Subversion Repositories ALCASAR

Rev

Rev 2923 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 2923 Rev 3110
1
$HTTP["url"] =~ ".*" {
1
$HTTP["url"] =~ ".*" {
2
    # Disabling directory listing as default setting
2
    # Disabling directory listing as default setting
3
    dir-listing.activate = "disable"
3
    dir-listing.activate = "disable"
4
}
4
}
5
 
5
 
6
# If a wrong url is used, displaying homepage for unprivileged users
6
# If a wrong url is used, displaying homepage for unprivileged users
7
$HTTP["url"] !~ "^/(acc|save)/" {
7
$HTTP["url"] !~ "^/(acc|save)/" {
8
    server.error-handler-404 = "/"
8
    server.error-handler-404 = "/"
9
}
9
}
10
 
10
 
11
# Error pages
11
# Error pages
12
server.errorfile-prefix = "/var/www/html/errors/error-" 
12
server.errorfile-prefix = "/var/www/html/errors/error-" 
13
 
13
 
14
$SERVER["socket"] == "alcasar.localdomain:443" {
14
$SERVER["socket"] == "alcasar.localdomain:443" {
15
    ssl.engine = "enable"
15
    ssl.engine = "enable"
16
    ssl.pemfile = "/etc/pki/tls/private/alcasar.pem"
16
    ssl.pemfile = "/etc/pki/tls/private/alcasar.pem"
17
    ssl.ca-file = "/etc/pki/tls/certs/server-chain.pem"
17
    ssl.ca-file = "/etc/pki/tls/certs/server-chain.pem"
18
    ssl.use-sslv2 = "disable"
-
 
19
    ssl.use-sslv3 = "disable"
-
 
20
    ssl.honor-cipher-order = "enable"
18
    ssl.honor-cipher-order = "enable"
21
    ssl.cipher-list = "ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS"
19
    ssl.cipher-list = "ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS"
22
    var.server_name = "alcasar.localdomain"
20
    var.server_name = "alcasar.localdomain"
23
    server.name = server_name
21
    server.name = server_name
24
    server.document-root = "/var/www/html"
22
    server.document-root = "/var/www/html"
25
}
23
}
26
 
24
 
27
$HTTP["scheme"] == "https" {
25
$HTTP["scheme"] == "https" {
28
    alias.url = (
26
    alias.url = (
29
        "/save" => "/var/Save"
27
        "/save" => "/var/Save"
30
    )
28
    )
31
    # Digest authentication configuration
29
    # Digest authentication configuration
32
    auth.backend = "htdigest"
30
    auth.backend = "htdigest"
33
    auth.require = (
31
    auth.require = (
34
        "/acc/" => 
32
        "/acc/" => 
35
        (
33
        (
36
            "method"  => "digest",
34
            "method"  => "digest",
37
            "realm"   => "ALCASAR Control Center (ACC)",
35
            "realm"   => "ALCASAR Control Center (ACC)",
38
            "require" => "valid-user"
36
            "require" => "valid-user"
39
        ),
37
        ),
40
        "/save/" => 
38
        "/save/" => 
41
        (
39
        (
42
            "method"  => "digest",
40
            "method"  => "digest",
43
            "realm"   => "ALCASAR Control Center (ACC)",
41
            "realm"   => "ALCASAR Control Center (ACC)",
44
            "require" => "valid-user"
42
            "require" => "valid-user"
45
        )
43
        )
46
    )
44
    )
47
    $HTTP["url"] =~ "^/(acc|save)/" {
45
    $HTTP["url"] =~ "^/(acc|save)/" {
48
        # Setting digest files according access permissions
46
        # Setting digest files according access permissions
49
        $HTTP["url"] =~ "^/acc/" {
47
        $HTTP["url"] =~ "^/acc/" {
50
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_all"
48
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_all"
51
            $HTTP["url"] =~ "^/acc/admin" {
49
            $HTTP["url"] =~ "^/acc/admin" {
52
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_admin"
50
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_admin"
53
            }
51
            }
54
            $HTTP["url"] =~ "^/acc/manager/" {
52
            $HTTP["url"] =~ "^/acc/manager/" {
55
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_manager"
53
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_manager"
56
            }
54
            }
57
            $HTTP["url"] =~ "^/acc/backup/" {
55
            $HTTP["url"] =~ "^/acc/backup/" {
58
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
56
                auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
59
            }
57
            }
60
        }
58
        }
61
        $HTTP["url"] =~ "^/save" {
59
        $HTTP["url"] =~ "^/save" {
62
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
60
            auth.backend.htdigest.userfile = "/usr/local/etc/digest/key_backup"
63
            # Enabling directory listing
61
            # Enabling directory listing
64
            dir-listing.activate = "enable"
62
            dir-listing.activate = "enable"
65
        }
63
        }
66
    }
64
    }
67
}
65
}
68
 
66
 
69
$HTTP["scheme"] == "http" {
67
$HTTP["scheme"] == "http" {
70
        # Force HTTPS for specific pages
68
        # Force HTTPS for specific pages
71
        $HTTP["url"] =~ "^/(acc|save)" {
69
        $HTTP["url"] =~ "^/(acc|save)" {
72
                $HTTP["host"] =~ ".*" {
70
                $HTTP["host"] =~ ".*" {
73
                        url.redirect = (".*" => "https://%0$0")
71
                        url.redirect = (".*" => "https://%0$0")
74
                }
72
                }
75
        }
73
        }
76
}
74
}
77
 
75