app.use(function(req, res, next) { if (req.secure || true) { next(); } else { res.redirect('https://' + req.headers.host + req.url); } });
app.get('/*', function (req, res) { if (req.secure) { res.sendFile( __dirname + "/views/" + "secure.html" ); } else { res.sendFile( __dirname + "/views/" + "unsecure.html" ); } })
app.use(function(req, res, next){ if(req.secure || (req.protocol === "https") || (req.get("x-forwarded-proto") === "https")){ next(); } else{ res.redirect("https://" + req.headers.host + req.url); } });
app.use((req, res, next) => { if (!req.secure) { return res.redirect(['https://', req.hostname, ':', nconf.get('webServer:port') || process.env.PORT, req.url].join('')); } next(); });
if (!req.secure) { res.redirect(`https://${req.headers['host']}${req.originalUrl}`) } else {
server.enable('trust proxy') server.use((req, res, next) => { if (!req.secure) { res.redirect(`https://${req.hostname}${req.url}`) } else {
// https (ssl) configuration /* # The following line will generate the sertificates # suitable for test purposes on local computer openssl genrsa 1024 > private.key openssl req -new -key private.key -out cert.csr openssl x509 -req -in cert.csr -signkey private.key -out certificate.pem # how to use with Postman # http://blog.getpostman.com/2014/01/28/using-self-signed-certificates-with-postman/ */ // SETUP MIDDLEWARE // =============================================================================== router.use((req, res, next) => { // middleware to use for all requests res.setHeader("Access-Control-Allow-Origin", /* 'http://localhost:3030' */ "*"); res.setHeader('Access-Control-Allow-Methods', 'GET, POST, PUT, DELETE') res.header("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept"); // CORS filtering console.log(req.method, req.url, req.secure); // Job login next(); // make sure we go to the next routes and don't stop here })
debug(`Publication: ${pathBase64Str}`); const isSecureHttp = req.secure || req.protocol === "https" || req.get("X-Forwarded-Proto") === "https"
if (!req.secure && (!IGNORE_SSL_HOSTNAME || req.hostname !== IGNORE_SSL_HOSTNAME)) { res.redirect(`https://${req.hostname}${req.url}`) } else {
app.all('*', function(req, res, next){ if (req.secure) { return next(); }; res.redirect('https://localhost:'+HTTPS_PORT+req.url); });
redirectApp.use(function requireHTTPS(req, res, next) { if (!req.secure) { var redirectLocation = 'https://' + EXTERNAL_HOST; //req.headers.host if (undefined !== EXTERNAL_PORT) { // If there is a special port supplied use it. if ( (null !== EXTERNAL_PORT) && ("" !== EXTERNAL_PORT) && (443 !== EXTERNAL_PORT) && ("443" !== EXTERNAL_PORT) ) { redirectLocation = redirectLocation + ":" + EXTERNAL_PORT } } redirectLocation = redirectLocation + req.url; lutils.multiLog("Redirecting client to secure service: " + redirectLocation); return res.redirect(redirectLocation); } next(); })
app.use(function (req, res, next) { if (req.secure) // returns true is protocol = https next(); else res.redirect('https://' + req.headers.host + req.url); });
server.enable('trust proxy') server.use((req, res, next) => { if (!req.secure) { res.redirect(`https://${req.hostname}${req.url}`) } else {