Compare commits
10 Commits
Author | SHA1 | Date | |
---|---|---|---|
e212dacbf3 | |||
eea8942670 | |||
0574331b91 | |||
06e6c2eb52 | |||
edd9db31c2 | |||
d4251b2cf9 | |||
4ccc1db8a2 | |||
7e3ed93bc9 | |||
fa793f2c4a | |||
fe8106f0c8 |
42
changelog.md
42
changelog.md
@ -1,5 +1,47 @@
|
|||||||
# Changelog
|
# Changelog
|
||||||
|
|
||||||
|
## 2025-03-06 - 3.27.0 - feat(AcmeCertManager)
|
||||||
|
Introduce AcmeCertManager for enhanced ACME certificate management
|
||||||
|
|
||||||
|
- Refactored the existing Port80Handler to AcmeCertManager.
|
||||||
|
- Added event-driven certificate management with CertManagerEvents.
|
||||||
|
- Introduced options for configuration such as renew thresholds and production mode.
|
||||||
|
- Implemented certificate renewal checks and logging improvements.
|
||||||
|
|
||||||
|
## 2025-03-05 - 3.26.0 - feat(readme)
|
||||||
|
Updated README with enhanced TLS handling, connection management, and troubleshooting sections.
|
||||||
|
|
||||||
|
- Added details on enhanced TLS handling and browser compatibility improvements.
|
||||||
|
- Included advanced connection management features like random timeout prevention.
|
||||||
|
- Provided comprehensive troubleshooting tips for browser certificate errors and connection stability.
|
||||||
|
- Clarified default configuration options and optimization settings for PortProxy.
|
||||||
|
|
||||||
|
## 2025-03-05 - 3.25.4 - fix(portproxy)
|
||||||
|
Improve connection timeouts and detailed logging for PortProxy
|
||||||
|
|
||||||
|
- Refactored timeout management for connections to include enhanced defaults and prevent thundering herd.
|
||||||
|
- Improved support for TLS handshake detection with logging capabilities in PortProxy.
|
||||||
|
- Removed protocol-specific handling which is now managed generically.
|
||||||
|
- Introduced enhanced logging for SNI extraction and connection management.
|
||||||
|
|
||||||
|
## 2025-03-05 - 3.25.3 - fix(core)
|
||||||
|
Update dependencies and configuration improvements.
|
||||||
|
|
||||||
|
- Upgrade TypeScript version to 5.8.2 for better compatibility.
|
||||||
|
- Ensure all proxy and server tests pass with updated configurations.
|
||||||
|
- Improve logging for better traceability in proxy operations.
|
||||||
|
- Add handlers for WebSockets and HTTPS improvements.
|
||||||
|
- Fix various issues related to proxy timeout and connection handling.
|
||||||
|
- Update test certificates validation for better test coverage.
|
||||||
|
|
||||||
|
## 2025-03-05 - 3.25.2 - fix(PortProxy)
|
||||||
|
Adjust timeout settings and handle inactivity properly in PortProxy.
|
||||||
|
|
||||||
|
- Changed initialDataTimeout default to 30 seconds for better handling of initial data reception.
|
||||||
|
- Adjusted keepAliveInitialDelay to 30 seconds for consistent socket optimization.
|
||||||
|
- Introduced proper inactivity handling with updated timeout logic.
|
||||||
|
- Parity check now accounts for a 120-second threshold for outgoing socket closure.
|
||||||
|
|
||||||
## 2025-03-05 - 3.25.1 - fix(PortProxy)
|
## 2025-03-05 - 3.25.1 - fix(PortProxy)
|
||||||
Adjust inactivity threshold to a random value between 20 and 30 minutes for better variability
|
Adjust inactivity threshold to a random value between 20 and 30 minutes for better variability
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "@push.rocks/smartproxy",
|
"name": "@push.rocks/smartproxy",
|
||||||
"version": "3.25.1",
|
"version": "3.27.0",
|
||||||
"private": false,
|
"private": false,
|
||||||
"description": "A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.",
|
"description": "A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.",
|
||||||
"main": "dist_ts/index.js",
|
"main": "dist_ts/index.js",
|
||||||
|
102
readme.md
102
readme.md
@ -193,12 +193,14 @@ sequenceDiagram
|
|||||||
- **HTTPS Reverse Proxy** - Route traffic to backend services based on hostname with TLS termination
|
- **HTTPS Reverse Proxy** - Route traffic to backend services based on hostname with TLS termination
|
||||||
- **WebSocket Support** - Full WebSocket proxying with heartbeat monitoring
|
- **WebSocket Support** - Full WebSocket proxying with heartbeat monitoring
|
||||||
- **TCP Port Forwarding** - Advanced port forwarding with SNI inspection and domain-based routing
|
- **TCP Port Forwarding** - Advanced port forwarding with SNI inspection and domain-based routing
|
||||||
|
- **Enhanced TLS Handling** - Robust TLS handshake processing with improved certificate error handling
|
||||||
- **HTTP to HTTPS Redirection** - Automatically redirect HTTP requests to HTTPS
|
- **HTTP to HTTPS Redirection** - Automatically redirect HTTP requests to HTTPS
|
||||||
- **Let's Encrypt Integration** - Automatic certificate management using ACME protocol
|
- **Let's Encrypt Integration** - Automatic certificate management using ACME protocol
|
||||||
- **IP Filtering** - Control access with IP allow/block lists using glob patterns
|
- **IP Filtering** - Control access with IP allow/block lists using glob patterns
|
||||||
- **IPTables Integration** - Direct manipulation of iptables for low-level port forwarding
|
- **IPTables Integration** - Direct manipulation of iptables for low-level port forwarding
|
||||||
- **Basic Authentication** - Support for basic auth on proxied routes
|
- **Basic Authentication** - Support for basic auth on proxied routes
|
||||||
- **Connection Management** - Intelligent connection tracking and cleanup
|
- **Connection Management** - Intelligent connection tracking and cleanup with configurable timeouts
|
||||||
|
- **Browser Compatibility** - Optimized for modern browsers with fixes for common TLS handshake issues
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
@ -275,18 +277,38 @@ const portProxy = new PortProxy({
|
|||||||
toPort: 8443,
|
toPort: 8443,
|
||||||
targetIP: 'localhost', // Default target host
|
targetIP: 'localhost', // Default target host
|
||||||
sniEnabled: true, // Enable SNI inspection
|
sniEnabled: true, // Enable SNI inspection
|
||||||
|
|
||||||
|
// Enhanced reliability settings
|
||||||
|
initialDataTimeout: 60000, // 60 seconds for initial TLS handshake
|
||||||
|
socketTimeout: 3600000, // 1 hour socket timeout
|
||||||
|
maxConnectionLifetime: 3600000, // 1 hour connection lifetime
|
||||||
|
inactivityTimeout: 3600000, // 1 hour inactivity timeout
|
||||||
|
maxPendingDataSize: 10 * 1024 * 1024, // 10MB buffer for large TLS handshakes
|
||||||
|
|
||||||
|
// Browser compatibility enhancement
|
||||||
|
enableTlsDebugLogging: false, // Enable for troubleshooting TLS issues
|
||||||
|
|
||||||
|
// Port and IP configuration
|
||||||
globalPortRanges: [{ from: 443, to: 443 }],
|
globalPortRanges: [{ from: 443, to: 443 }],
|
||||||
defaultAllowedIPs: ['*'], // Allow all IPs by default
|
defaultAllowedIPs: ['*'], // Allow all IPs by default
|
||||||
|
|
||||||
|
// Socket optimizations for better connection stability
|
||||||
|
noDelay: true, // Disable Nagle's algorithm
|
||||||
|
keepAlive: true, // Enable TCP keepalive
|
||||||
|
enableKeepAliveProbes: true, // Enhanced keepalive for stability
|
||||||
|
|
||||||
|
// Domain-specific routing configuration
|
||||||
domainConfigs: [
|
domainConfigs: [
|
||||||
{
|
{
|
||||||
domains: ['example.com', '*.example.com'], // Glob patterns for matching domains
|
domains: ['example.com', '*.example.com'], // Glob patterns for matching domains
|
||||||
allowedIPs: ['192.168.1.*'], // Restrict access by IP
|
allowedIPs: ['192.168.1.*'], // Restrict access by IP
|
||||||
blockedIPs: ['192.168.1.100'], // Block specific IPs
|
blockedIPs: ['192.168.1.100'], // Block specific IPs
|
||||||
targetIPs: ['10.0.0.1', '10.0.0.2'], // Round-robin between multiple targets
|
targetIPs: ['10.0.0.1', '10.0.0.2'], // Round-robin between multiple targets
|
||||||
portRanges: [{ from: 443, to: 443 }]
|
portRanges: [{ from: 443, to: 443 }],
|
||||||
|
connectionTimeout: 7200000 // Domain-specific timeout (2 hours)
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
maxConnectionLifetime: 3600000, // 1 hour in milliseconds
|
|
||||||
preserveSourceIP: true
|
preserveSourceIP: true
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -334,7 +356,7 @@ acmeHandler.addDomain('api.example.com');
|
|||||||
### PortProxy Settings
|
### PortProxy Settings
|
||||||
|
|
||||||
| Option | Description | Default |
|
| Option | Description | Default |
|
||||||
|--------------------------|--------------------------------------------------------|-------------|
|
|---------------------------|--------------------------------------------------------|-------------|
|
||||||
| `fromPort` | Port to listen on | - |
|
| `fromPort` | Port to listen on | - |
|
||||||
| `toPort` | Destination port to forward to | - |
|
| `toPort` | Destination port to forward to | - |
|
||||||
| `targetIP` | Default destination IP if not specified in domainConfig | 'localhost' |
|
| `targetIP` | Default destination IP if not specified in domainConfig | 'localhost' |
|
||||||
@ -342,10 +364,22 @@ acmeHandler.addDomain('api.example.com');
|
|||||||
| `defaultAllowedIPs` | IP patterns allowed by default | - |
|
| `defaultAllowedIPs` | IP patterns allowed by default | - |
|
||||||
| `defaultBlockedIPs` | IP patterns blocked by default | - |
|
| `defaultBlockedIPs` | IP patterns blocked by default | - |
|
||||||
| `preserveSourceIP` | Preserve the original client IP | false |
|
| `preserveSourceIP` | Preserve the original client IP | false |
|
||||||
| `maxConnectionLifetime` | Maximum time in ms to keep a connection open | 600000 |
|
| `maxConnectionLifetime` | Maximum time in ms to keep a connection open | 3600000 |
|
||||||
|
| `initialDataTimeout` | Timeout for initial data/handshake in ms | 60000 |
|
||||||
|
| `socketTimeout` | Socket inactivity timeout in ms | 3600000 |
|
||||||
|
| `inactivityTimeout` | Connection inactivity check timeout in ms | 3600000 |
|
||||||
|
| `inactivityCheckInterval` | How often to check for inactive connections in ms | 60000 |
|
||||||
|
| `maxPendingDataSize` | Maximum bytes to buffer during connection setup | 10485760 |
|
||||||
| `globalPortRanges` | Array of port ranges to listen on | - |
|
| `globalPortRanges` | Array of port ranges to listen on | - |
|
||||||
| `forwardAllGlobalRanges` | Forward all global range connections to targetIP | false |
|
| `forwardAllGlobalRanges` | Forward all global range connections to targetIP | false |
|
||||||
| `gracefulShutdownTimeout` | Time in ms to wait during shutdown | 30000 |
|
| `gracefulShutdownTimeout` | Time in ms to wait during shutdown | 30000 |
|
||||||
|
| `noDelay` | Disable Nagle's algorithm | true |
|
||||||
|
| `keepAlive` | Enable TCP keepalive | true |
|
||||||
|
| `keepAliveInitialDelay` | Initial delay before sending keepalive probes in ms | 30000 |
|
||||||
|
| `enableKeepAliveProbes` | Enable enhanced TCP keep-alive probes | false |
|
||||||
|
| `enableTlsDebugLogging` | Enable detailed TLS handshake debugging | false |
|
||||||
|
| `enableDetailedLogging` | Enable detailed connection logging | false |
|
||||||
|
| `enableRandomizedTimeouts`| Randomize timeouts slightly to prevent thundering herd | true |
|
||||||
|
|
||||||
### IPTablesProxy Settings
|
### IPTablesProxy Settings
|
||||||
|
|
||||||
@ -359,14 +393,37 @@ acmeHandler.addDomain('api.example.com');
|
|||||||
|
|
||||||
## Advanced Features
|
## Advanced Features
|
||||||
|
|
||||||
|
### TLS Handshake Optimization
|
||||||
|
|
||||||
|
The enhanced `PortProxy` implementation includes significant improvements for TLS handshake handling:
|
||||||
|
|
||||||
|
- Robust SNI extraction with improved error handling
|
||||||
|
- Increased buffer size for complex TLS handshakes (10MB)
|
||||||
|
- Longer initial handshake timeout (60 seconds)
|
||||||
|
- Detection and tracking of TLS connection states
|
||||||
|
- Optional detailed TLS debug logging for troubleshooting
|
||||||
|
- Browser compatibility fixes for Chrome certificate errors
|
||||||
|
|
||||||
|
```typescript
|
||||||
|
// Example configuration to solve Chrome certificate errors
|
||||||
|
const portProxy = new PortProxy({
|
||||||
|
// ... other settings
|
||||||
|
initialDataTimeout: 60000, // Give browser more time for handshake
|
||||||
|
maxPendingDataSize: 10 * 1024 * 1024, // Larger buffer for complex handshakes
|
||||||
|
enableTlsDebugLogging: true, // Enable when troubleshooting
|
||||||
|
});
|
||||||
|
```
|
||||||
|
|
||||||
### Connection Management and Monitoring
|
### Connection Management and Monitoring
|
||||||
|
|
||||||
The `PortProxy` class includes built-in connection tracking and monitoring:
|
The `PortProxy` class includes built-in connection tracking and monitoring:
|
||||||
|
|
||||||
- Automatic cleanup of idle connections
|
- Automatic cleanup of idle connections with configurable timeouts
|
||||||
- Timeouts for connections that exceed maximum lifetime
|
- Timeouts for connections that exceed maximum lifetime
|
||||||
- Detailed logging of connection states
|
- Detailed logging of connection states
|
||||||
- Termination statistics
|
- Termination statistics
|
||||||
|
- Randomized timeouts to prevent "thundering herd" problems
|
||||||
|
- Per-domain timeout configuration
|
||||||
|
|
||||||
### WebSocket Support
|
### WebSocket Support
|
||||||
|
|
||||||
@ -385,6 +442,39 @@ The `PortProxy` class can inspect the SNI (Server Name Indication) field in TLS
|
|||||||
- Domain-specific allowed IP ranges
|
- Domain-specific allowed IP ranges
|
||||||
- Protection against SNI renegotiation attacks
|
- Protection against SNI renegotiation attacks
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
### Browser Certificate Errors
|
||||||
|
|
||||||
|
If you experience certificate errors in browsers, especially in Chrome, try these solutions:
|
||||||
|
|
||||||
|
1. **Increase Initial Data Timeout**: Set `initialDataTimeout` to 60 seconds or higher
|
||||||
|
2. **Increase Buffer Size**: Set `maxPendingDataSize` to 10MB or higher
|
||||||
|
3. **Enable TLS Debug Logging**: Set `enableTlsDebugLogging: true` to troubleshoot handshake issues
|
||||||
|
4. **Enable Keep-Alive Probes**: Set `enableKeepAliveProbes: true` for better connection stability
|
||||||
|
5. **Check Certificate Chain**: Ensure your certificate chain is complete and in the correct order
|
||||||
|
|
||||||
|
```typescript
|
||||||
|
// Configuration to fix Chrome certificate errors
|
||||||
|
const portProxy = new PortProxy({
|
||||||
|
// ... other settings
|
||||||
|
initialDataTimeout: 60000,
|
||||||
|
maxPendingDataSize: 10 * 1024 * 1024,
|
||||||
|
enableTlsDebugLogging: true,
|
||||||
|
enableKeepAliveProbes: true
|
||||||
|
});
|
||||||
|
```
|
||||||
|
|
||||||
|
### Connection Stability
|
||||||
|
|
||||||
|
For improved connection stability in high-traffic environments:
|
||||||
|
|
||||||
|
1. **Set Appropriate Timeouts**: Use longer timeouts for long-lived connections
|
||||||
|
2. **Use Domain-Specific Timeouts**: Configure per-domain timeouts for different types of services
|
||||||
|
3. **Enable TCP Keep-Alive**: Ensure `keepAlive` is set to `true`
|
||||||
|
4. **Monitor Connection Statistics**: Enable detailed logging to track termination reasons
|
||||||
|
5. **Fine-tune Inactivity Checks**: Adjust `inactivityCheckInterval` based on your traffic patterns
|
||||||
|
|
||||||
## License and Legal Information
|
## License and Legal Information
|
||||||
|
|
||||||
This repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license) file within this repository.
|
This repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license) file within this repository.
|
||||||
|
@ -3,6 +3,6 @@
|
|||||||
*/
|
*/
|
||||||
export const commitinfo = {
|
export const commitinfo = {
|
||||||
name: '@push.rocks/smartproxy',
|
name: '@push.rocks/smartproxy',
|
||||||
version: '3.25.1',
|
version: '3.27.0',
|
||||||
description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.'
|
description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, and dynamic routing with authentication options.'
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
import * as http from 'http';
|
import * as plugins from './plugins.js';
|
||||||
import * as acme from 'acme-client';
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Represents a domain certificate with various status information
|
||||||
|
*/
|
||||||
interface IDomainCertificate {
|
interface IDomainCertificate {
|
||||||
certObtained: boolean;
|
certObtained: boolean;
|
||||||
obtainingInProgress: boolean;
|
obtainingInProgress: boolean;
|
||||||
@ -8,27 +10,147 @@ interface IDomainCertificate {
|
|||||||
privateKey?: string;
|
privateKey?: string;
|
||||||
challengeToken?: string;
|
challengeToken?: string;
|
||||||
challengeKeyAuthorization?: string;
|
challengeKeyAuthorization?: string;
|
||||||
|
expiryDate?: Date;
|
||||||
|
lastRenewalAttempt?: Date;
|
||||||
}
|
}
|
||||||
|
|
||||||
export class Port80Handler {
|
/**
|
||||||
private domainCertificates: Map<string, IDomainCertificate>;
|
* Configuration options for the ACME Certificate Manager
|
||||||
private server: http.Server;
|
*/
|
||||||
private acmeClient: acme.Client | null = null;
|
interface IAcmeCertManagerOptions {
|
||||||
private accountKey: string | null = null;
|
port?: number;
|
||||||
|
contactEmail?: string;
|
||||||
|
useProduction?: boolean;
|
||||||
|
renewThresholdDays?: number;
|
||||||
|
httpsRedirectPort?: number;
|
||||||
|
renewCheckIntervalHours?: number;
|
||||||
|
}
|
||||||
|
|
||||||
constructor() {
|
/**
|
||||||
|
* Certificate data that can be emitted via events or set from outside
|
||||||
|
*/
|
||||||
|
interface ICertificateData {
|
||||||
|
domain: string;
|
||||||
|
certificate: string;
|
||||||
|
privateKey: string;
|
||||||
|
expiryDate: Date;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Events emitted by the ACME Certificate Manager
|
||||||
|
*/
|
||||||
|
export enum CertManagerEvents {
|
||||||
|
CERTIFICATE_ISSUED = 'certificate-issued',
|
||||||
|
CERTIFICATE_RENEWED = 'certificate-renewed',
|
||||||
|
CERTIFICATE_FAILED = 'certificate-failed',
|
||||||
|
CERTIFICATE_EXPIRING = 'certificate-expiring',
|
||||||
|
MANAGER_STARTED = 'manager-started',
|
||||||
|
MANAGER_STOPPED = 'manager-stopped',
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Improved ACME Certificate Manager with event emission and external certificate management
|
||||||
|
*/
|
||||||
|
export class AcmeCertManager extends plugins.EventEmitter {
|
||||||
|
private domainCertificates: Map<string, IDomainCertificate>;
|
||||||
|
private server: plugins.http.Server | null = null;
|
||||||
|
private acmeClient: plugins.acme.Client | null = null;
|
||||||
|
private accountKey: string | null = null;
|
||||||
|
private renewalTimer: NodeJS.Timeout | null = null;
|
||||||
|
private isShuttingDown: boolean = false;
|
||||||
|
private options: Required<IAcmeCertManagerOptions>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a new ACME Certificate Manager
|
||||||
|
* @param options Configuration options
|
||||||
|
*/
|
||||||
|
constructor(options: IAcmeCertManagerOptions = {}) {
|
||||||
|
super();
|
||||||
this.domainCertificates = new Map<string, IDomainCertificate>();
|
this.domainCertificates = new Map<string, IDomainCertificate>();
|
||||||
|
|
||||||
// Create and start an HTTP server on port 80.
|
// Default options
|
||||||
this.server = http.createServer((req, res) => this.handleRequest(req, res));
|
this.options = {
|
||||||
this.server.listen(80, () => {
|
port: options.port ?? 80,
|
||||||
console.log('Port80Handler is listening on port 80');
|
contactEmail: options.contactEmail ?? 'admin@example.com',
|
||||||
|
useProduction: options.useProduction ?? false, // Safer default: staging
|
||||||
|
renewThresholdDays: options.renewThresholdDays ?? 30,
|
||||||
|
httpsRedirectPort: options.httpsRedirectPort ?? 443,
|
||||||
|
renewCheckIntervalHours: options.renewCheckIntervalHours ?? 24,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Starts the HTTP server for ACME challenges
|
||||||
|
*/
|
||||||
|
public async start(): Promise<void> {
|
||||||
|
if (this.server) {
|
||||||
|
throw new Error('Server is already running');
|
||||||
|
}
|
||||||
|
|
||||||
|
if (this.isShuttingDown) {
|
||||||
|
throw new Error('Server is shutting down');
|
||||||
|
}
|
||||||
|
|
||||||
|
return new Promise((resolve, reject) => {
|
||||||
|
try {
|
||||||
|
this.server = plugins.http.createServer((req, res) => this.handleRequest(req, res));
|
||||||
|
|
||||||
|
this.server.on('error', (error: NodeJS.ErrnoException) => {
|
||||||
|
if (error.code === 'EACCES') {
|
||||||
|
reject(new Error(`Permission denied to bind to port ${this.options.port}. Try running with elevated privileges or use a port > 1024.`));
|
||||||
|
} else if (error.code === 'EADDRINUSE') {
|
||||||
|
reject(new Error(`Port ${this.options.port} is already in use.`));
|
||||||
|
} else {
|
||||||
|
reject(error);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
this.server.listen(this.options.port, () => {
|
||||||
|
console.log(`AcmeCertManager is listening on port ${this.options.port}`);
|
||||||
|
this.startRenewalTimer();
|
||||||
|
this.emit(CertManagerEvents.MANAGER_STARTED, this.options.port);
|
||||||
|
resolve();
|
||||||
|
});
|
||||||
|
} catch (error) {
|
||||||
|
reject(error);
|
||||||
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Adds a domain to be managed.
|
* Stops the HTTP server and renewal timer
|
||||||
* @param domain The domain to add.
|
*/
|
||||||
|
public async stop(): Promise<void> {
|
||||||
|
if (!this.server) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
this.isShuttingDown = true;
|
||||||
|
|
||||||
|
// Stop the renewal timer
|
||||||
|
if (this.renewalTimer) {
|
||||||
|
clearInterval(this.renewalTimer);
|
||||||
|
this.renewalTimer = null;
|
||||||
|
}
|
||||||
|
|
||||||
|
return new Promise<void>((resolve) => {
|
||||||
|
if (this.server) {
|
||||||
|
this.server.close(() => {
|
||||||
|
this.server = null;
|
||||||
|
this.isShuttingDown = false;
|
||||||
|
this.emit(CertManagerEvents.MANAGER_STOPPED);
|
||||||
|
resolve();
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
this.isShuttingDown = false;
|
||||||
|
resolve();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds a domain to be managed for certificates
|
||||||
|
* @param domain The domain to add
|
||||||
*/
|
*/
|
||||||
public addDomain(domain: string): void {
|
public addDomain(domain: string): void {
|
||||||
if (!this.domainCertificates.has(domain)) {
|
if (!this.domainCertificates.has(domain)) {
|
||||||
@ -38,8 +160,8 @@ export class Port80Handler {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Removes a domain from management.
|
* Removes a domain from management
|
||||||
* @param domain The domain to remove.
|
* @param domain The domain to remove
|
||||||
*/
|
*/
|
||||||
public removeDomain(domain: string): void {
|
public removeDomain(domain: string): void {
|
||||||
if (this.domainCertificates.delete(domain)) {
|
if (this.domainCertificates.delete(domain)) {
|
||||||
@ -48,45 +170,116 @@ export class Port80Handler {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Lazy initialization of the ACME client.
|
* Sets a certificate for a domain directly (for externally obtained certificates)
|
||||||
* Uses Let’s Encrypt’s production directory (for testing you might switch to staging).
|
* @param domain The domain for the certificate
|
||||||
|
* @param certificate The certificate (PEM format)
|
||||||
|
* @param privateKey The private key (PEM format)
|
||||||
|
* @param expiryDate Optional expiry date
|
||||||
*/
|
*/
|
||||||
private async getAcmeClient(): Promise<acme.Client> {
|
public setCertificate(domain: string, certificate: string, privateKey: string, expiryDate?: Date): void {
|
||||||
|
let domainInfo = this.domainCertificates.get(domain);
|
||||||
|
|
||||||
|
if (!domainInfo) {
|
||||||
|
domainInfo = { certObtained: false, obtainingInProgress: false };
|
||||||
|
this.domainCertificates.set(domain, domainInfo);
|
||||||
|
}
|
||||||
|
|
||||||
|
domainInfo.certificate = certificate;
|
||||||
|
domainInfo.privateKey = privateKey;
|
||||||
|
domainInfo.certObtained = true;
|
||||||
|
domainInfo.obtainingInProgress = false;
|
||||||
|
|
||||||
|
if (expiryDate) {
|
||||||
|
domainInfo.expiryDate = expiryDate;
|
||||||
|
} else {
|
||||||
|
// Try to extract expiry date from certificate
|
||||||
|
try {
|
||||||
|
// This is a simplistic approach - in a real implementation, use a proper
|
||||||
|
// certificate parsing library like node-forge or x509
|
||||||
|
const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
|
||||||
|
if (matches && matches[1]) {
|
||||||
|
domainInfo.expiryDate = new Date(matches[1]);
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.warn(`Failed to extract expiry date from certificate for ${domain}`);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log(`Certificate set for ${domain}`);
|
||||||
|
|
||||||
|
// Emit certificate event
|
||||||
|
this.emitCertificateEvent(CertManagerEvents.CERTIFICATE_ISSUED, {
|
||||||
|
domain,
|
||||||
|
certificate,
|
||||||
|
privateKey,
|
||||||
|
expiryDate: domainInfo.expiryDate || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000) // 90 days default
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the certificate for a domain if it exists
|
||||||
|
* @param domain The domain to get the certificate for
|
||||||
|
*/
|
||||||
|
public getCertificate(domain: string): ICertificateData | null {
|
||||||
|
const domainInfo = this.domainCertificates.get(domain);
|
||||||
|
|
||||||
|
if (!domainInfo || !domainInfo.certObtained || !domainInfo.certificate || !domainInfo.privateKey) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
return {
|
||||||
|
domain,
|
||||||
|
certificate: domainInfo.certificate,
|
||||||
|
privateKey: domainInfo.privateKey,
|
||||||
|
expiryDate: domainInfo.expiryDate || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000) // 90 days default
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Lazy initialization of the ACME client
|
||||||
|
* @returns An ACME client instance
|
||||||
|
*/
|
||||||
|
private async getAcmeClient(): Promise<plugins.acme.Client> {
|
||||||
if (this.acmeClient) {
|
if (this.acmeClient) {
|
||||||
return this.acmeClient;
|
return this.acmeClient;
|
||||||
}
|
}
|
||||||
// Generate a new account key and convert Buffer to string.
|
|
||||||
this.accountKey = (await acme.forge.createPrivateKey()).toString();
|
// Generate a new account key
|
||||||
this.acmeClient = new acme.Client({
|
this.accountKey = (await plugins.acme.forge.createPrivateKey()).toString();
|
||||||
directoryUrl: acme.directory.letsencrypt.production, // Use production for a real certificate
|
|
||||||
// For testing, you could use:
|
this.acmeClient = new plugins.acme.Client({
|
||||||
// directoryUrl: acme.directory.letsencrypt.staging,
|
directoryUrl: this.options.useProduction
|
||||||
|
? plugins.acme.directory.letsencrypt.production
|
||||||
|
: plugins.acme.directory.letsencrypt.staging,
|
||||||
accountKey: this.accountKey,
|
accountKey: this.accountKey,
|
||||||
});
|
});
|
||||||
// Create a new account. Make sure to update the contact email.
|
|
||||||
|
// Create a new account
|
||||||
await this.acmeClient.createAccount({
|
await this.acmeClient.createAccount({
|
||||||
termsOfServiceAgreed: true,
|
termsOfServiceAgreed: true,
|
||||||
contact: ['mailto:admin@example.com'],
|
contact: [`mailto:${this.options.contactEmail}`],
|
||||||
});
|
});
|
||||||
|
|
||||||
return this.acmeClient;
|
return this.acmeClient;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Handles incoming HTTP requests on port 80.
|
* Handles incoming HTTP requests
|
||||||
* If the request is for an ACME challenge, it responds with the key authorization.
|
* @param req The HTTP request
|
||||||
* If the domain has a certificate, it redirects to HTTPS; otherwise, it initiates certificate issuance.
|
* @param res The HTTP response
|
||||||
*/
|
*/
|
||||||
private handleRequest(req: http.IncomingMessage, res: http.ServerResponse): void {
|
private handleRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void {
|
||||||
const hostHeader = req.headers.host;
|
const hostHeader = req.headers.host;
|
||||||
if (!hostHeader) {
|
if (!hostHeader) {
|
||||||
res.statusCode = 400;
|
res.statusCode = 400;
|
||||||
res.end('Bad Request: Host header is missing');
|
res.end('Bad Request: Host header is missing');
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Extract domain (ignoring any port in the Host header)
|
// Extract domain (ignoring any port in the Host header)
|
||||||
const domain = hostHeader.split(':')[0];
|
const domain = hostHeader.split(':')[0];
|
||||||
|
|
||||||
// If the request is for an ACME HTTP-01 challenge, handle it.
|
// If the request is for an ACME HTTP-01 challenge, handle it
|
||||||
if (req.url && req.url.startsWith('/.well-known/acme-challenge/')) {
|
if (req.url && req.url.startsWith('/.well-known/acme-challenge/')) {
|
||||||
this.handleAcmeChallenge(req, res, domain);
|
this.handleAcmeChallenge(req, res, domain);
|
||||||
return;
|
return;
|
||||||
@ -100,38 +293,47 @@ export class Port80Handler {
|
|||||||
|
|
||||||
const domainInfo = this.domainCertificates.get(domain)!;
|
const domainInfo = this.domainCertificates.get(domain)!;
|
||||||
|
|
||||||
// If certificate exists, redirect to HTTPS on port 443.
|
// If certificate exists, redirect to HTTPS
|
||||||
if (domainInfo.certObtained) {
|
if (domainInfo.certObtained) {
|
||||||
const redirectUrl = `https://${domain}:443${req.url}`;
|
const httpsPort = this.options.httpsRedirectPort;
|
||||||
|
const portSuffix = httpsPort === 443 ? '' : `:${httpsPort}`;
|
||||||
|
const redirectUrl = `https://${domain}${portSuffix}${req.url || '/'}`;
|
||||||
|
|
||||||
res.statusCode = 301;
|
res.statusCode = 301;
|
||||||
res.setHeader('Location', redirectUrl);
|
res.setHeader('Location', redirectUrl);
|
||||||
res.end(`Redirecting to ${redirectUrl}`);
|
res.end(`Redirecting to ${redirectUrl}`);
|
||||||
} else {
|
} else {
|
||||||
// Trigger certificate issuance if not already running.
|
// Trigger certificate issuance if not already running
|
||||||
if (!domainInfo.obtainingInProgress) {
|
if (!domainInfo.obtainingInProgress) {
|
||||||
domainInfo.obtainingInProgress = true;
|
|
||||||
this.obtainCertificate(domain).catch(err => {
|
this.obtainCertificate(domain).catch(err => {
|
||||||
|
this.emit(CertManagerEvents.CERTIFICATE_FAILED, { domain, error: err.message });
|
||||||
console.error(`Error obtaining certificate for ${domain}:`, err);
|
console.error(`Error obtaining certificate for ${domain}:`, err);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
res.statusCode = 503;
|
res.statusCode = 503;
|
||||||
res.end('Certificate issuance in progress, please try again later.');
|
res.end('Certificate issuance in progress, please try again later.');
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Serves the ACME HTTP-01 challenge response.
|
* Serves the ACME HTTP-01 challenge response
|
||||||
|
* @param req The HTTP request
|
||||||
|
* @param res The HTTP response
|
||||||
|
* @param domain The domain for the challenge
|
||||||
*/
|
*/
|
||||||
private handleAcmeChallenge(req: http.IncomingMessage, res: http.ServerResponse, domain: string): void {
|
private handleAcmeChallenge(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse, domain: string): void {
|
||||||
const domainInfo = this.domainCertificates.get(domain);
|
const domainInfo = this.domainCertificates.get(domain);
|
||||||
if (!domainInfo) {
|
if (!domainInfo) {
|
||||||
res.statusCode = 404;
|
res.statusCode = 404;
|
||||||
res.end('Domain not configured');
|
res.end('Domain not configured');
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
// The token is the last part of the URL.
|
|
||||||
|
// The token is the last part of the URL
|
||||||
const urlParts = req.url?.split('/');
|
const urlParts = req.url?.split('/');
|
||||||
const token = urlParts ? urlParts[urlParts.length - 1] : '';
|
const token = urlParts ? urlParts[urlParts.length - 1] : '';
|
||||||
|
|
||||||
if (domainInfo.challengeToken === token && domainInfo.challengeKeyAuthorization) {
|
if (domainInfo.challengeToken === token && domainInfo.challengeKeyAuthorization) {
|
||||||
res.statusCode = 200;
|
res.statusCode = 200;
|
||||||
res.setHeader('Content-Type', 'text/plain');
|
res.setHeader('Content-Type', 'text/plain');
|
||||||
@ -144,71 +346,214 @@ export class Port80Handler {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Uses acme-client to perform a full ACME HTTP-01 challenge to obtain a certificate.
|
* Obtains a certificate for a domain using ACME HTTP-01 challenge
|
||||||
* On success, it stores the certificate and key in memory and clears challenge data.
|
* @param domain The domain to obtain a certificate for
|
||||||
|
* @param isRenewal Whether this is a renewal attempt
|
||||||
*/
|
*/
|
||||||
private async obtainCertificate(domain: string): Promise<void> {
|
private async obtainCertificate(domain: string, isRenewal: boolean = false): Promise<void> {
|
||||||
|
// Get the domain info
|
||||||
|
const domainInfo = this.domainCertificates.get(domain);
|
||||||
|
if (!domainInfo) {
|
||||||
|
throw new Error(`Domain not found: ${domain}`);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Prevent concurrent certificate issuance
|
||||||
|
if (domainInfo.obtainingInProgress) {
|
||||||
|
console.log(`Certificate issuance already in progress for ${domain}`);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
domainInfo.obtainingInProgress = true;
|
||||||
|
domainInfo.lastRenewalAttempt = new Date();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const client = await this.getAcmeClient();
|
const client = await this.getAcmeClient();
|
||||||
|
|
||||||
// Create a new order for the domain.
|
// Create a new order for the domain
|
||||||
const order = await client.createOrder({
|
const order = await client.createOrder({
|
||||||
identifiers: [{ type: 'dns', value: domain }],
|
identifiers: [{ type: 'dns', value: domain }],
|
||||||
});
|
});
|
||||||
|
|
||||||
// Get the authorizations for the order.
|
// Get the authorizations for the order
|
||||||
const authorizations = await client.getAuthorizations(order);
|
const authorizations = await client.getAuthorizations(order);
|
||||||
|
|
||||||
for (const authz of authorizations) {
|
for (const authz of authorizations) {
|
||||||
const challenge = authz.challenges.find(ch => ch.type === 'http-01');
|
const challenge = authz.challenges.find(ch => ch.type === 'http-01');
|
||||||
if (!challenge) {
|
if (!challenge) {
|
||||||
throw new Error('HTTP-01 challenge not found');
|
throw new Error('HTTP-01 challenge not found');
|
||||||
}
|
}
|
||||||
// Get the key authorization for the challenge.
|
|
||||||
|
// Get the key authorization for the challenge
|
||||||
const keyAuthorization = await client.getChallengeKeyAuthorization(challenge);
|
const keyAuthorization = await client.getChallengeKeyAuthorization(challenge);
|
||||||
const domainInfo = this.domainCertificates.get(domain)!;
|
|
||||||
|
// Store the challenge data
|
||||||
domainInfo.challengeToken = challenge.token;
|
domainInfo.challengeToken = challenge.token;
|
||||||
domainInfo.challengeKeyAuthorization = keyAuthorization;
|
domainInfo.challengeKeyAuthorization = keyAuthorization;
|
||||||
|
|
||||||
// Notify the ACME server that the challenge is ready.
|
// ACME client type definition workaround - use compatible approach
|
||||||
// The acme-client examples show that verifyChallenge takes three arguments:
|
// First check if challenge verification is needed
|
||||||
// (authorization, challenge, keyAuthorization). However, the official TypeScript
|
const authzUrl = authz.url;
|
||||||
// types appear to be out-of-sync. As a workaround, we cast client to 'any'.
|
|
||||||
await (client as any).verifyChallenge(authz, challenge, keyAuthorization);
|
|
||||||
|
|
||||||
await client.completeChallenge(challenge);
|
try {
|
||||||
// Wait until the challenge is validated.
|
// Check if authzUrl exists and perform verification
|
||||||
await client.waitForValidStatus(challenge);
|
if (authzUrl) {
|
||||||
console.log(`HTTP-01 challenge completed for ${domain}`);
|
await client.verifyChallenge(authz, challenge);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Generate a CSR and a new private key for the domain.
|
// Complete the challenge
|
||||||
// Convert the resulting Buffers to strings.
|
await client.completeChallenge(challenge);
|
||||||
const [csrBuffer, privateKeyBuffer] = await acme.forge.createCsr({
|
|
||||||
|
// Wait for validation
|
||||||
|
await client.waitForValidStatus(challenge);
|
||||||
|
console.log(`HTTP-01 challenge completed for ${domain}`);
|
||||||
|
} catch (error) {
|
||||||
|
console.error(`Challenge error for ${domain}:`, error);
|
||||||
|
throw error;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Generate a CSR and private key
|
||||||
|
const [csrBuffer, privateKeyBuffer] = await plugins.acme.forge.createCsr({
|
||||||
commonName: domain,
|
commonName: domain,
|
||||||
});
|
});
|
||||||
|
|
||||||
const csr = csrBuffer.toString();
|
const csr = csrBuffer.toString();
|
||||||
const privateKey = privateKeyBuffer.toString();
|
const privateKey = privateKeyBuffer.toString();
|
||||||
|
|
||||||
// Finalize the order and obtain the certificate.
|
// Finalize the order with our CSR
|
||||||
await client.finalizeOrder(order, csr);
|
await client.finalizeOrder(order, csr);
|
||||||
|
|
||||||
|
// Get the certificate with the full chain
|
||||||
const certificate = await client.getCertificate(order);
|
const certificate = await client.getCertificate(order);
|
||||||
|
|
||||||
const domainInfo = this.domainCertificates.get(domain)!;
|
// Store the certificate and key
|
||||||
domainInfo.certificate = certificate;
|
domainInfo.certificate = certificate;
|
||||||
domainInfo.privateKey = privateKey;
|
domainInfo.privateKey = privateKey;
|
||||||
domainInfo.certObtained = true;
|
domainInfo.certObtained = true;
|
||||||
domainInfo.obtainingInProgress = false;
|
|
||||||
|
// Clear challenge data
|
||||||
delete domainInfo.challengeToken;
|
delete domainInfo.challengeToken;
|
||||||
delete domainInfo.challengeKeyAuthorization;
|
delete domainInfo.challengeKeyAuthorization;
|
||||||
|
|
||||||
console.log(`Certificate obtained for ${domain}`);
|
// Extract expiry date from certificate
|
||||||
// In a production system, persist the certificate and key and reload your TLS server.
|
try {
|
||||||
|
const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
|
||||||
|
if (matches && matches[1]) {
|
||||||
|
domainInfo.expiryDate = new Date(matches[1]);
|
||||||
|
console.log(`Certificate for ${domain} will expire on ${domainInfo.expiryDate.toISOString()}`);
|
||||||
|
}
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
|
console.warn(`Failed to extract expiry date from certificate for ${domain}`);
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log(`Certificate ${isRenewal ? 'renewed' : 'obtained'} for ${domain}`);
|
||||||
|
|
||||||
|
// Emit the appropriate event
|
||||||
|
const eventType = isRenewal
|
||||||
|
? CertManagerEvents.CERTIFICATE_RENEWED
|
||||||
|
: CertManagerEvents.CERTIFICATE_ISSUED;
|
||||||
|
|
||||||
|
this.emitCertificateEvent(eventType, {
|
||||||
|
domain,
|
||||||
|
certificate,
|
||||||
|
privateKey,
|
||||||
|
expiryDate: domainInfo.expiryDate || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000) // 90 days default
|
||||||
|
});
|
||||||
|
|
||||||
|
} catch (error: any) {
|
||||||
|
// Check for rate limit errors
|
||||||
|
if (error.message && (
|
||||||
|
error.message.includes('rateLimited') ||
|
||||||
|
error.message.includes('too many certificates') ||
|
||||||
|
error.message.includes('rate limit')
|
||||||
|
)) {
|
||||||
|
console.error(`Rate limit reached for ${domain}. Waiting before retry.`);
|
||||||
|
} else {
|
||||||
console.error(`Error during certificate issuance for ${domain}:`, error);
|
console.error(`Error during certificate issuance for ${domain}:`, error);
|
||||||
const domainInfo = this.domainCertificates.get(domain);
|
}
|
||||||
if (domainInfo) {
|
|
||||||
|
// Emit failure event
|
||||||
|
this.emit(CertManagerEvents.CERTIFICATE_FAILED, {
|
||||||
|
domain,
|
||||||
|
error: error.message || 'Unknown error',
|
||||||
|
isRenewal
|
||||||
|
});
|
||||||
|
} finally {
|
||||||
|
// Reset flag whether successful or not
|
||||||
domainInfo.obtainingInProgress = false;
|
domainInfo.obtainingInProgress = false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Starts the certificate renewal timer
|
||||||
|
*/
|
||||||
|
private startRenewalTimer(): void {
|
||||||
|
if (this.renewalTimer) {
|
||||||
|
clearInterval(this.renewalTimer);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert hours to milliseconds
|
||||||
|
const checkInterval = this.options.renewCheckIntervalHours * 60 * 60 * 1000;
|
||||||
|
|
||||||
|
this.renewalTimer = setInterval(() => this.checkForRenewals(), checkInterval);
|
||||||
|
|
||||||
|
// Prevent the timer from keeping the process alive
|
||||||
|
if (this.renewalTimer.unref) {
|
||||||
|
this.renewalTimer.unref();
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log(`Certificate renewal check scheduled every ${this.options.renewCheckIntervalHours} hours`);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks for certificates that need renewal
|
||||||
|
*/
|
||||||
|
private checkForRenewals(): void {
|
||||||
|
if (this.isShuttingDown) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log('Checking for certificates that need renewal...');
|
||||||
|
|
||||||
|
const now = new Date();
|
||||||
|
const renewThresholdMs = this.options.renewThresholdDays * 24 * 60 * 60 * 1000;
|
||||||
|
|
||||||
|
for (const [domain, domainInfo] of this.domainCertificates.entries()) {
|
||||||
|
// Skip domains without certificates or already in renewal
|
||||||
|
if (!domainInfo.certObtained || domainInfo.obtainingInProgress) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Skip domains without expiry dates
|
||||||
|
if (!domainInfo.expiryDate) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
const timeUntilExpiry = domainInfo.expiryDate.getTime() - now.getTime();
|
||||||
|
|
||||||
|
// Check if certificate is near expiry
|
||||||
|
if (timeUntilExpiry <= renewThresholdMs) {
|
||||||
|
console.log(`Certificate for ${domain} expires soon, renewing...`);
|
||||||
|
this.emit(CertManagerEvents.CERTIFICATE_EXPIRING, {
|
||||||
|
domain,
|
||||||
|
expiryDate: domainInfo.expiryDate,
|
||||||
|
daysRemaining: Math.ceil(timeUntilExpiry / (24 * 60 * 60 * 1000))
|
||||||
|
});
|
||||||
|
|
||||||
|
// Start renewal process
|
||||||
|
this.obtainCertificate(domain, true).catch(err => {
|
||||||
|
console.error(`Error renewing certificate for ${domain}:`, err);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Emits a certificate event with the certificate data
|
||||||
|
* @param eventType The event type to emit
|
||||||
|
* @param data The certificate data
|
||||||
|
*/
|
||||||
|
private emitCertificateEvent(eventType: CertManagerEvents, data: ICertificateData): void {
|
||||||
|
this.emit(eventType, data);
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -7,14 +7,10 @@ export interface IDomainConfig {
|
|||||||
blockedIPs?: string[]; // Glob patterns for blocked IPs
|
blockedIPs?: string[]; // Glob patterns for blocked IPs
|
||||||
targetIPs?: string[]; // If multiple targetIPs are given, use round robin.
|
targetIPs?: string[]; // If multiple targetIPs are given, use round robin.
|
||||||
portRanges?: Array<{ from: number; to: number }>; // Optional port ranges
|
portRanges?: Array<{ from: number; to: number }>; // Optional port ranges
|
||||||
// Protocol-specific timeout overrides
|
// Allow domain-specific timeout override
|
||||||
httpTimeout?: number; // HTTP connection timeout override (ms)
|
connectionTimeout?: number; // Connection timeout override (ms)
|
||||||
wsTimeout?: number; // WebSocket connection timeout override (ms)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Connection protocol types for timeout management */
|
|
||||||
export type ProtocolType = 'http' | 'websocket' | 'https' | 'tls' | 'unknown';
|
|
||||||
|
|
||||||
/** Port proxy settings including global allowed port ranges */
|
/** Port proxy settings including global allowed port ranges */
|
||||||
export interface IPortProxySettings extends plugins.tls.TlsOptions {
|
export interface IPortProxySettings extends plugins.tls.TlsOptions {
|
||||||
fromPort: number;
|
fromPort: number;
|
||||||
@ -26,16 +22,12 @@ export interface IPortProxySettings extends plugins.tls.TlsOptions {
|
|||||||
defaultBlockedIPs?: string[];
|
defaultBlockedIPs?: string[];
|
||||||
preserveSourceIP?: boolean;
|
preserveSourceIP?: boolean;
|
||||||
|
|
||||||
// Updated timeout settings with better defaults
|
// Timeout settings
|
||||||
initialDataTimeout?: number; // Timeout for initial data/SNI (ms), default: 15000 (15s)
|
initialDataTimeout?: number; // Timeout for initial data/SNI (ms), default: 60000 (60s)
|
||||||
socketTimeout?: number; // Socket inactivity timeout (ms), default: 300000 (5m)
|
socketTimeout?: number; // Socket inactivity timeout (ms), default: 3600000 (1h)
|
||||||
inactivityCheckInterval?: number; // How often to check for inactive connections (ms), default: 30000 (30s)
|
inactivityCheckInterval?: number; // How often to check for inactive connections (ms), default: 60000 (60s)
|
||||||
|
|
||||||
// Protocol-specific timeouts
|
|
||||||
maxConnectionLifetime?: number; // Default max connection lifetime (ms), default: 3600000 (1h)
|
maxConnectionLifetime?: number; // Default max connection lifetime (ms), default: 3600000 (1h)
|
||||||
httpConnectionTimeout?: number; // HTTP specific timeout (ms), default: 1800000 (30m)
|
inactivityTimeout?: number; // Inactivity timeout (ms), default: 3600000 (1h)
|
||||||
wsConnectionTimeout?: number; // WebSocket specific timeout (ms), default: 14400000 (4h)
|
|
||||||
httpKeepAliveTimeout?: number; // HTTP keep-alive header timeout (ms), default: 1200000 (20m)
|
|
||||||
|
|
||||||
gracefulShutdownTimeout?: number; // (ms) maximum time to wait for connections to close during shutdown
|
gracefulShutdownTimeout?: number; // (ms) maximum time to wait for connections to close during shutdown
|
||||||
globalPortRanges: Array<{ from: number; to: number }>; // Global allowed port ranges
|
globalPortRanges: Array<{ from: number; to: number }>; // Global allowed port ranges
|
||||||
@ -47,11 +39,12 @@ export interface IPortProxySettings extends plugins.tls.TlsOptions {
|
|||||||
keepAliveInitialDelay?: number; // Initial delay before sending keepalive probes (ms)
|
keepAliveInitialDelay?: number; // Initial delay before sending keepalive probes (ms)
|
||||||
maxPendingDataSize?: number; // Maximum bytes to buffer during connection setup
|
maxPendingDataSize?: number; // Maximum bytes to buffer during connection setup
|
||||||
|
|
||||||
// Enable enhanced features
|
// Enhanced features
|
||||||
disableInactivityCheck?: boolean; // Disable inactivity checking entirely
|
disableInactivityCheck?: boolean; // Disable inactivity checking entirely
|
||||||
enableKeepAliveProbes?: boolean; // Enable TCP keep-alive probes
|
enableKeepAliveProbes?: boolean; // Enable TCP keep-alive probes
|
||||||
enableProtocolDetection?: boolean; // Enable HTTP/WebSocket protocol detection
|
|
||||||
enableDetailedLogging?: boolean; // Enable detailed connection logging
|
enableDetailedLogging?: boolean; // Enable detailed connection logging
|
||||||
|
enableTlsDebugLogging?: boolean; // Enable TLS handshake debug logging
|
||||||
|
enableRandomizedTimeouts?: boolean; // Randomize timeouts slightly to prevent thundering herd
|
||||||
|
|
||||||
// Rate limiting and security
|
// Rate limiting and security
|
||||||
maxConnectionsPerIP?: number; // Maximum simultaneous connections from a single IP
|
maxConnectionsPerIP?: number; // Maximum simultaneous connections from a single IP
|
||||||
@ -59,7 +52,7 @@ export interface IPortProxySettings extends plugins.tls.TlsOptions {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Enhanced connection record with protocol-specific handling
|
* Enhanced connection record
|
||||||
*/
|
*/
|
||||||
interface IConnectionRecord {
|
interface IConnectionRecord {
|
||||||
id: string; // Unique connection identifier
|
id: string; // Unique connection identifier
|
||||||
@ -76,70 +69,147 @@ interface IConnectionRecord {
|
|||||||
pendingDataSize: number; // Track total size of pending data
|
pendingDataSize: number; // Track total size of pending data
|
||||||
|
|
||||||
// Enhanced tracking fields
|
// Enhanced tracking fields
|
||||||
protocolType: ProtocolType; // Connection protocol type
|
|
||||||
isPooledConnection: boolean; // Whether this is likely a browser pooled connection
|
|
||||||
lastHttpRequest?: number; // Timestamp of last HTTP request (for keep-alive tracking)
|
|
||||||
httpKeepAliveTimeout?: number; // HTTP keep-alive timeout from headers
|
|
||||||
bytesReceived: number; // Total bytes received
|
bytesReceived: number; // Total bytes received
|
||||||
bytesSent: number; // Total bytes sent
|
bytesSent: number; // Total bytes sent
|
||||||
remoteIP: string; // Remote IP (cached for logging after socket close)
|
remoteIP: string; // Remote IP (cached for logging after socket close)
|
||||||
localPort: number; // Local port (cached for logging)
|
localPort: number; // Local port (cached for logging)
|
||||||
httpRequests: number; // Count of HTTP requests on this connection
|
isTLS: boolean; // Whether this connection is a TLS connection
|
||||||
|
tlsHandshakeComplete: boolean; // Whether the TLS handshake is complete
|
||||||
|
hasReceivedInitialData: boolean; // Whether initial data has been received
|
||||||
|
domainConfig?: IDomainConfig; // Associated domain config for this connection
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Extracts the SNI (Server Name Indication) from a TLS ClientHello packet.
|
* Extracts the SNI (Server Name Indication) from a TLS ClientHello packet.
|
||||||
|
* Enhanced for robustness and detailed logging.
|
||||||
* @param buffer - Buffer containing the TLS ClientHello.
|
* @param buffer - Buffer containing the TLS ClientHello.
|
||||||
|
* @param enableLogging - Whether to enable detailed logging.
|
||||||
* @returns The server name if found, otherwise undefined.
|
* @returns The server name if found, otherwise undefined.
|
||||||
*/
|
*/
|
||||||
function extractSNI(buffer: Buffer): string | undefined {
|
function extractSNI(buffer: Buffer, enableLogging: boolean = false): string | undefined {
|
||||||
let offset = 0;
|
try {
|
||||||
if (buffer.length < 5) return undefined;
|
// Check if buffer is too small for TLS
|
||||||
|
if (buffer.length < 5) {
|
||||||
|
if (enableLogging) console.log("Buffer too small for TLS header");
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check record type (has to be handshake - 22)
|
||||||
const recordType = buffer.readUInt8(0);
|
const recordType = buffer.readUInt8(0);
|
||||||
if (recordType !== 22) return undefined; // 22 = handshake
|
if (recordType !== 22) {
|
||||||
|
if (enableLogging) console.log(`Not a TLS handshake. Record type: ${recordType}`);
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check TLS version (has to be 3.1 or higher)
|
||||||
|
const majorVersion = buffer.readUInt8(1);
|
||||||
|
const minorVersion = buffer.readUInt8(2);
|
||||||
|
if (enableLogging) console.log(`TLS Version: ${majorVersion}.${minorVersion}`);
|
||||||
|
|
||||||
|
// Check record length
|
||||||
const recordLength = buffer.readUInt16BE(3);
|
const recordLength = buffer.readUInt16BE(3);
|
||||||
if (buffer.length < 5 + recordLength) return undefined;
|
if (buffer.length < 5 + recordLength) {
|
||||||
|
if (enableLogging) console.log(`Buffer too small for TLS record. Expected: ${5 + recordLength}, Got: ${buffer.length}`);
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
offset = 5;
|
let offset = 5;
|
||||||
const handshakeType = buffer.readUInt8(offset);
|
const handshakeType = buffer.readUInt8(offset);
|
||||||
if (handshakeType !== 1) return undefined; // 1 = ClientHello
|
if (handshakeType !== 1) {
|
||||||
|
if (enableLogging) console.log(`Not a ClientHello. Handshake type: ${handshakeType}`);
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
offset += 4; // Skip handshake header (type + length)
|
offset += 4; // Skip handshake header (type + length)
|
||||||
|
|
||||||
|
// Client version
|
||||||
|
const clientMajorVersion = buffer.readUInt8(offset);
|
||||||
|
const clientMinorVersion = buffer.readUInt8(offset + 1);
|
||||||
|
if (enableLogging) console.log(`Client Version: ${clientMajorVersion}.${clientMinorVersion}`);
|
||||||
|
|
||||||
offset += 2 + 32; // Skip client version and random
|
offset += 2 + 32; // Skip client version and random
|
||||||
|
|
||||||
|
// Session ID
|
||||||
const sessionIDLength = buffer.readUInt8(offset);
|
const sessionIDLength = buffer.readUInt8(offset);
|
||||||
|
if (enableLogging) console.log(`Session ID Length: ${sessionIDLength}`);
|
||||||
offset += 1 + sessionIDLength; // Skip session ID
|
offset += 1 + sessionIDLength; // Skip session ID
|
||||||
|
|
||||||
|
// Cipher suites
|
||||||
|
if (offset + 2 > buffer.length) {
|
||||||
|
if (enableLogging) console.log("Buffer too small for cipher suites length");
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
const cipherSuitesLength = buffer.readUInt16BE(offset);
|
const cipherSuitesLength = buffer.readUInt16BE(offset);
|
||||||
|
if (enableLogging) console.log(`Cipher Suites Length: ${cipherSuitesLength}`);
|
||||||
offset += 2 + cipherSuitesLength; // Skip cipher suites
|
offset += 2 + cipherSuitesLength; // Skip cipher suites
|
||||||
|
|
||||||
|
// Compression methods
|
||||||
|
if (offset + 1 > buffer.length) {
|
||||||
|
if (enableLogging) console.log("Buffer too small for compression methods length");
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
const compressionMethodsLength = buffer.readUInt8(offset);
|
const compressionMethodsLength = buffer.readUInt8(offset);
|
||||||
|
if (enableLogging) console.log(`Compression Methods Length: ${compressionMethodsLength}`);
|
||||||
offset += 1 + compressionMethodsLength; // Skip compression methods
|
offset += 1 + compressionMethodsLength; // Skip compression methods
|
||||||
|
|
||||||
if (offset + 2 > buffer.length) return undefined;
|
// Extensions
|
||||||
|
if (offset + 2 > buffer.length) {
|
||||||
|
if (enableLogging) console.log("Buffer too small for extensions length");
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
const extensionsLength = buffer.readUInt16BE(offset);
|
const extensionsLength = buffer.readUInt16BE(offset);
|
||||||
|
if (enableLogging) console.log(`Extensions Length: ${extensionsLength}`);
|
||||||
offset += 2;
|
offset += 2;
|
||||||
const extensionsEnd = offset + extensionsLength;
|
const extensionsEnd = offset + extensionsLength;
|
||||||
|
|
||||||
|
if (extensionsEnd > buffer.length) {
|
||||||
|
if (enableLogging) console.log(`Buffer too small for extensions. Expected end: ${extensionsEnd}, Buffer length: ${buffer.length}`);
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse extensions
|
||||||
while (offset + 4 <= extensionsEnd) {
|
while (offset + 4 <= extensionsEnd) {
|
||||||
const extensionType = buffer.readUInt16BE(offset);
|
const extensionType = buffer.readUInt16BE(offset);
|
||||||
const extensionLength = buffer.readUInt16BE(offset + 2);
|
const extensionLength = buffer.readUInt16BE(offset + 2);
|
||||||
|
|
||||||
|
if (enableLogging) console.log(`Extension Type: 0x${extensionType.toString(16)}, Length: ${extensionLength}`);
|
||||||
|
|
||||||
offset += 4;
|
offset += 4;
|
||||||
|
|
||||||
if (extensionType === 0x0000) { // SNI extension
|
if (extensionType === 0x0000) { // SNI extension
|
||||||
if (offset + 2 > buffer.length) return undefined;
|
if (offset + 2 > buffer.length) {
|
||||||
|
if (enableLogging) console.log("Buffer too small for SNI list length");
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
const sniListLength = buffer.readUInt16BE(offset);
|
const sniListLength = buffer.readUInt16BE(offset);
|
||||||
|
if (enableLogging) console.log(`SNI List Length: ${sniListLength}`);
|
||||||
offset += 2;
|
offset += 2;
|
||||||
const sniListEnd = offset + sniListLength;
|
const sniListEnd = offset + sniListLength;
|
||||||
|
|
||||||
|
if (sniListEnd > buffer.length) {
|
||||||
|
if (enableLogging) console.log(`Buffer too small for SNI list. Expected end: ${sniListEnd}, Buffer length: ${buffer.length}`);
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
while (offset + 3 < sniListEnd) {
|
while (offset + 3 < sniListEnd) {
|
||||||
const nameType = buffer.readUInt8(offset++);
|
const nameType = buffer.readUInt8(offset++);
|
||||||
const nameLen = buffer.readUInt16BE(offset);
|
const nameLen = buffer.readUInt16BE(offset);
|
||||||
offset += 2;
|
offset += 2;
|
||||||
|
|
||||||
|
if (enableLogging) console.log(`Name Type: ${nameType}, Name Length: ${nameLen}`);
|
||||||
|
|
||||||
if (nameType === 0) { // host_name
|
if (nameType === 0) { // host_name
|
||||||
if (offset + nameLen > buffer.length) return undefined;
|
if (offset + nameLen > buffer.length) {
|
||||||
return buffer.toString('utf8', offset, offset + nameLen);
|
if (enableLogging) console.log(`Buffer too small for hostname. Expected: ${offset + nameLen}, Got: ${buffer.length}`);
|
||||||
|
return undefined;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const serverName = buffer.toString('utf8', offset, offset + nameLen);
|
||||||
|
if (enableLogging) console.log(`Extracted SNI: ${serverName}`);
|
||||||
|
return serverName;
|
||||||
|
}
|
||||||
|
|
||||||
offset += nameLen;
|
offset += nameLen;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
@ -147,7 +217,13 @@ function extractSNI(buffer: Buffer): string | undefined {
|
|||||||
offset += extensionLength;
|
offset += extensionLength;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (enableLogging) console.log("No SNI extension found");
|
||||||
return undefined;
|
return undefined;
|
||||||
|
} catch (err) {
|
||||||
|
console.log(`Error extracting SNI: ${err}`);
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Helper: Check if a port falls within any of the given port ranges
|
// Helper: Check if a port falls within any of the given port ranges
|
||||||
@ -157,7 +233,10 @@ const isPortInRanges = (port: number, ranges: Array<{ from: number; to: number }
|
|||||||
|
|
||||||
// Helper: Check if a given IP matches any of the glob patterns
|
// Helper: Check if a given IP matches any of the glob patterns
|
||||||
const isAllowed = (ip: string, patterns: string[]): boolean => {
|
const isAllowed = (ip: string, patterns: string[]): boolean => {
|
||||||
|
if (!ip || !patterns || patterns.length === 0) return false;
|
||||||
|
|
||||||
const normalizeIP = (ip: string): string[] => {
|
const normalizeIP = (ip: string): string[] => {
|
||||||
|
if (!ip) return [];
|
||||||
if (ip.startsWith('::ffff:')) {
|
if (ip.startsWith('::ffff:')) {
|
||||||
const ipv4 = ip.slice(7);
|
const ipv4 = ip.slice(7);
|
||||||
return [ip, ipv4];
|
return [ip, ipv4];
|
||||||
@ -167,7 +246,10 @@ const isAllowed = (ip: string, patterns: string[]): boolean => {
|
|||||||
}
|
}
|
||||||
return [ip];
|
return [ip];
|
||||||
};
|
};
|
||||||
|
|
||||||
const normalizedIPVariants = normalizeIP(ip);
|
const normalizedIPVariants = normalizeIP(ip);
|
||||||
|
if (normalizedIPVariants.length === 0) return false;
|
||||||
|
|
||||||
const expandedPatterns = patterns.flatMap(normalizeIP);
|
const expandedPatterns = patterns.flatMap(normalizeIP);
|
||||||
return normalizedIPVariants.some(ipVariant =>
|
return normalizedIPVariants.some(ipVariant =>
|
||||||
expandedPatterns.some(pattern => plugins.minimatch(ipVariant, pattern))
|
expandedPatterns.some(pattern => plugins.minimatch(ipVariant, pattern))
|
||||||
@ -176,6 +258,7 @@ const isAllowed = (ip: string, patterns: string[]): boolean => {
|
|||||||
|
|
||||||
// Helper: Check if an IP is allowed considering allowed and blocked glob patterns
|
// Helper: Check if an IP is allowed considering allowed and blocked glob patterns
|
||||||
const isGlobIPAllowed = (ip: string, allowed: string[], blocked: string[] = []): boolean => {
|
const isGlobIPAllowed = (ip: string, allowed: string[], blocked: string[] = []): boolean => {
|
||||||
|
if (!ip) return false;
|
||||||
if (blocked.length > 0 && isAllowed(ip, blocked)) return false;
|
if (blocked.length > 0 && isAllowed(ip, blocked)) return false;
|
||||||
return isAllowed(ip, allowed);
|
return isAllowed(ip, allowed);
|
||||||
};
|
};
|
||||||
@ -185,34 +268,17 @@ const generateConnectionId = (): string => {
|
|||||||
return Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15);
|
return Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15);
|
||||||
};
|
};
|
||||||
|
|
||||||
// Protocol detection helpers
|
// Helper: Check if a buffer contains a TLS handshake
|
||||||
const isHttpRequest = (buffer: Buffer): boolean => {
|
|
||||||
if (buffer.length < 4) return false;
|
|
||||||
const start = buffer.toString('ascii', 0, 4).toUpperCase();
|
|
||||||
return (
|
|
||||||
start.startsWith('GET ') ||
|
|
||||||
start.startsWith('POST') ||
|
|
||||||
start.startsWith('PUT ') ||
|
|
||||||
start.startsWith('HEAD') ||
|
|
||||||
start.startsWith('DELE') ||
|
|
||||||
start.startsWith('PATC') ||
|
|
||||||
start.startsWith('OPTI')
|
|
||||||
);
|
|
||||||
};
|
|
||||||
|
|
||||||
const isWebSocketUpgrade = (buffer: Buffer): boolean => {
|
|
||||||
if (buffer.length < 20) return false;
|
|
||||||
const data = buffer.toString('ascii', 0, Math.min(buffer.length, 200));
|
|
||||||
return (
|
|
||||||
data.includes('Upgrade: websocket') ||
|
|
||||||
data.includes('Upgrade: WebSocket')
|
|
||||||
);
|
|
||||||
};
|
|
||||||
|
|
||||||
const isTlsHandshake = (buffer: Buffer): boolean => {
|
const isTlsHandshake = (buffer: Buffer): boolean => {
|
||||||
return buffer.length > 0 && buffer[0] === 22; // ContentType.handshake
|
return buffer.length > 0 && buffer[0] === 22; // ContentType.handshake
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Helper: Generate a slightly randomized timeout to prevent thundering herd
|
||||||
|
const randomizeTimeout = (baseTimeout: number, variationPercent: number = 5): number => {
|
||||||
|
const variation = baseTimeout * (variationPercent / 100);
|
||||||
|
return baseTimeout + Math.floor(Math.random() * variation * 2) - variation;
|
||||||
|
};
|
||||||
|
|
||||||
export class PortProxy {
|
export class PortProxy {
|
||||||
private netServers: plugins.net.Server[] = [];
|
private netServers: plugins.net.Server[] = [];
|
||||||
settings: IPortProxySettings;
|
settings: IPortProxySettings;
|
||||||
@ -242,30 +308,27 @@ export class PortProxy {
|
|||||||
...settingsArg,
|
...settingsArg,
|
||||||
targetIP: settingsArg.targetIP || 'localhost',
|
targetIP: settingsArg.targetIP || 'localhost',
|
||||||
|
|
||||||
// Timeout settings with browser-friendly defaults
|
// Timeout settings with our enhanced defaults
|
||||||
initialDataTimeout: settingsArg.initialDataTimeout || 15000, // 15 seconds
|
initialDataTimeout: settingsArg.initialDataTimeout || 60000, // 60 seconds for initial data
|
||||||
socketTimeout: settingsArg.socketTimeout || 300000, // 5 minutes
|
socketTimeout: settingsArg.socketTimeout || 3600000, // 1 hour socket timeout
|
||||||
inactivityCheckInterval: settingsArg.inactivityCheckInterval || 30000, // 30 seconds
|
inactivityCheckInterval: settingsArg.inactivityCheckInterval || 60000, // 60 seconds interval
|
||||||
|
maxConnectionLifetime: settingsArg.maxConnectionLifetime || 3600000, // 1 hour default lifetime
|
||||||
// Protocol-specific timeouts
|
inactivityTimeout: settingsArg.inactivityTimeout || 3600000, // 1 hour inactivity timeout
|
||||||
maxConnectionLifetime: settingsArg.maxConnectionLifetime || 3600000, // 1 hour default
|
|
||||||
httpConnectionTimeout: settingsArg.httpConnectionTimeout || 1800000, // 30 minutes
|
|
||||||
wsConnectionTimeout: settingsArg.wsConnectionTimeout || 14400000, // 4 hours
|
|
||||||
httpKeepAliveTimeout: settingsArg.httpKeepAliveTimeout || 1200000, // 20 minutes
|
|
||||||
|
|
||||||
gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000, // 30 seconds
|
gracefulShutdownTimeout: settingsArg.gracefulShutdownTimeout || 30000, // 30 seconds
|
||||||
|
|
||||||
// Socket optimization settings
|
// Socket optimization settings
|
||||||
noDelay: settingsArg.noDelay !== undefined ? settingsArg.noDelay : true,
|
noDelay: settingsArg.noDelay !== undefined ? settingsArg.noDelay : true,
|
||||||
keepAlive: settingsArg.keepAlive !== undefined ? settingsArg.keepAlive : true,
|
keepAlive: settingsArg.keepAlive !== undefined ? settingsArg.keepAlive : true,
|
||||||
keepAliveInitialDelay: settingsArg.keepAliveInitialDelay || 60000, // 1 minute
|
keepAliveInitialDelay: settingsArg.keepAliveInitialDelay || 30000, // 30 seconds
|
||||||
maxPendingDataSize: settingsArg.maxPendingDataSize || 1024 * 1024, // 1MB
|
maxPendingDataSize: settingsArg.maxPendingDataSize || 10 * 1024 * 1024, // 10MB to handle large TLS handshakes
|
||||||
|
|
||||||
// Feature flags
|
// Feature flags
|
||||||
disableInactivityCheck: settingsArg.disableInactivityCheck || false,
|
disableInactivityCheck: settingsArg.disableInactivityCheck || false,
|
||||||
enableKeepAliveProbes: settingsArg.enableKeepAliveProbes || false,
|
enableKeepAliveProbes: settingsArg.enableKeepAliveProbes || false,
|
||||||
enableProtocolDetection: settingsArg.enableProtocolDetection !== undefined ? settingsArg.enableProtocolDetection : true,
|
|
||||||
enableDetailedLogging: settingsArg.enableDetailedLogging || false,
|
enableDetailedLogging: settingsArg.enableDetailedLogging || false,
|
||||||
|
enableTlsDebugLogging: settingsArg.enableTlsDebugLogging || false,
|
||||||
|
enableRandomizedTimeouts: settingsArg.enableRandomizedTimeouts || true,
|
||||||
|
|
||||||
// Rate limiting defaults
|
// Rate limiting defaults
|
||||||
maxConnectionsPerIP: settingsArg.maxConnectionsPerIP || 100, // 100 connections per IP
|
maxConnectionsPerIP: settingsArg.maxConnectionsPerIP || 100, // 100 connections per IP
|
||||||
@ -332,115 +395,22 @@ export class PortProxy {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get protocol-specific timeout based on connection type
|
* Get connection timeout based on domain config or default settings
|
||||||
*/
|
*/
|
||||||
private getProtocolTimeout(record: IConnectionRecord, domainConfig?: IDomainConfig): number {
|
private getConnectionTimeout(record: IConnectionRecord): number {
|
||||||
// If the protocol has a domain-specific timeout, use that
|
// If the connection has a domain-specific timeout, use that
|
||||||
if (domainConfig) {
|
if (record.domainConfig?.connectionTimeout) {
|
||||||
if (record.protocolType === 'http' && domainConfig.httpTimeout) {
|
return record.domainConfig.connectionTimeout;
|
||||||
return domainConfig.httpTimeout;
|
|
||||||
}
|
|
||||||
if (record.protocolType === 'websocket' && domainConfig.wsTimeout) {
|
|
||||||
return domainConfig.wsTimeout;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Use HTTP keep-alive timeout from headers if available
|
// Use default timeout, potentially randomized
|
||||||
if (record.httpKeepAliveTimeout) {
|
const baseTimeout = this.settings.maxConnectionLifetime!;
|
||||||
return record.httpKeepAliveTimeout;
|
|
||||||
|
if (this.settings.enableRandomizedTimeouts) {
|
||||||
|
return randomizeTimeout(baseTimeout);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Otherwise use default protocol-specific timeout
|
return baseTimeout;
|
||||||
switch (record.protocolType) {
|
|
||||||
case 'http':
|
|
||||||
return this.settings.httpConnectionTimeout!;
|
|
||||||
case 'websocket':
|
|
||||||
return this.settings.wsConnectionTimeout!;
|
|
||||||
case 'https':
|
|
||||||
case 'tls':
|
|
||||||
return this.settings.httpConnectionTimeout!; // Use HTTP timeout for HTTPS by default
|
|
||||||
default:
|
|
||||||
return this.settings.maxConnectionLifetime!;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Detect protocol and update connection record
|
|
||||||
*/
|
|
||||||
private detectProtocol(data: Buffer, record: IConnectionRecord): void {
|
|
||||||
if (!this.settings.enableProtocolDetection || record.protocolType !== 'unknown') {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
// Detect TLS/HTTPS
|
|
||||||
if (isTlsHandshake(data)) {
|
|
||||||
record.protocolType = 'tls';
|
|
||||||
if (this.settings.enableDetailedLogging) {
|
|
||||||
console.log(`[${record.id}] Protocol detected: TLS`);
|
|
||||||
}
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Detect HTTP including WebSocket upgrades
|
|
||||||
if (isHttpRequest(data)) {
|
|
||||||
record.httpRequests++;
|
|
||||||
record.lastHttpRequest = Date.now();
|
|
||||||
|
|
||||||
// Check for WebSocket upgrade
|
|
||||||
if (isWebSocketUpgrade(data)) {
|
|
||||||
record.protocolType = 'websocket';
|
|
||||||
if (this.settings.enableDetailedLogging) {
|
|
||||||
console.log(`[${record.id}] Protocol detected: WebSocket Upgrade`);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
record.protocolType = 'http';
|
|
||||||
|
|
||||||
// Parse HTTP keep-alive headers
|
|
||||||
this.parseHttpHeaders(data, record);
|
|
||||||
|
|
||||||
if (this.settings.enableDetailedLogging) {
|
|
||||||
console.log(`[${record.id}] Protocol detected: HTTP${record.isPooledConnection ? ' (KeepAlive)' : ''}`);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} catch (err) {
|
|
||||||
console.log(`[${record.id}] Error detecting protocol: ${err}`);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Parse HTTP headers for keep-alive and other connection info
|
|
||||||
*/
|
|
||||||
private parseHttpHeaders(data: Buffer, record: IConnectionRecord): void {
|
|
||||||
try {
|
|
||||||
const headerStr = data.toString('utf8', 0, Math.min(data.length, 1024));
|
|
||||||
|
|
||||||
// Check for HTTP keep-alive
|
|
||||||
const connectionHeader = headerStr.match(/\r\nConnection:\s*([^\r\n]+)/i);
|
|
||||||
if (connectionHeader && connectionHeader[1].toLowerCase().includes('keep-alive')) {
|
|
||||||
record.isPooledConnection = true;
|
|
||||||
|
|
||||||
// Check for Keep-Alive timeout value
|
|
||||||
const keepAliveHeader = headerStr.match(/\r\nKeep-Alive:\s*([^\r\n]+)/i);
|
|
||||||
if (keepAliveHeader) {
|
|
||||||
const timeoutMatch = keepAliveHeader[1].match(/timeout=(\d+)/i);
|
|
||||||
if (timeoutMatch && timeoutMatch[1]) {
|
|
||||||
const timeoutSec = parseInt(timeoutMatch[1], 10);
|
|
||||||
if (!isNaN(timeoutSec) && timeoutSec > 0) {
|
|
||||||
// Convert seconds to milliseconds and add some buffer
|
|
||||||
record.httpKeepAliveTimeout = (timeoutSec * 1000) + 5000;
|
|
||||||
|
|
||||||
if (this.settings.enableDetailedLogging) {
|
|
||||||
console.log(`[${record.id}] HTTP Keep-Alive timeout set to ${timeoutSec} seconds`);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} catch (err) {
|
|
||||||
console.log(`[${record.id}] Error parsing HTTP headers: ${err}`);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -465,7 +435,6 @@ export class PortProxy {
|
|||||||
const duration = Date.now() - record.incomingStartTime;
|
const duration = Date.now() - record.incomingStartTime;
|
||||||
const bytesReceived = record.bytesReceived;
|
const bytesReceived = record.bytesReceived;
|
||||||
const bytesSent = record.bytesSent;
|
const bytesSent = record.bytesSent;
|
||||||
const httpRequests = record.httpRequests;
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
if (!record.incoming.destroyed) {
|
if (!record.incoming.destroyed) {
|
||||||
@ -538,7 +507,7 @@ export class PortProxy {
|
|||||||
if (this.settings.enableDetailedLogging) {
|
if (this.settings.enableDetailedLogging) {
|
||||||
console.log(`[${record.id}] Connection from ${record.remoteIP} on port ${record.localPort} terminated (${reason}).` +
|
console.log(`[${record.id}] Connection from ${record.remoteIP} on port ${record.localPort} terminated (${reason}).` +
|
||||||
` Duration: ${plugins.prettyMs(duration)}, Bytes IN: ${bytesReceived}, OUT: ${bytesSent}, ` +
|
` Duration: ${plugins.prettyMs(duration)}, Bytes IN: ${bytesReceived}, OUT: ${bytesSent}, ` +
|
||||||
`HTTP Requests: ${httpRequests}, Protocol: ${record.protocolType}, Pooled: ${record.isPooledConnection}`);
|
`TLS: ${record.isTLS ? 'Yes' : 'No'}`);
|
||||||
} else {
|
} else {
|
||||||
console.log(`[${record.id}] Connection from ${record.remoteIP} terminated (${reason}). Active connections: ${this.connectionRecords.size}`);
|
console.log(`[${record.id}] Connection from ${record.remoteIP} terminated (${reason}). Active connections: ${this.connectionRecords.size}`);
|
||||||
}
|
}
|
||||||
@ -608,6 +577,21 @@ export class PortProxy {
|
|||||||
socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
socket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Apply enhanced TCP options if available
|
||||||
|
if (this.settings.enableKeepAliveProbes) {
|
||||||
|
try {
|
||||||
|
// These are platform-specific and may not be available
|
||||||
|
if ('setKeepAliveProbes' in socket) {
|
||||||
|
(socket as any).setKeepAliveProbes(10);
|
||||||
|
}
|
||||||
|
if ('setKeepAliveInterval' in socket) {
|
||||||
|
(socket as any).setKeepAliveInterval(1000);
|
||||||
|
}
|
||||||
|
} catch (err) {
|
||||||
|
// Ignore errors - these are optional enhancements
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Create a unique connection ID and record
|
// Create a unique connection ID and record
|
||||||
const connectionId = generateConnectionId();
|
const connectionId = generateConnectionId();
|
||||||
const connectionRecord: IConnectionRecord = {
|
const connectionRecord: IConnectionRecord = {
|
||||||
@ -621,13 +605,13 @@ export class PortProxy {
|
|||||||
pendingDataSize: 0,
|
pendingDataSize: 0,
|
||||||
|
|
||||||
// Initialize enhanced tracking fields
|
// Initialize enhanced tracking fields
|
||||||
protocolType: 'unknown',
|
|
||||||
isPooledConnection: false,
|
|
||||||
bytesReceived: 0,
|
bytesReceived: 0,
|
||||||
bytesSent: 0,
|
bytesSent: 0,
|
||||||
remoteIP: remoteIP,
|
remoteIP: remoteIP,
|
||||||
localPort: localPort,
|
localPort: localPort,
|
||||||
httpRequests: 0
|
isTLS: false,
|
||||||
|
tlsHandshakeComplete: false,
|
||||||
|
hasReceivedInitialData: false
|
||||||
};
|
};
|
||||||
|
|
||||||
// Track connection by IP
|
// Track connection by IP
|
||||||
@ -685,9 +669,15 @@ export class PortProxy {
|
|||||||
socket.end();
|
socket.end();
|
||||||
cleanupOnce();
|
cleanupOnce();
|
||||||
}
|
}
|
||||||
}, this.settings.initialDataTimeout);
|
}, this.settings.initialDataTimeout!);
|
||||||
|
|
||||||
|
// Make sure timeout doesn't keep the process alive
|
||||||
|
if (initialTimeout.unref) {
|
||||||
|
initialTimeout.unref();
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
initialDataReceived = true;
|
initialDataReceived = true;
|
||||||
|
connectionRecord.hasReceivedInitialData = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
socket.on('error', (err: Error) => {
|
socket.on('error', (err: Error) => {
|
||||||
@ -699,39 +689,14 @@ export class PortProxy {
|
|||||||
connectionRecord.bytesReceived += chunk.length;
|
connectionRecord.bytesReceived += chunk.length;
|
||||||
this.updateActivity(connectionRecord);
|
this.updateActivity(connectionRecord);
|
||||||
|
|
||||||
// Detect protocol on first data chunk
|
// Check for TLS handshake if this is the first chunk
|
||||||
if (connectionRecord.protocolType === 'unknown') {
|
if (!connectionRecord.isTLS && isTlsHandshake(chunk)) {
|
||||||
this.detectProtocol(chunk, connectionRecord);
|
connectionRecord.isTLS = true;
|
||||||
|
|
||||||
// Update timeout based on protocol
|
if (this.settings.enableTlsDebugLogging) {
|
||||||
if (connectionRecord.cleanupTimer) {
|
console.log(`[${connectionId}] TLS handshake detected from ${remoteIP}, ${chunk.length} bytes`);
|
||||||
clearTimeout(connectionRecord.cleanupTimer);
|
// Try to extract SNI and log detailed debug info
|
||||||
|
extractSNI(chunk, true);
|
||||||
// Set new timeout based on protocol
|
|
||||||
const protocolTimeout = this.getProtocolTimeout(connectionRecord);
|
|
||||||
connectionRecord.cleanupTimer = setTimeout(() => {
|
|
||||||
console.log(`[${connectionId}] ${connectionRecord.protocolType} connection timeout after ${plugins.prettyMs(protocolTimeout)}`);
|
|
||||||
initiateCleanupOnce(`${connectionRecord.protocolType}_timeout`);
|
|
||||||
}, protocolTimeout);
|
|
||||||
}
|
|
||||||
} else if (connectionRecord.protocolType === 'http' && isHttpRequest(chunk)) {
|
|
||||||
// Additional HTTP request on the same connection
|
|
||||||
connectionRecord.httpRequests++;
|
|
||||||
connectionRecord.lastHttpRequest = Date.now();
|
|
||||||
|
|
||||||
// Parse HTTP headers again for keep-alive changes
|
|
||||||
this.parseHttpHeaders(chunk, connectionRecord);
|
|
||||||
|
|
||||||
// Update timeout based on new HTTP headers
|
|
||||||
if (connectionRecord.cleanupTimer) {
|
|
||||||
clearTimeout(connectionRecord.cleanupTimer);
|
|
||||||
|
|
||||||
// Set new timeout based on updated HTTP info
|
|
||||||
const protocolTimeout = this.getProtocolTimeout(connectionRecord);
|
|
||||||
connectionRecord.cleanupTimer = setTimeout(() => {
|
|
||||||
console.log(`[${connectionId}] HTTP connection timeout after ${plugins.prettyMs(protocolTimeout)}`);
|
|
||||||
initiateCleanupOnce('http_timeout');
|
|
||||||
}, protocolTimeout);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
@ -797,9 +762,17 @@ export class PortProxy {
|
|||||||
initialTimeout = null;
|
initialTimeout = null;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Detect protocol if initial chunk is available
|
// Mark that we've received initial data
|
||||||
if (initialChunk && this.settings.enableProtocolDetection) {
|
initialDataReceived = true;
|
||||||
this.detectProtocol(initialChunk, connectionRecord);
|
connectionRecord.hasReceivedInitialData = true;
|
||||||
|
|
||||||
|
// Check if this looks like a TLS handshake
|
||||||
|
if (initialChunk && isTlsHandshake(initialChunk)) {
|
||||||
|
connectionRecord.isTLS = true;
|
||||||
|
|
||||||
|
if (this.settings.enableTlsDebugLogging) {
|
||||||
|
console.log(`[${connectionId}] TLS handshake detected in setup, ${initialChunk.length} bytes`);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
|
// If a forcedDomain is provided (port-based routing), use it; otherwise, use SNI-based lookup.
|
||||||
@ -809,6 +782,9 @@ export class PortProxy {
|
|||||||
config.domains.some(d => plugins.minimatch(serverName, d))
|
config.domains.some(d => plugins.minimatch(serverName, d))
|
||||||
) : undefined);
|
) : undefined);
|
||||||
|
|
||||||
|
// Save domain config in connection record
|
||||||
|
connectionRecord.domainConfig = domainConfig;
|
||||||
|
|
||||||
// IP validation is skipped if allowedIPs is empty
|
// IP validation is skipped if allowedIPs is empty
|
||||||
if (domainConfig) {
|
if (domainConfig) {
|
||||||
const effectiveAllowedIPs: string[] = [
|
const effectiveAllowedIPs: string[] = [
|
||||||
@ -847,9 +823,13 @@ export class PortProxy {
|
|||||||
// Track bytes received
|
// Track bytes received
|
||||||
connectionRecord.bytesReceived += chunk.length;
|
connectionRecord.bytesReceived += chunk.length;
|
||||||
|
|
||||||
// Detect protocol even during connection setup
|
// Check for TLS handshake
|
||||||
if (this.settings.enableProtocolDetection && connectionRecord.protocolType === 'unknown') {
|
if (!connectionRecord.isTLS && isTlsHandshake(chunk)) {
|
||||||
this.detectProtocol(chunk, connectionRecord);
|
connectionRecord.isTLS = true;
|
||||||
|
|
||||||
|
if (this.settings.enableTlsDebugLogging) {
|
||||||
|
console.log(`[${connectionId}] TLS handshake detected in tempDataHandler, ${chunk.length} bytes`);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if adding this chunk would exceed the buffer limit
|
// Check if adding this chunk would exceed the buffer limit
|
||||||
@ -888,6 +868,20 @@ export class PortProxy {
|
|||||||
targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
targetSocket.setKeepAlive(true, this.settings.keepAliveInitialDelay);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Apply enhanced TCP options if available
|
||||||
|
if (this.settings.enableKeepAliveProbes) {
|
||||||
|
try {
|
||||||
|
if ('setKeepAliveProbes' in targetSocket) {
|
||||||
|
(targetSocket as any).setKeepAliveProbes(10);
|
||||||
|
}
|
||||||
|
if ('setKeepAliveInterval' in targetSocket) {
|
||||||
|
(targetSocket as any).setKeepAliveInterval(1000);
|
||||||
|
}
|
||||||
|
} catch (err) {
|
||||||
|
// Ignore errors - these are optional enhancements
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Setup specific error handler for connection phase
|
// Setup specific error handler for connection phase
|
||||||
targetSocket.once('error', (err) => {
|
targetSocket.once('error', (err) => {
|
||||||
// This handler runs only once during the initial connection phase
|
// This handler runs only once during the initial connection phase
|
||||||
@ -928,7 +922,7 @@ export class PortProxy {
|
|||||||
|
|
||||||
// Handle timeouts
|
// Handle timeouts
|
||||||
socket.on('timeout', () => {
|
socket.on('timeout', () => {
|
||||||
console.log(`[${connectionId}] Timeout on incoming side from ${remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 300000)}`);
|
console.log(`[${connectionId}] Timeout on incoming side from ${remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
||||||
if (incomingTerminationReason === null) {
|
if (incomingTerminationReason === null) {
|
||||||
incomingTerminationReason = 'timeout';
|
incomingTerminationReason = 'timeout';
|
||||||
this.incrementTerminationStat('incoming', 'timeout');
|
this.incrementTerminationStat('incoming', 'timeout');
|
||||||
@ -937,7 +931,7 @@ export class PortProxy {
|
|||||||
});
|
});
|
||||||
|
|
||||||
targetSocket.on('timeout', () => {
|
targetSocket.on('timeout', () => {
|
||||||
console.log(`[${connectionId}] Timeout on outgoing side from ${remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 300000)}`);
|
console.log(`[${connectionId}] Timeout on outgoing side from ${remoteIP} after ${plugins.prettyMs(this.settings.socketTimeout || 3600000)}`);
|
||||||
if (outgoingTerminationReason === null) {
|
if (outgoingTerminationReason === null) {
|
||||||
outgoingTerminationReason = 'timeout';
|
outgoingTerminationReason = 'timeout';
|
||||||
this.incrementTerminationStat('outgoing', 'timeout');
|
this.incrementTerminationStat('outgoing', 'timeout');
|
||||||
@ -946,8 +940,8 @@ export class PortProxy {
|
|||||||
});
|
});
|
||||||
|
|
||||||
// Set appropriate timeouts using the configured value
|
// Set appropriate timeouts using the configured value
|
||||||
socket.setTimeout(this.settings.socketTimeout || 300000);
|
socket.setTimeout(this.settings.socketTimeout || 3600000);
|
||||||
targetSocket.setTimeout(this.settings.socketTimeout || 300000);
|
targetSocket.setTimeout(this.settings.socketTimeout || 3600000);
|
||||||
|
|
||||||
// Track outgoing data for bytes counting
|
// Track outgoing data for bytes counting
|
||||||
targetSocket.on('data', (chunk: Buffer) => {
|
targetSocket.on('data', (chunk: Buffer) => {
|
||||||
@ -984,7 +978,7 @@ export class PortProxy {
|
|||||||
console.log(
|
console.log(
|
||||||
`[${connectionId}] Connection established: ${remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
`[${connectionId}] Connection established: ${remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
||||||
`${serverName ? ` (SNI: ${serverName})` : forcedDomain ? ` (Port-based for domain: ${forcedDomain.domains.join(', ')})` : ''}` +
|
`${serverName ? ` (SNI: ${serverName})` : forcedDomain ? ` (Port-based for domain: ${forcedDomain.domains.join(', ')})` : ''}` +
|
||||||
` Protocol: ${connectionRecord.protocolType}`
|
` TLS: ${connectionRecord.isTLS ? 'Yes' : 'No'}`
|
||||||
);
|
);
|
||||||
} else {
|
} else {
|
||||||
console.log(
|
console.log(
|
||||||
@ -1003,7 +997,7 @@ export class PortProxy {
|
|||||||
console.log(
|
console.log(
|
||||||
`[${connectionId}] Connection established: ${remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
`[${connectionId}] Connection established: ${remoteIP} -> ${targetHost}:${connectionOptions.port}` +
|
||||||
`${serverName ? ` (SNI: ${serverName})` : forcedDomain ? ` (Port-based for domain: ${forcedDomain.domains.join(', ')})` : ''}` +
|
`${serverName ? ` (SNI: ${serverName})` : forcedDomain ? ` (Port-based for domain: ${forcedDomain.domains.join(', ')})` : ''}` +
|
||||||
` Protocol: ${connectionRecord.protocolType}`
|
` TLS: ${connectionRecord.isTLS ? 'Yes' : 'No'}`
|
||||||
);
|
);
|
||||||
} else {
|
} else {
|
||||||
console.log(
|
console.log(
|
||||||
@ -1023,7 +1017,7 @@ export class PortProxy {
|
|||||||
if (renegChunk.length > 0 && renegChunk.readUInt8(0) === 22) {
|
if (renegChunk.length > 0 && renegChunk.readUInt8(0) === 22) {
|
||||||
try {
|
try {
|
||||||
// Try to extract SNI from potential renegotiation
|
// Try to extract SNI from potential renegotiation
|
||||||
const newSNI = extractSNI(renegChunk);
|
const newSNI = extractSNI(renegChunk, this.settings.enableTlsDebugLogging);
|
||||||
if (newSNI && newSNI !== connectionRecord.lockedDomain) {
|
if (newSNI && newSNI !== connectionRecord.lockedDomain) {
|
||||||
console.log(`[${connectionId}] Rehandshake detected with different SNI: ${newSNI} vs locked ${connectionRecord.lockedDomain}. Terminating connection.`);
|
console.log(`[${connectionId}] Rehandshake detected with different SNI: ${newSNI} vs locked ${connectionRecord.lockedDomain}. Terminating connection.`);
|
||||||
initiateCleanupOnce('sni_mismatch');
|
initiateCleanupOnce('sni_mismatch');
|
||||||
@ -1037,17 +1031,31 @@ export class PortProxy {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set protocol-specific timeout based on detected protocol
|
// Set connection timeout
|
||||||
if (connectionRecord.cleanupTimer) {
|
if (connectionRecord.cleanupTimer) {
|
||||||
clearTimeout(connectionRecord.cleanupTimer);
|
clearTimeout(connectionRecord.cleanupTimer);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set timeout based on protocol
|
// Set timeout based on domain config or default
|
||||||
const protocolTimeout = this.getProtocolTimeout(connectionRecord, domainConfig);
|
const connectionTimeout = this.getConnectionTimeout(connectionRecord);
|
||||||
connectionRecord.cleanupTimer = setTimeout(() => {
|
connectionRecord.cleanupTimer = setTimeout(() => {
|
||||||
console.log(`[${connectionId}] ${connectionRecord.protocolType} connection exceeded max lifetime (${plugins.prettyMs(protocolTimeout)}), forcing cleanup.`);
|
console.log(`[${connectionId}] Connection from ${remoteIP} exceeded max lifetime (${plugins.prettyMs(connectionTimeout)}), forcing cleanup.`);
|
||||||
initiateCleanupOnce(`${connectionRecord.protocolType}_max_lifetime`);
|
initiateCleanupOnce('connection_timeout');
|
||||||
}, protocolTimeout);
|
}, connectionTimeout);
|
||||||
|
|
||||||
|
// Make sure timeout doesn't keep the process alive
|
||||||
|
if (connectionRecord.cleanupTimer.unref) {
|
||||||
|
connectionRecord.cleanupTimer.unref();
|
||||||
|
}
|
||||||
|
|
||||||
|
// Mark TLS handshake as complete for TLS connections
|
||||||
|
if (connectionRecord.isTLS) {
|
||||||
|
connectionRecord.tlsHandshakeComplete = true;
|
||||||
|
|
||||||
|
if (this.settings.enableTlsDebugLogging) {
|
||||||
|
console.log(`[${connectionId}] TLS handshake complete for connection from ${remoteIP}`);
|
||||||
|
}
|
||||||
|
}
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -1055,7 +1063,7 @@ export class PortProxy {
|
|||||||
// Only apply port-based rules if the incoming port is within one of the global port ranges.
|
// Only apply port-based rules if the incoming port is within one of the global port ranges.
|
||||||
if (this.settings.globalPortRanges && isPortInRanges(localPort, this.settings.globalPortRanges)) {
|
if (this.settings.globalPortRanges && isPortInRanges(localPort, this.settings.globalPortRanges)) {
|
||||||
if (this.settings.forwardAllGlobalRanges) {
|
if (this.settings.forwardAllGlobalRanges) {
|
||||||
if (this.settings.defaultAllowedIPs && !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
if (this.settings.defaultAllowedIPs && this.settings.defaultAllowedIPs.length > 0 && !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
||||||
console.log(`[${connectionId}] Connection from ${remoteIP} rejected: IP ${remoteIP} not allowed in global default allowed list.`);
|
console.log(`[${connectionId}] Connection from ${remoteIP} rejected: IP ${remoteIP} not allowed in global default allowed list.`);
|
||||||
socket.end();
|
socket.end();
|
||||||
return;
|
return;
|
||||||
@ -1111,7 +1119,20 @@ export class PortProxy {
|
|||||||
}
|
}
|
||||||
|
|
||||||
initialDataReceived = true;
|
initialDataReceived = true;
|
||||||
const serverName = extractSNI(chunk) || '';
|
|
||||||
|
// Try to extract SNI
|
||||||
|
let serverName = '';
|
||||||
|
|
||||||
|
if (isTlsHandshake(chunk)) {
|
||||||
|
connectionRecord.isTLS = true;
|
||||||
|
|
||||||
|
if (this.settings.enableTlsDebugLogging) {
|
||||||
|
console.log(`[${connectionId}] Extracting SNI from TLS handshake, ${chunk.length} bytes`);
|
||||||
|
}
|
||||||
|
|
||||||
|
serverName = extractSNI(chunk, this.settings.enableTlsDebugLogging) || '';
|
||||||
|
}
|
||||||
|
|
||||||
// Lock the connection to the negotiated SNI.
|
// Lock the connection to the negotiated SNI.
|
||||||
connectionRecord.lockedDomain = serverName;
|
connectionRecord.lockedDomain = serverName;
|
||||||
|
|
||||||
@ -1123,9 +1144,12 @@ export class PortProxy {
|
|||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
initialDataReceived = true;
|
initialDataReceived = true;
|
||||||
if (!this.settings.defaultAllowedIPs || this.settings.defaultAllowedIPs.length === 0 || !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
connectionRecord.hasReceivedInitialData = true;
|
||||||
|
|
||||||
|
if (this.settings.defaultAllowedIPs && this.settings.defaultAllowedIPs.length > 0 && !isAllowed(remoteIP, this.settings.defaultAllowedIPs)) {
|
||||||
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for non-SNI connection`);
|
return rejectIncomingConnection('rejected', `Connection rejected: IP ${remoteIP} not allowed for non-SNI connection`);
|
||||||
}
|
}
|
||||||
|
|
||||||
setupConnection('');
|
setupConnection('');
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
@ -1167,11 +1191,10 @@ export class PortProxy {
|
|||||||
const now = Date.now();
|
const now = Date.now();
|
||||||
let maxIncoming = 0;
|
let maxIncoming = 0;
|
||||||
let maxOutgoing = 0;
|
let maxOutgoing = 0;
|
||||||
let httpConnections = 0;
|
|
||||||
let wsConnections = 0;
|
|
||||||
let tlsConnections = 0;
|
let tlsConnections = 0;
|
||||||
let unknownConnections = 0;
|
let nonTlsConnections = 0;
|
||||||
let pooledConnections = 0;
|
let completedTlsHandshakes = 0;
|
||||||
|
let pendingTlsHandshakes = 0;
|
||||||
|
|
||||||
// Create a copy of the keys to avoid modification during iteration
|
// Create a copy of the keys to avoid modification during iteration
|
||||||
const connectionIds = [...this.connectionRecords.keys()];
|
const connectionIds = [...this.connectionRecords.keys()];
|
||||||
@ -1180,17 +1203,16 @@ export class PortProxy {
|
|||||||
const record = this.connectionRecords.get(id);
|
const record = this.connectionRecords.get(id);
|
||||||
if (!record) continue;
|
if (!record) continue;
|
||||||
|
|
||||||
// Track connection stats by protocol
|
// Track connection stats
|
||||||
switch (record.protocolType) {
|
if (record.isTLS) {
|
||||||
case 'http': httpConnections++; break;
|
tlsConnections++;
|
||||||
case 'websocket': wsConnections++; break;
|
if (record.tlsHandshakeComplete) {
|
||||||
case 'tls':
|
completedTlsHandshakes++;
|
||||||
case 'https': tlsConnections++; break;
|
} else {
|
||||||
default: unknownConnections++; break;
|
pendingTlsHandshakes++;
|
||||||
}
|
}
|
||||||
|
} else {
|
||||||
if (record.isPooledConnection) {
|
nonTlsConnections++;
|
||||||
pooledConnections++;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
|
maxIncoming = Math.max(maxIncoming, now - record.incomingStartTime);
|
||||||
@ -1202,29 +1224,26 @@ export class PortProxy {
|
|||||||
if (record.outgoingClosedTime &&
|
if (record.outgoingClosedTime &&
|
||||||
!record.incoming.destroyed &&
|
!record.incoming.destroyed &&
|
||||||
!record.connectionClosed &&
|
!record.connectionClosed &&
|
||||||
(now - record.outgoingClosedTime > 30000)) {
|
(now - record.outgoingClosedTime > 120000)) {
|
||||||
const remoteIP = record.remoteIP;
|
const remoteIP = record.remoteIP;
|
||||||
console.log(`[${id}] Parity check: Incoming socket for ${remoteIP} still active ${plugins.prettyMs(now - record.outgoingClosedTime)} after outgoing closed.`);
|
console.log(`[${id}] Parity check: Incoming socket for ${remoteIP} still active ${plugins.prettyMs(now - record.outgoingClosedTime)} after outgoing closed.`);
|
||||||
this.cleanupConnection(record, 'parity_check');
|
this.cleanupConnection(record, 'parity_check');
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Check for stalled connections waiting for initial data
|
||||||
|
if (!record.hasReceivedInitialData &&
|
||||||
|
(now - record.incomingStartTime > this.settings.initialDataTimeout! / 2)) {
|
||||||
|
console.log(`[${id}] Warning: Connection from ${record.remoteIP} has not received initial data after ${plugins.prettyMs(now - record.incomingStartTime)}`);
|
||||||
|
}
|
||||||
|
|
||||||
// Skip inactivity check if disabled
|
// Skip inactivity check if disabled
|
||||||
if (!this.settings.disableInactivityCheck) {
|
if (!this.settings.disableInactivityCheck) {
|
||||||
// Inactivity check - use protocol-specific values
|
// Inactivity check with configurable timeout
|
||||||
let inactivityThreshold = Math.floor(Math.random() * (1800000 - 1200000 + 1)) + 1200000; // random between 20 and 30 minutes
|
const inactivityThreshold = this.settings.inactivityTimeout!;
|
||||||
|
|
||||||
// Set protocol-specific inactivity thresholds
|
|
||||||
if (record.protocolType === 'http' && record.isPooledConnection) {
|
|
||||||
inactivityThreshold = this.settings.httpKeepAliveTimeout || 1200000; // 20 minutes for pooled HTTP
|
|
||||||
} else if (record.protocolType === 'websocket') {
|
|
||||||
inactivityThreshold = this.settings.wsConnectionTimeout || 14400000; // 4 hours for WebSocket
|
|
||||||
} else if (record.protocolType === 'http') {
|
|
||||||
inactivityThreshold = this.settings.httpConnectionTimeout || 1800000; // 30 minutes for HTTP
|
|
||||||
}
|
|
||||||
|
|
||||||
const inactivityTime = now - record.lastActivity;
|
const inactivityTime = now - record.lastActivity;
|
||||||
if (inactivityTime > inactivityThreshold && !record.connectionClosed) {
|
if (inactivityTime > inactivityThreshold && !record.connectionClosed) {
|
||||||
console.log(`[${id}] Inactivity check: No activity on ${record.protocolType} connection from ${record.remoteIP} for ${plugins.prettyMs(inactivityTime)}.`);
|
console.log(`[${id}] Inactivity check: No activity on connection from ${record.remoteIP} for ${plugins.prettyMs(inactivityTime)}.`);
|
||||||
this.cleanupConnection(record, 'inactivity');
|
this.cleanupConnection(record, 'inactivity');
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1233,11 +1252,11 @@ export class PortProxy {
|
|||||||
// Log detailed stats periodically
|
// Log detailed stats periodically
|
||||||
console.log(
|
console.log(
|
||||||
`Active connections: ${this.connectionRecords.size}. ` +
|
`Active connections: ${this.connectionRecords.size}. ` +
|
||||||
`Types: HTTP=${httpConnections}, WS=${wsConnections}, TLS=${tlsConnections}, Unknown=${unknownConnections}, Pooled=${pooledConnections}. ` +
|
`Types: TLS=${tlsConnections} (Completed=${completedTlsHandshakes}, Pending=${pendingTlsHandshakes}), Non-TLS=${nonTlsConnections}. ` +
|
||||||
`Longest running: IN=${plugins.prettyMs(maxIncoming)}, OUT=${plugins.prettyMs(maxOutgoing)}. ` +
|
`Longest running: IN=${plugins.prettyMs(maxIncoming)}, OUT=${plugins.prettyMs(maxOutgoing)}. ` +
|
||||||
`Termination stats: ${JSON.stringify({IN: this.terminationStats.incoming, OUT: this.terminationStats.outgoing})}`
|
`Termination stats: ${JSON.stringify({IN: this.terminationStats.incoming, OUT: this.terminationStats.outgoing})}`
|
||||||
);
|
);
|
||||||
}, this.settings.inactivityCheckInterval || 30000);
|
}, this.settings.inactivityCheckInterval || 60000);
|
||||||
|
|
||||||
// Make sure the interval doesn't keep the process alive
|
// Make sure the interval doesn't keep the process alive
|
||||||
if (this.connectionLogger.unref) {
|
if (this.connectionLogger.unref) {
|
||||||
|
@ -1,33 +1,359 @@
|
|||||||
import * as plugins from './plugins.js';
|
import * as plugins from './plugins.js';
|
||||||
|
|
||||||
export class ProxyRouter {
|
|
||||||
public reverseProxyConfigs: plugins.tsclass.network.IReverseProxyConfig[] = [];
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* sets a new set of reverse configs to be routed to
|
* Optional path pattern configuration that can be added to proxy configs
|
||||||
* @param reverseCandidatesArg
|
|
||||||
*/
|
*/
|
||||||
public setNewProxyConfigs(reverseCandidatesArg: plugins.tsclass.network.IReverseProxyConfig[]) {
|
export interface IPathPatternConfig {
|
||||||
this.reverseProxyConfigs = reverseCandidatesArg;
|
pathPattern?: string;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* routes a request
|
* Interface for router result with additional metadata
|
||||||
|
*/
|
||||||
|
export interface IRouterResult {
|
||||||
|
config: plugins.tsclass.network.IReverseProxyConfig;
|
||||||
|
pathMatch?: string;
|
||||||
|
pathParams?: Record<string, string>;
|
||||||
|
pathRemainder?: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
export class ProxyRouter {
|
||||||
|
// Using a Map for O(1) hostname lookups instead of array search
|
||||||
|
private hostMap: Map<string, plugins.tsclass.network.IReverseProxyConfig[]> = new Map();
|
||||||
|
// Store original configs for reference
|
||||||
|
private reverseProxyConfigs: plugins.tsclass.network.IReverseProxyConfig[] = [];
|
||||||
|
// Default config to use when no match is found (optional)
|
||||||
|
private defaultConfig?: plugins.tsclass.network.IReverseProxyConfig;
|
||||||
|
// Store path patterns separately since they're not in the original interface
|
||||||
|
private pathPatterns: Map<plugins.tsclass.network.IReverseProxyConfig, string> = new Map();
|
||||||
|
|
||||||
|
constructor(
|
||||||
|
configs?: plugins.tsclass.network.IReverseProxyConfig[],
|
||||||
|
private readonly logger: {
|
||||||
|
error: (message: string, data?: any) => void;
|
||||||
|
warn: (message: string, data?: any) => void;
|
||||||
|
info: (message: string, data?: any) => void;
|
||||||
|
debug: (message: string, data?: any) => void;
|
||||||
|
} = console
|
||||||
|
) {
|
||||||
|
if (configs) {
|
||||||
|
this.setNewProxyConfigs(configs);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets a new set of reverse configs to be routed to
|
||||||
|
* @param reverseCandidatesArg Array of reverse proxy configurations
|
||||||
|
*/
|
||||||
|
public setNewProxyConfigs(reverseCandidatesArg: plugins.tsclass.network.IReverseProxyConfig[]): void {
|
||||||
|
this.reverseProxyConfigs = [...reverseCandidatesArg];
|
||||||
|
|
||||||
|
// Reset the host map and path patterns
|
||||||
|
this.hostMap.clear();
|
||||||
|
this.pathPatterns.clear();
|
||||||
|
|
||||||
|
// Find default config if any (config with "*" as hostname)
|
||||||
|
this.defaultConfig = this.reverseProxyConfigs.find(config => config.hostName === '*');
|
||||||
|
|
||||||
|
// Group configs by hostname for faster lookups
|
||||||
|
for (const config of this.reverseProxyConfigs) {
|
||||||
|
// Skip the default config as it's stored separately
|
||||||
|
if (config.hostName === '*') continue;
|
||||||
|
|
||||||
|
const hostname = config.hostName.toLowerCase(); // Case-insensitive hostname lookup
|
||||||
|
|
||||||
|
if (!this.hostMap.has(hostname)) {
|
||||||
|
this.hostMap.set(hostname, []);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check for path pattern in extended properties
|
||||||
|
// (using any to access custom properties not in the interface)
|
||||||
|
const extendedConfig = config as any;
|
||||||
|
if (extendedConfig.pathPattern) {
|
||||||
|
this.pathPatterns.set(config, extendedConfig.pathPattern);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add to the list of configs for this hostname
|
||||||
|
this.hostMap.get(hostname).push(config);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Sort configs for each hostname by specificity
|
||||||
|
// More specific path patterns should be checked first
|
||||||
|
for (const [hostname, configs] of this.hostMap.entries()) {
|
||||||
|
if (configs.length > 1) {
|
||||||
|
// Sort by pathPattern - most specific first
|
||||||
|
// (null comes last, exact paths before patterns with wildcards)
|
||||||
|
configs.sort((a, b) => {
|
||||||
|
const aPattern = this.pathPatterns.get(a);
|
||||||
|
const bPattern = this.pathPatterns.get(b);
|
||||||
|
|
||||||
|
// If one has a path and the other doesn't, the one with a path comes first
|
||||||
|
if (!aPattern && bPattern) return 1;
|
||||||
|
if (aPattern && !bPattern) return -1;
|
||||||
|
if (!aPattern && !bPattern) return 0;
|
||||||
|
|
||||||
|
// Both have path patterns - more specific (longer) first
|
||||||
|
// This is a simple heuristic; we could use a more sophisticated approach
|
||||||
|
return bPattern.length - aPattern.length;
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
this.logger.info(`Router initialized with ${this.reverseProxyConfigs.length} configs (${this.hostMap.size} unique hosts)`);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Routes a request based on hostname and path
|
||||||
|
* @param req The incoming HTTP request
|
||||||
|
* @returns The matching proxy config or undefined if no match found
|
||||||
*/
|
*/
|
||||||
public routeReq(req: plugins.http.IncomingMessage): plugins.tsclass.network.IReverseProxyConfig {
|
public routeReq(req: plugins.http.IncomingMessage): plugins.tsclass.network.IReverseProxyConfig {
|
||||||
|
const result = this.routeReqWithDetails(req);
|
||||||
|
return result ? result.config : undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Routes a request with detailed matching information
|
||||||
|
* @param req The incoming HTTP request
|
||||||
|
* @returns Detailed routing result including matched config and path information
|
||||||
|
*/
|
||||||
|
public routeReqWithDetails(req: plugins.http.IncomingMessage): IRouterResult | undefined {
|
||||||
|
// Extract and validate host header
|
||||||
const originalHost = req.headers.host;
|
const originalHost = req.headers.host;
|
||||||
if (!originalHost) {
|
if (!originalHost) {
|
||||||
console.error('No host header found in request');
|
this.logger.error('No host header found in request');
|
||||||
|
return this.defaultConfig ? { config: this.defaultConfig } : undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse URL for path matching
|
||||||
|
const urlPath = new URL(
|
||||||
|
req.url || '/',
|
||||||
|
`http://${originalHost}`
|
||||||
|
).pathname;
|
||||||
|
|
||||||
|
// Extract hostname without port
|
||||||
|
const hostWithoutPort = originalHost.split(':')[0].toLowerCase();
|
||||||
|
|
||||||
|
// Find configs for this hostname
|
||||||
|
const configs = this.hostMap.get(hostWithoutPort);
|
||||||
|
|
||||||
|
if (configs && configs.length > 0) {
|
||||||
|
// Check each config for path matching
|
||||||
|
for (const config of configs) {
|
||||||
|
// Get the path pattern if any
|
||||||
|
const pathPattern = this.pathPatterns.get(config);
|
||||||
|
|
||||||
|
// If no path pattern specified, this config matches all paths
|
||||||
|
if (!pathPattern) {
|
||||||
|
return { config };
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if path matches the pattern
|
||||||
|
const pathMatch = this.matchPath(urlPath, pathPattern);
|
||||||
|
if (pathMatch) {
|
||||||
|
return {
|
||||||
|
config,
|
||||||
|
pathMatch: pathMatch.matched,
|
||||||
|
pathParams: pathMatch.params,
|
||||||
|
pathRemainder: pathMatch.remainder
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try wildcard subdomains if no direct match found
|
||||||
|
// For example, if request is for sub.example.com, try *.example.com
|
||||||
|
const domainParts = hostWithoutPort.split('.');
|
||||||
|
if (domainParts.length > 2) {
|
||||||
|
const wildcardDomain = `*.${domainParts.slice(1).join('.')}`;
|
||||||
|
const wildcardConfigs = this.hostMap.get(wildcardDomain);
|
||||||
|
|
||||||
|
if (wildcardConfigs && wildcardConfigs.length > 0) {
|
||||||
|
// Use the first matching wildcard config
|
||||||
|
// Could add path matching logic here as well
|
||||||
|
return { config: wildcardConfigs[0] };
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fall back to default config if available
|
||||||
|
if (this.defaultConfig) {
|
||||||
|
this.logger.warn(`No specific config found for host: ${hostWithoutPort}, using default`);
|
||||||
|
return { config: this.defaultConfig };
|
||||||
|
}
|
||||||
|
|
||||||
|
this.logger.error(`No config found for host: ${hostWithoutPort}`);
|
||||||
return undefined;
|
return undefined;
|
||||||
}
|
}
|
||||||
// Strip port from host if present
|
|
||||||
const hostWithoutPort = originalHost.split(':')[0];
|
/**
|
||||||
const correspodingReverseProxyConfig = this.reverseProxyConfigs.find((reverseConfig) => {
|
* Sets a path pattern for an existing config
|
||||||
return reverseConfig.hostName === hostWithoutPort;
|
* @param config The existing configuration
|
||||||
});
|
* @param pathPattern The path pattern to set
|
||||||
if (!correspodingReverseProxyConfig) {
|
* @returns Boolean indicating if the config was found and updated
|
||||||
console.error(`No config found for host: ${hostWithoutPort}`);
|
*/
|
||||||
|
public setPathPattern(
|
||||||
|
config: plugins.tsclass.network.IReverseProxyConfig,
|
||||||
|
pathPattern: string
|
||||||
|
): boolean {
|
||||||
|
const exists = this.reverseProxyConfigs.includes(config);
|
||||||
|
if (exists) {
|
||||||
|
this.pathPatterns.set(config, pathPattern);
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
return correspodingReverseProxyConfig;
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Matches a URL path against a pattern
|
||||||
|
* Supports:
|
||||||
|
* - Exact matches: /users/profile
|
||||||
|
* - Wildcards: /api/* (matches any path starting with /api/)
|
||||||
|
* - Path parameters: /users/:id (captures id as a parameter)
|
||||||
|
*
|
||||||
|
* @param path The URL path to match
|
||||||
|
* @param pattern The pattern to match against
|
||||||
|
* @returns Match result with params and remainder, or null if no match
|
||||||
|
*/
|
||||||
|
private matchPath(path: string, pattern: string): {
|
||||||
|
matched: string;
|
||||||
|
params: Record<string, string>;
|
||||||
|
remainder: string;
|
||||||
|
} | null {
|
||||||
|
// Handle exact match
|
||||||
|
if (path === pattern) {
|
||||||
|
return {
|
||||||
|
matched: pattern,
|
||||||
|
params: {},
|
||||||
|
remainder: ''
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle wildcard match
|
||||||
|
if (pattern.endsWith('/*')) {
|
||||||
|
const prefix = pattern.slice(0, -2);
|
||||||
|
if (path === prefix || path.startsWith(`${prefix}/`)) {
|
||||||
|
return {
|
||||||
|
matched: prefix,
|
||||||
|
params: {},
|
||||||
|
remainder: path.slice(prefix.length)
|
||||||
|
};
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle path parameters
|
||||||
|
const patternParts = pattern.split('/');
|
||||||
|
const pathParts = path.split('/');
|
||||||
|
|
||||||
|
// Check if paths are compatible length
|
||||||
|
if (
|
||||||
|
// If pattern doesn't end with wildcard, paths must have the same number of parts
|
||||||
|
(!pattern.endsWith('/*') && patternParts.length !== pathParts.length) ||
|
||||||
|
// If pattern ends with wildcard, path must have at least as many parts as the pattern
|
||||||
|
(pattern.endsWith('/*') && pathParts.length < patternParts.length - 1)
|
||||||
|
) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
const params: Record<string, string> = {};
|
||||||
|
const matchedParts: string[] = [];
|
||||||
|
|
||||||
|
// Compare path parts
|
||||||
|
for (let i = 0; i < patternParts.length; i++) {
|
||||||
|
const patternPart = patternParts[i];
|
||||||
|
|
||||||
|
// Handle wildcard at the end
|
||||||
|
if (patternPart === '*' && i === patternParts.length - 1) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
// If pathParts[i] doesn't exist, we've reached the end of the path
|
||||||
|
if (i >= pathParts.length) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
const pathPart = pathParts[i];
|
||||||
|
|
||||||
|
// Handle parameter
|
||||||
|
if (patternPart.startsWith(':')) {
|
||||||
|
const paramName = patternPart.slice(1);
|
||||||
|
params[paramName] = pathPart;
|
||||||
|
matchedParts.push(pathPart);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle exact match for this part
|
||||||
|
if (patternPart !== pathPart) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
matchedParts.push(pathPart);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Calculate the remainder
|
||||||
|
let remainder = '';
|
||||||
|
if (pattern.endsWith('/*')) {
|
||||||
|
remainder = '/' + pathParts.slice(patternParts.length - 1).join('/');
|
||||||
|
}
|
||||||
|
|
||||||
|
return {
|
||||||
|
matched: matchedParts.join('/'),
|
||||||
|
params,
|
||||||
|
remainder
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets all currently active proxy configurations
|
||||||
|
* @returns Array of all active configurations
|
||||||
|
*/
|
||||||
|
public getProxyConfigs(): plugins.tsclass.network.IReverseProxyConfig[] {
|
||||||
|
return [...this.reverseProxyConfigs];
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets all hostnames that this router is configured to handle
|
||||||
|
* @returns Array of hostnames
|
||||||
|
*/
|
||||||
|
public getHostnames(): string[] {
|
||||||
|
return Array.from(this.hostMap.keys());
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds a single new proxy configuration
|
||||||
|
* @param config The configuration to add
|
||||||
|
* @param pathPattern Optional path pattern for route matching
|
||||||
|
*/
|
||||||
|
public addProxyConfig(
|
||||||
|
config: plugins.tsclass.network.IReverseProxyConfig,
|
||||||
|
pathPattern?: string
|
||||||
|
): void {
|
||||||
|
this.reverseProxyConfigs.push(config);
|
||||||
|
|
||||||
|
// Store path pattern if provided
|
||||||
|
if (pathPattern) {
|
||||||
|
this.pathPatterns.set(config, pathPattern);
|
||||||
|
}
|
||||||
|
|
||||||
|
this.setNewProxyConfigs(this.reverseProxyConfigs);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Removes a proxy configuration by hostname
|
||||||
|
* @param hostname The hostname to remove
|
||||||
|
* @returns Boolean indicating whether any configs were removed
|
||||||
|
*/
|
||||||
|
public removeProxyConfig(hostname: string): boolean {
|
||||||
|
const initialCount = this.reverseProxyConfigs.length;
|
||||||
|
this.reverseProxyConfigs = this.reverseProxyConfigs.filter(
|
||||||
|
config => config.hostName !== hostname
|
||||||
|
);
|
||||||
|
|
||||||
|
if (initialCount !== this.reverseProxyConfigs.length) {
|
||||||
|
this.setNewProxyConfigs(this.reverseProxyConfigs);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,11 +1,13 @@
|
|||||||
// node native scope
|
// node native scope
|
||||||
|
import { EventEmitter } from 'events';
|
||||||
import * as http from 'http';
|
import * as http from 'http';
|
||||||
import * as https from 'https';
|
import * as https from 'https';
|
||||||
import * as net from 'net';
|
import * as net from 'net';
|
||||||
import * as tls from 'tls';
|
import * as tls from 'tls';
|
||||||
import * as url from 'url';
|
import * as url from 'url';
|
||||||
|
|
||||||
export { http, https, net, tls, url };
|
|
||||||
|
export { EventEmitter, http, https, net, tls, url };
|
||||||
|
|
||||||
// tsclass scope
|
// tsclass scope
|
||||||
import * as tsclass from '@tsclass/tsclass';
|
import * as tsclass from '@tsclass/tsclass';
|
||||||
@ -22,9 +24,10 @@ import * as smartstring from '@push.rocks/smartstring';
|
|||||||
export { lik, smartdelay, smartrequest, smartpromise, smartstring };
|
export { lik, smartdelay, smartrequest, smartpromise, smartstring };
|
||||||
|
|
||||||
// third party scope
|
// third party scope
|
||||||
|
import * as acme from 'acme-client';
|
||||||
import prettyMs from 'pretty-ms';
|
import prettyMs from 'pretty-ms';
|
||||||
import * as ws from 'ws';
|
import * as ws from 'ws';
|
||||||
import wsDefault from 'ws';
|
import wsDefault from 'ws';
|
||||||
import { minimatch } from 'minimatch';
|
import { minimatch } from 'minimatch';
|
||||||
|
|
||||||
export { prettyMs, ws, wsDefault, minimatch };
|
export { acme, prettyMs, ws, wsDefault, minimatch };
|
||||||
|
Reference in New Issue
Block a user