2025-03-06 08:27:44 +00:00
import * as plugins from './plugins.js' ;
2025-03-18 14:53:39 +00:00
import { IncomingMessage , ServerResponse } from 'http' ;
2025-02-24 09:53:39 +00:00
2025-03-06 08:27:44 +00:00
/ * *
2025-03-18 14:53:39 +00:00
* Custom error classes for better error handling
* /
export class Port80HandlerError extends Error {
constructor ( message : string ) {
super ( message ) ;
this . name = 'Port80HandlerError' ;
}
}
export class CertificateError extends Port80HandlerError {
constructor (
message : string ,
public readonly domain : string ,
public readonly isRenewal : boolean = false
) {
super ( ` ${ message } for domain ${ domain } ${ isRenewal ? ' (renewal)' : '' } ` ) ;
this . name = 'CertificateError' ;
}
}
export class ServerError extends Port80HandlerError {
constructor ( message : string , public readonly code? : string ) {
super ( message ) ;
this . name = 'ServerError' ;
}
}
/ * *
* Domain forwarding configuration
* /
export interface IForwardConfig {
ip : string ;
port : number ;
}
/ * *
* Domain configuration options
* /
export interface IDomainOptions {
domainName : string ;
sslRedirect : boolean ; // if true redirects the request to port 443
acmeMaintenance : boolean ; // tries to always have a valid cert for this domain
forward? : IForwardConfig ; // forwards all http requests to that target
acmeForward? : IForwardConfig ; // forwards letsencrypt requests to this config
}
/ * *
* Represents a domain configuration with certificate status information
2025-03-06 08:27:44 +00:00
* /
2025-02-24 09:53:39 +00:00
interface IDomainCertificate {
2025-03-18 14:53:39 +00:00
options : IDomainOptions ;
2025-02-24 09:53:39 +00:00
certObtained : boolean ;
obtainingInProgress : boolean ;
certificate? : string ;
privateKey? : string ;
challengeToken? : string ;
challengeKeyAuthorization? : string ;
2025-03-06 08:27:44 +00:00
expiryDate? : Date ;
lastRenewalAttempt? : Date ;
2025-02-24 09:53:39 +00:00
}
2025-03-06 08:27:44 +00:00
/ * *
2025-03-18 14:53:39 +00:00
* Configuration options for the Port80Handler
2025-03-06 08:27:44 +00:00
* /
2025-03-18 14:53:39 +00:00
interface IPort80HandlerOptions {
2025-03-06 08:27:44 +00:00
port? : number ;
contactEmail? : string ;
useProduction? : boolean ;
renewThresholdDays? : number ;
httpsRedirectPort? : number ;
renewCheckIntervalHours? : number ;
}
/ * *
* Certificate data that can be emitted via events or set from outside
* /
2025-03-18 14:53:39 +00:00
export interface ICertificateData {
2025-03-06 08:27:44 +00:00
domain : string ;
certificate : string ;
privateKey : string ;
expiryDate : Date ;
}
/ * *
2025-03-18 14:53:39 +00:00
* Events emitted by the Port80Handler
2025-03-06 08:27:44 +00:00
* /
2025-03-18 14:53:39 +00:00
export enum Port80HandlerEvents {
2025-03-06 08:27:44 +00:00
CERTIFICATE_ISSUED = 'certificate-issued' ,
CERTIFICATE_RENEWED = 'certificate-renewed' ,
CERTIFICATE_FAILED = 'certificate-failed' ,
CERTIFICATE_EXPIRING = 'certificate-expiring' ,
MANAGER_STARTED = 'manager-started' ,
MANAGER_STOPPED = 'manager-stopped' ,
2025-03-18 14:53:39 +00:00
REQUEST_FORWARDED = 'request-forwarded' ,
}
/ * *
* Certificate failure payload type
* /
export interface ICertificateFailure {
domain : string ;
error : string ;
isRenewal : boolean ;
2025-03-06 08:27:44 +00:00
}
/ * *
2025-03-18 14:53:39 +00:00
* Certificate expiry payload type
2025-03-06 08:27:44 +00:00
* /
2025-03-18 14:53:39 +00:00
export interface ICertificateExpiring {
domain : string ;
expiryDate : Date ;
daysRemaining : number ;
}
/ * *
* Port80Handler with ACME certificate management and request forwarding capabilities
* /
export class Port80Handler extends plugins . EventEmitter {
2025-02-24 09:53:39 +00:00
private domainCertificates : Map < string , IDomainCertificate > ;
2025-03-06 08:27:44 +00:00
private server : plugins.http.Server | null = null ;
private acmeClient : plugins.acme.Client | null = null ;
2025-02-24 09:53:39 +00:00
private accountKey : string | null = null ;
2025-03-06 08:27:44 +00:00
private renewalTimer : NodeJS.Timeout | null = null ;
private isShuttingDown : boolean = false ;
2025-03-18 14:53:39 +00:00
private options : Required < IPort80HandlerOptions > ;
2025-02-24 09:53:39 +00:00
2025-03-06 08:27:44 +00:00
/ * *
2025-03-18 14:53:39 +00:00
* Creates a new Port80Handler
2025-03-06 08:27:44 +00:00
* @param options Configuration options
* /
2025-03-18 14:53:39 +00:00
constructor ( options : IPort80HandlerOptions = { } ) {
2025-03-06 08:27:44 +00:00
super ( ) ;
2025-02-24 09:53:39 +00:00
this . domainCertificates = new Map < string , IDomainCertificate > ( ) ;
2025-03-06 08:27:44 +00:00
// Default options
this . options = {
port : options.port ? ? 80 ,
contactEmail : options.contactEmail ? ? 'admin@example.com' ,
useProduction : options.useProduction ? ? false , // Safer default: staging
2025-03-18 14:53:39 +00:00
renewThresholdDays : options.renewThresholdDays ? ? 10 , // Changed to 10 days as per requirements
2025-03-06 08:27:44 +00:00
httpsRedirectPort : options.httpsRedirectPort ? ? 443 ,
renewCheckIntervalHours : options.renewCheckIntervalHours ? ? 24 ,
} ;
}
/ * *
* Starts the HTTP server for ACME challenges
* /
public async start ( ) : Promise < void > {
if ( this . server ) {
2025-03-18 14:53:39 +00:00
throw new ServerError ( 'Server is already running' ) ;
2025-03-06 08:27:44 +00:00
}
if ( this . isShuttingDown ) {
2025-03-18 14:53:39 +00:00
throw new ServerError ( 'Server is shutting down' ) ;
2025-03-06 08:27:44 +00:00
}
2025-02-24 09:53:39 +00:00
2025-03-06 08:27:44 +00:00
return new Promise ( ( resolve , reject ) = > {
try {
this . server = plugins . http . createServer ( ( req , res ) = > this . handleRequest ( req , res ) ) ;
this . server . on ( 'error' , ( error : NodeJS.ErrnoException ) = > {
if ( error . code === 'EACCES' ) {
2025-03-18 14:53:39 +00:00
reject ( new ServerError ( ` Permission denied to bind to port ${ this . options . port } . Try running with elevated privileges or use a port > 1024. ` , error . code ) ) ;
2025-03-06 08:27:44 +00:00
} else if ( error . code === 'EADDRINUSE' ) {
2025-03-18 14:53:39 +00:00
reject ( new ServerError ( ` Port ${ this . options . port } is already in use. ` , error . code ) ) ;
2025-03-06 08:27:44 +00:00
} else {
2025-03-18 14:53:39 +00:00
reject ( new ServerError ( error . message , error . code ) ) ;
2025-03-06 08:27:44 +00:00
}
} ) ;
this . server . listen ( this . options . port , ( ) = > {
2025-03-18 14:53:39 +00:00
console . log ( ` Port80Handler is listening on port ${ this . options . port } ` ) ;
2025-03-06 08:27:44 +00:00
this . startRenewalTimer ( ) ;
2025-03-18 14:53:39 +00:00
this . emit ( Port80HandlerEvents . MANAGER_STARTED , this . options . port ) ;
// Start certificate process for domains with acmeMaintenance enabled
for ( const [ domain , domainInfo ] of this . domainCertificates . entries ( ) ) {
if ( domainInfo . options . acmeMaintenance && ! domainInfo . certObtained && ! domainInfo . obtainingInProgress ) {
this . obtainCertificate ( domain ) . catch ( err = > {
console . error ( ` Error obtaining initial certificate for ${ domain } : ` , err ) ;
} ) ;
}
}
2025-03-06 08:27:44 +00:00
resolve ( ) ;
} ) ;
} catch ( error ) {
2025-03-18 14:53:39 +00:00
const message = error instanceof Error ? error . message : 'Unknown error starting server' ;
reject ( new ServerError ( message ) ) ;
2025-03-06 08:27:44 +00:00
}
2025-02-24 09:53:39 +00:00
} ) ;
}
/ * *
2025-03-06 08:27:44 +00:00
* Stops the HTTP server and renewal timer
* /
public async stop ( ) : Promise < void > {
if ( ! this . server ) {
return ;
}
this . isShuttingDown = true ;
// Stop the renewal timer
if ( this . renewalTimer ) {
clearInterval ( this . renewalTimer ) ;
this . renewalTimer = null ;
}
return new Promise < void > ( ( resolve ) = > {
if ( this . server ) {
this . server . close ( ( ) = > {
this . server = null ;
this . isShuttingDown = false ;
2025-03-18 14:53:39 +00:00
this . emit ( Port80HandlerEvents . MANAGER_STOPPED ) ;
2025-03-06 08:27:44 +00:00
resolve ( ) ;
} ) ;
} else {
this . isShuttingDown = false ;
resolve ( ) ;
}
} ) ;
}
/ * *
2025-03-18 14:53:39 +00:00
* Adds a domain with configuration options
* @param options Domain configuration options
2025-02-24 09:53:39 +00:00
* /
2025-03-18 14:53:39 +00:00
public addDomain ( options : IDomainOptions ) : void {
if ( ! options . domainName || typeof options . domainName !== 'string' ) {
throw new Port80HandlerError ( 'Invalid domain name' ) ;
}
const domainName = options . domainName ;
if ( ! this . domainCertificates . has ( domainName ) ) {
this . domainCertificates . set ( domainName , {
options ,
certObtained : false ,
obtainingInProgress : false
} ) ;
console . log ( ` Domain added: ${ domainName } with configuration: ` , {
sslRedirect : options.sslRedirect ,
acmeMaintenance : options.acmeMaintenance ,
hasForward : ! ! options . forward ,
hasAcmeForward : ! ! options . acmeForward
} ) ;
// If acmeMaintenance is enabled, start certificate process immediately
if ( options . acmeMaintenance && this . server ) {
this . obtainCertificate ( domainName ) . catch ( err = > {
console . error ( ` Error obtaining initial certificate for ${ domainName } : ` , err ) ;
} ) ;
}
} else {
// Update existing domain with new options
const existing = this . domainCertificates . get ( domainName ) ! ;
existing . options = options ;
console . log ( ` Domain ${ domainName } configuration updated ` ) ;
2025-02-24 09:53:39 +00:00
}
}
/ * *
2025-03-06 08:27:44 +00:00
* Removes a domain from management
* @param domain The domain to remove
2025-02-24 09:53:39 +00:00
* /
public removeDomain ( domain : string ) : void {
if ( this . domainCertificates . delete ( domain ) ) {
console . log ( ` Domain removed: ${ domain } ` ) ;
}
}
2025-03-06 08:27:44 +00:00
/ * *
* Sets a certificate for a domain directly ( for externally obtained certificates )
* @param domain The domain for the certificate
* @param certificate The certificate ( PEM format )
* @param privateKey The private key ( PEM format )
* @param expiryDate Optional expiry date
* /
public setCertificate ( domain : string , certificate : string , privateKey : string , expiryDate? : Date ) : void {
2025-03-18 14:53:39 +00:00
if ( ! domain || ! certificate || ! privateKey ) {
throw new Port80HandlerError ( 'Domain, certificate and privateKey are required' ) ;
}
2025-03-06 08:27:44 +00:00
let domainInfo = this . domainCertificates . get ( domain ) ;
if ( ! domainInfo ) {
2025-03-18 14:53:39 +00:00
// Create default domain options if not already configured
const defaultOptions : IDomainOptions = {
domainName : domain ,
sslRedirect : true ,
acmeMaintenance : true
} ;
domainInfo = {
options : defaultOptions ,
certObtained : false ,
obtainingInProgress : false
} ;
2025-03-06 08:27:44 +00:00
this . domainCertificates . set ( domain , domainInfo ) ;
}
domainInfo . certificate = certificate ;
domainInfo . privateKey = privateKey ;
domainInfo . certObtained = true ;
domainInfo . obtainingInProgress = false ;
if ( expiryDate ) {
domainInfo . expiryDate = expiryDate ;
} else {
2025-03-18 14:53:39 +00:00
// Extract expiry date from certificate
domainInfo . expiryDate = this . extractExpiryDateFromCertificate ( certificate , domain ) ;
2025-03-06 08:27:44 +00:00
}
console . log ( ` Certificate set for ${ domain } ` ) ;
// Emit certificate event
2025-03-18 14:53:39 +00:00
this . emitCertificateEvent ( Port80HandlerEvents . CERTIFICATE_ISSUED , {
2025-03-06 08:27:44 +00:00
domain ,
certificate ,
privateKey ,
2025-03-18 14:53:39 +00:00
expiryDate : domainInfo.expiryDate || this . getDefaultExpiryDate ( )
2025-03-06 08:27:44 +00:00
} ) ;
}
/ * *
* Gets the certificate for a domain if it exists
* @param domain The domain to get the certificate for
* /
public getCertificate ( domain : string ) : ICertificateData | null {
const domainInfo = this . domainCertificates . get ( domain ) ;
if ( ! domainInfo || ! domainInfo . certObtained || ! domainInfo . certificate || ! domainInfo . privateKey ) {
return null ;
}
return {
domain ,
certificate : domainInfo.certificate ,
privateKey : domainInfo.privateKey ,
2025-03-18 14:53:39 +00:00
expiryDate : domainInfo.expiryDate || this . getDefaultExpiryDate ( )
2025-03-06 08:27:44 +00:00
} ;
}
2025-02-24 09:53:39 +00:00
/ * *
2025-03-06 08:27:44 +00:00
* Lazy initialization of the ACME client
* @returns An ACME client instance
2025-02-24 09:53:39 +00:00
* /
2025-03-06 08:27:44 +00:00
private async getAcmeClient ( ) : Promise < plugins.acme.Client > {
2025-02-24 09:53:39 +00:00
if ( this . acmeClient ) {
return this . acmeClient ;
}
2025-03-06 08:27:44 +00:00
2025-03-18 14:53:39 +00:00
try {
// Generate a new account key
this . accountKey = ( await plugins . acme . forge . createPrivateKey ( ) ) . toString ( ) ;
this . acmeClient = new plugins . acme . Client ( {
directoryUrl : this.options.useProduction
? plugins . acme . directory . letsencrypt . production
: plugins . acme . directory . letsencrypt . staging ,
accountKey : this.accountKey ,
} ) ;
// Create a new account
await this . acmeClient . createAccount ( {
termsOfServiceAgreed : true ,
contact : [ ` mailto: ${ this . options . contactEmail } ` ] ,
} ) ;
return this . acmeClient ;
} catch ( error ) {
const message = error instanceof Error ? error . message : 'Unknown error initializing ACME client' ;
throw new Port80HandlerError ( ` Failed to initialize ACME client: ${ message } ` ) ;
}
2025-02-24 09:53:39 +00:00
}
/ * *
2025-03-06 08:27:44 +00:00
* Handles incoming HTTP requests
* @param req The HTTP request
* @param res The HTTP response
2025-02-24 09:53:39 +00:00
* /
2025-03-06 08:27:44 +00:00
private handleRequest ( req : plugins.http.IncomingMessage , res : plugins.http.ServerResponse ) : void {
2025-02-24 09:53:39 +00:00
const hostHeader = req . headers . host ;
if ( ! hostHeader ) {
res . statusCode = 400 ;
res . end ( 'Bad Request: Host header is missing' ) ;
return ;
}
2025-03-06 08:27:44 +00:00
2025-02-24 09:53:39 +00:00
// Extract domain (ignoring any port in the Host header)
const domain = hostHeader . split ( ':' ) [ 0 ] ;
2025-03-18 14:53:39 +00:00
// Check if domain is configured
if ( ! this . domainCertificates . has ( domain ) ) {
res . statusCode = 404 ;
res . end ( 'Domain not configured' ) ;
return ;
}
const domainInfo = this . domainCertificates . get ( domain ) ! ;
const options = domainInfo . options ;
2025-03-06 08:27:44 +00:00
// If the request is for an ACME HTTP-01 challenge, handle it
2025-03-18 14:56:57 +00:00
if ( req . url && req . url . startsWith ( '/.well-known/acme-challenge/' ) && ( options . acmeMaintenance || options . acmeForward ) ) {
2025-03-18 14:53:39 +00:00
// Check if we should forward ACME requests
if ( options . acmeForward ) {
this . forwardRequest ( req , res , options . acmeForward , 'ACME challenge' ) ;
return ;
}
2025-02-24 09:53:39 +00:00
this . handleAcmeChallenge ( req , res , domain ) ;
return ;
}
2025-03-18 14:53:39 +00:00
// Check if we should forward non-ACME requests
if ( options . forward ) {
this . forwardRequest ( req , res , options . forward , 'HTTP' ) ;
2025-02-24 09:53:39 +00:00
return ;
}
2025-03-18 14:53:39 +00:00
// If certificate exists and sslRedirect is enabled, redirect to HTTPS
if ( domainInfo . certObtained && options . sslRedirect ) {
2025-03-06 08:27:44 +00:00
const httpsPort = this . options . httpsRedirectPort ;
const portSuffix = httpsPort === 443 ? '' : ` : ${ httpsPort } ` ;
const redirectUrl = ` https:// ${ domain } ${ portSuffix } ${ req . url || '/' } ` ;
2025-02-24 09:53:39 +00:00
res . statusCode = 301 ;
res . setHeader ( 'Location' , redirectUrl ) ;
res . end ( ` Redirecting to ${ redirectUrl } ` ) ;
2025-03-18 14:53:39 +00:00
return ;
}
// Handle case where certificate maintenance is enabled but not yet obtained
if ( options . acmeMaintenance && ! domainInfo . certObtained ) {
2025-03-06 08:27:44 +00:00
// Trigger certificate issuance if not already running
2025-02-24 09:53:39 +00:00
if ( ! domainInfo . obtainingInProgress ) {
this . obtainCertificate ( domain ) . catch ( err = > {
2025-03-18 14:53:39 +00:00
const errorMessage = err instanceof Error ? err . message : 'Unknown error' ;
this . emit ( Port80HandlerEvents . CERTIFICATE_FAILED , {
domain ,
error : errorMessage ,
isRenewal : false
} ) ;
2025-02-24 09:53:39 +00:00
console . error ( ` Error obtaining certificate for ${ domain } : ` , err ) ;
} ) ;
}
2025-03-06 08:27:44 +00:00
2025-02-24 09:53:39 +00:00
res . statusCode = 503 ;
res . end ( 'Certificate issuance in progress, please try again later.' ) ;
2025-03-18 14:53:39 +00:00
return ;
}
// Default response for unhandled request
res . statusCode = 404 ;
res . end ( 'No handlers configured for this request' ) ;
}
/ * *
* Forwards an HTTP request to the specified target
* @param req The original request
* @param res The response object
* @param target The forwarding target ( IP and port )
* @param requestType Type of request for logging
* /
private forwardRequest (
req : plugins.http.IncomingMessage ,
res : plugins.http.ServerResponse ,
target : IForwardConfig ,
requestType : string
) : void {
const options = {
hostname : target.ip ,
port : target.port ,
path : req.url ,
method : req.method ,
headers : { . . . req . headers }
} ;
const domain = req . headers . host ? . split ( ':' ) [ 0 ] || 'unknown' ;
console . log ( ` Forwarding ${ requestType } request for ${ domain } to ${ target . ip } : ${ target . port } ` ) ;
const proxyReq = plugins . http . request ( options , ( proxyRes ) = > {
// Copy status code
res . statusCode = proxyRes . statusCode || 500 ;
// Copy headers
for ( const [ key , value ] of Object . entries ( proxyRes . headers ) ) {
if ( value ) res . setHeader ( key , value ) ;
}
// Pipe response data
proxyRes . pipe ( res ) ;
this . emit ( Port80HandlerEvents . REQUEST_FORWARDED , {
domain ,
requestType ,
target : ` ${ target . ip } : ${ target . port } ` ,
statusCode : proxyRes.statusCode
} ) ;
} ) ;
proxyReq . on ( 'error' , ( error ) = > {
console . error ( ` Error forwarding request to ${ target . ip } : ${ target . port } : ` , error ) ;
if ( ! res . headersSent ) {
res . statusCode = 502 ;
res . end ( ` Proxy error: ${ error . message } ` ) ;
} else {
res . end ( ) ;
}
} ) ;
// Pipe original request to proxy request
if ( req . readable ) {
req . pipe ( proxyReq ) ;
} else {
proxyReq . end ( ) ;
2025-02-24 09:53:39 +00:00
}
}
/ * *
2025-03-06 08:27:44 +00:00
* Serves the ACME HTTP - 01 challenge response
* @param req The HTTP request
* @param res The HTTP response
* @param domain The domain for the challenge
2025-02-24 09:53:39 +00:00
* /
2025-03-06 08:27:44 +00:00
private handleAcmeChallenge ( req : plugins.http.IncomingMessage , res : plugins.http.ServerResponse , domain : string ) : void {
2025-02-24 09:53:39 +00:00
const domainInfo = this . domainCertificates . get ( domain ) ;
if ( ! domainInfo ) {
res . statusCode = 404 ;
res . end ( 'Domain not configured' ) ;
return ;
}
2025-03-06 08:27:44 +00:00
// The token is the last part of the URL
2025-02-24 09:53:39 +00:00
const urlParts = req . url ? . split ( '/' ) ;
const token = urlParts ? urlParts [ urlParts . length - 1 ] : '' ;
2025-03-06 08:27:44 +00:00
2025-02-24 09:53:39 +00:00
if ( domainInfo . challengeToken === token && domainInfo . challengeKeyAuthorization ) {
res . statusCode = 200 ;
res . setHeader ( 'Content-Type' , 'text/plain' ) ;
res . end ( domainInfo . challengeKeyAuthorization ) ;
console . log ( ` Served ACME challenge response for ${ domain } ` ) ;
} else {
res . statusCode = 404 ;
res . end ( 'Challenge token not found' ) ;
}
}
/ * *
2025-03-06 08:27:44 +00:00
* Obtains a certificate for a domain using ACME HTTP - 01 challenge
* @param domain The domain to obtain a certificate for
* @param isRenewal Whether this is a renewal attempt
2025-02-24 09:53:39 +00:00
* /
2025-03-06 08:27:44 +00:00
private async obtainCertificate ( domain : string , isRenewal : boolean = false ) : Promise < void > {
// Get the domain info
const domainInfo = this . domainCertificates . get ( domain ) ;
if ( ! domainInfo ) {
2025-03-18 14:53:39 +00:00
throw new CertificateError ( 'Domain not found' , domain , isRenewal ) ;
}
// Verify that acmeMaintenance is enabled
if ( ! domainInfo . options . acmeMaintenance ) {
console . log ( ` Skipping certificate issuance for ${ domain } - acmeMaintenance is disabled ` ) ;
return ;
2025-03-06 08:27:44 +00:00
}
// Prevent concurrent certificate issuance
if ( domainInfo . obtainingInProgress ) {
console . log ( ` Certificate issuance already in progress for ${ domain } ` ) ;
return ;
}
domainInfo . obtainingInProgress = true ;
domainInfo . lastRenewalAttempt = new Date ( ) ;
2025-02-24 09:53:39 +00:00
try {
const client = await this . getAcmeClient ( ) ;
2025-03-06 08:27:44 +00:00
// Create a new order for the domain
2025-02-24 09:53:39 +00:00
const order = await client . createOrder ( {
identifiers : [ { type : 'dns' , value : domain } ] ,
} ) ;
2025-03-06 08:27:44 +00:00
// Get the authorizations for the order
2025-02-24 09:53:39 +00:00
const authorizations = await client . getAuthorizations ( order ) ;
2025-03-06 08:27:44 +00:00
2025-03-18 14:53:39 +00:00
// Process each authorization
await this . processAuthorizations ( client , domain , authorizations ) ;
2025-02-24 09:53:39 +00:00
2025-03-06 08:27:44 +00:00
// Generate a CSR and private key
const [ csrBuffer , privateKeyBuffer ] = await plugins . acme . forge . createCsr ( {
2025-02-24 09:53:39 +00:00
commonName : domain ,
} ) ;
2025-03-06 08:27:44 +00:00
2025-02-24 10:00:57 +00:00
const csr = csrBuffer . toString ( ) ;
const privateKey = privateKeyBuffer . toString ( ) ;
2025-02-24 09:53:39 +00:00
2025-03-06 08:27:44 +00:00
// Finalize the order with our CSR
2025-02-24 09:53:39 +00:00
await client . finalizeOrder ( order , csr ) ;
2025-03-06 08:27:44 +00:00
// Get the certificate with the full chain
2025-02-24 09:53:39 +00:00
const certificate = await client . getCertificate ( order ) ;
2025-03-06 08:27:44 +00:00
// Store the certificate and key
2025-02-24 09:53:39 +00:00
domainInfo . certificate = certificate ;
domainInfo . privateKey = privateKey ;
domainInfo . certObtained = true ;
2025-03-06 08:27:44 +00:00
// Clear challenge data
2025-02-24 09:53:39 +00:00
delete domainInfo . challengeToken ;
delete domainInfo . challengeKeyAuthorization ;
2025-03-06 08:27:44 +00:00
// Extract expiry date from certificate
2025-03-18 14:53:39 +00:00
domainInfo . expiryDate = this . extractExpiryDateFromCertificate ( certificate , domain ) ;
2025-02-24 09:53:39 +00:00
2025-03-06 08:27:44 +00:00
console . log ( ` Certificate ${ isRenewal ? 'renewed' : 'obtained' } for ${ domain } ` ) ;
// Emit the appropriate event
const eventType = isRenewal
2025-03-18 14:53:39 +00:00
? Port80HandlerEvents . CERTIFICATE_RENEWED
: Port80HandlerEvents . CERTIFICATE_ISSUED ;
2025-03-06 08:27:44 +00:00
this . emitCertificateEvent ( eventType , {
domain ,
certificate ,
privateKey ,
2025-03-18 14:53:39 +00:00
expiryDate : domainInfo.expiryDate || this . getDefaultExpiryDate ( )
2025-03-06 08:27:44 +00:00
} ) ;
} catch ( error : any ) {
// Check for rate limit errors
if ( error . message && (
error . message . includes ( 'rateLimited' ) ||
error . message . includes ( 'too many certificates' ) ||
error . message . includes ( 'rate limit' )
) ) {
console . error ( ` Rate limit reached for ${ domain } . Waiting before retry. ` ) ;
} else {
console . error ( ` Error during certificate issuance for ${ domain } : ` , error ) ;
2025-02-24 09:53:39 +00:00
}
2025-03-06 08:27:44 +00:00
// Emit failure event
2025-03-18 14:53:39 +00:00
this . emit ( Port80HandlerEvents . CERTIFICATE_FAILED , {
2025-03-06 08:27:44 +00:00
domain ,
error : error.message || 'Unknown error' ,
isRenewal
2025-03-18 14:53:39 +00:00
} as ICertificateFailure ) ;
throw new CertificateError (
error . message || 'Certificate issuance failed' ,
domain ,
isRenewal
) ;
2025-03-06 08:27:44 +00:00
} finally {
// Reset flag whether successful or not
domainInfo . obtainingInProgress = false ;
2025-02-24 09:53:39 +00:00
}
}
2025-03-06 08:27:44 +00:00
2025-03-18 14:53:39 +00:00
/ * *
* Process ACME authorizations by verifying and completing challenges
* @param client ACME client
* @param domain Domain name
* @param authorizations Authorizations to process
* /
private async processAuthorizations (
client : plugins.acme.Client ,
domain : string ,
authorizations : plugins.acme.Authorization [ ]
) : Promise < void > {
const domainInfo = this . domainCertificates . get ( domain ) ;
if ( ! domainInfo ) {
throw new CertificateError ( 'Domain not found during authorization' , domain ) ;
}
for ( const authz of authorizations ) {
const challenge = authz . challenges . find ( ch = > ch . type === 'http-01' ) ;
if ( ! challenge ) {
throw new CertificateError ( 'HTTP-01 challenge not found' , domain ) ;
}
// Get the key authorization for the challenge
const keyAuthorization = await client . getChallengeKeyAuthorization ( challenge ) ;
// Store the challenge data
domainInfo . challengeToken = challenge . token ;
domainInfo . challengeKeyAuthorization = keyAuthorization ;
// ACME client type definition workaround - use compatible approach
// First check if challenge verification is needed
const authzUrl = authz . url ;
try {
// Check if authzUrl exists and perform verification
if ( authzUrl ) {
await client . verifyChallenge ( authz , challenge ) ;
}
// Complete the challenge
await client . completeChallenge ( challenge ) ;
// Wait for validation
await client . waitForValidStatus ( challenge ) ;
console . log ( ` HTTP-01 challenge completed for ${ domain } ` ) ;
} catch ( error ) {
const errorMessage = error instanceof Error ? error . message : 'Unknown challenge error' ;
console . error ( ` Challenge error for ${ domain } : ` , error ) ;
throw new CertificateError ( ` Challenge verification failed: ${ errorMessage } ` , domain ) ;
}
}
}
2025-03-06 08:27:44 +00:00
/ * *
* Starts the certificate renewal timer
* /
private startRenewalTimer ( ) : void {
if ( this . renewalTimer ) {
clearInterval ( this . renewalTimer ) ;
}
// Convert hours to milliseconds
const checkInterval = this . options . renewCheckIntervalHours * 60 * 60 * 1000 ;
this . renewalTimer = setInterval ( ( ) = > this . checkForRenewals ( ) , checkInterval ) ;
// Prevent the timer from keeping the process alive
if ( this . renewalTimer . unref ) {
this . renewalTimer . unref ( ) ;
}
console . log ( ` Certificate renewal check scheduled every ${ this . options . renewCheckIntervalHours } hours ` ) ;
}
/ * *
* Checks for certificates that need renewal
* /
private checkForRenewals ( ) : void {
if ( this . isShuttingDown ) {
return ;
}
console . log ( 'Checking for certificates that need renewal...' ) ;
const now = new Date ( ) ;
const renewThresholdMs = this . options . renewThresholdDays * 24 * 60 * 60 * 1000 ;
for ( const [ domain , domainInfo ] of this . domainCertificates . entries ( ) ) {
2025-03-18 14:53:39 +00:00
// Skip domains with acmeMaintenance disabled
if ( ! domainInfo . options . acmeMaintenance ) {
continue ;
}
2025-03-06 08:27:44 +00:00
// Skip domains without certificates or already in renewal
if ( ! domainInfo . certObtained || domainInfo . obtainingInProgress ) {
continue ;
}
// Skip domains without expiry dates
if ( ! domainInfo . expiryDate ) {
continue ;
}
const timeUntilExpiry = domainInfo . expiryDate . getTime ( ) - now . getTime ( ) ;
// Check if certificate is near expiry
if ( timeUntilExpiry <= renewThresholdMs ) {
console . log ( ` Certificate for ${ domain } expires soon, renewing... ` ) ;
2025-03-18 14:53:39 +00:00
const daysRemaining = Math . ceil ( timeUntilExpiry / ( 24 * 60 * 60 * 1000 ) ) ;
this . emit ( Port80HandlerEvents . CERTIFICATE_EXPIRING , {
2025-03-06 08:27:44 +00:00
domain ,
expiryDate : domainInfo.expiryDate ,
2025-03-18 14:53:39 +00:00
daysRemaining
} as ICertificateExpiring ) ;
2025-03-06 08:27:44 +00:00
// Start renewal process
this . obtainCertificate ( domain , true ) . catch ( err = > {
2025-03-18 14:53:39 +00:00
const errorMessage = err instanceof Error ? err . message : 'Unknown error' ;
console . error ( ` Error renewing certificate for ${ domain } : ` , errorMessage ) ;
2025-03-06 08:27:44 +00:00
} ) ;
}
}
}
2025-03-18 14:53:39 +00:00
/ * *
* Extract expiry date from certificate using a more robust approach
* @param certificate Certificate PEM string
* @param domain Domain for logging
* @returns Extracted expiry date or default
* /
private extractExpiryDateFromCertificate ( certificate : string , domain : string ) : Date {
try {
// This is still using regex, but in a real implementation you would use
// a library like node-forge or x509 to properly parse the certificate
const matches = certificate . match ( /Not After\s*:\s*(.*?)(?:\n|$)/i ) ;
if ( matches && matches [ 1 ] ) {
const expiryDate = new Date ( matches [ 1 ] ) ;
// Validate that we got a valid date
if ( ! isNaN ( expiryDate . getTime ( ) ) ) {
console . log ( ` Certificate for ${ domain } will expire on ${ expiryDate . toISOString ( ) } ` ) ;
return expiryDate ;
}
}
console . warn ( ` Could not extract valid expiry date from certificate for ${ domain } , using default ` ) ;
return this . getDefaultExpiryDate ( ) ;
} catch ( error ) {
console . warn ( ` Failed to extract expiry date from certificate for ${ domain } , using default ` ) ;
return this . getDefaultExpiryDate ( ) ;
}
}
/ * *
* Get a default expiry date ( 90 days from now )
* @returns Default expiry date
* /
private getDefaultExpiryDate ( ) : Date {
return new Date ( Date . now ( ) + 90 * 24 * 60 * 60 * 1000 ) ; // 90 days default
}
2025-03-06 08:27:44 +00:00
/ * *
* Emits a certificate event with the certificate data
* @param eventType The event type to emit
* @param data The certificate data
* /
2025-03-18 14:53:39 +00:00
private emitCertificateEvent ( eventType : Port80HandlerEvents , data : ICertificateData ) : void {
2025-03-06 08:27:44 +00:00
this . emit ( eventType , data ) ;
}
}