Compare commits
6 Commits
release/1.
...
pkg/dev/eo
Author | SHA1 | Date | |
---|---|---|---|
904abd02a4 | |||
e2f656f9f8 | |||
e5ada4d3eb | |||
dab8085a83 | |||
ad490d3810 | |||
0fc774cd05 |
63
README.md
63
README.md
@ -1,73 +1,16 @@
|
||||
# eole-lemonldap
|
||||
|
||||
LemonLDAP::NG EOLE integration
|
||||
Intégration LemonLDAP::NG pour EOLE
|
||||
|
||||
## Howto
|
||||
|
||||
### Repository configuration
|
||||
|
||||
* Add the lemonldap-ng deb respository we need the last version of LemonLDAP.
|
||||
|
||||
GenConfig -> Mode Expert -> Dépôts tiers -> Libellé du dépôt
|
||||
Gen_config -> Mode Expert -> Dépôts tiers -> Libellé du dépôt
|
||||
|
||||
#### LemonLDAP::NG repository
|
||||
### LemonLDAP::NG repository
|
||||
|
||||
* deb https://lemonldap-ng.org/deb stable main
|
||||
* deb-src https://lemonldap-ng.org/deb stable main
|
||||
* Key URL : https://lemonldap-ng.org/_media/rpm-gpg-key-ow2
|
||||
|
||||
#### Cadoles Repository
|
||||
* deb [ arch=all ] https://vulcain.cadoles.com 2.6.2-dev main
|
||||
* Key URL : https://vulcain.cadoles.com/cadoles.gpg
|
||||
|
||||
### Install packages
|
||||
|
||||
apt update
|
||||
apt install eole-lemonldap
|
||||
|
||||
### Configure LemonLDAP in GenConfig
|
||||
|
||||
* Enable lemonldap in "Services" tab
|
||||
|
||||
Gen_Config -> Services -> Activer LemonLDAP::NG -> "Oui"
|
||||
|
||||
* Fill LemonLDAP configuration
|
||||
|
||||
#### Nginx Web case
|
||||
|
||||
By default NGINX is configured to serve "web" application, in this case the lemonLDAP::NG application will
|
||||
not be served properly, so we need to disable this function
|
||||
|
||||
GenConfig -> Services -> Activer la publication d’applications web par Nginx -> "Non'
|
||||
|
||||
#### Configuration DNS
|
||||
* GenConfig -> Lemonldap -> Nom DNS du manager LemonLDAP-NG
|
||||
* GenConfig -> Lemonldap -> Nom DNS du service d'authentification LemonLDAP-NG
|
||||
|
||||
#### Configuration LDAP
|
||||
* GenConfig -> Lemonldap -> Protocole LDAP à utiliser
|
||||
* GenConfig -> Lemonldap -> Adresse du Serveur LDAP utilisé par LemonLDAP::NG
|
||||
* GenConfig -> Lemonldap -> Port d'écoute du LDAP utilisé par LemonLDAP::NG
|
||||
* GenConfig -> Lemonldap -> Base DN des utilisateurs dans l'annuaire
|
||||
* GenConfig -> Lemonldap -> Utilisateur de connection à l'annuaire (DN ex: cn=reader,o=gouv,c=fr)
|
||||
* GenConfig -> Lemonldap -> Mot de passe de l'utilisateur de connection à l'annuaire (file like /root/.reader or the clear password)
|
||||
|
||||
#### Configuration CAS
|
||||
|
||||
Add your CAS attributes mapping ( uid = uid and mail = mail are created by default)
|
||||
|
||||
* GenConfig -> Lemonldap -> Nom de l'attribut CAS
|
||||
* GenConfig -> Lemonldap -> Attribut LDAP équivalent
|
||||
|
||||
### SSL issues
|
||||
|
||||
If you use "autosign" certificates you need to add the "manager" and "auth" service names to the alternative names.
|
||||
You also need to include "reload" service name (available in GenConfig -> Mode Expert -> Lemonldap -> Nom DNS du service Reload de LemonLDAP-NG)
|
||||
|
||||
* GenConfig -> Mode Expert -> Certificats ssl -> Nom Alternatif de la machine (SubjectAltName)
|
||||
|
||||
If you use "manual" certificates make sure this names are covered by your SSL Certificate
|
||||
|
||||
If you use "letsencrypt" mode you also need to add this names to the let'sencrypt request:
|
||||
|
||||
* GenConfig -> Mode Expert -> Certificat ssl -> Nom de domaines supplémentaires
|
||||
|
@ -1,67 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
def toCidr(ip,mask=False):
|
||||
""" Convert to CIDR notation
|
||||
ip can be like this : 192.168.5.100/255.255.255.0
|
||||
or you can provide the ip and the mask
|
||||
"""
|
||||
from IPy import IP
|
||||
try:
|
||||
if mask:
|
||||
data="{0}/{1}".format(ip,mask)
|
||||
else:
|
||||
data=ip
|
||||
return str(IP(data))
|
||||
except:
|
||||
return data
|
||||
|
||||
def readPass(encoder,reader):
|
||||
try:
|
||||
mypwdreader=open(reader, "r").readline().rstrip()
|
||||
if encoder == "":
|
||||
return mypwdreader
|
||||
elif encoder == "base64":
|
||||
import base64
|
||||
return base64.b64encode(mypwdreader)
|
||||
|
||||
except:
|
||||
return "mot de passe inconnu"
|
||||
|
||||
def getSSOFilters():
|
||||
""" Convert former eole-sso filters to LemonLDAP filters
|
||||
"""
|
||||
import glob
|
||||
from ConfigParser import ConfigParser
|
||||
|
||||
try:
|
||||
filters = { 'uid': "uid", "mail": "mail" }
|
||||
filterDirectory = "/usr/share/sso/app_filters/"
|
||||
filterExtention = ".ini"
|
||||
filterSection = "utilisateur"
|
||||
filterFiles = glob.glob("{0}/*{1}".format(filterDirectory, filterExtention))
|
||||
toClean = [ "__name__" ]
|
||||
if len(filterFiles) != 0:
|
||||
for fi in filterFiles:
|
||||
# Don't parse "applications.ini"
|
||||
config = ConfigParser()
|
||||
config.read(fi)
|
||||
if filterSection in config._sections:
|
||||
filters.update(config._sections[filterSection].items())
|
||||
for key in toClean:
|
||||
if key in filters.keys():
|
||||
del(filters[key])
|
||||
res = {}
|
||||
index=0
|
||||
size=len(filters)
|
||||
return(filters.items())
|
||||
"""
|
||||
for k,v in filters.items():
|
||||
res[k] " \"{0}\": \"{1}\"".format(k,v)
|
||||
index += 1
|
||||
if index != size:
|
||||
res += ",\n"
|
||||
return(res)
|
||||
"""
|
||||
except:
|
||||
return "Error Generating Filters"
|
||||
|
1
debian/compat
vendored
Normal file
1
debian/compat
vendored
Normal file
@ -0,0 +1 @@
|
||||
9
|
18
debian/control
vendored
Normal file
18
debian/control
vendored
Normal file
@ -0,0 +1,18 @@
|
||||
Source: eole-lemonldap
|
||||
Section: web
|
||||
Priority: optional
|
||||
Maintainer: Cadoles <eole@ac-dijon.fr>
|
||||
Build-Depends: debhelper (>= 9)
|
||||
Standards-Version: 3.9.3
|
||||
Homepage: https://forge.cadoles.com/Cadoles/eole-lemonldap
|
||||
Vcs-Git: https://forge.cadoles.com/Cadoles/eole-lemonldap.git
|
||||
Vcs-Browser: https://forge.cadoles.com/Cadoles/eole-lemonldap
|
||||
|
||||
Package: eole-lemonldap
|
||||
Architecture: all
|
||||
Depends: ${misc:Depends}, lemonldap-ng, lemonldap-ng-doc, lemonldap-ng-fr-doc, lemonldap-ng-fastcgi-server,
|
||||
libxml-libxml-perl, libxml-libxslt-perl, libcgi-emulate-psgi-perl, libauthen-captcha-perl, liblasso-perl,
|
||||
libxml-simple-perl, libcgi-compile-perl
|
||||
Description: Dictionnaires et templates pour la configuration d'un serveur LemonLDAP::NG, testée uniquement avec eolebase
|
||||
.
|
||||
Pour toute information complémentaire, veuillez vous rendre sur la forge Cadoles.
|
44
debian/copyright
vendored
Normal file
44
debian/copyright
vendored
Normal file
@ -0,0 +1,44 @@
|
||||
Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
|
||||
Upstream-Name: {PROJECT}
|
||||
Source: {URL}
|
||||
|
||||
Files: *
|
||||
Copyright: YEAR {UPSTREAM} {AUTHOR} <{MAIL}>
|
||||
License: {UPSTREAM LICENSE}
|
||||
|
||||
Files: debian/*
|
||||
Copyright: 2012 Équipe EOLE <eole@ac-dijon.fr>
|
||||
License: CeCILL-2
|
||||
|
||||
License: {UPSTREAM LICENSE}
|
||||
{TEXT OF THE LICENSE}
|
||||
|
||||
License: CeCILL-2
|
||||
This software is governed by the CeCILL-2 license under French law and
|
||||
abiding by the rules of distribution of free software. You can use,
|
||||
modify and or redistribute the software under the terms of the CeCILL-2
|
||||
license as circulated by CEA, CNRS and INRIA at the following URL
|
||||
"http://www.cecill.info";.
|
||||
.
|
||||
As a counterpart to the access to the source code and rights to copy,
|
||||
modify and redistribute granted by the license, users are provided only
|
||||
with a limited warranty and the software's author, the holder of the
|
||||
economic rights, and the successive licensors have only limited
|
||||
liability.
|
||||
.
|
||||
In this respect, the user's attention is drawn to the risks associated
|
||||
with loading, using, modifying and/or developing or reproducing the
|
||||
software by the user in light of its specific status of free software,
|
||||
that may mean that it is complicated to manipulate, and that also
|
||||
therefore means that it is reserved for developers and experienced
|
||||
professionals having in-depth computer knowledge. Users are therefore
|
||||
encouraged to load and test the software's suitability as regards their
|
||||
requirements in conditions enabling the security of their systems and/or
|
||||
data to be ensured and, more generally, to use and operate it in the
|
||||
same conditions as regards security.
|
||||
.
|
||||
The fact that you are presently reading this means that you have had
|
||||
knowledge of the CeCILL-2 license and that you accept its terms.
|
||||
.
|
||||
On Eole systems, the complete text of the CeCILL-2 License can be found
|
||||
in '/usr/share/common-licenses/CeCILL-2-en'.
|
3
debian/gbp.conf
vendored
Normal file
3
debian/gbp.conf
vendored
Normal file
@ -0,0 +1,3 @@
|
||||
# Set per distribution debian tag
|
||||
[DEFAULT]
|
||||
debian-tag = debian/eole/%(version)s
|
8
debian/rules
vendored
Executable file
8
debian/rules
vendored
Executable file
@ -0,0 +1,8 @@
|
||||
#!/usr/bin/make -f
|
||||
# -*- makefile -*-
|
||||
|
||||
# Uncomment this to turn on verbose mode.
|
||||
#export DH_VERBOSE=1
|
||||
|
||||
%:
|
||||
dh $@
|
BIN
debian/source/.format.un~
vendored
Normal file
BIN
debian/source/.format.un~
vendored
Normal file
Binary file not shown.
1
debian/source/format
vendored
Normal file
1
debian/source/format
vendored
Normal file
@ -0,0 +1 @@
|
||||
3.0 (native)
|
@ -2,16 +2,10 @@
|
||||
<creole>
|
||||
<files>
|
||||
<!-- Je suis un commentaire -->
|
||||
<file filelist='lemon' name='/etc/lemonldap-ng/manager-nginx.conf' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/etc/lemonldap-ng/handler-nginx.conf' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/etc/lemonldap-ng/portal-nginx.conf' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/etc/lemonldap-ng/test-nginx.conf' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/etc/lemonldap-ng/lemonldap-ng.ini' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/var/lib/lemonldap-ng/conf/lmConf-1.json' mkdir='True' rm='True'/>
|
||||
<file filelist='lemonCAS' name='/usr/share/php/configCAS/cas.inc.php' source='cas.inc.php.tmpl' mkdir='True'/>
|
||||
<file filelist='lemonCAS' name='/usr/share/php/CAS/eoleCASConfig.php' source='eoleCASConfig.php.tmpl' mkdir='True'/>
|
||||
<file filelist='lemonCAS' name='/etc/pam_cas.conf' source="pam_cas_auth.conf"/>
|
||||
<service>lemonldap-ng-fastcgi-server</service>
|
||||
<file filelist='lemon' name='/etc/nginx/sites-available/manager-nginx.conf' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/etc/nginx/sites-available/handler-nginx.conf' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/etc/nginx/sites-available/portal-nginx.conf' mkdir='True' rm='True'/>
|
||||
<file filelist='lemon' name='/var/lib/lemonldap-ng/conf/lmConf-1.js' mkdir='True' rm='True'/>
|
||||
<service_access service='nginx'>
|
||||
<port service_accesslist="saLemon">80</port>
|
||||
<port service_accesslist="saLemon">443</port>
|
||||
@ -37,42 +31,10 @@
|
||||
<variable name="lemonAdmin" type='string' description="LemonLDAP Administrator username" mode='expert'>
|
||||
<value>admin</value>
|
||||
</variable>
|
||||
<variable name="nginxBucketSize" type='number' description="Taille du hash des noms de serveur pour NGINX" mode='expert'>
|
||||
<value>64</value>
|
||||
</variable>
|
||||
<variable name="casAttribute" description="Nom de l'attribut CAS" type="string" mode="expert" multi="True"/>
|
||||
<variable name="casLDAPAttribute" description="Attribut LDAP équivalent" type="string" mode="expert"/>
|
||||
<variable name="casFolder" description="Endpoint du service cas" type="string" mode="expert">
|
||||
<value>cas</value>
|
||||
</variable>
|
||||
<variable name='cas_send_logout' type='oui/non' description="Activer le logout centralisé du serveur SSO" hidden='True'>
|
||||
<value>oui</value>
|
||||
</variable>
|
||||
<variable name='ssoCALocation' type='string' description="Chemin de l'autorité de certification (ou rien)" mode="expert"/>
|
||||
<variable name='ssoDebug' type='string' description="Activer le Debug pour la lib php-CAS" mode="expert">
|
||||
<value>non</value>
|
||||
</variable>
|
||||
<variable name='llSkin' type='string' description="Skin utilisé par LemonLDAP::NG">
|
||||
<value>bootstrap</value>
|
||||
</variable>
|
||||
<variable name='llCheckLogins' type='oui/non' description="Permettre aux utilisateurs d'afficher l'historique de connection">
|
||||
<value>non</value>
|
||||
</variable>
|
||||
<variable name='llResetPassword' type='oui/non' description="Permettre aux utilisateurs de réinitialiser leurs mots de passe">
|
||||
<value>oui</value>
|
||||
</variable>
|
||||
<variable name='llResetUrl' type='string' description="Adresse de l'application pour réinitialiser leurs mots de passe" />
|
||||
<variable name='llRegisterAccount' type='oui/non' description="Permettre aux utilisateurs de créer un compte">
|
||||
<value>oui</value>
|
||||
</variable>
|
||||
<variable name='llRegisterDB' type='string' description="Base de comptes pour l'enregistrement"/>
|
||||
<variable name='llRegisterURL' type='string' description="Adresse de l'application de création de compte"/>
|
||||
</family>
|
||||
<separators>
|
||||
<separator name="managerWebName">Configuration DNS</separator>
|
||||
<separator name="ldapScheme">Configuration LDAP</separator>
|
||||
<separator name="casAttribute">Configuration CAS</separator>
|
||||
<separator name="llSkin">Personnalisation de la mire SSO</separator>
|
||||
</separators>
|
||||
</variables>
|
||||
<constraints>
|
||||
@ -95,42 +57,16 @@
|
||||
<check name="valid_enum" target="ldapScheme">
|
||||
<param>['ldaps','ldap']</param>
|
||||
</check>
|
||||
<check name="valid_enum" target="llRegisterDB">
|
||||
<param>['LDAP','Demo','Custom']</param>
|
||||
</check>
|
||||
<group master="casAttribute">
|
||||
<slave>casLDAPAttribute</slave>
|
||||
</group>
|
||||
<condition name='disabled_if_in' source='activerLemon'>
|
||||
<param>non</param>
|
||||
<target type='filelist'>lemon</target>
|
||||
<target type='filelist'>lemonCAS</target>
|
||||
<target type='family'>LemonLDAP</target>
|
||||
<target type='service_accesslist'>saLemon</target>
|
||||
</condition>
|
||||
<condition name='disabled_if_in' source='llRegisterAccount'>
|
||||
<param>non</param>
|
||||
<target type='variable'>llRegisterDB</target>
|
||||
</condition>
|
||||
<condition name='disabled_if_not_in' source='llRegisterDB'>
|
||||
<param>Custom</param>
|
||||
<target type='variable'>llRegisterURL</target>
|
||||
</condition>
|
||||
<condition name='disabled_if_in' source='llResetPassword'>
|
||||
<param>non</param>
|
||||
<target type='variable'>llResetUrl</target>
|
||||
</condition>
|
||||
<check name='valid_enum' target='llSkin'>
|
||||
<param>['bootstrap','dark','impact','pastel']</param>
|
||||
<param name="checkval">False</param>
|
||||
</check>
|
||||
</constraints>
|
||||
<help>
|
||||
<variable name='activerLemon'>Activer l'hébergement d'une place de marché HTTP pour OpenNebula</variable>
|
||||
<variable name='managerWebName'>Nom DNS de l'application de gestion de LemonLDAP::NG ex:manager.cadoles.com</variable>
|
||||
<variable name='authWebName'>Nom DNS de service d'authentification de LemonLDAP::NG ex:auth.cadoles.com</variable>
|
||||
<variable name='ldapUserBaseDN'>DN de l'utilisateur de connection en lecture à l'annuaire (ex: cn=reader,o=gouv,c=fr)</variable>
|
||||
<variable name='nginxBucketSize'>server_names_hash_bucket_size Taille du hash des noms de serveur pour NGINX</variable>
|
||||
<variable name='llCheckLogins'>Affiche une case à cocher sur la mire SSO qui permet a l'utilisateur de voir l'historique de connection de son compte avant d'être redirigé vers le service demandé</variable>
|
||||
</help>
|
||||
</creole>
|
||||
|
@ -1 +0,0 @@
|
||||
creolefuncs_DATA_DIR := $(DESTDIR)/usr/share/creole/funcs
|
@ -1,9 +0,0 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Updating Configuration cache
|
||||
|
||||
cmd="/usr/share/lemonldap-ng/bin/lemonldap-ng-cli update-cache"
|
||||
opt="update-cache"
|
||||
|
||||
res=$(${cmd} ${opt} 2>&1)
|
||||
exit ${?}
|
@ -4,7 +4,6 @@ ENABLE=$(CreoleGet activerLemon 'non')
|
||||
CONF_FILES="manager-nginx.conf"
|
||||
CONF_FILES="${CONF_FILES} handler-nginx.conf"
|
||||
CONF_FILES="${CONF_FILES} portal-nginx.conf"
|
||||
CONF_FILES="${CONF_FILES} test-nginx.conf"
|
||||
|
||||
for CONF_FILE in ${CONF_FILES}
|
||||
do
|
||||
|
@ -1,27 +0,0 @@
|
||||
<?php
|
||||
define("__CAS_SERVER", "%%authWebName");
|
||||
define("__CAS_VERSION", "2.0");
|
||||
define("__CAS_FOLDER", "%%casFolder");
|
||||
define("__CAS_PORT", 443);
|
||||
define("__CAS_PROTO", "https");
|
||||
%if %%cas_send_logout == 'oui'
|
||||
define("__CAS_LOGOUT", true);
|
||||
%else
|
||||
define("__CAS_LOGOUT", false);
|
||||
%end if
|
||||
%if %%getVar('activer_web_valider_ca', 'non') == 'oui'
|
||||
define("__CAS_VALIDER_CA", true);
|
||||
%else
|
||||
define("__CAS_VALIDER_CA", false);
|
||||
%end if
|
||||
%if %%is_empty(%%getVar('ssoCALocation', ''))
|
||||
define("__CAS_CA_LOCATION", "/etc/ssl/certs/ca.crt");
|
||||
%else
|
||||
define("__CAS_CA_LOCATION", "%%ssoCALocation");
|
||||
%end if
|
||||
%if %%getVar("ssoDebug", 'non') == "oui"
|
||||
define("__CAS_DEBUG", true);
|
||||
%else
|
||||
define("__CAS_DEBUG", false);
|
||||
%end if
|
||||
?>
|
@ -1,7 +0,0 @@
|
||||
<?php
|
||||
%if %%mode_conteneur_actif != "non"
|
||||
define("__CAS_IP", "%%adresse_ip_br0");
|
||||
%else
|
||||
define("__CAS_IP", "false");
|
||||
%end if
|
||||
?>
|
@ -24,7 +24,7 @@ server {
|
||||
|
||||
server {
|
||||
listen 443;
|
||||
ssl on;
|
||||
ssl on;
|
||||
%if %%cert_type == "letsencrypt"
|
||||
ssl_certificate %%le_config_dir/live/%%managerWebName/cert.pem;
|
||||
ssl_certificate_key %%le_config_dir/live/%%managerWebName/privkey.pem;
|
||||
@ -35,26 +35,19 @@ server {
|
||||
ssl_client_certificate /etc/ssl/certs/ca.crt;
|
||||
access_log /var/log/nginx/manager-lemon-ldap.access-ssl.log;
|
||||
server_name %%reloadWebName;
|
||||
root /var/www/html;
|
||||
|
||||
error_page 403 404 502 503 504 /nginx.html;
|
||||
location = /nginx.html{
|
||||
root /usr/share/nginx/www;
|
||||
}
|
||||
root /var/www/html;
|
||||
|
||||
location = /reload {
|
||||
allow 127.0.0.1;
|
||||
deny all;
|
||||
|
||||
# FastCGI configuration
|
||||
include /etc/nginx/fastcgi_params;
|
||||
fastcgi_pass unix:/var/run/llng-fastcgi-server/llng-fastcgi.sock;
|
||||
fastcgi_param LLTYPE reload;
|
||||
|
||||
# OR TO USE uWSGI
|
||||
#include /etc/nginx/uwsgi_params;
|
||||
#uwsgi_pass 127.0.0.1:5000;
|
||||
#uwsgi_param LLTYPE reload;
|
||||
}
|
||||
|
||||
# Client requests
|
||||
@ -62,7 +55,15 @@ server {
|
||||
deny all;
|
||||
|
||||
# Uncomment this if you use https only
|
||||
#add_header Strict-Transport-Security "max-age=15768000";
|
||||
#add_header Strict-Transport-Security "15768000";
|
||||
}
|
||||
|
||||
}
|
||||
# Uncomment this if status is enabled
|
||||
#location = /status {
|
||||
# allow 127.0.0.1;
|
||||
# deny all;
|
||||
# include /etc/nginx/fastcgi_params;
|
||||
# fastcgi_pass unix:/var/run/llng-fastcgi-server/llng-fastcgi.sock;
|
||||
# fastcgi_param LLTYPE status;
|
||||
#}
|
||||
}
|
@ -110,22 +110,12 @@ localStorageOptions={ \
|
||||
; restart your server. This increase performances
|
||||
;useLocalConf = 1
|
||||
|
||||
; staticPrefix: relative (or URL) location of static HTML components
|
||||
staticPrefix = /static
|
||||
; location of HTML templates directory
|
||||
templateDir = /usr/share/lemonldap-ng/portal/templates
|
||||
; languages: available languages for portal interface
|
||||
languages = fr, en
|
||||
; PORTAL CUSTOMIZATION
|
||||
; Name of the skin
|
||||
portalSkin = %%llSkin
|
||||
;portalSkin = pastel
|
||||
; Modules displayed
|
||||
;portalDisplayLogout = 1
|
||||
%if %%llResetPassword == "oui"
|
||||
portalDisplayResetPassword = 1
|
||||
%else
|
||||
portalDisplayResetPassword = 0
|
||||
%end if
|
||||
;portalDisplayResetPassword = 1
|
||||
;portalDisplayChangePassword = 1
|
||||
;portalDisplayAppslist = 1
|
||||
;portalDisplayLoginHistory = 1
|
||||
@ -282,7 +272,7 @@ logLevel = warn
|
||||
staticPrefix = /static
|
||||
;
|
||||
; location of HTML templates directory
|
||||
templateDir = /usr/share/lemonldap-ng/manager/htdocs/templates
|
||||
templateDir = /usr/share/lemonldap-ng/manager/templates
|
||||
|
||||
; languages: available languages for manager interface
|
||||
languages = fr, en
|
||||
|
@ -1,4 +1,3 @@
|
||||
%set %%ssoFilters = %%getSSOFilters
|
||||
{
|
||||
"ldapGroupAttributeNameUser": "dn",
|
||||
"cfgAuthorIP": "172.16.0.1",
|
||||
@ -26,7 +25,7 @@
|
||||
"timeoutActivity": 0,
|
||||
"oidcRPMetaDataExportedVars": {},
|
||||
"issuerDBSAMLActivation": 0,
|
||||
"issuerDBCASPath": "^/%%casFolder/",
|
||||
"issuerDBCASPath": "^/cas/",
|
||||
"randomPasswordRegexp": "[A-Z]{3}[a-z]{5}.\\d{2}",
|
||||
"samlIDPSSODescriptorSingleSignOnServiceSOAP": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;",
|
||||
"samlSPSSODescriptorSingleLogoutServiceHTTPPost": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/proxySingleLogout;#PORTAL#/saml/proxySingleLogoutReturn",
|
||||
@ -40,9 +39,7 @@
|
||||
"%%managerWebName": {}
|
||||
},
|
||||
"vhostOptions": {
|
||||
"%%managerWebName": {
|
||||
"vhostHttps" : "1"
|
||||
},
|
||||
"%%managerWebName": {},
|
||||
"test1.%%nom_domaine_local": {},
|
||||
"test2.%%nom_domaine_local": {}
|
||||
},
|
||||
@ -66,20 +63,7 @@
|
||||
"cfgLog": "",
|
||||
"samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;#PORTAL#/saml/singleLogout;#PORTAL#/saml/singleLogoutReturn",
|
||||
"exportedVars": {
|
||||
"UA": "HTTP_USER_AGENT",
|
||||
%for att in %%casAttribute
|
||||
"%%att": "%%att",
|
||||
%end for
|
||||
%set %%idx = 0
|
||||
%set %%size = %%len(%%ssoFilters) - 1
|
||||
%for key,value in %%ssoFilters
|
||||
%if %%idx == %%size
|
||||
"%%key": "%%value"
|
||||
%else
|
||||
"%%key": "%%value",
|
||||
%end if
|
||||
%set %%idx += 1
|
||||
%end for
|
||||
"UA": "HTTP_USER_AGENT"
|
||||
},
|
||||
"notificationStorage": "File",
|
||||
"applicationList": {
|
||||
@ -88,7 +72,7 @@
|
||||
"options": {
|
||||
"name": "Application Test 2",
|
||||
"logo": "thumbnail.png",
|
||||
"uri": "https://test2.%%nom_domaine_local/",
|
||||
"uri": "http://test2.%%nom_domaine_local/",
|
||||
"display": "auto",
|
||||
"description": "The same simple application displaying authenticated user"
|
||||
},
|
||||
@ -100,7 +84,7 @@
|
||||
"type": "application",
|
||||
"options": {
|
||||
"description": "A simple application displaying authenticated user",
|
||||
"uri": "https://test1.%%nom_domaine_local/",
|
||||
"uri": "http://test1.%%nom_domaine_local/",
|
||||
"logo": "demo.png",
|
||||
"display": "auto",
|
||||
"name": "Application Test 1"
|
||||
@ -159,7 +143,7 @@
|
||||
"logo": "help.png",
|
||||
"description": "Documentation supplied with LemonLDAP::NG",
|
||||
"display": "on",
|
||||
"uri": "https://%%managerWebName/doc/",
|
||||
"uri": "http://%%managerWebName/doc/",
|
||||
"name": "Local documentation"
|
||||
},
|
||||
"type": "application"
|
||||
@ -174,27 +158,13 @@
|
||||
"samlAuthnContextMapPasswordProtectedTransport": 3,
|
||||
"ldapUsePasswordResetAttribute": 1,
|
||||
"ldapPpolicyControl": 0,
|
||||
"casAttributes": {
|
||||
%for att in %%casAttribute
|
||||
"%%att": "%%att.casLDAPAttribute",
|
||||
%end for
|
||||
%set %%idx = 0
|
||||
%set %%size = %%len(%%ssoFilters) - 1
|
||||
%for key,value in %%ssoFilters
|
||||
%if %%idx == %%size
|
||||
"%%key": "%%key"
|
||||
%else
|
||||
"%%key": "%%key",
|
||||
%end if
|
||||
%set %%idx += 1
|
||||
%end for
|
||||
},
|
||||
"casAttributes": {},
|
||||
"issuerDBSAMLPath": "^/saml/",
|
||||
"samlAttributeAuthorityDescriptorAttributeServiceSOAP": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/AA/SOAP;",
|
||||
"portalDisplayAppslist": 1,
|
||||
"confirmFormMethod": "post",
|
||||
"domain": "%%nom_domaine_local",
|
||||
"cfgNum": "1",
|
||||
"cfgNum": "9",
|
||||
"authentication": "LDAP",
|
||||
"samlNameIDFormatMapWindows": "uid",
|
||||
"authChoiceModules": {},
|
||||
@ -220,11 +190,7 @@
|
||||
"mailSubject": "[LemonLDAP::NG] Your new password",
|
||||
"nginxCustomHandlers": {},
|
||||
"samlSPSSODescriptorAuthnRequestsSigned": 1,
|
||||
%if %%llResetPassword == "oui"
|
||||
"portalDisplayResetPassword": 1,
|
||||
%else
|
||||
"portalDisplayResetPassword": 0,
|
||||
%end if
|
||||
"openIdSreg_timezone": "_timezone",
|
||||
"infoFormMethod": "get",
|
||||
"openIdAuthnLevel": 1,
|
||||
@ -234,19 +200,14 @@
|
||||
"grantSessionRules": {},
|
||||
"remoteGlobalStorage": "Lemonldap::NG::Common::Apache::Session::SOAP",
|
||||
"reloadUrls": {
|
||||
"%%reloadWebName": "https://%%reloadWebName/reload"
|
||||
"%%reloadWebName": "http://%%reloadWebName/reload"
|
||||
},
|
||||
"registerTimeout": 0,
|
||||
"samlIDPSSODescriptorSingleSignOnServiceHTTPPost": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/singleSignOn;",
|
||||
"slaveAuthnLevel": 2,
|
||||
"samlIDPSSODescriptorSingleLogoutServiceHTTPPost": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/singleLogout;#PORTAL#/saml/singleLogoutReturn",
|
||||
"Soap": 1,
|
||||
%set %%RegisterDB=%%getVar('llRegisterDB', 'Demo')
|
||||
%if %%RegisterDB == "Custom"
|
||||
"registerDB": "Null",
|
||||
%else
|
||||
"registerDB": "%%RegisterDB",
|
||||
%end if
|
||||
"registerDB": "Demo",
|
||||
"locationRules": {
|
||||
"%%managerWebName": {
|
||||
"default": "$uid eq \"%%lemonAdmin\""
|
||||
@ -262,11 +223,7 @@
|
||||
},
|
||||
"portalDisplayChangePassword": "$_auth =~ /^(LDAP|DBI|Demo)$/",
|
||||
"hideOldPassword": 0,
|
||||
%if %%is_file(%%ldapBindUserPassword)
|
||||
"managerPassword": "%%readPass("", %%ldapBindUserPassword)",
|
||||
%else
|
||||
"managerPassword": "%%ldapBindUserPassword",
|
||||
%end if
|
||||
"authChoiceParam": "lmAuth",
|
||||
"lwpSslOpts": {},
|
||||
"portalSkinRules": {},
|
||||
@ -290,8 +247,8 @@
|
||||
"mailOnPasswordChange": 0,
|
||||
"captchaStorage": "Apache::Session::File",
|
||||
"remoteGlobalStorageOptions": {
|
||||
"proxy": "https://%%authWebName/index.pl/sessions",
|
||||
"ns": "https://%%authWebName/Lemonldap/NG/Common/CGI/SOAPService"
|
||||
"proxy": "http://%%authWebName/index.pl/sessions",
|
||||
"ns": "http://%%authWebName/Lemonldap/NG/Common/CGI/SOAPService"
|
||||
},
|
||||
"passwordDB": "LDAP",
|
||||
"captcha_size": 6,
|
||||
@ -362,7 +319,7 @@
|
||||
"oidcOPMetaDataJSON": null,
|
||||
"samlIdPResolveCookie": "lemonldapidp",
|
||||
"samlRelayStateTimeout": 600,
|
||||
"samlOrganizationURL": "https://auth.%%nom_domaine_local",
|
||||
"samlOrganizationURL": "http://www.%%nom_domaine_local",
|
||||
"globalStorageOptions": {
|
||||
"Directory": "/var/lib/lemonldap-ng/sessions",
|
||||
"LockDirectory": "/var/lib/lemonldap-ng/sessions/lock"
|
||||
@ -376,11 +333,7 @@
|
||||
"activeTimer": 1,
|
||||
"cda": 0,
|
||||
"samlServicePublicKeySig": "",
|
||||
%if %%llCheckLogins == "oui"
|
||||
"portalCheckLogins": 1,
|
||||
%else
|
||||
"portalCheckLogins": 0,
|
||||
%end if
|
||||
"CAS_authnLevel": 1,
|
||||
"macros": {
|
||||
"_whatToTrace": "$_auth eq 'SAML' ? \"$_user\\@$_idpConfKey\" : \"$_user\""
|
||||
@ -392,14 +345,10 @@
|
||||
"oidcOPMetaDataJWKS": null,
|
||||
"webIDAuthnLevel": 1,
|
||||
"issuerDBOpenIDActivation": "1",
|
||||
%if %%is_empty(%%llResetUrl)
|
||||
"mailUrl": "https://%%authWebName/mail.pl",
|
||||
%else
|
||||
"mailUrl": "%%llResetUrl",
|
||||
%end if
|
||||
"mailUrl": "http://%%authWebName/mail.pl",
|
||||
"maintenance": 0,
|
||||
"jsRedirect": 0,
|
||||
"cfgAuthor": "Cadoles",
|
||||
"cfgAuthor": "dwho",
|
||||
"persistentStorageOptions": {
|
||||
"LockDirectory": "/var/lib/lemonldap-ng/psessions/lock",
|
||||
"Directory": "/var/lib/lemonldap-ng/psessions"
|
||||
@ -411,7 +360,7 @@
|
||||
"ldapChangePasswordAsUser": 0,
|
||||
"CAS_proxiedServices": {},
|
||||
"key": "e\"bTCt3*eU9^\\V%b",
|
||||
"portal": "https://%%authWebName/",
|
||||
"portal": "http://%%authWebName/",
|
||||
"singleSessionUserByIP": 0,
|
||||
"portalOpenLinkInNewWindow": 0,
|
||||
"post": {
|
||||
@ -430,11 +379,7 @@
|
||||
"oidcOPMetaDataOptions": null,
|
||||
"samlSPSSODescriptorWantAssertionsSigned": 1,
|
||||
"samlOrganizationName": "%%samlOrganizationName",
|
||||
%if %%RegisterDB == "Custom"
|
||||
"registerUrl": "%%llRegisterURL",
|
||||
%else
|
||||
"registerUrl": "https://%%authWebName/register.pl",
|
||||
%end if
|
||||
"registerUrl": "http://%%authWebName/register.pl",
|
||||
"casAccessControlPolicy": "none",
|
||||
"multiValuesSeparator": ";",
|
||||
"ldapPort": %%ldapServerPort
|
||||
|
@ -1,441 +0,0 @@
|
||||
%set %%ssoFilters = %%getSSOFilters
|
||||
{
|
||||
"ldapGroupAttributeNameUser": "dn",
|
||||
"cfgAuthorIP": "172.16.0.1",
|
||||
"samlSPMetaDataXML": null,
|
||||
"facebookAuthnLevel": 1,
|
||||
"mailConfirmSubject": "[LemonLDAP::NG] Password reset confirmation",
|
||||
"secureTokenAttribute": "uid",
|
||||
"singleSession": 0,
|
||||
"registerConfirmSubject": "[LemonLDAP::NG] Account register confirmation",
|
||||
"CAS_pgtFile": "/tmp/pgt.txt",
|
||||
"cookieName": "lemonldap",
|
||||
"slaveExportedVars": {},
|
||||
"whatToTrace": "_whatToTrace",
|
||||
"oidcRPMetaDataOptions": {},
|
||||
"notifyDeleted": 1,
|
||||
"useRedirectOnError": 1,
|
||||
"samlSPMetaDataExportedAttributes": null,
|
||||
"ldapPwdEnc": "utf-8",
|
||||
"openIdSPList": "0;",
|
||||
"samlNameIDFormatMapEmail": "mail",
|
||||
"samlSPMetaDataOptions": null,
|
||||
"issuerDBOpenIDRule": 1,
|
||||
"casStorageOptions": {},
|
||||
"mailFrom": "noreply@%%nom_domaine_local",
|
||||
"timeoutActivity": 0,
|
||||
"oidcRPMetaDataExportedVars": {},
|
||||
"issuerDBSAMLActivation": 0,
|
||||
"issuerDBCASPath": "^/%%casFolder/",
|
||||
"randomPasswordRegexp": "[A-Z]{3}[a-z]{5}.\\d{2}",
|
||||
"samlIDPSSODescriptorSingleSignOnServiceSOAP": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;",
|
||||
"samlSPSSODescriptorSingleLogoutServiceHTTPPost": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/proxySingleLogout;#PORTAL#/saml/proxySingleLogoutReturn",
|
||||
"exportedHeaders": {
|
||||
"test1.%%nom_domaine_local": {
|
||||
"Auth-User": "$uid"
|
||||
},
|
||||
"test2.%%nom_domaine_local": {
|
||||
"Auth-User": "$uid"
|
||||
},
|
||||
"%%managerWebName": {}
|
||||
},
|
||||
"vhostOptions": {
|
||||
"%%managerWebName": {
|
||||
"vhostHttps" : "1"
|
||||
},
|
||||
"test1.%%nom_domaine_local": {},
|
||||
"test2.%%nom_domaine_local": {}
|
||||
},
|
||||
"radiusAuthnLevel": 3,
|
||||
"dbiAuthnLevel": 2,
|
||||
"ldapPasswordResetAttribute": "pwdReset",
|
||||
"ldapGroupObjectClass": "groupOfNames",
|
||||
"apacheAuthnLevel": 4,
|
||||
"samlNameIDFormatMapKerberos": "uid",
|
||||
"groups": {},
|
||||
"securedCookie": 0,
|
||||
"httpOnly": 1,
|
||||
"yubikeyAuthnLevel": 3,
|
||||
"ADPwdMaxAge": 0,
|
||||
"samlUseQueryStringSpecific": 0,
|
||||
"loginHistoryEnabled": 1,
|
||||
"samlSPSSODescriptorSingleLogoutServiceSOAP": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/proxySingleLogoutSOAP;",
|
||||
"failedLoginNumber": 5,
|
||||
"samlServicePrivateKeyEncPwd": "",
|
||||
"portalForceAuthnInterval": 0,
|
||||
"cfgLog": "",
|
||||
"samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;#PORTAL#/saml/singleLogout;#PORTAL#/saml/singleLogoutReturn",
|
||||
"exportedVars": {
|
||||
"UA": "HTTP_USER_AGENT",
|
||||
%for att in %%casAttribute
|
||||
"%%att": "%%att",
|
||||
%end for
|
||||
%set %%idx = 0
|
||||
%set %%size = %%len(%%ssoFilters) - 1
|
||||
%for key,value in %%ssoFilters
|
||||
%if %%idx == %%size
|
||||
"%%key": "%%value"
|
||||
%else
|
||||
"%%key": "%%value",
|
||||
%end if
|
||||
%set %%idx += 1
|
||||
%end for
|
||||
},
|
||||
"notificationStorage": "File",
|
||||
"applicationList": {
|
||||
"1sample": {
|
||||
"test2": {
|
||||
"options": {
|
||||
"name": "Application Test 2",
|
||||
"logo": "thumbnail.png",
|
||||
"uri": "https://test2.%%nom_domaine_local/",
|
||||
"display": "auto",
|
||||
"description": "The same simple application displaying authenticated user"
|
||||
},
|
||||
"type": "application"
|
||||
},
|
||||
"type": "category",
|
||||
"catname": "Sample applications",
|
||||
"test1": {
|
||||
"type": "application",
|
||||
"options": {
|
||||
"description": "A simple application displaying authenticated user",
|
||||
"uri": "https://test1.%%nom_domaine_local/",
|
||||
"logo": "demo.png",
|
||||
"display": "auto",
|
||||
"name": "Application Test 1"
|
||||
}
|
||||
}
|
||||
},
|
||||
"2administration": {
|
||||
"notifications": {
|
||||
"options": {
|
||||
"name": "Notifications explorer",
|
||||
"display": "auto",
|
||||
"description": "Explore WebSSO notifications",
|
||||
"uri": "https://%%managerWebName/notifications.pl",
|
||||
"logo": "database.png"
|
||||
},
|
||||
"type": "application"
|
||||
},
|
||||
"manager": {
|
||||
"options": {
|
||||
"uri": "https://%%managerWebName/",
|
||||
"display": "auto",
|
||||
"description": "Configure LemonLDAP::NG WebSSO",
|
||||
"logo": "configure.png",
|
||||
"name": "WebSSO Manager"
|
||||
},
|
||||
"type": "application"
|
||||
},
|
||||
"type": "category",
|
||||
"sessions": {
|
||||
"type": "application",
|
||||
"options": {
|
||||
"description": "Explore WebSSO sessions",
|
||||
"uri": "https://%%managerWebName/sessions.pl",
|
||||
"logo": "database.png",
|
||||
"display": "auto",
|
||||
"name": "Sessions explorer"
|
||||
}
|
||||
},
|
||||
"catname": "Administration"
|
||||
},
|
||||
"3documentation": {
|
||||
"catname": "Documentation",
|
||||
"officialwebsite": {
|
||||
"type": "application",
|
||||
"options": {
|
||||
"name": "Offical Website",
|
||||
"description": "Official LemonLDAP::NG Website",
|
||||
"logo": "network.png",
|
||||
"display": "on",
|
||||
"uri": "http://lemonldap-ng.org/"
|
||||
}
|
||||
},
|
||||
"type": "category",
|
||||
"localdoc": {
|
||||
"options": {
|
||||
"logo": "help.png",
|
||||
"description": "Documentation supplied with LemonLDAP::NG",
|
||||
"display": "on",
|
||||
"uri": "http://%%managerWebName/doc/",
|
||||
"name": "Local documentation"
|
||||
},
|
||||
"type": "application"
|
||||
}
|
||||
}
|
||||
},
|
||||
"userControl": "^[\\w\\.\\-@]+$",
|
||||
"timeout": 72000,
|
||||
"portalAntiFrame": 1,
|
||||
"SMTPServer": "",
|
||||
"ldapTimeout": 120,
|
||||
"samlAuthnContextMapPasswordProtectedTransport": 3,
|
||||
"ldapUsePasswordResetAttribute": 1,
|
||||
"ldapPpolicyControl": 0,
|
||||
"casAttributes": {
|
||||
%for att in %%casAttribute
|
||||
"%%att": "%%att.casLDAPAttribute",
|
||||
%end for
|
||||
%set %%idx = 0
|
||||
%set %%size = %%len(%%ssoFilters) - 1
|
||||
%for key,value in %%ssoFilters
|
||||
%if %%idx == %%size
|
||||
"%%key": "%%key"
|
||||
%else
|
||||
"%%key": "%%key",
|
||||
%end if
|
||||
%set %%idx += 1
|
||||
%end for
|
||||
},
|
||||
"issuerDBSAMLPath": "^/saml/",
|
||||
"samlAttributeAuthorityDescriptorAttributeServiceSOAP": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/AA/SOAP;",
|
||||
"portalDisplayAppslist": 1,
|
||||
"confirmFormMethod": "post",
|
||||
"domain": "%%nom_domaine_local",
|
||||
"cfgNum": "1",
|
||||
"authentication": "LDAP",
|
||||
"samlNameIDFormatMapWindows": "uid",
|
||||
"authChoiceModules": {},
|
||||
"ldapGroupAttributeName": "member",
|
||||
"samlServicePrivateKeySigPwd": "",
|
||||
"googleAuthnLevel": 1,
|
||||
"successLoginNumber": 5,
|
||||
"localSessionStorageOptions": {
|
||||
"cache_root": "/tmp",
|
||||
"namespace": "lemonldap-ng-sessions",
|
||||
"default_expires_in": 600,
|
||||
"directory_umask": "007",
|
||||
"cache_depth": 3
|
||||
},
|
||||
"samlSPSSODescriptorArtifactResolutionServiceArtifact": "1;0;urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/artifact",
|
||||
"portalRequireOldPassword": 1,
|
||||
"samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact;#PORTAL#/saml/singleSignOnArtifact;",
|
||||
"ADPwdExpireWarning": 0,
|
||||
"yubikeyPublicIDSize": 12,
|
||||
"ldapGroupAttributeNameGroup": "dn",
|
||||
"oidcRPMetaDataOptionsExtraClaims": null,
|
||||
"ldapGroupRecursive": 0,
|
||||
"mailSubject": "[LemonLDAP::NG] Your new password",
|
||||
"nginxCustomHandlers": {},
|
||||
"samlSPSSODescriptorAuthnRequestsSigned": 1,
|
||||
%if %%llResetPassword == "oui"
|
||||
"portalDisplayResetPassword": 1,
|
||||
%else
|
||||
"portalDisplayResetPassword": 0,
|
||||
%end if
|
||||
"openIdSreg_timezone": "_timezone",
|
||||
"infoFormMethod": "get",
|
||||
"openIdAuthnLevel": 1,
|
||||
"openIdSreg_nickname": "uid",
|
||||
"samlServicePublicKeyEnc": "",
|
||||
"userDB": "LDAP",
|
||||
"grantSessionRules": {},
|
||||
"remoteGlobalStorage": "Lemonldap::NG::Common::Apache::Session::SOAP",
|
||||
"reloadUrls": {
|
||||
"%%reloadWebName": "https://%%reloadWebName/reload"
|
||||
},
|
||||
"registerTimeout": 0,
|
||||
"samlIDPSSODescriptorSingleSignOnServiceHTTPPost": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/singleSignOn;",
|
||||
"slaveAuthnLevel": 2,
|
||||
"samlIDPSSODescriptorSingleLogoutServiceHTTPPost": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/singleLogout;#PORTAL#/saml/singleLogoutReturn",
|
||||
"Soap": 1,
|
||||
%set %%RegisterDB=%%getVar('llRegisterDB', 'Demo')
|
||||
%if %%RegisterDB == "Custom"
|
||||
"registerDB": "Null",
|
||||
%else
|
||||
"registerDB": "%%RegisterDB",
|
||||
%end if
|
||||
"locationRules": {
|
||||
"%%managerWebName": {
|
||||
"default": "$uid eq \"%%lemonAdmin\""
|
||||
},
|
||||
"test1.%%nom_domaine_local": {
|
||||
"default": "accept",
|
||||
"^/logout": "logout_sso"
|
||||
},
|
||||
"test2.%%nom_domaine_local": {
|
||||
"default": "accept",
|
||||
"^/logout": "logout_sso"
|
||||
}
|
||||
},
|
||||
"portalDisplayChangePassword": "$_auth =~ /^(LDAP|DBI|Demo)$/",
|
||||
"hideOldPassword": 0,
|
||||
%if %%is_file(%%ldapBindUserPassword)
|
||||
"managerPassword": "%%readPass("", %%ldapBindUserPassword)",
|
||||
%else
|
||||
"managerPassword": "%%ldapBindUserPassword",
|
||||
%end if
|
||||
"authChoiceParam": "lmAuth",
|
||||
"lwpSslOpts": {},
|
||||
"portalSkinRules": {},
|
||||
"issuerDBOpenIDPath": "^/openidserver/",
|
||||
"redirectFormMethod": "get",
|
||||
"portalDisplayRegister": 1,
|
||||
"secureTokenMemcachedServers": "127.0.0.1:11211",
|
||||
"notificationStorageOptions": {
|
||||
"dirName": "/var/lib/lemonldap-ng/notifications"
|
||||
},
|
||||
"browserIdAuthnLevel": 1,
|
||||
"portalUserAttr": "_user",
|
||||
"ldapVersion": 3,
|
||||
"sessionDataToRemember": {},
|
||||
"samlNameIDFormatMapX509": "mail",
|
||||
"managerDn": "%%ldapBindUserDN",
|
||||
"mailSessionKey": "mail",
|
||||
"openIdSreg_email": "mail",
|
||||
"localSessionStorage": "Cache::FileCache",
|
||||
"persistentStorage": "Apache::Session::File",
|
||||
"mailOnPasswordChange": 0,
|
||||
"captchaStorage": "Apache::Session::File",
|
||||
"remoteGlobalStorageOptions": {
|
||||
"proxy": "https://%%authWebName/index.pl/sessions",
|
||||
"ns": "https://%%authWebName/Lemonldap/NG/Common/CGI/SOAPService"
|
||||
},
|
||||
"passwordDB": "LDAP",
|
||||
"captcha_size": 6,
|
||||
"mailCharset": "utf-8",
|
||||
"facebookExportedVars": {},
|
||||
"nullAuthnLevel": 2,
|
||||
"singleIP": 0,
|
||||
"dbiExportedVars": {},
|
||||
"portalSkin": "bootstrap",
|
||||
"storePassword": 0,
|
||||
"hiddenAttributes": "_password",
|
||||
"samlServicePrivateKeySig": "",
|
||||
"globalStorage": "Apache::Session::File",
|
||||
"notificationWildcard": "allusers",
|
||||
"portalForceAuthn": 0,
|
||||
"samlMetadataForceUTF8": 1,
|
||||
"secureTokenUrls": ".*",
|
||||
"secureTokenAllowOnError": 1,
|
||||
"samlAuthnContextMapTLSClient": 5,
|
||||
"ldapAllowResetExpiredPassword": 0,
|
||||
"oidcOPMetaDataExportedVars": {},
|
||||
"notifyOther": 0,
|
||||
"secureTokenExpiration": 60,
|
||||
"captcha_mail_enabled": 0,
|
||||
"samlStorageOptions": {},
|
||||
"samlOrganizationDisplayName": "Example",
|
||||
"trustedProxies": "",
|
||||
"secureTokenHeader": "Auth-Token",
|
||||
"issuerDBCASActivation": 1,
|
||||
"samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;#PORTAL#/saml/singleSignOn;",
|
||||
"samlSPSSODescriptorSingleLogoutServiceHTTPRedirect": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;#PORTAL#/saml/proxySingleLogout;#PORTAL#/saml/proxySingleLogoutReturn",
|
||||
"samlIDPMetaDataXML": {},
|
||||
"oidcStorageOptions": {},
|
||||
"cfgDate": 1519998069,
|
||||
"samlAuthnContextMapPassword": 2,
|
||||
"portalDisplayLoginHistory": 1,
|
||||
"ldapPasswordResetAttributeValue": "TRUE",
|
||||
"ldapServer": "%%ldapScheme://%%ldapServer",
|
||||
"samlIDPSSODescriptorSingleLogoutServiceSOAP": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleLogoutSOAP;",
|
||||
"samlIDPMetaDataExportedAttributes": null,
|
||||
"samlServicePrivateKeyEnc": "",
|
||||
"useRedirectOnForbidden": 0,
|
||||
"captcha_login_enabled": 0,
|
||||
"https": 0,
|
||||
"checkXSS": 1,
|
||||
"ldapSetPassword": 0,
|
||||
"portalPingInterval": 60000,
|
||||
"captchaStorageOptions": {
|
||||
"Directory": "/var/lib/lemonldap-ng/captcha/"
|
||||
},
|
||||
"useSafeJail": 1,
|
||||
"registerDoneSubject": "[LemonLDAP::NG] Your new account",
|
||||
"issuerDBCASRule": 1,
|
||||
"samlAuthnContextMapKerberos": 4,
|
||||
"ldapGroupAttributeNameSearch": "cn",
|
||||
"logoutServices": {},
|
||||
"samlIDPSSODescriptorWantAuthnRequestsSigned": 1,
|
||||
"portalDisplayLogout": 1,
|
||||
"issuerDBGetParameters": {},
|
||||
"googleExportedVars": {},
|
||||
"openIdSreg_fullname": "cn",
|
||||
"samlSPSSODescriptorAssertionConsumerServiceHTTPArtifact": "1;0;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact;#PORTAL#/saml/proxySingleSignOnArtifact",
|
||||
"demoExportedVars": {
|
||||
"mail": "mail",
|
||||
"uid": "uid",
|
||||
"cn": "cn"
|
||||
},
|
||||
"oidcOPMetaDataJSON": null,
|
||||
"samlIdPResolveCookie": "lemonldapidp",
|
||||
"samlRelayStateTimeout": 600,
|
||||
"samlOrganizationURL": "https://auth.%%nom_domaine_local",
|
||||
"globalStorageOptions": {
|
||||
"Directory": "/var/lib/lemonldap-ng/sessions",
|
||||
"LockDirectory": "/var/lib/lemonldap-ng/sessions/lock"
|
||||
},
|
||||
"ldapExportedVars": {
|
||||
"mail": "mail",
|
||||
"cn": "cn",
|
||||
"uid": "uid"
|
||||
},
|
||||
"webIDExportedVars": {},
|
||||
"activeTimer": 1,
|
||||
"cda": 0,
|
||||
"samlServicePublicKeySig": "",
|
||||
%if %%llCheckLogins == "oui"
|
||||
"portalCheckLogins": 1,
|
||||
%else
|
||||
"portalCheckLogins": 0,
|
||||
%end if
|
||||
"CAS_authnLevel": 1,
|
||||
"macros": {
|
||||
"_whatToTrace": "$_auth eq 'SAML' ? \"$_user\\@$_idpConfKey\" : \"$_user\""
|
||||
},
|
||||
"samlIDPMetaDataOptions": null,
|
||||
"twitterAuthnLevel": 1,
|
||||
"openIdExportedVars": {},
|
||||
"captcha_register_enabled": 1,
|
||||
"oidcOPMetaDataJWKS": null,
|
||||
"webIDAuthnLevel": 1,
|
||||
"issuerDBOpenIDActivation": "1",
|
||||
%if %%is_empty(%%llResetUrl)
|
||||
"mailUrl": "https://%%authWebName/mail.pl",
|
||||
%else
|
||||
"mailUrl": "%%llResetUrl",
|
||||
%end if
|
||||
"maintenance": 0,
|
||||
"jsRedirect": 0,
|
||||
"cfgAuthor": "Cadoles",
|
||||
"persistentStorageOptions": {
|
||||
"LockDirectory": "/var/lib/lemonldap-ng/psessions/lock",
|
||||
"Directory": "/var/lib/lemonldap-ng/psessions"
|
||||
},
|
||||
"SSLAuthnLevel": 5,
|
||||
"oidcServiceMetaDataAuthnContext": {},
|
||||
"samlIDPSSODescriptorArtifactResolutionServiceArtifact": "1;0;urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/artifact",
|
||||
"notification": 1,
|
||||
"ldapChangePasswordAsUser": 0,
|
||||
"CAS_proxiedServices": {},
|
||||
"key": "e\"bTCt3*eU9^\\V%b",
|
||||
"portal": "https://%%authWebName/",
|
||||
"singleSessionUserByIP": 0,
|
||||
"portalOpenLinkInNewWindow": 0,
|
||||
"post": {
|
||||
"test2.%%nom_domaine_local": {},
|
||||
"test1.%%nom_domaine_local": {},
|
||||
"%%managerWebName": {}
|
||||
},
|
||||
"samlSPSSODescriptorAssertionConsumerServiceHTTPPost": "0;1;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/proxySingleSignOnPost",
|
||||
"issuerDBSAMLRule": 1,
|
||||
"samlCommonDomainCookieActivation": 0,
|
||||
"syslog": "",
|
||||
"ldapBase": "%%ldapUserBaseDN",
|
||||
"ldapAuthnLevel": 2,
|
||||
"mailTimeout": 0,
|
||||
"samlEntityID": "#PORTAL#/saml/metadata",
|
||||
"oidcOPMetaDataOptions": null,
|
||||
"samlSPSSODescriptorWantAssertionsSigned": 1,
|
||||
"samlOrganizationName": "%%samlOrganizationName",
|
||||
%if %%RegisterDB == "Custom"
|
||||
"registerUrl": "%%llRegisterURL",
|
||||
%else
|
||||
"registerUrl": "https://%%authWebName/register.pl",
|
||||
%end if
|
||||
"casAccessControlPolicy": "none",
|
||||
"multiValuesSeparator": ";",
|
||||
"ldapPort": %%ldapServerPort
|
||||
}
|
@ -6,8 +6,8 @@ server {
|
||||
|
||||
server {
|
||||
listen 443;
|
||||
ssl on;
|
||||
%if %%cert_type == "letsencrypt"
|
||||
ssl on;
|
||||
%if %%cert_type == "letsencrypt"
|
||||
ssl_certificate %%le_config_dir/live/%%managerWebName/cert.pem;
|
||||
ssl_certificate_key %%le_config_dir/live/%%managerWebName/privkey.pem;
|
||||
%else
|
||||
@ -20,41 +20,29 @@ server {
|
||||
|
||||
error_page 403 404 502 503 504 /nginx.html;
|
||||
location = /nginx.html{
|
||||
root /usr/share/nginx/www;
|
||||
}
|
||||
root /usr/share/nginx/www;
|
||||
}
|
||||
|
||||
root /usr/share/lemonldap-ng/manager/htdocs/;
|
||||
|
||||
if ($uri !~ ^/(.*\.psgi|static|doc|lib|javascript|favicon)) {
|
||||
if ($uri !~ ^/(manager\.psgi|static|doc|fr-doc|lib|javascript|favicon)) {
|
||||
rewrite ^/(.*)$ /manager.psgi/$1 break;
|
||||
}
|
||||
|
||||
location ~ ^(?<sc>/.*\.psgi)(?:$|/) {
|
||||
|
||||
# FastCGI configuration
|
||||
location /manager.psgi {
|
||||
include /etc/nginx/fastcgi_params;
|
||||
fastcgi_pass unix:/var/run/llng-fastcgi-server/llng-fastcgi.sock;
|
||||
fastcgi_param LLTYPE psgi;
|
||||
fastcgi_param LLTYPE manager;
|
||||
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
||||
fastcgi_split_path_info ^(.*\.psgi)(/.*)$;
|
||||
fastcgi_param PATH_INFO $fastcgi_path_info;
|
||||
|
||||
# OR TO USE uWSGI
|
||||
#include /etc/nginx/uwsgi_params;
|
||||
#uwsgi_pass 127.0.0.1:5000;
|
||||
#uwsgi_param LLTYPE psgi;
|
||||
#uwsgi_param SCRIPT_FILENAME $document_root$sc;
|
||||
#uwsgi_param SCRIPT_NAME $sc;
|
||||
|
||||
# Uncomment this if you use https only
|
||||
#add_header Strict-Transport-Security "max-age=15768000";
|
||||
#add_header Strict-Transport-Security "15768000";
|
||||
}
|
||||
|
||||
location / {
|
||||
index manager.psgi;
|
||||
try_files $uri $uri/ =404;
|
||||
allow 127.0.0.0/8;
|
||||
deny all;
|
||||
try_files $uri $uri/ =404;
|
||||
}
|
||||
|
||||
location /doc/ {
|
||||
@ -64,8 +52,12 @@ server {
|
||||
location /lib/ {
|
||||
alias /usr/share/doc/lemonldap-ng-doc/pages/documentation/current/lib/;
|
||||
}
|
||||
location /fr-doc/ {
|
||||
alias /usr/share/doc/lemonldap-ng-fr-doc/;
|
||||
index index.html start.html;
|
||||
}
|
||||
location /static/ {
|
||||
alias /usr/share/lemonldap-ng/manager/htdocs/static/;
|
||||
alias /usr/share/lemonldap-ng/manager/static/;
|
||||
}
|
||||
|
||||
# DEBIAN
|
||||
@ -73,5 +65,4 @@ server {
|
||||
#location /javascript/ {
|
||||
# alias /usr/share/javascript/;
|
||||
#}
|
||||
|
||||
}
|
||||
|
@ -1,35 +0,0 @@
|
||||
# sample pam_cas config
|
||||
|
||||
# host from CAS server. mandatory
|
||||
host %%authWebName
|
||||
|
||||
# port from CAS server. Default to 80 or 443, depends from ssl instruction
|
||||
port 443
|
||||
|
||||
# uri to validate ticket. Default to /proxyValidate
|
||||
uriValidate /proxyValidate
|
||||
|
||||
# https or no. values on or off. Default to on.
|
||||
ssl on
|
||||
|
||||
# debug (on) or no (off). debug in syslog, level LOG_DEBUG. Default to off
|
||||
debug off
|
||||
|
||||
# proxy or proxies who deliver Proxy Ticket.
|
||||
# If no proxy, pam_cas doesn't control it
|
||||
# It may be several proxy instructions
|
||||
#proxy https://%%authWebName/proxycas/casimap.php
|
||||
#proxy https://imp.its.yale.edu/cas/casProxy.php
|
||||
#proxy https://uportal1.its.yale.edu/CasProxyServlet
|
||||
#proxy https://uportal2.its.yale.edu/CasProxyServlet
|
||||
|
||||
# trusted_ca. mandatory if ssl on.
|
||||
# It a file in pem format. It can contents several certificates
|
||||
# If the CAS server certificate is auto-signed, the file must content the certificate
|
||||
# If the certificate is trusted by an Certificate Autority, The file must content
|
||||
# certificate from high level CA
|
||||
%if not %%is_empty(%%getVar('ssoCALocation', ''))
|
||||
trusted_ca %%ssoCALocation
|
||||
%else
|
||||
trusted_ca /etc/ssl/certs/ca.crt
|
||||
%end if
|
@ -1,10 +1,3 @@
|
||||
## map directive must be in http context
|
||||
# Uncomment this if you use Auth SSL:
|
||||
#map $ssl_client_s_dn $ssl_client_s_dn_cn {
|
||||
# default "";
|
||||
# ~/CN=(?<CN>[^/]+) $CN;
|
||||
#}
|
||||
|
||||
server {
|
||||
listen 80;
|
||||
server_name %%authWebName;
|
||||
@ -13,67 +6,88 @@ server {
|
||||
|
||||
server {
|
||||
listen 443;
|
||||
ssl on;
|
||||
ssl on;
|
||||
%if %%cert_type == "letsencrypt"
|
||||
ssl_certificate %%le_config_dir/live/%%authWebName/cert.pem;
|
||||
ssl_certificate_key %%le_config_dir/live/%%authWebName/privkey.pem;
|
||||
%else
|
||||
ssl_certificate %%server_cert;
|
||||
ssl_certificate_key %%server_key;
|
||||
ssl_certificate %%server_cert;
|
||||
ssl_certificate_key %%server_key;
|
||||
%end if
|
||||
ssl_client_certificate /etc/ssl/certs/ca..crt;
|
||||
access_log /var/log/nginx/auth-lemon-ldap.access-ssl.log;
|
||||
ssl_client_certificate /etc/ssl/certs/ca.crt;
|
||||
access_log /var/log/nginx/auth-lemon-ldap.access-ssl.log;
|
||||
server_name %%authWebName;
|
||||
root /usr/share/lemonldap-ng/portal/htdocs/;
|
||||
root /var/lib/lemonldap-ng/portal/;
|
||||
|
||||
if ($uri !~ ^/((static|javascript|favicon).*|.*\.psgi)) {
|
||||
rewrite ^/(.*)$ /index.psgi/$1 break;
|
||||
}
|
||||
|
||||
location ~ ^(?<sc>/.*\.psgi)(?:$|/) {
|
||||
# Note that Content-Security-Policy header is generated by portal itself
|
||||
|
||||
# FastCGI configuration
|
||||
location ~ \.pl(?:$|/) {
|
||||
include /etc/nginx/fastcgi_params;
|
||||
fastcgi_pass unix:/var/run/llng-fastcgi-server/llng-fastcgi.sock;
|
||||
fastcgi_param LLTYPE psgi;
|
||||
fastcgi_param LLTYPE cgi;
|
||||
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
||||
fastcgi_split_path_info ^(.*\.psgi)(/.*)$;
|
||||
fastcgi_param PATH_INFO $fastcgi_path_info;
|
||||
|
||||
set $sn $request_uri;
|
||||
if ($sn ~ "^(.*)\?") {
|
||||
set $sn $1;
|
||||
}
|
||||
if ($sn ~ "^/index.pl") {
|
||||
set $sn "/index.pl";
|
||||
}
|
||||
fastcgi_param SCRIPT_NAME $sn;
|
||||
fastcgi_split_path_info ^(.*\.pl)(/.*)$;
|
||||
fastcgi_param PATH_INFO $fastcgi_path_info;
|
||||
# Uncomment this if you use Auth SSL:
|
||||
#map $ssl_client_s_dn $ssl_client_s_dn_cn {
|
||||
# default "";
|
||||
# ~/CN=(?<CN>[^/]+) $CN;
|
||||
#}
|
||||
#fastcgi_param SSL_CLIENT_S_DN_CN $ssl_client_s_dn_cn
|
||||
}
|
||||
|
||||
index index.psgi;
|
||||
index index.pl;
|
||||
location / {
|
||||
try_files $uri $uri/ =404;
|
||||
|
||||
# Uncomment this if you use https only
|
||||
#add_header Strict-Transport-Security "max-age=15768000";
|
||||
#add_header Strict-Transport-Security "15768000";
|
||||
}
|
||||
|
||||
location /static/ {
|
||||
alias /usr/share/lemonldap-ng/portal/htdocs/static/;
|
||||
}
|
||||
|
||||
# REST/SOAP functions for sessions management (disabled by default)
|
||||
location /index.psgi/adminSessions {
|
||||
# SOAP functions for sessions management (disabled by default)
|
||||
location /index.pl/adminSessions {
|
||||
deny all;
|
||||
}
|
||||
|
||||
# REST/SOAP functions for sessions access (disabled by default)
|
||||
location /index.psgi/sessions {
|
||||
# SOAP functions for sessions access (disabled by default)
|
||||
location /index.pl/sessions {
|
||||
deny all;
|
||||
}
|
||||
|
||||
# REST/SOAP functions for configuration access (disabled by default)
|
||||
location /index.psgi/config {
|
||||
# SOAP functions for configuration access (disabled by default)
|
||||
location /index.pl/config {
|
||||
deny all;
|
||||
}
|
||||
|
||||
# REST/SOAP functions for notification insertion (disabled by default)
|
||||
location /index.psgi/notification {
|
||||
# SOAP functions for notification insertion (disabled by default)
|
||||
location /index.pl/notification {
|
||||
deny all;
|
||||
}
|
||||
# SAML2 Issuer
|
||||
rewrite ^/saml/metadata /metadata.pl last;
|
||||
rewrite ^/saml/.* /index.pl last;
|
||||
|
||||
# CAS Issuer
|
||||
rewrite ^/cas/.* /index.pl;
|
||||
|
||||
# OpenID Issuer
|
||||
rewrite ^/openidserver/.* /index.pl last;
|
||||
|
||||
# OpenID Connect Issuer
|
||||
rewrite ^/oauth2/.* /index.pl last;
|
||||
rewrite ^/.well-known/openid-configuration$ /openid-configuration.pl last;
|
||||
|
||||
# Get Issuer
|
||||
rewrite ^/get/.* /index.pl;
|
||||
|
||||
# Public pages
|
||||
rewrite ^/public.* /public.pl;
|
||||
|
||||
# DEBIAN
|
||||
# If install was made with USEDEBIANLIBS (official releases), uncomment this
|
||||
|
@ -6,7 +6,7 @@ server {
|
||||
|
||||
server {
|
||||
listen 443;
|
||||
ssl on;
|
||||
ssl on;
|
||||
ssl_certificate %%server_cert;
|
||||
ssl_certificate_key %%server_key;
|
||||
ssl_client_certificate /etc/ssl/certs/ca.crt;
|
||||
@ -15,24 +15,24 @@ server {
|
||||
server_name test1.%%nom_domaine_local test2.%%nom_domaine_local;
|
||||
root /var/lib/lemonldap-ng/test/;
|
||||
|
||||
|
||||
# Internal authentication request
|
||||
location = /lmauth {
|
||||
internal;
|
||||
|
||||
# FastCGI configuration
|
||||
include /etc/nginx/fastcgi_params;
|
||||
fastcgi_pass unix:/var/run/llng-fastcgi-server/llng-fastcgi.sock;
|
||||
# To use AuthBasic handler, uncomment this and remove "error_page 401"
|
||||
# fastcgi_param LLTYPE authbasic;
|
||||
|
||||
# Drop post datas
|
||||
fastcgi_pass_request_body off;
|
||||
fastcgi_param CONTENT_LENGTH "";
|
||||
|
||||
# Keep original hostname
|
||||
fastcgi_param HOST $http_host;
|
||||
# Keep original request (LLNG server will receive /lmauth)
|
||||
|
||||
# Keep original request (LLNG server will received /llauth)
|
||||
fastcgi_param X_ORIGINAL_URI $request_uri;
|
||||
# Improve performances
|
||||
#fastcgi_buffer_size 32k;
|
||||
#fastcgi_buffers 32 32k;
|
||||
|
||||
}
|
||||
|
||||
# Client requests
|
||||
@ -51,7 +51,7 @@ server {
|
||||
auth_request /lmauth;
|
||||
auth_request_set $lmremote_user $upstream_http_lm_remote_user;
|
||||
auth_request_set $lmlocation $upstream_http_location;
|
||||
# If CDA is used, uncomment this
|
||||
# Uncomment this if CDA is used
|
||||
#auth_request_set $cookie_value $upstream_http_set_cookie;
|
||||
#add_header Set-Cookie $cookie_value;
|
||||
# Remove this for AuthBasic handler
|
||||
@ -68,37 +68,30 @@ server {
|
||||
# Set manually your headers
|
||||
#auth_request_set $authuser $upstream_http_auth_user;
|
||||
#proxy_set_header Auth-User $authuser;
|
||||
# OR in the corresponding block
|
||||
# OR in the correspondinc block
|
||||
#fastcgi_param HTTP_AUTH_USER $authuser;
|
||||
|
||||
# Then (if LUA is not supported), change cookie header to hide LLNG cookie
|
||||
# Then (if LUA not supported), change cookie header to hide LLNG cookie
|
||||
#auth_request_set $lmcookie $upstream_http_cookie;
|
||||
#proxy_set_header Cookie: $lmcookie;
|
||||
# OR in the corresponding block
|
||||
#fastcgi_param HTTP_COOKIE $lmcookie;
|
||||
|
||||
# Uncomment this if you use https only
|
||||
#add_header Strict-Transport-Security "max-age=15768000";
|
||||
#add_header Strict-Transport-Security "15768000";
|
||||
|
||||
# Set REMOTE_USER (for FastCGI apps only)
|
||||
#fastcgi_param REMOTE_USER $lmremote_user;
|
||||
}
|
||||
|
||||
# Handle test CGI
|
||||
location ~ ^(?<sc>/.*\.pl)(?:$|/) {
|
||||
location ~ \.pl$ {
|
||||
include /etc/nginx/fastcgi_params;
|
||||
fastcgi_pass unix:/var/run/llng-fastcgi-server/llng-fastcgi.sock;
|
||||
fastcgi_param LLTYPE cgi;
|
||||
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
||||
fastcgi_split_path_info ^(.*\.pl)(/.+)$;
|
||||
fastcgi_param REMOTE_USER $lmremote_user;
|
||||
|
||||
# Or with uWSGI
|
||||
#include /etc/nginx/uwsgi_params;
|
||||
#uwsgi_pass 127.0.0.1:5000;
|
||||
#uwsgi_param LLTYPE cgi;
|
||||
#uwsgi_param SCRIPT_FILENAME $document_root$sc;
|
||||
#uwsgi_param SCRIPT_NAME $sc;
|
||||
}
|
||||
|
||||
#location = /status {
|
||||
@ -107,10 +100,5 @@ server {
|
||||
# include /etc/nginx/fastcgi_params;
|
||||
# fastcgi_pass unix:/var/run/llng-fastcgi-server/llng-fastcgi.sock;
|
||||
# fastcgi_param LLTYPE status;
|
||||
|
||||
### Or with uWSGI
|
||||
## include /etc/nginx/uwsgi_params;
|
||||
## uwsgi_pass 127.0.0.1:5000;
|
||||
## uwsgi_param LLTYPE status;
|
||||
#}
|
||||
}
|
||||
|
Reference in New Issue
Block a user