0.1.0 • Public • Published

HTTP and WebSocket application routing


You can expose several HTTP or WebSocket applications over a single TCP port using ARR.JS. This is useful for better utilization of servers, including shared hosting.

  • Host N applications on M servers, each application in K(N) instances, 1 <= K(N) <= M.
  • Routing based on the Host HTTP request header.
  • HTTP and HTTPS.
  • WebSockets and secure WebSockets.
  • SNI support for SSL.
  • Message-based process activation.
  • Process monitoring and crash recovery.
  • Host applications built with arbitrary technology with its own HTTP stack, including node.js.
  • Works on Windows, MacOS, and *nix.
  • Built with node.js, MongoDB, and nodejitsu HTTP proxy.


  • Windows, MacOS, or *nix (tested on Windows 7 & 2008 Server, MacOS Lion, Ubuntu 11.10)
  • node.js v0.7.0 or greater. MacOS and *nix may use earlier versions.
  • MongoDB. The database is used to store application metadata and must be accessible from all backends.

Getting started

Instructions below are for setting up a single machine deployment (e.g. development environment) on a MacOS. Other OSes are conceptually similar.

Start unsecure MongoDB server on localhost:


Import application metadata for the three sample applications:

mongoimport -d arr -c apps src/apps.json

Configure your HOSTS file (/etc/hosts on MacOS and *nix, %systemroot%\system32\drivers\etc\hosts on Windows) to resolve domain names used by the sample applications to localhost by adding the following lines:

Start the ARR.JS router to listen for unsecured traffic on port 80 and SSL traffic on port 443 (these ports cannot be used by other processes on the box):

cd src
sudo node arr.js --mongo=mongodb://localhost/arr -p 80 -s 443

Issue a few requests to test the system:

curl -k
curl -k

In your favorite modern browser navigate to You should see Dante's Divine Comedy streamed down to the browser over a WebSocket connection, a stanza every 2 seconds. When connecting over you will first see a security warning because the certificate exposed by the application is not trusted (it is self-signed).

Deployment on a server farm


The MongoDB dabatase holds application metadata and must be accessible from all servers in the farm. You can use your own instance or get started with a free instance provided by MongoHQ. Bottom line is you need a MongoDB connection URL to provide to all instances of arr.js you will run on the backends.

The application metadata must be stored in a single MongoDB collection called apps. Each document in this collection must have the following structure:

  process: {
    executable: "node",                 // specify the executable name here, including path if needed
    args: [                             // specify whatever command line arguments must be passed to the executable
  hosts: [
      host: "",
      ssl: "allowed",                       // you must say "allowed", "required", or "none" (for unsecure access only)
      cert: "certs/app1-janczuk-cert.pem",  // optional file with X.509 certificate associated with this host name
      key: "certs/app1-key.pem"             // optional file with the private key for the X.509 certificate
    // ... you can specify multiple host names that can be used to access this application
  instances: 2,                             // maximum number of instances of this application to create
  machines: [                               // this is the array of machines the application is currently running on
  ]                                         // and it must be set to empty initially; it is managed by arr.js

For an example of application metadata, check out apps.json, a file that can be imported into the MongoDB database using the mongoimport tool.


Each server in the farm dedicated to running applications must be running an instance of arr.js. Typically each of the instances of arr.js would be configured identically, which allows any run of the mill TCP level load balancer to be put in front of the server farm. Arr.js accepts the following parameters:

Usage: node ./arr.js

  -m, --mongo    Mongo DB connecton string                      [default: "mongodb://localhost/arr"]
  -r, --range    Managed TCP port range                         [default: "8000-9000"]
  -p, --port     Unsecured listen port                          [default: 31415]
  -s, --sslport  SSL listen port                                [default: 31416]
  -c, --cert     Non-SNI (wildcard) server certificate for SSL  [default: "certs/wildcard-janczuk-cert.pem"]
  -k, --key      Private key for SSL                            [default: "certs/wildcard-janczuk-key.pem"]

The MongoDB connection URL (-m) must point to the central MongoDB database with the apps collection that holds the application metadata.

The managed TCP port range (-r) indicates the range of TCP ports arr.js will use to assign a TCP port to a managed application when it is activated. The TCP port number assigned to an instance of an application is passed to the application through the process environment variable named PORT. In case of node.js applications for example, this value is accessible via the process.env.PORT property and can be used to set up an HTTP listener. See server.js for an example.

The unsecured (-p) and secured (-s) port number are the two TCP port numbers arr.js will listen on. Arr.js will accept HTTP and WS traffic on the unsecured port, and HTTPS and WSS traffic on the secured port. SSL security terminates at arr.js. Arr.js acts as an HTTP[S]/WS[S] reverse proxy, routing incoming requests to appropriate applications based on the value of the Host HTTP request header. If necessary, an instance of an application is activated. Communication between arr.js and an instance of an application is not secured with SSL (i.e. plaintext HTTP or WS is used), so the application code should always set up their listeners for HTTP and WS, regardless whether calls the client issues requests over SSL or not. Appropriate set of x-forwarded-* HTTP request headers that arr.js adds to the routed requests allow applications to learn more about the original client connection.

Each instance of arr.js is configured with an X.509 certificate (-c) and the associated private key (-k). This certificate and private key are used to identify the server during the SSL handshake, unless application specific configuration specifies its own certificate and private key to be used with Server Name Identification (SNI). Note that for SNI to take effect the client must support it (which most modern browsers do). If you plan to support SSL for multiple applications with different host names and use a single server side certificate to secure them, the domain suffix of the host name of these applications must be the same (e.g. and, and the arr.js certificate must be a wildcard certificate (e.g. CN=*

Network Load Balancer

In a typical deployment servers in a farm would run behind a TCP level load balancer. For the convenience of development, this project includes a very simple, TCP level software load balancer, nlb.js.

Configuration of nlb.js is stored in the adjacent nlb.json file with the following structure:

  {                             // multiple "routing rules" are allowed; typically one for unsecure traffic and one for SSL
        "port": 80,                 // the input TCP port number the load balancer will listen on
        "backends": [               // array of arr.js backend endpoints to load balance incoming TCP connections to
                "host": "localhost",    // destination host name
                "port": 31415           // destination port number (does not need to match the input port number)
        "port": 443,
        "backends": [
                "host": "localhost",
                "port": 31416

The nlb.js is stared as a simple node application:

cd src
sudo node nlb.js

The nlb.js will perform TCP level, round robin load balancing of incoming TCP connections across the specified backends.




Package Sidebar


npm i arrjs

Weekly Downloads






Last publish


  • tjanczuk