Subversion Repositories ALCASAR

Rev

Rev 2923 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 2923 Rev 3110
1
$HTTP["url"] =~ ".*" {
1
$HTTP["url"] =~ ".*" {
2
    # Disabling directory listing as default setting
2
    # Disabling directory listing as default setting
3
    dir-listing.activate = "disable"
3
    dir-listing.activate = "disable"
4
}
4
}
5
 
5
 
6
# If a wrong url is used, displaying homepage for unprivileged users
6
# If a wrong url is used, displaying homepage for unprivileged users
7
$HTTP["url"] !~ "^/(acc|save)/" {
7
$HTTP["url"] !~ "^/(acc|save)/" {
8
    server.error-handler-404 = "/"
8
    server.error-handler-404 = "/"
9
}
9
}
10
 
10
 
11
# Error pages
11
# Error pages
12
server.errorfile-prefix = "/var/www/html/errors/error-" 
12
server.errorfile-prefix = "/var/www/html/errors/error-" 
13
 
13
 
14
$SERVER["socket"] == "alcasar.localdomain:443" {
14
$SERVER["socket"] == "alcasar.localdomain:443" {
15
    ssl.engine = "enable"
15
    ssl.engine = "enable"
16
    ssl.pemfile = "/etc/pki/tls/private/alcasar.pem"
16
    ssl.pemfile = "/etc/pki/tls/private/alcasar.pem"
17
    ssl.ca-file = "/etc/pki/tls/certs/server-chain.pem"
17
    ssl.ca-file = "/etc/pki/tls/certs/server-chain.pem"
18
    ssl.use-sslv2 = "disable"
-
 
19
    ssl.use-sslv3 = "disable"
-
 
20
    ssl.honor-cipher-order = "enable"
18
    ssl.honor-cipher-order = "enable"
21
    ssl.cipher-list = "ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS"
19
    ssl.cipher-list = "ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS"
22
    var.server_name = "alcasar.localdomain"
20
    var.server_name = "alcasar.localdomain"
23
    server.name = server_name
21
    server.name = server_name
24
    server.document-root = "/var/www/html"
22
    server.document-root = "/var/www/html"
25
}
23
}
26
 
24
 
27
$HTTP["scheme"] == "https" {
25
$HTTP["scheme"] == "https" {
28
    alias.url = (
26
    alias.url = (
29
        "/save" => "/var/Save"
27
        "/save" => "/var/Save"
30
    )
28
    )
31
    # Digest authentication configuration
29
    # Digest authentication configuration
32
    auth.backend = "htdigest"
30
    auth.backend = "htdigest"
33
    auth.require = (
31
    auth.require = (
34
        "/acc/" => 
32
        "/acc/" => 
35
        (
33
        (
36
            "method"  => "digest",
34
            "method"  => "digest",
37
            "realm"   => "ALCASAR Control Center (ACC)",
35
            "realm"   => "ALCASAR Control Center (ACC)",
38
            "require" => "valid-user"
36
            "require" => "valid-user"
39
        ),
37
        ),
40
        "/save/" => 
38
        "/save/" => 
41
        (
39
        (
42
            "method"  => "digest",
40
            "method"  => "digest",
43
            "realm"   => "ALCASAR Control Center (ACC)",
41
            "realm"   => "ALCASAR Control Center (ACC)",
44
            "require" => "valid-user"
42
            "require" => "valid-user"
45
        )
43
        )
46
    )
44
    )
47
    $HTTP["url"] =~ "^/(acc|save)/" {
45
    $HTTP["url"] =~ "^/(acc|save)/" {
48
        # Setting digest files according access permissions
46
        # Setting digest files according access permissions
49
        $HTTP["url"] =~ "^/acc/" {
47
        $HTTP["url"] =~ "^/acc/" {
50
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_all"
48
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_all"
51
 
49
 
52
            $HTTP["url"] =~ "^/acc/admin" {
50
            $HTTP["url"] =~ "^/acc/admin" {
53
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_admin"
51
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_admin"
54
            }
52
            }
55
 
53
 
56
            $HTTP["url"] =~ "^/acc/manager/" {
54
            $HTTP["url"] =~ "^/acc/manager/" {
57
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_manager"
55
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_manager"
58
            }
56
            }
59
 
57
 
60
            $HTTP["url"] =~ "^/acc/backup/" {
58
            $HTTP["url"] =~ "^/acc/backup/" {
61
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
59
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
62
            }
60
            }
63
        }
61
        }
64
        $HTTP["url"] =~ "^/save" {
62
        $HTTP["url"] =~ "^/save" {
65
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
63
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
66
            # Enabling directory listing
64
            # Enabling directory listing
67
            dir-listing.activate = "enable"
65
            dir-listing.activate = "enable"
68
        }
66
        }
69
    }
67
    }
70
}
68
}
71
 
69
 
72
$HTTP["scheme"] == "http" {
70
$HTTP["scheme"] == "http" {
73
	# Force HTTPS for specific pages
71
	# Force HTTPS for specific pages
74
	$HTTP["url"] =~ "^/(acc|save)" {
72
	$HTTP["url"] =~ "^/(acc|save)" {
75
		$HTTP["host"] =~ ".*" {
73
		$HTTP["host"] =~ ".*" {
76
			url.redirect = (".*" => "https://%0$0")
74
			url.redirect = (".*" => "https://%0$0")
77
		}
75
		}
78
	}
76
	}
79
}
77
}
80
 
78