Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
O
OpnSense
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Kulya
OpnSense
Commits
7716a503
Commit
7716a503
authored
Oct 13, 2015
by
Ad Schellevis
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
(captiveportal, new) lighttpd-zone.conf additions
parent
9cfa7a03
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
32 additions
and
11 deletions
+32
-11
lighttpd-zone.conf
...rvice/templates/OPNsense/Captiveportal/lighttpd-zone.conf
+32
-11
No files found.
src/opnsense/service/templates/OPNsense/Captiveportal/lighttpd-zone.conf
View file @
7716a503
...
@@ -6,7 +6,7 @@
...
@@ -6,7 +6,7 @@
{%
for
intf_tag
in
item
.
interfaces
.
split
(
','
) %}
{%
for
intf_tag
in
item
.
interfaces
.
split
(
','
) %}
{%
for
conf_key
,
conf_inf
in
interfaces
.
iteritems
() %}
{%
for
conf_key
,
conf_inf
in
interfaces
.
iteritems
() %}
{%
if
conf_key
==
intf_tag
and
conf_inf
.
ipaddr
!=
'dhcp'
%}
{%
if
conf_key
==
intf_tag
and
conf_inf
.
ipaddr
!=
'dhcp'
%}
{%
do
item
.
update
({
'interface_
ip
addr'
:
conf_inf
.
ipaddr
}) %}
{%
do
item
.
update
({
'interface_
host
addr'
:
conf_inf
.
ipaddr
}) %}
{%
endif
%}
{%
endif
%}
{%
endfor
%}
{%
endfor
%}
{%
endfor
%}
{%
endfor
%}
...
@@ -16,16 +16,26 @@
...
@@ -16,16 +16,26 @@
{%
set
cp_zone_item
=
cp_zone_item
[
0
]|
default
(
None
) %}
{%
set
cp_zone_item
=
cp_zone_item
[
0
]|
default
(
None
) %}
{%
if
cp_zone_item
!=
None
%}
{%
if
cp_zone_item
!=
None
%}
{%
if
cp_zone_item
.
servername
|
default
(
""
) !=
""
%}
{%
do
cp_zone_item
.
update
({
'interface_hostaddr'
:
cp_zone_item
.
servername
}) %}
{%
endif
%}
{
# generate zone redirect address #}
{
# generate zone redirect address #}
{%
do
cp_zone_item
.
update
({
'redirect_host'
:
'https://'
+
cp_zone_item
.
interface_ipaddr
+
':'
~ (
cp_zone_item
.
zoneid
|
int
+
8000
) ~
'/index.html?zone='
~
cp_zone_item
.
zoneid
}) %}
{%
if
cp_zone_item
.
certificate
|
default
(
""
) !=
""
%}
{%
do
cp_zone_item
.
update
({
'redirect_host_match'
:
cp_zone_item
.
interface_ipaddr
.
replace
(
'.'
,
'\.'
) ~
':'
~ (
cp_zone_item
.
zoneid
|
int
+
8000
) }) %}
# ssl enabled, redirect to https
{%
do
cp_zone_item
.
update
({
'redirect_host'
:
'https://'
+
cp_zone_item
.
interface_hostaddr
+
':'
~ (
cp_zone_item
.
zoneid
|
int
+
8000
) ~
'/index.html?zone='
~
cp_zone_item
.
zoneid
}) %}
{%
else
%}
# ssl disabled, redirect to http
{%
do
cp_zone_item
.
update
({
'redirect_host'
:
'http://'
+
cp_zone_item
.
interface_hostaddr
+
':'
~ (
cp_zone_item
.
zoneid
|
int
+
8000
) ~
'/index.html?zone='
~
cp_zone_item
.
zoneid
}) %}
{%
endif
%}
{%
do
cp_zone_item
.
update
({
'redirect_host_match'
:
cp_zone_item
.
interface_hostaddr
.
replace
(
'.'
,
'\.'
) ~
':'
~ (
cp_zone_item
.
zoneid
|
int
+
8000
) }) %}
#######################################################
#######################################################
######################################
### Captive portal zone {{ cp_zone_item.zoneid }} lighttpd.conf BEGIN
### Captive portal zone {{ cp_zone_item.zoneid }} lighttpd.conf BEGIN
### -- listen on port {{ cp_zone_item.zoneid|int + 8000 }} for primary (ssl) connections
### -- listen on port {{ cp_zone_item.zoneid|int + 8000 }} for primary (ssl) connections
### -- forward on port {{ cp_zone_item.zoneid|int + 9000 }} for plain http redirection
### -- forward on port {{ cp_zone_item.zoneid|int + 9000 }} for plain http redirection
#######################################################
#######################################################
######################################
#
#
#### modules to load
#### modules to load
server
.
modules
= (
"mod_expire"
,
server
.
modules
= (
"mod_expire"
,
...
@@ -69,14 +79,13 @@ server.bind = "0.0.0.0"
...
@@ -69,14 +79,13 @@ server.bind = "0.0.0.0"
server
.
port
= {{
cp_zone_item
.
zoneid
|
int
+
8000
}}
server
.
port
= {{
cp_zone_item
.
zoneid
|
int
+
8000
}}
##
##
#url.rewrite-once = ( "(.*)" => "/index.html?redirurl=$1" )
$
HTTP
[
"host"
] !~
"(.*{{cp_zone_item.redirect_host_match}}.*)"
{
$
HTTP
[
"host"
] !~
"(.*{{cp_zone_item.redirect_host_match}}.*)"
{
$
HTTP
[
"host"
] =~
"([^:/]+)"
{
$
HTTP
[
"host"
] =~
"([^:/]+)"
{
url
.
redirect
= (
"^(.*)$"
=>
"{{cp_zone_item.redirect_host}}&redirurl=%1$1"
)
url
.
redirect
= (
"^(.*)$"
=>
"{{cp_zone_item.redirect_host}}&redirurl=%1$1"
)
}
}
}
}
## redirect http traffic to http
s
## redirect http traffic to http
(s) main target
$
SERVER
[
"socket"
] ==
":{{ cp_zone_item.zoneid|int + 9000 }}"
{
$
SERVER
[
"socket"
] ==
":{{ cp_zone_item.zoneid|int + 9000 }}"
{
$
HTTP
[
"host"
] =~
"([^:/]+)"
{
$
HTTP
[
"host"
] =~
"([^:/]+)"
{
url
.
redirect
= (
"^(.*)$"
=>
"{{cp_zone_item.redirect_host}}&redirurl=%1$1"
)
url
.
redirect
= (
"^(.*)$"
=>
"{{cp_zone_item.redirect_host}}&redirurl=%1$1"
)
...
@@ -128,13 +137,25 @@ index-file.names = ( "index.html" )
...
@@ -128,13 +137,25 @@ index-file.names = ( "index.html" )
#### disable auto index directory listings
#### disable auto index directory listings
dir
-
listing
.
activate
=
"disable"
dir
-
listing
.
activate
=
"disable"
##
# ssl.engine = "disable"
##
## ssl configuration
## ssl configuration
##
{%
if
cp_zone_item
.
certificate
|
default
(
""
) !=
""
%}
ssl
.
engine
=
"enable"
ssl
.
engine
=
"enable"
ssl
.
pemfile
=
"/var/etc/cert.pem"
ssl
.
pemfile
=
"/var/etc/cert-cp-zone{{cp_zone_item.zoneid}}.pem"
{
# set ca-file if ca is provided #}
{%
for
certItem
in
helpers
.
toList
(
'cert'
) %}
{%
if
certItem
.
refid
==
cp_zone_item
.
certificate
and
certItem
.
caref
%}
ssl
.
ca
-
file
=
"/var/etc/ca-cp-zone{{cp_zone_item.zoneid}}.pem"
{%
endif
%}
{%
endfor
%}
ssl
.
use
-
sslv2
=
"disable"
ssl
.
use
-
sslv2
=
"disable"
ssl
.
use
-
sslv3
=
"disable"
ssl
.
cipher
-
list
=
"ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA"
ssl
.
cipher
-
list
=
"ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA"
{%
else
%}
ssl
.
engine
=
"disable"
{%
endif
%}
#### compress module
#### compress module
compress
.
cache
-
dir
=
"/tmp/"
compress
.
cache
-
dir
=
"/tmp/"
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment