@certd/plugin-cert 1.21.1 → 1.22.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +13 -0
- package/dist/access/eab-access.d.ts +4 -0
- package/dist/access/eab-access.js +46 -0
- package/dist/access/index.d.ts +1 -0
- package/dist/access/index.js +2 -0
- package/dist/bundle.js +1 -1
- package/dist/d/plugin/cert-plugin/acme.d.ts +2 -0
- package/dist/d/plugin/cert-plugin/index.d.ts +1 -0
- package/dist/dns-provider/api.d.ts +27 -0
- package/dist/dns-provider/api.js +2 -0
- package/dist/dns-provider/base.d.ts +8 -0
- package/dist/dns-provider/base.js +7 -0
- package/dist/dns-provider/decorator.d.ts +3 -0
- package/dist/dns-provider/decorator.js +26 -0
- package/dist/dns-provider/index.d.ts +4 -0
- package/dist/dns-provider/index.js +5 -0
- package/dist/dns-provider/registry.d.ts +2 -0
- package/dist/dns-provider/registry.js +3 -0
- package/dist/index.d.ts +3 -0
- package/dist/index.js +4 -0
- package/dist/plugin/cert-plugin/acme.d.ts +54 -0
- package/dist/plugin/cert-plugin/acme.js +203 -0
- package/dist/plugin/cert-plugin/base.d.ts +49 -0
- package/dist/plugin/cert-plugin/base.js +256 -0
- package/dist/plugin/cert-plugin/cert-reader.d.ts +16 -0
- package/dist/plugin/cert-plugin/cert-reader.js +45 -0
- package/dist/plugin/cert-plugin/index.d.ts +16 -0
- package/dist/plugin/cert-plugin/index.js +169 -0
- package/dist/plugin/cert-plugin/lego.d.ts +16 -0
- package/dist/plugin/cert-plugin/lego.js +145 -0
- package/dist/plugin/index.d.ts +2 -0
- package/dist/plugin/index.js +3 -0
- package/fix-esm-import-paths.js +96 -0
- package/package.json +10 -10
- package/rollup.config.js +1 -1
- package/tsconfig.json +33 -10
- package/vite.config.ts +1 -1
- package/LICENSE +0 -661
|
@@ -13,12 +13,14 @@ export declare class AcmeService {
|
|
|
13
13
|
userContext: IContext;
|
|
14
14
|
logger: Logger;
|
|
15
15
|
sslProvider: SSLProvider;
|
|
16
|
+
skipLocalVerify: boolean;
|
|
16
17
|
eab?: ClientExternalAccountBindingOptions;
|
|
17
18
|
constructor(options: {
|
|
18
19
|
userContext: IContext;
|
|
19
20
|
logger: Logger;
|
|
20
21
|
sslProvider: SSLProvider;
|
|
21
22
|
eab?: ClientExternalAccountBindingOptions;
|
|
23
|
+
skipLocalVerify?: boolean;
|
|
22
24
|
});
|
|
23
25
|
getAccountConfig(email: string): Promise<any>;
|
|
24
26
|
buildAccountKey(email: string): string;
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { HttpClient, IAccess, ILogger, Registrable } from "@certd/pipeline";
|
|
2
|
+
export type DnsProviderDefine = Registrable & {
|
|
3
|
+
accessType: string;
|
|
4
|
+
autowire?: {
|
|
5
|
+
[key: string]: any;
|
|
6
|
+
};
|
|
7
|
+
};
|
|
8
|
+
export type CreateRecordOptions = {
|
|
9
|
+
fullRecord: string;
|
|
10
|
+
type: string;
|
|
11
|
+
value: any;
|
|
12
|
+
domain: string;
|
|
13
|
+
};
|
|
14
|
+
export type RemoveRecordOptions<T> = CreateRecordOptions & {
|
|
15
|
+
record: T;
|
|
16
|
+
};
|
|
17
|
+
export type DnsProviderContext = {
|
|
18
|
+
access: IAccess;
|
|
19
|
+
logger: ILogger;
|
|
20
|
+
http: HttpClient;
|
|
21
|
+
};
|
|
22
|
+
export interface IDnsProvider<T = any> {
|
|
23
|
+
onInstance(): Promise<void>;
|
|
24
|
+
createRecord(options: CreateRecordOptions): Promise<T>;
|
|
25
|
+
removeRecord(options: RemoveRecordOptions<T>): Promise<void>;
|
|
26
|
+
setCtx(ctx: DnsProviderContext): void;
|
|
27
|
+
}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { CreateRecordOptions, DnsProviderContext, IDnsProvider, RemoveRecordOptions } from "./api.js";
|
|
2
|
+
export declare abstract class AbstractDnsProvider<T = any> implements IDnsProvider<T> {
|
|
3
|
+
ctx: DnsProviderContext;
|
|
4
|
+
setCtx(ctx: DnsProviderContext): void;
|
|
5
|
+
abstract createRecord(options: CreateRecordOptions): Promise<T>;
|
|
6
|
+
abstract onInstance(): Promise<void>;
|
|
7
|
+
abstract removeRecord(options: RemoveRecordOptions<T>): Promise<void>;
|
|
8
|
+
}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
export class AbstractDnsProvider {
|
|
2
|
+
ctx;
|
|
3
|
+
setCtx(ctx) {
|
|
4
|
+
this.ctx = ctx;
|
|
5
|
+
}
|
|
6
|
+
}
|
|
7
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYmFzZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9kbnMtcHJvdmlkZXIvYmFzZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFFQSxNQUFNLE9BQWdCLG1CQUFtQjtJQUN2QyxHQUFHLENBQXNCO0lBRXpCLE1BQU0sQ0FBQyxHQUF1QjtRQUM1QixJQUFJLENBQUMsR0FBRyxHQUFHLEdBQUcsQ0FBQztJQUNqQixDQUFDO0NBT0YifQ==
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
import { dnsProviderRegistry } from "./registry.js";
|
|
2
|
+
import { Decorator, AUTOWIRE_KEY } from "@certd/pipeline";
|
|
3
|
+
import _ from "lodash-es";
|
|
4
|
+
// 提供一个唯一 key
|
|
5
|
+
export const DNS_PROVIDER_CLASS_KEY = "pipeline:dns-provider";
|
|
6
|
+
export function IsDnsProvider(define) {
|
|
7
|
+
return (target) => {
|
|
8
|
+
target = Decorator.target(target);
|
|
9
|
+
const autowires = {};
|
|
10
|
+
const properties = Decorator.getClassProperties(target);
|
|
11
|
+
for (const property in properties) {
|
|
12
|
+
const autowire = Reflect.getMetadata(AUTOWIRE_KEY, target, property);
|
|
13
|
+
if (autowire) {
|
|
14
|
+
autowires[property] = autowire;
|
|
15
|
+
}
|
|
16
|
+
}
|
|
17
|
+
_.merge(define, { autowire: autowires });
|
|
18
|
+
Reflect.defineMetadata(DNS_PROVIDER_CLASS_KEY, define, target);
|
|
19
|
+
target.define = define;
|
|
20
|
+
dnsProviderRegistry.register(define.name, {
|
|
21
|
+
define,
|
|
22
|
+
target,
|
|
23
|
+
});
|
|
24
|
+
};
|
|
25
|
+
}
|
|
26
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZGVjb3JhdG9yLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL2Rucy1wcm92aWRlci9kZWNvcmF0b3IudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFFLG1CQUFtQixFQUFFLE1BQU0sZUFBZSxDQUFDO0FBRXBELE9BQU8sRUFBRSxTQUFTLEVBQUUsWUFBWSxFQUFFLE1BQU0saUJBQWlCLENBQUM7QUFDMUQsT0FBTyxDQUFDLE1BQU0sV0FBVyxDQUFDO0FBRTFCLGFBQWE7QUFDYixNQUFNLENBQUMsTUFBTSxzQkFBc0IsR0FBRyx1QkFBdUIsQ0FBQztBQUU5RCxNQUFNLFVBQVUsYUFBYSxDQUFDLE1BQXlCO0lBQ3JELE9BQU8sQ0FBQyxNQUFXLEVBQUUsRUFBRTtRQUNyQixNQUFNLEdBQUcsU0FBUyxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUMsQ0FBQztRQUNsQyxNQUFNLFNBQVMsR0FBUSxFQUFFLENBQUM7UUFDMUIsTUFBTSxVQUFVLEdBQUcsU0FBUyxDQUFDLGtCQUFrQixDQUFDLE1BQU0sQ0FBQyxDQUFDO1FBQ3hELEtBQUssTUFBTSxRQUFRLElBQUksVUFBVSxFQUFFO1lBQ2pDLE1BQU0sUUFBUSxHQUFHLE9BQU8sQ0FBQyxXQUFXLENBQUMsWUFBWSxFQUFFLE1BQU0sRUFBRSxRQUFRLENBQUMsQ0FBQztZQUNyRSxJQUFJLFFBQVEsRUFBRTtnQkFDWixTQUFTLENBQUMsUUFBUSxDQUFDLEdBQUcsUUFBUSxDQUFDO2FBQ2hDO1NBQ0Y7UUFDRCxDQUFDLENBQUMsS0FBSyxDQUFDLE1BQU0sRUFBRSxFQUFFLFFBQVEsRUFBRSxTQUFTLEVBQUUsQ0FBQyxDQUFDO1FBRXpDLE9BQU8sQ0FBQyxjQUFjLENBQUMsc0JBQXNCLEVBQUUsTUFBTSxFQUFFLE1BQU0sQ0FBQyxDQUFDO1FBRS9ELE1BQU0sQ0FBQyxNQUFNLEdBQUcsTUFBTSxDQUFDO1FBQ3ZCLG1CQUFtQixDQUFDLFFBQVEsQ0FBQyxNQUFNLENBQUMsSUFBSSxFQUFFO1lBQ3hDLE1BQU07WUFDTixNQUFNO1NBQ1AsQ0FBQyxDQUFDO0lBQ0wsQ0FBQyxDQUFDO0FBQ0osQ0FBQyJ9
|
|
@@ -0,0 +1,5 @@
|
|
|
1
|
+
export * from "./api.js";
|
|
2
|
+
export * from "./registry.js";
|
|
3
|
+
export * from "./decorator.js";
|
|
4
|
+
export * from "./base.js";
|
|
5
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvZG5zLXByb3ZpZGVyL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLGNBQWMsVUFBVSxDQUFDO0FBQ3pCLGNBQWMsZUFBZSxDQUFDO0FBQzlCLGNBQWMsZ0JBQWdCLENBQUM7QUFDL0IsY0FBYyxXQUFXLENBQUMifQ==
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
import { Registry } from "@certd/pipeline";
|
|
2
|
+
export const dnsProviderRegistry = new Registry("dnsProvider");
|
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicmVnaXN0cnkuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvZG5zLXByb3ZpZGVyL3JlZ2lzdHJ5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sRUFBRSxRQUFRLEVBQUUsTUFBTSxpQkFBaUIsQ0FBQztBQUUzQyxNQUFNLENBQUMsTUFBTSxtQkFBbUIsR0FBRyxJQUFJLFFBQVEsQ0FBQyxhQUFhLENBQUMsQ0FBQyJ9
|
package/dist/index.d.ts
ADDED
package/dist/index.js
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
1
|
+
export * from "./plugin/index.js";
|
|
2
|
+
export * from "./dns-provider/index.js";
|
|
3
|
+
export * from "./access/index.js";
|
|
4
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsY0FBYyxtQkFBbUIsQ0FBQztBQUNsQyxjQUFjLHlCQUF5QixDQUFDO0FBQ3hDLGNBQWMsbUJBQW1CLENBQUMifQ==
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
import * as acme from "@certd/acme-client";
|
|
2
|
+
import { Logger } from "log4js";
|
|
3
|
+
import { IContext } from "@certd/pipeline";
|
|
4
|
+
import { IDnsProvider } from "../../dns-provider/index.js";
|
|
5
|
+
import { ClientExternalAccountBindingOptions } from "@certd/acme-client";
|
|
6
|
+
export type CertInfo = {
|
|
7
|
+
crt: string;
|
|
8
|
+
key: string;
|
|
9
|
+
csr: string;
|
|
10
|
+
};
|
|
11
|
+
export type SSLProvider = "letsencrypt" | "buypass" | "zerossl";
|
|
12
|
+
export declare class AcmeService {
|
|
13
|
+
userContext: IContext;
|
|
14
|
+
logger: Logger;
|
|
15
|
+
sslProvider: SSLProvider;
|
|
16
|
+
skipLocalVerify: boolean;
|
|
17
|
+
eab?: ClientExternalAccountBindingOptions;
|
|
18
|
+
constructor(options: {
|
|
19
|
+
userContext: IContext;
|
|
20
|
+
logger: Logger;
|
|
21
|
+
sslProvider: SSLProvider;
|
|
22
|
+
eab?: ClientExternalAccountBindingOptions;
|
|
23
|
+
skipLocalVerify?: boolean;
|
|
24
|
+
});
|
|
25
|
+
getAccountConfig(email: string): Promise<any>;
|
|
26
|
+
buildAccountKey(email: string): string;
|
|
27
|
+
saveAccountConfig(email: string, conf: any): Promise<void>;
|
|
28
|
+
getAcmeClient(email: string, isTest?: boolean): Promise<acme.Client>;
|
|
29
|
+
createNewKey(): Promise<string>;
|
|
30
|
+
parseDomain(fullDomain: string): string;
|
|
31
|
+
challengeCreateFn(authz: any, challenge: any, keyAuthorization: string, dnsProvider: IDnsProvider): Promise<any>;
|
|
32
|
+
/**
|
|
33
|
+
* Function used to remove an ACME challenge response
|
|
34
|
+
*
|
|
35
|
+
* @param {object} authz Authorization object
|
|
36
|
+
* @param {object} challenge Selected challenge
|
|
37
|
+
* @param {string} keyAuthorization Authorization key
|
|
38
|
+
* @param recordItem challengeCreateFn create record item
|
|
39
|
+
* @param dnsProvider dnsProvider
|
|
40
|
+
* @returns {Promise}
|
|
41
|
+
*/
|
|
42
|
+
challengeRemoveFn(authz: any, challenge: any, keyAuthorization: string, recordItem: any, dnsProvider: IDnsProvider): Promise<void>;
|
|
43
|
+
order(options: {
|
|
44
|
+
email: string;
|
|
45
|
+
domains: string | string[];
|
|
46
|
+
dnsProvider: any;
|
|
47
|
+
csrInfo: any;
|
|
48
|
+
isTest?: boolean;
|
|
49
|
+
}): Promise<CertInfo>;
|
|
50
|
+
buildCommonNameByDomains(domains: string | string[]): {
|
|
51
|
+
commonName: string;
|
|
52
|
+
altNames: string[] | undefined;
|
|
53
|
+
};
|
|
54
|
+
}
|
|
@@ -0,0 +1,203 @@
|
|
|
1
|
+
// @ts-ignore
|
|
2
|
+
import * as acme from "@certd/acme-client";
|
|
3
|
+
import _ from "lodash-es";
|
|
4
|
+
import psl from "psl";
|
|
5
|
+
export class AcmeService {
|
|
6
|
+
userContext;
|
|
7
|
+
logger;
|
|
8
|
+
sslProvider;
|
|
9
|
+
skipLocalVerify = true;
|
|
10
|
+
eab;
|
|
11
|
+
constructor(options) {
|
|
12
|
+
this.userContext = options.userContext;
|
|
13
|
+
this.logger = options.logger;
|
|
14
|
+
this.sslProvider = options.sslProvider || "letsencrypt";
|
|
15
|
+
this.eab = options.eab;
|
|
16
|
+
this.skipLocalVerify = options.skipLocalVerify ?? false;
|
|
17
|
+
acme.setLogger((text) => {
|
|
18
|
+
this.logger.info(text);
|
|
19
|
+
});
|
|
20
|
+
}
|
|
21
|
+
async getAccountConfig(email) {
|
|
22
|
+
return (await this.userContext.getObj(this.buildAccountKey(email))) || {};
|
|
23
|
+
}
|
|
24
|
+
buildAccountKey(email) {
|
|
25
|
+
return `acme.config.${this.sslProvider}.${email}`;
|
|
26
|
+
}
|
|
27
|
+
async saveAccountConfig(email, conf) {
|
|
28
|
+
await this.userContext.setObj(this.buildAccountKey(email), conf);
|
|
29
|
+
}
|
|
30
|
+
async getAcmeClient(email, isTest = false) {
|
|
31
|
+
const conf = await this.getAccountConfig(email);
|
|
32
|
+
if (conf.key == null) {
|
|
33
|
+
conf.key = await this.createNewKey();
|
|
34
|
+
await this.saveAccountConfig(email, conf);
|
|
35
|
+
}
|
|
36
|
+
let directoryUrl = "";
|
|
37
|
+
if (isTest) {
|
|
38
|
+
directoryUrl = acme.directory[this.sslProvider].staging;
|
|
39
|
+
}
|
|
40
|
+
else {
|
|
41
|
+
directoryUrl = acme.directory[this.sslProvider].production;
|
|
42
|
+
}
|
|
43
|
+
const client = new acme.Client({
|
|
44
|
+
directoryUrl: directoryUrl,
|
|
45
|
+
accountKey: conf.key,
|
|
46
|
+
accountUrl: conf.accountUrl,
|
|
47
|
+
externalAccountBinding: this.eab,
|
|
48
|
+
backoffAttempts: 30,
|
|
49
|
+
backoffMin: 5000,
|
|
50
|
+
backoffMax: 10000,
|
|
51
|
+
});
|
|
52
|
+
if (conf.accountUrl == null) {
|
|
53
|
+
const accountPayload = {
|
|
54
|
+
termsOfServiceAgreed: true,
|
|
55
|
+
contact: [`mailto:${email}`],
|
|
56
|
+
externalAccountBinding: this.eab,
|
|
57
|
+
};
|
|
58
|
+
await client.createAccount(accountPayload);
|
|
59
|
+
conf.accountUrl = client.getAccountUrl();
|
|
60
|
+
await this.saveAccountConfig(email, conf);
|
|
61
|
+
}
|
|
62
|
+
return client;
|
|
63
|
+
}
|
|
64
|
+
async createNewKey() {
|
|
65
|
+
const key = await acme.forge.createPrivateKey();
|
|
66
|
+
return key.toString();
|
|
67
|
+
}
|
|
68
|
+
parseDomain(fullDomain) {
|
|
69
|
+
const parsed = psl.parse(fullDomain);
|
|
70
|
+
if (parsed.error) {
|
|
71
|
+
throw new Error(`解析${fullDomain}域名失败:` + JSON.stringify(parsed.error));
|
|
72
|
+
}
|
|
73
|
+
return parsed.domain;
|
|
74
|
+
}
|
|
75
|
+
async challengeCreateFn(authz, challenge, keyAuthorization, dnsProvider) {
|
|
76
|
+
this.logger.info("Triggered challengeCreateFn()");
|
|
77
|
+
/* http-01 */
|
|
78
|
+
const fullDomain = authz.identifier.value;
|
|
79
|
+
if (challenge.type === "http-01") {
|
|
80
|
+
const filePath = `/var/www/html/.well-known/acme-challenge/${challenge.token}`;
|
|
81
|
+
const fileContents = keyAuthorization;
|
|
82
|
+
this.logger.info(`Creating challenge response for ${fullDomain} at path: ${filePath}`);
|
|
83
|
+
/* Replace this */
|
|
84
|
+
this.logger.info(`Would write "${fileContents}" to path "${filePath}"`);
|
|
85
|
+
// await fs.writeFileAsync(filePath, fileContents);
|
|
86
|
+
}
|
|
87
|
+
else if (challenge.type === "dns-01") {
|
|
88
|
+
/* dns-01 */
|
|
89
|
+
const dnsRecord = `_acme-challenge.${fullDomain}`;
|
|
90
|
+
const recordValue = keyAuthorization;
|
|
91
|
+
this.logger.info(`Creating TXT record for ${fullDomain}: ${dnsRecord}`);
|
|
92
|
+
/* Replace this */
|
|
93
|
+
this.logger.info(`Would create TXT record "${dnsRecord}" with value "${recordValue}"`);
|
|
94
|
+
const domain = this.parseDomain(fullDomain);
|
|
95
|
+
this.logger.info("解析到域名domain=", domain);
|
|
96
|
+
return await dnsProvider.createRecord({
|
|
97
|
+
fullRecord: dnsRecord,
|
|
98
|
+
type: "TXT",
|
|
99
|
+
value: recordValue,
|
|
100
|
+
domain,
|
|
101
|
+
});
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
/**
|
|
105
|
+
* Function used to remove an ACME challenge response
|
|
106
|
+
*
|
|
107
|
+
* @param {object} authz Authorization object
|
|
108
|
+
* @param {object} challenge Selected challenge
|
|
109
|
+
* @param {string} keyAuthorization Authorization key
|
|
110
|
+
* @param recordItem challengeCreateFn create record item
|
|
111
|
+
* @param dnsProvider dnsProvider
|
|
112
|
+
* @returns {Promise}
|
|
113
|
+
*/
|
|
114
|
+
async challengeRemoveFn(authz, challenge, keyAuthorization, recordItem, dnsProvider) {
|
|
115
|
+
this.logger.info("Triggered challengeRemoveFn()");
|
|
116
|
+
/* http-01 */
|
|
117
|
+
const fullDomain = authz.identifier.value;
|
|
118
|
+
if (challenge.type === "http-01") {
|
|
119
|
+
const filePath = `/var/www/html/.well-known/acme-challenge/${challenge.token}`;
|
|
120
|
+
this.logger.info(`Removing challenge response for ${fullDomain} at path: ${filePath}`);
|
|
121
|
+
/* Replace this */
|
|
122
|
+
this.logger.info(`Would remove file on path "${filePath}"`);
|
|
123
|
+
// await fs.unlinkAsync(filePath);
|
|
124
|
+
}
|
|
125
|
+
else if (challenge.type === "dns-01") {
|
|
126
|
+
const dnsRecord = `_acme-challenge.${fullDomain}`;
|
|
127
|
+
const recordValue = keyAuthorization;
|
|
128
|
+
this.logger.info(`Removing TXT record for ${fullDomain}: ${dnsRecord}`);
|
|
129
|
+
/* Replace this */
|
|
130
|
+
this.logger.info(`Would remove TXT record "${dnsRecord}" with value "${recordValue}"`);
|
|
131
|
+
const domain = this.parseDomain(fullDomain);
|
|
132
|
+
try {
|
|
133
|
+
await dnsProvider.removeRecord({
|
|
134
|
+
fullRecord: dnsRecord,
|
|
135
|
+
type: "TXT",
|
|
136
|
+
value: keyAuthorization,
|
|
137
|
+
record: recordItem,
|
|
138
|
+
domain,
|
|
139
|
+
});
|
|
140
|
+
}
|
|
141
|
+
catch (e) {
|
|
142
|
+
this.logger.error("删除解析记录出错:", e);
|
|
143
|
+
throw e;
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
}
|
|
147
|
+
async order(options) {
|
|
148
|
+
const { email, isTest, domains, csrInfo, dnsProvider } = options;
|
|
149
|
+
const client = await this.getAcmeClient(email, isTest);
|
|
150
|
+
/* Create CSR */
|
|
151
|
+
const { commonName, altNames } = this.buildCommonNameByDomains(domains);
|
|
152
|
+
const [key, csr] = await acme.forge.createCsr({
|
|
153
|
+
commonName,
|
|
154
|
+
...csrInfo,
|
|
155
|
+
altNames,
|
|
156
|
+
});
|
|
157
|
+
if (dnsProvider == null) {
|
|
158
|
+
throw new Error("dnsProvider 不能为空");
|
|
159
|
+
}
|
|
160
|
+
/* 自动申请证书 */
|
|
161
|
+
const crt = await client.auto({
|
|
162
|
+
csr,
|
|
163
|
+
email: email,
|
|
164
|
+
termsOfServiceAgreed: true,
|
|
165
|
+
skipChallengeVerification: this.skipLocalVerify,
|
|
166
|
+
challengePriority: ["dns-01"],
|
|
167
|
+
challengeCreateFn: async (authz, challenge, keyAuthorization) => {
|
|
168
|
+
return await this.challengeCreateFn(authz, challenge, keyAuthorization, dnsProvider);
|
|
169
|
+
},
|
|
170
|
+
challengeRemoveFn: async (authz, challenge, keyAuthorization, recordItem) => {
|
|
171
|
+
return await this.challengeRemoveFn(authz, challenge, keyAuthorization, recordItem, dnsProvider);
|
|
172
|
+
},
|
|
173
|
+
});
|
|
174
|
+
const cert = {
|
|
175
|
+
crt: crt.toString(),
|
|
176
|
+
key: key.toString(),
|
|
177
|
+
csr: csr.toString(),
|
|
178
|
+
};
|
|
179
|
+
/* Done */
|
|
180
|
+
this.logger.debug(`CSR:\n${cert.csr}`);
|
|
181
|
+
this.logger.debug(`Certificate:\n${cert.crt}`);
|
|
182
|
+
this.logger.info("证书申请成功");
|
|
183
|
+
return cert;
|
|
184
|
+
}
|
|
185
|
+
buildCommonNameByDomains(domains) {
|
|
186
|
+
if (typeof domains === "string") {
|
|
187
|
+
domains = domains.split(",");
|
|
188
|
+
}
|
|
189
|
+
if (domains.length === 0) {
|
|
190
|
+
throw new Error("domain can not be empty");
|
|
191
|
+
}
|
|
192
|
+
const commonName = domains[0];
|
|
193
|
+
let altNames = undefined;
|
|
194
|
+
if (domains.length > 1) {
|
|
195
|
+
altNames = _.slice(domains, 1);
|
|
196
|
+
}
|
|
197
|
+
return {
|
|
198
|
+
commonName,
|
|
199
|
+
altNames,
|
|
200
|
+
};
|
|
201
|
+
}
|
|
202
|
+
}
|
|
203
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"acme.js","sourceRoot":"","sources":["../../../src/plugin/cert-plugin/acme.ts"],"names":[],"mappings":"AAAA,aAAa;AACb,OAAO,KAAK,IAAI,MAAM,oBAAoB,CAAC;AAC3C,OAAO,CAAC,MAAM,WAAW,CAAC;AAK1B,OAAO,GAAG,MAAM,KAAK,CAAC;AAStB,MAAM,OAAO,WAAW;IACtB,WAAW,CAAW;IACtB,MAAM,CAAS;IACf,WAAW,CAAc;IACzB,eAAe,GAAG,IAAI,CAAC;IACvB,GAAG,CAAuC;IAC1C,YAAY,OAMX;QACC,IAAI,CAAC,WAAW,GAAG,OAAO,CAAC,WAAW,CAAC;QACvC,IAAI,CAAC,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;QAC7B,IAAI,CAAC,WAAW,GAAG,OAAO,CAAC,WAAW,IAAI,aAAa,CAAC;QACxD,IAAI,CAAC,GAAG,GAAG,OAAO,CAAC,GAAG,CAAC;QACvB,IAAI,CAAC,eAAe,GAAG,OAAO,CAAC,eAAe,IAAI,KAAK,CAAC;QACxD,IAAI,CAAC,SAAS,CAAC,CAAC,IAAY,EAAE,EAAE;YAC9B,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACzB,CAAC,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,gBAAgB,CAAC,KAAa;QAClC,OAAO,CAAC,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC;IAC5E,CAAC;IAED,eAAe,CAAC,KAAa;QAC3B,OAAO,eAAe,IAAI,CAAC,WAAW,IAAI,KAAK,EAAE,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,iBAAiB,CAAC,KAAa,EAAE,IAAS;QAC9C,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,KAAa,EAAE,MAAM,GAAG,KAAK;QAC/C,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QAChD,IAAI,IAAI,CAAC,GAAG,IAAI,IAAI,EAAE;YACpB,IAAI,CAAC,GAAG,GAAG,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC;YACrC,MAAM,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;SAC3C;QACD,IAAI,YAAY,GAAG,EAAE,CAAC;QACtB,IAAI,MAAM,EAAE;YACV,YAAY,GAAG,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC;SACzD;aAAM;YACL,YAAY,GAAG,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,UAAU,CAAC;SAC5D;QACD,MAAM,MAAM,GAAG,IAAI,IAAI,CAAC,MAAM,CAAC;YAC7B,YAAY,EAAE,YAAY;YAC1B,UAAU,EAAE,IAAI,CAAC,GAAG;YACpB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,sBAAsB,EAAE,IAAI,CAAC,GAAG;YAChC,eAAe,EAAE,EAAE;YACnB,UAAU,EAAE,IAAI;YAChB,UAAU,EAAE,KAAK;SAClB,CAAC,CAAC;QAEH,IAAI,IAAI,CAAC,UAAU,IAAI,IAAI,EAAE;YAC3B,MAAM,cAAc,GAAG;gBACrB,oBAAoB,EAAE,IAAI;gBAC1B,OAAO,EAAE,CAAC,UAAU,KAAK,EAAE,CAAC;gBAC5B,sBAAsB,EAAE,IAAI,CAAC,GAAG;aACjC,CAAC;YACF,MAAM,MAAM,CAAC,aAAa,CAAC,cAAc,CAAC,CAAC;YAC3C,IAAI,CAAC,UAAU,GAAG,MAAM,CAAC,aAAa,EAAE,CAAC;YACzC,MAAM,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;SAC3C;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,KAAK,CAAC,YAAY;QAChB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC;QAChD,OAAO,GAAG,CAAC,QAAQ,EAAE,CAAC;IACxB,CAAC;IAED,WAAW,CAAC,UAAkB;QAC5B,MAAM,MAAM,GAAG,GAAG,CAAC,KAAK,CAAC,UAAU,CAAqB,CAAC;QACzD,IAAI,MAAM,CAAC,KAAK,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,KAAK,UAAU,OAAO,GAAG,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC;SACxE;QACD,OAAO,MAAM,CAAC,MAAgB,CAAC;IACjC,CAAC;IACD,KAAK,CAAC,iBAAiB,CAAC,KAAU,EAAE,SAAc,EAAE,gBAAwB,EAAE,WAAyB;QACrG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,+BAA+B,CAAC,CAAC;QAElD,aAAa;QACb,MAAM,UAAU,GAAG,KAAK,CAAC,UAAU,CAAC,KAAK,CAAC;QAC1C,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,EAAE;YAChC,MAAM,QAAQ,GAAG,4CAA4C,SAAS,CAAC,KAAK,EAAE,CAAC;YAC/E,MAAM,YAAY,GAAG,gBAAgB,CAAC;YAEtC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,mCAAmC,UAAU,aAAa,QAAQ,EAAE,CAAC,CAAC;YAEvF,kBAAkB;YAClB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,gBAAgB,YAAY,cAAc,QAAQ,GAAG,CAAC,CAAC;YACxE,mDAAmD;SACpD;aAAM,IAAI,SAAS,CAAC,IAAI,KAAK,QAAQ,EAAE;YACtC,YAAY;YACZ,MAAM,SAAS,GAAG,mBAAmB,UAAU,EAAE,CAAC;YAClD,MAAM,WAAW,GAAG,gBAAgB,CAAC;YAErC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,2BAA2B,UAAU,KAAK,SAAS,EAAE,CAAC,CAAC;YACxE,kBAAkB;YAClB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,4BAA4B,SAAS,iBAAiB,WAAW,GAAG,CAAC,CAAC;YAEvF,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,CAAC;YAC5C,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,EAAE,MAAM,CAAC,CAAC;YACzC,OAAO,MAAM,WAAW,CAAC,YAAY,CAAC;gBACpC,UAAU,EAAE,SAAS;gBACrB,IAAI,EAAE,KAAK;gBACX,KAAK,EAAE,WAAW;gBAClB,MAAM;aACP,CAAC,CAAC;SACJ;IACH,CAAC;IAED;;;;;;;;;OASG;IAEH,KAAK,CAAC,iBAAiB,CAAC,KAAU,EAAE,SAAc,EAAE,gBAAwB,EAAE,UAAe,EAAE,WAAyB;QACtH,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,+BAA+B,CAAC,CAAC;QAElD,aAAa;QACb,MAAM,UAAU,GAAG,KAAK,CAAC,UAAU,CAAC,KAAK,CAAC;QAC1C,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,EAAE;YAChC,MAAM,QAAQ,GAAG,4CAA4C,SAAS,CAAC,KAAK,EAAE,CAAC;YAE/E,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,mCAAmC,UAAU,aAAa,QAAQ,EAAE,CAAC,CAAC;YAEvF,kBAAkB;YAClB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,QAAQ,GAAG,CAAC,CAAC;YAC5D,kCAAkC;SACnC;aAAM,IAAI,SAAS,CAAC,IAAI,KAAK,QAAQ,EAAE;YACtC,MAAM,SAAS,GAAG,mBAAmB,UAAU,EAAE,CAAC;YAClD,MAAM,WAAW,GAAG,gBAAgB,CAAC;YAErC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,2BAA2B,UAAU,KAAK,SAAS,EAAE,CAAC,CAAC;YAExE,kBAAkB;YAClB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,4BAA4B,SAAS,iBAAiB,WAAW,GAAG,CAAC,CAAC;YAEvF,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,UAAU,CAAC,CAAC;YAE5C,IAAI;gBACF,MAAM,WAAW,CAAC,YAAY,CAAC;oBAC7B,UAAU,EAAE,SAAS;oBACrB,IAAI,EAAE,KAAK;oBACX,KAAK,EAAE,gBAAgB;oBACvB,MAAM,EAAE,UAAU;oBAClB,MAAM;iBACP,CAAC,CAAC;aACJ;YAAC,OAAO,CAAC,EAAE;gBACV,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC;gBAClC,MAAM,CAAC,CAAC;aACT;SACF;IACH,CAAC;IAED,KAAK,CAAC,KAAK,CAAC,OAAwG;QAClH,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,WAAW,EAAE,GAAG,OAAO,CAAC;QACjE,MAAM,MAAM,GAAgB,MAAM,IAAI,CAAC,aAAa,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAEpE,gBAAgB;QAChB,MAAM,EAAE,UAAU,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC,wBAAwB,CAAC,OAAO,CAAC,CAAC;QAExE,MAAM,CAAC,GAAG,EAAE,GAAG,CAAC,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC;YAC5C,UAAU;YACV,GAAG,OAAO;YACV,QAAQ;SACT,CAAC,CAAC;QACH,IAAI,WAAW,IAAI,IAAI,EAAE;YACvB,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;SACrC;QACD,YAAY;QACZ,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC;YAC5B,GAAG;YACH,KAAK,EAAE,KAAK;YACZ,oBAAoB,EAAE,IAAI;YAC1B,yBAAyB,EAAE,IAAI,CAAC,eAAe;YAC/C,iBAAiB,EAAE,CAAC,QAAQ,CAAC;YAC7B,iBAAiB,EAAE,KAAK,EAAE,KAAyB,EAAE,SAAoB,EAAE,gBAAwB,EAAgB,EAAE;gBACnH,OAAO,MAAM,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,WAAW,CAAC,CAAC;YACvF,CAAC;YACD,iBAAiB,EAAE,KAAK,EAAE,KAAyB,EAAE,SAAoB,EAAE,gBAAwB,EAAE,UAAe,EAAgB,EAAE;gBACpI,OAAO,MAAM,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,UAAU,EAAE,WAAW,CAAC,CAAC;YACnG,CAAC;SACF,CAAC,CAAC;QAEH,MAAM,IAAI,GAAa;YACrB,GAAG,EAAE,GAAG,CAAC,QAAQ,EAAE;YACnB,GAAG,EAAE,GAAG,CAAC,QAAQ,EAAE;YACnB,GAAG,EAAE,GAAG,CAAC,QAAQ,EAAE;SACpB,CAAC;QACF,UAAU;QACV,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,SAAS,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC;QACvC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,iBAAiB,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC;QAC/C,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAC3B,OAAO,IAAI,CAAC;IACd,CAAC;IAED,wBAAwB,CAAC,OAA0B;QAIjD,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE;YAC/B,OAAO,GAAG,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;SAC9B;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE;YACxB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;SAC5C;QACD,MAAM,UAAU,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;QAC9B,IAAI,QAAQ,GAAyB,SAAS,CAAC;QAC/C,IAAI,OAAO,CAAC,MAAM,GAAG,CAAC,EAAE;YACtB,QAAQ,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC;SAChC;QACD,OAAO;YACL,UAAU;YACV,QAAQ;SACT,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
import { AbstractTaskPlugin, HttpClient, IAccessService, IContext, Step } from "@certd/pipeline";
|
|
2
|
+
import type { CertInfo } from "./acme.js";
|
|
3
|
+
import { Logger } from "log4js";
|
|
4
|
+
import { CertReader } from "./cert-reader.js";
|
|
5
|
+
export { CertReader };
|
|
6
|
+
export type { CertInfo };
|
|
7
|
+
export declare abstract class CertApplyBasePlugin extends AbstractTaskPlugin {
|
|
8
|
+
domains: string[];
|
|
9
|
+
email: string;
|
|
10
|
+
renewDays: number;
|
|
11
|
+
forceUpdate: string;
|
|
12
|
+
successNotify: boolean;
|
|
13
|
+
intro: string;
|
|
14
|
+
csrInfo: string;
|
|
15
|
+
logger: Logger;
|
|
16
|
+
userContext: IContext;
|
|
17
|
+
accessService: IAccessService;
|
|
18
|
+
http: HttpClient;
|
|
19
|
+
lastStatus: Step;
|
|
20
|
+
cert?: CertInfo;
|
|
21
|
+
onInstance(): Promise<void>;
|
|
22
|
+
abstract onInit(): Promise<void>;
|
|
23
|
+
abstract doCertApply(): Promise<any>;
|
|
24
|
+
execute(): Promise<void>;
|
|
25
|
+
output(certReader: CertReader, isNew: boolean): Promise<void>;
|
|
26
|
+
zipCert(cert: CertInfo, applyTime: string): Promise<void>;
|
|
27
|
+
/**
|
|
28
|
+
* 是否更新证书
|
|
29
|
+
*/
|
|
30
|
+
condition(): Promise<CertReader>;
|
|
31
|
+
formatCert(pem: string): string;
|
|
32
|
+
formatCerts(cert: {
|
|
33
|
+
crt: string;
|
|
34
|
+
key: string;
|
|
35
|
+
csr: string;
|
|
36
|
+
}): CertInfo;
|
|
37
|
+
readLastCert(): Promise<CertReader | undefined>;
|
|
38
|
+
/**
|
|
39
|
+
* 检查是否过期,默认提前20天
|
|
40
|
+
* @param expires
|
|
41
|
+
* @param maxDays
|
|
42
|
+
* @returns {boolean}
|
|
43
|
+
*/
|
|
44
|
+
isWillExpire(expires: number, maxDays?: number): {
|
|
45
|
+
isWillExpire: boolean;
|
|
46
|
+
leftDays: number;
|
|
47
|
+
};
|
|
48
|
+
private sendSuccessEmail;
|
|
49
|
+
}
|