fix(networkproxy): Refactor certificate management components: rename AcmeCertManager to Port80Handler and update related event names from CertManagerEvents to Port80HandlerEvents. The changes update internal API usage in ts/classes.networkproxy.ts and ts/classes.port80handler.ts to unify and simplify ACME certificate handling and HTTP-01 challenge management.

This commit is contained in:
Philipp Kunz 2025-03-18 14:53:39 +00:00
parent cc04e8786c
commit f8c86c76ae
4 changed files with 470 additions and 162 deletions

View File

@ -1,5 +1,13 @@
# Changelog # Changelog
## 2025-03-18 - 4.2.5 - fix(networkproxy)
Refactor certificate management components: rename AcmeCertManager to Port80Handler and update related event names from CertManagerEvents to Port80HandlerEvents. The changes update internal API usage in ts/classes.networkproxy.ts and ts/classes.port80handler.ts to unify and simplify ACME certificate handling and HTTP-01 challenge management.
- Renamed AcmeCertManager to Port80Handler in ts/classes.networkproxy.ts
- Updated event names from CertManagerEvents to Port80HandlerEvents
- Modified API calls for certificate issuance and renewal in ts/classes.port80handler.ts
- Refactored domain registration and certificate extraction logic
## 2025-03-18 - 4.2.4 - fix(ts/index.ts) ## 2025-03-18 - 4.2.4 - fix(ts/index.ts)
Fix export order in ts/index.ts by moving the port proxy export back and adding interfaces export for proper module exposure Fix export order in ts/index.ts by moving the port proxy export back and adding interfaces export for proper module exposure

View File

@ -3,6 +3,6 @@
*/ */
export const commitinfo = { export const commitinfo = {
name: '@push.rocks/smartproxy', name: '@push.rocks/smartproxy',
version: '4.2.4', version: '4.2.5',
description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, dynamic routing with authentication options, and automatic ACME certificate management.' description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, dynamic routing with authentication options, and automatic ACME certificate management.'
} }

View File

@ -1,6 +1,6 @@
import * as plugins from './plugins.js'; import * as plugins from './plugins.js';
import { ProxyRouter } from './classes.router.js'; import { ProxyRouter } from './classes.router.js';
import { AcmeCertManager, CertManagerEvents } from './classes.port80handler.js'; import { Port80Handler, Port80HandlerEvents, type IDomainOptions } from './classes.port80handler.js';
import * as fs from 'fs'; import * as fs from 'fs';
import * as path from 'path'; import * as path from 'path';
import { fileURLToPath } from 'url'; import { fileURLToPath } from 'url';
@ -72,8 +72,8 @@ export class NetworkProxy {
private defaultCertificates: { key: string; cert: string }; private defaultCertificates: { key: string; cert: string };
private certificateCache: Map<string, { key: string; cert: string; expires?: Date }> = new Map(); private certificateCache: Map<string, { key: string; cert: string; expires?: Date }> = new Map();
// ACME certificate manager // Port80Handler for certificate management
private certManager: AcmeCertManager | null = null; private port80Handler: Port80Handler | null = null;
private certificateStoreDir: string; private certificateStoreDir: string;
// New connection pool for backend connections // New connection pool for backend connections
@ -375,16 +375,16 @@ export class NetworkProxy {
} }
/** /**
* Initializes the ACME certificate manager for automatic certificate issuance * Initializes the Port80Handler for ACME certificate management
* @private * @private
*/ */
private async initializeAcmeManager(): Promise<void> { private async initializePort80Handler(): Promise<void> {
if (!this.options.acme.enabled) { if (!this.options.acme.enabled) {
return; return;
} }
// Create certificate manager // Create certificate manager
this.certManager = new AcmeCertManager({ this.port80Handler = new Port80Handler({
port: this.options.acme.port, port: this.options.acme.port,
contactEmail: this.options.acme.contactEmail, contactEmail: this.options.acme.contactEmail,
useProduction: this.options.acme.useProduction, useProduction: this.options.acme.useProduction,
@ -394,32 +394,32 @@ export class NetworkProxy {
}); });
// Register event handlers // Register event handlers
this.certManager.on(CertManagerEvents.CERTIFICATE_ISSUED, this.handleCertificateIssued.bind(this)); this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_ISSUED, this.handleCertificateIssued.bind(this));
this.certManager.on(CertManagerEvents.CERTIFICATE_RENEWED, this.handleCertificateIssued.bind(this)); this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_RENEWED, this.handleCertificateIssued.bind(this));
this.certManager.on(CertManagerEvents.CERTIFICATE_FAILED, this.handleCertificateFailed.bind(this)); this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_FAILED, this.handleCertificateFailed.bind(this));
this.certManager.on(CertManagerEvents.CERTIFICATE_EXPIRING, (data) => { this.port80Handler.on(Port80HandlerEvents.CERTIFICATE_EXPIRING, (data) => {
this.log('info', `Certificate for ${data.domain} expires in ${data.daysRemaining} days`); this.log('info', `Certificate for ${data.domain} expires in ${data.daysRemaining} days`);
}); });
// Start the manager // Start the handler
try { try {
await this.certManager.start(); await this.port80Handler.start();
this.log('info', `ACME Certificate Manager started on port ${this.options.acme.port}`); this.log('info', `Port80Handler started on port ${this.options.acme.port}`);
// Add domains from proxy configs // Add domains from proxy configs
this.registerDomainsWithAcmeManager(); this.registerDomainsWithPort80Handler();
} catch (error) { } catch (error) {
this.log('error', `Failed to start ACME Certificate Manager: ${error}`); this.log('error', `Failed to start Port80Handler: ${error}`);
this.certManager = null; this.port80Handler = null;
} }
} }
/** /**
* Registers domains from proxy configs with the ACME manager * Registers domains from proxy configs with the Port80Handler
* @private * @private
*/ */
private registerDomainsWithAcmeManager(): void { private registerDomainsWithPort80Handler(): void {
if (!this.certManager) return; if (!this.port80Handler) return;
// Get all hostnames from proxy configs // Get all hostnames from proxy configs
this.proxyConfigs.forEach(config => { this.proxyConfigs.forEach(config => {
@ -461,26 +461,32 @@ export class NetworkProxy {
this.log('warn', `Failed to extract expiry date from certificate for ${hostname}`); this.log('warn', `Failed to extract expiry date from certificate for ${hostname}`);
} }
// Update the certificate in the manager // Update the certificate in the handler
this.certManager.setCertificate(hostname, cert, key, expiryDate); this.port80Handler.setCertificate(hostname, cert, key, expiryDate);
// Also update our own certificate cache // Also update our own certificate cache
this.updateCertificateCache(hostname, cert, key, expiryDate); this.updateCertificateCache(hostname, cert, key, expiryDate);
this.log('info', `Loaded existing certificate for ${hostname}`); this.log('info', `Loaded existing certificate for ${hostname}`);
} else { } else {
// Register the domain for certificate issuance // Register the domain for certificate issuance with new domain options format
this.certManager.addDomain(hostname); const domainOptions: IDomainOptions = {
domainName: hostname,
sslRedirect: true,
acmeMaintenance: true
};
this.port80Handler.addDomain(domainOptions);
this.log('info', `Registered domain for ACME certificate issuance: ${hostname}`); this.log('info', `Registered domain for ACME certificate issuance: ${hostname}`);
} }
} catch (error) { } catch (error) {
this.log('error', `Error registering domain ${hostname} with ACME manager: ${error}`); this.log('error', `Error registering domain ${hostname} with Port80Handler: ${error}`);
} }
}); });
} }
/** /**
* Handles newly issued or renewed certificates from ACME manager * Handles newly issued or renewed certificates from Port80Handler
* @private * @private
*/ */
private handleCertificateIssued(data: { domain: string; certificate: string; privateKey: string; expiryDate: Date }): void { private handleCertificateIssued(data: { domain: string; certificate: string; privateKey: string; expiryDate: Date }): void {
@ -556,13 +562,21 @@ export class NetworkProxy {
} }
// Check if we should trigger certificate issuance // Check if we should trigger certificate issuance
if (this.options.acme?.enabled && this.certManager && !domain.includes('*')) { if (this.options.acme?.enabled && this.port80Handler && !domain.includes('*')) {
// Check if this domain is already registered // Check if this domain is already registered
const certData = this.certManager.getCertificate(domain); const certData = this.port80Handler.getCertificate(domain);
if (!certData) { if (!certData) {
this.log('info', `No certificate found for ${domain}, registering for issuance`); this.log('info', `No certificate found for ${domain}, registering for issuance`);
this.certManager.addDomain(domain);
// Register with new domain options format
const domainOptions: IDomainOptions = {
domainName: domain,
sslRedirect: true,
acmeMaintenance: true
};
this.port80Handler.addDomain(domainOptions);
} }
} }
@ -587,9 +601,9 @@ export class NetworkProxy {
public async start(): Promise<void> { public async start(): Promise<void> {
this.startTime = Date.now(); this.startTime = Date.now();
// Initialize ACME certificate manager if enabled // Initialize Port80Handler if enabled
if (this.options.acme.enabled) { if (this.options.acme.enabled) {
await this.initializeAcmeManager(); await this.initializePort80Handler();
} }
// Create the HTTPS server // Create the HTTPS server
@ -1588,13 +1602,13 @@ export class NetworkProxy {
} }
this.connectionPool.clear(); this.connectionPool.clear();
// Stop ACME certificate manager if it's running // Stop Port80Handler if it's running
if (this.certManager) { if (this.port80Handler) {
try { try {
await this.certManager.stop(); await this.port80Handler.stop();
this.log('info', 'ACME Certificate Manager stopped'); this.log('info', 'Port80Handler stopped');
} catch (error) { } catch (error) {
this.log('error', 'Error stopping ACME Certificate Manager', error); this.log('error', 'Error stopping Port80Handler', error);
} }
} }
@ -1619,8 +1633,8 @@ export class NetworkProxy {
return false; return false;
} }
if (!this.certManager) { if (!this.port80Handler) {
this.log('error', 'ACME certificate manager is not initialized'); this.log('error', 'Port80Handler is not initialized');
return false; return false;
} }
@ -1631,7 +1645,14 @@ export class NetworkProxy {
} }
try { try {
this.certManager.addDomain(domain); // Use the new domain options format
const domainOptions: IDomainOptions = {
domainName: domain,
sslRedirect: true,
acmeMaintenance: true
};
this.port80Handler.addDomain(domainOptions);
this.log('info', `Certificate request submitted for domain: ${domain}`); this.log('info', `Certificate request submitted for domain: ${domain}`);
return true; return true;
} catch (error) { } catch (error) {

View File

@ -1,9 +1,58 @@
import * as plugins from './plugins.js'; import * as plugins from './plugins.js';
import { IncomingMessage, ServerResponse } from 'http';
/** /**
* Represents a domain certificate with various status information * Custom error classes for better error handling
*/
export class Port80HandlerError extends Error {
constructor(message: string) {
super(message);
this.name = 'Port80HandlerError';
}
}
export class CertificateError extends Port80HandlerError {
constructor(
message: string,
public readonly domain: string,
public readonly isRenewal: boolean = false
) {
super(`${message} for domain ${domain}${isRenewal ? ' (renewal)' : ''}`);
this.name = 'CertificateError';
}
}
export class ServerError extends Port80HandlerError {
constructor(message: string, public readonly code?: string) {
super(message);
this.name = 'ServerError';
}
}
/**
* Domain forwarding configuration
*/
export interface IForwardConfig {
ip: string;
port: number;
}
/**
* Domain configuration options
*/
export interface IDomainOptions {
domainName: string;
sslRedirect: boolean; // if true redirects the request to port 443
acmeMaintenance: boolean; // tries to always have a valid cert for this domain
forward?: IForwardConfig; // forwards all http requests to that target
acmeForward?: IForwardConfig; // forwards letsencrypt requests to this config
}
/**
* Represents a domain configuration with certificate status information
*/ */
interface IDomainCertificate { interface IDomainCertificate {
options: IDomainOptions;
certObtained: boolean; certObtained: boolean;
obtainingInProgress: boolean; obtainingInProgress: boolean;
certificate?: string; certificate?: string;
@ -15,9 +64,9 @@ interface IDomainCertificate {
} }
/** /**
* Configuration options for the ACME Certificate Manager * Configuration options for the Port80Handler
*/ */
interface IAcmeCertManagerOptions { interface IPort80HandlerOptions {
port?: number; port?: number;
contactEmail?: string; contactEmail?: string;
useProduction?: boolean; useProduction?: boolean;
@ -29,7 +78,7 @@ interface IAcmeCertManagerOptions {
/** /**
* Certificate data that can be emitted via events or set from outside * Certificate data that can be emitted via events or set from outside
*/ */
interface ICertificateData { export interface ICertificateData {
domain: string; domain: string;
certificate: string; certificate: string;
privateKey: string; privateKey: string;
@ -37,34 +86,53 @@ interface ICertificateData {
} }
/** /**
* Events emitted by the ACME Certificate Manager * Events emitted by the Port80Handler
*/ */
export enum CertManagerEvents { export enum Port80HandlerEvents {
CERTIFICATE_ISSUED = 'certificate-issued', CERTIFICATE_ISSUED = 'certificate-issued',
CERTIFICATE_RENEWED = 'certificate-renewed', CERTIFICATE_RENEWED = 'certificate-renewed',
CERTIFICATE_FAILED = 'certificate-failed', CERTIFICATE_FAILED = 'certificate-failed',
CERTIFICATE_EXPIRING = 'certificate-expiring', CERTIFICATE_EXPIRING = 'certificate-expiring',
MANAGER_STARTED = 'manager-started', MANAGER_STARTED = 'manager-started',
MANAGER_STOPPED = 'manager-stopped', MANAGER_STOPPED = 'manager-stopped',
REQUEST_FORWARDED = 'request-forwarded',
} }
/** /**
* Improved ACME Certificate Manager with event emission and external certificate management * Certificate failure payload type
*/ */
export class AcmeCertManager extends plugins.EventEmitter { export interface ICertificateFailure {
domain: string;
error: string;
isRenewal: boolean;
}
/**
* Certificate expiry payload type
*/
export interface ICertificateExpiring {
domain: string;
expiryDate: Date;
daysRemaining: number;
}
/**
* Port80Handler with ACME certificate management and request forwarding capabilities
*/
export class Port80Handler extends plugins.EventEmitter {
private domainCertificates: Map<string, IDomainCertificate>; private domainCertificates: Map<string, IDomainCertificate>;
private server: plugins.http.Server | null = null; private server: plugins.http.Server | null = null;
private acmeClient: plugins.acme.Client | null = null; private acmeClient: plugins.acme.Client | null = null;
private accountKey: string | null = null; private accountKey: string | null = null;
private renewalTimer: NodeJS.Timeout | null = null; private renewalTimer: NodeJS.Timeout | null = null;
private isShuttingDown: boolean = false; private isShuttingDown: boolean = false;
private options: Required<IAcmeCertManagerOptions>; private options: Required<IPort80HandlerOptions>;
/** /**
* Creates a new ACME Certificate Manager * Creates a new Port80Handler
* @param options Configuration options * @param options Configuration options
*/ */
constructor(options: IAcmeCertManagerOptions = {}) { constructor(options: IPort80HandlerOptions = {}) {
super(); super();
this.domainCertificates = new Map<string, IDomainCertificate>(); this.domainCertificates = new Map<string, IDomainCertificate>();
@ -73,7 +141,7 @@ export class AcmeCertManager extends plugins.EventEmitter {
port: options.port ?? 80, port: options.port ?? 80,
contactEmail: options.contactEmail ?? 'admin@example.com', contactEmail: options.contactEmail ?? 'admin@example.com',
useProduction: options.useProduction ?? false, // Safer default: staging useProduction: options.useProduction ?? false, // Safer default: staging
renewThresholdDays: options.renewThresholdDays ?? 30, renewThresholdDays: options.renewThresholdDays ?? 10, // Changed to 10 days as per requirements
httpsRedirectPort: options.httpsRedirectPort ?? 443, httpsRedirectPort: options.httpsRedirectPort ?? 443,
renewCheckIntervalHours: options.renewCheckIntervalHours ?? 24, renewCheckIntervalHours: options.renewCheckIntervalHours ?? 24,
}; };
@ -84,11 +152,11 @@ export class AcmeCertManager extends plugins.EventEmitter {
*/ */
public async start(): Promise<void> { public async start(): Promise<void> {
if (this.server) { if (this.server) {
throw new Error('Server is already running'); throw new ServerError('Server is already running');
} }
if (this.isShuttingDown) { if (this.isShuttingDown) {
throw new Error('Server is shutting down'); throw new ServerError('Server is shutting down');
} }
return new Promise((resolve, reject) => { return new Promise((resolve, reject) => {
@ -97,22 +165,33 @@ export class AcmeCertManager extends plugins.EventEmitter {
this.server.on('error', (error: NodeJS.ErrnoException) => { this.server.on('error', (error: NodeJS.ErrnoException) => {
if (error.code === 'EACCES') { if (error.code === 'EACCES') {
reject(new Error(`Permission denied to bind to port ${this.options.port}. Try running with elevated privileges or use a port > 1024.`)); reject(new ServerError(`Permission denied to bind to port ${this.options.port}. Try running with elevated privileges or use a port > 1024.`, error.code));
} else if (error.code === 'EADDRINUSE') { } else if (error.code === 'EADDRINUSE') {
reject(new Error(`Port ${this.options.port} is already in use.`)); reject(new ServerError(`Port ${this.options.port} is already in use.`, error.code));
} else { } else {
reject(error); reject(new ServerError(error.message, error.code));
} }
}); });
this.server.listen(this.options.port, () => { this.server.listen(this.options.port, () => {
console.log(`AcmeCertManager is listening on port ${this.options.port}`); console.log(`Port80Handler is listening on port ${this.options.port}`);
this.startRenewalTimer(); this.startRenewalTimer();
this.emit(CertManagerEvents.MANAGER_STARTED, this.options.port); this.emit(Port80HandlerEvents.MANAGER_STARTED, this.options.port);
// Start certificate process for domains with acmeMaintenance enabled
for (const [domain, domainInfo] of this.domainCertificates.entries()) {
if (domainInfo.options.acmeMaintenance && !domainInfo.certObtained && !domainInfo.obtainingInProgress) {
this.obtainCertificate(domain).catch(err => {
console.error(`Error obtaining initial certificate for ${domain}:`, err);
});
}
}
resolve(); resolve();
}); });
} catch (error) { } catch (error) {
reject(error); const message = error instanceof Error ? error.message : 'Unknown error starting server';
reject(new ServerError(message));
} }
}); });
} }
@ -138,7 +217,7 @@ export class AcmeCertManager extends plugins.EventEmitter {
this.server.close(() => { this.server.close(() => {
this.server = null; this.server = null;
this.isShuttingDown = false; this.isShuttingDown = false;
this.emit(CertManagerEvents.MANAGER_STOPPED); this.emit(Port80HandlerEvents.MANAGER_STOPPED);
resolve(); resolve();
}); });
} else { } else {
@ -149,13 +228,41 @@ export class AcmeCertManager extends plugins.EventEmitter {
} }
/** /**
* Adds a domain to be managed for certificates * Adds a domain with configuration options
* @param domain The domain to add * @param options Domain configuration options
*/ */
public addDomain(domain: string): void { public addDomain(options: IDomainOptions): void {
if (!this.domainCertificates.has(domain)) { if (!options.domainName || typeof options.domainName !== 'string') {
this.domainCertificates.set(domain, { certObtained: false, obtainingInProgress: false }); throw new Port80HandlerError('Invalid domain name');
console.log(`Domain added: ${domain}`); }
const domainName = options.domainName;
if (!this.domainCertificates.has(domainName)) {
this.domainCertificates.set(domainName, {
options,
certObtained: false,
obtainingInProgress: false
});
console.log(`Domain added: ${domainName} with configuration:`, {
sslRedirect: options.sslRedirect,
acmeMaintenance: options.acmeMaintenance,
hasForward: !!options.forward,
hasAcmeForward: !!options.acmeForward
});
// If acmeMaintenance is enabled, start certificate process immediately
if (options.acmeMaintenance && this.server) {
this.obtainCertificate(domainName).catch(err => {
console.error(`Error obtaining initial certificate for ${domainName}:`, err);
});
}
} else {
// Update existing domain with new options
const existing = this.domainCertificates.get(domainName)!;
existing.options = options;
console.log(`Domain ${domainName} configuration updated`);
} }
} }
@ -177,10 +284,25 @@ export class AcmeCertManager extends plugins.EventEmitter {
* @param expiryDate Optional expiry date * @param expiryDate Optional expiry date
*/ */
public setCertificate(domain: string, certificate: string, privateKey: string, expiryDate?: Date): void { public setCertificate(domain: string, certificate: string, privateKey: string, expiryDate?: Date): void {
if (!domain || !certificate || !privateKey) {
throw new Port80HandlerError('Domain, certificate and privateKey are required');
}
let domainInfo = this.domainCertificates.get(domain); let domainInfo = this.domainCertificates.get(domain);
if (!domainInfo) { if (!domainInfo) {
domainInfo = { certObtained: false, obtainingInProgress: false }; // Create default domain options if not already configured
const defaultOptions: IDomainOptions = {
domainName: domain,
sslRedirect: true,
acmeMaintenance: true
};
domainInfo = {
options: defaultOptions,
certObtained: false,
obtainingInProgress: false
};
this.domainCertificates.set(domain, domainInfo); this.domainCertificates.set(domain, domainInfo);
} }
@ -192,27 +314,18 @@ export class AcmeCertManager extends plugins.EventEmitter {
if (expiryDate) { if (expiryDate) {
domainInfo.expiryDate = expiryDate; domainInfo.expiryDate = expiryDate;
} else { } else {
// Try to extract expiry date from certificate // Extract expiry date from certificate
try { domainInfo.expiryDate = this.extractExpiryDateFromCertificate(certificate, domain);
// This is a simplistic approach - in a real implementation, use a proper
// certificate parsing library like node-forge or x509
const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
if (matches && matches[1]) {
domainInfo.expiryDate = new Date(matches[1]);
}
} catch (error) {
console.warn(`Failed to extract expiry date from certificate for ${domain}`);
}
} }
console.log(`Certificate set for ${domain}`); console.log(`Certificate set for ${domain}`);
// Emit certificate event // Emit certificate event
this.emitCertificateEvent(CertManagerEvents.CERTIFICATE_ISSUED, { this.emitCertificateEvent(Port80HandlerEvents.CERTIFICATE_ISSUED, {
domain, domain,
certificate, certificate,
privateKey, privateKey,
expiryDate: domainInfo.expiryDate || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000) // 90 days default expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate()
}); });
} }
@ -231,7 +344,7 @@ export class AcmeCertManager extends plugins.EventEmitter {
domain, domain,
certificate: domainInfo.certificate, certificate: domainInfo.certificate,
privateKey: domainInfo.privateKey, privateKey: domainInfo.privateKey,
expiryDate: domainInfo.expiryDate || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000) // 90 days default expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate()
}; };
} }
@ -244,23 +357,28 @@ export class AcmeCertManager extends plugins.EventEmitter {
return this.acmeClient; return this.acmeClient;
} }
// Generate a new account key try {
this.accountKey = (await plugins.acme.forge.createPrivateKey()).toString(); // Generate a new account key
this.accountKey = (await plugins.acme.forge.createPrivateKey()).toString();
this.acmeClient = new plugins.acme.Client({
directoryUrl: this.options.useProduction this.acmeClient = new plugins.acme.Client({
? plugins.acme.directory.letsencrypt.production directoryUrl: this.options.useProduction
: plugins.acme.directory.letsencrypt.staging, ? plugins.acme.directory.letsencrypt.production
accountKey: this.accountKey, : plugins.acme.directory.letsencrypt.staging,
}); accountKey: this.accountKey,
});
// Create a new account
await this.acmeClient.createAccount({ // Create a new account
termsOfServiceAgreed: true, await this.acmeClient.createAccount({
contact: [`mailto:${this.options.contactEmail}`], termsOfServiceAgreed: true,
}); contact: [`mailto:${this.options.contactEmail}`],
});
return this.acmeClient;
return this.acmeClient;
} catch (error) {
const message = error instanceof Error ? error.message : 'Unknown error initializing ACME client';
throw new Port80HandlerError(`Failed to initialize ACME client: ${message}`);
}
} }
/** /**
@ -279,12 +397,7 @@ export class AcmeCertManager extends plugins.EventEmitter {
// Extract domain (ignoring any port in the Host header) // Extract domain (ignoring any port in the Host header)
const domain = hostHeader.split(':')[0]; const domain = hostHeader.split(':')[0];
// If the request is for an ACME HTTP-01 challenge, handle it // Check if domain is configured
if (req.url && req.url.startsWith('/.well-known/acme-challenge/')) {
this.handleAcmeChallenge(req, res, domain);
return;
}
if (!this.domainCertificates.has(domain)) { if (!this.domainCertificates.has(domain)) {
res.statusCode = 404; res.statusCode = 404;
res.end('Domain not configured'); res.end('Domain not configured');
@ -292,9 +405,28 @@ export class AcmeCertManager extends plugins.EventEmitter {
} }
const domainInfo = this.domainCertificates.get(domain)!; const domainInfo = this.domainCertificates.get(domain)!;
const options = domainInfo.options;
// If certificate exists, redirect to HTTPS // If the request is for an ACME HTTP-01 challenge, handle it
if (domainInfo.certObtained) { if (req.url && req.url.startsWith('/.well-known/acme-challenge/')) {
// Check if we should forward ACME requests
if (options.acmeForward) {
this.forwardRequest(req, res, options.acmeForward, 'ACME challenge');
return;
}
this.handleAcmeChallenge(req, res, domain);
return;
}
// Check if we should forward non-ACME requests
if (options.forward) {
this.forwardRequest(req, res, options.forward, 'HTTP');
return;
}
// If certificate exists and sslRedirect is enabled, redirect to HTTPS
if (domainInfo.certObtained && options.sslRedirect) {
const httpsPort = this.options.httpsRedirectPort; const httpsPort = this.options.httpsRedirectPort;
const portSuffix = httpsPort === 443 ? '' : `:${httpsPort}`; const portSuffix = httpsPort === 443 ? '' : `:${httpsPort}`;
const redirectUrl = `https://${domain}${portSuffix}${req.url || '/'}`; const redirectUrl = `https://${domain}${portSuffix}${req.url || '/'}`;
@ -302,17 +434,93 @@ export class AcmeCertManager extends plugins.EventEmitter {
res.statusCode = 301; res.statusCode = 301;
res.setHeader('Location', redirectUrl); res.setHeader('Location', redirectUrl);
res.end(`Redirecting to ${redirectUrl}`); res.end(`Redirecting to ${redirectUrl}`);
} else { return;
}
// Handle case where certificate maintenance is enabled but not yet obtained
if (options.acmeMaintenance && !domainInfo.certObtained) {
// Trigger certificate issuance if not already running // Trigger certificate issuance if not already running
if (!domainInfo.obtainingInProgress) { if (!domainInfo.obtainingInProgress) {
this.obtainCertificate(domain).catch(err => { this.obtainCertificate(domain).catch(err => {
this.emit(CertManagerEvents.CERTIFICATE_FAILED, { domain, error: err.message }); const errorMessage = err instanceof Error ? err.message : 'Unknown error';
this.emit(Port80HandlerEvents.CERTIFICATE_FAILED, {
domain,
error: errorMessage,
isRenewal: false
});
console.error(`Error obtaining certificate for ${domain}:`, err); console.error(`Error obtaining certificate for ${domain}:`, err);
}); });
} }
res.statusCode = 503; res.statusCode = 503;
res.end('Certificate issuance in progress, please try again later.'); res.end('Certificate issuance in progress, please try again later.');
return;
}
// Default response for unhandled request
res.statusCode = 404;
res.end('No handlers configured for this request');
}
/**
* Forwards an HTTP request to the specified target
* @param req The original request
* @param res The response object
* @param target The forwarding target (IP and port)
* @param requestType Type of request for logging
*/
private forwardRequest(
req: plugins.http.IncomingMessage,
res: plugins.http.ServerResponse,
target: IForwardConfig,
requestType: string
): void {
const options = {
hostname: target.ip,
port: target.port,
path: req.url,
method: req.method,
headers: { ...req.headers }
};
const domain = req.headers.host?.split(':')[0] || 'unknown';
console.log(`Forwarding ${requestType} request for ${domain} to ${target.ip}:${target.port}`);
const proxyReq = plugins.http.request(options, (proxyRes) => {
// Copy status code
res.statusCode = proxyRes.statusCode || 500;
// Copy headers
for (const [key, value] of Object.entries(proxyRes.headers)) {
if (value) res.setHeader(key, value);
}
// Pipe response data
proxyRes.pipe(res);
this.emit(Port80HandlerEvents.REQUEST_FORWARDED, {
domain,
requestType,
target: `${target.ip}:${target.port}`,
statusCode: proxyRes.statusCode
});
});
proxyReq.on('error', (error) => {
console.error(`Error forwarding request to ${target.ip}:${target.port}:`, error);
if (!res.headersSent) {
res.statusCode = 502;
res.end(`Proxy error: ${error.message}`);
} else {
res.end();
}
});
// Pipe original request to proxy request
if (req.readable) {
req.pipe(proxyReq);
} else {
proxyReq.end();
} }
} }
@ -354,7 +562,13 @@ export class AcmeCertManager extends plugins.EventEmitter {
// Get the domain info // Get the domain info
const domainInfo = this.domainCertificates.get(domain); const domainInfo = this.domainCertificates.get(domain);
if (!domainInfo) { if (!domainInfo) {
throw new Error(`Domain not found: ${domain}`); throw new CertificateError('Domain not found', domain, isRenewal);
}
// Verify that acmeMaintenance is enabled
if (!domainInfo.options.acmeMaintenance) {
console.log(`Skipping certificate issuance for ${domain} - acmeMaintenance is disabled`);
return;
} }
// Prevent concurrent certificate issuance // Prevent concurrent certificate issuance
@ -377,40 +591,8 @@ export class AcmeCertManager extends plugins.EventEmitter {
// Get the authorizations for the order // Get the authorizations for the order
const authorizations = await client.getAuthorizations(order); const authorizations = await client.getAuthorizations(order);
for (const authz of authorizations) { // Process each authorization
const challenge = authz.challenges.find(ch => ch.type === 'http-01'); await this.processAuthorizations(client, domain, authorizations);
if (!challenge) {
throw new Error('HTTP-01 challenge not found');
}
// Get the key authorization for the challenge
const keyAuthorization = await client.getChallengeKeyAuthorization(challenge);
// Store the challenge data
domainInfo.challengeToken = challenge.token;
domainInfo.challengeKeyAuthorization = keyAuthorization;
// ACME client type definition workaround - use compatible approach
// First check if challenge verification is needed
const authzUrl = authz.url;
try {
// Check if authzUrl exists and perform verification
if (authzUrl) {
await client.verifyChallenge(authz, challenge);
}
// Complete the challenge
await client.completeChallenge(challenge);
// Wait for validation
await client.waitForValidStatus(challenge);
console.log(`HTTP-01 challenge completed for ${domain}`);
} catch (error) {
console.error(`Challenge error for ${domain}:`, error);
throw error;
}
}
// Generate a CSR and private key // Generate a CSR and private key
const [csrBuffer, privateKeyBuffer] = await plugins.acme.forge.createCsr({ const [csrBuffer, privateKeyBuffer] = await plugins.acme.forge.createCsr({
@ -436,28 +618,20 @@ export class AcmeCertManager extends plugins.EventEmitter {
delete domainInfo.challengeKeyAuthorization; delete domainInfo.challengeKeyAuthorization;
// Extract expiry date from certificate // Extract expiry date from certificate
try { domainInfo.expiryDate = this.extractExpiryDateFromCertificate(certificate, domain);
const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
if (matches && matches[1]) {
domainInfo.expiryDate = new Date(matches[1]);
console.log(`Certificate for ${domain} will expire on ${domainInfo.expiryDate.toISOString()}`);
}
} catch (error) {
console.warn(`Failed to extract expiry date from certificate for ${domain}`);
}
console.log(`Certificate ${isRenewal ? 'renewed' : 'obtained'} for ${domain}`); console.log(`Certificate ${isRenewal ? 'renewed' : 'obtained'} for ${domain}`);
// Emit the appropriate event // Emit the appropriate event
const eventType = isRenewal const eventType = isRenewal
? CertManagerEvents.CERTIFICATE_RENEWED ? Port80HandlerEvents.CERTIFICATE_RENEWED
: CertManagerEvents.CERTIFICATE_ISSUED; : Port80HandlerEvents.CERTIFICATE_ISSUED;
this.emitCertificateEvent(eventType, { this.emitCertificateEvent(eventType, {
domain, domain,
certificate, certificate,
privateKey, privateKey,
expiryDate: domainInfo.expiryDate || new Date(Date.now() + 90 * 24 * 60 * 60 * 1000) // 90 days default expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate()
}); });
} catch (error: any) { } catch (error: any) {
@ -473,17 +647,76 @@ export class AcmeCertManager extends plugins.EventEmitter {
} }
// Emit failure event // Emit failure event
this.emit(CertManagerEvents.CERTIFICATE_FAILED, { this.emit(Port80HandlerEvents.CERTIFICATE_FAILED, {
domain, domain,
error: error.message || 'Unknown error', error: error.message || 'Unknown error',
isRenewal isRenewal
}); } as ICertificateFailure);
throw new CertificateError(
error.message || 'Certificate issuance failed',
domain,
isRenewal
);
} finally { } finally {
// Reset flag whether successful or not // Reset flag whether successful or not
domainInfo.obtainingInProgress = false; domainInfo.obtainingInProgress = false;
} }
} }
/**
* Process ACME authorizations by verifying and completing challenges
* @param client ACME client
* @param domain Domain name
* @param authorizations Authorizations to process
*/
private async processAuthorizations(
client: plugins.acme.Client,
domain: string,
authorizations: plugins.acme.Authorization[]
): Promise<void> {
const domainInfo = this.domainCertificates.get(domain);
if (!domainInfo) {
throw new CertificateError('Domain not found during authorization', domain);
}
for (const authz of authorizations) {
const challenge = authz.challenges.find(ch => ch.type === 'http-01');
if (!challenge) {
throw new CertificateError('HTTP-01 challenge not found', domain);
}
// Get the key authorization for the challenge
const keyAuthorization = await client.getChallengeKeyAuthorization(challenge);
// Store the challenge data
domainInfo.challengeToken = challenge.token;
domainInfo.challengeKeyAuthorization = keyAuthorization;
// ACME client type definition workaround - use compatible approach
// First check if challenge verification is needed
const authzUrl = authz.url;
try {
// Check if authzUrl exists and perform verification
if (authzUrl) {
await client.verifyChallenge(authz, challenge);
}
// Complete the challenge
await client.completeChallenge(challenge);
// Wait for validation
await client.waitForValidStatus(challenge);
console.log(`HTTP-01 challenge completed for ${domain}`);
} catch (error) {
const errorMessage = error instanceof Error ? error.message : 'Unknown challenge error';
console.error(`Challenge error for ${domain}:`, error);
throw new CertificateError(`Challenge verification failed: ${errorMessage}`, domain);
}
}
}
/** /**
* Starts the certificate renewal timer * Starts the certificate renewal timer
*/ */
@ -519,6 +752,11 @@ export class AcmeCertManager extends plugins.EventEmitter {
const renewThresholdMs = this.options.renewThresholdDays * 24 * 60 * 60 * 1000; const renewThresholdMs = this.options.renewThresholdDays * 24 * 60 * 60 * 1000;
for (const [domain, domainInfo] of this.domainCertificates.entries()) { for (const [domain, domainInfo] of this.domainCertificates.entries()) {
// Skip domains with acmeMaintenance disabled
if (!domainInfo.options.acmeMaintenance) {
continue;
}
// Skip domains without certificates or already in renewal // Skip domains without certificates or already in renewal
if (!domainInfo.certObtained || domainInfo.obtainingInProgress) { if (!domainInfo.certObtained || domainInfo.obtainingInProgress) {
continue; continue;
@ -534,26 +772,67 @@ export class AcmeCertManager extends plugins.EventEmitter {
// Check if certificate is near expiry // Check if certificate is near expiry
if (timeUntilExpiry <= renewThresholdMs) { if (timeUntilExpiry <= renewThresholdMs) {
console.log(`Certificate for ${domain} expires soon, renewing...`); console.log(`Certificate for ${domain} expires soon, renewing...`);
this.emit(CertManagerEvents.CERTIFICATE_EXPIRING, {
const daysRemaining = Math.ceil(timeUntilExpiry / (24 * 60 * 60 * 1000));
this.emit(Port80HandlerEvents.CERTIFICATE_EXPIRING, {
domain, domain,
expiryDate: domainInfo.expiryDate, expiryDate: domainInfo.expiryDate,
daysRemaining: Math.ceil(timeUntilExpiry / (24 * 60 * 60 * 1000)) daysRemaining
}); } as ICertificateExpiring);
// Start renewal process // Start renewal process
this.obtainCertificate(domain, true).catch(err => { this.obtainCertificate(domain, true).catch(err => {
console.error(`Error renewing certificate for ${domain}:`, err); const errorMessage = err instanceof Error ? err.message : 'Unknown error';
console.error(`Error renewing certificate for ${domain}:`, errorMessage);
}); });
} }
} }
} }
/**
* Extract expiry date from certificate using a more robust approach
* @param certificate Certificate PEM string
* @param domain Domain for logging
* @returns Extracted expiry date or default
*/
private extractExpiryDateFromCertificate(certificate: string, domain: string): Date {
try {
// This is still using regex, but in a real implementation you would use
// a library like node-forge or x509 to properly parse the certificate
const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i);
if (matches && matches[1]) {
const expiryDate = new Date(matches[1]);
// Validate that we got a valid date
if (!isNaN(expiryDate.getTime())) {
console.log(`Certificate for ${domain} will expire on ${expiryDate.toISOString()}`);
return expiryDate;
}
}
console.warn(`Could not extract valid expiry date from certificate for ${domain}, using default`);
return this.getDefaultExpiryDate();
} catch (error) {
console.warn(`Failed to extract expiry date from certificate for ${domain}, using default`);
return this.getDefaultExpiryDate();
}
}
/**
* Get a default expiry date (90 days from now)
* @returns Default expiry date
*/
private getDefaultExpiryDate(): Date {
return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days default
}
/** /**
* Emits a certificate event with the certificate data * Emits a certificate event with the certificate data
* @param eventType The event type to emit * @param eventType The event type to emit
* @param data The certificate data * @param data The certificate data
*/ */
private emitCertificateEvent(eventType: CertManagerEvents, data: ICertificateData): void { private emitCertificateEvent(eventType: Port80HandlerEvents, data: ICertificateData): void {
this.emit(eventType, data); this.emit(eventType, data);
} }
} }