forked from coolaj86/walnut.js
		
	
		
			
				
	
	
		
			69 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			69 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| 'use strict';
 | |
| 
 | |
| function loadCerts(secureContexts, certPaths, domainname, prevdomainname) {
 | |
|   var PromiseA = require('bluebird');
 | |
|   var fs = PromiseA.promisifyAll(require('fs'));
 | |
|   var path = require('path');
 | |
| 
 | |
|   if (/(^|\.)proxyable\./.test(domainname)) {
 | |
|     // device-id-12345678.proxyable.myapp.mydomain.com => myapp.mydomain.com
 | |
|     // proxyable.myapp.mydomain.com => myapp.mydomain.com
 | |
|     // TODO myapp.mydomain.com.proxyable.com => myapp.mydomain.com
 | |
|     domainname = domainname.replace(/.*\.?proxyable\./, '');
 | |
|   }
 | |
| 
 | |
|   if (secureContexts[domainname]) {
 | |
|     return PromiseA.resolve(secureContexts[domainname]);
 | |
|   }
 | |
| 
 | |
|   return PromiseA.some(certPaths.map(function (pathname) {
 | |
|     return PromiseA.all([
 | |
|       fs.readFileAsync(path.join(pathname, domainname, 'privkey.pem'), 'ascii')
 | |
|     , fs.readFileAsync(path.join(pathname, domainname, 'fullchain.pem'), 'ascii')
 | |
|     ]);
 | |
|   }), 1).then(function (some) {
 | |
|     var one = some[0];
 | |
|     secureContexts[domainname] = require('tls').createSecureContext({
 | |
|       key:  one[0]
 | |
|     , cert: one[1]
 | |
|       // https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
 | |
|       // https://nodejs.org/api/tls.html
 | |
|       // removed :ECDH+AES256:DH+AES256 and added :!AES256 because AES-256 wastes CPU
 | |
|     , ciphers: 'ECDH+AESGCM:DH+AESGCM:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS:!AES256'
 | |
|     , honorCipherOrder: true
 | |
|     });
 | |
| 
 | |
|     // guard against race condition on Promise.some
 | |
|     if (prevdomainname && !secureContexts[prevdomainname]) {
 | |
|       // TODO XXX make sure that letsencrypt www. domains handle the bare domains also (and vice versa)
 | |
|       secureContexts[prevdomainname] = secureContexts[domainname];
 | |
|     }
 | |
| 
 | |
|     return secureContexts[domainname];
 | |
|   }, function (/*err*/) {
 | |
|     // AggregateError means both promises failed
 | |
|     // TODO check ENOENT
 | |
| 
 | |
|     // test "is this server <<domainname>>?"
 | |
|     // try letsencrypt
 | |
|     // fail with www.example.com
 | |
|     if (/^www\./i.test(domainname)) {
 | |
|       return loadCerts(secureContexts, certPaths, domainname.replace(/^www\./i, ''), domainname);
 | |
|     }
 | |
| 
 | |
|     return (secureContexts['www.example.com'] || secureContexts['example.com']);
 | |
|   }).then(function (ctx) {
 | |
|     // TODO generate some self-signed certs?
 | |
|     if (!ctx) {
 | |
|       console.error("[loadCerts()] Could not load default HTTPS certificates!!!");
 | |
|       return PromiseA.reject({
 | |
|         message: "No default certificates for https"
 | |
|       , code: 'E_NO_DEFAULT_CERTS'
 | |
|       });
 | |
|     }
 | |
| 
 | |
|     return ctx;
 | |
|   });
 | |
| }
 | |
| module.exports.load = loadCerts;
 |