|
||||
{
|
||||
name: 'domain-redirect',
|
||||
match: {
|
||||
ports: 80,
|
||||
domains: 'old-domain.com'
|
||||
},
|
||||
action: {
|
||||
type: 'redirect',
|
||||
redirect: {
|
||||
to: 'https://new-domain.com{path}',
|
||||
status: 301
|
||||
}
|
||||
}
|
||||
}
|
||||
];
|
||||
|
||||
// Create SmartProxy with redirect routes
|
||||
const proxy = new SmartProxy({
|
||||
routes
|
||||
});
|
||||
|
||||
// Verify all routes are redirect type
|
||||
routes.forEach(route => {
|
||||
expect(route.action.type).toEqual('redirect');
|
||||
expect(route.action.redirect).toBeTruthy();
|
||||
});
|
||||
});
|
||||
|
||||
export default tap.start();
|
@ -1,6 +1,6 @@
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
import { tap, expect } from '@push.rocks/tapbundle';
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
|
||||
let testProxy: SmartProxy;
|
||||
|
||||
@ -53,15 +53,31 @@ tap.test('should preserve route update callback after updateRoutes', async () =>
|
||||
this.updateRoutesCallback = callback;
|
||||
},
|
||||
updateRoutesCallback: null,
|
||||
setNetworkProxy: function() {},
|
||||
initialize: async function() {},
|
||||
setHttpProxy: function() {},
|
||||
setGlobalAcmeDefaults: function() {},
|
||||
setAcmeStateManager: function() {},
|
||||
initialize: async function() {
|
||||
// This is where the callback is actually set in the real implementation
|
||||
return Promise.resolve();
|
||||
},
|
||||
provisionAllCertificates: async function() {
|
||||
return Promise.resolve();
|
||||
},
|
||||
stop: async function() {},
|
||||
getAcmeOptions: function() {
|
||||
return { email: 'test@testdomain.test' };
|
||||
},
|
||||
getState: function() {
|
||||
return { challengeRouteActive: false };
|
||||
}
|
||||
};
|
||||
|
||||
(this as any).certManager = mockCertManager;
|
||||
|
||||
// Simulate the real behavior where setUpdateRoutesCallback is called
|
||||
mockCertManager.setUpdateRoutesCallback(async (routes: any) => {
|
||||
await this.updateRoutes(routes);
|
||||
});
|
||||
};
|
||||
|
||||
// Start the proxy (with mocked cert manager)
|
||||
@ -82,36 +98,41 @@ tap.test('should preserve route update callback after updateRoutes', async () =>
|
||||
createRoute(2, 'test2.testdomain.test', 8444)
|
||||
];
|
||||
|
||||
// Mock the updateRoutes to create a new mock cert manager
|
||||
const originalUpdateRoutes = testProxy.updateRoutes.bind(testProxy);
|
||||
// Mock the updateRoutes to simulate the real implementation
|
||||
testProxy.updateRoutes = async function(routes) {
|
||||
// Update settings
|
||||
this.settings.routes = routes;
|
||||
|
||||
// Recreate cert manager (simulating the bug scenario)
|
||||
// Simulate what happens in the real code - recreate cert manager via createCertificateManager
|
||||
if ((this as any).certManager) {
|
||||
await (this as any).certManager.stop();
|
||||
|
||||
// Simulate createCertificateManager which creates a new cert manager
|
||||
const newMockCertManager = {
|
||||
setUpdateRoutesCallback: function(callback: any) {
|
||||
this.updateRoutesCallback = callback;
|
||||
},
|
||||
updateRoutesCallback: null,
|
||||
setNetworkProxy: function() {},
|
||||
setHttpProxy: function() {},
|
||||
setGlobalAcmeDefaults: function() {},
|
||||
setAcmeStateManager: function() {},
|
||||
initialize: async function() {},
|
||||
provisionAllCertificates: async function() {},
|
||||
stop: async function() {},
|
||||
getAcmeOptions: function() {
|
||||
return { email: 'test@testdomain.test' };
|
||||
},
|
||||
getState: function() {
|
||||
return { challengeRouteActive: false };
|
||||
}
|
||||
};
|
||||
|
||||
(this as any).certManager = newMockCertManager;
|
||||
|
||||
// THIS IS THE FIX WE'RE TESTING - the callback should be set
|
||||
(this as any).certManager.setUpdateRoutesCallback(async (routes: any) => {
|
||||
// Set the callback as done in createCertificateManager
|
||||
newMockCertManager.setUpdateRoutesCallback(async (routes: any) => {
|
||||
await this.updateRoutes(routes);
|
||||
});
|
||||
|
||||
(this as any).certManager = newMockCertManager;
|
||||
await (this as any).certManager.initialize();
|
||||
}
|
||||
};
|
||||
@ -214,11 +235,15 @@ tap.test('should handle route updates when cert manager is not initialized', asy
|
||||
this.updateRoutesCallback = callback;
|
||||
},
|
||||
updateRoutesCallback: null,
|
||||
setNetworkProxy: function() {},
|
||||
setHttpProxy: function() {},
|
||||
initialize: async function() {},
|
||||
provisionAllCertificates: async function() {},
|
||||
stop: async function() {},
|
||||
getAcmeOptions: function() {
|
||||
return { email: 'test@testdomain.test' };
|
||||
},
|
||||
getState: function() {
|
||||
return { challengeRouteActive: false };
|
||||
}
|
||||
};
|
||||
|
||||
@ -239,10 +264,10 @@ tap.test('should handle route updates when cert manager is not initialized', asy
|
||||
// Update with routes that need certificates
|
||||
await proxyWithoutCerts.updateRoutes([createRoute(1, 'cert-needed.testdomain.test', 9443)]);
|
||||
|
||||
// Now it should have a cert manager with callback
|
||||
// In the real implementation, cert manager is not created by updateRoutes if it doesn't exist
|
||||
// This is the expected behavior - cert manager is only created during start() or re-created if already exists
|
||||
const newCertManager = (proxyWithoutCerts as any).certManager;
|
||||
expect(newCertManager).toBeTruthy();
|
||||
expect(newCertManager.updateRoutesCallback).toBeTruthy();
|
||||
expect(newCertManager).toBeFalsy(); // Should still be null
|
||||
|
||||
await proxyWithoutCerts.stop();
|
||||
});
|
||||
@ -252,67 +277,59 @@ tap.test('should clean up properly', async () => {
|
||||
});
|
||||
|
||||
tap.test('real code integration test - verify fix is applied', async () => {
|
||||
// This test will run against the actual code (not mocked) to verify the fix is working
|
||||
// This test will start with routes that need certificates to test the fix
|
||||
const realProxy = new SmartProxy({
|
||||
routes: [{
|
||||
name: 'simple-route',
|
||||
match: {
|
||||
ports: [9999]
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: {
|
||||
host: 'localhost',
|
||||
port: 3000
|
||||
}
|
||||
}
|
||||
}]
|
||||
routes: [createRoute(1, 'test.example.com', 9999)],
|
||||
acme: {
|
||||
email: 'test@example.com',
|
||||
useProduction: false,
|
||||
port: 18080
|
||||
}
|
||||
});
|
||||
|
||||
// Mock only the ACME initialization to avoid certificate provisioning issues
|
||||
let mockCertManager: any;
|
||||
(realProxy as any).initializeCertificateManager = async function() {
|
||||
const hasAutoRoutes = this.settings.routes.some((r: any) =>
|
||||
r.action.tls?.certificate === 'auto'
|
||||
);
|
||||
|
||||
if (!hasAutoRoutes) {
|
||||
return;
|
||||
}
|
||||
|
||||
mockCertManager = {
|
||||
// Mock the certificate manager creation to track callback setting
|
||||
let callbackSet = false;
|
||||
(realProxy as any).createCertificateManager = async function(routes: any[], certDir: string, acmeOptions: any, initialState?: any) {
|
||||
const mockCertManager = {
|
||||
setUpdateRoutesCallback: function(callback: any) {
|
||||
callbackSet = true;
|
||||
this.updateRoutesCallback = callback;
|
||||
},
|
||||
updateRoutesCallback: null as any,
|
||||
setNetworkProxy: function() {},
|
||||
setHttpProxy: function() {},
|
||||
setGlobalAcmeDefaults: function() {},
|
||||
setAcmeStateManager: function() {},
|
||||
initialize: async function() {},
|
||||
provisionAllCertificates: async function() {},
|
||||
stop: async function() {},
|
||||
getAcmeOptions: function() {
|
||||
return { email: 'test@example.com', useProduction: false };
|
||||
return acmeOptions || { email: 'test@example.com', useProduction: false };
|
||||
},
|
||||
getState: function() {
|
||||
return initialState || { challengeRouteActive: false };
|
||||
}
|
||||
};
|
||||
|
||||
(this as any).certManager = mockCertManager;
|
||||
|
||||
// The fix should cause this callback to be set automatically
|
||||
mockCertManager.setUpdateRoutesCallback(async (routes: any) => {
|
||||
// Always set up the route update callback for ACME challenges
|
||||
mockCertManager.setUpdateRoutesCallback(async (routes) => {
|
||||
await this.updateRoutes(routes);
|
||||
});
|
||||
|
||||
return mockCertManager;
|
||||
};
|
||||
|
||||
await realProxy.start();
|
||||
|
||||
// Add a route that requires certificates - this will trigger updateRoutes
|
||||
const newRoute = createRoute(1, 'test.example.com', 9999);
|
||||
await realProxy.updateRoutes([newRoute]);
|
||||
// The callback should have been set during initialization
|
||||
expect(callbackSet).toEqual(true);
|
||||
callbackSet = false; // Reset for update test
|
||||
|
||||
// If the fix is applied correctly, the certificate manager should have the callback
|
||||
const certManager = (realProxy as any).certManager;
|
||||
// Update routes - this should recreate cert manager with callback preserved
|
||||
const newRoute = createRoute(2, 'test2.example.com', 9999);
|
||||
await realProxy.updateRoutes([createRoute(1, 'test.example.com', 9999), newRoute]);
|
||||
|
||||
// This is the critical assertion - the fix should ensure this callback is set
|
||||
expect(certManager).toBeTruthy();
|
||||
expect(certManager.updateRoutesCallback).toBeTruthy();
|
||||
// The callback should have been set again during update
|
||||
expect(callbackSet).toEqual(true);
|
||||
|
||||
await realProxy.stop();
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { tap, expect } from '@push.rocks/tapbundle';
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
|
||||
// Import from individual modules to avoid naming conflicts
|
||||
|
@ -1,7 +1,7 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as tsclass from '@tsclass/tsclass';
|
||||
import * as http from 'http';
|
||||
import { ProxyRouter, type RouterResult } from '../ts/http/router/proxy-router.js';
|
||||
import { ProxyRouter, type RouterResult } from '../ts/routing/router/proxy-router.js';
|
||||
|
||||
// Test proxies and configurations
|
||||
let router: ProxyRouter;
|
||||
|
88
test/test.simple-acme-mock.ts
Normal file
88
test/test.simple-acme-mock.ts
Normal file
@ -0,0 +1,88 @@
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartProxy } from '../ts/index.js';
|
||||
|
||||
/**
|
||||
* Simple test to check route manager initialization with ACME
|
||||
*/
|
||||
tap.test('should properly initialize with ACME configuration', async (tools) => {
|
||||
const settings = {
|
||||
routes: [
|
||||
{
|
||||
name: 'secure-route',
|
||||
match: {
|
||||
ports: [8443],
|
||||
domains: 'test.example.com'
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: { host: 'localhost', port: 8080 },
|
||||
tls: {
|
||||
mode: 'terminate' as const,
|
||||
certificate: 'auto' as const,
|
||||
acme: {
|
||||
email: 'ssl@bleu.de',
|
||||
challengePort: 8080
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
acme: {
|
||||
email: 'ssl@bleu.de',
|
||||
port: 8080,
|
||||
useProduction: false,
|
||||
enabled: true
|
||||
}
|
||||
};
|
||||
|
||||
const proxy = new SmartProxy(settings);
|
||||
|
||||
// Replace the certificate manager creation to avoid real ACME requests
|
||||
(proxy as any).createCertificateManager = async () => {
|
||||
return {
|
||||
setUpdateRoutesCallback: () => {},
|
||||
setHttpProxy: () => {},
|
||||
setGlobalAcmeDefaults: () => {},
|
||||
setAcmeStateManager: () => {},
|
||||
initialize: async () => {
|
||||
// Using logger would be better but in test we'll keep console.log
|
||||
console.log('Mock certificate manager initialized');
|
||||
},
|
||||
provisionAllCertificates: async () => {
|
||||
console.log('Mock certificate provisioning');
|
||||
},
|
||||
stop: async () => {
|
||||
console.log('Mock certificate manager stopped');
|
||||
}
|
||||
};
|
||||
};
|
||||
|
||||
// Mock NFTables
|
||||
(proxy as any).nftablesManager = {
|
||||
provisionRoute: async () => {},
|
||||
deprovisionRoute: async () => {},
|
||||
updateRoute: async () => {},
|
||||
getStatus: async () => ({}),
|
||||
stop: async () => {}
|
||||
};
|
||||
|
||||
await proxy.start();
|
||||
|
||||
// Verify proxy started successfully
|
||||
expect(proxy).toBeDefined();
|
||||
|
||||
// Verify route manager has routes
|
||||
const routeManager = (proxy as any).routeManager;
|
||||
expect(routeManager).toBeDefined();
|
||||
expect(routeManager.getAllRoutes().length).toBeGreaterThan(0);
|
||||
|
||||
// Verify the route exists with correct domain
|
||||
const routes = routeManager.getAllRoutes();
|
||||
const secureRoute = routes.find((r: any) => r.name === 'secure-route');
|
||||
expect(secureRoute).toBeDefined();
|
||||
expect(secureRoute.match.domains).toEqual('test.example.com');
|
||||
|
||||
await proxy.stop();
|
||||
});
|
||||
|
||||
tap.start();
|
@ -1,5 +1,5 @@
|
||||
import * as plugins from '../ts/plugins.js';
|
||||
import { tap, expect } from '@push.rocks/tapbundle';
|
||||
import { tap, expect } from '@git.zone/tstest/tapbundle';
|
||||
import { SmartCertManager } from '../ts/proxies/smart-proxy/certificate-manager.js';
|
||||
import type { IRouteConfig } from '../ts/proxies/smart-proxy/models/route-types.js';
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import { expect, tap } from '@git.zone/tstest/tapbundle';
|
||||
import * as net from 'net';
|
||||
import { SmartProxy } from '../ts/proxies/smart-proxy/index.js';
|
||||
|
||||
|
@ -3,6 +3,6 @@
|
||||
*/
|
||||
export const commitinfo = {
|
||||
name: '@push.rocks/smartproxy',
|
||||
version: '19.2.3',
|
||||
version: '19.3.13',
|
||||
description: 'A powerful proxy package with unified route-based configuration for high traffic management. Features include SSL/TLS support, flexible routing patterns, WebSocket handling, advanced security options, and automatic ACME certificate management.'
|
||||
}
|
||||
|
@ -1,111 +0,0 @@
|
||||
import * as plugins from '../plugins.js';
|
||||
|
||||
import type {
|
||||
IForwardConfig as ILegacyForwardConfig,
|
||||
IDomainOptions
|
||||
} from './types.js';
|
||||
|
||||
import type {
|
||||
IForwardConfig
|
||||
} from '../forwarding/config/forwarding-types.js';
|
||||
|
||||
/**
|
||||
* Converts a forwarding configuration target to the legacy format
|
||||
* for Port80Handler
|
||||
*/
|
||||
export function convertToLegacyForwardConfig(
|
||||
forwardConfig: IForwardConfig
|
||||
): ILegacyForwardConfig {
|
||||
// Determine host from the target configuration
|
||||
const host = Array.isArray(forwardConfig.target.host)
|
||||
? forwardConfig.target.host[0] // Use the first host in the array
|
||||
: forwardConfig.target.host;
|
||||
|
||||
// Extract port number, handling different port formats
|
||||
let port: number;
|
||||
if (typeof forwardConfig.target.port === 'function') {
|
||||
// Use a default port for function-based ports in adapter context
|
||||
port = 80;
|
||||
} else if (forwardConfig.target.port === 'preserve') {
|
||||
// For 'preserve', use the default port 80 in this adapter context
|
||||
port = 80;
|
||||
} else {
|
||||
port = forwardConfig.target.port;
|
||||
}
|
||||
|
||||
return {
|
||||
ip: host,
|
||||
port: port
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates Port80Handler domain options from a domain name and forwarding config
|
||||
*/
|
||||
export function createPort80HandlerOptions(
|
||||
domain: string,
|
||||
forwardConfig: IForwardConfig
|
||||
): IDomainOptions {
|
||||
// Determine if we should redirect HTTP to HTTPS
|
||||
let sslRedirect = false;
|
||||
if (forwardConfig.http?.redirectToHttps) {
|
||||
sslRedirect = true;
|
||||
}
|
||||
|
||||
// Determine if ACME maintenance should be enabled
|
||||
// Enable by default for termination types, unless explicitly disabled
|
||||
const requiresTls =
|
||||
forwardConfig.type === 'https-terminate-to-http' ||
|
||||
forwardConfig.type === 'https-terminate-to-https';
|
||||
|
||||
const acmeMaintenance =
|
||||
requiresTls &&
|
||||
forwardConfig.acme?.enabled !== false;
|
||||
|
||||
// Set up forwarding configuration
|
||||
const options: IDomainOptions = {
|
||||
domainName: domain,
|
||||
sslRedirect,
|
||||
acmeMaintenance
|
||||
};
|
||||
|
||||
// Add ACME challenge forwarding if configured
|
||||
if (forwardConfig.acme?.forwardChallenges) {
|
||||
options.acmeForward = {
|
||||
ip: Array.isArray(forwardConfig.acme.forwardChallenges.host)
|
||||
? forwardConfig.acme.forwardChallenges.host[0]
|
||||
: forwardConfig.acme.forwardChallenges.host,
|
||||
port: forwardConfig.acme.forwardChallenges.port
|
||||
};
|
||||
}
|
||||
|
||||
// Add HTTP forwarding if this is an HTTP-only config or if HTTP is enabled
|
||||
const supportsHttp =
|
||||
forwardConfig.type === 'http-only' ||
|
||||
(forwardConfig.http?.enabled !== false &&
|
||||
(forwardConfig.type === 'https-terminate-to-http' ||
|
||||
forwardConfig.type === 'https-terminate-to-https'));
|
||||
|
||||
if (supportsHttp) {
|
||||
// Determine port value handling different formats
|
||||
let port: number;
|
||||
if (typeof forwardConfig.target.port === 'function') {
|
||||
// Use a default port for function-based ports
|
||||
port = 80;
|
||||
} else if (forwardConfig.target.port === 'preserve') {
|
||||
// For 'preserve', use 80 in this adapter context
|
||||
port = 80;
|
||||
} else {
|
||||
port = forwardConfig.target.port;
|
||||
}
|
||||
|
||||
options.forward = {
|
||||
ip: Array.isArray(forwardConfig.target.host)
|
||||
? forwardConfig.target.host[0]
|
||||
: forwardConfig.target.host,
|
||||
port: port
|
||||
};
|
||||
}
|
||||
|
||||
return options;
|
||||
}
|
@ -12,3 +12,4 @@ export * from './security-utils.js';
|
||||
export * from './shared-security-manager.js';
|
||||
export * from './event-system.js';
|
||||
export * from './websocket-utils.js';
|
||||
export * from './logger.js';
|
||||
|
10
ts/core/utils/logger.ts
Normal file
10
ts/core/utils/logger.ts
Normal file
@ -0,0 +1,10 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
|
||||
export const logger = new plugins.smartlog.Smartlog({
|
||||
logContext: {},
|
||||
minimumLogLevel: 'info',
|
||||
});
|
||||
|
||||
logger.addLogDestination(new plugins.smartlogDestinationLocal.DestinationLocal());
|
||||
|
||||
logger.log('info', 'Logger initialized');
|
@ -52,6 +52,13 @@ export class ForwardingHandlerFactory {
|
||||
enabled: true,
|
||||
...config.http
|
||||
};
|
||||
// Set default port and socket if not provided
|
||||
if (!result.port) {
|
||||
result.port = 80;
|
||||
}
|
||||
if (!result.socket) {
|
||||
result.socket = `/tmp/forwarding-${config.type}-${result.port}.sock`;
|
||||
}
|
||||
break;
|
||||
|
||||
case 'https-passthrough':
|
||||
@ -65,6 +72,13 @@ export class ForwardingHandlerFactory {
|
||||
enabled: false,
|
||||
...config.http
|
||||
};
|
||||
// Set default port and socket if not provided
|
||||
if (!result.port) {
|
||||
result.port = 443;
|
||||
}
|
||||
if (!result.socket) {
|
||||
result.socket = `/tmp/forwarding-${config.type}-${result.port}.sock`;
|
||||
}
|
||||
break;
|
||||
|
||||
case 'https-terminate-to-http':
|
||||
@ -84,6 +98,13 @@ export class ForwardingHandlerFactory {
|
||||
maintenance: true,
|
||||
...config.acme
|
||||
};
|
||||
// Set default port and socket if not provided
|
||||
if (!result.port) {
|
||||
result.port = 443;
|
||||
}
|
||||
if (!result.socket) {
|
||||
result.socket = `/tmp/forwarding-${config.type}-${result.port}.sock`;
|
||||
}
|
||||
break;
|
||||
|
||||
case 'https-terminate-to-https':
|
||||
@ -101,6 +122,13 @@ export class ForwardingHandlerFactory {
|
||||
maintenance: true,
|
||||
...config.acme
|
||||
};
|
||||
// Set default port and socket if not provided
|
||||
if (!result.port) {
|
||||
result.port = 443;
|
||||
}
|
||||
if (!result.socket) {
|
||||
result.socket = `/tmp/forwarding-${config.type}-${result.port}.sock`;
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
|
@ -1,16 +0,0 @@
|
||||
/**
|
||||
* HTTP functionality module
|
||||
*/
|
||||
|
||||
// Export types and models
|
||||
export * from './models/http-types.js';
|
||||
|
||||
// Export submodules (remove port80 export)
|
||||
export * from './router/index.js';
|
||||
export * from './redirects/index.js';
|
||||
// REMOVED: export * from './port80/index.js';
|
||||
|
||||
// Convenience namespace exports (no more Port80)
|
||||
export const Http = {
|
||||
// Only router and redirect functionality remain
|
||||
};
|
@ -1,108 +0,0 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
// Certificate types have been removed - use SmartCertManager instead
|
||||
export interface IDomainOptions {
|
||||
domainName: string;
|
||||
sslRedirect: boolean;
|
||||
acmeMaintenance: boolean;
|
||||
forward?: { ip: string; port: number };
|
||||
acmeForward?: { ip: string; port: number };
|
||||
}
|
||||
|
||||
/**
|
||||
* HTTP-specific event types
|
||||
*/
|
||||
export enum HttpEvents {
|
||||
REQUEST_RECEIVED = 'request-received',
|
||||
REQUEST_FORWARDED = 'request-forwarded',
|
||||
REQUEST_HANDLED = 'request-handled',
|
||||
REQUEST_ERROR = 'request-error',
|
||||
}
|
||||
|
||||
/**
|
||||
* HTTP status codes as an enum for better type safety
|
||||
*/
|
||||
export enum HttpStatus {
|
||||
OK = 200,
|
||||
MOVED_PERMANENTLY = 301,
|
||||
FOUND = 302,
|
||||
TEMPORARY_REDIRECT = 307,
|
||||
PERMANENT_REDIRECT = 308,
|
||||
BAD_REQUEST = 400,
|
||||
NOT_FOUND = 404,
|
||||
METHOD_NOT_ALLOWED = 405,
|
||||
INTERNAL_SERVER_ERROR = 500,
|
||||
NOT_IMPLEMENTED = 501,
|
||||
SERVICE_UNAVAILABLE = 503,
|
||||
}
|
||||
|
||||
/**
|
||||
* Represents a domain configuration with certificate status information
|
||||
*/
|
||||
export interface IDomainCertificate {
|
||||
options: IDomainOptions;
|
||||
certObtained: boolean;
|
||||
obtainingInProgress: boolean;
|
||||
certificate?: string;
|
||||
privateKey?: string;
|
||||
expiryDate?: Date;
|
||||
lastRenewalAttempt?: Date;
|
||||
}
|
||||
|
||||
/**
|
||||
* Base error class for HTTP-related errors
|
||||
*/
|
||||
export class HttpError extends Error {
|
||||
constructor(message: string) {
|
||||
super(message);
|
||||
this.name = 'HttpError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Error related to certificate operations
|
||||
*/
|
||||
export class CertificateError extends HttpError {
|
||||
constructor(
|
||||
message: string,
|
||||
public readonly domain: string,
|
||||
public readonly isRenewal: boolean = false
|
||||
) {
|
||||
super(`${message} for domain ${domain}${isRenewal ? ' (renewal)' : ''}`);
|
||||
this.name = 'CertificateError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Error related to server operations
|
||||
*/
|
||||
export class ServerError extends HttpError {
|
||||
constructor(message: string, public readonly code?: string) {
|
||||
super(message);
|
||||
this.name = 'ServerError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Redirect configuration for HTTP requests
|
||||
*/
|
||||
export interface IRedirectConfig {
|
||||
source: string; // Source path or pattern
|
||||
destination: string; // Destination URL
|
||||
type: HttpStatus; // Redirect status code
|
||||
preserveQuery?: boolean; // Whether to preserve query parameters
|
||||
}
|
||||
|
||||
/**
|
||||
* HTTP router configuration
|
||||
*/
|
||||
export interface IRouterConfig {
|
||||
routes: Array<{
|
||||
path: string;
|
||||
handler: (req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse) => void;
|
||||
}>;
|
||||
notFoundHandler?: (req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse) => void;
|
||||
}
|
||||
|
||||
// Backward compatibility interfaces
|
||||
export { HttpError as Port80HandlerError };
|
||||
export { CertificateError as CertError };
|
@ -1,3 +0,0 @@
|
||||
/**
|
||||
* HTTP redirects
|
||||
*/
|
22
ts/index.ts
22
ts/index.ts
@ -6,19 +6,23 @@
|
||||
// Migrated to the new proxies structure
|
||||
export * from './proxies/nftables-proxy/index.js';
|
||||
|
||||
// Export NetworkProxy elements selectively to avoid RouteManager ambiguity
|
||||
export { NetworkProxy, CertificateManager, ConnectionPool, RequestHandler, WebSocketHandler } from './proxies/network-proxy/index.js';
|
||||
export type { IMetricsTracker, MetricsTracker } from './proxies/network-proxy/index.js';
|
||||
// Export HttpProxy elements selectively to avoid RouteManager ambiguity
|
||||
export { HttpProxy, CertificateManager, ConnectionPool, RequestHandler, WebSocketHandler } from './proxies/http-proxy/index.js';
|
||||
export type { IMetricsTracker, MetricsTracker } from './proxies/http-proxy/index.js';
|
||||
// Export models except IAcmeOptions to avoid conflict
|
||||
export type { INetworkProxyOptions, ICertificateEntry, ILogger } from './proxies/network-proxy/models/types.js';
|
||||
export { RouteManager as NetworkProxyRouteManager } from './proxies/network-proxy/models/types.js';
|
||||
export type { IHttpProxyOptions, ICertificateEntry, ILogger } from './proxies/http-proxy/models/types.js';
|
||||
export { RouteManager as HttpProxyRouteManager } from './proxies/http-proxy/models/types.js';
|
||||
|
||||
// Backward compatibility exports (deprecated)
|
||||
export { HttpProxy as NetworkProxy } from './proxies/http-proxy/index.js';
|
||||
export type { IHttpProxyOptions as INetworkProxyOptions } from './proxies/http-proxy/models/types.js';
|
||||
export { HttpProxyBridge as NetworkProxyBridge } from './proxies/smart-proxy/index.js';
|
||||
|
||||
// Certificate and Port80 modules have been removed - use SmartCertManager instead
|
||||
|
||||
export * from './redirect/classes.redirect.js';
|
||||
// Redirect module has been removed - use route-based redirects instead
|
||||
|
||||
// Export SmartProxy elements selectively to avoid RouteManager ambiguity
|
||||
export { SmartProxy, ConnectionManager, SecurityManager, TimeoutManager, TlsManager, NetworkProxyBridge, RouteConnectionHandler } from './proxies/smart-proxy/index.js';
|
||||
export { SmartProxy, ConnectionManager, SecurityManager, TimeoutManager, TlsManager, HttpProxyBridge, RouteConnectionHandler, SmartCertManager } from './proxies/smart-proxy/index.js';
|
||||
export { RouteManager } from './proxies/smart-proxy/route-manager.js';
|
||||
// Export smart-proxy models
|
||||
export type { ISmartProxyOptions, IConnectionRecord, IRouteConfig, IRouteMatch, IRouteAction, IRouteTls, IRouteContext } from './proxies/smart-proxy/models/index.js';
|
||||
@ -41,4 +45,4 @@ export type { IAcmeOptions } from './proxies/smart-proxy/models/interfaces.js';
|
||||
export * as forwarding from './forwarding/index.js';
|
||||
// Certificate module has been removed - use SmartCertManager instead
|
||||
export * as tls from './tls/index.js';
|
||||
export * as http from './http/index.js';
|
||||
export * as routing from './routing/index.js';
|
@ -26,6 +26,8 @@ import * as smartcrypto from '@push.rocks/smartcrypto';
|
||||
import * as smartacme from '@push.rocks/smartacme';
|
||||
import * as smartacmePlugins from '@push.rocks/smartacme/dist_ts/smartacme.plugins.js';
|
||||
import * as smartacmeHandlers from '@push.rocks/smartacme/dist_ts/handlers/index.js';
|
||||
import * as smartlog from '@push.rocks/smartlog';
|
||||
import * as smartlogDestinationLocal from '@push.rocks/smartlog/destination-local';
|
||||
import * as taskbuffer from '@push.rocks/taskbuffer';
|
||||
|
||||
export {
|
||||
@ -39,6 +41,8 @@ export {
|
||||
smartacme,
|
||||
smartacmePlugins,
|
||||
smartacmeHandlers,
|
||||
smartlog,
|
||||
smartlogDestinationLocal,
|
||||
taskbuffer,
|
||||
};
|
||||
|
||||
|
@ -2,7 +2,7 @@ import * as plugins from '../../plugins.js';
|
||||
import * as fs from 'fs';
|
||||
import * as path from 'path';
|
||||
import { fileURLToPath } from 'url';
|
||||
import { type INetworkProxyOptions, type ICertificateEntry, type ILogger, createLogger } from './models/types.js';
|
||||
import { type IHttpProxyOptions, type ICertificateEntry, type ILogger, createLogger } from './models/types.js';
|
||||
import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
|
||||
|
||||
/**
|
||||
@ -18,7 +18,7 @@ export class CertificateManager {
|
||||
private logger: ILogger;
|
||||
private httpsServer: plugins.https.Server | null = null;
|
||||
|
||||
constructor(private options: INetworkProxyOptions) {
|
||||
constructor(private options: IHttpProxyOptions) {
|
||||
this.certificateStoreDir = path.resolve(options.acme?.certificateStore || './certs');
|
||||
this.logger = createLogger(options.logLevel || 'info');
|
||||
|
@ -1,5 +1,5 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
import { type INetworkProxyOptions, type IConnectionEntry, type ILogger, createLogger } from './models/types.js';
|
||||
import { type IHttpProxyOptions, type IConnectionEntry, type ILogger, createLogger } from './models/types.js';
|
||||
|
||||
/**
|
||||
* Manages a pool of backend connections for efficient reuse
|
||||
@ -9,7 +9,7 @@ export class ConnectionPool {
|
||||
private roundRobinPositions: Map<string, number> = new Map();
|
||||
private logger: ILogger;
|
||||
|
||||
constructor(private options: INetworkProxyOptions) {
|
||||
constructor(private options: IHttpProxyOptions) {
|
||||
this.logger = createLogger(options.logLevel || 'info');
|
||||
}
|
||||
|
6
ts/proxies/http-proxy/handlers/index.ts
Normal file
6
ts/proxies/http-proxy/handlers/index.ts
Normal file
@ -0,0 +1,6 @@
|
||||
/**
|
||||
* HTTP handlers for various route types
|
||||
*/
|
||||
|
||||
export { RedirectHandler } from './redirect-handler.js';
|
||||
export { StaticHandler } from './static-handler.js';
|
105
ts/proxies/http-proxy/handlers/redirect-handler.ts
Normal file
105
ts/proxies/http-proxy/handlers/redirect-handler.ts
Normal file
@ -0,0 +1,105 @@
|
||||
import * as plugins from '../../../plugins.js';
|
||||
import type { IRouteConfig } from '../../smart-proxy/models/route-types.js';
|
||||
import type { IConnectionRecord } from '../../smart-proxy/models/interfaces.js';
|
||||
import type { ILogger } from '../models/types.js';
|
||||
import { createLogger } from '../models/types.js';
|
||||
import { HttpStatus, getStatusText } from '../models/http-types.js';
|
||||
|
||||
export interface IRedirectHandlerContext {
|
||||
connectionId: string;
|
||||
connectionManager: any; // Avoid circular deps
|
||||
settings: any;
|
||||
logger?: ILogger;
|
||||
}
|
||||
|
||||
/**
|
||||
* Handles HTTP redirect routes
|
||||
*/
|
||||
export class RedirectHandler {
|
||||
/**
|
||||
* Handle redirect routes
|
||||
*/
|
||||
public static async handleRedirect(
|
||||
socket: plugins.net.Socket,
|
||||
route: IRouteConfig,
|
||||
context: IRedirectHandlerContext
|
||||
): Promise<void> {
|
||||
const { connectionId, connectionManager, settings } = context;
|
||||
const logger = context.logger || createLogger(settings.logLevel || 'info');
|
||||
const action = route.action;
|
||||
|
||||
// We should have a redirect configuration
|
||||
if (!action.redirect) {
|
||||
logger.error(`[${connectionId}] Redirect action missing redirect configuration`);
|
||||
socket.end();
|
||||
connectionManager.cleanupConnection({ id: connectionId }, 'missing_redirect');
|
||||
return;
|
||||
}
|
||||
|
||||
// For TLS connections, we can't do redirects at the TCP level
|
||||
// This check should be done before calling this handler
|
||||
|
||||
// Wait for the first HTTP request to perform the redirect
|
||||
const dataListeners: ((chunk: Buffer) => void)[] = [];
|
||||
|
||||
const httpDataHandler = (chunk: Buffer) => {
|
||||
// Remove all data listeners to avoid duplicated processing
|
||||
for (const listener of dataListeners) {
|
||||
socket.removeListener('data', listener);
|
||||
}
|
||||
|
||||
// Parse HTTP request to get path
|
||||
try {
|
||||
const headersEnd = chunk.indexOf('\r\n\r\n');
|
||||
if (headersEnd === -1) {
|
||||
// Not a complete HTTP request, need more data
|
||||
socket.once('data', httpDataHandler);
|
||||
dataListeners.push(httpDataHandler);
|
||||
return;
|
||||
}
|
||||
|
||||
const httpHeaders = chunk.slice(0, headersEnd).toString();
|
||||
const requestLine = httpHeaders.split('\r\n')[0];
|
||||
const [method, path] = requestLine.split(' ');
|
||||
|
||||
// Extract Host header
|
||||
const hostMatch = httpHeaders.match(/Host: (.+?)(\r\n|\r|\n|$)/i);
|
||||
const host = hostMatch ? hostMatch[1].trim() : '';
|
||||
|
||||
// Process the redirect URL with template variables
|
||||
let redirectUrl = action.redirect.to;
|
||||
redirectUrl = redirectUrl.replace(/\{domain\}/g, host);
|
||||
redirectUrl = redirectUrl.replace(/\{path\}/g, path || '');
|
||||
redirectUrl = redirectUrl.replace(/\{port\}/g, socket.localPort?.toString() || '80');
|
||||
|
||||
// Prepare the HTTP redirect response
|
||||
const redirectResponse = [
|
||||
`HTTP/1.1 ${action.redirect.status} Moved`,
|
||||
`Location: ${redirectUrl}`,
|
||||
'Connection: close',
|
||||
'Content-Length: 0',
|
||||
'',
|
||||
'',
|
||||
].join('\r\n');
|
||||
|
||||
if (settings.enableDetailedLogging) {
|
||||
logger.info(
|
||||
`[${connectionId}] Redirecting to ${redirectUrl} with status ${action.redirect.status}`
|
||||
);
|
||||
}
|
||||
|
||||
// Send the redirect response
|
||||
socket.end(redirectResponse);
|
||||
connectionManager.initiateCleanupOnce({ id: connectionId }, 'redirect_complete');
|
||||
} catch (err) {
|
||||
logger.error(`[${connectionId}] Error processing HTTP redirect: ${err}`);
|
||||
socket.end();
|
||||
connectionManager.initiateCleanupOnce({ id: connectionId }, 'redirect_error');
|
||||
}
|
||||
};
|
||||
|
||||
// Setup the HTTP data handler
|
||||
socket.once('data', httpDataHandler);
|
||||
dataListeners.push(httpDataHandler);
|
||||
}
|
||||
}
|
261
ts/proxies/http-proxy/handlers/static-handler.ts
Normal file
261
ts/proxies/http-proxy/handlers/static-handler.ts
Normal file
@ -0,0 +1,261 @@
|
||||
import * as plugins from '../../../plugins.js';
|
||||
import type { IRouteConfig } from '../../smart-proxy/models/route-types.js';
|
||||
import type { IConnectionRecord } from '../../smart-proxy/models/interfaces.js';
|
||||
import type { ILogger } from '../models/types.js';
|
||||
import { createLogger } from '../models/types.js';
|
||||
import type { IRouteContext } from '../../../core/models/route-context.js';
|
||||
import { HttpStatus, getStatusText } from '../models/http-types.js';
|
||||
|
||||
export interface IStaticHandlerContext {
|
||||
connectionId: string;
|
||||
connectionManager: any; // Avoid circular deps
|
||||
settings: any;
|
||||
logger?: ILogger;
|
||||
}
|
||||
|
||||
/**
|
||||
* Handles static routes including ACME challenges
|
||||
*/
|
||||
export class StaticHandler {
|
||||
/**
|
||||
* Handle static routes
|
||||
*/
|
||||
public static async handleStatic(
|
||||
socket: plugins.net.Socket,
|
||||
route: IRouteConfig,
|
||||
context: IStaticHandlerContext,
|
||||
record: IConnectionRecord,
|
||||
initialChunk?: Buffer
|
||||
): Promise<void> {
|
||||
const { connectionId, connectionManager, settings } = context;
|
||||
const logger = context.logger || createLogger(settings.logLevel || 'info');
|
||||
|
||||
if (!route.action.handler) {
|
||||
logger.error(`[${connectionId}] Static route '${route.name}' has no handler`);
|
||||
socket.end();
|
||||
connectionManager.cleanupConnection(record, 'no_handler');
|
||||
return;
|
||||
}
|
||||
|
||||
let buffer = Buffer.alloc(0);
|
||||
let processingData = false;
|
||||
|
||||
const handleHttpData = async (chunk: Buffer) => {
|
||||
// Accumulate the data
|
||||
buffer = Buffer.concat([buffer, chunk]);
|
||||
|
||||
// Prevent concurrent processing of the same buffer
|
||||
if (processingData) return;
|
||||
processingData = true;
|
||||
|
||||
try {
|
||||
// Process data until we have a complete request or need more data
|
||||
await processBuffer();
|
||||
} finally {
|
||||
processingData = false;
|
||||
}
|
||||
};
|
||||
|
||||
const processBuffer = async () => {
|
||||
// Look for end of HTTP headers
|
||||
const headerEndIndex = buffer.indexOf('\r\n\r\n');
|
||||
if (headerEndIndex === -1) {
|
||||
// Need more data
|
||||
if (buffer.length > 8192) {
|
||||
// Prevent excessive buffering
|
||||
logger.error(`[${connectionId}] HTTP headers too large`);
|
||||
socket.end();
|
||||
connectionManager.cleanupConnection(record, 'headers_too_large');
|
||||
}
|
||||
return; // Wait for more data to arrive
|
||||
}
|
||||
|
||||
// Parse the HTTP request
|
||||
const headerBuffer = buffer.slice(0, headerEndIndex);
|
||||
const headers = headerBuffer.toString();
|
||||
const lines = headers.split('\r\n');
|
||||
|
||||
if (lines.length === 0) {
|
||||
logger.error(`[${connectionId}] Invalid HTTP request`);
|
||||
socket.end();
|
||||
connectionManager.cleanupConnection(record, 'invalid_request');
|
||||
return;
|
||||
}
|
||||
|
||||
// Parse request line
|
||||
const requestLine = lines[0];
|
||||
const requestParts = requestLine.split(' ');
|
||||
if (requestParts.length < 3) {
|
||||
logger.error(`[${connectionId}] Invalid HTTP request line`);
|
||||
socket.end();
|
||||
connectionManager.cleanupConnection(record, 'invalid_request_line');
|
||||
return;
|
||||
}
|
||||
|
||||
const [method, path, httpVersion] = requestParts;
|
||||
|
||||
// Parse headers
|
||||
const headersMap: Record<string, string> = {};
|
||||
for (let i = 1; i < lines.length; i++) {
|
||||
const colonIndex = lines[i].indexOf(':');
|
||||
if (colonIndex > 0) {
|
||||
const key = lines[i].slice(0, colonIndex).trim().toLowerCase();
|
||||
const value = lines[i].slice(colonIndex + 1).trim();
|
||||
headersMap[key] = value;
|
||||
}
|
||||
}
|
||||
|
||||
// Check for Content-Length to handle request body
|
||||
const requestBodyLength = parseInt(headersMap['content-length'] || '0', 10);
|
||||
const bodyStartIndex = headerEndIndex + 4; // Skip the \r\n\r\n
|
||||
|
||||
// If there's a body, ensure we have the full body
|
||||
if (requestBodyLength > 0) {
|
||||
const totalExpectedLength = bodyStartIndex + requestBodyLength;
|
||||
|
||||
// If we don't have the complete body yet, wait for more data
|
||||
if (buffer.length < totalExpectedLength) {
|
||||
// Implement a reasonable body size limit to prevent memory issues
|
||||
if (requestBodyLength > 1024 * 1024) {
|
||||
// 1MB limit
|
||||
logger.error(`[${connectionId}] Request body too large`);
|
||||
socket.end();
|
||||
connectionManager.cleanupConnection(record, 'body_too_large');
|
||||
return;
|
||||
}
|
||||
return; // Wait for more data
|
||||
}
|
||||
}
|
||||
|
||||
// Extract query string if present
|
||||
let pathname = path;
|
||||
let query: string | undefined;
|
||||
const queryIndex = path.indexOf('?');
|
||||
if (queryIndex !== -1) {
|
||||
pathname = path.slice(0, queryIndex);
|
||||
query = path.slice(queryIndex + 1);
|
||||
}
|
||||
|
||||
try {
|
||||
// Get request body if present
|
||||
let requestBody: Buffer | undefined;
|
||||
if (requestBodyLength > 0) {
|
||||
requestBody = buffer.slice(bodyStartIndex, bodyStartIndex + requestBodyLength);
|
||||
}
|
||||
|
||||
// Pause socket to prevent data loss during async processing
|
||||
socket.pause();
|
||||
|
||||
// Remove the data listener since we're handling the request
|
||||
socket.removeListener('data', handleHttpData);
|
||||
|
||||
// Build route context with parsed HTTP information
|
||||
const context: IRouteContext = {
|
||||
port: record.localPort,
|
||||
domain: record.lockedDomain || headersMap['host']?.split(':')[0],
|
||||
clientIp: record.remoteIP,
|
||||
serverIp: socket.localAddress!,
|
||||
path: pathname,
|
||||
query: query,
|
||||
headers: headersMap,
|
||||
isTls: record.isTLS,
|
||||
tlsVersion: record.tlsVersion,
|
||||
routeName: route.name,
|
||||
routeId: route.id,
|
||||
timestamp: Date.now(),
|
||||
connectionId,
|
||||
};
|
||||
|
||||
// Since IRouteContext doesn't have a body property,
|
||||
// we need an alternative approach to handle the body
|
||||
let response;
|
||||
|
||||
if (requestBody) {
|
||||
if (settings.enableDetailedLogging) {
|
||||
logger.info(
|
||||
`[${connectionId}] Processing request with body (${requestBody.length} bytes)`
|
||||
);
|
||||
}
|
||||
|
||||
// Pass the body as an additional parameter by extending the context object
|
||||
// This is not type-safe, but it allows handlers that expect a body to work
|
||||
const extendedContext = {
|
||||
...context,
|
||||
// Provide both raw buffer and string representation
|
||||
requestBody: requestBody,
|
||||
requestBodyText: requestBody.toString(),
|
||||
method: method,
|
||||
};
|
||||
|
||||
// Call the handler with the extended context
|
||||
// The handler needs to know to look for the non-standard properties
|
||||
response = await route.action.handler(extendedContext as any);
|
||||
} else {
|
||||
// Call the handler with the standard context
|
||||
const extendedContext = {
|
||||
...context,
|
||||
method: method,
|
||||
};
|
||||
response = await route.action.handler(extendedContext as any);
|
||||
}
|
||||
|
||||
// Prepare the HTTP response
|
||||
const responseHeaders = response.headers || {};
|
||||
const contentLength = Buffer.byteLength(response.body || '');
|
||||
responseHeaders['Content-Length'] = contentLength.toString();
|
||||
|
||||
if (!responseHeaders['Content-Type']) {
|
||||
responseHeaders['Content-Type'] = 'text/plain';
|
||||
}
|
||||
|
||||
// Build the response
|
||||
let httpResponse = `HTTP/1.1 ${response.status} ${getStatusText(response.status)}\r\n`;
|
||||
for (const [key, value] of Object.entries(responseHeaders)) {
|
||||
httpResponse += `${key}: ${value}\r\n`;
|
||||
}
|
||||
httpResponse += '\r\n';
|
||||
|
||||
// Send response
|
||||
socket.write(httpResponse);
|
||||
if (response.body) {
|
||||
socket.write(response.body);
|
||||
}
|
||||
socket.end();
|
||||
|
||||
connectionManager.cleanupConnection(record, 'completed');
|
||||
} catch (error) {
|
||||
logger.error(`[${connectionId}] Error in static handler: ${error}`);
|
||||
|
||||
// Send error response
|
||||
const errorResponse =
|
||||
'HTTP/1.1 500 Internal Server Error\r\n' +
|
||||
'Content-Type: text/plain\r\n' +
|
||||
'Content-Length: 21\r\n' +
|
||||
'\r\n' +
|
||||
'Internal Server Error';
|
||||
socket.write(errorResponse);
|
||||
socket.end();
|
||||
|
||||
connectionManager.cleanupConnection(record, 'handler_error');
|
||||
}
|
||||
};
|
||||
|
||||
// Process initial chunk if provided
|
||||
if (initialChunk && initialChunk.length > 0) {
|
||||
if (settings.enableDetailedLogging) {
|
||||
logger.info(`[${connectionId}] Processing initial data chunk (${initialChunk.length} bytes)`);
|
||||
}
|
||||
// Process the initial chunk immediately
|
||||
handleHttpData(initialChunk);
|
||||
}
|
||||
|
||||
// Listen for additional data
|
||||
socket.on('data', handleHttpData);
|
||||
|
||||
// Ensure cleanup on socket close
|
||||
socket.once('close', () => {
|
||||
socket.removeListener('data', handleHttpData);
|
||||
});
|
||||
}
|
||||
}
|
||||
|
@ -5,7 +5,7 @@ import {
|
||||
convertLegacyConfigToRouteConfig
|
||||
} from './models/types.js';
|
||||
import type {
|
||||
INetworkProxyOptions,
|
||||
IHttpProxyOptions,
|
||||
ILogger,
|
||||
IReverseProxyConfig
|
||||
} from './models/types.js';
|
||||
@ -16,21 +16,22 @@ import { CertificateManager } from './certificate-manager.js';
|
||||
import { ConnectionPool } from './connection-pool.js';
|
||||
import { RequestHandler, type IMetricsTracker } from './request-handler.js';
|
||||
import { WebSocketHandler } from './websocket-handler.js';
|
||||
import { ProxyRouter } from '../../http/router/index.js';
|
||||
import { RouteRouter } from '../../http/router/route-router.js';
|
||||
import { ProxyRouter } from '../../routing/router/index.js';
|
||||
import { RouteRouter } from '../../routing/router/route-router.js';
|
||||
import { FunctionCache } from './function-cache.js';
|
||||
|
||||
/**
|
||||
* NetworkProxy provides a reverse proxy with TLS termination, WebSocket support,
|
||||
* HttpProxy provides a reverse proxy with TLS termination, WebSocket support,
|
||||
* automatic certificate management, and high-performance connection pooling.
|
||||
* Handles all HTTP/HTTPS traffic including redirects, ACME challenges, and static routes.
|
||||
*/
|
||||
export class NetworkProxy implements IMetricsTracker {
|
||||
export class HttpProxy implements IMetricsTracker {
|
||||
// Provide a minimal JSON representation to avoid circular references during deep equality checks
|
||||
public toJSON(): any {
|
||||
return {};
|
||||
}
|
||||
// Configuration
|
||||
public options: INetworkProxyOptions;
|
||||
public options: IHttpProxyOptions;
|
||||
public routes: IRouteConfig[] = [];
|
||||
|
||||
// Server instances (HTTP/2 with HTTP/1 fallback)
|
||||
@ -66,9 +67,9 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
private logger: ILogger;
|
||||
|
||||
/**
|
||||
* Creates a new NetworkProxy instance
|
||||
* Creates a new HttpProxy instance
|
||||
*/
|
||||
constructor(optionsArg: INetworkProxyOptions) {
|
||||
constructor(optionsArg: IHttpProxyOptions) {
|
||||
// Set default options
|
||||
this.options = {
|
||||
port: optionsArg.port,
|
||||
@ -155,7 +156,7 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the port number this NetworkProxy is listening on
|
||||
* Returns the port number this HttpProxy is listening on
|
||||
* Useful for SmartProxy to determine where to forward connections
|
||||
*/
|
||||
public getListeningPort(): number {
|
||||
@ -202,7 +203,7 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
|
||||
/**
|
||||
* Returns current server metrics
|
||||
* Useful for SmartProxy to determine which NetworkProxy to use for load balancing
|
||||
* Useful for SmartProxy to determine which HttpProxy to use for load balancing
|
||||
*/
|
||||
public getMetrics(): any {
|
||||
return {
|
||||
@ -219,21 +220,12 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* @deprecated Use SmartCertManager instead
|
||||
*/
|
||||
public setExternalPort80Handler(handler: any): void {
|
||||
this.logger.warn('Port80Handler is deprecated - use SmartCertManager instead');
|
||||
}
|
||||
|
||||
/**
|
||||
* Starts the proxy server
|
||||
*/
|
||||
public async start(): Promise<void> {
|
||||
this.startTime = Date.now();
|
||||
|
||||
// Certificate management is now handled by SmartCertManager
|
||||
|
||||
// Create HTTP/2 server with HTTP/1 fallback
|
||||
this.httpsServer = plugins.http2.createSecureServer(
|
||||
{
|
||||
@ -268,7 +260,7 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
// Start the server
|
||||
return new Promise((resolve) => {
|
||||
this.httpsServer.listen(this.options.port, () => {
|
||||
this.logger.info(`NetworkProxy started on port ${this.options.port}`);
|
||||
this.logger.info(`HttpProxy started on port ${this.options.port}`);
|
||||
resolve();
|
||||
});
|
||||
});
|
||||
@ -361,7 +353,7 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
}
|
||||
|
||||
/**
|
||||
* Updates the route configurations - this is the primary method for configuring NetworkProxy
|
||||
* Updates the route configurations - this is the primary method for configuring HttpProxy
|
||||
* @param routes The new route configurations to use
|
||||
*/
|
||||
public async updateRouteConfigs(routes: IRouteConfig[]): Promise<void> {
|
||||
@ -512,7 +504,7 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
* Stops the proxy server
|
||||
*/
|
||||
public async stop(): Promise<void> {
|
||||
this.logger.info('Stopping NetworkProxy server');
|
||||
this.logger.info('Stopping HttpProxy server');
|
||||
|
||||
// Clear intervals
|
||||
if (this.metricsInterval) {
|
||||
@ -543,7 +535,7 @@ export class NetworkProxy implements IMetricsTracker {
|
||||
// Close the HTTPS server
|
||||
return new Promise((resolve) => {
|
||||
this.httpsServer.close(() => {
|
||||
this.logger.info('NetworkProxy server stopped successfully');
|
||||
this.logger.info('HttpProxy server stopped successfully');
|
||||
resolve();
|
||||
});
|
||||
});
|
@ -1,11 +1,11 @@
|
||||
/**
|
||||
* NetworkProxy implementation
|
||||
* HttpProxy implementation
|
||||
*/
|
||||
// Re-export models
|
||||
export * from './models/index.js';
|
||||
|
||||
// Export NetworkProxy and supporting classes
|
||||
export { NetworkProxy } from './network-proxy.js';
|
||||
// Export HttpProxy and supporting classes
|
||||
export { HttpProxy } from './http-proxy.js';
|
||||
export { CertificateManager } from './certificate-manager.js';
|
||||
export { ConnectionPool } from './connection-pool.js';
|
||||
export { RequestHandler } from './request-handler.js';
|
165
ts/proxies/http-proxy/models/http-types.ts
Normal file
165
ts/proxies/http-proxy/models/http-types.ts
Normal file
@ -0,0 +1,165 @@
|
||||
import * as plugins from '../../../plugins.js';
|
||||
|
||||
/**
|
||||
* HTTP-specific event types
|
||||
*/
|
||||
export enum HttpEvents {
|
||||
REQUEST_RECEIVED = 'request-received',
|
||||
REQUEST_FORWARDED = 'request-forwarded',
|
||||
REQUEST_HANDLED = 'request-handled',
|
||||
REQUEST_ERROR = 'request-error',
|
||||
}
|
||||
|
||||
/**
|
||||
* HTTP status codes as an enum for better type safety
|
||||
*/
|
||||
export enum HttpStatus {
|
||||
OK = 200,
|
||||
MOVED_PERMANENTLY = 301,
|
||||
FOUND = 302,
|
||||
TEMPORARY_REDIRECT = 307,
|
||||
PERMANENT_REDIRECT = 308,
|
||||
BAD_REQUEST = 400,
|
||||
UNAUTHORIZED = 401,
|
||||
FORBIDDEN = 403,
|
||||
NOT_FOUND = 404,
|
||||
METHOD_NOT_ALLOWED = 405,
|
||||
REQUEST_TIMEOUT = 408,
|
||||
TOO_MANY_REQUESTS = 429,
|
||||
INTERNAL_SERVER_ERROR = 500,
|
||||
NOT_IMPLEMENTED = 501,
|
||||
BAD_GATEWAY = 502,
|
||||
SERVICE_UNAVAILABLE = 503,
|
||||
GATEWAY_TIMEOUT = 504,
|
||||
}
|
||||
|
||||
/**
|
||||
* Base error class for HTTP-related errors
|
||||
*/
|
||||
export class HttpError extends Error {
|
||||
constructor(message: string, public readonly statusCode: HttpStatus = HttpStatus.INTERNAL_SERVER_ERROR) {
|
||||
super(message);
|
||||
this.name = 'HttpError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Error related to certificate operations
|
||||
*/
|
||||
export class CertificateError extends HttpError {
|
||||
constructor(
|
||||
message: string,
|
||||
public readonly domain: string,
|
||||
public readonly isRenewal: boolean = false
|
||||
) {
|
||||
super(`${message} for domain ${domain}${isRenewal ? ' (renewal)' : ''}`, HttpStatus.INTERNAL_SERVER_ERROR);
|
||||
this.name = 'CertificateError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Error related to server operations
|
||||
*/
|
||||
export class ServerError extends HttpError {
|
||||
constructor(message: string, public readonly code?: string, statusCode: HttpStatus = HttpStatus.INTERNAL_SERVER_ERROR) {
|
||||
super(message, statusCode);
|
||||
this.name = 'ServerError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Error for bad requests
|
||||
*/
|
||||
export class BadRequestError extends HttpError {
|
||||
constructor(message: string) {
|
||||
super(message, HttpStatus.BAD_REQUEST);
|
||||
this.name = 'BadRequestError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Error for not found resources
|
||||
*/
|
||||
export class NotFoundError extends HttpError {
|
||||
constructor(message: string = 'Resource not found') {
|
||||
super(message, HttpStatus.NOT_FOUND);
|
||||
this.name = 'NotFoundError';
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Redirect configuration for HTTP requests
|
||||
*/
|
||||
export interface IRedirectConfig {
|
||||
source: string; // Source path or pattern
|
||||
destination: string; // Destination URL
|
||||
type: HttpStatus; // Redirect status code
|
||||
preserveQuery?: boolean; // Whether to preserve query parameters
|
||||
}
|
||||
|
||||
/**
|
||||
* HTTP router configuration
|
||||
*/
|
||||
export interface IRouterConfig {
|
||||
routes: Array<{
|
||||
path: string;
|
||||
method?: string;
|
||||
handler: (req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse) => void | Promise<void>;
|
||||
}>;
|
||||
notFoundHandler?: (req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse) => void;
|
||||
errorHandler?: (error: Error, req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse) => void;
|
||||
}
|
||||
|
||||
/**
|
||||
* HTTP request method types
|
||||
*/
|
||||
export type HttpMethod = 'GET' | 'POST' | 'PUT' | 'DELETE' | 'PATCH' | 'HEAD' | 'OPTIONS' | 'CONNECT' | 'TRACE';
|
||||
|
||||
/**
|
||||
* Helper function to get HTTP status text
|
||||
*/
|
||||
export function getStatusText(status: HttpStatus): string {
|
||||
const statusTexts: Record<HttpStatus, string> = {
|
||||
[HttpStatus.OK]: 'OK',
|
||||
[HttpStatus.MOVED_PERMANENTLY]: 'Moved Permanently',
|
||||
[HttpStatus.FOUND]: 'Found',
|
||||
[HttpStatus.TEMPORARY_REDIRECT]: 'Temporary Redirect',
|
||||
[HttpStatus.PERMANENT_REDIRECT]: 'Permanent Redirect',
|
||||
[HttpStatus.BAD_REQUEST]: 'Bad Request',
|
||||
[HttpStatus.UNAUTHORIZED]: 'Unauthorized',
|
||||
[HttpStatus.FORBIDDEN]: 'Forbidden',
|
||||
[HttpStatus.NOT_FOUND]: 'Not Found',
|
||||
[HttpStatus.METHOD_NOT_ALLOWED]: 'Method Not Allowed',
|
||||
[HttpStatus.REQUEST_TIMEOUT]: 'Request Timeout',
|
||||
[HttpStatus.TOO_MANY_REQUESTS]: 'Too Many Requests',
|
||||
[HttpStatus.INTERNAL_SERVER_ERROR]: 'Internal Server Error',
|
||||
[HttpStatus.NOT_IMPLEMENTED]: 'Not Implemented',
|
||||
[HttpStatus.BAD_GATEWAY]: 'Bad Gateway',
|
||||
[HttpStatus.SERVICE_UNAVAILABLE]: 'Service Unavailable',
|
||||
[HttpStatus.GATEWAY_TIMEOUT]: 'Gateway Timeout',
|
||||
};
|
||||
return statusTexts[status] || 'Unknown';
|
||||
}
|
||||
|
||||
// Legacy interfaces for backward compatibility
|
||||
export interface IDomainOptions {
|
||||
domainName: string;
|
||||
sslRedirect: boolean;
|
||||
acmeMaintenance: boolean;
|
||||
forward?: { ip: string; port: number };
|
||||
acmeForward?: { ip: string; port: number };
|
||||
}
|
||||
|
||||
export interface IDomainCertificate {
|
||||
options: IDomainOptions;
|
||||
certObtained: boolean;
|
||||
obtainingInProgress: boolean;
|
||||
certificate?: string;
|
||||
privateKey?: string;
|
||||
expiryDate?: Date;
|
||||
lastRenewalAttempt?: Date;
|
||||
}
|
||||
|
||||
// Backward compatibility exports
|
||||
export { HttpError as Port80HandlerError };
|
||||
export { CertificateError as CertError };
|
5
ts/proxies/http-proxy/models/index.ts
Normal file
5
ts/proxies/http-proxy/models/index.ts
Normal file
@ -0,0 +1,5 @@
|
||||
/**
|
||||
* HttpProxy models
|
||||
*/
|
||||
export * from './types.js';
|
||||
export * from './http-types.js';
|
@ -16,9 +16,9 @@ import type { IRouteConfig } from '../../smart-proxy/models/route-types.js';
|
||||
import type { IRouteContext } from '../../../core/models/route-context.js';
|
||||
|
||||
/**
|
||||
* Configuration options for NetworkProxy
|
||||
* Configuration options for HttpProxy
|
||||
*/
|
||||
export interface INetworkProxyOptions {
|
||||
export interface IHttpProxyOptions {
|
||||
port: number;
|
||||
maxConnections?: number;
|
||||
keepAliveTimeout?: number;
|
@ -1,14 +1,14 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
import '../../core/models/socket-augmentation.js';
|
||||
import {
|
||||
type INetworkProxyOptions,
|
||||
type IHttpProxyOptions,
|
||||
type ILogger,
|
||||
createLogger,
|
||||
type IReverseProxyConfig,
|
||||
RouteManager
|
||||
} from './models/types.js';
|
||||
import { ConnectionPool } from './connection-pool.js';
|
||||
import { ProxyRouter } from '../../http/router/index.js';
|
||||
import { ProxyRouter } from '../../routing/router/index.js';
|
||||
import { ContextCreator } from './context-creator.js';
|
||||
import { HttpRequestHandler } from './http-request-handler.js';
|
||||
import { Http2RequestHandler } from './http2-request-handler.js';
|
||||
@ -46,7 +46,7 @@ export class RequestHandler {
|
||||
public securityManager: SecurityManager;
|
||||
|
||||
constructor(
|
||||
private options: INetworkProxyOptions,
|
||||
private options: IHttpProxyOptions,
|
||||
private connectionPool: ConnectionPool,
|
||||
private legacyRouter: ProxyRouter, // Legacy router for backward compatibility
|
||||
private routeManager?: RouteManager,
|
@ -1,8 +1,8 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
import '../../core/models/socket-augmentation.js';
|
||||
import { type INetworkProxyOptions, type IWebSocketWithHeartbeat, type ILogger, createLogger, type IReverseProxyConfig } from './models/types.js';
|
||||
import { type IHttpProxyOptions, type IWebSocketWithHeartbeat, type ILogger, createLogger, type IReverseProxyConfig } from './models/types.js';
|
||||
import { ConnectionPool } from './connection-pool.js';
|
||||
import { ProxyRouter, RouteRouter } from '../../http/router/index.js';
|
||||
import { ProxyRouter, RouteRouter } from '../../routing/router/index.js';
|
||||
import type { IRouteConfig } from '../smart-proxy/models/route-types.js';
|
||||
import type { IRouteContext } from '../../core/models/route-context.js';
|
||||
import { toBaseContext } from '../../core/models/route-context.js';
|
||||
@ -23,7 +23,7 @@ export class WebSocketHandler {
|
||||
private securityManager: SecurityManager;
|
||||
|
||||
constructor(
|
||||
private options: INetworkProxyOptions,
|
||||
private options: IHttpProxyOptions,
|
||||
private connectionPool: ConnectionPool,
|
||||
private legacyRouter: ProxyRouter, // Legacy router for backward compatibility
|
||||
private routes: IRouteConfig[] = [] // Routes for modern router
|
@ -2,15 +2,15 @@
|
||||
* Proxy implementations module
|
||||
*/
|
||||
|
||||
// Export NetworkProxy with selective imports to avoid conflicts
|
||||
export { NetworkProxy, CertificateManager, ConnectionPool, RequestHandler, WebSocketHandler } from './network-proxy/index.js';
|
||||
export type { IMetricsTracker, MetricsTracker } from './network-proxy/index.js';
|
||||
// Export network-proxy models except IAcmeOptions
|
||||
export type { INetworkProxyOptions, ICertificateEntry, ILogger } from './network-proxy/models/types.js';
|
||||
export { RouteManager as NetworkProxyRouteManager } from './network-proxy/models/types.js';
|
||||
// Export HttpProxy with selective imports to avoid conflicts
|
||||
export { HttpProxy, CertificateManager, ConnectionPool, RequestHandler, WebSocketHandler } from './http-proxy/index.js';
|
||||
export type { IMetricsTracker, MetricsTracker } from './http-proxy/index.js';
|
||||
// Export http-proxy models except IAcmeOptions
|
||||
export type { IHttpProxyOptions, ICertificateEntry, ILogger } from './http-proxy/models/types.js';
|
||||
export { RouteManager as HttpProxyRouteManager } from './http-proxy/models/types.js';
|
||||
|
||||
// Export SmartProxy with selective imports to avoid conflicts
|
||||
export { SmartProxy, ConnectionManager, SecurityManager, TimeoutManager, TlsManager, NetworkProxyBridge, RouteConnectionHandler } from './smart-proxy/index.js';
|
||||
export { SmartProxy, ConnectionManager, SecurityManager, TimeoutManager, TlsManager, HttpProxyBridge, RouteConnectionHandler } from './smart-proxy/index.js';
|
||||
export { RouteManager as SmartProxyRouteManager } from './smart-proxy/route-manager.js';
|
||||
export * from './smart-proxy/utils/index.js';
|
||||
// Export smart-proxy models except IAcmeOptions
|
||||
|
@ -1,4 +0,0 @@
|
||||
/**
|
||||
* NetworkProxy models
|
||||
*/
|
||||
export * from './types.js';
|
112
ts/proxies/smart-proxy/acme-state-manager.ts
Normal file
112
ts/proxies/smart-proxy/acme-state-manager.ts
Normal file
@ -0,0 +1,112 @@
|
||||
import type { IRouteConfig } from './models/route-types.js';
|
||||
|
||||
/**
|
||||
* Global state store for ACME operations
|
||||
* Tracks active challenge routes and port allocations
|
||||
*/
|
||||
export class AcmeStateManager {
|
||||
private activeChallengeRoutes: Map<string, IRouteConfig> = new Map();
|
||||
private acmePortAllocations: Set<number> = new Set();
|
||||
private primaryChallengeRoute: IRouteConfig | null = null;
|
||||
|
||||
/**
|
||||
* Check if a challenge route is active
|
||||
*/
|
||||
public isChallengeRouteActive(): boolean {
|
||||
return this.activeChallengeRoutes.size > 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Register a challenge route as active
|
||||
*/
|
||||
public addChallengeRoute(route: IRouteConfig): void {
|
||||
this.activeChallengeRoutes.set(route.name, route);
|
||||
|
||||
// Track the primary challenge route
|
||||
if (!this.primaryChallengeRoute || route.priority > (this.primaryChallengeRoute.priority || 0)) {
|
||||
this.primaryChallengeRoute = route;
|
||||
}
|
||||
|
||||
// Track port allocations
|
||||
const ports = Array.isArray(route.match.ports) ? route.match.ports : [route.match.ports];
|
||||
ports.forEach(port => this.acmePortAllocations.add(port));
|
||||
}
|
||||
|
||||
/**
|
||||
* Remove a challenge route
|
||||
*/
|
||||
public removeChallengeRoute(routeName: string): void {
|
||||
const route = this.activeChallengeRoutes.get(routeName);
|
||||
if (!route) return;
|
||||
|
||||
this.activeChallengeRoutes.delete(routeName);
|
||||
|
||||
// Update primary challenge route if needed
|
||||
if (this.primaryChallengeRoute?.name === routeName) {
|
||||
this.primaryChallengeRoute = null;
|
||||
// Find new primary route with highest priority
|
||||
let highestPriority = -1;
|
||||
for (const [_, activeRoute] of this.activeChallengeRoutes) {
|
||||
const priority = activeRoute.priority || 0;
|
||||
if (priority > highestPriority) {
|
||||
highestPriority = priority;
|
||||
this.primaryChallengeRoute = activeRoute;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Update port allocations - only remove if no other routes use this port
|
||||
const ports = Array.isArray(route.match.ports) ? route.match.ports : [route.match.ports];
|
||||
ports.forEach(port => {
|
||||
let portStillUsed = false;
|
||||
for (const [_, activeRoute] of this.activeChallengeRoutes) {
|
||||
const activePorts = Array.isArray(activeRoute.match.ports) ?
|
||||
activeRoute.match.ports : [activeRoute.match.ports];
|
||||
if (activePorts.includes(port)) {
|
||||
portStillUsed = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (!portStillUsed) {
|
||||
this.acmePortAllocations.delete(port);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Get all active challenge routes
|
||||
*/
|
||||
public getActiveChallengeRoutes(): IRouteConfig[] {
|
||||
return Array.from(this.activeChallengeRoutes.values());
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the primary challenge route
|
||||
*/
|
||||
public getPrimaryChallengeRoute(): IRouteConfig | null {
|
||||
return this.primaryChallengeRoute;
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if a port is allocated for ACME
|
||||
*/
|
||||
public isPortAllocatedForAcme(port: number): boolean {
|
||||
return this.acmePortAllocations.has(port);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get all ACME ports
|
||||
*/
|
||||
public getAcmePorts(): number[] {
|
||||
return Array.from(this.acmePortAllocations);
|
||||
}
|
||||
|
||||
/**
|
||||
* Clear all state (for shutdown or reset)
|
||||
*/
|
||||
public clear(): void {
|
||||
this.activeChallengeRoutes.clear();
|
||||
this.acmePortAllocations.clear();
|
||||
this.primaryChallengeRoute = null;
|
||||
}
|
||||
}
|
@ -1,8 +1,10 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
import { NetworkProxy } from '../network-proxy/index.js';
|
||||
import { HttpProxy } from '../http-proxy/index.js';
|
||||
import type { IRouteConfig, IRouteTls } from './models/route-types.js';
|
||||
import type { IAcmeOptions } from './models/interfaces.js';
|
||||
import { CertStore } from './cert-store.js';
|
||||
import type { AcmeStateManager } from './acme-state-manager.js';
|
||||
import { logger } from '../../core/utils/logger.js';
|
||||
|
||||
export interface ICertStatus {
|
||||
domain: string;
|
||||
@ -24,7 +26,7 @@ export interface ICertificateData {
|
||||
export class SmartCertManager {
|
||||
private certStore: CertStore;
|
||||
private smartAcme: plugins.smartacme.SmartAcme | null = null;
|
||||
private networkProxy: NetworkProxy | null = null;
|
||||
private httpProxy: HttpProxy | null = null;
|
||||
private renewalTimer: NodeJS.Timeout | null = null;
|
||||
private pendingChallenges: Map<string, string> = new Map();
|
||||
private challengeRoute: IRouteConfig | null = null;
|
||||
@ -38,6 +40,15 @@ export class SmartCertManager {
|
||||
// Callback to update SmartProxy routes for challenges
|
||||
private updateRoutesCallback?: (routes: IRouteConfig[]) => Promise<void>;
|
||||
|
||||
// Flag to track if challenge route is currently active
|
||||
private challengeRouteActive: boolean = false;
|
||||
|
||||
// Flag to track if provisioning is in progress
|
||||
private isProvisioning: boolean = false;
|
||||
|
||||
// ACME state manager reference
|
||||
private acmeStateManager: AcmeStateManager | null = null;
|
||||
|
||||
constructor(
|
||||
private routes: IRouteConfig[],
|
||||
private certDir: string = './certs',
|
||||
@ -45,13 +56,29 @@ export class SmartCertManager {
|
||||
email?: string;
|
||||
useProduction?: boolean;
|
||||
port?: number;
|
||||
},
|
||||
private initialState?: {
|
||||
challengeRouteActive?: boolean;
|
||||
}
|
||||
) {
|
||||
this.certStore = new CertStore(certDir);
|
||||
|
||||
// Apply initial state if provided
|
||||
if (initialState) {
|
||||
this.challengeRouteActive = initialState.challengeRouteActive || false;
|
||||
}
|
||||
}
|
||||
|
||||
public setNetworkProxy(networkProxy: NetworkProxy): void {
|
||||
this.networkProxy = networkProxy;
|
||||
public setHttpProxy(httpProxy: HttpProxy): void {
|
||||
this.httpProxy = httpProxy;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Set the ACME state manager
|
||||
*/
|
||||
public setAcmeStateManager(stateManager: AcmeStateManager): void {
|
||||
this.acmeStateManager = stateManager;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -96,10 +123,19 @@ export class SmartCertManager {
|
||||
});
|
||||
|
||||
await this.smartAcme.start();
|
||||
|
||||
// Add challenge route once at initialization if not already active
|
||||
if (!this.challengeRouteActive) {
|
||||
logger.log('info', 'Adding ACME challenge route during initialization', { component: 'certificate-manager' });
|
||||
await this.addChallengeRoute();
|
||||
} else {
|
||||
logger.log('info', 'Challenge route already active from previous instance', { component: 'certificate-manager' });
|
||||
}
|
||||
}
|
||||
|
||||
// Provision certificates for all routes
|
||||
await this.provisionAllCertificates();
|
||||
// Skip automatic certificate provisioning during initialization
|
||||
// This will be called later after ports are listening
|
||||
logger.log('info', 'Certificate manager initialized. Deferring certificate provisioning until after ports are listening.', { component: 'certificate-manager' });
|
||||
|
||||
// Start renewal timer
|
||||
this.startRenewalTimer();
|
||||
@ -108,33 +144,46 @@ export class SmartCertManager {
|
||||
/**
|
||||
* Provision certificates for all routes that need them
|
||||
*/
|
||||
private async provisionAllCertificates(): Promise<void> {
|
||||
public async provisionAllCertificates(): Promise<void> {
|
||||
const certRoutes = this.routes.filter(r =>
|
||||
r.action.tls?.mode === 'terminate' ||
|
||||
r.action.tls?.mode === 'terminate-and-reencrypt'
|
||||
);
|
||||
|
||||
for (const route of certRoutes) {
|
||||
try {
|
||||
await this.provisionCertificate(route);
|
||||
} catch (error) {
|
||||
console.error(`Failed to provision certificate for route ${route.name}: ${error}`);
|
||||
// Set provisioning flag to prevent concurrent operations
|
||||
this.isProvisioning = true;
|
||||
|
||||
try {
|
||||
for (const route of certRoutes) {
|
||||
try {
|
||||
await this.provisionCertificate(route, true); // Allow concurrent since we're managing it here
|
||||
} catch (error) {
|
||||
logger.log('error', `Failed to provision certificate for route ${route.name}`, { routeName: route.name, error, component: 'certificate-manager' });
|
||||
}
|
||||
}
|
||||
} finally {
|
||||
this.isProvisioning = false;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Provision certificate for a single route
|
||||
*/
|
||||
public async provisionCertificate(route: IRouteConfig): Promise<void> {
|
||||
public async provisionCertificate(route: IRouteConfig, allowConcurrent: boolean = false): Promise<void> {
|
||||
const tls = route.action.tls;
|
||||
if (!tls || (tls.mode !== 'terminate' && tls.mode !== 'terminate-and-reencrypt')) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Check if provisioning is already in progress (prevent concurrent provisioning)
|
||||
if (!allowConcurrent && this.isProvisioning) {
|
||||
logger.log('info', `Certificate provisioning already in progress, skipping ${route.name}`, { routeName: route.name, component: 'certificate-manager' });
|
||||
return;
|
||||
}
|
||||
|
||||
const domains = this.extractDomainsFromRoute(route);
|
||||
if (domains.length === 0) {
|
||||
console.warn(`Route ${route.name} has TLS termination but no domains`);
|
||||
logger.log('warn', `Route ${route.name} has TLS termination but no domains`, { routeName: route.name, component: 'certificate-manager' });
|
||||
return;
|
||||
}
|
||||
|
||||
@ -171,7 +220,7 @@ export class SmartCertManager {
|
||||
// Check if we already have a valid certificate
|
||||
const existingCert = await this.certStore.getCertificate(routeName);
|
||||
if (existingCert && this.isCertificateValid(existingCert)) {
|
||||
console.log(`Using existing valid certificate for ${primaryDomain}`);
|
||||
logger.log('info', `Using existing valid certificate for ${primaryDomain}`, { domain: primaryDomain, component: 'certificate-manager' });
|
||||
await this.applyCertificate(primaryDomain, existingCert);
|
||||
this.updateCertStatus(routeName, 'valid', 'acme', existingCert);
|
||||
return;
|
||||
@ -182,17 +231,37 @@ export class SmartCertManager {
|
||||
this.globalAcmeDefaults?.renewThresholdDays ||
|
||||
30;
|
||||
|
||||
console.log(`Requesting ACME certificate for ${domains.join(', ')} (renew ${renewThreshold} days before expiry)`);
|
||||
logger.log('info', `Requesting ACME certificate for ${domains.join(', ')} (renew ${renewThreshold} days before expiry)`, { domains: domains.join(', '), renewThreshold, component: 'certificate-manager' });
|
||||
this.updateCertStatus(routeName, 'pending', 'acme');
|
||||
|
||||
try {
|
||||
// Add challenge route before requesting certificate
|
||||
await this.addChallengeRoute();
|
||||
// Challenge route should already be active from initialization
|
||||
// No need to add it for each certificate
|
||||
|
||||
try {
|
||||
// Use smartacme to get certificate
|
||||
const cert = await this.smartAcme.getCertificateForDomain(primaryDomain);
|
||||
// Determine if we should request a wildcard certificate
|
||||
// Only request wildcards if:
|
||||
// 1. The primary domain is not already a wildcard
|
||||
// 2. The domain has multiple parts (can have subdomains)
|
||||
// 3. We have DNS-01 challenge support (required for wildcards)
|
||||
const hasDnsChallenge = (this.smartAcme as any).challengeHandlers?.some((handler: any) =>
|
||||
handler.getSupportedTypes && handler.getSupportedTypes().includes('dns-01')
|
||||
);
|
||||
|
||||
const shouldIncludeWildcard = !primaryDomain.startsWith('*.') &&
|
||||
primaryDomain.includes('.') &&
|
||||
primaryDomain.split('.').length >= 2 &&
|
||||
hasDnsChallenge;
|
||||
|
||||
if (shouldIncludeWildcard) {
|
||||
logger.log('info', `Requesting wildcard certificate for ${primaryDomain} (DNS-01 available)`, { domain: primaryDomain, challengeType: 'DNS-01', component: 'certificate-manager' });
|
||||
}
|
||||
|
||||
// Use smartacme to get certificate with optional wildcard
|
||||
const cert = await this.smartAcme.getCertificateForDomain(
|
||||
primaryDomain,
|
||||
shouldIncludeWildcard ? { includeWildcard: true } : undefined
|
||||
);
|
||||
|
||||
// SmartAcme's Cert object has these properties:
|
||||
// - publicKey: The certificate PEM string
|
||||
// - privateKey: The private key PEM string
|
||||
@ -211,18 +280,9 @@ export class SmartCertManager {
|
||||
await this.applyCertificate(primaryDomain, certData);
|
||||
this.updateCertStatus(routeName, 'valid', 'acme', certData);
|
||||
|
||||
console.log(`Successfully provisioned ACME certificate for ${primaryDomain}`);
|
||||
} catch (error) {
|
||||
console.error(`Failed to provision ACME certificate for ${primaryDomain}: ${error}`);
|
||||
this.updateCertStatus(routeName, 'error', 'acme', undefined, error.message);
|
||||
throw error;
|
||||
} finally {
|
||||
// Always remove challenge route after provisioning
|
||||
await this.removeChallengeRoute();
|
||||
}
|
||||
logger.log('info', `Successfully provisioned ACME certificate for ${primaryDomain}`, { domain: primaryDomain, component: 'certificate-manager' });
|
||||
} catch (error) {
|
||||
// Handle outer try-catch from adding challenge route
|
||||
console.error(`Failed to setup ACME challenge for ${primaryDomain}: ${error}`);
|
||||
logger.log('error', `Failed to provision ACME certificate for ${primaryDomain}: ${error.message}`, { domain: primaryDomain, error: error.message, component: 'certificate-manager' });
|
||||
this.updateCertStatus(routeName, 'error', 'acme', undefined, error.message);
|
||||
throw error;
|
||||
}
|
||||
@ -269,32 +329,32 @@ export class SmartCertManager {
|
||||
await this.applyCertificate(domain, certData);
|
||||
this.updateCertStatus(routeName, 'valid', 'static', certData);
|
||||
|
||||
console.log(`Successfully loaded static certificate for ${domain}`);
|
||||
logger.log('info', `Successfully loaded static certificate for ${domain}`, { domain, component: 'certificate-manager' });
|
||||
} catch (error) {
|
||||
console.error(`Failed to provision static certificate for ${domain}: ${error}`);
|
||||
logger.log('error', `Failed to provision static certificate for ${domain}: ${error.message}`, { domain, error: error.message, component: 'certificate-manager' });
|
||||
this.updateCertStatus(routeName, 'error', 'static', undefined, error.message);
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Apply certificate to NetworkProxy
|
||||
* Apply certificate to HttpProxy
|
||||
*/
|
||||
private async applyCertificate(domain: string, certData: ICertificateData): Promise<void> {
|
||||
if (!this.networkProxy) {
|
||||
console.warn('NetworkProxy not set, cannot apply certificate');
|
||||
if (!this.httpProxy) {
|
||||
logger.log('warn', `HttpProxy not set, cannot apply certificate for domain ${domain}`, { domain, component: 'certificate-manager' });
|
||||
return;
|
||||
}
|
||||
|
||||
// Apply certificate to NetworkProxy
|
||||
this.networkProxy.updateCertificate(domain, certData.cert, certData.key);
|
||||
// Apply certificate to HttpProxy
|
||||
this.httpProxy.updateCertificate(domain, certData.cert, certData.key);
|
||||
|
||||
// Also apply for wildcard if it's a subdomain
|
||||
if (domain.includes('.') && !domain.startsWith('*.')) {
|
||||
const parts = domain.split('.');
|
||||
if (parts.length >= 2) {
|
||||
const wildcardDomain = `*.${parts.slice(-2).join('.')}`;
|
||||
this.networkProxy.updateCertificate(wildcardDomain, certData.cert, certData.key);
|
||||
this.httpProxy.updateCertificate(wildcardDomain, certData.cert, certData.key);
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -337,6 +397,18 @@ export class SmartCertManager {
|
||||
* Add challenge route to SmartProxy
|
||||
*/
|
||||
private async addChallengeRoute(): Promise<void> {
|
||||
// Check with state manager first
|
||||
if (this.acmeStateManager && this.acmeStateManager.isChallengeRouteActive()) {
|
||||
logger.log('info', 'Challenge route already active in global state, skipping', { component: 'certificate-manager' });
|
||||
this.challengeRouteActive = true;
|
||||
return;
|
||||
}
|
||||
|
||||
if (this.challengeRouteActive) {
|
||||
logger.log('info', 'Challenge route already active locally, skipping', { component: 'certificate-manager' });
|
||||
return;
|
||||
}
|
||||
|
||||
if (!this.updateRoutesCallback) {
|
||||
throw new Error('No route update callback set');
|
||||
}
|
||||
@ -344,22 +416,102 @@ export class SmartCertManager {
|
||||
if (!this.challengeRoute) {
|
||||
throw new Error('Challenge route not initialized');
|
||||
}
|
||||
|
||||
// Get the challenge port
|
||||
const challengePort = this.globalAcmeDefaults?.port || 80;
|
||||
|
||||
// Check if any existing routes are already using this port
|
||||
const portInUseByRoutes = this.routes.some(route => {
|
||||
const routePorts = Array.isArray(route.match.ports) ? route.match.ports : [route.match.ports];
|
||||
return routePorts.some(p => {
|
||||
// Handle both number and port range objects
|
||||
if (typeof p === 'number') {
|
||||
return p === challengePort;
|
||||
} else if (typeof p === 'object' && 'from' in p && 'to' in p) {
|
||||
// Port range case - check if challengePort is in range
|
||||
return challengePort >= p.from && challengePort <= p.to;
|
||||
}
|
||||
return false;
|
||||
});
|
||||
});
|
||||
|
||||
if (portInUseByRoutes) {
|
||||
logger.log('info', `Port ${challengePort} is already used by another route, merging ACME challenge route`, {
|
||||
port: challengePort,
|
||||
component: 'certificate-manager'
|
||||
});
|
||||
}
|
||||
|
||||
// Add the challenge route
|
||||
const challengeRoute = this.challengeRoute;
|
||||
|
||||
const updatedRoutes = [...this.routes, challengeRoute];
|
||||
await this.updateRoutesCallback(updatedRoutes);
|
||||
try {
|
||||
const updatedRoutes = [...this.routes, challengeRoute];
|
||||
await this.updateRoutesCallback(updatedRoutes);
|
||||
this.challengeRouteActive = true;
|
||||
|
||||
// Register with state manager
|
||||
if (this.acmeStateManager) {
|
||||
this.acmeStateManager.addChallengeRoute(challengeRoute);
|
||||
}
|
||||
|
||||
logger.log('info', 'ACME challenge route successfully added', { component: 'certificate-manager' });
|
||||
} catch (error) {
|
||||
// Handle specific EADDRINUSE errors differently based on whether it's an internal conflict
|
||||
if ((error as any).code === 'EADDRINUSE') {
|
||||
logger.log('error', `Failed to add challenge route on port ${challengePort}: ${error.message}`, {
|
||||
error: error.message,
|
||||
port: challengePort,
|
||||
component: 'certificate-manager'
|
||||
});
|
||||
|
||||
// Provide a more informative error message
|
||||
throw new Error(
|
||||
`Port ${challengePort} is already in use. ` +
|
||||
`If it's in use by an external process, configure a different port in the ACME settings. ` +
|
||||
`If it's in use by SmartProxy, there may be a route configuration issue.`
|
||||
);
|
||||
}
|
||||
|
||||
// Log and rethrow other errors
|
||||
logger.log('error', `Failed to add challenge route: ${error.message}`, {
|
||||
error: error.message,
|
||||
component: 'certificate-manager'
|
||||
});
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Remove challenge route from SmartProxy
|
||||
*/
|
||||
private async removeChallengeRoute(): Promise<void> {
|
||||
if (!this.challengeRouteActive) {
|
||||
logger.log('info', 'Challenge route not active, skipping removal', { component: 'certificate-manager' });
|
||||
return;
|
||||
}
|
||||
|
||||
if (!this.updateRoutesCallback) {
|
||||
return;
|
||||
}
|
||||
|
||||
const filteredRoutes = this.routes.filter(r => r.name !== 'acme-challenge');
|
||||
await this.updateRoutesCallback(filteredRoutes);
|
||||
try {
|
||||
const filteredRoutes = this.routes.filter(r => r.name !== 'acme-challenge');
|
||||
await this.updateRoutesCallback(filteredRoutes);
|
||||
this.challengeRouteActive = false;
|
||||
|
||||
// Remove from state manager
|
||||
if (this.acmeStateManager) {
|
||||
this.acmeStateManager.removeChallengeRoute('acme-challenge');
|
||||
}
|
||||
|
||||
logger.log('info', 'ACME challenge route successfully removed', { component: 'certificate-manager' });
|
||||
} catch (error) {
|
||||
logger.log('error', `Failed to remove challenge route: ${error.message}`, { error: error.message, component: 'certificate-manager' });
|
||||
// Reset the flag even on error to avoid getting stuck
|
||||
this.challengeRouteActive = false;
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
@ -385,11 +537,11 @@ export class SmartCertManager {
|
||||
const cert = await this.certStore.getCertificate(routeName);
|
||||
|
||||
if (cert && !this.isCertificateValid(cert)) {
|
||||
console.log(`Certificate for ${routeName} needs renewal`);
|
||||
logger.log('info', `Certificate for ${routeName} needs renewal`, { routeName, component: 'certificate-manager' });
|
||||
try {
|
||||
await this.provisionCertificate(route);
|
||||
} catch (error) {
|
||||
console.error(`Failed to renew certificate for ${routeName}: ${error}`);
|
||||
logger.log('error', `Failed to renew certificate for ${routeName}: ${error.message}`, { routeName, error: error.message, component: 'certificate-manager' });
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -512,14 +664,19 @@ export class SmartCertManager {
|
||||
this.renewalTimer = null;
|
||||
}
|
||||
|
||||
// Always remove challenge route on shutdown
|
||||
if (this.challengeRoute) {
|
||||
logger.log('info', 'Removing ACME challenge route during shutdown', { component: 'certificate-manager' });
|
||||
await this.removeChallengeRoute();
|
||||
}
|
||||
|
||||
if (this.smartAcme) {
|
||||
await this.smartAcme.stop();
|
||||
}
|
||||
|
||||
// Remove any active challenge routes
|
||||
// Clear any pending challenges
|
||||
if (this.pendingChallenges.size > 0) {
|
||||
this.pendingChallenges.clear();
|
||||
await this.removeChallengeRoute();
|
||||
}
|
||||
}
|
||||
|
||||
@ -529,5 +686,14 @@ export class SmartCertManager {
|
||||
public getAcmeOptions(): { email?: string; useProduction?: boolean; port?: number } | undefined {
|
||||
return this.acmeOptions;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get certificate manager state
|
||||
*/
|
||||
public getState(): { challengeRouteActive: boolean } {
|
||||
return {
|
||||
challengeRouteActive: this.challengeRouteActive
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -2,6 +2,7 @@ import * as plugins from '../../plugins.js';
|
||||
import type { IConnectionRecord, ISmartProxyOptions } from './models/interfaces.js';
|
||||
import { SecurityManager } from './security-manager.js';
|
||||
import { TimeoutManager } from './timeout-manager.js';
|
||||
import { logger } from '../../core/utils/logger.js';
|
||||
|
||||
/**
|
||||
* Manages connection lifecycle, tracking, and cleanup
|
||||
@ -97,7 +98,7 @@ export class ConnectionManager {
|
||||
*/
|
||||
public initiateCleanupOnce(record: IConnectionRecord, reason: string = 'normal'): void {
|
||||
if (this.settings.enableDetailedLogging) {
|
||||
console.log(`[${record.id}] Connection cleanup initiated for ${record.remoteIP} (${reason})`);
|
||||
logger.log('info', `Connection cleanup initiated`, { connectionId: record.id, remoteIP: record.remoteIP, reason, component: 'connection-manager' });
|
||||
}
|
||||
|
||||
if (
|
||||
@ -139,7 +140,7 @@ export class ConnectionManager {
|
||||
// Reset the handler references
|
||||
record.renegotiationHandler = undefined;
|
||||
} catch (err) {
|
||||
console.log(`[${record.id}] Error removing data handlers: ${err}`);
|
||||
logger.log('error', `Error removing data handlers for connection ${record.id}: ${err}`, { connectionId: record.id, error: err, component: 'connection-manager' });
|
||||
}
|
||||
}
|
||||
|
||||
@ -160,16 +161,36 @@ export class ConnectionManager {
|
||||
|
||||
// Log connection details
|
||||
if (this.settings.enableDetailedLogging) {
|
||||
console.log(
|
||||
`[${record.id}] Connection from ${record.remoteIP} on port ${record.localPort} terminated (${reason}).` +
|
||||
` Duration: ${plugins.prettyMs(duration)}, Bytes IN: ${bytesReceived}, OUT: ${bytesSent}, ` +
|
||||
`TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}` +
|
||||
`${record.usingNetworkProxy ? ', Using NetworkProxy' : ''}` +
|
||||
`${record.domainSwitches ? `, Domain switches: ${record.domainSwitches}` : ''}`
|
||||
logger.log('info',
|
||||
`Connection from ${record.remoteIP} on port ${record.localPort} terminated (${reason}). ` +
|
||||
`Duration: ${plugins.prettyMs(duration)}, Bytes IN: ${bytesReceived}, OUT: ${bytesSent}, ` +
|
||||
`TLS: ${record.isTLS ? 'Yes' : 'No'}, Keep-Alive: ${record.hasKeepAlive ? 'Yes' : 'No'}` +
|
||||
`${record.usingNetworkProxy ? ', Using NetworkProxy' : ''}` +
|
||||
`${record.domainSwitches ? `, Domain switches: ${record.domainSwitches}` : ''}`,
|
||||
{
|
||||
connectionId: record.id,
|
||||
remoteIP: record.remoteIP,
|
||||
localPort: record.localPort,
|
||||
reason,
|
||||
duration: plugins.prettyMs(duration),
|
||||
bytes: { in: bytesReceived, out: bytesSent },
|
||||
tls: record.isTLS,
|
||||
keepAlive: record.hasKeepAlive,
|
||||
usingNetworkProxy: record.usingNetworkProxy,
|
||||
domainSwitches: record.domainSwitches || 0,
|
||||
component: 'connection-manager'
|
||||
}
|
||||
);
|
||||
} else {
|
||||
console.log(
|
||||
`[${record.id}] Connection from ${record.remoteIP} terminated (${reason}). Active connections: ${this.connectionRecords.size}`
|
||||
logger.log('info',
|
||||
`Connection from ${record.remoteIP} terminated (${reason}). Active connections: ${this.connectionRecords.size}`,
|
||||
{
|
||||
connectionId: record.id,
|
||||
remoteIP: record.remoteIP,
|
||||
reason,
|
||||
activeConnections: this.connectionRecords.size,
|
||||
component: 'connection-manager'
|
||||
}
|
||||
);
|
||||
}
|
||||
}
|
||||
@ -189,7 +210,7 @@ export class ConnectionManager {
|
||||
socket.destroy();
|
||||
}
|
||||
} catch (err) {
|
||||
console.log(`[${record.id}] Error destroying ${side} socket: ${err}`);
|
||||
logger.log('error', `Error destroying ${side} socket for connection ${record.id}: ${err}`, { connectionId: record.id, side, error: err, component: 'connection-manager' });
|
||||
}
|
||||
}, 1000);
|
||||
|
||||
@ -199,13 +220,13 @@ export class ConnectionManager {
|
||||
}
|
||||
}
|
||||
} catch (err) {
|
||||
console.log(`[${record.id}] Error closing ${side} socket: ${err}`);
|
||||
logger.log('error', `Error closing ${side} socket for connection ${record.id}: ${err}`, { connectionId: record.id, side, error: err, component: 'connection-manager' });
|
||||
try {
|
||||
if (!socket.destroyed) {
|
||||
socket.destroy();
|
||||
}
|
||||
} catch (destroyErr) {
|
||||
console.log(`[${record.id}] Error destroying ${side} socket: ${destroyErr}`);
|
||||
logger.log('error', `Error destroying ${side} socket for connection ${record.id}: ${destroyErr}`, { connectionId: record.id, side, error: destroyErr, component: 'connection-manager' });
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -224,21 +245,36 @@ export class ConnectionManager {
|
||||
|
||||
if (code === 'ECONNRESET') {
|
||||
reason = 'econnreset';
|
||||
console.log(
|
||||
`[${record.id}] ECONNRESET on ${side} side from ${record.remoteIP}: ${err.message}. ` +
|
||||
`Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`
|
||||
);
|
||||
logger.log('warn', `ECONNRESET on ${side} connection from ${record.remoteIP}. Error: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)}`, {
|
||||
connectionId: record.id,
|
||||
side,
|
||||
remoteIP: record.remoteIP,
|
||||
error: err.message,
|
||||
duration: plugins.prettyMs(connectionDuration),
|
||||
lastActivity: plugins.prettyMs(lastActivityAge),
|
||||
component: 'connection-manager'
|
||||
});
|
||||
} else if (code === 'ETIMEDOUT') {
|
||||
reason = 'etimedout';
|
||||
console.log(
|
||||
`[${record.id}] ETIMEDOUT on ${side} side from ${record.remoteIP}: ${err.message}. ` +
|
||||
`Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`
|
||||
);
|
||||
logger.log('warn', `ETIMEDOUT on ${side} connection from ${record.remoteIP}. Error: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)}`, {
|
||||
connectionId: record.id,
|
||||
side,
|
||||
remoteIP: record.remoteIP,
|
||||
error: err.message,
|
||||
duration: plugins.prettyMs(connectionDuration),
|
||||
lastActivity: plugins.prettyMs(lastActivityAge),
|
||||
component: 'connection-manager'
|
||||
});
|
||||
} else {
|
||||
console.log(
|
||||
`[${record.id}] Error on ${side} side from ${record.remoteIP}: ${err.message}. ` +
|
||||
`Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)} ago`
|
||||
);
|
||||
logger.log('error', `Error on ${side} connection from ${record.remoteIP}: ${err.message}. Duration: ${plugins.prettyMs(connectionDuration)}, Last activity: ${plugins.prettyMs(lastActivityAge)}`, {
|
||||
connectionId: record.id,
|
||||
side,
|
||||
remoteIP: record.remoteIP,
|
||||
error: err.message,
|
||||
duration: plugins.prettyMs(connectionDuration),
|
||||
lastActivity: plugins.prettyMs(lastActivityAge),
|
||||
component: 'connection-manager'
|
||||
});
|
||||
}
|
||||
|
||||
if (side === 'incoming' && record.incomingTerminationReason === null) {
|
||||
@ -259,7 +295,12 @@ export class ConnectionManager {
|
||||
public handleClose(side: 'incoming' | 'outgoing', record: IConnectionRecord) {
|
||||
return () => {
|
||||
if (this.settings.enableDetailedLogging) {
|
||||
console.log(`[${record.id}] Connection closed on ${side} side from ${record.remoteIP}`);
|
||||
logger.log('info', `Connection closed on ${side} side`, {
|
||||
connectionId: record.id,
|
||||
side,
|
||||
remoteIP: record.remoteIP,
|
||||
component: 'connection-manager'
|
||||
});
|
||||
}
|
||||
|
||||
if (side === 'incoming' && record.incomingTerminationReason === null) {
|
||||
@ -321,11 +362,13 @@ export class ConnectionManager {
|
||||
if (inactivityTime > effectiveTimeout && !record.connectionClosed) {
|
||||
// For keep-alive connections, issue a warning first
|
||||
if (record.hasKeepAlive && !record.inactivityWarningIssued) {
|
||||
console.log(
|
||||
`[${id}] Warning: Keep-alive connection from ${record.remoteIP} inactive for ${
|
||||
plugins.prettyMs(inactivityTime)
|
||||
}. Will close in 10 minutes if no activity.`
|
||||
);
|
||||
logger.log('warn', `Keep-alive connection ${id} from ${record.remoteIP} inactive for ${plugins.prettyMs(inactivityTime)}. Will close in 10 minutes if no activity.`, {
|
||||
connectionId: id,
|
||||
remoteIP: record.remoteIP,
|
||||
inactiveFor: plugins.prettyMs(inactivityTime),
|
||||
closureWarning: '10 minutes',
|
||||
component: 'connection-manager'
|
||||
});
|
||||
|
||||
// Set warning flag and add grace period
|
||||
record.inactivityWarningIssued = true;
|
||||
@ -337,27 +380,30 @@ export class ConnectionManager {
|
||||
record.outgoing.write(Buffer.alloc(0));
|
||||
|
||||
if (this.settings.enableDetailedLogging) {
|
||||
console.log(`[${id}] Sent probe packet to test keep-alive connection`);
|
||||
logger.log('info', `Sent probe packet to test keep-alive connection ${id}`, { connectionId: id, component: 'connection-manager' });
|
||||
}
|
||||
} catch (err) {
|
||||
console.log(`[${id}] Error sending probe packet: ${err}`);
|
||||
logger.log('error', `Error sending probe packet to connection ${id}: ${err}`, { connectionId: id, error: err, component: 'connection-manager' });
|
||||
}
|
||||
}
|
||||
} else {
|
||||
// For non-keep-alive or after warning, close the connection
|
||||
console.log(
|
||||
`[${id}] Inactivity check: No activity on connection from ${record.remoteIP} ` +
|
||||
`for ${plugins.prettyMs(inactivityTime)}.` +
|
||||
(record.hasKeepAlive ? ' Despite keep-alive being enabled.' : '')
|
||||
);
|
||||
logger.log('warn', `Closing inactive connection ${id} from ${record.remoteIP} (inactive for ${plugins.prettyMs(inactivityTime)}, keep-alive: ${record.hasKeepAlive ? 'Yes' : 'No'})`, {
|
||||
connectionId: id,
|
||||
remoteIP: record.remoteIP,
|
||||
inactiveFor: plugins.prettyMs(inactivityTime),
|
||||
hasKeepAlive: record.hasKeepAlive,
|
||||
component: 'connection-manager'
|
||||
});
|
||||
this.cleanupConnection(record, 'inactivity');
|
||||
}
|
||||
} else if (inactivityTime <= effectiveTimeout && record.inactivityWarningIssued) {
|
||||
// If activity detected after warning, clear the warning
|
||||
if (this.settings.enableDetailedLogging) {
|
||||
console.log(
|
||||
`[${id}] Connection activity detected after inactivity warning, resetting warning`
|
||||
);
|
||||
logger.log('info', `Connection ${id} activity detected after inactivity warning`, {
|
||||
connectionId: id,
|
||||
component: 'connection-manager'
|
||||
});
|
||||
}
|
||||
record.inactivityWarningIssued = false;
|
||||
}
|
||||
@ -369,11 +415,12 @@ export class ConnectionManager {
|
||||
!record.connectionClosed &&
|
||||
now - record.outgoingClosedTime > 120000
|
||||
) {
|
||||
console.log(
|
||||
`[${id}] Parity check: Incoming socket for ${record.remoteIP} still active ${
|
||||
plugins.prettyMs(now - record.outgoingClosedTime)
|
||||
} after outgoing closed.`
|
||||
);
|
||||
logger.log('warn', `Parity check: Connection ${id} from ${record.remoteIP} has incoming socket still active ${plugins.prettyMs(now - record.outgoingClosedTime)} after outgoing socket closed`, {
|
||||
connectionId: id,
|
||||
remoteIP: record.remoteIP,
|
||||
timeElapsed: plugins.prettyMs(now - record.outgoingClosedTime),
|
||||
component: 'connection-manager'
|
||||
});
|
||||
this.cleanupConnection(record, 'parity_check');
|
||||
}
|
||||
}
|
||||
@ -406,7 +453,7 @@ export class ConnectionManager {
|
||||
record.outgoing.end();
|
||||
}
|
||||
} catch (err) {
|
||||
console.log(`Error during graceful connection end for ${id}: ${err}`);
|
||||
logger.log('error', `Error during graceful end of connection ${id}: ${err}`, { connectionId: id, error: err, component: 'connection-manager' });
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -433,7 +480,7 @@ export class ConnectionManager {
|
||||
}
|
||||
}
|
||||
} catch (err) {
|
||||
console.log(`Error during forced connection destruction for ${id}: ${err}`);
|
||||
logger.log('error', `Error during forced destruction of connection ${id}: ${err}`, { connectionId: id, error: err, component: 'connection-manager' });
|
||||
}
|
||||
}
|
||||
}
|
||||
|
165
ts/proxies/smart-proxy/http-proxy-bridge.ts
Normal file
165
ts/proxies/smart-proxy/http-proxy-bridge.ts
Normal file
@ -0,0 +1,165 @@
|
||||
import * as plugins from '../../plugins.js';
|
||||
import { HttpProxy } from '../http-proxy/index.js';
|
||||
import type { IConnectionRecord, ISmartProxyOptions } from './models/interfaces.js';
|
||||
import type { IRouteConfig } from './models/route-types.js';
|
||||
|
||||
export class HttpProxyBridge {
|
||||
private httpProxy: HttpProxy | null = null;
|
||||
|
||||
constructor(private settings: ISmartProxyOptions) {}
|
||||
|
||||
/**
|
||||
* Get the HttpProxy instance
|
||||
*/
|
||||
public getHttpProxy(): HttpProxy | null {
|
||||
return this.httpProxy;
|
||||
}
|
||||
|
||||
/**
|
||||
* Initialize HttpProxy instance
|
||||
*/
|
||||
public async initialize(): Promise<void> {
|
||||
if (!this.httpProxy && this.settings.useHttpProxy && this.settings.useHttpProxy.length > 0) {
|
||||
const httpProxyOptions: any = {
|
||||
port: this.settings.httpProxyPort!,
|
||||
portProxyIntegration: true,
|
||||
logLevel: this.settings.enableDetailedLogging ? 'debug' : 'info'
|
||||
};
|
||||
|
||||
this.httpProxy = new HttpProxy(httpProxyOptions);
|
||||
console.log(`Initialized HttpProxy on port ${this.settings.httpProxyPort}`);
|
||||
|
||||
// Apply route configurations to HttpProxy
|
||||
await this.syncRoutesToHttpProxy(this.settings.routes || []);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Sync routes to HttpProxy
|
||||
*/
|
||||
public async syncRoutesToHttpProxy(routes: IRouteConfig[]): Promise<void> {
|
||||
if (!this.httpProxy) return;
|
||||
|
||||
// Convert routes to HttpProxy format
|
||||
const httpProxyConfigs = routes
|
||||
.filter(route => {
|
||||
// Check if this route matches any of the specified network proxy ports
|
||||
const routePorts = Array.isArray(route.match.ports)
|
||||
? route.match.ports
|
||||
: [route.match.ports];
|
||||
|
||||
return routePorts.some(port =>
|
||||
this.settings.useHttpProxy?.includes(port)
|
||||
);
|
||||
})
|
||||
.map(route => this.routeToHttpProxyConfig(route));
|
||||
|
||||
// Apply configurations to HttpProxy
|
||||
await this.httpProxy.updateRouteConfigs(httpProxyConfigs);
|
||||
}
|
||||
|
||||
/**
|
||||
* Convert route to HttpProxy configuration
|
||||
*/
|
||||
private routeToHttpProxyConfig(route: IRouteConfig): any {
|
||||
// Convert route to HttpProxy domain config format
|
||||
let domain = '*';
|
||||
if (route.match.domains) {
|
||||
if (Array.isArray(route.match.domains)) {
|
||||
domain = route.match.domains[0] || '*';
|
||||
} else {
|
||||
domain = route.match.domains;
|
||||
}
|
||||
}
|
||||
|
||||
return {
|
||||
domain,
|
||||
target: route.action.target,
|
||||
tls: route.action.tls,
|
||||
security: route.action.security,
|
||||
match: {
|
||||
...route.match,
|
||||
domains: domain // Ensure domains is always set for HttpProxy
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if connection should use HttpProxy
|
||||
*/
|
||||
public shouldUseHttpProxy(connection: IConnectionRecord, routeMatch: any): boolean {
|
||||
// Only use HttpProxy for TLS termination
|
||||
return (
|
||||
routeMatch.route.action.tls?.mode === 'terminate' ||
|
||||
routeMatch.route.action.tls?.mode === 'terminate-and-reencrypt'
|
||||
) && this.httpProxy !== null;
|
||||
}
|
||||
|
||||
/**
|
||||
* Forward connection to HttpProxy
|
||||
*/
|
||||
public async forwardToHttpProxy(
|
||||
connectionId: string,
|
||||
socket: plugins.net.Socket,
|
||||
record: IConnectionRecord,
|
||||
initialChunk: Buffer,
|
||||
httpProxyPort: number,
|
||||
cleanupCallback: (reason: string) => void
|
||||
): Promise<void> {
|
||||
if (!this.httpProxy) {
|
||||
throw new Error('HttpProxy not initialized');
|
||||
}
|
||||
|
||||
const proxySocket = new plugins.net.Socket();
|
||||
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
proxySocket.connect(httpProxyPort, 'localhost', () => {
|
||||
console.log(`[${connectionId}] Connected to HttpProxy for termination`);
|
||||
resolve();
|
||||
});
|
||||
|
||||
proxySocket.on('error', reject);
|
||||
});
|
||||
|
||||
// Send initial chunk if present
|
||||
if (initialChunk) {
|
||||
proxySocket.write(initialChunk);
|
||||
}
|
||||
|
||||
// Pipe the sockets together
|
||||
socket.pipe(proxySocket);
|
||||
proxySocket.pipe(socket);
|
||||
|
||||
// Handle cleanup
|
||||
const cleanup = (reason: string) => {
|
||||
socket.unpipe(proxySocket);
|
||||
proxySocket.unpipe(socket);
|
||||
proxySocket.destroy();
|
||||
cleanupCallback(reason);
|
||||
};
|
||||
|
||||
socket.on('end', () => cleanup('socket_end'));
|
||||
socket.on('error', () => cleanup('socket_error'));
|
||||
proxySocket.on('end', () => cleanup('proxy_end'));
|
||||
proxySocket.on('error', () => cleanup('proxy_error'));
|
||||
}
|
||||
|
||||
/**
|
||||
* Start HttpProxy
|
||||
*/
|
||||
public async start(): Promise<void> {
|
||||
if (this.httpProxy) {
|
||||
await this.httpProxy.start();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Stop HttpProxy
|
||||
*/
|
||||
public async stop(): Promise<void> {
|
||||
if (this.httpProxy) {
|
||||
await this.httpProxy.stop();
|
||||
this.httpProxy = null;
|
||||
}
|
||||
}
|
||||
}
|
@ -14,12 +14,15 @@ export { ConnectionManager } from './connection-manager.js';
|
||||
export { SecurityManager } from './security-manager.js';
|
||||
export { TimeoutManager } from './timeout-manager.js';
|
||||
export { TlsManager } from './tls-manager.js';
|
||||
export { NetworkProxyBridge } from './network-proxy-bridge.js';
|
||||
export { HttpProxyBridge } from './http-proxy-bridge.js';
|
||||
|
||||
// Export route-based components
|
||||
export { RouteManager } from './route-manager.js';
|
||||
export { RouteConnectionHandler } from './route-connection-handler.js';
|
||||
export { NFTablesManager } from './nftables-manager.js';
|
||||
|
||||
// Export certificate management
|
||||
export { SmartCertManager } from './certificate-manager.js';
|
||||
|
||||
// Export all helper functions from the utils directory
|
||||
export * from './utils/index.js';
|
||||
|
@ -94,9 +94,9 @@ export interface ISmartProxyOptions {
|
||||
keepAliveInactivityMultiplier?: number; // Multiplier for inactivity timeout for keep-alive connections
|
||||
extendedKeepAliveLifetime?: number; // Extended lifetime for keep-alive connections (ms)
|
||||
|
||||
// NetworkProxy integration
|
||||
useNetworkProxy?: number[]; // Array of ports to forward to NetworkProxy
|
||||
networkProxyPort?: number; // Port where NetworkProxy is listening (default: 8443)
|
||||
// HttpProxy integration
|
||||
useHttpProxy?: number[]; // Array of ports to forward to HttpProxy
|
||||
httpProxyPort?: number; // Port where HttpProxy is listening (default: 8443)
|
||||
|
||||
/**
|
||||
* Global ACME configuration options for SmartProxy
|
||||
|
@ -47,6 +47,7 @@ export interface IRouteContext {
|
||||
path?: string; // URL path (for HTTP connections)
|
||||
query?: string; // Query string (for HTTP connections)
|
||||
headers?: Record<string, string>; // HTTP headers (for HTTP connections)
|
||||
method?: string; // HTTP method (for HTTP connections)
|
||||
|
||||
// TLS information
|
||||
isTls: boolean; // Whether the connection is TLS
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user