remove cruft
This commit is contained in:
parent
a360abda01
commit
6bbb5f78e9
|
@ -1,75 +0,0 @@
|
||||||
"use strict";
|
|
||||||
|
|
||||||
// npm install spdy@3.x
|
|
||||||
|
|
||||||
//var Greenlock = require('greenlock-express')
|
|
||||||
var Greenlock = require("../");
|
|
||||||
|
|
||||||
var greenlock = Greenlock.create({
|
|
||||||
// Let's Encrypt v2 is ACME draft 11
|
|
||||||
version: "draft-11",
|
|
||||||
|
|
||||||
server: "https://acme-v02.api.letsencrypt.org/directory",
|
|
||||||
// Note: If at first you don't succeed, stop and switch to staging
|
|
||||||
// https://acme-staging-v02.api.letsencrypt.org/directory
|
|
||||||
|
|
||||||
// You MUST change this to a valid email address
|
|
||||||
email: "jon@example.com",
|
|
||||||
|
|
||||||
// You MUST NOT build clients that accept the ToS without asking the user
|
|
||||||
agreeTos: true,
|
|
||||||
|
|
||||||
// You MUST change these to valid domains
|
|
||||||
// NOTE: all domains will validated and listed on the certificate
|
|
||||||
approvedDomains: ["example.com", "www.example.com"],
|
|
||||||
|
|
||||||
// You MUST have access to write to directory where certs are saved
|
|
||||||
// ex: /home/foouser/acme/etc
|
|
||||||
configDir: "~/.config/acme/",
|
|
||||||
|
|
||||||
// Get notified of important updates and help me make greenlock better
|
|
||||||
communityMember: true
|
|
||||||
|
|
||||||
//, debug: true
|
|
||||||
});
|
|
||||||
|
|
||||||
////////////////////////
|
|
||||||
// http-01 Challenges //
|
|
||||||
////////////////////////
|
|
||||||
|
|
||||||
// http-01 challenge happens over http/1.1, not http2
|
|
||||||
var redirectHttps = require("redirect-https")();
|
|
||||||
var acmeChallengeHandler = greenlock.middleware(function(req, res) {
|
|
||||||
res.setHeader("Content-Type", "text/html; charset=utf-8");
|
|
||||||
res.end(
|
|
||||||
"<h1>Hello, ⚠️ Insecure World!</h1><a>Visit Secure Site</a>" +
|
|
||||||
'<script>document.querySelector("a").href=window.location.href.replace(/^http/i, "https");</script>'
|
|
||||||
);
|
|
||||||
});
|
|
||||||
require("http")
|
|
||||||
.createServer(acmeChallengeHandler)
|
|
||||||
.listen(80, function() {
|
|
||||||
console.log("Listening for ACME http-01 challenges on", this.address());
|
|
||||||
});
|
|
||||||
|
|
||||||
////////////////////////
|
|
||||||
// http2 via SPDY h2 //
|
|
||||||
////////////////////////
|
|
||||||
|
|
||||||
// spdy is a drop-in replacement for the https API
|
|
||||||
var spdyOptions = Object.assign({}, greenlock.tlsOptions);
|
|
||||||
spdyOptions.spdy = { protocols: ["h2", "http/1.1"], plain: false };
|
|
||||||
var server = require("spdy").createServer(
|
|
||||||
spdyOptions,
|
|
||||||
require("express")().use("/", function(req, res) {
|
|
||||||
res.setHeader("Content-Type", "text/html; charset=utf-8");
|
|
||||||
res.end("<h1>Hello, 🔐 Secure World!</h1>");
|
|
||||||
})
|
|
||||||
);
|
|
||||||
server.on("error", function(err) {
|
|
||||||
console.error(err);
|
|
||||||
});
|
|
||||||
server.on("listening", function() {
|
|
||||||
console.log("Listening for SPDY/http2/https requests on", this.address());
|
|
||||||
});
|
|
||||||
server.listen(443);
|
|
|
@ -1,30 +0,0 @@
|
||||||
"use strict";
|
|
||||||
|
|
||||||
//require('greenlock-express')
|
|
||||||
require("../")
|
|
||||||
.create({
|
|
||||||
// Let's Encrypt v2 is ACME draft 11
|
|
||||||
version: "draft-11",
|
|
||||||
|
|
||||||
server: "https://acme-v02.api.letsencrypt.org/directory",
|
|
||||||
// Note: If at first you don't succeed, stop and switch to staging
|
|
||||||
// https://acme-staging-v02.api.letsencrypt.org/directory
|
|
||||||
|
|
||||||
email: "john.doe@example.com",
|
|
||||||
|
|
||||||
agreeTos: true,
|
|
||||||
|
|
||||||
approvedDomains: ["example.com", "www.example.com"],
|
|
||||||
|
|
||||||
app: require("express")().use("/", function(req, res) {
|
|
||||||
res.end("Hello, World!");
|
|
||||||
}),
|
|
||||||
|
|
||||||
renewWithin: 91 * 24 * 60 * 60 * 1000,
|
|
||||||
renewBy: 90 * 24 * 60 * 60 * 1000,
|
|
||||||
|
|
||||||
// Get notified of important updates and help me make greenlock better
|
|
||||||
communityMember: true,
|
|
||||||
debug: true
|
|
||||||
})
|
|
||||||
.listen(80, 443);
|
|
|
@ -1,104 +0,0 @@
|
||||||
"use strict";
|
|
||||||
|
|
||||||
//
|
|
||||||
// WARNING: Not for noobs
|
|
||||||
// Try the simple example first
|
|
||||||
//
|
|
||||||
|
|
||||||
//
|
|
||||||
// This demo is used with tunnel-server.js and tunnel-client.js
|
|
||||||
//
|
|
||||||
|
|
||||||
var email = "john.doe@gmail.com";
|
|
||||||
var domains = ["example.com"];
|
|
||||||
var agreeLeTos = true;
|
|
||||||
//var secret = "My Little Brony";
|
|
||||||
var secret = require("crypto")
|
|
||||||
.randomBytes(16)
|
|
||||||
.toString("hex");
|
|
||||||
|
|
||||||
require("../")
|
|
||||||
.create({
|
|
||||||
version: "draft-11",
|
|
||||||
|
|
||||||
server: "https://acme-v02.api.letsencrypt.org/directory",
|
|
||||||
// Note: If at first you don't succeed, stop and switch to staging
|
|
||||||
// https://acme-staging-v02.api.letsencrypt.org/directory
|
|
||||||
|
|
||||||
email: email,
|
|
||||||
agreeTos: agreeLeTos,
|
|
||||||
approveDomains: domains,
|
|
||||||
configDir: "~/.config/acme/",
|
|
||||||
app: remoteAccess(secret),
|
|
||||||
// Get notified of important updates and help me make greenlock better
|
|
||||||
communityMember: true
|
|
||||||
//, debug: true
|
|
||||||
})
|
|
||||||
.listen(3000, 8443);
|
|
||||||
|
|
||||||
function remoteAccess(secret) {
|
|
||||||
var express = require("express");
|
|
||||||
var basicAuth = require("express-basic-auth");
|
|
||||||
var serveIndex = require("serve-index");
|
|
||||||
|
|
||||||
var rootIndex = serveIndex("/", { hidden: true, icons: true, view: "details" });
|
|
||||||
var rootFs = express.static("/", { dotfiles: "allow", redirect: true, index: false });
|
|
||||||
|
|
||||||
var userIndex = serveIndex(require("os").homedir(), { hidden: true, icons: true, view: "details" });
|
|
||||||
var userFs = express.static(require("os").homedir(), { dotfiles: "allow", redirect: true, index: false });
|
|
||||||
|
|
||||||
var app = express();
|
|
||||||
var realm = "Login Required";
|
|
||||||
|
|
||||||
var myAuth = basicAuth({
|
|
||||||
users: { root: secret, user: secret },
|
|
||||||
challenge: true,
|
|
||||||
realm: realm,
|
|
||||||
unauthorizedResponse: function(/*req*/) {
|
|
||||||
return 'Unauthorized <a href="/">Home</a>';
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
app.get("/", function(req, res) {
|
|
||||||
res.setHeader("Content-Type", "text/html; charset=utf-8");
|
|
||||||
res.end('<a href="/browse/">View Files</a>' + " | " + '<a href="/logout/">Logout</a>');
|
|
||||||
});
|
|
||||||
app.use("/logout", function(req, res) {
|
|
||||||
res.setHeader("Content-Type", "text/html; charset=utf-8");
|
|
||||||
res.setHeader("WWW-Authenticate", 'Basic realm="' + realm + '"');
|
|
||||||
res.statusCode = 401;
|
|
||||||
//res.setHeader('Location', '/');
|
|
||||||
res.end('Logged out | <a href="/">Home</a>');
|
|
||||||
});
|
|
||||||
app.use("/browse", myAuth);
|
|
||||||
app.use("/browse", function(req, res, next) {
|
|
||||||
if ("root" === req.auth.user) {
|
|
||||||
rootFs(req, res, function() {
|
|
||||||
rootIndex(req, res, next);
|
|
||||||
});
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
if ("user" === req.auth.user) {
|
|
||||||
userFs(req, res, function() {
|
|
||||||
userIndex(req, res, next);
|
|
||||||
});
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
res.end("Sad Panda");
|
|
||||||
});
|
|
||||||
|
|
||||||
console.log("");
|
|
||||||
console.log("");
|
|
||||||
console.log("Usernames are\n");
|
|
||||||
console.log("\troot");
|
|
||||||
console.log("\tuser");
|
|
||||||
console.log("");
|
|
||||||
console.log("Password (for both) is\n");
|
|
||||||
console.log("\t" + secret);
|
|
||||||
console.log("");
|
|
||||||
console.log("Shhhh... It's a secret to everybody!");
|
|
||||||
console.log("");
|
|
||||||
console.log("");
|
|
||||||
|
|
||||||
return app;
|
|
||||||
}
|
|
|
@ -1,134 +0,0 @@
|
||||||
#!/usr/bin/env node
|
|
||||||
"use strict";
|
|
||||||
|
|
||||||
///////////////////
|
|
||||||
// vhost example //
|
|
||||||
///////////////////
|
|
||||||
|
|
||||||
//
|
|
||||||
// virtual hosting example
|
|
||||||
//
|
|
||||||
|
|
||||||
// The prefix where sites go by name.
|
|
||||||
// For example: whatever.com may live in /srv/www/whatever.com, thus /srv/www is our path
|
|
||||||
var srv = process.argv[3] || "/srv/www/";
|
|
||||||
|
|
||||||
var path = require("path");
|
|
||||||
var fs = require("fs").promises;
|
|
||||||
var finalhandler = require("finalhandler");
|
|
||||||
var serveStatic = require("serve-static");
|
|
||||||
|
|
||||||
//var glx = require('greenlock-express')
|
|
||||||
var glx = require("./").create({
|
|
||||||
version: "draft-11", // Let's Encrypt v2 is ACME draft 11
|
|
||||||
|
|
||||||
server: "https://acme-v02.api.letsencrypt.org/directory", // If at first you don't succeed, stop and switch to staging
|
|
||||||
// https://acme-staging-v02.api.letsencrypt.org/directory
|
|
||||||
|
|
||||||
configDir: process.argv[4] || "~/.config/acme/", // You MUST have access to write to directory where certs
|
|
||||||
// are saved. ex: /home/foouser/.config/acme
|
|
||||||
|
|
||||||
approveDomains: myApproveDomains, // Greenlock's wraps around tls.SNICallback. Check the
|
|
||||||
// domain name here and reject invalid ones
|
|
||||||
|
|
||||||
app: myVhostApp, // Any node-style http app (i.e. express, koa, hapi, rill)
|
|
||||||
|
|
||||||
/* CHANGE TO A VALID EMAIL */
|
|
||||||
email: process.argv[2] || "jon.doe@example.com", // Email for Let's Encrypt account and Greenlock Security
|
|
||||||
agreeTos: true // Accept Let's Encrypt ToS
|
|
||||||
//, communityMember: true // Join Greenlock to get important updates, no spam
|
|
||||||
|
|
||||||
//, debug: true
|
|
||||||
});
|
|
||||||
|
|
||||||
var server = glx.listen(80, 443);
|
|
||||||
server.on("listening", function() {
|
|
||||||
console.info(server.type + " listening on", server.address());
|
|
||||||
});
|
|
||||||
|
|
||||||
function myApproveDomains(opts, certs, cb) {
|
|
||||||
console.log("sni:", opts.domain);
|
|
||||||
// In this example the filesystem is our "database".
|
|
||||||
// We check in /srv/www for whatever.com and if it exists, it's allowed
|
|
||||||
|
|
||||||
// SECURITY Greenlock validates opts.domains ahead-of-time so you don't have to
|
|
||||||
return checkWwws(opts.domains[0])
|
|
||||||
.then(function() {
|
|
||||||
//opts.email = email;
|
|
||||||
opts.agreeTos = true;
|
|
||||||
cb(null, { options: opts, certs: certs });
|
|
||||||
})
|
|
||||||
.catch(cb);
|
|
||||||
}
|
|
||||||
|
|
||||||
function checkWwws(_hostname) {
|
|
||||||
if (!_hostname) {
|
|
||||||
// SECURITY, don't allow access to the 'srv' root
|
|
||||||
// (greenlock-express uses middleware to check '..', etc)
|
|
||||||
return "";
|
|
||||||
}
|
|
||||||
var hostname = _hostname;
|
|
||||||
var _hostdir = path.join(srv, hostname);
|
|
||||||
var hostdir = _hostdir;
|
|
||||||
// TODO could test for www/no-www both in directory
|
|
||||||
return fs
|
|
||||||
.readdir(hostdir)
|
|
||||||
.then(function() {
|
|
||||||
// TODO check for some sort of htaccess.json and use email in that
|
|
||||||
// NOTE: you can also change other options such as `challengeType` and `challenge`
|
|
||||||
// opts.challengeType = 'http-01';
|
|
||||||
// opts.challenge = require('le-challenge-fs').create({});
|
|
||||||
return hostname;
|
|
||||||
})
|
|
||||||
.catch(function() {
|
|
||||||
if ("www." === hostname.slice(0, 4)) {
|
|
||||||
// Assume we'll redirect to non-www if it's available.
|
|
||||||
hostname = hostname.slice(4);
|
|
||||||
hostdir = path.join(srv, hostname);
|
|
||||||
return fs.readdir(hostdir).then(function() {
|
|
||||||
// TODO list both domains?
|
|
||||||
return hostname;
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
// Or check and see if perhaps we should redirect non-www to www
|
|
||||||
hostname = "www." + hostname;
|
|
||||||
hostdir = path.join(srv, hostname);
|
|
||||||
return fs.readdir(hostdir).then(function() {
|
|
||||||
// TODO list both domains?
|
|
||||||
return hostname;
|
|
||||||
});
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.catch(function() {
|
|
||||||
throw new Error("rejecting '" + _hostname + "' because '" + _hostdir + "' could not be read");
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
function myVhostApp(req, res) {
|
|
||||||
// SECURITY greenlock pre-sanitizes hostnames to prevent unauthorized fs access so you don't have to
|
|
||||||
// (also: only domains approved above will get here)
|
|
||||||
console.log("vhost:", req.headers.host);
|
|
||||||
if (!req.headers.host) {
|
|
||||||
// SECURITY, don't allow access to the 'srv' root
|
|
||||||
// (greenlock-express uses middleware to check '..', etc)
|
|
||||||
return res.end();
|
|
||||||
}
|
|
||||||
|
|
||||||
// We could cache wether or not a host exists for some amount of time
|
|
||||||
var fin = finalhandler(req, res);
|
|
||||||
return checkWwws(req.headers.host)
|
|
||||||
.then(function(hostname) {
|
|
||||||
if (hostname !== req.headers.host) {
|
|
||||||
res.statusCode = 302;
|
|
||||||
res.setHeader("Location", "https://" + hostname);
|
|
||||||
// SECURITY this is safe only because greenlock disallows invalid hostnames
|
|
||||||
res.end("<!-- redirecting to https://" + hostname + "-->");
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
var serve = serveStatic(path.join(srv, hostname), { redirect: true });
|
|
||||||
serve(req, res, fin);
|
|
||||||
})
|
|
||||||
.catch(function() {
|
|
||||||
fin();
|
|
||||||
});
|
|
||||||
}
|
|
|
@ -1,77 +0,0 @@
|
||||||
#!/usr/bin/env node
|
|
||||||
"use strict";
|
|
||||||
/*global Promise*/
|
|
||||||
|
|
||||||
///////////////////////
|
|
||||||
// wildcard example //
|
|
||||||
//////////////////////
|
|
||||||
|
|
||||||
//
|
|
||||||
// wildcard example
|
|
||||||
//
|
|
||||||
|
|
||||||
//var glx = require('greenlock-express')
|
|
||||||
var glx = require("../").create({
|
|
||||||
version: "draft-11", // Let's Encrypt v2 is ACME draft 11
|
|
||||||
|
|
||||||
server: "https://acme-staging-v02.api.letsencrypt.org/directory",
|
|
||||||
//, server: 'https://acme-v02.api.letsencrypt.org/directory' // If at first you don't succeed, stop and switch to staging
|
|
||||||
// https://acme-staging-v02.api.letsencrypt.org/directory
|
|
||||||
|
|
||||||
configDir: "~/acme/", // You MUST have access to write to directory where certs
|
|
||||||
// are saved. ex: /home/foouser/.config/acme
|
|
||||||
|
|
||||||
approveDomains: myApproveDomains, // Greenlock's wraps around tls.SNICallback. Check the
|
|
||||||
// domain name here and reject invalid ones
|
|
||||||
|
|
||||||
app: require("./my-express-app.js"), // Any node-style http app (i.e. express, koa, hapi, rill)
|
|
||||||
|
|
||||||
/* CHANGE TO A VALID EMAIL */
|
|
||||||
email: "jon.doe@example.com", // Email for Let's Encrypt account and Greenlock Security
|
|
||||||
agreeTos: true, // Accept Let's Encrypt ToS
|
|
||||||
communityMember: true, // Join Greenlock to (very rarely) get important updates
|
|
||||||
|
|
||||||
//, debug: true
|
|
||||||
store: require("le-store-fs")
|
|
||||||
});
|
|
||||||
|
|
||||||
var server = glx.listen(80, 443);
|
|
||||||
server.on("listening", function() {
|
|
||||||
console.info(server.type + " listening on", server.address());
|
|
||||||
});
|
|
||||||
|
|
||||||
function myApproveDomains(opts) {
|
|
||||||
console.log("sni:", opts.domain);
|
|
||||||
|
|
||||||
// must be 'example.com' or start with 'example.com'
|
|
||||||
if (
|
|
||||||
"example.com" !== opts.domain &&
|
|
||||||
"example.com" !==
|
|
||||||
opts.domain
|
|
||||||
.split(".")
|
|
||||||
.slice(1)
|
|
||||||
.join(".")
|
|
||||||
) {
|
|
||||||
return Promise.reject(new Error("we don't serve your kind here: " + opts.domain));
|
|
||||||
}
|
|
||||||
|
|
||||||
// the primary domain for the cert
|
|
||||||
opts.subject = "example.com";
|
|
||||||
// the altnames (including the primary)
|
|
||||||
opts.domains = [opts.subject, "*.example.com"];
|
|
||||||
|
|
||||||
if (!opts.challenges) {
|
|
||||||
opts.challenges = {};
|
|
||||||
}
|
|
||||||
opts.challenges["http-01"] = require("le-challenge-fs").create({});
|
|
||||||
// Note: When implementing a dns-01 plugin you should make it check in a loop
|
|
||||||
// until it can positively confirm that the DNS changes have propagated.
|
|
||||||
// That could take several seconds to a few minutes.
|
|
||||||
opts.challenges["dns-01"] = require("le-challenge-dns").create({});
|
|
||||||
|
|
||||||
// explicitly set account id and certificate.id
|
|
||||||
opts.account = { id: opts.email };
|
|
||||||
opts.certificate = { id: opts.subject };
|
|
||||||
|
|
||||||
return Promise.resolve(opts);
|
|
||||||
}
|
|
Loading…
Reference in New Issue