Compare commits
26 Commits
Author | SHA1 | Date | |
---|---|---|---|
fd4f731ada | |||
ced9b5b27b | |||
eb70a86304 | |||
131d9d326e | |||
12de96a7d5 | |||
296e1fcdc7 | |||
8459e4013c | |||
191c8ac0e6 | |||
3ab483d164 | |||
fcd80dc56b | |||
8ddffcd6e5 | |||
a5a7781c17 | |||
d647e77cdf | |||
9161336197 | |||
2e63d13dd4 | |||
af6ed735d5 | |||
7d38f29ef3 | |||
0df26d4367 | |||
f9a6e2d748 | |||
1cb6302750 | |||
f336f25535 | |||
5d6b707440 | |||
622ad2ff20 | |||
dd23efd28d | |||
0ddf68a919 | |||
ec08ca51f5 |
92
changelog.md
92
changelog.md
@ -1,5 +1,97 @@
|
|||||||
# Changelog
|
# Changelog
|
||||||
|
|
||||||
|
## 2025-03-03 - 3.22.3 - fix(core)
|
||||||
|
Improve connection management and error handling in PortProxy
|
||||||
|
|
||||||
|
- Refactored connection cleanup to handle errors more gracefully.
|
||||||
|
- Introduced comprehensive comments for better code understanding.
|
||||||
|
- Revised SNI data timeout logic for connection handling.
|
||||||
|
- Enhanced logging and error reporting during connection management.
|
||||||
|
- Improved inactivity checks and parity checks for existing connections.
|
||||||
|
|
||||||
|
## 2025-03-03 - 3.22.2 - fix(portproxy)
|
||||||
|
Refactored connection cleanup logic in PortProxy
|
||||||
|
|
||||||
|
- Simplified the connection cleanup logic by removing redundant methods.
|
||||||
|
- Consolidated the cleanup initiation and execution into a single cleanup method.
|
||||||
|
- Improved error handling by ensuring connections are closed appropriately.
|
||||||
|
|
||||||
|
## 2025-03-03 - 3.22.1 - fix(PortProxy)
|
||||||
|
Fix connection timeout and IP validation handling for PortProxy
|
||||||
|
|
||||||
|
- Adjusted initial data timeout setting for SNI-enabled connections in PortProxy.
|
||||||
|
- Restored IP validation logic to original behavior, ensuring compatibility with domain configurations.
|
||||||
|
|
||||||
|
## 2025-03-03 - 3.22.0 - feat(classes.portproxy)
|
||||||
|
Enhanced PortProxy to support initial data timeout and improved IP handling
|
||||||
|
|
||||||
|
- Added `initialDataTimeout` to PortProxy settings for handling data flow in chained proxies.
|
||||||
|
- Improved IP validation by allowing relaxed checks in chained proxy setups.
|
||||||
|
- Introduced dynamic logging for connection lifecycle and proxy configurations.
|
||||||
|
- Enhanced timeout handling for better proxy resilience.
|
||||||
|
|
||||||
|
## 2025-03-03 - 3.21.0 - feat(PortProxy)
|
||||||
|
Enhancements to connection management in PortProxy
|
||||||
|
|
||||||
|
- Introduced a unique ID for each connection record for improved tracking.
|
||||||
|
- Enhanced cleanup mechanism for connections with dual states: initiated and executed.
|
||||||
|
- Implemented shutdown process handling to ensure graceful connection closure.
|
||||||
|
- Added logging for better tracing of connection activities and states.
|
||||||
|
- Improved connection setup with explicit timeouts and data flow management.
|
||||||
|
- Integrated inactivity and parity checks to monitor connection health.
|
||||||
|
|
||||||
|
## 2025-03-01 - 3.20.2 - fix(PortProxy)
|
||||||
|
Enhance connection cleanup handling in PortProxy
|
||||||
|
|
||||||
|
- Add checks to ensure timers are reset only if outgoing socket is active
|
||||||
|
- Prevent setting outgoingActive if the connection is already closed
|
||||||
|
|
||||||
|
## 2025-03-01 - 3.20.1 - fix(PortProxy)
|
||||||
|
Improve IP allowance check for forced domains
|
||||||
|
|
||||||
|
- Enhanced IP allowance check logic by incorporating blocked IPs and default allowed IPs for forced domains within port proxy configurations.
|
||||||
|
|
||||||
|
## 2025-03-01 - 3.20.0 - feat(PortProxy)
|
||||||
|
Enhance PortProxy with advanced connection cleanup and logging
|
||||||
|
|
||||||
|
- Introduced `cleanupConnection` method for improved connection management.
|
||||||
|
- Added logging for connection cleanup including special conditions.
|
||||||
|
- Implemented parity check to clean up connections when outgoing side closes but incoming remains active.
|
||||||
|
- Improved logging during interval checks for active connections and their durations.
|
||||||
|
|
||||||
|
## 2025-03-01 - 3.19.0 - feat(PortProxy)
|
||||||
|
Enhance PortProxy with default blocked IPs
|
||||||
|
|
||||||
|
- Introduced defaultBlockedIPs in IPortProxySettings to handle globally blocked IPs.
|
||||||
|
- Added logic for merging domain-specific and default allowed and blocked IPs for effective IP filtering.
|
||||||
|
- Refactored helper functions for IP and port range checks to improve modularity in PortProxy.
|
||||||
|
|
||||||
|
## 2025-02-27 - 3.18.2 - fix(portproxy)
|
||||||
|
Fixed typographical errors in comments within PortProxy class.
|
||||||
|
|
||||||
|
- Corrected typographical errors in comments within the PortProxy class.
|
||||||
|
|
||||||
|
## 2025-02-27 - 3.18.1 - fix(PortProxy)
|
||||||
|
Refactor and enhance PortProxy test cases and handling
|
||||||
|
|
||||||
|
- Refactored test cases in test/test.portproxy.ts for clarity and added coverage.
|
||||||
|
- Improved TCP server helper functions for better flexibility.
|
||||||
|
- Fixed issues with domain handling in PortProxy configuration.
|
||||||
|
- Introduced round-robin logic for multi-IP domains in PortProxy.
|
||||||
|
- Ensured proper cleanup and stopping of test servers in the test suite.
|
||||||
|
|
||||||
|
## 2025-02-27 - 3.18.0 - feat(PortProxy)
|
||||||
|
Add SNI-based renegotiation handling in PortProxy
|
||||||
|
|
||||||
|
- Introduced a new field 'lockedDomain' in IConnectionRecord to store initial SNI.
|
||||||
|
- Enhanced connection management by enforcing termination if rehandshake is detected with different SNI.
|
||||||
|
|
||||||
|
## 2025-02-27 - 3.17.1 - fix(PortProxy)
|
||||||
|
Fix handling of SNI re-negotiation in PortProxy
|
||||||
|
|
||||||
|
- Removed connection locking to the initially negotiated SNI
|
||||||
|
- Improved handling of SNI during renegotiation in PortProxy
|
||||||
|
|
||||||
## 2025-02-27 - 3.17.0 - feat(smartproxy)
|
## 2025-02-27 - 3.17.0 - feat(smartproxy)
|
||||||
Enhance description clarity and improve SNI handling with domain locking.
|
Enhance description clarity and improve SNI handling with domain locking.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "@push.rocks/smartproxy",
|
"name": "@push.rocks/smartproxy",
|
||||||
"version": "3.17.0",
|
"version": "3.22.3",
|
||||||
"private": false,
|
"private": false,
|
||||||
"description": "A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.",
|
"description": "A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.",
|
||||||
"main": "dist_ts/index.js",
|
"main": "dist_ts/index.js",
|
||||||
|
@ -8,31 +8,30 @@ const TEST_SERVER_PORT = 4000;
|
|||||||
const PROXY_PORT = 4001;
|
const PROXY_PORT = 4001;
|
||||||
const TEST_DATA = 'Hello through port proxy!';
|
const TEST_DATA = 'Hello through port proxy!';
|
||||||
|
|
||||||
// Helper function to create a test TCP server
|
// Helper: Creates a test TCP server that listens on a given port and host.
|
||||||
function createTestServer(port: number): Promise<net.Server> {
|
function createTestServer(port: number, host: string = 'localhost'): Promise<net.Server> {
|
||||||
return new Promise((resolve) => {
|
return new Promise((resolve) => {
|
||||||
const server = net.createServer((socket) => {
|
const server = net.createServer((socket) => {
|
||||||
socket.on('data', (data) => {
|
socket.on('data', (data) => {
|
||||||
// Echo the received data back
|
// Echo the received data back with a prefix.
|
||||||
socket.write(`Echo: ${data.toString()}`);
|
socket.write(`Echo: ${data.toString()}`);
|
||||||
});
|
});
|
||||||
socket.on('error', (error) => {
|
socket.on('error', (error) => {
|
||||||
console.error('[Test Server] Socket error:', error);
|
console.error(`[Test Server] Socket error on ${host}:${port}:`, error);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
server.listen(port, () => {
|
server.listen(port, host, () => {
|
||||||
console.log(`[Test Server] Listening on port ${port}`);
|
console.log(`[Test Server] Listening on ${host}:${port}`);
|
||||||
resolve(server);
|
resolve(server);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
// Helper function to create a test client connection
|
// Helper: Creates a test client connection.
|
||||||
function createTestClient(port: number, data: string): Promise<string> {
|
function createTestClient(port: number, data: string): Promise<string> {
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
const client = new net.Socket();
|
const client = new net.Socket();
|
||||||
let response = '';
|
let response = '';
|
||||||
|
|
||||||
client.connect(port, 'localhost', () => {
|
client.connect(port, 'localhost', () => {
|
||||||
console.log('[Test Client] Connected to server');
|
console.log('[Test Client] Connected to server');
|
||||||
client.write(data);
|
client.write(data);
|
||||||
@ -41,47 +40,44 @@ function createTestClient(port: number, data: string): Promise<string> {
|
|||||||
response += chunk.toString();
|
response += chunk.toString();
|
||||||
client.end();
|
client.end();
|
||||||
});
|
});
|
||||||
client.on('end', () => {
|
client.on('end', () => resolve(response));
|
||||||
resolve(response);
|
client.on('error', (error) => reject(error));
|
||||||
});
|
|
||||||
client.on('error', (error) => {
|
|
||||||
reject(error);
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
// Setup test environment
|
// SETUP: Create a test server and a PortProxy instance.
|
||||||
tap.test('setup port proxy test environment', async () => {
|
tap.test('setup port proxy test environment', async () => {
|
||||||
testServer = await createTestServer(TEST_SERVER_PORT);
|
testServer = await createTestServer(TEST_SERVER_PORT);
|
||||||
portProxy = new PortProxy({
|
portProxy = new PortProxy({
|
||||||
fromPort: PROXY_PORT,
|
fromPort: PROXY_PORT,
|
||||||
toPort: TEST_SERVER_PORT,
|
toPort: TEST_SERVER_PORT,
|
||||||
targetIP: 'localhost',
|
targetIP: 'localhost',
|
||||||
domains: [],
|
domainConfigs: [],
|
||||||
sniEnabled: false,
|
sniEnabled: false,
|
||||||
defaultAllowedIPs: ['127.0.0.1'],
|
defaultAllowedIPs: ['127.0.0.1'],
|
||||||
globalPortRanges: []
|
globalPortRanges: []
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Test that the proxy starts and its servers are listening.
|
||||||
tap.test('should start port proxy', async () => {
|
tap.test('should start port proxy', async () => {
|
||||||
await portProxy.start();
|
await portProxy.start();
|
||||||
// Since netServers is private, we cast to any to verify that all created servers are listening.
|
|
||||||
expect((portProxy as any).netServers.every((server: net.Server) => server.listening)).toBeTrue();
|
expect((portProxy as any).netServers.every((server: net.Server) => server.listening)).toBeTrue();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Test basic TCP forwarding.
|
||||||
tap.test('should forward TCP connections and data to localhost', async () => {
|
tap.test('should forward TCP connections and data to localhost', async () => {
|
||||||
const response = await createTestClient(PROXY_PORT, TEST_DATA);
|
const response = await createTestClient(PROXY_PORT, TEST_DATA);
|
||||||
expect(response).toEqual(`Echo: ${TEST_DATA}`);
|
expect(response).toEqual(`Echo: ${TEST_DATA}`);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Test proxy with a custom target host.
|
||||||
tap.test('should forward TCP connections to custom host', async () => {
|
tap.test('should forward TCP connections to custom host', async () => {
|
||||||
// Create a new proxy instance with a custom host (targetIP)
|
|
||||||
const customHostProxy = new PortProxy({
|
const customHostProxy = new PortProxy({
|
||||||
fromPort: PROXY_PORT + 1,
|
fromPort: PROXY_PORT + 1,
|
||||||
toPort: TEST_SERVER_PORT,
|
toPort: TEST_SERVER_PORT,
|
||||||
targetIP: '127.0.0.1',
|
targetIP: '127.0.0.1',
|
||||||
domains: [],
|
domainConfigs: [],
|
||||||
sniEnabled: false,
|
sniEnabled: false,
|
||||||
defaultAllowedIPs: ['127.0.0.1'],
|
defaultAllowedIPs: ['127.0.0.1'],
|
||||||
globalPortRanges: []
|
globalPortRanges: []
|
||||||
@ -93,153 +89,151 @@ tap.test('should forward TCP connections to custom host', async () => {
|
|||||||
await customHostProxy.stop();
|
await customHostProxy.stop();
|
||||||
});
|
});
|
||||||
|
|
||||||
tap.test('should forward connections based on domain-specific target IP', async () => {
|
// Test forced domain routing via port-range configuration.
|
||||||
// Create a second test server on a different port
|
// In this test, we want to forward to a different IP (using '127.0.0.2')
|
||||||
const TEST_SERVER_PORT_2 = TEST_SERVER_PORT + 100;
|
// while keeping the same port. We create a test server on '127.0.0.2'.
|
||||||
const testServer2 = await createTestServer(TEST_SERVER_PORT_2);
|
tap.test('should forward connections based on domain-specific target IP (forced domain via port-range)', async () => {
|
||||||
|
const forcedProxyPort = PROXY_PORT + 2;
|
||||||
|
// Create a test server listening on '127.0.0.2' at forcedProxyPort.
|
||||||
|
const testServer2 = await createTestServer(forcedProxyPort, '127.0.0.2');
|
||||||
|
|
||||||
// Create a proxy with domain-specific target IPs
|
|
||||||
const domainProxy = new PortProxy({
|
const domainProxy = new PortProxy({
|
||||||
fromPort: PROXY_PORT + 2,
|
fromPort: forcedProxyPort,
|
||||||
toPort: TEST_SERVER_PORT, // default port (for non-port-range handling)
|
toPort: TEST_SERVER_PORT, // default target port (unused for forced domain)
|
||||||
targetIP: 'localhost', // default target IP
|
targetIP: 'localhost',
|
||||||
domains: [{
|
domainConfigs: [{
|
||||||
domain: 'domain1.test',
|
domains: ['forced.test'],
|
||||||
allowedIPs: ['127.0.0.1'],
|
allowedIPs: ['127.0.0.1'],
|
||||||
targetIP: '127.0.0.1'
|
targetIPs: ['127.0.0.2'], // Use a different IP than the default.
|
||||||
}, {
|
portRanges: [{ from: forcedProxyPort, to: forcedProxyPort }]
|
||||||
domain: 'domain2.test',
|
|
||||||
allowedIPs: ['127.0.0.1'],
|
|
||||||
targetIP: 'localhost'
|
|
||||||
}],
|
}],
|
||||||
sniEnabled: false,
|
sniEnabled: false,
|
||||||
defaultAllowedIPs: ['127.0.0.1'],
|
defaultAllowedIPs: ['127.0.0.1'],
|
||||||
globalPortRanges: []
|
globalPortRanges: [{ from: forcedProxyPort, to: forcedProxyPort }]
|
||||||
});
|
});
|
||||||
|
|
||||||
await domainProxy.start();
|
await domainProxy.start();
|
||||||
|
|
||||||
// Test default connection (should use default targetIP)
|
// When connecting to forcedProxyPort, forced domain handling triggers,
|
||||||
const response1 = await createTestClient(PROXY_PORT + 2, TEST_DATA);
|
// so the proxy will connect to '127.0.0.2' on the same port.
|
||||||
expect(response1).toEqual(`Echo: ${TEST_DATA}`);
|
const response = await createTestClient(forcedProxyPort, TEST_DATA);
|
||||||
|
expect(response).toEqual(`Echo: ${TEST_DATA}`);
|
||||||
// Create another proxy with a different default targetIP
|
|
||||||
const domainProxy2 = new PortProxy({
|
|
||||||
fromPort: PROXY_PORT + 3,
|
|
||||||
toPort: TEST_SERVER_PORT,
|
|
||||||
targetIP: '127.0.0.1',
|
|
||||||
domains: [],
|
|
||||||
sniEnabled: false,
|
|
||||||
defaultAllowedIPs: ['127.0.0.1'],
|
|
||||||
globalPortRanges: []
|
|
||||||
});
|
|
||||||
|
|
||||||
await domainProxy2.start();
|
|
||||||
const response2 = await createTestClient(PROXY_PORT + 3, TEST_DATA);
|
|
||||||
expect(response2).toEqual(`Echo: ${TEST_DATA}`);
|
|
||||||
|
|
||||||
await domainProxy.stop();
|
await domainProxy.stop();
|
||||||
await domainProxy2.stop();
|
|
||||||
await new Promise<void>((resolve) => testServer2.close(() => resolve()));
|
await new Promise<void>((resolve) => testServer2.close(() => resolve()));
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Test handling of multiple concurrent connections.
|
||||||
tap.test('should handle multiple concurrent connections', async () => {
|
tap.test('should handle multiple concurrent connections', async () => {
|
||||||
const concurrentRequests = 5;
|
const concurrentRequests = 5;
|
||||||
const requests = Array(concurrentRequests).fill(null).map((_, i) =>
|
const requests = Array(concurrentRequests).fill(null).map((_, i) =>
|
||||||
createTestClient(PROXY_PORT, `${TEST_DATA} ${i + 1}`)
|
createTestClient(PROXY_PORT, `${TEST_DATA} ${i + 1}`)
|
||||||
);
|
);
|
||||||
|
|
||||||
const responses = await Promise.all(requests);
|
const responses = await Promise.all(requests);
|
||||||
|
|
||||||
responses.forEach((response, i) => {
|
responses.forEach((response, i) => {
|
||||||
expect(response).toEqual(`Echo: ${TEST_DATA} ${i + 1}`);
|
expect(response).toEqual(`Echo: ${TEST_DATA} ${i + 1}`);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Test connection timeout handling.
|
||||||
tap.test('should handle connection timeouts', async () => {
|
tap.test('should handle connection timeouts', async () => {
|
||||||
const client = new net.Socket();
|
const client = new net.Socket();
|
||||||
await new Promise<void>((resolve) => {
|
await new Promise<void>((resolve) => {
|
||||||
client.connect(PROXY_PORT, 'localhost', () => {
|
client.connect(PROXY_PORT, 'localhost', () => {
|
||||||
// Don't send any data, just wait for timeout
|
// Do not send any data to trigger a timeout.
|
||||||
client.on('close', () => {
|
client.on('close', () => resolve());
|
||||||
resolve();
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Test stopping the port proxy.
|
||||||
tap.test('should stop port proxy', async () => {
|
tap.test('should stop port proxy', async () => {
|
||||||
await portProxy.stop();
|
await portProxy.stop();
|
||||||
expect((portProxy as any).netServers.every((server: net.Server) => !server.listening)).toBeTrue();
|
expect((portProxy as any).netServers.every((server: net.Server) => !server.listening)).toBeTrue();
|
||||||
});
|
});
|
||||||
|
|
||||||
// Cleanup chained proxies tests
|
// Test chained proxies with and without source IP preservation.
|
||||||
tap.test('should support optional source IP preservation in chained proxies', async () => {
|
tap.test('should support optional source IP preservation in chained proxies', async () => {
|
||||||
// Test 1: Without IP preservation (default behavior)
|
// Chained proxies without IP preservation.
|
||||||
const firstProxyDefault = new PortProxy({
|
const firstProxyDefault = new PortProxy({
|
||||||
fromPort: PROXY_PORT + 4,
|
fromPort: PROXY_PORT + 4,
|
||||||
toPort: PROXY_PORT + 5,
|
toPort: PROXY_PORT + 5,
|
||||||
targetIP: 'localhost',
|
targetIP: 'localhost',
|
||||||
domains: [],
|
domainConfigs: [],
|
||||||
sniEnabled: false,
|
sniEnabled: false,
|
||||||
defaultAllowedIPs: ['127.0.0.1', '::ffff:127.0.0.1'],
|
defaultAllowedIPs: ['127.0.0.1', '::ffff:127.0.0.1'],
|
||||||
globalPortRanges: []
|
globalPortRanges: []
|
||||||
});
|
});
|
||||||
|
|
||||||
const secondProxyDefault = new PortProxy({
|
const secondProxyDefault = new PortProxy({
|
||||||
fromPort: PROXY_PORT + 5,
|
fromPort: PROXY_PORT + 5,
|
||||||
toPort: TEST_SERVER_PORT,
|
toPort: TEST_SERVER_PORT,
|
||||||
targetIP: 'localhost',
|
targetIP: 'localhost',
|
||||||
domains: [],
|
domainConfigs: [],
|
||||||
sniEnabled: false,
|
sniEnabled: false,
|
||||||
defaultAllowedIPs: ['127.0.0.1', '::ffff:127.0.0.1'],
|
defaultAllowedIPs: ['127.0.0.1', '::ffff:127.0.0.1'],
|
||||||
globalPortRanges: []
|
globalPortRanges: []
|
||||||
});
|
});
|
||||||
|
|
||||||
await secondProxyDefault.start();
|
await secondProxyDefault.start();
|
||||||
await firstProxyDefault.start();
|
await firstProxyDefault.start();
|
||||||
|
|
||||||
// This should work because we explicitly allow both IPv4 and IPv6 formats
|
|
||||||
const response1 = await createTestClient(PROXY_PORT + 4, TEST_DATA);
|
const response1 = await createTestClient(PROXY_PORT + 4, TEST_DATA);
|
||||||
expect(response1).toEqual(`Echo: ${TEST_DATA}`);
|
expect(response1).toEqual(`Echo: ${TEST_DATA}`);
|
||||||
|
|
||||||
await firstProxyDefault.stop();
|
await firstProxyDefault.stop();
|
||||||
await secondProxyDefault.stop();
|
await secondProxyDefault.stop();
|
||||||
|
|
||||||
// Test 2: With IP preservation
|
// Chained proxies with IP preservation.
|
||||||
const firstProxyPreserved = new PortProxy({
|
const firstProxyPreserved = new PortProxy({
|
||||||
fromPort: PROXY_PORT + 6,
|
fromPort: PROXY_PORT + 6,
|
||||||
toPort: PROXY_PORT + 7,
|
toPort: PROXY_PORT + 7,
|
||||||
targetIP: 'localhost',
|
targetIP: 'localhost',
|
||||||
domains: [],
|
domainConfigs: [],
|
||||||
sniEnabled: false,
|
sniEnabled: false,
|
||||||
defaultAllowedIPs: ['127.0.0.1'],
|
defaultAllowedIPs: ['127.0.0.1'],
|
||||||
preserveSourceIP: true,
|
preserveSourceIP: true,
|
||||||
globalPortRanges: []
|
globalPortRanges: []
|
||||||
});
|
});
|
||||||
|
|
||||||
const secondProxyPreserved = new PortProxy({
|
const secondProxyPreserved = new PortProxy({
|
||||||
fromPort: PROXY_PORT + 7,
|
fromPort: PROXY_PORT + 7,
|
||||||
toPort: TEST_SERVER_PORT,
|
toPort: TEST_SERVER_PORT,
|
||||||
targetIP: 'localhost',
|
targetIP: 'localhost',
|
||||||
domains: [],
|
domainConfigs: [],
|
||||||
sniEnabled: false,
|
sniEnabled: false,
|
||||||
defaultAllowedIPs: ['127.0.0.1'],
|
defaultAllowedIPs: ['127.0.0.1'],
|
||||||
preserveSourceIP: true,
|
preserveSourceIP: true,
|
||||||
globalPortRanges: []
|
globalPortRanges: []
|
||||||
});
|
});
|
||||||
|
|
||||||
await secondProxyPreserved.start();
|
await secondProxyPreserved.start();
|
||||||
await firstProxyPreserved.start();
|
await firstProxyPreserved.start();
|
||||||
|
|
||||||
// This should work with just IPv4 because source IP is preserved
|
|
||||||
const response2 = await createTestClient(PROXY_PORT + 6, TEST_DATA);
|
const response2 = await createTestClient(PROXY_PORT + 6, TEST_DATA);
|
||||||
expect(response2).toEqual(`Echo: ${TEST_DATA}`);
|
expect(response2).toEqual(`Echo: ${TEST_DATA}`);
|
||||||
|
|
||||||
await firstProxyPreserved.stop();
|
await firstProxyPreserved.stop();
|
||||||
await secondProxyPreserved.stop();
|
await secondProxyPreserved.stop();
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// Test round-robin behavior for multiple target IPs in a domain config.
|
||||||
|
tap.test('should use round robin for multiple target IPs in domain config', async () => {
|
||||||
|
const domainConfig = {
|
||||||
|
domains: ['rr.test'],
|
||||||
|
allowedIPs: ['127.0.0.1'],
|
||||||
|
targetIPs: ['hostA', 'hostB']
|
||||||
|
} as any;
|
||||||
|
|
||||||
|
const proxyInstance = new PortProxy({
|
||||||
|
fromPort: 0,
|
||||||
|
toPort: 0,
|
||||||
|
targetIP: 'localhost',
|
||||||
|
domainConfigs: [domainConfig],
|
||||||
|
sniEnabled: false,
|
||||||
|
defaultAllowedIPs: [],
|
||||||
|
globalPortRanges: []
|
||||||
|
});
|
||||||
|
|
||||||
|
const firstTarget = (proxyInstance as any).getTargetIP(domainConfig);
|
||||||
|
const secondTarget = (proxyInstance as any).getTargetIP(domainConfig);
|
||||||
|
expect(firstTarget).toEqual('hostA');
|
||||||
|
expect(secondTarget).toEqual('hostB');
|
||||||
|
});
|
||||||
|
|
||||||
|
// CLEANUP: Tear down the test server.
|
||||||
tap.test('cleanup port proxy test environment', async () => {
|
tap.test('cleanup port proxy test environment', async () => {
|
||||||
await new Promise<void>((resolve) => testServer.close(() => resolve()));
|
await new Promise<void>((resolve) => testServer.close(() => resolve()));
|
||||||
});
|
});
|
||||||
@ -248,7 +242,6 @@ process.on('exit', () => {
|
|||||||
if (testServer) {
|
if (testServer) {
|
||||||
testServer.close();
|
testServer.close();
|
||||||
}
|
}
|
||||||
// Use a cast to access the private property for cleanup.
|
|
||||||
if (portProxy && (portProxy as any).netServers) {
|
if (portProxy && (portProxy as any).netServers) {
|
||||||
portProxy.stop();
|
portProxy.stop();
|
||||||
}
|
}
|
||||||
|
@ -3,6 +3,6 @@
|
|||||||
*/
|
*/
|
||||||
export const commitinfo = {
|
export const commitinfo = {
|
||||||
name: '@push.rocks/smartproxy',
|
name: '@push.rocks/smartproxy',
|
||||||
version: '3.17.0',
|
version: '3.22.3',
|
||||||
description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.'
|
description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.'
|
||||||
}
|
}
|
||||||
|
@ -1,11 +1,12 @@
|
|||||||
import * as plugins from './plugins.js';
|
import * as plugins from './plugins.js';
|
||||||
|
|
||||||
/** Domain configuration with per‐domain allowed port ranges */
|
/** Domain configuration with per-domain allowed port ranges */
|
||||||
export interface IDomainConfig {
|
export interface IDomainConfig {
|
||||||
domain: string | string[]; // Glob pattern or patterns for domain(s)
|
domains: string[]; // Glob patterns for domain(s)
|
||||||
allowedIPs: string[]; // Glob patterns for allowed IPs
|
allowedIPs: string[]; // Glob patterns for allowed IPs
|
||||||
targetIP?: string; // Optional target IP for this domain
|
blockedIPs?: string[]; // Glob patterns for blocked IPs
|
||||||
portRanges?: Array<{ from: number; to: number }>; // Optional domain-specific allowed port ranges
|
targetIPs?: string[]; // If multiple targetIPs are given, use round robin.
|
||||||
|
portRanges?: Array<{ from: number; to: number }>; // Optional port ranges
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Port proxy settings including global allowed port ranges */
|
/** Port proxy settings including global allowed port ranges */
|
||||||
@ -13,13 +14,15 @@ export interface IPortProxySettings extends plugins.tls.TlsOptions {
|
|||||||
fromPort: number;
|
fromPort: number;
|
||||||
toPort: number;
|
toPort: number;
|
||||||
targetIP?: string; // Global target host to proxy to, defaults to 'localhost'
|
targetIP?: string; // Global target host to proxy to, defaults to 'localhost'
|
||||||
domains: IDomainConfig[];
|
domainConfigs: IDomainConfig[];
|
||||||
sniEnabled?: boolean;
|
sniEnabled?: boolean;
|
||||||
defaultAllowedIPs?: string[];
|
defaultAllowedIPs?: string[];
|
||||||
|
defaultBlockedIPs?: string[];
|
||||||
preserveSourceIP?: boolean;
|
preserveSourceIP?: boolean;
|
||||||
maxConnectionLifetime?: number; // (ms) force cleanup of long-lived connections
|
maxConnectionLifetime?: number; // (ms) force cleanup of long-lived connections
|
||||||
globalPortRanges: Array<{ from: number; to: number }>; // Global allowed port ranges
|
globalPortRanges: Array<{ from: number; to: number }>; // Global allowed port ranges
|
||||||
forwardAllGlobalRanges?: boolean; // When true, forwards all connections on global port ranges to the global targetIP
|
forwardAllGlobalRanges?: boolean; // When true, forwards all connections on global port ranges to the global targetIP
|
||||||
|
gracefulShutdownTimeout?: number; // (ms) maximum time to wait for connections to close during shutdown
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -86,21 +89,62 @@ function extractSNI(buffer: Buffer): string | undefined {
|
|||||||
}
|
}
|
||||||
|
|
||||||
interface IConnectionRecord {
|
interface IConnectionRecord {
|
||||||
|
id: string; // Unique connection identifier
|
||||||
incoming: plugins.net.Socket;
|
incoming: plugins.net.Socket;
|
||||||
outgoing: plugins.net.Socket | null;
|
outgoing: plugins.net.Socket | null;
|
||||||
incomingStartTime: number;
|
incomingStartTime: number;
|
||||||
outgoingStartTime?: number;
|
outgoingStartTime?: number;
|
||||||
lockedDomain?: string; // New field to lock this connection to the initial SNI
|
outgoingClosedTime?: number;
|
||||||
connectionClosed: boolean;
|
lockedDomain?: string; // Used to lock this connection to the initial SNI
|
||||||
cleanupTimer?: NodeJS.Timeout; // Timer to force cleanup after max lifetime/inactivity
|
connectionClosed: boolean; // Flag to prevent multiple cleanup attempts
|
||||||
|
cleanupTimer?: NodeJS.Timeout; // Timer for max lifetime/inactivity
|
||||||
|
lastActivity: number; // Last activity timestamp for inactivity detection
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Helper: Check if a port falls within any of the given port ranges
|
||||||
|
const isPortInRanges = (port: number, ranges: Array<{ from: number; to: number }>): boolean => {
|
||||||
|
return ranges.some(range => port >= range.from && port <= range.to);
|
||||||
|
};
|
||||||
|
|
||||||
|
// Helper: Check if a given IP matches any of the glob patterns
|
||||||
|
const isAllowed = (ip: string, patterns: string[]): boolean => {
|
||||||
|
const normalizeIP = (ip: string): string[] => {
|
||||||
|
if (ip.startsWith('::ffff:')) {
|
||||||
|
const ipv4 = ip.slice(7);
|
||||||
|
return [ip, ipv4];
|
||||||
|
}
|
||||||
|
if (/^\d{1,3}(\.\d{1,3}){3}$/.test(ip)) {
|
||||||
|
return [ip, `::ffff:${ip}`];
|
||||||
|
}
|
||||||
|
return [ip];
|
||||||
|
};
|
||||||
|
const normalizedIPVariants = normalizeIP(ip);
|
||||||
|
const expandedPatterns = patterns.flatMap(normalizeIP);
|
||||||
|
return normalizedIPVariants.some(ipVariant =>
|
||||||
|
expandedPatterns.some(pattern => plugins.minimatch(ipVariant, pattern))
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
// Helper: Check if an IP is allowed considering allowed and blocked glob patterns
|
||||||
|
const isGlobIPAllowed = (ip: string, allowed: string[], blocked: string[] = []): boolean => {
|
||||||
|
if (blocked.length > 0 && isAllowed(ip, blocked)) return false;
|
||||||
|
return isAllowed(ip, allowed);
|
||||||
|
};
|
||||||
|
|
||||||
|
// Helper: Generate a unique connection ID
|
||||||
|
const generateConnectionId = (): string => {
|
||||||
|
return Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15);
|
||||||
|
};
|
||||||
|
|
||||||
export class PortProxy {
|
export class PortProxy {
|
||||||
private netServers: plugins.net.Server[] = [];
|
private netServers: plugins.net.Server[] = [];
|
||||||
settings: IPortProxySettings;
|
settings: IPortProxySettings;
|
||||||
// Unified record tracking each connection pair.
|
private connectionRecords: Map<string, IConnectionRecord> = new Map();
|
||||||
private connectionRecords: Set<IConnectionRecord> = new Set();
|
|
||||||
private connectionLogger: NodeJS.Timeout | null = null;
|
private connectionLogger: NodeJS.Timeout | null = null;
|
||||||
|
private isShuttingDown: boolean = false;
|
||||||
|
|
||||||
|
// Map to track round robin indices for each domain config
|
||||||
|
private domainTargetIndices: Map<IDomainConfig, number> = new Map();
|
||||||
|
|
||||||
private terminationStats: {
|
private terminationStats: {
|
||||||
incoming: Record<string, number>;
|
incoming: Record<string, number>;
|
||||||
@ -115,6 +159,7 @@ export class PortProxy {
|
|||||||
...settingsArg,
|
...settingsArg,
|
||||||
targetIP: settingsArg.targetIP || 'localhost',
|
targetIP: settingsArg.targetIP || 'localhost',
|
||||||
maxConnectionLifetime: settingsArg.maxConnectionLifetime || 600000,
|
maxConnectionLifetime: settingsArg.maxConnectionLifetime || 600000,
|
||||||
|
gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000,
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -122,39 +167,118 @@ export class PortProxy {
|
|||||||
this.terminationStats[side][reason] = (this.terminationStats[side][reason] || 0) + 1;
|
this.terminationStats[side][reason] = (this.terminationStats[side][reason] || 0) + 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Cleans up a connection record.
|
||||||
|
* Destroys both incoming and outgoing sockets, clears timers, and removes the record.
|
||||||
|
* @param record - The connection record to clean up
|
||||||
|
* @param reason - Optional reason for cleanup (for logging)
|
||||||
|
*/
|
||||||
|
private cleanupConnection(record: IConnectionRecord, reason: string = 'normal'): void {
|
||||||
|
if (!record.connectionClosed) {
|
||||||
|
record.connectionClosed = true;
|
||||||
|
|
||||||
|
if (record.cleanupTimer) {
|
||||||
|
clearTimeout(record.cleanupTimer);
|
||||||
|
record.cleanupTimer = undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
if (!record.incoming.destroyed) {
|
||||||
|
// Try graceful shutdown first, then force destroy after a short timeout
|
||||||
|
record.incoming.end();
|
||||||
|
setTimeout(() => {
|
||||||
|
if (record && !record.incoming.destroyed) {
|
||||||
|
record.incoming.destroy();
|
||||||
|
}
|
||||||
|
}, 1000);
|
||||||
|
}
|
||||||
|
} catch (err) {
|
||||||
|
console.log(`Error closing incoming socket: ${err}`);
|
||||||
|
if (!record.incoming.destroyed) {
|
||||||
|
record.incoming.destroy();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
if (record.outgoing && !record.outgoing.destroyed) {
|
||||||
|
// Try graceful shutdown first, then force destroy after a short timeout
|
||||||
|
record.outgoing.end();
|
||||||
|
setTimeout(() => {
|
||||||
|
if (record && record.outgoing && !record.outgoing.destroyed) {
|
||||||
|
record.outgoing.destroy();
|
||||||
|
}
|
||||||
|
}, 1000);
|
||||||
|
}
|
||||||
|
} catch (err) {
|
||||||
|
console.log(`Error closing outgoing socket: ${err}`);
|
||||||
|
if (record.outgoing && !record.outgoing.destroyed) {
|
||||||
|
record.outgoing.destroy();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Remove the record from the tracking map
|
||||||
|
this.connectionRecords.delete(record.id);
|
||||||
|
|
||||||
|
const remoteIP = record.incoming.remoteAddress || 'unknown';
|
||||||
|
console.log(`Connection from ${remoteIP} terminated (${reason}). Active connections: ${this.connectionRecords.size}`);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private updateActivity(record: IConnectionRecord): void {
|
||||||
|
record.lastActivity = Date.now();
|
||||||
|
}
|
||||||
|
|
||||||
|
private getTargetIP(domainConfig: IDomainConfig): string {
|
||||||
|
if (domainConfig.targetIPs && domainConfig.targetIPs.length > 0) {
|
||||||
|
const currentIndex = this.domainTargetIndices.get(domainConfig) || 0;
|
||||||
|
const ip = domainConfig.targetIPs[currentIndex % domainConfig.targetIPs.length];
|
||||||
|
this.domainTargetIndices.set(domainConfig, currentIndex + 1);
|
||||||
|
return ip;
|
||||||
|
}
|
||||||
|
return this.settings.targetIP!;
|
||||||
|
}
|
||||||
|
|
||||||
public async start() {
|
public async start() {
|
||||||
// Define a unified connection handler for all listening ports.
|
// Define a unified connection handler for all listening ports.
|
||||||
const connectionHandler = (socket: plugins.net.Socket) => {
|
const connectionHandler = (socket: plugins.net.Socket) => {
|
||||||
|
if (this.isShuttingDown) {
|
||||||
|
socket.end();
|
||||||
|
socket.destroy();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
const remoteIP = socket.remoteAddress || '';
|
const remoteIP = socket.remoteAddress || '';
|
||||||
const localPort = socket.localPort; // The port on which this connection was accepted.
|
const localPort = socket.localPort; // The port on which this connection was accepted.
|
||||||
|
|
||||||
|
const connectionId = generateConnectionId();
|
||||||
const connectionRecord: IConnectionRecord = {
|
const connectionRecord: IConnectionRecord = {
|
||||||
|
id: connectionId,
|
||||||
incoming: socket,
|
incoming: socket,
|
||||||
outgoing: null,
|
outgoing: null,
|
||||||
incomingStartTime: Date.now(),
|
incomingStartTime: Date.now(),
|
||||||
connectionClosed: false,
|
lastActivity: Date.now(),
|
||||||
|
connectionClosed: false
|
||||||
};
|
};
|
||||||
this.connectionRecords.add(connectionRecord);
|
this.connectionRecords.set(connectionId, connectionRecord);
|
||||||
|
|
||||||
console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionRecords.size}`);
|
console.log(`New connection from ${remoteIP} on port ${localPort}. Active connections: ${this.connectionRecords.size}`);
|
||||||
|
|
||||||
let initialDataReceived = false;
|
let initialDataReceived = false;
|
||||||
let incomingTerminationReason: string | null = null;
|
let incomingTerminationReason: string | null = null;
|
||||||
let outgoingTerminationReason: string | null = null;
|
let outgoingTerminationReason: string | null = null;
|
||||||
|
|
||||||
// Ensure cleanup happens only once for the entire connection record.
|
// Local function for cleanupOnce
|
||||||
const cleanupOnce = async () => {
|
const cleanupOnce = () => {
|
||||||
if (!connectionRecord.connectionClosed) {
|
this.cleanupConnection(connectionRecord);
|
||||||
connectionRecord.connectionClosed = true;
|
};
|
||||||
if (connectionRecord.cleanupTimer) {
|
|
||||||
clearTimeout(connectionRecord.cleanupTimer);
|
// Define initiateCleanupOnce for compatibility with potential future improvements
|
||||||
}
|
const initiateCleanupOnce = (reason: string = 'normal') => {
|
||||||
if (!socket.destroyed) socket.destroy();
|
console.log(`Connection cleanup initiated for ${remoteIP} (${reason})`);
|
||||||
if (connectionRecord.outgoing && !connectionRecord.outgoing.destroyed) connectionRecord.outgoing.destroy();
|
cleanupOnce();
|
||||||
this.connectionRecords.delete(connectionRecord);
|
|
||||||
console.log(`Connection from ${remoteIP} terminated. Active connections: ${this.connectionRecords.size}`);
|
|
||||||
}
|
|
||||||
};
|
};
|
||||||
|
|
||||||
// Helper to reject an incoming connection.
|
// Helper to reject an incoming connection
|
||||||
const rejectIncomingConnection = (reason: string, logMessage: string) => {
|
const rejectIncomingConnection = (reason: string, logMessage: string) => {
|
||||||
console.log(logMessage);
|
console.log(logMessage);
|
||||||
socket.end();
|
socket.end();
|
||||||
@ -165,11 +289,22 @@ export class PortProxy {
|
|||||||
cleanupOnce();
|
cleanupOnce();
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Set an initial timeout for SNI data if needed
|
||||||
|
let initialTimeout: NodeJS.Timeout | null = null;
|
||||||
|
if (this.settings.sniEnabled) {
|
||||||
|
initialTimeout = setTimeout(() => {
|
||||||
|
if (!initialDataReceived) {
|
||||||
|
console.log(`Initial data timeout for ${remoteIP}`);
|
||||||
|
socket.end();
|
||||||
|
cleanupOnce();
|
||||||
|
}
|
||||||
|
}, 5000);
|
||||||
|
} else {
|
||||||
|
initialDataReceived = true;
|
||||||
|
}
|
||||||
|
|
||||||
socket.on('error', (err: Error) => {
|
socket.on('error', (err: Error) => {
|
||||||
const errorMessage = initialDataReceived
|
console.log(`Incoming socket error from ${remoteIP}: ${err.message}`);
|
||||||
? `(Immediate) Incoming socket error from ${remoteIP}: ${err.message}`
|
|
||||||
: `(Premature) Incoming socket error from ${remoteIP} before data received: ${err.message}`;
|
|
||||||
console.log(errorMessage);
|
|
||||||
});
|
});
|
||||||
|
|
||||||
const handleError = (side: 'incoming' | 'outgoing') => (err: Error) => {
|
const handleError = (side: 'incoming' | 'outgoing') => (err: Error) => {
|
||||||
@ -188,7 +323,7 @@ export class PortProxy {
|
|||||||
outgoingTerminationReason = reason;
|
outgoingTerminationReason = reason;
|
||||||
this.incrementTerminationStat('outgoing', reason);
|
this.incrementTerminationStat('outgoing', reason);
|
||||||
}
|
}
|
||||||
cleanupOnce();
|
initiateCleanupOnce(reason);
|
||||||
};
|
};
|
||||||
|
|
||||||
const handleClose = (side: 'incoming' | 'outgoing') => () => {
|
const handleClose = (side: 'incoming' | 'outgoing') => () => {
|
||||||
@ -199,8 +334,10 @@ export class PortProxy {
|
|||||||
} else if (side === 'outgoing' && outgoingTerminationReason === null) {
|
} else if (side === 'outgoing' && outgoingTerminationReason === null) {
|
||||||
outgoingTerminationReason = 'normal';
|
outgoingTerminationReason = 'normal';
|
||||||
this.incrementTerminationStat('outgoing', 'normal');
|
this.incrementTerminationStat('outgoing', 'normal');
|
||||||
|
// Record the time when outgoing socket closed.
|
||||||
|
connectionRecord.outgoingClosedTime = Date.now();
|
||||||
}
|
}
|
||||||
cleanupOnce();
|
initiateCleanupOnce('closed_' + side);
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -208,32 +345,44 @@ export class PortProxy {
|
|||||||
* @param serverName - The SNI hostname (unused when forcedDomain is provided).
|
* @param serverName - The SNI hostname (unused when forcedDomain is provided).
|
||||||
* @param initialChunk - Optional initial data chunk.
|
* @param initialChunk - Optional initial data chunk.
|
||||||
* @param forcedDomain - If provided, overrides SNI/domain lookup (used for port-based routing).
|
* @param forcedDomain - If provided, overrides SNI/domain lookup (used for port-based routing).
|
||||||
* @param overridePort - If provided, use this port for the outgoing connection (typically the same as the incoming port).
|
* @param overridePort - If provided, use this port for the outgoing connection.
|
||||||
*/
|
*/
|
||||||
const setupConnection = (serverName: string, initialChunk?: Buffer, forcedDomain?: IDomainConfig, overridePort?: number) => {
|
const setupConnection = (serverName: string, initialChunk?: Buffer, forcedDomain?: IDomainConfig, overridePort?: number) => {
|
||||||
|
// Clear the initial timeout since we've received data
|
||||||
|
if (initialTimeout) {
|
||||||
|
clearTimeout(initialTimeout);
|
||||||
|
initialTimeout = null;
|
||||||
|
}
|
||||||
|
|
||||||
// If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
|
// If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
|
||||||
const domainConfig = forcedDomain
|
const domainConfig = forcedDomain
|
||||||
? forcedDomain
|
? forcedDomain
|
||||||
: (serverName ? this.settings.domains.find(config => {
|
: (serverName ? this.settings.domainConfigs.find(config =>
|
||||||
if (typeof config.domain === 'string') {
|
config.domains.some(d => plugins.minimatch(serverName, d))
|
||||||
return plugins.minimatch(serverName, config.domain);
|
) : undefined);
|
||||||
} else {
|
|
||||||
return config.domain.some(d => plugins.minimatch(serverName, d));
|
|
||||||
}
|
|
||||||
}) : undefined);
|
|
||||||
|
|
||||||
// If a matching domain config exists, check its allowedIPs.
|
// IP validation is skipped if allowedIPs is empty
|
||||||
if (domainConfig) {
|
if (domainConfig) {
|
||||||
if (!isAllowed(remoteIP, domainConfig.allowedIPs)) {
|
const effectiveAllowedIPs: string[] = [
|
||||||
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for domain ${Array.isArray(domainConfig.domain) ? domainConfig.domain.join(', ') : domainConfig.domain}`);
|
...domainConfig.allowedIPs,
|
||||||
|
...(this.settings.defaultAllowedIPs || [])
|
||||||
|
];
|
||||||
|
const effectiveBlockedIPs: string[] = [
|
||||||
|
...(domainConfig.blockedIPs || []),
|
||||||
|
...(this.settings.defaultBlockedIPs || [])
|
||||||
|
];
|
||||||
|
|
||||||
|
// Skip IP validation if allowedIPs is empty
|
||||||
|
if (domainConfig.allowedIPs.length > 0 && !isGlobIPAllowed(remoteIP, effectiveAllowedIPs, effectiveBlockedIPs)) {
|
||||||
|
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for domain ${domainConfig.domains.join(', ')}`);
|
||||||
}
|
}
|
||||||
} else if (this.settings.defaultAllowedIPs) {
|
} else if (this.settings.defaultAllowedIPs && this.settings.defaultAllowedIPs.length > 0) {
|
||||||
// Only check default allowed IPs if no domain config matched.
|
if (!isGlobIPAllowed(remoteIP, this.settings.defaultAllowedIPs, this.settings.defaultBlockedIPs || [])) {
|
||||||
if (!isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
|
||||||
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed by default allowed list`);
|
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed by default allowed list`);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
const targetHost = domainConfig?.targetIP || this.settings.targetIP!;
|
|
||||||
|
const targetHost = domainConfig ? this.getTargetIP(domainConfig) : this.settings.targetIP!;
|
||||||
const connectionOptions: plugins.net.NetConnectOpts = {
|
const connectionOptions: plugins.net.NetConnectOpts = {
|
||||||
host: targetHost,
|
host: targetHost,
|
||||||
port: overridePort !== undefined ? overridePort : this.settings.toPort,
|
port: overridePort !== undefined ? overridePort : this.settings.toPort,
|
||||||
@ -242,23 +391,25 @@ export class PortProxy {
|
|||||||
connectionOptions.localAddress = remoteIP.replace('::ffff:', '');
|
connectionOptions.localAddress = remoteIP.replace('::ffff:', '');
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Create the target socket and immediately set up data piping
|
||||||
const targetSocket = plugins.net.connect(connectionOptions);
|
const targetSocket = plugins.net.connect(connectionOptions);
|
||||||
connectionRecord.outgoing = targetSocket;
|
connectionRecord.outgoing = targetSocket;
|
||||||
connectionRecord.outgoingStartTime = Date.now();
|
connectionRecord.outgoingStartTime = Date.now();
|
||||||
|
|
||||||
console.log(
|
// Set up the pipe immediately to ensure data flows without delay
|
||||||
`Connection established: ${remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
|
||||||
`${serverName ? ` (SNI: ${serverName})` : forcedDomain ? ` (Port-based for domain: ${Array.isArray(forcedDomain.domain) ? forcedDomain.domain.join(', ') : forcedDomain.domain})` : ''}`
|
|
||||||
);
|
|
||||||
|
|
||||||
if (initialChunk) {
|
if (initialChunk) {
|
||||||
socket.unshift(initialChunk);
|
socket.unshift(initialChunk);
|
||||||
}
|
}
|
||||||
socket.setTimeout(120000);
|
|
||||||
socket.pipe(targetSocket);
|
socket.pipe(targetSocket);
|
||||||
targetSocket.pipe(socket);
|
targetSocket.pipe(socket);
|
||||||
|
|
||||||
|
console.log(
|
||||||
|
`Connection established: ${remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
||||||
|
`${serverName ? ` (SNI: ${serverName})` : forcedDomain ? ` (Port-based for domain: ${forcedDomain.domains.join(', ')})` : ''}`
|
||||||
|
);
|
||||||
|
|
||||||
// Attach error and close handlers.
|
// Add appropriate handlers for connection management
|
||||||
socket.on('error', handleError('incoming'));
|
socket.on('error', handleError('incoming'));
|
||||||
targetSocket.on('error', handleError('outgoing'));
|
targetSocket.on('error', handleError('outgoing'));
|
||||||
socket.on('close', handleClose('incoming'));
|
socket.on('close', handleClose('incoming'));
|
||||||
@ -269,7 +420,7 @@ export class PortProxy {
|
|||||||
incomingTerminationReason = 'timeout';
|
incomingTerminationReason = 'timeout';
|
||||||
this.incrementTerminationStat('incoming', 'timeout');
|
this.incrementTerminationStat('incoming', 'timeout');
|
||||||
}
|
}
|
||||||
cleanupOnce();
|
initiateCleanupOnce('timeout_incoming');
|
||||||
});
|
});
|
||||||
targetSocket.on('timeout', () => {
|
targetSocket.on('timeout', () => {
|
||||||
console.log(`Timeout on outgoing side from ${remoteIP}`);
|
console.log(`Timeout on outgoing side from ${remoteIP}`);
|
||||||
@ -277,45 +428,28 @@ export class PortProxy {
|
|||||||
outgoingTerminationReason = 'timeout';
|
outgoingTerminationReason = 'timeout';
|
||||||
this.incrementTerminationStat('outgoing', 'timeout');
|
this.incrementTerminationStat('outgoing', 'timeout');
|
||||||
}
|
}
|
||||||
cleanupOnce();
|
initiateCleanupOnce('timeout_outgoing');
|
||||||
});
|
});
|
||||||
socket.on('end', handleClose('incoming'));
|
|
||||||
targetSocket.on('end', handleClose('outgoing'));
|
|
||||||
|
|
||||||
// Initialize a cleanup timer for max connection lifetime.
|
// Set appropriate timeouts
|
||||||
|
socket.setTimeout(120000);
|
||||||
|
targetSocket.setTimeout(120000);
|
||||||
|
|
||||||
|
// Update activity for both sockets
|
||||||
|
socket.on('data', () => {
|
||||||
|
connectionRecord.lastActivity = Date.now();
|
||||||
|
});
|
||||||
|
|
||||||
|
targetSocket.on('data', () => {
|
||||||
|
connectionRecord.lastActivity = Date.now();
|
||||||
|
});
|
||||||
|
|
||||||
|
// Initialize a cleanup timer for max connection lifetime
|
||||||
if (this.settings.maxConnectionLifetime) {
|
if (this.settings.maxConnectionLifetime) {
|
||||||
let incomingActive = false;
|
connectionRecord.cleanupTimer = setTimeout(() => {
|
||||||
let outgoingActive = false;
|
console.log(`Connection from ${remoteIP} exceeded max lifetime (${this.settings.maxConnectionLifetime}ms), forcing cleanup.`);
|
||||||
const resetCleanupTimer = () => {
|
initiateCleanupOnce('max_lifetime');
|
||||||
if (this.settings.maxConnectionLifetime) {
|
}, this.settings.maxConnectionLifetime);
|
||||||
if (connectionRecord.cleanupTimer) {
|
|
||||||
clearTimeout(connectionRecord.cleanupTimer);
|
|
||||||
}
|
|
||||||
connectionRecord.cleanupTimer = setTimeout(() => {
|
|
||||||
console.log(`Connection from ${remoteIP} exceeded max lifetime with inactivity (${this.settings.maxConnectionLifetime}ms), forcing cleanup.`);
|
|
||||||
cleanupOnce();
|
|
||||||
}, this.settings.maxConnectionLifetime);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
resetCleanupTimer();
|
|
||||||
|
|
||||||
socket.on('data', () => {
|
|
||||||
incomingActive = true;
|
|
||||||
if (incomingActive && outgoingActive) {
|
|
||||||
resetCleanupTimer();
|
|
||||||
incomingActive = false;
|
|
||||||
outgoingActive = false;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
targetSocket.on('data', () => {
|
|
||||||
outgoingActive = true;
|
|
||||||
if (incomingActive && outgoingActive) {
|
|
||||||
resetCleanupTimer();
|
|
||||||
incomingActive = false;
|
|
||||||
outgoingActive = false;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -330,24 +464,33 @@ export class PortProxy {
|
|||||||
}
|
}
|
||||||
console.log(`Port-based connection from ${remoteIP} on port ${localPort} forwarded to global target IP ${this.settings.targetIP}.`);
|
console.log(`Port-based connection from ${remoteIP} on port ${localPort} forwarded to global target IP ${this.settings.targetIP}.`);
|
||||||
setupConnection('', undefined, {
|
setupConnection('', undefined, {
|
||||||
domain: 'global',
|
domains: ['global'],
|
||||||
allowedIPs: this.settings.defaultAllowedIPs || [],
|
allowedIPs: this.settings.defaultAllowedIPs || [],
|
||||||
targetIP: this.settings.targetIP,
|
blockedIPs: this.settings.defaultBlockedIPs || [],
|
||||||
|
targetIPs: [this.settings.targetIP!],
|
||||||
portRanges: []
|
portRanges: []
|
||||||
}, localPort);
|
}, localPort);
|
||||||
return;
|
return;
|
||||||
} else {
|
} else {
|
||||||
// Attempt to find a matching forced domain config based on the local port.
|
// Attempt to find a matching forced domain config based on the local port.
|
||||||
const forcedDomain = this.settings.domains.find(
|
const forcedDomain = this.settings.domainConfigs.find(
|
||||||
domain => domain.portRanges && domain.portRanges.length > 0 && isPortInRanges(localPort, domain.portRanges)
|
domain => domain.portRanges && domain.portRanges.length > 0 && isPortInRanges(localPort, domain.portRanges)
|
||||||
);
|
);
|
||||||
if (forcedDomain) {
|
if (forcedDomain) {
|
||||||
if (!isAllowed(remoteIP, forcedDomain.allowedIPs)) {
|
const effectiveAllowedIPs: string[] = [
|
||||||
console.log(`Connection from ${remoteIP} rejected: IP not allowed for domain ${Array.isArray(forcedDomain.domain) ? forcedDomain.domain.join(', ') : forcedDomain.domain} on port ${localPort}.`);
|
...forcedDomain.allowedIPs,
|
||||||
|
...(this.settings.defaultAllowedIPs || [])
|
||||||
|
];
|
||||||
|
const effectiveBlockedIPs: string[] = [
|
||||||
|
...(forcedDomain.blockedIPs || []),
|
||||||
|
...(this.settings.defaultBlockedIPs || [])
|
||||||
|
];
|
||||||
|
if (!isGlobIPAllowed(remoteIP, effectiveAllowedIPs, effectiveBlockedIPs)) {
|
||||||
|
console.log(`Connection from ${remoteIP} rejected: IP not allowed for domain ${forcedDomain.domains.join(', ')} on port ${localPort}.`);
|
||||||
socket.end();
|
socket.end();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
console.log(`Port-based connection from ${remoteIP} on port ${localPort} matched domain ${Array.isArray(forcedDomain.domain) ? forcedDomain.domain.join(', ') : forcedDomain.domain}.`);
|
console.log(`Port-based connection from ${remoteIP} on port ${localPort} matched domain ${forcedDomain.domains.join(', ')}.`);
|
||||||
setupConnection('', undefined, forcedDomain, localPort);
|
setupConnection('', undefined, forcedDomain, localPort);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@ -357,34 +500,46 @@ export class PortProxy {
|
|||||||
|
|
||||||
// --- FALLBACK: SNI-BASED HANDLING (or default when SNI is disabled) ---
|
// --- FALLBACK: SNI-BASED HANDLING (or default when SNI is disabled) ---
|
||||||
if (this.settings.sniEnabled) {
|
if (this.settings.sniEnabled) {
|
||||||
socket.setTimeout(5000, () => {
|
initialDataReceived = false;
|
||||||
console.log(`Initial data timeout for ${remoteIP}`);
|
|
||||||
socket.end();
|
|
||||||
cleanupOnce();
|
|
||||||
});
|
|
||||||
|
|
||||||
socket.once('data', (chunk: Buffer) => {
|
socket.once('data', (chunk: Buffer) => {
|
||||||
socket.setTimeout(0);
|
if (initialTimeout) {
|
||||||
|
clearTimeout(initialTimeout);
|
||||||
|
initialTimeout = null;
|
||||||
|
}
|
||||||
|
|
||||||
initialDataReceived = true;
|
initialDataReceived = true;
|
||||||
const serverName = extractSNI(chunk) || '';
|
const serverName = extractSNI(chunk) || '';
|
||||||
// Lock the connection to the negotiated SNI.
|
// Lock the connection to the negotiated SNI.
|
||||||
connectionRecord.lockedDomain = serverName;
|
connectionRecord.lockedDomain = serverName;
|
||||||
console.log(`Received connection from ${remoteIP} with SNI: ${serverName}`);
|
console.log(`Received connection from ${remoteIP} with SNI: ${serverName}`);
|
||||||
// Add an extra data listener to check for a renegotiated ClientHello.
|
|
||||||
socket.on('data', (chunk: Buffer) => {
|
// Delay adding the renegotiation listener until the next tick,
|
||||||
if (chunk.length > 0 && chunk.readUInt8(0) === 22) {
|
// so the initial ClientHello is not reprocessed.
|
||||||
const newSNI = extractSNI(chunk);
|
setImmediate(() => {
|
||||||
if (newSNI && newSNI !== connectionRecord.lockedDomain) {
|
socket.on('data', (renegChunk: Buffer) => {
|
||||||
console.log(`Rehandshake detected with different SNI: ${newSNI} vs locked ${connectionRecord.lockedDomain}. Terminating connection.`);
|
if (renegChunk.length > 0 && renegChunk.readUInt8(0) === 22) {
|
||||||
cleanupOnce();
|
try {
|
||||||
|
// Try to extract SNI from potential renegotiation
|
||||||
|
const newSNI = extractSNI(renegChunk);
|
||||||
|
if (newSNI && newSNI !== connectionRecord.lockedDomain) {
|
||||||
|
console.log(`Rehandshake detected with different SNI: ${newSNI} vs locked ${connectionRecord.lockedDomain}. Terminating connection.`);
|
||||||
|
initiateCleanupOnce('sni_mismatch');
|
||||||
|
} else if (newSNI) {
|
||||||
|
console.log(`Rehandshake detected with same SNI: ${newSNI}. Allowing.`);
|
||||||
|
}
|
||||||
|
} catch (err) {
|
||||||
|
console.log(`Error processing potential renegotiation: ${err}. Allowing connection to continue.`);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
setupConnection(serverName, chunk);
|
setupConnection(serverName, chunk);
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
initialDataReceived = true;
|
initialDataReceived = true;
|
||||||
if (!this.settings.defaultAllowedIPs || !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
if (!this.settings.defaultAllowedIPs || this.settings.defaultAllowedIPs.length === 0 || !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
||||||
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for non-SNI connection`);
|
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for non-SNI connection`);
|
||||||
}
|
}
|
||||||
setupConnection('');
|
setupConnection('');
|
||||||
@ -401,7 +556,7 @@ export class PortProxy {
|
|||||||
listeningPorts.add(port);
|
listeningPorts.add(port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// Also ensure the default fromPort is listened to if it isn’t already in the ranges.
|
// Also ensure the default fromPort is listened to if it isn't already in the ranges.
|
||||||
listeningPorts.add(this.settings.fromPort);
|
listeningPorts.add(this.settings.fromPort);
|
||||||
} else {
|
} else {
|
||||||
listeningPorts.add(this.settings.fromPort);
|
listeningPorts.add(this.settings.fromPort);
|
||||||
@ -420,17 +575,46 @@ export class PortProxy {
|
|||||||
this.netServers.push(server);
|
this.netServers.push(server);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Log active connection count and longest running durations every 10 seconds.
|
// Log active connection count, longest running durations, and run parity checks every 10 seconds.
|
||||||
this.connectionLogger = setInterval(() => {
|
this.connectionLogger = setInterval(() => {
|
||||||
|
if (this.isShuttingDown) return;
|
||||||
|
|
||||||
const now = Date.now();
|
const now = Date.now();
|
||||||
let maxIncoming = 0;
|
let maxIncoming = 0;
|
||||||
let maxOutgoing = 0;
|
let maxOutgoing = 0;
|
||||||
for (const record of this.connectionRecords) {
|
|
||||||
|
// Create a copy of the keys to avoid modification during iteration
|
||||||
|
const connectionIds = [...this.connectionRecords.keys()];
|
||||||
|
|
||||||
|
for (const id of connectionIds) {
|
||||||
|
const record = this.connectionRecords.get(id);
|
||||||
|
if (!record) continue;
|
||||||
|
|
||||||
maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
|
maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
|
||||||
if (record.outgoingStartTime) {
|
if (record.outgoingStartTime) {
|
||||||
maxOutgoing = Math.max(maxOutgoing, now - record.outgoingStartTime);
|
maxOutgoing = Math.max(maxOutgoing, now - record.outgoingStartTime);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Parity check: if outgoing socket closed and incoming remains active
|
||||||
|
if (record.outgoingClosedTime &&
|
||||||
|
!record.incoming.destroyed &&
|
||||||
|
!record.connectionClosed &&
|
||||||
|
(now - record.outgoingClosedTime > 30000)) {
|
||||||
|
const remoteIP = record.incoming.remoteAddress || 'unknown';
|
||||||
|
console.log(`Parity check: Incoming socket for ${remoteIP} still active ${plugins.prettyMs(now - record.outgoingClosedTime)} after outgoing closed.`);
|
||||||
|
this.cleanupConnection(record, 'parity_check');
|
||||||
|
}
|
||||||
|
|
||||||
|
// Inactivity check
|
||||||
|
const inactivityTime = now - record.lastActivity;
|
||||||
|
if (inactivityTime > 180000 && // 3 minutes
|
||||||
|
!record.connectionClosed) {
|
||||||
|
const remoteIP = record.incoming.remoteAddress || 'unknown';
|
||||||
|
console.log(`Inactivity check: No activity on connection from ${remoteIP} for ${plugins.prettyMs(inactivityTime)}.`);
|
||||||
|
this.cleanupConnection(record, 'inactivity');
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
console.log(
|
console.log(
|
||||||
`(Interval Log) Active connections: ${this.connectionRecords.size}. ` +
|
`(Interval Log) Active connections: ${this.connectionRecords.size}. ` +
|
||||||
`Longest running incoming: ${plugins.prettyMs(maxIncoming)}, outgoing: ${plugins.prettyMs(maxOutgoing)}. ` +
|
`Longest running incoming: ${plugins.prettyMs(maxIncoming)}, outgoing: ${plugins.prettyMs(maxOutgoing)}. ` +
|
||||||
@ -441,41 +625,69 @@ export class PortProxy {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public async stop() {
|
public async stop() {
|
||||||
// Close all servers.
|
console.log("PortProxy shutting down...");
|
||||||
const closePromises: Promise<void>[] = this.netServers.map(
|
this.isShuttingDown = true;
|
||||||
|
|
||||||
|
// Stop accepting new connections
|
||||||
|
const closeServerPromises: Promise<void>[] = this.netServers.map(
|
||||||
server =>
|
server =>
|
||||||
new Promise<void>((resolve) => {
|
new Promise<void>((resolve) => {
|
||||||
server.close(() => resolve());
|
server.close(() => resolve());
|
||||||
})
|
})
|
||||||
);
|
);
|
||||||
|
|
||||||
|
// Stop the connection logger
|
||||||
if (this.connectionLogger) {
|
if (this.connectionLogger) {
|
||||||
clearInterval(this.connectionLogger);
|
clearInterval(this.connectionLogger);
|
||||||
this.connectionLogger = null;
|
this.connectionLogger = null;
|
||||||
}
|
}
|
||||||
await Promise.all(closePromises);
|
|
||||||
|
// Wait for servers to close
|
||||||
|
await Promise.all(closeServerPromises);
|
||||||
|
console.log("All servers closed. Cleaning up active connections...");
|
||||||
|
|
||||||
|
// Clean up active connections
|
||||||
|
const connectionIds = [...this.connectionRecords.keys()];
|
||||||
|
console.log(`Cleaning up ${connectionIds.length} active connections...`);
|
||||||
|
|
||||||
|
for (const id of connectionIds) {
|
||||||
|
const record = this.connectionRecords.get(id);
|
||||||
|
if (record && !record.connectionClosed) {
|
||||||
|
this.cleanupConnection(record, 'shutdown');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wait for graceful shutdown or timeout
|
||||||
|
const shutdownTimeout = this.settings.gracefulShutdownTimeout || 30000;
|
||||||
|
await new Promise<void>((resolve) => {
|
||||||
|
const checkInterval = setInterval(() => {
|
||||||
|
if (this.connectionRecords.size === 0) {
|
||||||
|
clearInterval(checkInterval);
|
||||||
|
resolve();
|
||||||
|
}
|
||||||
|
}, 1000);
|
||||||
|
|
||||||
|
// Force resolve after timeout
|
||||||
|
setTimeout(() => {
|
||||||
|
clearInterval(checkInterval);
|
||||||
|
if (this.connectionRecords.size > 0) {
|
||||||
|
console.log(`Forcing shutdown with ${this.connectionRecords.size} connections still active`);
|
||||||
|
|
||||||
|
// Force destroy any remaining connections
|
||||||
|
for (const record of this.connectionRecords.values()) {
|
||||||
|
if (!record.incoming.destroyed) {
|
||||||
|
record.incoming.destroy();
|
||||||
|
}
|
||||||
|
if (record.outgoing && !record.outgoing.destroyed) {
|
||||||
|
record.outgoing.destroy();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
this.connectionRecords.clear();
|
||||||
|
}
|
||||||
|
resolve();
|
||||||
|
}, shutdownTimeout);
|
||||||
|
});
|
||||||
|
|
||||||
|
console.log("PortProxy shutdown complete.");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Helper: Check if a port falls within any of the given port ranges.
|
|
||||||
const isPortInRanges = (port: number, ranges: Array<{ from: number; to: number }>): boolean => {
|
|
||||||
return ranges.some(range => port >= range.from && port <= range.to);
|
|
||||||
};
|
|
||||||
|
|
||||||
// Helper: Check if a given IP matches any of the glob patterns.
|
|
||||||
const isAllowed = (ip: string, patterns: string[]): boolean => {
|
|
||||||
const normalizeIP = (ip: string): string[] => {
|
|
||||||
if (ip.startsWith('::ffff:')) {
|
|
||||||
const ipv4 = ip.slice(7);
|
|
||||||
return [ip, ipv4];
|
|
||||||
}
|
|
||||||
if (/^\d{1,3}(\.\d{1,3}){3}$/.test(ip)) {
|
|
||||||
return [ip, `::ffff:${ip}`];
|
|
||||||
}
|
|
||||||
return [ip];
|
|
||||||
};
|
|
||||||
const normalizedIPVariants = normalizeIP(ip);
|
|
||||||
const expandedPatterns = patterns.flatMap(normalizeIP);
|
|
||||||
return normalizedIPVariants.some(ipVariant =>
|
|
||||||
expandedPatterns.some(pattern => plugins.minimatch(ipVariant, pattern))
|
|
||||||
);
|
|
||||||
};
|
|
Reference in New Issue
Block a user