smartacme/ts/smartacme.classes.acmecert.ts

268 lines
8.4 KiB
TypeScript
Raw Normal View History

2017-01-14 17:36:33 +00:00
import * as q from 'q'
import * as plugins from './smartacme.plugins'
import * as helpers from './smartacme.helpers'
import { SmartAcme, IRsaKeypair } from './smartacme.classes.smartacme'
import { AcmeAccount } from './smartacme.classes.acmeaccount'
/**
* types of challenges supported by letsencrypt and this module
*/
export type TChallengeType = 'dns-01' | 'http-01'
/**
* values that a challenge's status can have
*/
export type TChallengeStatus = 'pending'
export interface ISmartAcmeChallenge {
uri: string
status: TChallengeStatus
type: TChallengeType
token: string
keyAuthorization: string
}
export interface ISmartAcmeChallengeAccepted extends ISmartAcmeChallenge {
2017-01-15 21:30:33 +00:00
dnsKeyHash: string
domainName: string
domainNamePrefixed: string
2017-01-14 17:36:33 +00:00
}
export interface IAcmeCsrConstructorOptions {
bit: number,
key: string,
domain: string,
country: string,
country_short: string,
locality: string,
organization: string,
organization_short: string,
password: string,
unstructured: string,
subject_alt_names: string[]
}
2017-01-01 23:18:51 +00:00
2017-01-15 21:30:33 +00:00
// Dnsly instance (we really just need one)
let myDnsly = new plugins.dnsly.Dnsly('google')
2017-01-14 13:14:50 +00:00
/**
* class AcmeCert represents a cert for domain
*/
2017-01-01 23:18:51 +00:00
export class AcmeCert {
2017-01-15 11:21:29 +00:00
domainName: string
2017-01-14 17:36:33 +00:00
attributes
acceptedChallenge: ISmartAcmeChallengeAccepted
2017-01-14 13:14:50 +00:00
fullchain: string
2017-01-14 17:36:33 +00:00
parentAcmeAccount: AcmeAccount
csr
validFrom: Date
validTo: Date
keypair: IRsaKeypair
keyPairFinal: IRsaKeypair
2017-01-15 11:21:29 +00:00
constructor(optionsArg: IAcmeCsrConstructorOptions, parentAcmeAccount: AcmeAccount) {
this.domainName = optionsArg.domain
this.parentAcmeAccount = parentAcmeAccount
2017-01-14 17:36:33 +00:00
this.keypair = helpers.createKeypair(optionsArg.bit)
let privateKeyForged = plugins.nodeForge.pki.privateKeyFromPem(this.keypair.privateKey)
let publicKeyForged = plugins.nodeForge.pki.publicKeyToPem(
plugins.nodeForge.pki.setRsaPublicKey(privateKeyForged.n, privateKeyForged.e)
)
this.keyPairFinal = {
privateKey: privateKeyForged,
publicKey: publicKeyForged
}
// set dates
this.validFrom = new Date()
this.validTo = new Date()
this.validTo.setDate(this.validFrom.getDate() + 90)
// set attributes
this.attributes = [
{ name: 'commonName', value: optionsArg.domain },
{ name: 'countryName', value: optionsArg.country },
{ shortName: 'ST', value: optionsArg.country_short },
{ name: 'localityName', value: optionsArg.locality },
{ name: 'organizationName', value: optionsArg.organization },
{ shortName: 'OU', value: optionsArg.organization_short },
{ name: 'challengePassword', value: optionsArg.password },
{ name: 'unstructuredName', value: optionsArg.unstructured }
]
// set up csr
this.csr = plugins.nodeForge.pki.createCertificationRequest()
this.csr.setSubject(this.attributes)
this.csr.setAttributes(this.attributes)
}
/**
* requests a challenge for a domain
* @param domainNameArg - the domain name to request a challenge for
* @param challengeType - the challenge type to request
*/
2017-01-15 11:21:29 +00:00
requestChallenge(challengeTypeArg: TChallengeType = 'dns-01') {
2017-01-14 17:36:33 +00:00
let done = q.defer<ISmartAcmeChallengeAccepted>()
this.parentAcmeAccount.parentSmartAcme.rawacmeClient.newAuthz(
{
identifier: {
type: 'dns',
2017-01-15 11:21:29 +00:00
value: this.domainName
2017-01-14 17:36:33 +00:00
}
},
this.parentAcmeAccount.parentSmartAcme.keyPair,
(err, res) => {
if (err) {
console.error('smartacme: something went wrong:')
console.log(err)
done.reject(err)
}
let dnsChallenge = res.body.challenges.filter(x => {
return x.type === challengeTypeArg
})[0]
this.acceptChallenge(dnsChallenge)
.then((x: ISmartAcmeChallengeAccepted) => {
done.resolve(x)
})
}
)
return done.promise
}
2017-01-15 21:30:33 +00:00
/**
2017-01-15 21:59:58 +00:00
* checks if DNS records are set, will go through a max of 30 cycles
2017-01-15 21:30:33 +00:00
*/
2017-01-15 21:59:58 +00:00
async checkDns(cycleArg = 1) {
console.log(`checkDns failed ${cycleArg} times and has ${30 - cycleArg} cycles to go before it fails permanently!`)
2017-01-15 21:30:33 +00:00
let myRecord
try {
myRecord = await myDnsly.getRecord(helpers.prefixName(this.domainName), 'TXT')
2017-01-15 21:59:58 +00:00
console.log('DNS is set!')
2017-01-15 21:30:33 +00:00
} catch (err) {
2017-01-15 21:59:58 +00:00
if (cycleArg < 30) {
cycleArg++
await this.checkDns(cycleArg)
} else {
console.log('failed permanently...')
throw err
}
2017-01-15 21:30:33 +00:00
}
return myRecord[0][0]
}
2017-01-14 17:36:33 +00:00
/**
* validates a challenge, only call after you have set the challenge at the expected location
*/
requestValidation() {
2017-01-14 17:36:33 +00:00
let done = q.defer()
this.parentAcmeAccount.parentSmartAcme.rawacmeClient.poll(this.acceptedChallenge.uri, (err, res) => {
2017-01-14 17:36:33 +00:00
if (err) {
console.log(err)
done.reject(err)
}
console.log(`Validation response:`)
2017-01-14 17:36:33 +00:00
console.log(JSON.stringify(res.body))
if (res.body.status === 'pending' || 'invalid') {
setTimeout(
() => {
this.requestValidation().then(x => { done.resolve(x) })
},
2000
)
} else {
done.resolve(res.body)
}
2017-01-14 17:36:33 +00:00
})
return done.promise
}
/**
* requests a certificate
*/
requestCert() {
let done = q.defer()
let payload = {
csr: plugins.rawacme.base64.encode(
plugins.rawacme.toDer(
plugins.nodeForge.pki.certificationRequestToPem(
this.csr
)
)
),
notBefore: this.validFrom.toISOString(),
notAfter: this.validTo.toISOString()
}
this.parentAcmeAccount.parentSmartAcme.rawacmeClient.newCert(
payload,
helpers.createKeypair(),
(err, res) => {
if (err) {
console.log(err)
done.reject(err)
}
console.log(res.body)
done.resolve(res.body)
2017-01-14 17:36:33 +00:00
})
return done.promise
}
/**
* getCertificate - takes care of cooldown, validation polling and certificate retrieval
*/
getCertificate() {
}
/**
* accept a challenge - for private use only
*/
private acceptChallenge(challengeArg: ISmartAcmeChallenge) {
2017-01-14 17:36:33 +00:00
let done = q.defer()
/**
* the key is needed to accept the challenge
*/
let authKey: string = plugins.rawacme.keyAuthz(
challengeArg.token,
2017-01-14 17:36:33 +00:00
this.parentAcmeAccount.parentSmartAcme.keyPair.publicKey
)
/**
* needed in case selected challenge is of type dns-01
*/
let keyHash: string = plugins.rawacme.dnsKeyAuthzHash(authKey) // needed if dns challenge is chosen
this.parentAcmeAccount.parentSmartAcme.rawacmeClient.post(
challengeArg.uri,
2017-01-14 17:36:33 +00:00
{
resource: 'challenge',
keyAuthorization: authKey
},
this.parentAcmeAccount.parentSmartAcme.keyPair,
(err, res) => {
if (err) {
console.log(err)
done.reject(err)
}
2017-01-15 11:21:29 +00:00
/**
* the return challenge
*/
let returnDNSChallenge: ISmartAcmeChallengeAccepted = {
uri: res.body.uri,
type: res.body.type,
token: res.body.token,
keyAuthorization: res.body.keyAuthorization,
2017-01-15 21:30:33 +00:00
status: res.body.status,
dnsKeyHash: keyHash,
domainName: this.domainName,
domainNamePrefixed: helpers.prefixName(this.domainName)
2017-01-15 11:21:29 +00:00
}
this.acceptedChallenge = returnDNSChallenge
2017-01-14 17:36:33 +00:00
done.resolve(returnDNSChallenge)
}
)
return done.promise
}
}