@push.rocks/smartproxy 18.1.0 → 18.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/certificate/certificate-manager.d.ts +150 -0
- package/dist_ts/certificate/certificate-manager.js +505 -0
- package/dist_ts/certificate/events/simplified-events.d.ts +56 -0
- package/dist_ts/certificate/events/simplified-events.js +13 -0
- package/dist_ts/certificate/models/certificate-errors.d.ts +69 -0
- package/dist_ts/certificate/models/certificate-errors.js +141 -0
- package/dist_ts/certificate/models/certificate-strategy.d.ts +60 -0
- package/dist_ts/certificate/models/certificate-strategy.js +73 -0
- package/dist_ts/certificate/simplified-certificate-manager.d.ts +150 -0
- package/dist_ts/certificate/simplified-certificate-manager.js +501 -0
- package/dist_ts/http/index.d.ts +1 -9
- package/dist_ts/http/index.js +5 -11
- package/dist_ts/plugins.d.ts +3 -1
- package/dist_ts/plugins.js +4 -2
- package/dist_ts/proxies/network-proxy/network-proxy.js +3 -1
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.d.ts +48 -0
- package/dist_ts/proxies/network-proxy/simplified-certificate-bridge.js +76 -0
- package/dist_ts/proxies/network-proxy/websocket-handler.js +21 -7
- package/dist_ts/proxies/smart-proxy/cert-store.d.ts +10 -0
- package/dist_ts/proxies/smart-proxy/cert-store.js +70 -0
- package/dist_ts/proxies/smart-proxy/certificate-manager.d.ts +116 -0
- package/dist_ts/proxies/smart-proxy/certificate-manager.js +401 -0
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.d.ts +168 -0
- package/dist_ts/proxies/smart-proxy/legacy-smart-proxy.js +642 -0
- package/dist_ts/proxies/smart-proxy/models/route-types.d.ts +26 -0
- package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.d.ts +65 -0
- package/dist_ts/proxies/smart-proxy/models/simplified-smartproxy-config.js +31 -0
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.d.ts +102 -0
- package/dist_ts/proxies/smart-proxy/models/smartproxy-options.js +73 -0
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.d.ts +10 -44
- package/dist_ts/proxies/smart-proxy/network-proxy-bridge.js +66 -202
- package/dist_ts/proxies/smart-proxy/route-connection-handler.d.ts +4 -0
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +62 -2
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.d.ts +41 -0
- package/dist_ts/proxies/smart-proxy/simplified-smart-proxy.js +132 -0
- package/dist_ts/proxies/smart-proxy/smart-proxy.d.ts +18 -13
- package/dist_ts/proxies/smart-proxy/smart-proxy.js +79 -196
- package/package.json +5 -3
- package/readme.plan.md +1405 -617
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/http/index.ts +5 -12
- package/ts/plugins.ts +4 -1
- package/ts/proxies/network-proxy/network-proxy.ts +3 -0
- package/ts/proxies/network-proxy/websocket-handler.ts +18 -6
- package/ts/proxies/smart-proxy/cert-store.ts +86 -0
- package/ts/proxies/smart-proxy/certificate-manager.ts +506 -0
- package/ts/proxies/smart-proxy/models/route-types.ts +33 -3
- package/ts/proxies/smart-proxy/network-proxy-bridge.ts +86 -239
- package/ts/proxies/smart-proxy/route-connection-handler.ts +74 -1
- package/ts/proxies/smart-proxy/smart-proxy.ts +105 -222
|
@@ -0,0 +1,505 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Unified certificate manager for SmartProxy
|
|
3
|
+
*/
|
|
4
|
+
import * as plugins from '../plugins.js';
|
|
5
|
+
import * as path from 'path';
|
|
6
|
+
import * as fs from 'fs/promises';
|
|
7
|
+
import { CertificateError, CertificateErrors } from './models/certificate-errors.js';
|
|
8
|
+
import { CertificateEvent } from './events/certificate-events.js';
|
|
9
|
+
/**
|
|
10
|
+
* Unified certificate manager
|
|
11
|
+
*/
|
|
12
|
+
export class CertificateManager extends plugins.EventEmitter {
|
|
13
|
+
constructor(config) {
|
|
14
|
+
super();
|
|
15
|
+
this.certificateCache = new Map();
|
|
16
|
+
this.pendingRequests = new Map();
|
|
17
|
+
// Validate configuration
|
|
18
|
+
if (!config.certProvider) {
|
|
19
|
+
throw CertificateErrors.noCertProvider();
|
|
20
|
+
}
|
|
21
|
+
if (!config.acmeEmail) {
|
|
22
|
+
throw CertificateErrors.missingAcmeEmail();
|
|
23
|
+
}
|
|
24
|
+
// Set defaults
|
|
25
|
+
this.config = {
|
|
26
|
+
...config,
|
|
27
|
+
storageDir: config.storageDir || './certs',
|
|
28
|
+
renewBeforeDays: config.renewBeforeDays || 30,
|
|
29
|
+
defaultCertPath: config.defaultCertPath || path.join(process.cwd(), 'assets/certs/cert.pem'),
|
|
30
|
+
defaultKeyPath: config.defaultKeyPath || path.join(process.cwd(), 'assets/certs/key.pem')
|
|
31
|
+
};
|
|
32
|
+
// Ensure storage directory exists
|
|
33
|
+
this.ensureStorageDir();
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* Initialize the certificate manager
|
|
37
|
+
*/
|
|
38
|
+
async start() {
|
|
39
|
+
// Initialize ACME client
|
|
40
|
+
await this.initializeAcmeClient();
|
|
41
|
+
// Load stored certificates
|
|
42
|
+
await this.loadStoredCertificates();
|
|
43
|
+
// Start renewal timer
|
|
44
|
+
this.startRenewalTimer();
|
|
45
|
+
}
|
|
46
|
+
/**
|
|
47
|
+
* Stop the certificate manager
|
|
48
|
+
*/
|
|
49
|
+
async stop() {
|
|
50
|
+
if (this.renewalTimer) {
|
|
51
|
+
clearInterval(this.renewalTimer);
|
|
52
|
+
this.renewalTimer = undefined;
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
/**
|
|
56
|
+
* Get a certificate for a domain (main entry point)
|
|
57
|
+
*/
|
|
58
|
+
async getCertificate(domain) {
|
|
59
|
+
// Check cache first
|
|
60
|
+
const cached = this.certificateCache.get(domain);
|
|
61
|
+
if (cached && this.isCertificateValid(cached)) {
|
|
62
|
+
return cached;
|
|
63
|
+
}
|
|
64
|
+
// Check for pending request to avoid duplicates
|
|
65
|
+
const pending = this.pendingRequests.get(domain);
|
|
66
|
+
if (pending) {
|
|
67
|
+
return pending;
|
|
68
|
+
}
|
|
69
|
+
// Start new certificate request
|
|
70
|
+
const request = this.requestCertificate(domain);
|
|
71
|
+
this.pendingRequests.set(domain, request);
|
|
72
|
+
try {
|
|
73
|
+
const cert = await request;
|
|
74
|
+
this.pendingRequests.delete(domain);
|
|
75
|
+
return cert;
|
|
76
|
+
}
|
|
77
|
+
catch (error) {
|
|
78
|
+
this.pendingRequests.delete(domain);
|
|
79
|
+
throw error;
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
/**
|
|
83
|
+
* Request a new certificate
|
|
84
|
+
*/
|
|
85
|
+
async requestCertificate(domain) {
|
|
86
|
+
let strategyType = 'static';
|
|
87
|
+
try {
|
|
88
|
+
// Get strategy from provider
|
|
89
|
+
let strategy;
|
|
90
|
+
try {
|
|
91
|
+
strategy = await this.config.certProvider(domain);
|
|
92
|
+
}
|
|
93
|
+
catch (providerError) {
|
|
94
|
+
throw CertificateErrors.invalidCertProvider(providerError);
|
|
95
|
+
}
|
|
96
|
+
// Track strategy type for error reporting
|
|
97
|
+
strategyType = strategy.type === 'skip' ? 'static' : strategy.type;
|
|
98
|
+
let certificate;
|
|
99
|
+
switch (strategy.type) {
|
|
100
|
+
case 'acme-http':
|
|
101
|
+
certificate = await this.requestAcmeHttpCertificate(domain);
|
|
102
|
+
break;
|
|
103
|
+
case 'acme-dns':
|
|
104
|
+
certificate = await this.requestAcmeDnsCertificate(domain);
|
|
105
|
+
break;
|
|
106
|
+
case 'static':
|
|
107
|
+
certificate = {
|
|
108
|
+
domain,
|
|
109
|
+
certificate: strategy.cert,
|
|
110
|
+
privateKey: strategy.key,
|
|
111
|
+
expiresAt: strategy.expiresAt || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000),
|
|
112
|
+
source: 'static'
|
|
113
|
+
};
|
|
114
|
+
break;
|
|
115
|
+
case 'skip':
|
|
116
|
+
throw CertificateErrors.certificateNotFound(domain);
|
|
117
|
+
default:
|
|
118
|
+
throw CertificateErrors.invalidCertProvider(new Error('Unknown strategy type'));
|
|
119
|
+
}
|
|
120
|
+
// Cache and store
|
|
121
|
+
this.certificateCache.set(domain, certificate);
|
|
122
|
+
await this.storeCertificate(certificate);
|
|
123
|
+
// Emit success event
|
|
124
|
+
this.emit(CertificateEvent.OBTAINED, {
|
|
125
|
+
domain,
|
|
126
|
+
type: 'new',
|
|
127
|
+
expiresAt: certificate.expiresAt,
|
|
128
|
+
source: certificate.source,
|
|
129
|
+
certificate: certificate.certificate,
|
|
130
|
+
privateKey: certificate.privateKey
|
|
131
|
+
});
|
|
132
|
+
return certificate;
|
|
133
|
+
}
|
|
134
|
+
catch (error) {
|
|
135
|
+
const certError = error instanceof CertificateError
|
|
136
|
+
? error
|
|
137
|
+
: new CertificateError({
|
|
138
|
+
code: 'UNKNOWN_ERROR',
|
|
139
|
+
message: error.message || 'Unknown error',
|
|
140
|
+
domain,
|
|
141
|
+
cause: error
|
|
142
|
+
});
|
|
143
|
+
this.emit(CertificateEvent.FAILED, {
|
|
144
|
+
domain,
|
|
145
|
+
error: certError,
|
|
146
|
+
strategy: strategyType
|
|
147
|
+
});
|
|
148
|
+
throw certError;
|
|
149
|
+
}
|
|
150
|
+
}
|
|
151
|
+
/**
|
|
152
|
+
* Request certificate via ACME HTTP-01
|
|
153
|
+
*/
|
|
154
|
+
async requestAcmeHttpCertificate(domain) {
|
|
155
|
+
if (domain.includes('*')) {
|
|
156
|
+
throw CertificateErrors.wildcardNotSupported(domain);
|
|
157
|
+
}
|
|
158
|
+
try {
|
|
159
|
+
// Create ACME order
|
|
160
|
+
const order = await this.acmeClient.createOrder({
|
|
161
|
+
identifiers: [{ type: 'dns', value: domain }]
|
|
162
|
+
});
|
|
163
|
+
// Get authorization
|
|
164
|
+
const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
|
|
165
|
+
const challenge = authorization.challenges.find(c => c.type === 'http-01');
|
|
166
|
+
if (!challenge) {
|
|
167
|
+
throw new Error('No HTTP-01 challenge available');
|
|
168
|
+
}
|
|
169
|
+
// Prepare challenge response
|
|
170
|
+
const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
|
|
171
|
+
// Set up HTTP responder (this would integrate with Port80Handler)
|
|
172
|
+
await this.setupHttpChallenge(challenge.token, keyAuthorization);
|
|
173
|
+
// Notify ACME server
|
|
174
|
+
await this.acmeClient.completeChallenge(challenge);
|
|
175
|
+
await this.acmeClient.waitForValidation(challenge);
|
|
176
|
+
// Generate CSR
|
|
177
|
+
const keypair = await this.generateKeypair();
|
|
178
|
+
const csr = await this.generateCsr(domain, keypair);
|
|
179
|
+
// Finalize order
|
|
180
|
+
await this.acmeClient.finalizeOrder(order, csr);
|
|
181
|
+
const cert = await this.acmeClient.getCertificate(order);
|
|
182
|
+
// Clean up challenge
|
|
183
|
+
await this.cleanupHttpChallenge(challenge.token);
|
|
184
|
+
return {
|
|
185
|
+
domain,
|
|
186
|
+
certificate: cert,
|
|
187
|
+
privateKey: keypair.privateKey,
|
|
188
|
+
expiresAt: this.extractExpiryDate(cert),
|
|
189
|
+
source: 'acme-http'
|
|
190
|
+
};
|
|
191
|
+
}
|
|
192
|
+
catch (error) {
|
|
193
|
+
throw CertificateErrors.acmeHttpChallengeFailed(domain, error);
|
|
194
|
+
}
|
|
195
|
+
}
|
|
196
|
+
/**
|
|
197
|
+
* Request certificate via ACME DNS-01
|
|
198
|
+
*/
|
|
199
|
+
async requestAcmeDnsCertificate(domain) {
|
|
200
|
+
try {
|
|
201
|
+
// Create ACME order
|
|
202
|
+
const order = await this.acmeClient.createOrder({
|
|
203
|
+
identifiers: [{ type: 'dns', value: domain }]
|
|
204
|
+
});
|
|
205
|
+
// Get authorization
|
|
206
|
+
const authorization = await this.acmeClient.getAuthorization(order.authorizations[0]);
|
|
207
|
+
const challenge = authorization.challenges.find(c => c.type === 'dns-01');
|
|
208
|
+
if (!challenge) {
|
|
209
|
+
throw new Error('No DNS-01 challenge available');
|
|
210
|
+
}
|
|
211
|
+
// Get DNS record value
|
|
212
|
+
const keyAuthorization = await this.acmeClient.getChallengeKeyAuthorization(challenge);
|
|
213
|
+
const dnsRecord = this.acmeClient.keyAuthorizationToDns01(keyAuthorization);
|
|
214
|
+
// Note: Actual DNS record creation would be handled externally
|
|
215
|
+
console.log(`Please create DNS TXT record: _acme-challenge.${domain} = ${dnsRecord}`);
|
|
216
|
+
// In a real implementation, we'd wait for DNS propagation
|
|
217
|
+
// For now, this is a placeholder
|
|
218
|
+
await new Promise(resolve => setTimeout(resolve, 60000)); // Wait 60 seconds
|
|
219
|
+
// Notify ACME server
|
|
220
|
+
await this.acmeClient.completeChallenge(challenge);
|
|
221
|
+
await this.acmeClient.waitForValidation(challenge);
|
|
222
|
+
// Generate CSR
|
|
223
|
+
const keypair = await this.generateKeypair();
|
|
224
|
+
const csr = await this.generateCsr(domain, keypair);
|
|
225
|
+
// Finalize order
|
|
226
|
+
await this.acmeClient.finalizeOrder(order, csr);
|
|
227
|
+
const cert = await this.acmeClient.getCertificate(order);
|
|
228
|
+
return {
|
|
229
|
+
domain,
|
|
230
|
+
certificate: cert,
|
|
231
|
+
privateKey: keypair.privateKey,
|
|
232
|
+
expiresAt: this.extractExpiryDate(cert),
|
|
233
|
+
source: 'acme-dns'
|
|
234
|
+
};
|
|
235
|
+
}
|
|
236
|
+
catch (error) {
|
|
237
|
+
throw CertificateErrors.acmeDnsChallengeFailed(domain, error);
|
|
238
|
+
}
|
|
239
|
+
}
|
|
240
|
+
/**
|
|
241
|
+
* Renew a certificate
|
|
242
|
+
*/
|
|
243
|
+
async renewCertificate(domain) {
|
|
244
|
+
const existing = this.certificateCache.get(domain);
|
|
245
|
+
if (!existing) {
|
|
246
|
+
throw CertificateErrors.certificateNotFound(domain);
|
|
247
|
+
}
|
|
248
|
+
try {
|
|
249
|
+
// Request new certificate
|
|
250
|
+
const renewed = await this.requestCertificate(domain);
|
|
251
|
+
// Emit renewal event
|
|
252
|
+
this.emit(CertificateEvent.OBTAINED, {
|
|
253
|
+
domain,
|
|
254
|
+
type: 'renewed',
|
|
255
|
+
expiresAt: renewed.expiresAt,
|
|
256
|
+
source: renewed.source,
|
|
257
|
+
certificate: renewed.certificate,
|
|
258
|
+
privateKey: renewed.privateKey
|
|
259
|
+
});
|
|
260
|
+
return renewed;
|
|
261
|
+
}
|
|
262
|
+
catch (error) {
|
|
263
|
+
throw error;
|
|
264
|
+
}
|
|
265
|
+
}
|
|
266
|
+
/**
|
|
267
|
+
* Check certificates for renewal
|
|
268
|
+
*/
|
|
269
|
+
async checkForRenewals() {
|
|
270
|
+
for (const [domain, cert] of this.certificateCache.entries()) {
|
|
271
|
+
if (this.shouldRenew(cert)) {
|
|
272
|
+
try {
|
|
273
|
+
await this.renewCertificate(domain);
|
|
274
|
+
}
|
|
275
|
+
catch (error) {
|
|
276
|
+
console.error(`Failed to renew certificate for ${domain}:`, error);
|
|
277
|
+
}
|
|
278
|
+
}
|
|
279
|
+
else if (this.isExpiringSoon(cert)) {
|
|
280
|
+
this.emit(CertificateEvent.EXPIRING, {
|
|
281
|
+
domain,
|
|
282
|
+
expiresAt: cert.expiresAt,
|
|
283
|
+
daysRemaining: this.getDaysRemaining(cert)
|
|
284
|
+
});
|
|
285
|
+
}
|
|
286
|
+
}
|
|
287
|
+
}
|
|
288
|
+
/**
|
|
289
|
+
* Initialize ACME client
|
|
290
|
+
*/
|
|
291
|
+
async initializeAcmeClient() {
|
|
292
|
+
// ACME client initialization placeholder
|
|
293
|
+
// In a real implementation, this would use an ACME library
|
|
294
|
+
console.log(`Initializing ACME client for ${this.config.acmeServer} environment`);
|
|
295
|
+
}
|
|
296
|
+
/**
|
|
297
|
+
* Load stored certificates from disk
|
|
298
|
+
*/
|
|
299
|
+
async loadStoredCertificates() {
|
|
300
|
+
try {
|
|
301
|
+
const files = await fs.readdir(this.config.storageDir);
|
|
302
|
+
const certFiles = files.filter(f => f.endsWith('.json'));
|
|
303
|
+
for (const file of certFiles) {
|
|
304
|
+
try {
|
|
305
|
+
const content = await fs.readFile(path.join(this.config.storageDir, file), 'utf-8');
|
|
306
|
+
const cert = JSON.parse(content);
|
|
307
|
+
cert.expiresAt = new Date(cert.expiresAt);
|
|
308
|
+
if (this.isCertificateValid(cert)) {
|
|
309
|
+
this.certificateCache.set(cert.domain, cert);
|
|
310
|
+
}
|
|
311
|
+
}
|
|
312
|
+
catch (error) {
|
|
313
|
+
console.error(`Failed to load certificate ${file}:`, error);
|
|
314
|
+
}
|
|
315
|
+
}
|
|
316
|
+
}
|
|
317
|
+
catch (error) {
|
|
318
|
+
console.error('Failed to load certificates:', error);
|
|
319
|
+
}
|
|
320
|
+
}
|
|
321
|
+
/**
|
|
322
|
+
* Store certificate to disk
|
|
323
|
+
*/
|
|
324
|
+
async storeCertificate(cert) {
|
|
325
|
+
const filename = `${cert.domain}.json`;
|
|
326
|
+
const filepath = path.join(this.config.storageDir, filename);
|
|
327
|
+
try {
|
|
328
|
+
await fs.writeFile(filepath, JSON.stringify(cert, null, 2));
|
|
329
|
+
// Also save individual cert and key files
|
|
330
|
+
await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.crt`), cert.certificate);
|
|
331
|
+
await fs.writeFile(path.join(this.config.storageDir, `${cert.domain}.key`), cert.privateKey);
|
|
332
|
+
// Set proper permissions on key file
|
|
333
|
+
await fs.chmod(path.join(this.config.storageDir, `${cert.domain}.key`), 0o600);
|
|
334
|
+
}
|
|
335
|
+
catch (error) {
|
|
336
|
+
throw CertificateErrors.storageError('write', filepath, error);
|
|
337
|
+
}
|
|
338
|
+
}
|
|
339
|
+
/**
|
|
340
|
+
* Ensure storage directory exists
|
|
341
|
+
*/
|
|
342
|
+
async ensureStorageDir() {
|
|
343
|
+
try {
|
|
344
|
+
await fs.mkdir(this.config.storageDir, { recursive: true });
|
|
345
|
+
}
|
|
346
|
+
catch (error) {
|
|
347
|
+
console.error('Failed to create storage directory:', error);
|
|
348
|
+
}
|
|
349
|
+
}
|
|
350
|
+
/**
|
|
351
|
+
* Get or create ACME account key
|
|
352
|
+
*/
|
|
353
|
+
async getOrCreateAccountKey() {
|
|
354
|
+
const keyPath = path.join(this.config.storageDir, 'account.key');
|
|
355
|
+
try {
|
|
356
|
+
return await fs.readFile(keyPath, 'utf-8');
|
|
357
|
+
}
|
|
358
|
+
catch {
|
|
359
|
+
// Generate new key - placeholder
|
|
360
|
+
const dummyKey = '-----BEGIN PRIVATE KEY-----\nDUMMY_KEY_FOR_TESTING\n-----END PRIVATE KEY-----';
|
|
361
|
+
await fs.writeFile(keyPath, dummyKey);
|
|
362
|
+
await fs.chmod(keyPath, 0o600);
|
|
363
|
+
return dummyKey;
|
|
364
|
+
}
|
|
365
|
+
}
|
|
366
|
+
/**
|
|
367
|
+
* Generate keypair for certificate
|
|
368
|
+
*/
|
|
369
|
+
async generateKeypair() {
|
|
370
|
+
// Keypair generation placeholder
|
|
371
|
+
return {
|
|
372
|
+
privateKey: '-----BEGIN PRIVATE KEY-----\nDUMMY_PRIVATE_KEY\n-----END PRIVATE KEY-----',
|
|
373
|
+
publicKey: '-----BEGIN PUBLIC KEY-----\nDUMMY_PUBLIC_KEY\n-----END PUBLIC KEY-----'
|
|
374
|
+
};
|
|
375
|
+
}
|
|
376
|
+
/**
|
|
377
|
+
* Generate CSR for domain
|
|
378
|
+
*/
|
|
379
|
+
async generateCsr(domain, keypair) {
|
|
380
|
+
// CSR generation placeholder
|
|
381
|
+
return `-----BEGIN CERTIFICATE REQUEST-----\nDUMMY_CSR_FOR_${domain}\n-----END CERTIFICATE REQUEST-----`;
|
|
382
|
+
}
|
|
383
|
+
/**
|
|
384
|
+
* Extract expiry date from certificate
|
|
385
|
+
*/
|
|
386
|
+
extractExpiryDate(certPem) {
|
|
387
|
+
// Certificate expiry extraction placeholder
|
|
388
|
+
// In a real implementation, this would parse the certificate
|
|
389
|
+
return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days from now
|
|
390
|
+
}
|
|
391
|
+
/**
|
|
392
|
+
* Check if certificate is valid
|
|
393
|
+
*/
|
|
394
|
+
isCertificateValid(cert) {
|
|
395
|
+
return cert.expiresAt > new Date();
|
|
396
|
+
}
|
|
397
|
+
/**
|
|
398
|
+
* Check if certificate should be renewed
|
|
399
|
+
*/
|
|
400
|
+
shouldRenew(cert) {
|
|
401
|
+
const daysRemaining = this.getDaysRemaining(cert);
|
|
402
|
+
return daysRemaining <= this.config.renewBeforeDays;
|
|
403
|
+
}
|
|
404
|
+
/**
|
|
405
|
+
* Check if certificate is expiring soon
|
|
406
|
+
*/
|
|
407
|
+
isExpiringSoon(cert) {
|
|
408
|
+
const daysRemaining = this.getDaysRemaining(cert);
|
|
409
|
+
return daysRemaining <= this.config.renewBeforeDays + 7; // Warn 7 days before renewal
|
|
410
|
+
}
|
|
411
|
+
/**
|
|
412
|
+
* Get days remaining until expiry
|
|
413
|
+
*/
|
|
414
|
+
getDaysRemaining(cert) {
|
|
415
|
+
const now = new Date();
|
|
416
|
+
const diff = cert.expiresAt.getTime() - now.getTime();
|
|
417
|
+
return Math.floor(diff / (1000 * 60 * 60 * 24));
|
|
418
|
+
}
|
|
419
|
+
/**
|
|
420
|
+
* Start renewal timer
|
|
421
|
+
*/
|
|
422
|
+
startRenewalTimer() {
|
|
423
|
+
// Check every 6 hours
|
|
424
|
+
this.renewalTimer = setInterval(() => {
|
|
425
|
+
this.checkForRenewals().catch(error => {
|
|
426
|
+
console.error('Renewal check failed:', error);
|
|
427
|
+
});
|
|
428
|
+
}, 6 * 60 * 60 * 1000);
|
|
429
|
+
// Also check immediately
|
|
430
|
+
this.checkForRenewals().catch(error => {
|
|
431
|
+
console.error('Initial renewal check failed:', error);
|
|
432
|
+
});
|
|
433
|
+
}
|
|
434
|
+
/**
|
|
435
|
+
* Get default certificate for SNI fallback
|
|
436
|
+
*/
|
|
437
|
+
async getDefaultCertificate() {
|
|
438
|
+
try {
|
|
439
|
+
const [cert, key] = await Promise.all([
|
|
440
|
+
fs.readFile(this.config.defaultCertPath, 'utf-8'),
|
|
441
|
+
fs.readFile(this.config.defaultKeyPath, 'utf-8')
|
|
442
|
+
]);
|
|
443
|
+
return { cert, key };
|
|
444
|
+
}
|
|
445
|
+
catch (error) {
|
|
446
|
+
throw new CertificateError({
|
|
447
|
+
code: 'DEFAULT_CERT_ERROR',
|
|
448
|
+
message: 'Failed to load default certificate',
|
|
449
|
+
solution: 'Ensure default certificate files exist at configured paths',
|
|
450
|
+
cause: error
|
|
451
|
+
});
|
|
452
|
+
}
|
|
453
|
+
}
|
|
454
|
+
/**
|
|
455
|
+
* Set up HTTP challenge responder
|
|
456
|
+
*/
|
|
457
|
+
async setupHttpChallenge(token, keyAuthorization) {
|
|
458
|
+
// This would integrate with Port80Handler
|
|
459
|
+
// For now, it's a placeholder
|
|
460
|
+
console.log(`HTTP Challenge: /.well-known/acme-challenge/${token} = ${keyAuthorization}`);
|
|
461
|
+
}
|
|
462
|
+
/**
|
|
463
|
+
* Clean up HTTP challenge
|
|
464
|
+
*/
|
|
465
|
+
async cleanupHttpChallenge(token) {
|
|
466
|
+
// This would integrate with Port80Handler
|
|
467
|
+
// For now, it's a placeholder
|
|
468
|
+
console.log(`Cleanup HTTP Challenge: ${token}`);
|
|
469
|
+
}
|
|
470
|
+
/**
|
|
471
|
+
* Type assertion for event emitter
|
|
472
|
+
*/
|
|
473
|
+
on(event, listener) {
|
|
474
|
+
return super.on(event, listener);
|
|
475
|
+
}
|
|
476
|
+
off(event, listener) {
|
|
477
|
+
return super.off(event, listener);
|
|
478
|
+
}
|
|
479
|
+
emit(event, data) {
|
|
480
|
+
return super.emit(event, data);
|
|
481
|
+
}
|
|
482
|
+
/**
|
|
483
|
+
* Update routes (placeholder for future implementation)
|
|
484
|
+
*/
|
|
485
|
+
async updateRoutes(routes) {
|
|
486
|
+
// Process routes to extract certificate requirements
|
|
487
|
+
for (const route of routes) {
|
|
488
|
+
if (route.action.type === 'forward' &&
|
|
489
|
+
route.action.tls?.mode === 'terminate' &&
|
|
490
|
+
route.action.tls?.certificate === 'auto' &&
|
|
491
|
+
route.match.domains) {
|
|
492
|
+
const domains = Array.isArray(route.match.domains)
|
|
493
|
+
? route.match.domains
|
|
494
|
+
: [route.match.domains];
|
|
495
|
+
for (const domain of domains) {
|
|
496
|
+
// Trigger certificate retrieval for auto domains
|
|
497
|
+
this.getCertificate(domain).catch(err => {
|
|
498
|
+
console.error(`Failed to get certificate for ${domain}:`, err);
|
|
499
|
+
});
|
|
500
|
+
}
|
|
501
|
+
}
|
|
502
|
+
}
|
|
503
|
+
}
|
|
504
|
+
}
|
|
505
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"certificate-manager.js","sourceRoot":"","sources":["../../ts/certificate/certificate-manager.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAElC,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;AACrF,OAAO,EAAE,gBAAgB,EAAE,MAAM,gCAAgC,CAAC;AA+BlE;;GAEG;AACH,MAAM,OAAO,kBAAmB,SAAQ,OAAO,CAAC,YAAY;IAO1D,YAAY,MAAgC;QAC1C,KAAK,EAAE,CAAC;QANF,qBAAgB,GAAG,IAAI,GAAG,EAA6B,CAAC;QAGxD,oBAAe,GAAG,IAAI,GAAG,EAAsC,CAAC;QAKtE,yBAAyB;QACzB,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,cAAc,EAAE,CAAC;QAC3C,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC;YACtB,MAAM,iBAAiB,CAAC,gBAAgB,EAAE,CAAC;QAC7C,CAAC;QAED,eAAe;QACf,IAAI,CAAC,MAAM,GAAG;YACZ,GAAG,MAAM;YACT,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,SAAS;YAC1C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,EAAE;YAC7C,eAAe,EAAE,MAAM,CAAC,eAAe,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,uBAAuB,CAAC;YAC5F,cAAc,EAAE,MAAM,CAAC,cAAc,IAAI,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,sBAAsB,CAAC;SAC1F,CAAC;QAEF,kCAAkC;QAClC,IAAI,CAAC,gBAAgB,EAAE,CAAC;IAC1B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,KAAK;QAChB,yBAAyB;QACzB,MAAM,IAAI,CAAC,oBAAoB,EAAE,CAAC;QAElC,2BAA2B;QAC3B,MAAM,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAEpC,sBAAsB;QACtB,IAAI,CAAC,iBAAiB,EAAE,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,aAAa,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACjC,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;QAChC,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,cAAc,CAAC,MAAc;QACxC,oBAAoB;QACpB,MAAM,MAAM,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,MAAM,IAAI,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC9C,OAAO,MAAM,CAAC;QAChB,CAAC;QAED,gDAAgD;QAChD,MAAM,OAAO,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACjD,IAAI,OAAO,EAAE,CAAC;YACZ,OAAO,OAAO,CAAC;QACjB,CAAC;QAED,gCAAgC;QAChC,MAAM,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAChD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAE1C,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC;YAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,OAAO,IAAI,CAAC;QACd,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YACpC,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,MAAc;QAC7C,IAAI,YAAY,GAAwC,QAAQ,CAAC;QAEjE,IAAI,CAAC;YACH,6BAA6B;YAC7B,IAAI,QAA6B,CAAC;YAClC,IAAI,CAAC;gBACH,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;YACpD,CAAC;YAAC,OAAO,aAAa,EAAE,CAAC;gBACvB,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,aAAa,CAAC,CAAC;YAC7D,CAAC;YAED,0CAA0C;YAC1C,YAAY,GAAG,QAAQ,CAAC,IAAI,KAAK,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC;YAEnE,IAAI,WAA8B,CAAC;YAEnC,QAAQ,QAAQ,CAAC,IAAI,EAAE,CAAC;gBACtB,KAAK,WAAW;oBACd,WAAW,GAAG,MAAM,IAAI,CAAC,0BAA0B,CAAC,MAAM,CAAC,CAAC;oBAC5D,MAAM;gBAER,KAAK,UAAU;oBACb,WAAW,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,CAAC,CAAC;oBAC3D,MAAM;gBAER,KAAK,QAAQ;oBACX,WAAW,GAAG;wBACZ,MAAM;wBACN,WAAW,EAAE,QAAQ,CAAC,IAAI;wBAC1B,UAAU,EAAE,QAAQ,CAAC,GAAG;wBACxB,SAAS,EAAE,QAAQ,CAAC,SAAS,IAAI,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;wBAChF,MAAM,EAAE,QAAQ;qBACjB,CAAC;oBACF,MAAM;gBAER,KAAK,MAAM;oBACT,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEtD;oBACE,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC;YACpF,CAAC;YAED,kBAAkB;YAClB,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,EAAE,WAAW,CAAC,CAAC;YAC/C,MAAM,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;YAEzC,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,KAAK;gBACX,SAAS,EAAE,WAAW,CAAC,SAAS;gBAChC,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,WAAW,EAAE,WAAW,CAAC,WAAW;gBACpC,UAAU,EAAE,WAAW,CAAC,UAAU;aACnC,CAAC,CAAC;YAEH,OAAO,WAAW,CAAC;QAErB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,SAAS,GAAG,KAAK,YAAY,gBAAgB;gBACjD,CAAC,CAAC,KAAK;gBACP,CAAC,CAAC,IAAI,gBAAgB,CAAC;oBACnB,IAAI,EAAE,eAAe;oBACrB,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,eAAe;oBACzC,MAAM;oBACN,KAAK,EAAE,KAAK;iBACb,CAAC,CAAC;YAEP,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE;gBACjC,MAAM;gBACN,KAAK,EAAE,SAAS;gBAChB,QAAQ,EAAE,YAAY;aACvB,CAAC,CAAC;YAEH,MAAM,SAAS,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,0BAA0B,CAAC,MAAc;QACrD,IAAI,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACzB,MAAM,iBAAiB,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC;QACvD,CAAC;QAED,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,SAAS,CAAC,CAAC;YAE3E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACpD,CAAC;YAED,6BAA6B;YAC7B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YAEvF,kEAAkE;YAClE,MAAM,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,KAAK,EAAE,gBAAgB,CAAC,CAAC;YAEjE,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,qBAAqB;YACrB,MAAM,IAAI,CAAC,oBAAoB,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YAEjD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,WAAW;aACpB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,uBAAuB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,yBAAyB,CAAC,MAAc;QACpD,IAAI,CAAC;YACH,oBAAoB;YACpB,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC9C,WAAW,EAAE,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC;aAC9C,CAAC,CAAC;YAEH,oBAAoB;YACpB,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC;YACtF,MAAM,SAAS,GAAG,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC;YAE1E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,uBAAuB;YACvB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,4BAA4B,CAAC,SAAS,CAAC,CAAC;YACvF,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,uBAAuB,CAAC,gBAAgB,CAAC,CAAC;YAE5E,+DAA+D;YAC/D,OAAO,CAAC,GAAG,CAAC,iDAAiD,MAAM,MAAM,SAAS,EAAE,CAAC,CAAC;YAEtF,0DAA0D;YAC1D,iCAAiC;YACjC,MAAM,IAAI,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,kBAAkB;YAE5E,qBAAqB;YACrB,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YACnD,MAAM,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;YAEnD,eAAe;YACf,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;YAEpD,iBAAiB;YACjB,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAChD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;YAEzD,OAAO;gBACL,MAAM;gBACN,WAAW,EAAE,IAAI;gBACjB,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,SAAS,EAAE,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC;gBACvC,MAAM,EAAE,UAAU;aACnB,CAAC;QAEJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,sBAAsB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QAChE,CAAC;IACH,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACnD,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,MAAM,iBAAiB,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;QACtD,CAAC;QAED,IAAI,CAAC;YACH,0BAA0B;YAC1B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;YAEtD,qBAAqB;YACrB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;gBACnC,MAAM;gBACN,IAAI,EAAE,SAAS;gBACf,SAAS,EAAE,OAAO,CAAC,SAAS;gBAC5B,MAAM,EAAE,OAAO,CAAC,MAAM;gBACtB,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,UAAU,EAAE,OAAO,CAAC,UAAU;aAC/B,CAAC,CAAC;YAEH,OAAO,OAAO,CAAC;QAEjB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,KAAK,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,gBAAgB,CAAC,OAAO,EAAE,EAAE,CAAC;YAC7D,IAAI,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,EAAE,CAAC;gBAC3B,IAAI,CAAC;oBACH,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;gBACtC,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,mCAAmC,MAAM,GAAG,EAAE,KAAK,CAAC,CAAC;gBACrE,CAAC;YACH,CAAC;iBAAM,IAAI,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,EAAE;oBACnC,MAAM;oBACN,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,aAAa,EAAE,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC;iBAC3C,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB;QAChC,yCAAyC;QACzC,2DAA2D;QAC3D,OAAO,CAAC,GAAG,CAAC,gCAAgC,IAAI,CAAC,MAAM,CAAC,UAAU,cAAc,CAAC,CAAC;IACpF,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,sBAAsB;QAClC,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACvD,MAAM,SAAS,GAAG,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAEzD,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC7B,IAAI,CAAC;oBACH,MAAM,OAAO,GAAG,MAAM,EAAE,CAAC,QAAQ,CAC/B,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,IAAI,CAAC,EACvC,OAAO,CACR,CAAC;oBACF,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAsB,CAAC;oBACtD,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBAE1C,IAAI,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;wBAClC,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;oBAC/C,CAAC;gBACH,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,IAAI,GAAG,EAAE,KAAK,CAAC,CAAC;gBAC9D,CAAC;YACH,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,8BAA8B,EAAE,KAAK,CAAC,CAAC;QACvD,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,IAAuB;QACpD,MAAM,QAAQ,GAAG,GAAG,IAAI,CAAC,MAAM,OAAO,CAAC;QACvC,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;QAE7D,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;YAE5D,0CAA0C;YAC1C,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,WAAW,CACjB,CAAC;YACF,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EACvD,IAAI,CAAC,UAAU,CAChB,CAAC;YAEF,qCAAqC;YACrC,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,IAAI,CAAC,MAAM,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QAEjF,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,iBAAiB,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,EAAE,KAAK,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB;QAC5B,IAAI,CAAC;YACH,MAAM,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAC9D,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,qCAAqC,EAAE,KAAK,CAAC,CAAC;QAC9D,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,qBAAqB;QACjC,MAAM,OAAO,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;QAEjE,IAAI,CAAC;YACH,OAAO,MAAM,EAAE,CAAC,QAAQ,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC;QAC7C,CAAC;QAAC,MAAM,CAAC;YACP,iCAAiC;YACjC,MAAM,QAAQ,GAAG,+EAA+E,CAAC;YAEjG,MAAM,EAAE,CAAC,SAAS,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;YACtC,MAAM,EAAE,CAAC,KAAK,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;YAE/B,OAAO,QAAQ,CAAC;QAClB,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,eAAe;QAC3B,iCAAiC;QACjC,OAAO;YACL,UAAU,EAAE,2EAA2E;YACvF,SAAS,EAAE,wEAAwE;SACpF,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,WAAW,CAAC,MAAc,EAAE,OAA+B;QACvE,6BAA6B;QAC7B,OAAO,sDAAsD,MAAM,qCAAqC,CAAC;IAC3G,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,OAAe;QACvC,4CAA4C;QAC5C,6DAA6D;QAC7D,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;IAC7E,CAAC;IAED;;OAEG;IACK,kBAAkB,CAAC,IAAuB;QAChD,OAAO,IAAI,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,CAAC;IACrC,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,IAAuB;QACzC,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC;IACtD,CAAC;IAED;;OAEG;IACK,cAAc,CAAC,IAAuB;QAC5C,MAAM,aAAa,GAAG,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAClD,OAAO,aAAa,IAAI,IAAI,CAAC,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC,CAAC,6BAA6B;IACxF,CAAC;IAED;;OAEG;IACK,gBAAgB,CAAC,IAAuB;QAC9C,MAAM,GAAG,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,GAAG,CAAC,OAAO,EAAE,CAAC;QACtD,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,GAAG,CAAC,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACK,iBAAiB;QACvB,sBAAsB;QACtB,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC,GAAG,EAAE;YACnC,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;gBACpC,OAAO,CAAC,KAAK,CAAC,uBAAuB,EAAE,KAAK,CAAC,CAAC;YAChD,CAAC,CAAC,CAAC;QACL,CAAC,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAEvB,yBAAyB;QACzB,IAAI,CAAC,gBAAgB,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE;YACpC,OAAO,CAAC,KAAK,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,qBAAqB;QAChC,IAAI,CAAC;YACH,MAAM,CAAC,IAAI,EAAE,GAAG,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;gBACpC,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,EAAE,OAAO,CAAC;gBACjD,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,cAAc,EAAE,OAAO,CAAC;aACjD,CAAC,CAAC;YAEH,OAAO,EAAE,IAAI,EAAE,GAAG,EAAE,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,gBAAgB,CAAC;gBACzB,IAAI,EAAE,oBAAoB;gBAC1B,OAAO,EAAE,oCAAoC;gBAC7C,QAAQ,EAAE,4DAA4D;gBACtE,KAAK,EAAE,KAAK;aACb,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,kBAAkB,CAAC,KAAa,EAAE,gBAAwB;QACtE,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,+CAA+C,KAAK,MAAM,gBAAgB,EAAE,CAAC,CAAC;IAC5F,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,oBAAoB,CAAC,KAAa;QAC9C,0CAA0C;QAC1C,8BAA8B;QAC9B,OAAO,CAAC,GAAG,CAAC,2BAA2B,KAAK,EAAE,CAAC,CAAC;IAClD,CAAC;IAED;;OAEG;IACI,EAAE,CACP,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,EAAE,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACnC,CAAC;IAEM,GAAG,CACR,KAAQ,EACR,QAAgD;QAEhD,OAAO,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC;IACpC,CAAC;IAEM,IAAI,CACT,KAAQ,EACR,IAA4B;QAE5B,OAAO,KAAK,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;IACjC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,MAAsB;QAC9C,qDAAqD;QACrD,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,KAAK,CAAC,MAAM,CAAC,IAAI,KAAK,SAAS;gBAC/B,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,IAAI,KAAK,WAAW;gBACtC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,WAAW,KAAK,MAAM;gBACxC,KAAK,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;gBAExB,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC;oBAChD,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO;oBACrB,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBAE1B,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;oBAC7B,iDAAiD;oBACjD,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;wBACtC,OAAO,CAAC,KAAK,CAAC,iCAAiC,MAAM,GAAG,EAAE,GAAG,CAAC,CAAC;oBACjE,CAAC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Simplified certificate event system
|
|
3
|
+
*/
|
|
4
|
+
import type { CertificateError } from '../models/certificate-errors.js';
|
|
5
|
+
/**
|
|
6
|
+
* Certificate event types - only the essentials
|
|
7
|
+
*/
|
|
8
|
+
export declare enum CertificateEvent {
|
|
9
|
+
OBTAINED = "certificate:obtained",
|
|
10
|
+
FAILED = "certificate:failed",
|
|
11
|
+
EXPIRING = "certificate:expiring"
|
|
12
|
+
}
|
|
13
|
+
/**
|
|
14
|
+
* Certificate obtained event data
|
|
15
|
+
*/
|
|
16
|
+
export interface CertificateObtainedEvent {
|
|
17
|
+
domain: string;
|
|
18
|
+
type: 'new' | 'renewed';
|
|
19
|
+
expiresAt: Date;
|
|
20
|
+
source: 'acme-http' | 'acme-dns' | 'static';
|
|
21
|
+
certificate: string;
|
|
22
|
+
privateKey: string;
|
|
23
|
+
}
|
|
24
|
+
/**
|
|
25
|
+
* Certificate failed event data
|
|
26
|
+
*/
|
|
27
|
+
export interface CertificateFailedEvent {
|
|
28
|
+
domain: string;
|
|
29
|
+
error: CertificateError;
|
|
30
|
+
attemptNumber?: number;
|
|
31
|
+
willRetry?: boolean;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Certificate expiring event data
|
|
35
|
+
*/
|
|
36
|
+
export interface CertificateExpiringEvent {
|
|
37
|
+
domain: string;
|
|
38
|
+
expiresAt: Date;
|
|
39
|
+
daysRemaining: number;
|
|
40
|
+
}
|
|
41
|
+
/**
|
|
42
|
+
* Combined event map for TypeScript typing
|
|
43
|
+
*/
|
|
44
|
+
export interface CertificateEventMap {
|
|
45
|
+
[CertificateEvent.OBTAINED]: CertificateObtainedEvent;
|
|
46
|
+
[CertificateEvent.FAILED]: CertificateFailedEvent;
|
|
47
|
+
[CertificateEvent.EXPIRING]: CertificateExpiringEvent;
|
|
48
|
+
}
|
|
49
|
+
/**
|
|
50
|
+
* Type-safe event emitter interface
|
|
51
|
+
*/
|
|
52
|
+
export interface ICertificateEventEmitter {
|
|
53
|
+
on<K extends keyof CertificateEventMap>(event: K, listener: (data: CertificateEventMap[K]) => void): this;
|
|
54
|
+
off<K extends keyof CertificateEventMap>(event: K, listener: (data: CertificateEventMap[K]) => void): this;
|
|
55
|
+
emit<K extends keyof CertificateEventMap>(event: K, data: CertificateEventMap[K]): boolean;
|
|
56
|
+
}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Simplified certificate event system
|
|
3
|
+
*/
|
|
4
|
+
/**
|
|
5
|
+
* Certificate event types - only the essentials
|
|
6
|
+
*/
|
|
7
|
+
export var CertificateEvent;
|
|
8
|
+
(function (CertificateEvent) {
|
|
9
|
+
CertificateEvent["OBTAINED"] = "certificate:obtained";
|
|
10
|
+
CertificateEvent["FAILED"] = "certificate:failed";
|
|
11
|
+
CertificateEvent["EXPIRING"] = "certificate:expiring";
|
|
12
|
+
})(CertificateEvent || (CertificateEvent = {}));
|
|
13
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2ltcGxpZmllZC1ldmVudHMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9jZXJ0aWZpY2F0ZS9ldmVudHMvc2ltcGxpZmllZC1ldmVudHMudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUE7O0dBRUc7QUFJSDs7R0FFRztBQUNILE1BQU0sQ0FBTixJQUFZLGdCQUlYO0FBSkQsV0FBWSxnQkFBZ0I7SUFDMUIscURBQWlDLENBQUE7SUFDakMsaURBQTZCLENBQUE7SUFDN0IscURBQWlDLENBQUE7QUFDbkMsQ0FBQyxFQUpXLGdCQUFnQixLQUFoQixnQkFBZ0IsUUFJM0IifQ==
|
|
@@ -0,0 +1,69 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Structured error types for certificate management
|
|
3
|
+
*/
|
|
4
|
+
export interface CertificateErrorDetails {
|
|
5
|
+
code: string;
|
|
6
|
+
message: string;
|
|
7
|
+
solution?: string;
|
|
8
|
+
domain?: string;
|
|
9
|
+
challengeType?: 'http' | 'dns';
|
|
10
|
+
details?: Record<string, any>;
|
|
11
|
+
cause?: Error;
|
|
12
|
+
}
|
|
13
|
+
/**
|
|
14
|
+
* Certificate-specific error class with structured information
|
|
15
|
+
*/
|
|
16
|
+
export declare class CertificateError extends Error {
|
|
17
|
+
readonly code: string;
|
|
18
|
+
readonly solution?: string;
|
|
19
|
+
readonly domain?: string;
|
|
20
|
+
readonly challengeType?: 'http' | 'dns';
|
|
21
|
+
readonly details?: Record<string, any>;
|
|
22
|
+
readonly cause?: Error;
|
|
23
|
+
constructor(details: CertificateErrorDetails);
|
|
24
|
+
/**
|
|
25
|
+
* Convert error to JSON for logging
|
|
26
|
+
*/
|
|
27
|
+
toJSON(): Record<string, any>;
|
|
28
|
+
}
|
|
29
|
+
/**
|
|
30
|
+
* Common certificate error codes
|
|
31
|
+
*/
|
|
32
|
+
export declare const CertificateErrorCodes: {
|
|
33
|
+
readonly NO_CERT_PROVIDER: "NO_CERT_PROVIDER";
|
|
34
|
+
readonly INVALID_CERT_PROVIDER: "INVALID_CERT_PROVIDER";
|
|
35
|
+
readonly MISSING_ACME_EMAIL: "MISSING_ACME_EMAIL";
|
|
36
|
+
readonly ACME_HTTP_CHALLENGE_FAILED: "ACME_HTTP_CHALLENGE_FAILED";
|
|
37
|
+
readonly ACME_DNS_CHALLENGE_FAILED: "ACME_DNS_CHALLENGE_FAILED";
|
|
38
|
+
readonly ACME_RATE_LIMITED: "ACME_RATE_LIMITED";
|
|
39
|
+
readonly ACME_ACCOUNT_ERROR: "ACME_ACCOUNT_ERROR";
|
|
40
|
+
readonly ACME_VALIDATION_ERROR: "ACME_VALIDATION_ERROR";
|
|
41
|
+
readonly CERTIFICATE_EXPIRED: "CERTIFICATE_EXPIRED";
|
|
42
|
+
readonly CERTIFICATE_INVALID: "CERTIFICATE_INVALID";
|
|
43
|
+
readonly CERTIFICATE_NOT_FOUND: "CERTIFICATE_NOT_FOUND";
|
|
44
|
+
readonly CERTIFICATE_PARSE_ERROR: "CERTIFICATE_PARSE_ERROR";
|
|
45
|
+
readonly STORAGE_READ_ERROR: "STORAGE_READ_ERROR";
|
|
46
|
+
readonly STORAGE_WRITE_ERROR: "STORAGE_WRITE_ERROR";
|
|
47
|
+
readonly STORAGE_PERMISSION_ERROR: "STORAGE_PERMISSION_ERROR";
|
|
48
|
+
readonly NETWORK_TIMEOUT: "NETWORK_TIMEOUT";
|
|
49
|
+
readonly NETWORK_UNREACHABLE: "NETWORK_UNREACHABLE";
|
|
50
|
+
readonly DNS_RESOLUTION_FAILED: "DNS_RESOLUTION_FAILED";
|
|
51
|
+
readonly INVALID_DOMAIN: "INVALID_DOMAIN";
|
|
52
|
+
readonly WILDCARD_NOT_SUPPORTED: "WILDCARD_NOT_SUPPORTED";
|
|
53
|
+
readonly DOMAIN_NOT_CONFIGURED: "DOMAIN_NOT_CONFIGURED";
|
|
54
|
+
};
|
|
55
|
+
/**
|
|
56
|
+
* Helper functions for creating common certificate errors
|
|
57
|
+
*/
|
|
58
|
+
export declare const CertificateErrors: {
|
|
59
|
+
noCertProvider: () => CertificateError;
|
|
60
|
+
invalidCertProvider: (error: Error) => CertificateError;
|
|
61
|
+
missingAcmeEmail: () => CertificateError;
|
|
62
|
+
acmeHttpChallengeFailed: (domain: string, details?: any) => CertificateError;
|
|
63
|
+
acmeDnsChallengeFailed: (domain: string, details?: any) => CertificateError;
|
|
64
|
+
acmeRateLimited: (domain: string, resetTime?: Date) => CertificateError;
|
|
65
|
+
certificateExpired: (domain: string, expiredAt: Date) => CertificateError;
|
|
66
|
+
certificateNotFound: (domain: string) => CertificateError;
|
|
67
|
+
wildcardNotSupported: (domain: string) => CertificateError;
|
|
68
|
+
storageError: (operation: "read" | "write", path: string, error: Error) => CertificateError;
|
|
69
|
+
};
|