web-agent-bridge 3.3.0 → 3.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. package/LICENSE +12 -0
  2. package/README.ar.md +18 -0
  3. package/README.md +198 -1664
  4. package/bin/wab-init.js +223 -0
  5. package/examples/azure-dns-wab.js +83 -0
  6. package/examples/cloudflare-wab-dns.js +121 -0
  7. package/examples/cpanel-wab-dns.js +114 -0
  8. package/examples/dns-discovery-agent.js +166 -0
  9. package/examples/gcp-dns-wab.js +76 -0
  10. package/examples/governance-agent.js +169 -0
  11. package/examples/plesk-wab-dns.js +103 -0
  12. package/examples/route53-wab-dns.js +144 -0
  13. package/examples/safe-mode-agent.js +96 -0
  14. package/examples/wab-sign.js +74 -0
  15. package/examples/wab-verify.js +60 -0
  16. package/package.json +5 -5
  17. package/public/.well-known/wab.json +28 -0
  18. package/public/activate.html +368 -0
  19. package/public/adoption-metrics.html +188 -0
  20. package/public/api.html +1 -1
  21. package/public/azure-dns-integration.html +289 -0
  22. package/public/cloudflare-integration.html +380 -0
  23. package/public/cpanel-integration.html +398 -0
  24. package/public/css/styles.css +28 -0
  25. package/public/dashboard.html +1 -0
  26. package/public/dns.html +101 -172
  27. package/public/docs.html +1 -0
  28. package/public/gcp-dns-integration.html +318 -0
  29. package/public/growth.html +4 -2
  30. package/public/index.html +227 -31
  31. package/public/integrations.html +1 -1
  32. package/public/js/activate.js +145 -0
  33. package/public/js/auth-nav.js +34 -0
  34. package/public/js/dns.js +438 -0
  35. package/public/openapi.json +89 -0
  36. package/public/plesk-integration.html +375 -0
  37. package/public/premium.html +1 -1
  38. package/public/provider-onboarding.html +172 -0
  39. package/public/provider-sandbox.html +134 -0
  40. package/public/providers.html +359 -0
  41. package/public/registrar-integrations.html +141 -0
  42. package/public/robots.txt +12 -0
  43. package/public/route53-integration.html +531 -0
  44. package/public/shieldqr.html +231 -0
  45. package/public/sitemap.xml +6 -0
  46. package/public/wab-trust.html +200 -0
  47. package/public/wab-vs-protocols.html +210 -0
  48. package/public/whitepaper.html +449 -0
  49. package/sdk/auto-discovery.js +288 -0
  50. package/sdk/governance.js +262 -0
  51. package/sdk/index.js +13 -0
  52. package/sdk/package.json +2 -2
  53. package/sdk/safe-mode.js +221 -0
  54. package/server/index.js +144 -5
  55. package/server/migrations/007_governance.sql +106 -0
  56. package/server/migrations/008_plans.sql +144 -0
  57. package/server/migrations/009_shieldqr.sql +30 -0
  58. package/server/migrations/010_extended_trust.sql +33 -0
  59. package/server/models/adapters/mysql.js +1 -1
  60. package/server/models/adapters/postgresql.js +1 -1
  61. package/server/models/db.js +60 -1
  62. package/server/routes/admin-plans.js +76 -0
  63. package/server/routes/admin-premium.js +4 -2
  64. package/server/routes/admin-shieldqr.js +90 -0
  65. package/server/routes/admin-trust-monitor.js +83 -0
  66. package/server/routes/admin.js +289 -1
  67. package/server/routes/billing.js +16 -4
  68. package/server/routes/discovery.js +1933 -2
  69. package/server/routes/governance.js +208 -0
  70. package/server/routes/plans.js +33 -0
  71. package/server/routes/providers.js +650 -0
  72. package/server/routes/shieldqr.js +88 -0
  73. package/server/services/email.js +29 -0
  74. package/server/services/governance.js +466 -0
  75. package/server/services/plans.js +214 -0
  76. package/server/services/premium.js +1 -1
  77. package/server/services/provider-clients.js +740 -0
  78. package/server/services/shieldqr.js +322 -0
  79. package/server/services/ssl-inspector.js +42 -0
  80. package/server/services/ssl-monitor.js +167 -0
  81. package/server/services/stripe.js +18 -5
  82. package/server/services/vision.js +1 -1
  83. package/server/services/wab-crypto.js +178 -0
@@ -0,0 +1,740 @@
1
+ /**
2
+ * provider-clients.js — server-side adapters for managed DNS providers.
3
+ *
4
+ * Each adapter implements:
5
+ * testCredentials(creds, config) -> { ok, detail }
6
+ * listDomains(creds, config) -> [{ domain, zone_id }]
7
+ * enableWAB(creds, config, domain, txtValue) -> { ok, detail, recordId? }
8
+ * disableWAB(creds, config, domain) -> { ok, detail }
9
+ *
10
+ * Credentials are stored AES-256-GCM encrypted in provider_accounts.credentials.
11
+ * They are decrypted only inside this module, in-memory, per request.
12
+ *
13
+ * Outbound requests use safeFetch (SSRF-resistant, redirect-validated).
14
+ */
15
+
16
+ 'use strict';
17
+
18
+ const crypto = require('crypto');
19
+ const { safeFetch } = require('../utils/safe-fetch');
20
+
21
+ /* ───────────────────────────── helpers ──────────────────────────────── */
22
+
23
+ async function jsonOrThrow(res, providerName) {
24
+ const text = await res.text();
25
+ let body = null;
26
+ try { body = text ? JSON.parse(text) : null; } catch { /* keep raw */ }
27
+ if (!res.ok) {
28
+ const detail = (body && (body.error || body.message || body.errors || body.Code)) || text || res.statusText;
29
+ const err = new Error(`${providerName} ${res.status}: ${typeof detail === 'string' ? detail.slice(0, 240) : JSON.stringify(detail).slice(0, 240)}`);
30
+ err.status = res.status;
31
+ err.body = body;
32
+ throw err;
33
+ }
34
+ return body;
35
+ }
36
+
37
+ function withTimeout(ms = 12000, max = 256 * 1024) {
38
+ return { timeoutMs: ms, maxBytes: max };
39
+ }
40
+
41
+ // cPanel + Plesk + WHM commonly use non-standard ports.
42
+ const CPANEL_PORTS = [80, 443, 2082, 2083, 2086, 2087];
43
+ const PLESK_PORTS = [80, 443, 8443, 8880];
44
+ function withCpanelOpts() { return { ...withTimeout(15000, 1024 * 1024), allowedPorts: CPANEL_PORTS }; }
45
+ function withPleskOpts() { return { ...withTimeout(15000, 1024 * 1024), allowedPorts: PLESK_PORTS }; }
46
+
47
+ /* ─────────────────────────── 1. Cloudflare ──────────────────────────── */
48
+ // Credentials: { api_token } — Account/Zone-scoped Cloudflare API token.
49
+
50
+ const cloudflare = {
51
+ type: 'cloudflare',
52
+ label: 'Cloudflare',
53
+ credential_fields: [
54
+ { key: 'api_token', label: 'API Token', type: 'password', required: true,
55
+ help: 'Create at https://dash.cloudflare.com/profile/api-tokens with Zone:Read + Zone:DNS:Edit.' },
56
+ ],
57
+
58
+ async testCredentials({ api_token }) {
59
+ const res = await safeFetch(
60
+ 'https://api.cloudflare.com/client/v4/user/tokens/verify',
61
+ { headers: { Authorization: `Bearer ${api_token}` } },
62
+ withTimeout()
63
+ );
64
+ const body = await jsonOrThrow(res, 'Cloudflare');
65
+ return { ok: !!(body && body.success), detail: (body && body.result && body.result.status) || 'unknown' };
66
+ },
67
+
68
+ async listDomains({ api_token }) {
69
+ const res = await safeFetch(
70
+ 'https://api.cloudflare.com/client/v4/zones?per_page=50',
71
+ { headers: { Authorization: `Bearer ${api_token}` } },
72
+ withTimeout()
73
+ );
74
+ const body = await jsonOrThrow(res, 'Cloudflare');
75
+ return (body.result || []).map(z => ({ domain: z.name, zone_id: z.id, status: z.status }));
76
+ },
77
+
78
+ async _findRecord({ api_token }, zone_id) {
79
+ const url = `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records?type=TXT&name=_wab.${(await this._zoneName({ api_token }, zone_id))}`;
80
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${api_token}` } }, withTimeout());
81
+ const body = await jsonOrThrow(res, 'Cloudflare');
82
+ return (body.result || [])[0] || null;
83
+ },
84
+
85
+ async _zoneName({ api_token }, zone_id) {
86
+ const res = await safeFetch(
87
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}`,
88
+ { headers: { Authorization: `Bearer ${api_token}` } },
89
+ withTimeout()
90
+ );
91
+ const body = await jsonOrThrow(res, 'Cloudflare');
92
+ return body.result.name;
93
+ },
94
+
95
+ async enableWAB({ api_token }, _config, domain, txtValue, opts = {}) {
96
+ const zone_id = opts.zone_id || (await this._zoneIdForDomain({ api_token }, domain));
97
+ if (!zone_id) throw new Error('Zone not found for ' + domain);
98
+ const existing = await this._findRecord({ api_token }, zone_id);
99
+ const payload = { type: 'TXT', name: '_wab', content: txtValue, ttl: 3600 };
100
+ let res;
101
+ if (existing) {
102
+ res = await safeFetch(
103
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records/${existing.id}`,
104
+ { method: 'PUT', headers: { Authorization: `Bearer ${api_token}`, 'Content-Type': 'application/json' }, body: JSON.stringify(payload) },
105
+ withTimeout()
106
+ );
107
+ } else {
108
+ res = await safeFetch(
109
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records`,
110
+ { method: 'POST', headers: { Authorization: `Bearer ${api_token}`, 'Content-Type': 'application/json' }, body: JSON.stringify(payload) },
111
+ withTimeout()
112
+ );
113
+ }
114
+ const body = await jsonOrThrow(res, 'Cloudflare');
115
+ return { ok: !!body.success, recordId: body.result && body.result.id, detail: existing ? 'updated' : 'created' };
116
+ },
117
+
118
+ async disableWAB({ api_token }, _config, domain, opts = {}) {
119
+ const zone_id = opts.zone_id || (await this._zoneIdForDomain({ api_token }, domain));
120
+ if (!zone_id) throw new Error('Zone not found for ' + domain);
121
+ const existing = await this._findRecord({ api_token }, zone_id);
122
+ if (!existing) return { ok: true, detail: 'already-absent' };
123
+ const res = await safeFetch(
124
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records/${existing.id}`,
125
+ { method: 'DELETE', headers: { Authorization: `Bearer ${api_token}` } },
126
+ withTimeout()
127
+ );
128
+ await jsonOrThrow(res, 'Cloudflare');
129
+ return { ok: true, detail: 'deleted' };
130
+ },
131
+
132
+ async _zoneIdForDomain({ api_token }, domain) {
133
+ const res = await safeFetch(
134
+ `https://api.cloudflare.com/client/v4/zones?name=${encodeURIComponent(domain)}`,
135
+ { headers: { Authorization: `Bearer ${api_token}` } },
136
+ withTimeout()
137
+ );
138
+ const body = await jsonOrThrow(res, 'Cloudflare');
139
+ return (body.result || [])[0] && body.result[0].id;
140
+ },
141
+ };
142
+
143
+ /* ─────────────────────────── 2. GoDaddy ─────────────────────────────── */
144
+ // Credentials: { api_key, api_secret }
145
+
146
+ const godaddy = {
147
+ type: 'godaddy',
148
+ label: 'GoDaddy',
149
+ credential_fields: [
150
+ { key: 'api_key', label: 'API Key', type: 'text', required: true },
151
+ { key: 'api_secret', label: 'API Secret', type: 'password', required: true,
152
+ help: 'Production keys at https://developer.godaddy.com/keys (50+ domain accounts only).' },
153
+ ],
154
+
155
+ _hdr({ api_key, api_secret }) {
156
+ return { Authorization: `sso-key ${api_key}:${api_secret}`, 'Content-Type': 'application/json' };
157
+ },
158
+
159
+ async testCredentials(creds) {
160
+ const res = await safeFetch('https://api.godaddy.com/v1/domains?limit=1', { headers: this._hdr(creds) }, withTimeout());
161
+ if (!res.ok) {
162
+ const text = await res.text();
163
+ throw new Error(`GoDaddy ${res.status}: ${text.slice(0, 200)}`);
164
+ }
165
+ return { ok: true, detail: 'auth-ok' };
166
+ },
167
+
168
+ async listDomains(creds) {
169
+ const res = await safeFetch('https://api.godaddy.com/v1/domains?limit=200', { headers: this._hdr(creds) }, withTimeout(15000, 1024 * 1024));
170
+ const body = await jsonOrThrow(res, 'GoDaddy');
171
+ return (body || []).map(d => ({ domain: d.domain, zone_id: null, status: d.status }));
172
+ },
173
+
174
+ async enableWAB(creds, _config, domain, txtValue) {
175
+ const url = `https://api.godaddy.com/v1/domains/${encodeURIComponent(domain)}/records/TXT/_wab`;
176
+ const res = await safeFetch(url, {
177
+ method: 'PUT', headers: this._hdr(creds), body: JSON.stringify([{ data: txtValue, ttl: 3600 }]),
178
+ }, withTimeout());
179
+ if (!res.ok) throw new Error(`GoDaddy ${res.status}: ${await res.text()}`);
180
+ return { ok: true, detail: 'put' };
181
+ },
182
+
183
+ async disableWAB(creds, _config, domain) {
184
+ const url = `https://api.godaddy.com/v1/domains/${encodeURIComponent(domain)}/records/TXT/_wab`;
185
+ const res = await safeFetch(url, {
186
+ method: 'PUT', headers: this._hdr(creds), body: '[]',
187
+ }, withTimeout());
188
+ if (!res.ok) throw new Error(`GoDaddy ${res.status}: ${await res.text()}`);
189
+ return { ok: true, detail: 'cleared' };
190
+ },
191
+ };
192
+
193
+ /* ─────────────────────────── 3. Azure DNS ───────────────────────────── */
194
+ // Credentials: { tenant_id, client_id, client_secret }
195
+ // Config: { subscription_id, resource_group, zone_name }
196
+
197
+ const azure = {
198
+ type: 'azure',
199
+ label: 'Azure DNS',
200
+ credential_fields: [
201
+ { key: 'tenant_id', label: 'Tenant ID', type: 'text', required: true },
202
+ { key: 'client_id', label: 'Client ID (App Registration)', type: 'text', required: true },
203
+ { key: 'client_secret', label: 'Client Secret', type: 'password', required: true,
204
+ help: 'Service Principal must have "DNS Zone Contributor" role on the zone.' },
205
+ ],
206
+ config_fields: [
207
+ { key: 'subscription_id', label: 'Subscription ID', type: 'text', required: true },
208
+ { key: 'resource_group', label: 'Resource Group', type: 'text', required: true },
209
+ { key: 'zone_name', label: 'DNS Zone Name', type: 'text', required: true,
210
+ help: 'The zone you want to manage, e.g. example.com' },
211
+ ],
212
+
213
+ async _accessToken({ tenant_id, client_id, client_secret }) {
214
+ const url = `https://login.microsoftonline.com/${encodeURIComponent(tenant_id)}/oauth2/v2.0/token`;
215
+ const body = new URLSearchParams({
216
+ grant_type: 'client_credentials', client_id, client_secret,
217
+ scope: 'https://management.azure.com/.default',
218
+ });
219
+ const res = await safeFetch(url, {
220
+ method: 'POST', headers: { 'Content-Type': 'application/x-www-form-urlencoded' }, body: body.toString(),
221
+ }, withTimeout());
222
+ const j = await jsonOrThrow(res, 'Azure AD');
223
+ if (!j.access_token) throw new Error('Azure: no access_token returned');
224
+ return j.access_token;
225
+ },
226
+
227
+ async testCredentials(creds, config) {
228
+ const token = await this._accessToken(creds);
229
+ if (!config || !config.subscription_id) return { ok: true, detail: 'auth-ok' };
230
+ const url = `https://management.azure.com/subscriptions/${encodeURIComponent(config.subscription_id)}` +
231
+ (config.resource_group && config.zone_name
232
+ ? `/resourceGroups/${encodeURIComponent(config.resource_group)}/providers/Microsoft.Network/dnsZones/${encodeURIComponent(config.zone_name)}?api-version=2018-05-01`
233
+ : '?api-version=2022-12-01');
234
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${token}` } }, withTimeout());
235
+ if (!res.ok && res.status !== 404) throw new Error(`Azure ${res.status}: ${(await res.text()).slice(0, 240)}`);
236
+ return { ok: true, detail: res.ok ? 'zone-found' : 'auth-ok-zone-missing' };
237
+ },
238
+
239
+ async listDomains(creds, config) {
240
+ if (!config || !config.zone_name) return [];
241
+ return [{ domain: config.zone_name, zone_id: config.zone_name, status: 'configured' }];
242
+ },
243
+
244
+ async enableWAB(creds, config, domain, txtValue) {
245
+ const token = await this._accessToken(creds);
246
+ const url = `https://management.azure.com/subscriptions/${encodeURIComponent(config.subscription_id)}` +
247
+ `/resourceGroups/${encodeURIComponent(config.resource_group)}/providers/Microsoft.Network/dnsZones/` +
248
+ `${encodeURIComponent(config.zone_name)}/TXT/_wab?api-version=2018-05-01`;
249
+ const res = await safeFetch(url, {
250
+ method: 'PUT', headers: { Authorization: `Bearer ${token}`, 'Content-Type': 'application/json' },
251
+ body: JSON.stringify({ properties: { TTL: 3600, TXTRecords: [{ value: [txtValue] }] } }),
252
+ }, withTimeout());
253
+ if (!res.ok) throw new Error(`Azure ${res.status}: ${(await res.text()).slice(0, 240)}`);
254
+ return { ok: true, detail: 'put' };
255
+ },
256
+
257
+ async disableWAB(creds, config) {
258
+ const token = await this._accessToken(creds);
259
+ const url = `https://management.azure.com/subscriptions/${encodeURIComponent(config.subscription_id)}` +
260
+ `/resourceGroups/${encodeURIComponent(config.resource_group)}/providers/Microsoft.Network/dnsZones/` +
261
+ `${encodeURIComponent(config.zone_name)}/TXT/_wab?api-version=2018-05-01`;
262
+ const res = await safeFetch(url, { method: 'DELETE', headers: { Authorization: `Bearer ${token}` } }, withTimeout());
263
+ if (!res.ok && res.status !== 404) throw new Error(`Azure ${res.status}: ${(await res.text()).slice(0, 240)}`);
264
+ return { ok: true, detail: res.status === 404 ? 'already-absent' : 'deleted' };
265
+ },
266
+ };
267
+
268
+ /* ─────────────────────────── 4. GCP DNS ─────────────────────────────── */
269
+ // Credentials: { service_account_json } — full JSON key file pasted in.
270
+
271
+ const gcp = {
272
+ type: 'gcp',
273
+ label: 'Google Cloud DNS',
274
+ credential_fields: [
275
+ { key: 'service_account_json', label: 'Service Account JSON', type: 'textarea', required: true,
276
+ help: 'Paste the full JSON key. Service account must have "DNS Administrator" role.' },
277
+ ],
278
+ config_fields: [
279
+ { key: 'project_id', label: 'Project ID', type: 'text', required: true },
280
+ { key: 'managed_zone', label: 'Managed Zone Name', type: 'text', required: true,
281
+ help: 'Cloud DNS zone resource name (not the DNS name).' },
282
+ ],
283
+
284
+ _parseSA(json) {
285
+ let sa;
286
+ try { sa = typeof json === 'string' ? JSON.parse(json) : json; }
287
+ catch (e) { throw new Error('Invalid service account JSON: ' + e.message); }
288
+ if (!sa.client_email || !sa.private_key) throw new Error('SA JSON missing client_email/private_key');
289
+ return sa;
290
+ },
291
+
292
+ async _accessToken({ service_account_json }) {
293
+ const sa = this._parseSA(service_account_json);
294
+ const now = Math.floor(Date.now() / 1000);
295
+ const header = { alg: 'RS256', typ: 'JWT' };
296
+ const claim = {
297
+ iss: sa.client_email, scope: 'https://www.googleapis.com/auth/ndev.clouddns.readwrite',
298
+ aud: 'https://oauth2.googleapis.com/token', exp: now + 3600, iat: now,
299
+ };
300
+ const b64u = (b) => Buffer.from(b).toString('base64').replace(/=+$/, '').replace(/\+/g, '-').replace(/\//g, '_');
301
+ const headerB = b64u(JSON.stringify(header));
302
+ const claimB = b64u(JSON.stringify(claim));
303
+ const signing = `${headerB}.${claimB}`;
304
+ const sig = crypto.createSign('RSA-SHA256').update(signing).sign(sa.private_key);
305
+ const jwt = `${signing}.${sig.toString('base64').replace(/=+$/, '').replace(/\+/g, '-').replace(/\//g, '_')}`;
306
+
307
+ const res = await safeFetch('https://oauth2.googleapis.com/token', {
308
+ method: 'POST', headers: { 'Content-Type': 'application/x-www-form-urlencoded' },
309
+ body: `grant_type=urn:ietf:params:oauth:grant-type:jwt-bearer&assertion=${encodeURIComponent(jwt)}`,
310
+ }, withTimeout());
311
+ const j = await jsonOrThrow(res, 'Google OAuth');
312
+ return j.access_token;
313
+ },
314
+
315
+ async testCredentials(creds, config) {
316
+ const token = await this._accessToken(creds);
317
+ if (!config || !config.project_id || !config.managed_zone) return { ok: true, detail: 'auth-ok' };
318
+ const url = `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(config.project_id)}/managedZones/${encodeURIComponent(config.managed_zone)}`;
319
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${token}` } }, withTimeout());
320
+ if (!res.ok) throw new Error(`GCP ${res.status}: ${(await res.text()).slice(0, 240)}`);
321
+ return { ok: true, detail: 'zone-found' };
322
+ },
323
+
324
+ async listDomains(creds, config) {
325
+ if (!config || !config.project_id) return [];
326
+ const token = await this._accessToken(creds);
327
+ const res = await safeFetch(
328
+ `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(config.project_id)}/managedZones`,
329
+ { headers: { Authorization: `Bearer ${token}` } }, withTimeout(15000, 1024 * 1024)
330
+ );
331
+ const body = await jsonOrThrow(res, 'GCP');
332
+ return (body.managedZones || []).map(z => ({ domain: (z.dnsName || '').replace(/\.$/, ''), zone_id: z.name, status: z.visibility }));
333
+ },
334
+
335
+ async _existing(token, project_id, managed_zone, fqdn) {
336
+ const url = `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(project_id)}/managedZones/${encodeURIComponent(managed_zone)}/rrsets?name=${encodeURIComponent(fqdn)}&type=TXT`;
337
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${token}` } }, withTimeout());
338
+ const j = await jsonOrThrow(res, 'GCP');
339
+ return (j.rrsets || [])[0] || null;
340
+ },
341
+
342
+ async _change(token, project_id, managed_zone, body) {
343
+ const url = `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(project_id)}/managedZones/${encodeURIComponent(managed_zone)}/changes`;
344
+ const res = await safeFetch(url, {
345
+ method: 'POST', headers: { Authorization: `Bearer ${token}`, 'Content-Type': 'application/json' },
346
+ body: JSON.stringify(body),
347
+ }, withTimeout());
348
+ if (!res.ok) throw new Error(`GCP ${res.status}: ${(await res.text()).slice(0, 240)}`);
349
+ return jsonOrThrow(res, 'GCP');
350
+ },
351
+
352
+ async enableWAB(creds, config, domain, txtValue) {
353
+ const token = await this._accessToken(creds);
354
+ const fqdn = `_wab.${domain}.`;
355
+ const existing = await this._existing(token, config.project_id, config.managed_zone, fqdn);
356
+ const additions = [{ name: fqdn, type: 'TXT', ttl: 3600, rrdatas: [`"${txtValue}"`] }];
357
+ const body = existing ? { additions, deletions: [existing] } : { additions };
358
+ await this._change(token, config.project_id, config.managed_zone, body);
359
+ return { ok: true, detail: existing ? 'updated' : 'created' };
360
+ },
361
+
362
+ async disableWAB(creds, config, domain) {
363
+ const token = await this._accessToken(creds);
364
+ const fqdn = `_wab.${domain}.`;
365
+ const existing = await this._existing(token, config.project_id, config.managed_zone, fqdn);
366
+ if (!existing) return { ok: true, detail: 'already-absent' };
367
+ await this._change(token, config.project_id, config.managed_zone, { deletions: [existing] });
368
+ return { ok: true, detail: 'deleted' };
369
+ },
370
+ };
371
+
372
+ /* ─────────────────────────── 5. Route 53 ────────────────────────────── */
373
+ // Credentials: { access_key_id, secret_access_key }
374
+ // Config: { hosted_zone_id }
375
+
376
+ const route53 = {
377
+ type: 'route53',
378
+ label: 'AWS Route 53',
379
+ credential_fields: [
380
+ { key: 'access_key_id', label: 'AWS Access Key ID', type: 'text', required: true },
381
+ { key: 'secret_access_key', label: 'AWS Secret Access Key', type: 'password', required: true,
382
+ help: 'IAM user/role needs route53:ChangeResourceRecordSets + ListResourceRecordSets on the hosted zone.' },
383
+ ],
384
+ config_fields: [
385
+ { key: 'hosted_zone_id', label: 'Hosted Zone ID', type: 'text', required: true,
386
+ help: 'e.g. Z2FDTNDATAQYW2 — find in Route 53 console.' },
387
+ ],
388
+
389
+ async _sigv4Request({ access_key_id, secret_access_key }, method, path, body, query = '') {
390
+ const region = 'us-east-1';
391
+ const service = 'route53';
392
+ const host = 'route53.amazonaws.com';
393
+ const now = new Date();
394
+ const amzDate = now.toISOString().replace(/[:-]|\.\d{3}/g, '');
395
+ const dateStamp = amzDate.slice(0, 8);
396
+
397
+ const payloadHash = crypto.createHash('sha256').update(body || '').digest('hex');
398
+ const canonHeaders = `host:${host}\nx-amz-date:${amzDate}\n`;
399
+ const signedHeaders = 'host;x-amz-date';
400
+ const canonRequest = [method, path, query, canonHeaders, signedHeaders, payloadHash].join('\n');
401
+
402
+ const algo = 'AWS4-HMAC-SHA256';
403
+ const credScope = `${dateStamp}/${region}/${service}/aws4_request`;
404
+ const stringToSign = [algo, amzDate, credScope, crypto.createHash('sha256').update(canonRequest).digest('hex')].join('\n');
405
+
406
+ const kDate = crypto.createHmac('sha256', 'AWS4' + secret_access_key).update(dateStamp).digest();
407
+ const kRegion = crypto.createHmac('sha256', kDate).update(region).digest();
408
+ const kService = crypto.createHmac('sha256', kRegion).update(service).digest();
409
+ const kSigning = crypto.createHmac('sha256', kService).update('aws4_request').digest();
410
+ const sig = crypto.createHmac('sha256', kSigning).update(stringToSign).digest('hex');
411
+
412
+ const auth = `${algo} Credential=${access_key_id}/${credScope}, SignedHeaders=${signedHeaders}, Signature=${sig}`;
413
+ return {
414
+ url: `https://${host}${path}${query ? '?' + query : ''}`,
415
+ headers: { 'Authorization': auth, 'x-amz-date': amzDate, 'Content-Type': 'text/xml' },
416
+ };
417
+ },
418
+
419
+ async testCredentials(creds, config) {
420
+ const path = config && config.hosted_zone_id
421
+ ? `/2013-04-01/hostedzone/${config.hosted_zone_id}`
422
+ : '/2013-04-01/hostedzone';
423
+ const sig = await this._sigv4Request(creds, 'GET', path, '');
424
+ const res = await safeFetch(sig.url, { headers: sig.headers }, withTimeout());
425
+ if (!res.ok) throw new Error(`Route 53 ${res.status}: ${(await res.text()).slice(0, 240)}`);
426
+ return { ok: true, detail: 'auth-ok' };
427
+ },
428
+
429
+ async listDomains(creds) {
430
+ const sig = await this._sigv4Request(creds, 'GET', '/2013-04-01/hostedzone', '');
431
+ const res = await safeFetch(sig.url, { headers: sig.headers }, withTimeout(15000, 1024 * 1024));
432
+ if (!res.ok) throw new Error(`Route 53 ${res.status}`);
433
+ const xml = await res.text();
434
+ const out = [];
435
+ const re = /<HostedZone>[\s\S]*?<Id>\/hostedzone\/([^<]+)<\/Id>[\s\S]*?<Name>([^<]+)<\/Name>/g;
436
+ let m; while ((m = re.exec(xml))) out.push({ domain: m[2].replace(/\.$/, ''), zone_id: m[1] });
437
+ return out;
438
+ },
439
+
440
+ _changeBody(action, fqdn, txtValue) {
441
+ const escaped = txtValue.replace(/"/g, '\\"');
442
+ return `<?xml version="1.0" encoding="UTF-8"?>
443
+ <ChangeResourceRecordSetsRequest xmlns="https://route53.amazonaws.com/doc/2013-04-01/">
444
+ <ChangeBatch><Changes><Change>
445
+ <Action>${action}</Action>
446
+ <ResourceRecordSet>
447
+ <Name>${fqdn}</Name><Type>TXT</Type><TTL>3600</TTL>
448
+ <ResourceRecords><ResourceRecord><Value>"${escaped}"</Value></ResourceRecord></ResourceRecords>
449
+ </ResourceRecordSet>
450
+ </Change></Changes></ChangeBatch>
451
+ </ChangeResourceRecordSetsRequest>`;
452
+ },
453
+
454
+ async enableWAB(creds, config, domain, txtValue) {
455
+ const fqdn = `_wab.${domain}.`;
456
+ const body = this._changeBody('UPSERT', fqdn, txtValue);
457
+ const sig = await this._sigv4Request(creds, 'POST', `/2013-04-01/hostedzone/${config.hosted_zone_id}/rrset/`, body);
458
+ const res = await safeFetch(sig.url, { method: 'POST', headers: sig.headers, body }, withTimeout());
459
+ if (!res.ok) throw new Error(`Route 53 ${res.status}: ${(await res.text()).slice(0, 240)}`);
460
+ return { ok: true, detail: 'upsert' };
461
+ },
462
+
463
+ async disableWAB(creds, config, domain) {
464
+ const fqdn = `_wab.${domain}.`;
465
+ // Need the existing TXT first to construct DELETE
466
+ const path = `/2013-04-01/hostedzone/${config.hosted_zone_id}/rrset/`;
467
+ const query = `name=${encodeURIComponent(fqdn)}&type=TXT&maxitems=1`;
468
+ const sig0 = await this._sigv4Request(creds, 'GET', path, '', query);
469
+ const r0 = await safeFetch(sig0.url, { headers: sig0.headers }, withTimeout());
470
+ if (!r0.ok) throw new Error(`Route 53 ${r0.status}`);
471
+ const xml = await r0.text();
472
+ const m = /<ResourceRecordSet>([\s\S]*?<Name>_wab\.[\s\S]*?)<\/ResourceRecordSet>/i.exec(xml);
473
+ if (!m) return { ok: true, detail: 'already-absent' };
474
+ const valMatch = /<Value>"?([^<"]+)"?<\/Value>/.exec(m[1]);
475
+ if (!valMatch) return { ok: true, detail: 'already-absent' };
476
+ const body = this._changeBody('DELETE', fqdn, valMatch[1]);
477
+ const sig = await this._sigv4Request(creds, 'POST', path, body);
478
+ const res = await safeFetch(sig.url, { method: 'POST', headers: sig.headers, body }, withTimeout());
479
+ if (!res.ok) throw new Error(`Route 53 ${res.status}: ${(await res.text()).slice(0, 240)}`);
480
+ return { ok: true, detail: 'deleted' };
481
+ },
482
+ };
483
+
484
+ /* ─────────────────────────── 6. cPanel ──────────────────────────────── */
485
+ // Credentials: { username, api_token } + Config: { server_url }
486
+
487
+ const cpanel = {
488
+ type: 'cpanel',
489
+ label: 'cPanel / WHM',
490
+ credential_fields: [
491
+ { key: 'username', label: 'cPanel Username', type: 'text', required: true },
492
+ { key: 'api_token', label: 'API Token', type: 'password', required: true,
493
+ help: 'Create at cPanel → Manage API Tokens.' },
494
+ ],
495
+ config_fields: [
496
+ { key: 'server_url', label: 'cPanel Server URL', type: 'text', required: true,
497
+ help: 'e.g. https://cpanel.example.com:2083 — must be HTTPS.' },
498
+ ],
499
+
500
+ _hdr({ username, api_token }) { return { Authorization: `cpanel ${username}:${api_token}` }; },
501
+
502
+ _validateUrl(server_url) {
503
+ if (!/^https:\/\//i.test(server_url)) throw new Error('cPanel server_url must be HTTPS');
504
+ return server_url.replace(/\/+$/, '');
505
+ },
506
+
507
+ async testCredentials(creds, config) {
508
+ const base = this._validateUrl(config.server_url);
509
+ const url = `${base}/execute/DomainInfo/list_domains`;
510
+ const res = await safeFetch(url, { headers: this._hdr(creds) }, withCpanelOpts());
511
+ const j = await jsonOrThrow(res, 'cPanel');
512
+ if (j.errors && j.errors.length) throw new Error('cPanel: ' + j.errors.join('; '));
513
+ return { ok: true, detail: 'auth-ok' };
514
+ },
515
+
516
+ async listDomains(creds, config) {
517
+ const base = this._validateUrl(config.server_url);
518
+ const res = await safeFetch(`${base}/execute/DomainInfo/list_domains`, { headers: this._hdr(creds) }, withCpanelOpts());
519
+ const j = await jsonOrThrow(res, 'cPanel');
520
+ const data = j.data || {};
521
+ const out = [];
522
+ if (data.main_domain) out.push({ domain: data.main_domain, zone_id: data.main_domain });
523
+ for (const d of data.addon_domains || []) out.push({ domain: d, zone_id: d });
524
+ for (const d of data.parked_domains || []) out.push({ domain: d, zone_id: d });
525
+ return out;
526
+ },
527
+
528
+ async enableWAB(creds, config, domain, txtValue) {
529
+ const base = this._validateUrl(config.server_url);
530
+ const url = `${base}/execute/ZoneEdit/add_zone_record?domain=${encodeURIComponent(domain)}&name=_wab&type=TXT&txtdata=${encodeURIComponent(txtValue)}&ttl=3600`;
531
+ const res = await safeFetch(url, { headers: this._hdr(creds) }, withCpanelOpts());
532
+ const j = await jsonOrThrow(res, 'cPanel');
533
+ if (j.errors && j.errors.length) throw new Error('cPanel: ' + j.errors.join('; '));
534
+ return { ok: true, detail: 'added' };
535
+ },
536
+
537
+ async disableWAB(creds, config, domain) {
538
+ const base = this._validateUrl(config.server_url);
539
+ const fetchUrl = `${base}/execute/ZoneEdit/fetchzone?domain=${encodeURIComponent(domain)}`;
540
+ const fr = await safeFetch(fetchUrl, { headers: this._hdr(creds) }, withCpanelOpts());
541
+ const fj = await jsonOrThrow(fr, 'cPanel');
542
+ const records = (fj.data && fj.data.record) || [];
543
+ const found = records.find(r => r.type === 'TXT' && (r.name === `_wab.${domain}.` || r.name === '_wab'));
544
+ if (!found) return { ok: true, detail: 'already-absent' };
545
+ const url = `${base}/execute/ZoneEdit/remove_zone_record?domain=${encodeURIComponent(domain)}&line=${found.line}`;
546
+ const res = await safeFetch(url, { headers: this._hdr(creds) }, withCpanelOpts());
547
+ const j = await jsonOrThrow(res, 'cPanel');
548
+ if (j.errors && j.errors.length) throw new Error('cPanel: ' + j.errors.join('; '));
549
+ return { ok: true, detail: 'removed' };
550
+ },
551
+ };
552
+
553
+ /* ─────────────────────────── 7. Plesk ───────────────────────────────── */
554
+ // Credentials: { api_key | username+password } + Config: { server_url }
555
+
556
+ const plesk = {
557
+ type: 'plesk',
558
+ label: 'Plesk',
559
+ credential_fields: [
560
+ { key: 'api_key', label: 'API Key', type: 'password', required: true,
561
+ help: 'Plesk → Tools & Settings → REST API → Generate API Key.' },
562
+ ],
563
+ config_fields: [
564
+ { key: 'server_url', label: 'Plesk Server URL', type: 'text', required: true,
565
+ help: 'e.g. https://plesk.example.com:8443 — must be HTTPS.' },
566
+ ],
567
+
568
+ _validateUrl(server_url) {
569
+ if (!/^https:\/\//i.test(server_url)) throw new Error('Plesk server_url must be HTTPS');
570
+ return server_url.replace(/\/+$/, '');
571
+ },
572
+
573
+ _hdr({ api_key }) { return { 'X-API-Key': api_key, 'Content-Type': 'application/json' }; },
574
+
575
+ async testCredentials(creds, config) {
576
+ const base = this._validateUrl(config.server_url);
577
+ const res = await safeFetch(`${base}/api/v2/server`, { headers: this._hdr(creds) }, withPleskOpts());
578
+ if (!res.ok) throw new Error(`Plesk ${res.status}: ${(await res.text()).slice(0, 240)}`);
579
+ return { ok: true, detail: 'auth-ok' };
580
+ },
581
+
582
+ async listDomains(creds, config) {
583
+ const base = this._validateUrl(config.server_url);
584
+ const res = await safeFetch(`${base}/api/v2/domains`, { headers: this._hdr(creds) }, withPleskOpts());
585
+ const j = await jsonOrThrow(res, 'Plesk');
586
+ return (j || []).map(d => ({ domain: d.name, zone_id: d.id, status: d.hosting_type }));
587
+ },
588
+
589
+ async _findRecordId(creds, base, domain) {
590
+ const res = await safeFetch(`${base}/api/v2/dns/records?domain=${encodeURIComponent(domain)}`, { headers: this._hdr(creds) }, withPleskOpts());
591
+ const j = await jsonOrThrow(res, 'Plesk');
592
+ const found = (j || []).find(r => r.type === 'TXT' && (r.host === `_wab.${domain}.` || r.host === '_wab'));
593
+ return found ? found.id : null;
594
+ },
595
+
596
+ async enableWAB(creds, config, domain, txtValue) {
597
+ const base = this._validateUrl(config.server_url);
598
+ const existingId = await this._findRecordId(creds, base, domain);
599
+ if (existingId) {
600
+ await safeFetch(`${base}/api/v2/dns/records/${existingId}`, { method: 'DELETE', headers: this._hdr(creds) }, withPleskOpts());
601
+ }
602
+ const res = await safeFetch(`${base}/api/v2/dns/records`, {
603
+ method: 'POST', headers: this._hdr(creds),
604
+ body: JSON.stringify({ domain, type: 'TXT', host: '_wab', value: txtValue, ttl: 3600 }),
605
+ }, withPleskOpts());
606
+ if (!res.ok) throw new Error(`Plesk ${res.status}: ${(await res.text()).slice(0, 240)}`);
607
+ return { ok: true, detail: existingId ? 'replaced' : 'created' };
608
+ },
609
+
610
+ async disableWAB(creds, config, domain) {
611
+ const base = this._validateUrl(config.server_url);
612
+ const existingId = await this._findRecordId(creds, base, domain);
613
+ if (!existingId) return { ok: true, detail: 'already-absent' };
614
+ const res = await safeFetch(`${base}/api/v2/dns/records/${existingId}`, { method: 'DELETE', headers: this._hdr(creds) }, withPleskOpts());
615
+ if (!res.ok) throw new Error(`Plesk ${res.status}: ${(await res.text()).slice(0, 240)}`);
616
+ return { ok: true, detail: 'deleted' };
617
+ },
618
+ };
619
+
620
+ /* ─────────────────────────── 8. Namecheap ───────────────────────────── */
621
+ // Credentials: { api_user, api_key, client_ip }
622
+
623
+ const namecheap = {
624
+ type: 'namecheap',
625
+ label: 'Namecheap',
626
+ credential_fields: [
627
+ { key: 'api_user', label: 'API User', type: 'text', required: true },
628
+ { key: 'api_key', label: 'API Key', type: 'password', required: true,
629
+ help: 'Enable API at https://ap.www.namecheap.com/settings/tools/apiaccess/' },
630
+ { key: 'client_ip', label: 'Whitelisted IP', type: 'text', required: true,
631
+ help: 'Server-side calls require IP allow-listing. Use this server\'s public IP.' },
632
+ ],
633
+
634
+ async _call(creds, command, params = {}) {
635
+ const url = new URL('https://api.namecheap.com/xml.response');
636
+ url.searchParams.set('ApiUser', creds.api_user);
637
+ url.searchParams.set('UserName', creds.api_user);
638
+ url.searchParams.set('ApiKey', creds.api_key);
639
+ url.searchParams.set('ClientIp', creds.client_ip);
640
+ url.searchParams.set('Command', command);
641
+ for (const [k, v] of Object.entries(params)) url.searchParams.set(k, v);
642
+ const res = await safeFetch(url.toString(), {}, withTimeout(15000, 512 * 1024));
643
+ const xml = await res.text();
644
+ if (xml.includes('Status="ERROR"')) {
645
+ const m = /<Error[^>]*>([^<]+)<\/Error>/.exec(xml);
646
+ throw new Error('Namecheap: ' + (m ? m[1] : 'unknown error'));
647
+ }
648
+ return xml;
649
+ },
650
+
651
+ async testCredentials(creds) {
652
+ await this._call(creds, 'namecheap.domains.getList', { PageSize: '10' });
653
+ return { ok: true, detail: 'auth-ok' };
654
+ },
655
+
656
+ async listDomains(creds) {
657
+ const xml = await this._call(creds, 'namecheap.domains.getList', { PageSize: '100' });
658
+ const out = [];
659
+ const re = /<Domain[^>]*Name="([^"]+)"[^>]*>/g;
660
+ let m; while ((m = re.exec(xml))) out.push({ domain: m[1], zone_id: null });
661
+ return out;
662
+ },
663
+
664
+ _splitDomain(domain) {
665
+ const parts = domain.split('.');
666
+ if (parts.length < 2) throw new Error('Invalid domain: ' + domain);
667
+ return { sld: parts[0], tld: parts.slice(1).join('.') };
668
+ },
669
+
670
+ async _getHosts(creds, sld, tld) {
671
+ const xml = await this._call(creds, 'namecheap.domains.dns.getHosts', { SLD: sld, TLD: tld });
672
+ const out = [];
673
+ const re = /<host\s+([^/]+)\/>/g;
674
+ let m;
675
+ while ((m = re.exec(xml))) {
676
+ const attrs = {};
677
+ const ar = /(\w+)="([^"]*)"/g;
678
+ let am; while ((am = ar.exec(m[1]))) attrs[am[1]] = am[2];
679
+ out.push({
680
+ Name: attrs.Name, Type: attrs.Type, Address: attrs.Address,
681
+ MXPref: attrs.MXPref || '10', TTL: attrs.TTL || '1800',
682
+ });
683
+ }
684
+ return out;
685
+ },
686
+
687
+ async _setHosts(creds, sld, tld, hosts) {
688
+ const params = { SLD: sld, TLD: tld };
689
+ hosts.forEach((h, i) => {
690
+ const n = i + 1;
691
+ params[`HostName${n}`] = h.Name;
692
+ params[`RecordType${n}`] = h.Type;
693
+ params[`Address${n}`] = h.Address;
694
+ params[`MXPref${n}`] = h.MXPref || '10';
695
+ params[`TTL${n}`] = h.TTL || '1800';
696
+ });
697
+ await this._call(creds, 'namecheap.domains.dns.setHosts', params);
698
+ },
699
+
700
+ async enableWAB(creds, _config, domain, txtValue) {
701
+ const { sld, tld } = this._splitDomain(domain);
702
+ const existing = await this._getHosts(creds, sld, tld);
703
+ const others = existing.filter(h => !(h.Type === 'TXT' && h.Name === '_wab'));
704
+ const next = [...others, { Name: '_wab', Type: 'TXT', Address: txtValue, MXPref: '10', TTL: '1800' }];
705
+ await this._setHosts(creds, sld, tld, next);
706
+ return { ok: true, detail: `set ${next.length} hosts` };
707
+ },
708
+
709
+ async disableWAB(creds, _config, domain) {
710
+ const { sld, tld } = this._splitDomain(domain);
711
+ const existing = await this._getHosts(creds, sld, tld);
712
+ const others = existing.filter(h => !(h.Type === 'TXT' && h.Name === '_wab'));
713
+ if (others.length === existing.length) return { ok: true, detail: 'already-absent' };
714
+ await this._setHosts(creds, sld, tld, others);
715
+ return { ok: true, detail: 'cleared' };
716
+ },
717
+ };
718
+
719
+ /* ─────────────────────────── registry ───────────────────────────────── */
720
+
721
+ const adapters = {
722
+ cloudflare, route53, azure, gcp, cpanel, plesk, godaddy, namecheap,
723
+ };
724
+
725
+ function getAdapter(type) {
726
+ const a = adapters[type];
727
+ if (!a) throw new Error('Unknown provider type: ' + type);
728
+ return a;
729
+ }
730
+
731
+ function listProviders() {
732
+ return Object.values(adapters).map(a => ({
733
+ type: a.type,
734
+ label: a.label,
735
+ credential_fields: a.credential_fields,
736
+ config_fields: a.config_fields || [],
737
+ }));
738
+ }
739
+
740
+ module.exports = { getAdapter, listProviders };