import * as plugins from '../plugins.js'; import { IncomingMessage, ServerResponse } from 'http'; import * as fs from 'fs'; import * as path from 'path'; /** * Custom error classes for better error handling */ export class Port80HandlerError extends Error { constructor(message: string) { super(message); this.name = 'Port80HandlerError'; } } export class CertificateError extends Port80HandlerError { constructor( message: string, public readonly domain: string, public readonly isRenewal: boolean = false ) { super(`${message} for domain ${domain}${isRenewal ? ' (renewal)' : ''}`); this.name = 'CertificateError'; } } export class ServerError extends Port80HandlerError { constructor(message: string, public readonly code?: string) { super(message); this.name = 'ServerError'; } } /** * Domain forwarding configuration */ export interface IForwardConfig { ip: string; port: number; } /** * Domain configuration options */ export interface IDomainOptions { domainName: string; sslRedirect: boolean; // if true redirects the request to port 443 acmeMaintenance: boolean; // tries to always have a valid cert for this domain forward?: IForwardConfig; // forwards all http requests to that target acmeForward?: IForwardConfig; // forwards letsencrypt requests to this config } /** * Represents a domain configuration with certificate status information */ interface IDomainCertificate { options: IDomainOptions; certObtained: boolean; obtainingInProgress: boolean; certificate?: string; privateKey?: string; challengeToken?: string; challengeKeyAuthorization?: string; expiryDate?: Date; lastRenewalAttempt?: Date; } /** * Configuration options for the Port80Handler */ interface IPort80HandlerOptions { port?: number; contactEmail?: string; useProduction?: boolean; renewThresholdDays?: number; httpsRedirectPort?: number; renewCheckIntervalHours?: number; enabled?: boolean; // Whether ACME is enabled at all autoRenew?: boolean; // Whether to automatically renew certificates certificateStore?: string; // Directory to store certificates skipConfiguredCerts?: boolean; // Skip domains that already have certificates } /** * Certificate data that can be emitted via events or set from outside */ export interface ICertificateData { domain: string; certificate: string; privateKey: string; expiryDate: Date; } /** * Events emitted by the Port80Handler */ export enum Port80HandlerEvents { CERTIFICATE_ISSUED = 'certificate-issued', CERTIFICATE_RENEWED = 'certificate-renewed', CERTIFICATE_FAILED = 'certificate-failed', CERTIFICATE_EXPIRING = 'certificate-expiring', MANAGER_STARTED = 'manager-started', MANAGER_STOPPED = 'manager-stopped', REQUEST_FORWARDED = 'request-forwarded', } /** * Certificate failure payload type */ export interface ICertificateFailure { domain: string; error: string; isRenewal: boolean; } /** * Certificate expiry payload type */ export interface ICertificateExpiring { domain: string; expiryDate: Date; daysRemaining: number; } /** * Port80Handler with ACME certificate management and request forwarding capabilities * Now with glob pattern support for domain matching */ export class Port80Handler extends plugins.EventEmitter { private domainCertificates: Map; private server: plugins.http.Server | null = null; private acmeClient: plugins.acme.Client | null = null; private accountKey: string | null = null; private renewalTimer: NodeJS.Timeout | null = null; private isShuttingDown: boolean = false; private options: Required; /** * Creates a new Port80Handler * @param options Configuration options */ constructor(options: IPort80HandlerOptions = {}) { super(); this.domainCertificates = new Map(); // Default options this.options = { port: options.port ?? 80, contactEmail: options.contactEmail ?? 'admin@example.com', useProduction: options.useProduction ?? false, // Safer default: staging renewThresholdDays: options.renewThresholdDays ?? 10, // Changed to 10 days as per requirements httpsRedirectPort: options.httpsRedirectPort ?? 443, renewCheckIntervalHours: options.renewCheckIntervalHours ?? 24, enabled: options.enabled ?? true, // Enable by default autoRenew: options.autoRenew ?? true, // Auto-renew by default certificateStore: options.certificateStore ?? './certs', // Default store location skipConfiguredCerts: options.skipConfiguredCerts ?? false }; } /** * Starts the HTTP server for ACME challenges */ public async start(): Promise { if (this.server) { throw new ServerError('Server is already running'); } if (this.isShuttingDown) { throw new ServerError('Server is shutting down'); } // Skip if disabled if (this.options.enabled === false) { console.log('Port80Handler is disabled, skipping start'); return; } return new Promise((resolve, reject) => { try { // Load certificates from store if enabled if (this.options.certificateStore) { this.loadCertificatesFromStore(); } this.server = plugins.http.createServer((req, res) => this.handleRequest(req, res)); this.server.on('error', (error: NodeJS.ErrnoException) => { if (error.code === 'EACCES') { reject(new ServerError(`Permission denied to bind to port ${this.options.port}. Try running with elevated privileges or use a port > 1024.`, error.code)); } else if (error.code === 'EADDRINUSE') { reject(new ServerError(`Port ${this.options.port} is already in use.`, error.code)); } else { reject(new ServerError(error.message, error.code)); } }); this.server.listen(this.options.port, () => { console.log(`Port80Handler is listening on port ${this.options.port}`); this.startRenewalTimer(); this.emit(Port80HandlerEvents.MANAGER_STARTED, this.options.port); // Start certificate process for domains with acmeMaintenance enabled for (const [domain, domainInfo] of this.domainCertificates.entries()) { // Skip glob patterns for certificate issuance if (this.isGlobPattern(domain)) { console.log(`Skipping initial certificate for glob pattern: ${domain}`); continue; } if (domainInfo.options.acmeMaintenance && !domainInfo.certObtained && !domainInfo.obtainingInProgress) { this.obtainCertificate(domain).catch(err => { console.error(`Error obtaining initial certificate for ${domain}:`, err); }); } } resolve(); }); } catch (error) { const message = error instanceof Error ? error.message : 'Unknown error starting server'; reject(new ServerError(message)); } }); } /** * Stops the HTTP server and renewal timer */ public async stop(): Promise { if (!this.server) { return; } this.isShuttingDown = true; // Stop the renewal timer if (this.renewalTimer) { clearInterval(this.renewalTimer); this.renewalTimer = null; } return new Promise((resolve) => { if (this.server) { this.server.close(() => { this.server = null; this.isShuttingDown = false; this.emit(Port80HandlerEvents.MANAGER_STOPPED); resolve(); }); } else { this.isShuttingDown = false; resolve(); } }); } /** * Adds a domain with configuration options * @param options Domain configuration options */ public addDomain(options: IDomainOptions): void { if (!options.domainName || typeof options.domainName !== 'string') { throw new Port80HandlerError('Invalid domain name'); } const domainName = options.domainName; if (!this.domainCertificates.has(domainName)) { this.domainCertificates.set(domainName, { options, certObtained: false, obtainingInProgress: false }); console.log(`Domain added: ${domainName} with configuration:`, { sslRedirect: options.sslRedirect, acmeMaintenance: options.acmeMaintenance, hasForward: !!options.forward, hasAcmeForward: !!options.acmeForward }); // If acmeMaintenance is enabled and not a glob pattern, start certificate process immediately if (options.acmeMaintenance && this.server && !this.isGlobPattern(domainName)) { this.obtainCertificate(domainName).catch(err => { console.error(`Error obtaining initial certificate for ${domainName}:`, err); }); } } else { // Update existing domain with new options const existing = this.domainCertificates.get(domainName)!; existing.options = options; console.log(`Domain ${domainName} configuration updated`); } } /** * Removes a domain from management * @param domain The domain to remove */ public removeDomain(domain: string): void { if (this.domainCertificates.delete(domain)) { console.log(`Domain removed: ${domain}`); } } /** * Sets a certificate for a domain directly (for externally obtained certificates) * @param domain The domain for the certificate * @param certificate The certificate (PEM format) * @param privateKey The private key (PEM format) * @param expiryDate Optional expiry date */ public setCertificate(domain: string, certificate: string, privateKey: string, expiryDate?: Date): void { if (!domain || !certificate || !privateKey) { throw new Port80HandlerError('Domain, certificate and privateKey are required'); } // Don't allow setting certificates for glob patterns if (this.isGlobPattern(domain)) { throw new Port80HandlerError('Cannot set certificate for glob pattern domains'); } let domainInfo = this.domainCertificates.get(domain); if (!domainInfo) { // Create default domain options if not already configured const defaultOptions: IDomainOptions = { domainName: domain, sslRedirect: true, acmeMaintenance: true }; domainInfo = { options: defaultOptions, certObtained: false, obtainingInProgress: false }; this.domainCertificates.set(domain, domainInfo); } domainInfo.certificate = certificate; domainInfo.privateKey = privateKey; domainInfo.certObtained = true; domainInfo.obtainingInProgress = false; if (expiryDate) { domainInfo.expiryDate = expiryDate; } else { // Extract expiry date from certificate domainInfo.expiryDate = this.extractExpiryDateFromCertificate(certificate, domain); } console.log(`Certificate set for ${domain}`); // Save certificate to store if enabled if (this.options.certificateStore) { this.saveCertificateToStore(domain, certificate, privateKey); } // Emit certificate event this.emitCertificateEvent(Port80HandlerEvents.CERTIFICATE_ISSUED, { domain, certificate, privateKey, expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate() }); } /** * Gets the certificate for a domain if it exists * @param domain The domain to get the certificate for */ public getCertificate(domain: string): ICertificateData | null { // Can't get certificates for glob patterns if (this.isGlobPattern(domain)) { return null; } const domainInfo = this.domainCertificates.get(domain); if (!domainInfo || !domainInfo.certObtained || !domainInfo.certificate || !domainInfo.privateKey) { return null; } return { domain, certificate: domainInfo.certificate, privateKey: domainInfo.privateKey, expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate() }; } /** * Saves a certificate to the filesystem store * @param domain The domain for the certificate * @param certificate The certificate (PEM format) * @param privateKey The private key (PEM format) * @private */ private saveCertificateToStore(domain: string, certificate: string, privateKey: string): void { // Skip if certificate store is not enabled if (!this.options.certificateStore) return; try { const storePath = this.options.certificateStore; // Ensure the directory exists if (!fs.existsSync(storePath)) { fs.mkdirSync(storePath, { recursive: true }); console.log(`Created certificate store directory: ${storePath}`); } const certPath = path.join(storePath, `${domain}.cert.pem`); const keyPath = path.join(storePath, `${domain}.key.pem`); // Write certificate and private key files fs.writeFileSync(certPath, certificate); fs.writeFileSync(keyPath, privateKey); // Set secure permissions for private key try { fs.chmodSync(keyPath, 0o600); } catch (err) { console.log(`Warning: Could not set secure permissions on ${keyPath}`); } console.log(`Saved certificate for ${domain} to ${certPath}`); } catch (err) { console.error(`Error saving certificate for ${domain}:`, err); } } /** * Loads certificates from the certificate store * @private */ private loadCertificatesFromStore(): void { if (!this.options.certificateStore) return; try { const storePath = this.options.certificateStore; // Ensure the directory exists if (!fs.existsSync(storePath)) { fs.mkdirSync(storePath, { recursive: true }); console.log(`Created certificate store directory: ${storePath}`); return; } // Get list of certificate files const files = fs.readdirSync(storePath); const certFiles = files.filter(file => file.endsWith('.cert.pem')); // Load each certificate for (const certFile of certFiles) { const domain = certFile.replace('.cert.pem', ''); const keyFile = `${domain}.key.pem`; // Skip if key file doesn't exist if (!files.includes(keyFile)) { console.log(`Warning: Found certificate for ${domain} but no key file`); continue; } // Skip if we should skip configured certs if (this.options.skipConfiguredCerts) { const domainInfo = this.domainCertificates.get(domain); if (domainInfo && domainInfo.certObtained) { console.log(`Skipping already configured certificate for ${domain}`); continue; } } // Load certificate and key try { const certificate = fs.readFileSync(path.join(storePath, certFile), 'utf8'); const privateKey = fs.readFileSync(path.join(storePath, keyFile), 'utf8'); // Extract expiry date let expiryDate: Date | undefined; try { const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i); if (matches && matches[1]) { expiryDate = new Date(matches[1]); } } catch (err) { console.log(`Warning: Could not extract expiry date from certificate for ${domain}`); } // Check if domain is already registered let domainInfo = this.domainCertificates.get(domain); if (!domainInfo) { // Register domain if not already registered domainInfo = { options: { domainName: domain, sslRedirect: true, acmeMaintenance: true }, certObtained: false, obtainingInProgress: false }; this.domainCertificates.set(domain, domainInfo); } // Set certificate domainInfo.certificate = certificate; domainInfo.privateKey = privateKey; domainInfo.certObtained = true; domainInfo.expiryDate = expiryDate; console.log(`Loaded certificate for ${domain} from store, valid until ${expiryDate?.toISOString() || 'unknown'}`); } catch (err) { console.error(`Error loading certificate for ${domain}:`, err); } } } catch (err) { console.error('Error loading certificates from store:', err); } } /** * Check if a domain is a glob pattern * @param domain Domain to check * @returns True if the domain is a glob pattern */ private isGlobPattern(domain: string): boolean { return domain.includes('*'); } /** * Get domain info for a specific domain, using glob pattern matching if needed * @param requestDomain The actual domain from the request * @returns The domain info or null if not found */ private getDomainInfoForRequest(requestDomain: string): { domainInfo: IDomainCertificate, pattern: string } | null { // Try direct match first if (this.domainCertificates.has(requestDomain)) { return { domainInfo: this.domainCertificates.get(requestDomain)!, pattern: requestDomain }; } // Then try glob patterns for (const [pattern, domainInfo] of this.domainCertificates.entries()) { if (this.isGlobPattern(pattern) && this.domainMatchesPattern(requestDomain, pattern)) { return { domainInfo, pattern }; } } return null; } /** * Check if a domain matches a glob pattern * @param domain The domain to check * @param pattern The pattern to match against * @returns True if the domain matches the pattern */ private domainMatchesPattern(domain: string, pattern: string): boolean { // Handle different glob pattern styles if (pattern.startsWith('*.')) { // *.example.com matches any subdomain const suffix = pattern.substring(2); return domain.endsWith(suffix) && domain.includes('.') && domain !== suffix; } else if (pattern.endsWith('.*')) { // example.* matches any TLD const prefix = pattern.substring(0, pattern.length - 2); const domainParts = domain.split('.'); return domain.startsWith(prefix + '.') && domainParts.length >= 2; } else if (pattern === '*') { // Wildcard matches everything return true; } else { // Exact match (shouldn't reach here as we check exact matches first) return domain === pattern; } } /** * Lazy initialization of the ACME client * @returns An ACME client instance */ private async getAcmeClient(): Promise { if (this.acmeClient) { return this.acmeClient; } try { // Generate a new account key this.accountKey = (await plugins.acme.forge.createPrivateKey()).toString(); this.acmeClient = new plugins.acme.Client({ directoryUrl: this.options.useProduction ? plugins.acme.directory.letsencrypt.production : plugins.acme.directory.letsencrypt.staging, accountKey: this.accountKey, }); // Create a new account await this.acmeClient.createAccount({ termsOfServiceAgreed: true, contact: [`mailto:${this.options.contactEmail}`], }); return this.acmeClient; } catch (error) { const message = error instanceof Error ? error.message : 'Unknown error initializing ACME client'; throw new Port80HandlerError(`Failed to initialize ACME client: ${message}`); } } /** * Handles incoming HTTP requests * @param req The HTTP request * @param res The HTTP response */ private handleRequest(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse): void { const hostHeader = req.headers.host; if (!hostHeader) { res.statusCode = 400; res.end('Bad Request: Host header is missing'); return; } // Extract domain (ignoring any port in the Host header) const domain = hostHeader.split(':')[0]; // Get domain config, using glob pattern matching if needed const domainMatch = this.getDomainInfoForRequest(domain); if (!domainMatch) { res.statusCode = 404; res.end('Domain not configured'); return; } const { domainInfo, pattern } = domainMatch; const options = domainInfo.options; // If the request is for an ACME HTTP-01 challenge, handle it if (req.url && req.url.startsWith('/.well-known/acme-challenge/') && (options.acmeMaintenance || options.acmeForward)) { // Check if we should forward ACME requests if (options.acmeForward) { this.forwardRequest(req, res, options.acmeForward, 'ACME challenge'); return; } // Only handle ACME challenges for non-glob patterns if (!this.isGlobPattern(pattern)) { this.handleAcmeChallenge(req, res, domain); return; } } // Check if we should forward non-ACME requests if (options.forward) { this.forwardRequest(req, res, options.forward, 'HTTP'); return; } // If certificate exists and sslRedirect is enabled, redirect to HTTPS // (Skip for glob patterns as they won't have certificates) if (!this.isGlobPattern(pattern) && domainInfo.certObtained && options.sslRedirect) { const httpsPort = this.options.httpsRedirectPort; const portSuffix = httpsPort === 443 ? '' : `:${httpsPort}`; const redirectUrl = `https://${domain}${portSuffix}${req.url || '/'}`; res.statusCode = 301; res.setHeader('Location', redirectUrl); res.end(`Redirecting to ${redirectUrl}`); return; } // Handle case where certificate maintenance is enabled but not yet obtained // (Skip for glob patterns as they can't have certificates) if (!this.isGlobPattern(pattern) && options.acmeMaintenance && !domainInfo.certObtained) { // Trigger certificate issuance if not already running if (!domainInfo.obtainingInProgress) { this.obtainCertificate(domain).catch(err => { const errorMessage = err instanceof Error ? err.message : 'Unknown error'; this.emit(Port80HandlerEvents.CERTIFICATE_FAILED, { domain, error: errorMessage, isRenewal: false }); console.error(`Error obtaining certificate for ${domain}:`, err); }); } res.statusCode = 503; res.end('Certificate issuance in progress, please try again later.'); return; } // Default response for unhandled request res.statusCode = 404; res.end('No handlers configured for this request'); } /** * Forwards an HTTP request to the specified target * @param req The original request * @param res The response object * @param target The forwarding target (IP and port) * @param requestType Type of request for logging */ private forwardRequest( req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse, target: IForwardConfig, requestType: string ): void { const options = { hostname: target.ip, port: target.port, path: req.url, method: req.method, headers: { ...req.headers } }; const domain = req.headers.host?.split(':')[0] || 'unknown'; console.log(`Forwarding ${requestType} request for ${domain} to ${target.ip}:${target.port}`); const proxyReq = plugins.http.request(options, (proxyRes) => { // Copy status code res.statusCode = proxyRes.statusCode || 500; // Copy headers for (const [key, value] of Object.entries(proxyRes.headers)) { if (value) res.setHeader(key, value); } // Pipe response data proxyRes.pipe(res); this.emit(Port80HandlerEvents.REQUEST_FORWARDED, { domain, requestType, target: `${target.ip}:${target.port}`, statusCode: proxyRes.statusCode }); }); proxyReq.on('error', (error) => { console.error(`Error forwarding request to ${target.ip}:${target.port}:`, error); if (!res.headersSent) { res.statusCode = 502; res.end(`Proxy error: ${error.message}`); } else { res.end(); } }); // Pipe original request to proxy request if (req.readable) { req.pipe(proxyReq); } else { proxyReq.end(); } } /** * Serves the ACME HTTP-01 challenge response * @param req The HTTP request * @param res The HTTP response * @param domain The domain for the challenge */ private handleAcmeChallenge(req: plugins.http.IncomingMessage, res: plugins.http.ServerResponse, domain: string): void { const domainInfo = this.domainCertificates.get(domain); if (!domainInfo) { res.statusCode = 404; res.end('Domain not configured'); return; } // The token is the last part of the URL const urlParts = req.url?.split('/'); const token = urlParts ? urlParts[urlParts.length - 1] : ''; if (domainInfo.challengeToken === token && domainInfo.challengeKeyAuthorization) { res.statusCode = 200; res.setHeader('Content-Type', 'text/plain'); res.end(domainInfo.challengeKeyAuthorization); console.log(`Served ACME challenge response for ${domain}`); } else { res.statusCode = 404; res.end('Challenge token not found'); } } /** * Obtains a certificate for a domain using ACME HTTP-01 challenge * @param domain The domain to obtain a certificate for * @param isRenewal Whether this is a renewal attempt */ private async obtainCertificate(domain: string, isRenewal: boolean = false): Promise { // Don't allow certificate issuance for glob patterns if (this.isGlobPattern(domain)) { throw new CertificateError('Cannot obtain certificates for glob pattern domains', domain, isRenewal); } // Get the domain info const domainInfo = this.domainCertificates.get(domain); if (!domainInfo) { throw new CertificateError('Domain not found', domain, isRenewal); } // Verify that acmeMaintenance is enabled if (!domainInfo.options.acmeMaintenance) { console.log(`Skipping certificate issuance for ${domain} - acmeMaintenance is disabled`); return; } // Prevent concurrent certificate issuance if (domainInfo.obtainingInProgress) { console.log(`Certificate issuance already in progress for ${domain}`); return; } domainInfo.obtainingInProgress = true; domainInfo.lastRenewalAttempt = new Date(); try { const client = await this.getAcmeClient(); // Create a new order for the domain const order = await client.createOrder({ identifiers: [{ type: 'dns', value: domain }], }); // Get the authorizations for the order const authorizations = await client.getAuthorizations(order); // Process each authorization await this.processAuthorizations(client, domain, authorizations); // Generate a CSR and private key const [csrBuffer, privateKeyBuffer] = await plugins.acme.forge.createCsr({ commonName: domain, }); const csr = csrBuffer.toString(); const privateKey = privateKeyBuffer.toString(); // Finalize the order with our CSR await client.finalizeOrder(order, csr); // Get the certificate with the full chain const certificate = await client.getCertificate(order); // Store the certificate and key domainInfo.certificate = certificate; domainInfo.privateKey = privateKey; domainInfo.certObtained = true; // Clear challenge data delete domainInfo.challengeToken; delete domainInfo.challengeKeyAuthorization; // Extract expiry date from certificate domainInfo.expiryDate = this.extractExpiryDateFromCertificate(certificate, domain); console.log(`Certificate ${isRenewal ? 'renewed' : 'obtained'} for ${domain}`); // Save the certificate to the store if enabled if (this.options.certificateStore) { this.saveCertificateToStore(domain, certificate, privateKey); } // Emit the appropriate event const eventType = isRenewal ? Port80HandlerEvents.CERTIFICATE_RENEWED : Port80HandlerEvents.CERTIFICATE_ISSUED; this.emitCertificateEvent(eventType, { domain, certificate, privateKey, expiryDate: domainInfo.expiryDate || this.getDefaultExpiryDate() }); } catch (error: any) { // Check for rate limit errors if (error.message && ( error.message.includes('rateLimited') || error.message.includes('too many certificates') || error.message.includes('rate limit') )) { console.error(`Rate limit reached for ${domain}. Waiting before retry.`); } else { console.error(`Error during certificate issuance for ${domain}:`, error); } // Emit failure event this.emit(Port80HandlerEvents.CERTIFICATE_FAILED, { domain, error: error.message || 'Unknown error', isRenewal } as ICertificateFailure); throw new CertificateError( error.message || 'Certificate issuance failed', domain, isRenewal ); } finally { // Reset flag whether successful or not domainInfo.obtainingInProgress = false; } } /** * Process ACME authorizations by verifying and completing challenges * @param client ACME client * @param domain Domain name * @param authorizations Authorizations to process */ private async processAuthorizations( client: plugins.acme.Client, domain: string, authorizations: plugins.acme.Authorization[] ): Promise { const domainInfo = this.domainCertificates.get(domain); if (!domainInfo) { throw new CertificateError('Domain not found during authorization', domain); } for (const authz of authorizations) { const challenge = authz.challenges.find(ch => ch.type === 'http-01'); if (!challenge) { throw new CertificateError('HTTP-01 challenge not found', domain); } // Get the key authorization for the challenge const keyAuthorization = await client.getChallengeKeyAuthorization(challenge); // Store the challenge data domainInfo.challengeToken = challenge.token; domainInfo.challengeKeyAuthorization = keyAuthorization; // ACME client type definition workaround - use compatible approach // First check if challenge verification is needed const authzUrl = authz.url; try { // Check if authzUrl exists and perform verification if (authzUrl) { await client.verifyChallenge(authz, challenge); } // Complete the challenge await client.completeChallenge(challenge); // Wait for validation await client.waitForValidStatus(challenge); console.log(`HTTP-01 challenge completed for ${domain}`); } catch (error) { const errorMessage = error instanceof Error ? error.message : 'Unknown challenge error'; console.error(`Challenge error for ${domain}:`, error); throw new CertificateError(`Challenge verification failed: ${errorMessage}`, domain); } } } /** * Starts the certificate renewal timer */ private startRenewalTimer(): void { if (this.renewalTimer) { clearInterval(this.renewalTimer); } // Convert hours to milliseconds const checkInterval = this.options.renewCheckIntervalHours * 60 * 60 * 1000; this.renewalTimer = setInterval(() => this.checkForRenewals(), checkInterval); // Prevent the timer from keeping the process alive if (this.renewalTimer.unref) { this.renewalTimer.unref(); } console.log(`Certificate renewal check scheduled every ${this.options.renewCheckIntervalHours} hours`); } /** * Checks for certificates that need renewal */ private checkForRenewals(): void { if (this.isShuttingDown) { return; } // Skip renewal if auto-renewal is disabled if (this.options.autoRenew === false) { console.log('Auto-renewal is disabled, skipping certificate renewal check'); return; } console.log('Checking for certificates that need renewal...'); const now = new Date(); const renewThresholdMs = this.options.renewThresholdDays * 24 * 60 * 60 * 1000; for (const [domain, domainInfo] of this.domainCertificates.entries()) { // Skip glob patterns if (this.isGlobPattern(domain)) { continue; } // Skip domains with acmeMaintenance disabled if (!domainInfo.options.acmeMaintenance) { continue; } // Skip domains without certificates or already in renewal if (!domainInfo.certObtained || domainInfo.obtainingInProgress) { continue; } // Skip domains without expiry dates if (!domainInfo.expiryDate) { continue; } const timeUntilExpiry = domainInfo.expiryDate.getTime() - now.getTime(); // Check if certificate is near expiry if (timeUntilExpiry <= renewThresholdMs) { console.log(`Certificate for ${domain} expires soon, renewing...`); const daysRemaining = Math.ceil(timeUntilExpiry / (24 * 60 * 60 * 1000)); this.emit(Port80HandlerEvents.CERTIFICATE_EXPIRING, { domain, expiryDate: domainInfo.expiryDate, daysRemaining } as ICertificateExpiring); // Start renewal process this.obtainCertificate(domain, true).catch(err => { const errorMessage = err instanceof Error ? err.message : 'Unknown error'; console.error(`Error renewing certificate for ${domain}:`, errorMessage); }); } } } /** * Extract expiry date from certificate using a more robust approach * @param certificate Certificate PEM string * @param domain Domain for logging * @returns Extracted expiry date or default */ private extractExpiryDateFromCertificate(certificate: string, domain: string): Date { try { // This is still using regex, but in a real implementation you would use // a library like node-forge or x509 to properly parse the certificate const matches = certificate.match(/Not After\s*:\s*(.*?)(?:\n|$)/i); if (matches && matches[1]) { const expiryDate = new Date(matches[1]); // Validate that we got a valid date if (!isNaN(expiryDate.getTime())) { console.log(`Certificate for ${domain} will expire on ${expiryDate.toISOString()}`); return expiryDate; } } console.warn(`Could not extract valid expiry date from certificate for ${domain}, using default`); return this.getDefaultExpiryDate(); } catch (error) { console.warn(`Failed to extract expiry date from certificate for ${domain}, using default`); return this.getDefaultExpiryDate(); } } /** * Get a default expiry date (90 days from now) * @returns Default expiry date */ private getDefaultExpiryDate(): Date { return new Date(Date.now() + 90 * 24 * 60 * 60 * 1000); // 90 days default } /** * Emits a certificate event with the certificate data * @param eventType The event type to emit * @param data The certificate data */ private emitCertificateEvent(eventType: Port80HandlerEvents, data: ICertificateData): void { this.emit(eventType, data); } /** * Gets all domains and their certificate status * @returns Map of domains to certificate status */ public getDomainCertificateStatus(): Map { const result = new Map(); const now = new Date(); for (const [domain, domainInfo] of this.domainCertificates.entries()) { // Skip glob patterns if (this.isGlobPattern(domain)) continue; const status: { certObtained: boolean; expiryDate?: Date; daysRemaining?: number; obtainingInProgress: boolean; lastRenewalAttempt?: Date; } = { certObtained: domainInfo.certObtained, expiryDate: domainInfo.expiryDate, obtainingInProgress: domainInfo.obtainingInProgress, lastRenewalAttempt: domainInfo.lastRenewalAttempt }; // Calculate days remaining if expiry date is available if (domainInfo.expiryDate) { const daysRemaining = Math.ceil( (domainInfo.expiryDate.getTime() - now.getTime()) / (24 * 60 * 60 * 1000) ); status.daysRemaining = daysRemaining; } result.set(domain, status); } return result; } /** * Gets information about managed domains * @returns Array of domain information */ public getManagedDomains(): Array<{ domain: string; isGlobPattern: boolean; hasCertificate: boolean; hasForwarding: boolean; sslRedirect: boolean; acmeMaintenance: boolean; }> { return Array.from(this.domainCertificates.entries()).map(([domain, info]) => ({ domain, isGlobPattern: this.isGlobPattern(domain), hasCertificate: info.certObtained, hasForwarding: !!info.options.forward, sslRedirect: info.options.sslRedirect, acmeMaintenance: info.options.acmeMaintenance })); } /** * Gets configuration details * @returns Current configuration */ public getConfig(): Required { return { ...this.options }; } }