working example with self-signed certificates
This commit is contained in:
parent
0e66e66dc8
commit
1b5ba16ad6
81
README.md
81
README.md
|
@ -1,4 +1,83 @@
|
||||||
nodejs-self-signed-certificate-example
|
nodejs-self-signed-certificate-example
|
||||||
======================================
|
======================================
|
||||||
|
|
||||||
The end off all your self-sign certificate woes (in node.js at least)
|
An example that works.
|
||||||
|
|
||||||
|
The end off all your self-signed certificate woes (in node.js at least)
|
||||||
|
|
||||||
|
Test for yourself
|
||||||
|
---
|
||||||
|
|
||||||
|
This is an easy-as-git-clone example that will get you on your way without
|
||||||
|
any `DEPTH_ZERO_SELF_SIGNED_CERT` or `SSL certificate problem: Invalid certificate chain` headaches.
|
||||||
|
|
||||||
|
### Get the repo
|
||||||
|
|
||||||
|
```bash
|
||||||
|
git clone git@github.com:coolaj86/nodejs-self-signed-certificate-example.git
|
||||||
|
pushd nodejs-self-signed-certificate-example
|
||||||
|
npm install
|
||||||
|
```
|
||||||
|
|
||||||
|
**For the super impatient**:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
bash test.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
### Create certificates for `local.ldsconnect.org`
|
||||||
|
|
||||||
|
`local.ldsconnect.org` points to `localhost`, so it's ideal for your first test.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
bash make-root-ca-and-certificates.sh 'local.ldsconnect.org'
|
||||||
|
```
|
||||||
|
|
||||||
|
### Run the server
|
||||||
|
|
||||||
|
```bash
|
||||||
|
node ./serve.js 4443 &
|
||||||
|
# use `fg` and `ctrl+c` to kill
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
### Test in a client
|
||||||
|
|
||||||
|
Visit in a web browser
|
||||||
|
|
||||||
|
<https://local.ldsconnect.org>
|
||||||
|
|
||||||
|
Test (warning free) in node.js
|
||||||
|
|
||||||
|
```bash
|
||||||
|
node ./request-without-warnings.js 4443
|
||||||
|
```
|
||||||
|
|
||||||
|
Test (warning free) with cURL
|
||||||
|
|
||||||
|
```bash
|
||||||
|
curl -v https://local.ldsconnect.org \
|
||||||
|
--cacert client/my-private-root-ca.crt.pem
|
||||||
|
```
|
||||||
|
|
||||||
|
Now season to taste
|
||||||
|
---
|
||||||
|
|
||||||
|
You can poke around in the files for generating the certificates,
|
||||||
|
but all you really have to do is replace `local.ldsconnect.org`
|
||||||
|
with your very own domain name.
|
||||||
|
|
||||||
|
But where's the magic?
|
||||||
|
====
|
||||||
|
|
||||||
|
Who's the man behind the curtain you ask?
|
||||||
|
|
||||||
|
Well... I lied. This demo doesn't use self-signed certificates.
|
||||||
|
It uses a self-signed Root CA and a signed certificate.
|
||||||
|
|
||||||
|
It turns out that self-signed certificates were designed to be
|
||||||
|
used by the Root Certificate Authorities, not by web servers.
|
||||||
|
|
||||||
|
So instead of trying to work through eleventeen brazillion errors
|
||||||
|
about self-signed certs, you can just create an authority and then
|
||||||
|
add the authority to your chain (viola, now it's trusted).
|
||||||
|
|
|
@ -0,0 +1,48 @@
|
||||||
|
#!/bin/bash
|
||||||
|
FQDN=$1
|
||||||
|
|
||||||
|
# make directories to work from
|
||||||
|
mkdir -p server/ client/ all/
|
||||||
|
|
||||||
|
# Create your very own Root Certificate Authority
|
||||||
|
openssl genrsa \
|
||||||
|
-out all/my-private-root-ca.key.pem \
|
||||||
|
2048
|
||||||
|
|
||||||
|
# Self-sign your Root Certificate Authority
|
||||||
|
# Since this is private, the details can be as bogus as you like
|
||||||
|
openssl req \
|
||||||
|
-x509 \
|
||||||
|
-new \
|
||||||
|
-nodes \
|
||||||
|
-key all/my-private-root-ca.key.pem \
|
||||||
|
-days 1024 \
|
||||||
|
-out all/my-private-root-ca.crt.pem \
|
||||||
|
-subj "/C=US/ST=Utah/L=Provo/O=ACME Signing Authority Inc/CN=example.com"
|
||||||
|
|
||||||
|
# Create a Device Certificate for each domain,
|
||||||
|
# such as example.com, *.example.com, awesome.example.com
|
||||||
|
# NOTE: You MUST match CN to the domain name or ip address you want to use
|
||||||
|
openssl genrsa \
|
||||||
|
-out all/my-server.key.pem \
|
||||||
|
2048
|
||||||
|
|
||||||
|
# Create a request from your Device, which your Root CA will sign
|
||||||
|
openssl req -new \
|
||||||
|
-key all/my-server.key.pem \
|
||||||
|
-out all/my-server.csr.pem \
|
||||||
|
-subj "/C=US/ST=Utah/L=Provo/O=ACME Tech Inc/CN=${FQDN}"
|
||||||
|
|
||||||
|
# Sign the request from Device with your Root CA
|
||||||
|
openssl x509 \
|
||||||
|
-req -in all/my-server.csr.pem \
|
||||||
|
-CA all/my-private-root-ca.crt.pem \
|
||||||
|
-CAkey all/my-private-root-ca.key.pem \
|
||||||
|
-CAcreateserial \
|
||||||
|
-out all/my-server.crt.pem \
|
||||||
|
-days 500
|
||||||
|
|
||||||
|
# Put things in their proper place
|
||||||
|
rsync -a all/my-server.{key,crt}.pem server/
|
||||||
|
rsync -a all/my-private-root-ca.crt.pem server/
|
||||||
|
rsync -a all/my-private-root-ca.crt.pem client/
|
|
@ -0,0 +1,33 @@
|
||||||
|
{
|
||||||
|
"name": "nodejs-self-signed-certificate-example",
|
||||||
|
"version": "1.0.0",
|
||||||
|
"description": "The end off all your self-sign certificate woes (in node.js at least)",
|
||||||
|
"main": "serve.js",
|
||||||
|
"scripts": {
|
||||||
|
"test": "bash test.sh"
|
||||||
|
},
|
||||||
|
"repository": {
|
||||||
|
"type": "git",
|
||||||
|
"url": "git://github.com/coolaj86/nodejs-self-signed-certificate-example.git"
|
||||||
|
},
|
||||||
|
"keywords": [
|
||||||
|
"nodejs",
|
||||||
|
"ssl",
|
||||||
|
"self-signed",
|
||||||
|
"certificate",
|
||||||
|
"authority",
|
||||||
|
"certificates",
|
||||||
|
"root",
|
||||||
|
"ca",
|
||||||
|
"cas"
|
||||||
|
],
|
||||||
|
"author": "AJ ONeal <awesome@coolaj86.com> (http://coolaj86.com)",
|
||||||
|
"license": "Apache-2",
|
||||||
|
"bugs": {
|
||||||
|
"url": "https://github.com/coolaj86/nodejs-self-signed-certificate-example/issues"
|
||||||
|
},
|
||||||
|
"homepage": "https://github.com/coolaj86/nodejs-self-signed-certificate-example",
|
||||||
|
"dependencies": {
|
||||||
|
"ssl-root-cas": "^1.1.4"
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,21 @@
|
||||||
|
#!/usr/bin/env node
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var https = require('https')
|
||||||
|
, fs = require('fs')
|
||||||
|
, path = require('path')
|
||||||
|
, ca = fs.readFileSync(path.join(__dirname, 'client', 'my-private-root-ca.crt.pem'))
|
||||||
|
, port = process.argv[2] || 4443
|
||||||
|
;
|
||||||
|
|
||||||
|
var options = {
|
||||||
|
host: 'local.ldsconnect.org'
|
||||||
|
, port: port
|
||||||
|
, path: '/'
|
||||||
|
, ca: ca
|
||||||
|
};
|
||||||
|
options.agent = new https.Agent(options);
|
||||||
|
|
||||||
|
https.request(options, function(res) {
|
||||||
|
res.pipe(process.stdout);
|
||||||
|
}).end();
|
|
@ -0,0 +1,35 @@
|
||||||
|
#!/usr/bin/env node
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
var https = require('https')
|
||||||
|
, port = process.argv[2] || 4443
|
||||||
|
, fs = require('fs')
|
||||||
|
, path = require('path')
|
||||||
|
, server
|
||||||
|
, options
|
||||||
|
;
|
||||||
|
|
||||||
|
require('ssl-root-cas')
|
||||||
|
.inject()
|
||||||
|
.addFile(path.join(__dirname, 'server', 'my-private-root-ca.crt.pem'))
|
||||||
|
;
|
||||||
|
|
||||||
|
options = {
|
||||||
|
key: fs.readFileSync(path.join(__dirname, 'server', 'my-server.key.pem'))
|
||||||
|
// You don't need to specify `ca`, it's done by `ssl-root-cas`
|
||||||
|
//, ca: [ fs.readFileSync(path.join(__dirname, 'server', 'my-private-root-ca.crt.pem'))]
|
||||||
|
, cert: fs.readFileSync(path.join(__dirname, 'server', 'my-server.crt.pem'))
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
function app(req, res) {
|
||||||
|
res.setHeader('Content-Type', 'text/plain');
|
||||||
|
res.end('Hello, encrypted world!');
|
||||||
|
}
|
||||||
|
|
||||||
|
server = https.createServer(options, app).listen(port, function () {
|
||||||
|
port = server.address().port;
|
||||||
|
console.log('Listening on https://127.0.0.1:' + port);
|
||||||
|
console.log('Listening on https://' + server.address().address + ':' + port);
|
||||||
|
console.log('Listening on https://local.ldsconnect.org:' + port);
|
||||||
|
});
|
Loading…
Reference in New Issue