'use strict'; var https = require('https') , http = require('http') , PromiseA = require('bluebird').Promise , forEachAsync = require('foreachasync').forEachAsync.create(PromiseA) , fs = require('fs') , path = require('path') , crypto = require('crypto') , connect = require('connect') , vhost = require('vhost') // connect / express app , app = connect() // SSL Server , secureContexts = {} , secureOpts , secureServer , securePort = /*process.argv[2] ||*/ 443 // force SSL upgrade server , insecureServer , insecurePort = /*process.argv[3] ||*/ 80 // the ssl domains I have // TODO read vhosts minus , domains = fs.readdirSync(path.join(__dirname, 'vhosts')).filter(function (node) { // not a hidden or private file return '.' !== node[0] && '_' !== node[0]; }) ; require('ssl-root-cas') .inject() ; function getAppContext(domain) { var localApp ; localApp = require(path.join(__dirname, 'vhosts', domain, 'app.js')); if (localApp.create) { // TODO read local config.yml and pass it in localApp = localApp.create(/*config*/); } if (!localApp.then) { localApp = PromiseA.resolve(localApp); } return localApp; } forEachAsync(domains, function (domain) { secureContexts[domain] = crypto.createCredentials({ key: fs.readFileSync(path.join(__dirname, 'vhosts', domain, 'certs/server/my-server.key.pem')) , cert: fs.readFileSync(path.join(__dirname, 'vhosts', domain, 'certs/server/my-server.crt.pem')) , ca: fs.readdirSync(path.join(__dirname, 'vhosts', domain, 'certs/ca')).map(function (node) { return fs.readFileSync(path.join(__dirname, 'vhosts', domain, 'certs/ca', node)); }) }).context; return getAppContext(domain).then(function (localApp) { app.use(vhost('www.' + domain, localApp)); app.use(vhost(domain, localApp)); }); }).then(function () { // fallback / default domain /* app.use('/', function (req, res) { res.statusCode = 404; res.end("

Hello, World... This isn't the domain you're looking for.

"); }); */ }); //provide a SNICallback when you create the options for the https server secureOpts = { //SNICallback is passed the domain name, see NodeJS docs on TLS SNICallback: function (domain) { //console.log('SNI:', domain); return secureContexts[domain]; } // fallback / default domain , key: fs.readFileSync(path.join(__dirname, 'certs/server', 'dummy-server.key.pem')) , cert: fs.readFileSync(path.join(__dirname, 'certs/server', 'dummy-server.crt.pem')) , ca: fs.readdirSync(path.join(__dirname, 'certs/ca')).map(function (node) { return fs.readFileSync(path.join(__dirname, 'certs/ca', node)); }) }; secureServer = https.createServer(secureOpts); secureServer.on('request', app); secureServer.listen(securePort, function () { console.log("Listening on https://localhost:" + secureServer.address().port); }); // // Redirect HTTP ot HTTPS // // This simply redirects from the current insecure location to the encrypted location // insecureServer = http.createServer(); insecureServer.on('request', function (req, res) { var newLocation = 'https://' + req.headers.host.replace(/:\d+/, ':' + port) + req.url ; var metaRedirect = '' + '\n' + '\n' + ' \n' + ' \n' + '\n' + '\n' + '

You requested an insecure resource. Please use this instead: \n' + ' ' + newLocation + '

\n' + '\n' + '\n' ; // DO NOT HTTP REDIRECT /* res.setHeader('Location', newLocation); res.statusCode = 302; */ // BAD NEWS BEARS // // When people are experimenting with the API and posting tutorials // they'll use cURL and they'll forget to prefix with https:// // If we allow that, then many users will be sending private tokens // and such with POSTs in clear text and, worse, it will work! // To minimize this, we give browser users a mostly optimal experience, // but people experimenting with the API get a message letting them know // that they're doing it wrong and thus forces them to ensure they encrypt. res.setHeader('Content-Type', 'text/html'); res.end(metaRedirect); }); insecureServer.listen(insecurePort, function(){ console.log("\nRedirecting all http traffic to https\n"); });