ConceptsΒΆ
Understanding why ProxyWhirl works the way it does. These pages explain the design philosophy and architectural decisions behind the library.
Not API docs
These pages explain concepts and rationale. For class/method reference, see Reference. For step-by-step guides, see Guides.
Why 9 strategies? How they compose. The Protocol + Registry design that makes strategies pluggable.
The three-tier L1/L2/L3 cache hierarchy β why each tier exists, how promotion/demotion works, and credential encryption.
How ProxyWhirl detects, isolates, and recovers from proxy failures using the circuit breaker state machine.
The complete journey of a proxy: fetch, validate, enrich, rotate, monitor, eject. Each stage and its responsibilities.
Credential handling, Fernet encryption, URL redaction, SSRF protection, and the defense-in-depth approach.