| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197 |
- #!/usr/bin/env node
- /**
- * Extract SSL/TLS certificate details from a URL.
- *
- * This hook sets up CDP listeners BEFORE chrome_navigate loads the page,
- * then waits for navigation to complete. The listener captures SSL details
- * during the navigation request.
- *
- * Usage: on_Snapshot__23_ssl.js --url=<url> --snapshot-id=<uuid>
- * Output: Writes ssl.jsonl
- */
- const fs = require('fs');
- const path = require('path');
- // Add NODE_MODULES_DIR to module resolution paths if set
- if (process.env.NODE_MODULES_DIR) module.paths.unshift(process.env.NODE_MODULES_DIR);
- const puppeteer = require('puppeteer-core');
- // Import shared utilities from chrome_utils.js
- const {
- getEnvBool,
- getEnvInt,
- parseArgs,
- connectToPage,
- waitForPageLoaded,
- } = require('../chrome/chrome_utils.js');
- const PLUGIN_NAME = 'ssl';
- const OUTPUT_DIR = '.';
- const OUTPUT_FILE = 'ssl.jsonl';
- const CHROME_SESSION_DIR = '../chrome';
- let browser = null;
- let page = null;
- let client = null;
- let sslCaptured = false;
- let shuttingDown = false;
- async function setupListener(url) {
- const outputPath = path.join(OUTPUT_DIR, OUTPUT_FILE);
- const timeout = getEnvInt('SSL_TIMEOUT', 30) * 1000;
- let targetHost = null;
- // Only extract SSL for HTTPS URLs
- if (!url.startsWith('https://')) {
- throw new Error('URL is not HTTPS');
- }
- try {
- targetHost = new URL(url).host;
- } catch (e) {
- targetHost = null;
- }
- // Connect to Chrome page using shared utility
- const { browser, page } = await connectToPage({
- chromeSessionDir: CHROME_SESSION_DIR,
- timeoutMs: timeout,
- puppeteer,
- });
- client = await page.target().createCDPSession();
- await client.send('Network.enable');
- client.on('Network.responseReceived', (params) => {
- try {
- if (sslCaptured) return;
- if (params.type && params.type !== 'Document') return;
- const response = params.response || {};
- const responseUrl = response.url || '';
- if (!responseUrl.startsWith('http')) return;
- if (targetHost) {
- try {
- const responseHost = new URL(responseUrl).host;
- if (responseHost !== targetHost) return;
- } catch (e) {
- // Ignore URL parse errors, fall through
- }
- }
- const securityDetails = response.securityDetails || null;
- let sslInfo = { url: responseUrl };
- if (securityDetails) {
- sslInfo.protocol = securityDetails.protocol;
- sslInfo.subjectName = securityDetails.subjectName;
- sslInfo.issuer = securityDetails.issuer;
- sslInfo.validFrom = securityDetails.validFrom;
- sslInfo.validTo = securityDetails.validTo;
- sslInfo.certificateId = securityDetails.subjectName;
- sslInfo.securityState = response.securityState || 'secure';
- sslInfo.schemeIsCryptographic = true;
- const sanList = securityDetails.sanList;
- if (sanList && sanList.length > 0) {
- sslInfo.subjectAlternativeNames = sanList;
- }
- } else if (responseUrl.startsWith('https://')) {
- sslInfo.securityState = response.securityState || 'unknown';
- sslInfo.schemeIsCryptographic = true;
- sslInfo.error = 'No security details available';
- } else {
- sslInfo.securityState = 'insecure';
- sslInfo.schemeIsCryptographic = false;
- }
- fs.writeFileSync(outputPath, JSON.stringify(sslInfo, null, 2));
- sslCaptured = true;
- } catch (e) {
- // Ignore errors
- }
- });
- return { browser, page };
- }
- function emitResult(status = 'succeeded') {
- if (shuttingDown) return;
- shuttingDown = true;
- const outputStr = sslCaptured ? OUTPUT_FILE : OUTPUT_FILE;
- console.log(JSON.stringify({
- type: 'ArchiveResult',
- status,
- output_str: outputStr,
- }));
- }
- async function handleShutdown(signal) {
- console.error(`\nReceived ${signal}, emitting final results...`);
- emitResult('succeeded');
- if (browser) {
- try {
- browser.disconnect();
- } catch (e) {}
- }
- process.exit(0);
- }
- async function main() {
- const args = parseArgs();
- const url = args.url;
- const snapshotId = args.snapshot_id;
- if (!url || !snapshotId) {
- console.error('Usage: on_Snapshot__23_ssl.js --url=<url> --snapshot-id=<uuid>');
- process.exit(1);
- }
- if (!getEnvBool('SSL_ENABLED', true)) {
- console.error('Skipping (SSL_ENABLED=False)');
- console.log(JSON.stringify({type: 'ArchiveResult', status: 'skipped', output_str: 'SSL_ENABLED=False'}));
- process.exit(0);
- }
- try {
- // Set up listener BEFORE navigation
- const connection = await setupListener(url);
- browser = connection.browser;
- page = connection.page;
- // Register signal handlers for graceful shutdown
- process.on('SIGTERM', () => handleShutdown('SIGTERM'));
- process.on('SIGINT', () => handleShutdown('SIGINT'));
- // Wait for chrome_navigate to complete (non-fatal)
- try {
- const timeout = getEnvInt('SSL_TIMEOUT', 30) * 1000;
- await waitForPageLoaded(CHROME_SESSION_DIR, timeout * 4);
- } catch (e) {
- console.error(`WARN: ${e.message}`);
- }
- // console.error('SSL listener active, waiting for cleanup signal...');
- await new Promise(() => {}); // Keep alive until SIGTERM
- return;
- } catch (e) {
- const error = `${e.name}: ${e.message}`;
- console.error(`ERROR: ${error}`);
- console.log(JSON.stringify({
- type: 'ArchiveResult',
- status: 'failed',
- output_str: error,
- }));
- process.exit(1);
- }
- }
- main().catch(e => {
- console.error(`Fatal error: ${e.message}`);
- process.exit(1);
- });
|