web-agent-bridge 3.3.0 → 3.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. package/LICENSE +12 -0
  2. package/README.ar.md +18 -0
  3. package/README.md +198 -1664
  4. package/bin/wab-init.js +223 -0
  5. package/examples/azure-dns-wab.js +83 -0
  6. package/examples/cloudflare-wab-dns.js +121 -0
  7. package/examples/cpanel-wab-dns.js +114 -0
  8. package/examples/dns-discovery-agent.js +166 -0
  9. package/examples/gcp-dns-wab.js +76 -0
  10. package/examples/governance-agent.js +169 -0
  11. package/examples/plesk-wab-dns.js +103 -0
  12. package/examples/route53-wab-dns.js +144 -0
  13. package/examples/safe-mode-agent.js +96 -0
  14. package/examples/wab-sign.js +74 -0
  15. package/examples/wab-verify.js +60 -0
  16. package/package.json +5 -5
  17. package/public/.well-known/wab.json +28 -0
  18. package/public/activate.html +368 -0
  19. package/public/adoption-metrics.html +188 -0
  20. package/public/api.html +1 -1
  21. package/public/azure-dns-integration.html +289 -0
  22. package/public/cloudflare-integration.html +380 -0
  23. package/public/cpanel-integration.html +398 -0
  24. package/public/css/styles.css +28 -0
  25. package/public/dashboard.html +1 -0
  26. package/public/dns.html +101 -172
  27. package/public/docs.html +1 -0
  28. package/public/gcp-dns-integration.html +318 -0
  29. package/public/growth.html +4 -2
  30. package/public/index.html +227 -31
  31. package/public/integrations.html +1 -1
  32. package/public/js/activate.js +145 -0
  33. package/public/js/auth-nav.js +34 -0
  34. package/public/js/dns.js +438 -0
  35. package/public/openapi.json +89 -0
  36. package/public/plesk-integration.html +375 -0
  37. package/public/premium.html +1 -1
  38. package/public/provider-onboarding.html +172 -0
  39. package/public/provider-sandbox.html +134 -0
  40. package/public/providers.html +359 -0
  41. package/public/registrar-integrations.html +141 -0
  42. package/public/robots.txt +12 -0
  43. package/public/route53-integration.html +531 -0
  44. package/public/shieldqr.html +231 -0
  45. package/public/sitemap.xml +6 -0
  46. package/public/wab-trust.html +200 -0
  47. package/public/wab-vs-protocols.html +210 -0
  48. package/public/whitepaper.html +449 -0
  49. package/sdk/auto-discovery.js +288 -0
  50. package/sdk/governance.js +262 -0
  51. package/sdk/index.js +13 -0
  52. package/sdk/package.json +2 -2
  53. package/sdk/safe-mode.js +221 -0
  54. package/server/index.js +144 -5
  55. package/server/migrations/007_governance.sql +106 -0
  56. package/server/migrations/008_plans.sql +144 -0
  57. package/server/migrations/009_shieldqr.sql +30 -0
  58. package/server/migrations/010_extended_trust.sql +33 -0
  59. package/server/models/adapters/mysql.js +1 -1
  60. package/server/models/adapters/postgresql.js +1 -1
  61. package/server/models/db.js +60 -1
  62. package/server/routes/admin-plans.js +76 -0
  63. package/server/routes/admin-premium.js +4 -2
  64. package/server/routes/admin-shieldqr.js +90 -0
  65. package/server/routes/admin-trust-monitor.js +83 -0
  66. package/server/routes/admin.js +289 -1
  67. package/server/routes/billing.js +16 -4
  68. package/server/routes/discovery.js +1933 -2
  69. package/server/routes/governance.js +208 -0
  70. package/server/routes/plans.js +33 -0
  71. package/server/routes/providers.js +650 -0
  72. package/server/routes/shieldqr.js +88 -0
  73. package/server/services/email.js +29 -0
  74. package/server/services/governance.js +466 -0
  75. package/server/services/plans.js +214 -0
  76. package/server/services/premium.js +1 -1
  77. package/server/services/provider-clients.js +740 -0
  78. package/server/services/shieldqr.js +322 -0
  79. package/server/services/ssl-inspector.js +42 -0
  80. package/server/services/ssl-monitor.js +167 -0
  81. package/server/services/stripe.js +18 -5
  82. package/server/services/vision.js +1 -1
  83. package/server/services/wab-crypto.js +178 -0
@@ -0,0 +1,322 @@
1
+ /**
2
+ * WAB ShieldQR — verification service
3
+ * --------------------------------------------------------------
4
+ * Given a URL extracted from a QR code (or any short link), verify whether
5
+ * it's safe to open. Layered checks:
6
+ *
7
+ * 1. Heuristic risk score (shorteners, brand-new TLDs, IP literals, etc.)
8
+ * 2. DNS Discovery — TXT lookup on _wab.{domain} and _wab-trust.{domain}
9
+ * 3. Cryptographic Trust — fetch /.well-known/wab.json and verify
10
+ * Ed25519 signature against the public key advertised in the TXT record.
11
+ * 4. SSL/TLS health — fetch the cert, compare thumbprint, check expiry.
12
+ *
13
+ * The result is a *level* (green / yellow / red) plus a structured
14
+ * `signals[]` array so a UI can show a human-readable explanation.
15
+ *
16
+ * No third-party deps — only Node built-ins (`dns/promises`, `tls`,
17
+ * `crypto`, `https`).
18
+ */
19
+ 'use strict';
20
+
21
+ const dns = require('node:dns').promises;
22
+ const tls = require('node:tls');
23
+ const crypto = require('node:crypto');
24
+ const https = require('node:https');
25
+ const http = require('node:http');
26
+
27
+ const SHORTENER_HOSTS = new Set([
28
+ 'bit.ly', 't.co', 'tinyurl.com', 'goo.gl', 'ow.ly', 'is.gd', 'buff.ly',
29
+ 'cutt.ly', 'rebrand.ly', 'shorturl.at', 'tiny.cc', 'rb.gy', 'lnkd.in',
30
+ ]);
31
+
32
+ const FETCH_TIMEOUT_MS = 4000;
33
+ const MAX_BODY_BYTES = 64 * 1024;
34
+
35
+ // ─── Public API ───────────────────────────────────────────────────────
36
+
37
+ /**
38
+ * Inspect a single URL. Always resolves; never throws.
39
+ * @param {string} input raw URL or string from a QR scan
40
+ * @returns {Promise<{level:'green'|'yellow'|'red', score:number, url:string|null,
41
+ * host:string|null, signals:Array, dns:any, trust:any, ssl:any, generated_at:string}>}
42
+ */
43
+ async function scan(input) {
44
+ const t0 = Date.now();
45
+ const out = {
46
+ level: 'yellow',
47
+ score: 50,
48
+ url: null,
49
+ host: null,
50
+ signals: [],
51
+ dns: null,
52
+ trust: null,
53
+ ssl: null,
54
+ generated_at: new Date().toISOString(),
55
+ elapsed_ms: 0,
56
+ };
57
+
58
+ const parsed = parseUrl(input);
59
+ if (!parsed) {
60
+ out.level = 'red';
61
+ out.score = 0;
62
+ out.signals.push({ id: 'invalid_url', severity: 'high', message: 'Cannot parse a URL from input' });
63
+ out.elapsed_ms = Date.now() - t0;
64
+ return out;
65
+ }
66
+ out.url = parsed.href;
67
+ out.host = parsed.hostname;
68
+
69
+ // 1. Static heuristics
70
+ applyHeuristics(parsed, out);
71
+
72
+ // 2. DNS Discovery (parallel TXT lookups)
73
+ const [discovery, trust] = await Promise.all([
74
+ safeTxt(`_wab.${parsed.hostname}`),
75
+ safeTxt(`_wab-trust.${parsed.hostname}`),
76
+ ]);
77
+ out.dns = { discovery, trust };
78
+ if (discovery.records.length) {
79
+ out.signals.push({ id: 'wab_dns', severity: 'good', message: `_wab TXT record found at ${parsed.hostname}` });
80
+ }
81
+ if (trust.records.length) {
82
+ out.signals.push({ id: 'wab_trust_dns', severity: 'good', message: `_wab-trust TXT record found` });
83
+ }
84
+
85
+ // 3. Cryptographic trust (only if DNS announced a key)
86
+ const wabFields = parseWabTxt(discovery.records.concat(trust.records));
87
+ if (wabFields.pk || wabFields.endpoint) {
88
+ out.trust = await verifyTrust(parsed, wabFields).catch((e) => ({ ok: false, error: String(e?.message || e) }));
89
+ if (out.trust.ok) {
90
+ out.signals.push({ id: 'signature_ok', severity: 'good', message: 'Ed25519 signature verified against DNS public key' });
91
+ } else if (out.trust && out.trust.error) {
92
+ out.signals.push({ id: 'signature_fail', severity: 'high', message: `Trust check failed: ${out.trust.error}` });
93
+ }
94
+ }
95
+
96
+ // 4. SSL/TLS — only over HTTPS hosts
97
+ if (parsed.protocol === 'https:') {
98
+ out.ssl = await inspectSsl(parsed.hostname, parsed.port ? Number(parsed.port) : 443).catch((e) => ({ ok: false, error: String(e?.message || e) }));
99
+ if (out.ssl.ok) {
100
+ const daysLeft = out.ssl.days_until_expiry;
101
+ if (daysLeft != null && daysLeft < 0) {
102
+ out.signals.push({ id: 'ssl_expired', severity: 'high', message: `SSL certificate expired ${-daysLeft}d ago` });
103
+ } else if (daysLeft != null && daysLeft < 7) {
104
+ out.signals.push({ id: 'ssl_expiring', severity: 'medium', message: `SSL certificate expires in ${daysLeft} days` });
105
+ }
106
+ if (wabFields.ssl_thumbprint && out.ssl.fingerprint_sha256 &&
107
+ wabFields.ssl_thumbprint.toLowerCase() !== out.ssl.fingerprint_sha256.toLowerCase()) {
108
+ out.signals.push({ id: 'ssl_thumbprint_mismatch', severity: 'high',
109
+ message: 'SSL fingerprint does not match the value advertised via _wab DNS' });
110
+ }
111
+ }
112
+ }
113
+
114
+ // 4b. Extended Trust — Fallback mode.
115
+ // If SSL is degraded (expired / expiring / mismatch) BUT we have a
116
+ // cryptographically verified Ed25519 signature, surface a "partial trust"
117
+ // signal so the verdict stays yellow instead of crashing to red.
118
+ const sslDegraded = out.signals.some((s) =>
119
+ ['ssl_expired', 'ssl_expiring', 'ssl_thumbprint_mismatch'].includes(s.id));
120
+ if (sslDegraded && out.trust && out.trust.ok) {
121
+ out.signals.push({ id: 'fallback_trust', severity: 'good',
122
+ message: 'Partial trust — SSL is degraded but the WAB Ed25519 signature is valid' });
123
+ out.fallback_trust = true;
124
+ }
125
+
126
+ // 5. Final level — combine signals
127
+ const verdict = computeLevel(out.signals, !!out.trust?.ok);
128
+ out.level = verdict.level;
129
+ out.score = verdict.score;
130
+ out.elapsed_ms = Date.now() - t0;
131
+ return out;
132
+ }
133
+
134
+ // ─── Helpers ──────────────────────────────────────────────────────────
135
+
136
+ function parseUrl(input) {
137
+ if (!input || typeof input !== 'string') { return null; }
138
+ let s = input.trim();
139
+ if (!/^[a-z][a-z0-9+.-]*:\/\//i.test(s)) { s = 'https://' + s; }
140
+ try { return new URL(s); } catch { return null; }
141
+ }
142
+
143
+ function applyHeuristics(parsed, out) {
144
+ const host = parsed.hostname.toLowerCase();
145
+ // IP-literal hosts are suspicious
146
+ if (/^\d+\.\d+\.\d+\.\d+$/.test(host) || host.includes(':')) {
147
+ out.signals.push({ id: 'ip_literal_host', severity: 'high', message: 'URL points to a raw IP address' });
148
+ }
149
+ if (SHORTENER_HOSTS.has(host)) {
150
+ out.signals.push({ id: 'shortener', severity: 'medium', message: `URL uses a shortener domain (${host})` });
151
+ }
152
+ if (parsed.protocol === 'http:') {
153
+ out.signals.push({ id: 'plain_http', severity: 'medium', message: 'URL uses plain HTTP (no TLS)' });
154
+ }
155
+ // Punycode / homoglyph hint
156
+ if (host.includes('xn--')) {
157
+ out.signals.push({ id: 'punycode', severity: 'medium', message: 'Hostname uses Punycode (possible homoglyph attack)' });
158
+ }
159
+ // Excessive subdomains
160
+ if (host.split('.').length > 5) {
161
+ out.signals.push({ id: 'deep_subdomain', severity: 'low', message: 'Hostname has unusually many subdomain levels' });
162
+ }
163
+ }
164
+
165
+ async function safeTxt(name) {
166
+ try {
167
+ const records = await dns.resolveTxt(name);
168
+ return { name, records: records.map((parts) => parts.join('')), error: null };
169
+ } catch (err) {
170
+ return { name, records: [], error: err.code || String(err.message || err) };
171
+ }
172
+ }
173
+
174
+ /**
175
+ * Parse `key=value;` style fields out of TXT records that begin with `v=wab1`.
176
+ * Returns merged object with at least:
177
+ * v, endpoint, pk, ssl_thumbprint, ssl_expires, shieldqr
178
+ */
179
+ function parseWabTxt(rawRecords) {
180
+ const out = {};
181
+ for (const rec of rawRecords) {
182
+ if (!/v\s*=\s*wab1/i.test(rec)) { continue; }
183
+ const parts = rec.split(';').map((p) => p.trim()).filter(Boolean);
184
+ for (const p of parts) {
185
+ const eq = p.indexOf('=');
186
+ if (eq < 0) { continue; }
187
+ const k = p.slice(0, eq).trim().toLowerCase();
188
+ const v = p.slice(eq + 1).trim();
189
+ if (k && v && !out[k]) { out[k] = v; }
190
+ }
191
+ }
192
+ return out;
193
+ }
194
+
195
+ async function verifyTrust(parsed, wabFields) {
196
+ const base = wabFields.endpoint && /^https?:\/\//i.test(wabFields.endpoint)
197
+ ? wabFields.endpoint
198
+ : `${parsed.origin}/.well-known/wab.json`;
199
+ const wabJsonUrl = wabFields.endpoint && wabFields.endpoint.endsWith('.json')
200
+ ? wabFields.endpoint
201
+ : (base.endsWith('/') ? base + '.well-known/wab.json' : base + '/.well-known/wab.json');
202
+
203
+ const fetched = await fetchSmall(wabJsonUrl);
204
+ if (!fetched.ok) { return { ok: false, error: `cannot fetch wab.json (${fetched.error || fetched.status})` }; }
205
+
206
+ let doc;
207
+ try { doc = JSON.parse(fetched.body); } catch { return { ok: false, error: 'wab.json is not valid JSON' }; }
208
+
209
+ // signature is over the canonical JSON of `doc.payload`
210
+ const sig = doc.signature;
211
+ const pkRaw = wabFields.pk || (doc.trust && doc.trust.pk);
212
+ if (!sig || !pkRaw || !doc.payload) {
213
+ return { ok: false, error: 'wab.json missing payload/signature/pk' };
214
+ }
215
+ const pk = pkRaw.replace(/^ed25519:/i, '');
216
+
217
+ let pkBytes;
218
+ try { pkBytes = Buffer.from(pk, 'base64'); } catch { return { ok: false, error: 'invalid base64 pk' }; }
219
+ if (pkBytes.length !== 32) { return { ok: false, error: `pk has wrong length (${pkBytes.length} bytes, want 32)` }; }
220
+ let sigBytes;
221
+ try { sigBytes = Buffer.from(sig.replace(/^ed25519:/i, ''), 'base64'); } catch { return { ok: false, error: 'invalid base64 signature' }; }
222
+
223
+ // Wrap raw 32-byte Ed25519 public key in DER (SubjectPublicKeyInfo)
224
+ const der = Buffer.concat([
225
+ Buffer.from('302a300506032b6570032100', 'hex'),
226
+ pkBytes,
227
+ ]);
228
+ let pubKey;
229
+ try { pubKey = crypto.createPublicKey({ key: der, format: 'der', type: 'spki' }); }
230
+ catch (e) { return { ok: false, error: 'cannot import Ed25519 pk: ' + e.message }; }
231
+
232
+ const message = Buffer.from(canonicalJson(doc.payload), 'utf8');
233
+ const ok = crypto.verify(null, message, pubKey, sigBytes);
234
+
235
+ return { ok, payload: doc.payload, signed_with: pk };
236
+ }
237
+
238
+ function canonicalJson(obj) {
239
+ if (obj === null || typeof obj !== 'object') { return JSON.stringify(obj); }
240
+ if (Array.isArray(obj)) { return '[' + obj.map(canonicalJson).join(',') + ']'; }
241
+ const keys = Object.keys(obj).sort();
242
+ return '{' + keys.map((k) => JSON.stringify(k) + ':' + canonicalJson(obj[k])).join(',') + '}';
243
+ }
244
+
245
+ function fetchSmall(url) {
246
+ return new Promise((resolve) => {
247
+ let mod;
248
+ try { mod = url.startsWith('https:') ? https : http; } catch { return resolve({ ok: false, error: 'bad url' }); }
249
+ const req = mod.get(url, { timeout: FETCH_TIMEOUT_MS, headers: { 'User-Agent': 'WAB-ShieldQR/1.0' } }, (res) => {
250
+ if (res.statusCode && res.statusCode >= 300 && res.statusCode < 400 && res.headers.location) {
251
+ res.resume();
252
+ return resolve({ ok: false, status: res.statusCode, error: 'redirect_not_followed' });
253
+ }
254
+ let bytes = 0;
255
+ const chunks = [];
256
+ res.on('data', (c) => {
257
+ bytes += c.length;
258
+ if (bytes > MAX_BODY_BYTES) { req.destroy(); return; }
259
+ chunks.push(c);
260
+ });
261
+ res.on('end', () => resolve({
262
+ ok: (res.statusCode || 0) >= 200 && (res.statusCode || 0) < 300,
263
+ status: res.statusCode,
264
+ body: Buffer.concat(chunks).toString('utf8'),
265
+ }));
266
+ });
267
+ req.on('timeout', () => { req.destroy(); resolve({ ok: false, error: 'timeout' }); });
268
+ req.on('error', (e) => resolve({ ok: false, error: e.message }));
269
+ });
270
+ }
271
+
272
+ function inspectSsl(host, port) {
273
+ return new Promise((resolve) => {
274
+ const socket = tls.connect({ host, port, servername: host, timeout: FETCH_TIMEOUT_MS, rejectUnauthorized: false }, () => {
275
+ const cert = socket.getPeerCertificate(true);
276
+ socket.end();
277
+ if (!cert || !cert.valid_to) { return resolve({ ok: false, error: 'no certificate returned' }); }
278
+ const expiry = new Date(cert.valid_to);
279
+ const days = Math.floor((expiry.getTime() - Date.now()) / 86400000);
280
+ const fp = (cert.fingerprint256 || '').replace(/:/g, '').toLowerCase();
281
+ resolve({
282
+ ok: true,
283
+ issuer: cert.issuer && (cert.issuer.O || cert.issuer.CN) || null,
284
+ subject: cert.subject && cert.subject.CN || null,
285
+ valid_to: cert.valid_to,
286
+ valid_from: cert.valid_from,
287
+ days_until_expiry: days,
288
+ fingerprint_sha256: fp,
289
+ authorized: socket.authorized,
290
+ protocol: socket.getProtocol && socket.getProtocol(),
291
+ });
292
+ });
293
+ socket.on('error', (e) => resolve({ ok: false, error: e.message }));
294
+ socket.on('timeout', () => { socket.destroy(); resolve({ ok: false, error: 'timeout' }); });
295
+ });
296
+ }
297
+
298
+ function computeLevel(signals, signedOk) {
299
+ let score = 60; // neutral start
300
+ for (const s of signals) {
301
+ if (s.severity === 'good') { score += 20; }
302
+ else if (s.severity === 'low') { score -= 5; }
303
+ else if (s.severity === 'medium') { score -= 18; }
304
+ else if (s.severity === 'high') { score -= 40; }
305
+ }
306
+ if (signedOk) { score = Math.max(score, 90); }
307
+ score = Math.max(0, Math.min(100, score));
308
+ const fallback = signals.some((s) => s.id === 'fallback_trust');
309
+ let level = 'yellow';
310
+ if (score >= 75 && signedOk && !fallback) { level = 'green'; }
311
+ else if (score >= 65) { level = 'yellow'; }
312
+ else if (score < 35) { level = 'red'; }
313
+ else { level = 'yellow'; }
314
+ // Hard-fail on any high-severity signal unless we have a verified signature
315
+ // (Extended Trust Layer: signature acts as fallback authority when SSL fails).
316
+ if (signals.some((s) => s.severity === 'high') && !signedOk) { level = 'red'; }
317
+ // With signed fallback, never drop below yellow.
318
+ if (fallback && level === 'red') { level = 'yellow'; }
319
+ return { level, score };
320
+ }
321
+
322
+ module.exports = { scan, parseWabTxt, canonicalJson };
@@ -0,0 +1,42 @@
1
+ /**
2
+ * server/services/ssl-inspector.js
3
+ * Live TLS certificate inspector — used by sign-wab-domain.js, cron monitor,
4
+ * and shieldqr verifier. Returns { ok, fingerprint_sha256, valid_to,
5
+ * days_until_expiry, issuer, subject, fingerprint_b64 }.
6
+ */
7
+ 'use strict';
8
+
9
+ const tls = require('node:tls');
10
+
11
+ function inspect(host, port = 443, timeoutMs = 8000) {
12
+ return new Promise((resolve) => {
13
+ const socket = tls.connect({
14
+ host, port, servername: host, rejectUnauthorized: false, timeout: timeoutMs,
15
+ }, () => {
16
+ try {
17
+ const cert = socket.getPeerCertificate(false);
18
+ if (!cert || !cert.valid_to) { socket.end(); return resolve({ ok: false, error: 'no_cert' }); }
19
+ const validTo = new Date(cert.valid_to);
20
+ const daysLeft = Math.floor((validTo.getTime() - Date.now()) / (24 * 3600 * 1000));
21
+ const fpHex = (cert.fingerprint256 || '').replace(/:/g, '').toLowerCase();
22
+ const fpB64 = fpHex ? Buffer.from(fpHex, 'hex').toString('base64') : null;
23
+ socket.end();
24
+ resolve({
25
+ ok: true,
26
+ fingerprint_sha256: fpHex,
27
+ fingerprint_b64: fpB64,
28
+ valid_to: validTo.toISOString(),
29
+ valid_from: cert.valid_from ? new Date(cert.valid_from).toISOString() : null,
30
+ days_until_expiry: daysLeft,
31
+ issuer: cert.issuer && (cert.issuer.O || cert.issuer.CN) || null,
32
+ subject: cert.subject && cert.subject.CN || null,
33
+ serial: cert.serialNumber || null,
34
+ });
35
+ } catch (e) { try { socket.end(); } catch (_) {} resolve({ ok: false, error: e.message }); }
36
+ });
37
+ socket.on('error', (err) => resolve({ ok: false, error: err.message }));
38
+ socket.on('timeout', () => { try { socket.destroy(); } catch (_) {} resolve({ ok: false, error: 'timeout' }); });
39
+ });
40
+ }
41
+
42
+ module.exports = { inspect };
@@ -0,0 +1,167 @@
1
+ /**
2
+ * server/services/ssl-monitor.js
3
+ * Extended Trust Layer — Certificate Companion & SSL Health Monitoring.
4
+ *
5
+ * Periodically inspects SSL certificates for every active site, persists state
6
+ * in `ssl_monitor`, appends new certs to `cert_history` (CT log), and emails
7
+ * the site owner when the certificate is within 7 days of expiry. The cron
8
+ * runs once per day inside the main process; can be disabled via env
9
+ * `WAB_SSL_MONITOR=off`.
10
+ */
11
+ 'use strict';
12
+
13
+ const path = require('node:path');
14
+ const Database = require('better-sqlite3');
15
+ const ssl = require('./ssl-inspector');
16
+
17
+ const DATA_DIR = process.env.NODE_ENV === 'test'
18
+ ? path.join(__dirname, '..', '..', 'data-test')
19
+ : (process.env.DATA_DIR || path.join(__dirname, '..', '..', 'data'));
20
+ const DB_FILE = process.env.NODE_ENV === 'test' ? 'wab-test.db' : 'wab.db';
21
+
22
+ let _db = null;
23
+ function db() {
24
+ if (!_db) { _db = new Database(path.join(DATA_DIR, DB_FILE)); }
25
+ return _db;
26
+ }
27
+
28
+ const ALERT_DAYS = Number(process.env.WAB_SSL_ALERT_DAYS || 7);
29
+ const ALERT_REPEAT_HOURS = Number(process.env.WAB_SSL_ALERT_REPEAT_HOURS || 24);
30
+
31
+ function classify(daysLeft) {
32
+ if (daysLeft == null) return 'error';
33
+ if (daysLeft < 0) return 'expired';
34
+ if (daysLeft <= ALERT_DAYS) return 'expiring';
35
+ return 'active';
36
+ }
37
+
38
+ /**
39
+ * Inspect one host, persist state + CT log entry + alert if needed.
40
+ * Returns { host, status, days_until_expiry, alerted }.
41
+ */
42
+ async function checkHost(host, opts = {}) {
43
+ const info = await ssl.inspect(host, 443);
44
+ const now = new Date().toISOString();
45
+
46
+ if (!info.ok) {
47
+ db().prepare(`
48
+ INSERT INTO ssl_monitor (host, status, error, last_checked_at, enabled, owner_user_id)
49
+ VALUES (?, 'error', ?, ?, 1, ?)
50
+ ON CONFLICT(host) DO UPDATE SET
51
+ status='error', error=excluded.error, last_checked_at=excluded.last_checked_at
52
+ `).run(host, info.error || 'unknown', now, opts.userId || null);
53
+ return { host, status: 'error', error: info.error };
54
+ }
55
+
56
+ const status = classify(info.days_until_expiry);
57
+
58
+ db().prepare(`
59
+ INSERT INTO ssl_monitor (host, fingerprint_sha256, issuer, valid_to, days_until_expiry,
60
+ status, error, last_checked_at, enabled, owner_user_id)
61
+ VALUES (?, ?, ?, ?, ?, ?, NULL, ?, 1, ?)
62
+ ON CONFLICT(host) DO UPDATE SET
63
+ fingerprint_sha256=excluded.fingerprint_sha256,
64
+ issuer=excluded.issuer,
65
+ valid_to=excluded.valid_to,
66
+ days_until_expiry=excluded.days_until_expiry,
67
+ status=excluded.status,
68
+ error=NULL,
69
+ last_checked_at=excluded.last_checked_at
70
+ `).run(host, info.fingerprint_sha256, info.issuer, info.valid_to,
71
+ info.days_until_expiry, status, now, opts.userId || null);
72
+
73
+ // Append to CT log if fingerprint not seen for this host yet.
74
+ try {
75
+ db().prepare(`
76
+ INSERT OR IGNORE INTO cert_history
77
+ (host, fingerprint_sha256, issuer, subject, serial, valid_from, valid_to, source)
78
+ VALUES (?, ?, ?, ?, ?, ?, ?, ?)
79
+ `).run(host, info.fingerprint_sha256, info.issuer, info.subject, info.serial,
80
+ info.valid_from, info.valid_to, opts.source || 'monitor');
81
+ } catch (_) { /* table may not exist yet */ }
82
+
83
+ let alerted = false;
84
+ if (status === 'expiring' || status === 'expired') {
85
+ alerted = await maybeSendAlert(host, info, status, opts);
86
+ }
87
+
88
+ return { host, status, days_until_expiry: info.days_until_expiry, alerted };
89
+ }
90
+
91
+ async function maybeSendAlert(host, info, status, opts) {
92
+ const row = db().prepare(`SELECT last_alert_at, owner_user_id FROM ssl_monitor WHERE host = ?`).get(host);
93
+ if (row && row.last_alert_at) {
94
+ const last = new Date(row.last_alert_at).getTime();
95
+ if (Date.now() - last < ALERT_REPEAT_HOURS * 3600 * 1000) return false;
96
+ }
97
+
98
+ let to = opts.alertEmail || process.env.WAB_SSL_ALERT_EMAIL;
99
+ try {
100
+ if (!to && row && row.owner_user_id) {
101
+ const u = db().prepare('SELECT email FROM users WHERE id = ?').get(row.owner_user_id);
102
+ if (u && u.email) to = u.email;
103
+ }
104
+ } catch (_) { /* users table may not exist in tests */ }
105
+
106
+ if (!to) return false;
107
+
108
+ try {
109
+ const { sendEmail } = require('./email');
110
+ await sendEmail({
111
+ to, template: 'sslExpiringAlert',
112
+ data: {
113
+ host,
114
+ daysLeft: Math.max(0, info.days_until_expiry),
115
+ validTo: info.valid_to,
116
+ issuer: info.issuer,
117
+ fingerprint: info.fingerprint_sha256,
118
+ },
119
+ });
120
+ db().prepare(`UPDATE ssl_monitor SET last_alert_at = ? WHERE host = ?`)
121
+ .run(new Date().toISOString(), host);
122
+ return true;
123
+ } catch (_) { return false; }
124
+ }
125
+
126
+ /** Run a sweep across every active site domain (and optional extra hosts). */
127
+ async function runSweep({ extraHosts = [] } = {}) {
128
+ let hosts = [...extraHosts];
129
+ try {
130
+ const rows = db().prepare(
131
+ "SELECT DISTINCT LOWER(REPLACE(domain, 'http://', '')) AS host, user_id FROM sites WHERE active = 1"
132
+ ).all();
133
+ for (const r of rows) {
134
+ const h = (r.host || '').replace(/^https?:\/\//, '').replace(/\/.*$/, '').replace(/^www\./, 'www.');
135
+ if (!h) continue;
136
+ hosts.push({ host: h, userId: r.user_id });
137
+ }
138
+ } catch (_) { /* sites table may not exist */ }
139
+
140
+ const results = [];
141
+ for (const item of hosts) {
142
+ const host = typeof item === 'string' ? item : item.host;
143
+ const userId = typeof item === 'string' ? null : item.userId;
144
+ try {
145
+ results.push(await checkHost(host, { userId }));
146
+ } catch (e) {
147
+ results.push({ host, status: 'error', error: e.message });
148
+ }
149
+ }
150
+ return results;
151
+ }
152
+
153
+ let _interval = null;
154
+ function start() {
155
+ if (_interval || process.env.WAB_SSL_MONITOR === 'off') return;
156
+ if (process.env.NODE_ENV === 'test' || process.env.JEST_WORKER_ID) return;
157
+ // Run immediately, then once per day.
158
+ setTimeout(() => runSweep().catch(() => {}), 30_000);
159
+ _interval = setInterval(() => runSweep().catch(() => {}), 24 * 3600 * 1000);
160
+ if (_interval.unref) _interval.unref();
161
+ }
162
+
163
+ function stop() {
164
+ if (_interval) { clearInterval(_interval); _interval = null; }
165
+ }
166
+
167
+ module.exports = { checkHost, runSweep, classify, start, stop };
@@ -32,7 +32,20 @@ function getStripePrices() {
32
32
  };
33
33
  }
34
34
 
35
- async function createCheckoutSession({ userId, userEmail, siteId, tier }) {
35
+ // Resolve a Stripe price id from either a plan id (DB) or a legacy tier name.
36
+ // Order: DB plan.stripe_price_id → env STRIPE_PRICE_<UPPER> → platform_settings → null.
37
+ function resolvePriceId(planOrTier) {
38
+ if (!planOrTier) return null;
39
+ try {
40
+ const plans = require('./plans');
41
+ const p = plans.getPlan(planOrTier);
42
+ if (p && p.stripe_price_id) return p.stripe_price_id;
43
+ } catch { /* DB layer not ready (tests) — fall through to legacy lookup */ }
44
+ const envKey = `STRIPE_PRICE_${String(planOrTier).toUpperCase()}`;
45
+ return process.env[envKey] || getPlatformSetting(`stripe_price_${planOrTier}`) || null;
46
+ }
47
+
48
+ async function createCheckoutSession({ userId, userEmail, siteId, tier, planId }) {
36
49
  const site = findSiteById.get(siteId);
37
50
  if (!site || site.user_id !== userId) {
38
51
  throw new Error('Site not found or access denied');
@@ -41,9 +54,9 @@ async function createCheckoutSession({ userId, userEmail, siteId, tier }) {
41
54
  const s = getStripe();
42
55
  if (!s) throw new Error('Stripe not configured');
43
56
 
44
- const prices = getStripePrices();
45
- const priceId = prices[tier];
46
- if (!priceId) throw new Error(`No price configured for tier: ${tier}`);
57
+ const planRef = planId || tier;
58
+ const priceId = resolvePriceId(planRef);
59
+ if (!priceId) throw new Error(`No price configured for plan: ${planRef}`);
47
60
 
48
61
  // Get or create Stripe customer
49
62
  let customer = getStripeCustomer(userId);
@@ -60,7 +73,7 @@ async function createCheckoutSession({ userId, userEmail, siteId, tier }) {
60
73
  mode: 'subscription',
61
74
  payment_method_types: ['card'],
62
75
  line_items: [{ price: priceId, quantity: 1 }],
63
- metadata: { wab_user_id: userId, wab_site_id: siteId, tier },
76
+ metadata: { wab_user_id: userId, wab_site_id: siteId, tier: planRef, plan_id: planRef },
64
77
  success_url: `${baseUrl}/dashboard?payment=success&session_id={CHECKOUT_SESSION_ID}`,
65
78
  cancel_url: `${baseUrl}/dashboard?payment=cancelled`
66
79
  });
@@ -1,5 +1,5 @@
1
1
  const { db } = require('../models/db');
2
- const { v4: uuidv4 } = require('uuid');
2
+ const { randomUUID: uuidv4 } = require('crypto');
3
3
  const crypto = require('crypto');
4
4
 
5
5
  // ═══════════════════════════════════════════════════════════════════════