Subversion Repositories ALCASAR

Rev

Rev 2814 | Rev 2923 | Go to most recent revision | Only display areas with differences | Regard whitespace | Details | Blame | Last modification | View Log

Rev 2814 Rev 2920
1
$HTTP["url"] =~ ".*" {
1
$HTTP["url"] =~ ".*" {
2
    # Disabling directory listing as default setting
2
    # Disabling directory listing as default setting
3
    dir-listing.activate = "disable"
3
    dir-listing.activate = "disable"
4
}
4
}
5
 
5
 
6
# If a wrong url is used, displaying homepage for unprivileged users
6
# If a wrong url is used, displaying homepage for unprivileged users
7
$HTTP["url"] !~ "^/(acc|save)/" {
7
$HTTP["url"] !~ "^/(acc|save)/" {
8
    server.error-handler-404 = "/"
8
    server.error-handler-404 = "/"
9
}
9
}
10
 
10
 
11
# Error pages
11
# Error pages
12
server.errorfile-prefix = "/var/www/html/errors/error-" 
12
server.errorfile-prefix = "/var/www/html/errors/error-" 
13
 
13
 
14
$SERVER["socket"] == "alcasar.localdomain:443" {
14
$SERVER["socket"] == "alcasar.localdomain:443" {
15
    ssl.engine = "enable"
15
    ssl.engine = "enable"
16
    ssl.pemfile = "/etc/pki/tls/private/alcasar.pem"
16
    ssl.pemfile = "/etc/pki/tls/private/alcasar.pem"
17
    ssl.ca-file = "/etc/pki/tls/certs/server-chain.pem"
17
    ssl.ca-file = "/etc/pki/tls/certs/server-chain.pem"
18
    ssl.use-sslv2 = "disable"
18
    ssl.use-sslv2 = "disable"
19
    ssl.use-sslv3 = "disable"
19
    ssl.use-sslv3 = "disable"
20
    ssl.use-compression = "disable"
20
    ssl.use-compression = "disable"
21
    ssl.honor-cipher-order = "enable"
21
    ssl.honor-cipher-order = "enable"
22
    ssl.cipher-list = "ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS"
22
    ssl.cipher-list = "ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS"
23
 
-
 
24
    var.server_name = "alcasar.localdomain"
23
    var.server_name = "alcasar.localdomain"
25
    server.name = server_name
24
    server.name = server_name
26
 
-
 
27
    server.document-root = "/var/www/html"
25
    server.document-root = "/var/www/html"
28
    
-
 
29
}
26
}
30
 
27
 
31
$HTTP["scheme"] == "https" {
28
$HTTP["scheme"] == "https" {
32
 
-
 
33
    alias.url = (
29
    alias.url = (
34
        "/save" => "/var/Save"
30
        "/save" => "/var/Save"
35
    )
31
    )
36
 
32
 
37
    # Digest authentication configuration
33
    # Digest authentication configuration
38
    auth.backend = "htdigest"
34
    auth.backend = "htdigest"
39
    auth.debug = 1
35
    auth.debug = 1
40
    auth.require = (
36
    auth.require = (
41
        "/acc/" => 
37
        "/acc/" => 
42
        (
38
        (
43
            "method"  => "digest",
39
            "method"  => "digest",
44
            "realm"   => "ALCASAR Control Center (ACC)",
40
            "realm"   => "ALCASAR Control Center (ACC)",
45
            "require" => "valid-user"
41
            "require" => "valid-user"
46
        ),
42
        ),
47
        "/save/" => 
43
        "/save/" => 
48
        (
44
        (
49
            "method"  => "digest",
45
            "method"  => "digest",
50
            "realm"   => "ALCASAR Control Center (ACC)",
46
            "realm"   => "ALCASAR Control Center (ACC)",
51
            "require" => "valid-user"
47
            "require" => "valid-user"
52
        )
48
        )
53
 
49
 
54
    )
50
    )
55
 
51
 
56
    $HTTP["url"] =~ "^/(acc|save)/" {
52
    $HTTP["url"] =~ "^/(acc|save)/" {
57
        # Setting digest files according access permissions
53
        # Setting digest files according access permissions
58
        $HTTP["url"] =~ "^/acc/" {
54
        $HTTP["url"] =~ "^/acc/" {
59
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_all"
55
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_all"
60
 
56
 
61
            $HTTP["url"] =~ "^/acc/admin" {
57
            $HTTP["url"] =~ "^/acc/admin" {
62
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_admin"
58
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_admin"
63
            }
59
            }
64
 
60
 
65
            $HTTP["url"] =~ "^/acc/manager/" {
61
            $HTTP["url"] =~ "^/acc/manager/" {
66
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_manager"
62
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_manager"
67
            }
63
            }
68
 
64
 
69
            $HTTP["url"] =~ "^/acc/backup/" {
65
            $HTTP["url"] =~ "^/acc/backup/" {
70
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
66
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
71
            }
67
            }
72
        }
68
        }
73
 
69
 
74
        $HTTP["url"] =~ "^/save" {
70
        $HTTP["url"] =~ "^/save" {
75
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
71
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
76
            
72
            
77
            # Enabling directory listing
73
            # Enabling directory listing
78
            dir-listing.activate = "enable"
74
            dir-listing.activate = "enable"
79
        }
75
        }
80
    }
76
    }
81
}
77
}
82
 
78
 
83
$HTTP["scheme"] == "http" {
79
$HTTP["scheme"] == "http" {
84
	# Force HTTPS for specific pages
80
	# Force HTTPS on all pages
85
	# $HTTP["url"] =~ "^/(acc|save|(intercept|password).php)" {
-
 
86
	$HTTP["url"] =~ "^/(acc|save)" {
-
 
87
		$HTTP["host"] =~ ".*" {
-
 
88
			url.redirect = (".*" => "https://%0$0")
81
	url.redirect = ("" => "https://${url.authority}${url.path}${qsa}")
89
		}
-
 
90
	}
-
 
91
}
82
}
92
 
83