From 91bee1de5ab7b97cc32c8ba1c9942823757b86a6 Mon Sep 17 00:00:00 2001 From: jsdelfino Date: Mon, 2 Aug 2010 01:42:59 +0000 Subject: Fix HTTPS config scripts to enable SSL certicates, HTTP basic auth, and OpenID to coexist. Add OpenID support to sample. git-svn-id: http://svn.us.apache.org/repos/asf/tuscany@981352 13f79535-47bb-0310-9956-ffa450edef68 --- sca-cpp/trunk/modules/http/Makefile.am | 2 +- sca-cpp/trunk/modules/http/httpd-auth-conf | 46 +++++++ sca-cpp/trunk/modules/http/httpd-conf | 18 +-- sca-cpp/trunk/modules/http/httpd-ssl-conf | 134 ++++++++++++++++----- sca-cpp/trunk/modules/http/proxy-conf | 3 +- sca-cpp/trunk/modules/http/proxy-ssl-conf | 27 ++--- sca-cpp/trunk/modules/http/proxy-ssl-member-conf | 2 +- sca-cpp/trunk/modules/http/ssl-ca-conf | 6 +- sca-cpp/trunk/modules/http/ssl-cert-conf | 6 +- sca-cpp/trunk/modules/http/vhost-conf | 2 +- sca-cpp/trunk/modules/http/vhost-ssl-conf | 4 +- sca-cpp/trunk/modules/openid/Makefile.am | 2 +- sca-cpp/trunk/modules/openid/openid-conf | 28 +++-- sca-cpp/trunk/modules/openid/start-test | 3 + sca-cpp/trunk/modules/server/mod-eval.hpp | 5 +- .../htdocs/domains/jane/login/index.html | 97 +++++++++++++++ .../htdocs/domains/jane/logout/index.html | 33 +++++ .../htdocs/domains/joe/login/index.html | 97 +++++++++++++++ .../htdocs/domains/joe/logout/index.html | 33 +++++ .../samples/store-cluster/htdocs/login/index.html | 97 +++++++++++++++ .../samples/store-cluster/htdocs/logout/index.html | 33 +++++ sca-cpp/trunk/samples/store-cluster/ssl-start | 7 ++ sca-cpp/trunk/samples/store-python/ssl-start | 1 + 23 files changed, 609 insertions(+), 77 deletions(-) create mode 100755 sca-cpp/trunk/modules/http/httpd-auth-conf create mode 100644 sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/login/index.html create mode 100644 sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/logout/index.html create mode 100644 sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/login/index.html create mode 100644 sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/logout/index.html create mode 100644 sca-cpp/trunk/samples/store-cluster/htdocs/login/index.html create mode 100644 sca-cpp/trunk/samples/store-cluster/htdocs/logout/index.html diff --git a/sca-cpp/trunk/modules/http/Makefile.am b/sca-cpp/trunk/modules/http/Makefile.am index 17fd8ac3c7..03f5c234f5 100644 --- a/sca-cpp/trunk/modules/http/Makefile.am +++ b/sca-cpp/trunk/modules/http/Makefile.am @@ -20,7 +20,7 @@ INCLUDES = -I${HTTPD_INCLUDE} incl_HEADERS = *.hpp incldir = $(prefix)/include/modules/http -dist_mod_SCRIPTS = httpd-conf httpd-start httpd-stop httpd-restart ssl-ca-conf ssl-cert-conf httpd-ssl-conf proxy-conf proxy-ssl-conf proxy-member-conf proxy-ssl-member-conf vhost-conf vhost-ssl-conf +dist_mod_SCRIPTS = httpd-conf httpd-start httpd-stop httpd-restart ssl-ca-conf ssl-cert-conf httpd-ssl-conf httpd-auth-conf proxy-conf proxy-ssl-conf proxy-member-conf proxy-ssl-member-conf vhost-conf vhost-ssl-conf moddir=$(prefix)/modules/http curl_test_SOURCES = curl-test.cpp diff --git a/sca-cpp/trunk/modules/http/httpd-auth-conf b/sca-cpp/trunk/modules/http/httpd-auth-conf new file mode 100755 index 0000000000..cfe81f778a --- /dev/null +++ b/sca-cpp/trunk/modules/http/httpd-auth-conf @@ -0,0 +1,46 @@ +#!/bin/sh + +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. + +# Generate a minimal HTTPD SSL configuration +here=`readlink -f $0`; here=`dirname $here` +root=`readlink -f $1` +conf=`cat $root/conf/httpd.conf | grep "# Generated by: httpd-conf"` +host=`echo $conf | awk '{ print $6 }'` +httpd_prefix=`cat $here/httpd.prefix` + +# Generate basic authentication configuration +cat >>$root/conf/vhost-ssl.conf < +AuthType Basic +AuthName "$host" +AuthUserFile "$root/conf/httpd.passwd" +Require valid-user + + +EOF + +# Create test users +$httpd_prefix/bin/htpasswd -bc $root/conf/httpd.passwd test test 2>/dev/null +$httpd_prefix/bin/htpasswd -b $root/conf/httpd.passwd admin admin 2>/dev/null +$httpd_prefix/bin/htpasswd -b $root/conf/httpd.passwd foo foo 2>/dev/null +$httpd_prefix/bin/htpasswd -b $root/conf/httpd.passwd bar bar 2>/dev/null + diff --git a/sca-cpp/trunk/modules/http/httpd-conf b/sca-cpp/trunk/modules/http/httpd-conf index 149bc56c4d..2cbf5120e9 100755 --- a/sca-cpp/trunk/modules/http/httpd-conf +++ b/sca-cpp/trunk/modules/http/httpd-conf @@ -44,7 +44,9 @@ cat >$root/conf/httpd.conf < LoadModule log_config_module ${modules_prefix}/modules/mod_log_config.so @@ -80,17 +83,17 @@ Timeout 45 LimitRequestBody 1048576 HostNameLookups Off -# Logging +# Log HTTP requests +LogLevel info ErrorLog $root/logs/error_log LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-agent}i\"" combined CustomLog $root/logs/access_log combined -LogLevel warn # Configure Mime types DefaultType text/plain TypesConfig $here/conf/mime.types -# Set document root +# Set default document root DocumentRoot $htdocs DirectoryIndex index.html @@ -113,16 +116,17 @@ Options FollowSymLinks Allow from all -# Allow access to service components +# Allow access to root location Options FollowSymLinks Order deny,allow Allow from all -# Setup HTTP virtual host +# Listen on HTTP port Listen $port +# Setup HTTP virtual host ServerName http://$host:$pport diff --git a/sca-cpp/trunk/modules/http/httpd-ssl-conf b/sca-cpp/trunk/modules/http/httpd-ssl-conf index f2f8b01614..f36da55b12 100755 --- a/sca-cpp/trunk/modules/http/httpd-ssl-conf +++ b/sca-cpp/trunk/modules/http/httpd-ssl-conf @@ -45,7 +45,7 @@ RewriteCond %{SERVER_PORT} !^$sslpport$ RewriteRule .* https://%{SERVER_NAME}:$sslpport%{REQUEST_URI} [R,L] -# Setup SSL support +# Configure SSL support AddType application/x-x509-ca-cert .crt AddType application/x-pkcs7-crl .crl SSLPassPhraseDialog builtin @@ -55,19 +55,19 @@ SSLMutex "file:$root/logs/ssl_mutex" SSLRandomSeed startup builtin SSLRandomSeed connect builtin -# Setup HTTPS virtual host +# Listen on HTTPS port Listen $sslport +# HTTPS virtual host ServerName https://$host:$sslpport -Include conf/ssl-svhost.conf +Include conf/svhost-ssl.conf # Allow the server admin to view the server status SetHandler server-status HostnameLookups on -Deny from All Allow from all Require user admin @@ -80,7 +80,7 @@ ExtendedStatus On EOF # Generate HTTPS vhost configuration -cat >$root/conf/ssl-vhost.conf <$root/conf/vhost-ssl.conf <s %b \"%{Referer}i\" \"%{User-agent}i\"" sslcombined +# Verify client certificates +SSLVerifyClient optional +SSLVerifyDepth 1 + +# Log SSL requests +#CustomLog "$root/logs/ssl_request_log" "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b" +LogFormat "%h %l %u %t %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %>s %b \"%{Referer}i\" \"%{User-agent}i\" \"%{SSL_CLIENT_I_DN}x\" \"%{SSL_CLIENT_S_DN}x\"" sslcombined CustomLog $root/logs/ssl_access_log sslcombined -LogLevel warn -# Require clients to present either: -# a certificate signed with our certification authority certificate -# or a userid + password for HTTP basic authentication +EOF + +# Generate HTTPS authentication requirement +cat >>$root/conf/vhost-ssl.conf < +# Require clients to use SSL and authenticate +SSLRequireSSL + +# Also accept other forms of authentication (e.g. HTTP basic +# authentication, or OpenID authentication) Satisfy Any -SSLVerifyClient optional -SSLVerifyDepth 1 -SSLOptions +FakeBasicAuth -SSLRequireSSL -SSLRequire %{SSL_CIPHER_USEKEYSIZE} >= 128 and %{SSL_CLIENT_I_DN_O} == "$org" +EOF -AuthType Basic -AuthName "$host" -AuthUserFile "$root/conf/httpd.passwd" -Require valid-user +proxyconf=`cat $root/conf/vhost.conf | grep "# Generated by: proxy-conf"` +if [ "$proxyconf" != "" ]; then + cat >>$root/conf/vhost-ssl.conf <= 128 + +# Forward received SSL client certificate info in proxied requests +RewriteEngine on +RewriteRule .* - [E=SSL_PROTOCOL:%{SSL:SSL_PROTOCOL}] +RewriteRule .* - [E=SSL_CIPHER:%{SSL:SSL_CIPHER}] +RewriteCond %{SSL:SSL_CLIENT_I_DN} !="" +RewriteRule .* - [E=SSL_I_DN:%{SSL:SSL_CLIENT_I_DN}] +RewriteCond %{SSL:SSL_CLIENT_S_DN} !="" +RewriteRule .* - [E=SSL_S_DN:%{SSL:SSL_CLIENT_S_DN}] +RewriteCond %{SSL:SSL_CLIENT_I_DN_O} !="" +RewriteRule .* - [E=SSL_I_DN_O:%{SSL:SSL_CLIENT_I_DN_O}] +RewriteCond %{SSL:SSL_CLIENT_S_DN_OU} !="" +RewriteRule .* - [E=SSL_S_DN_OU:%{SSL:SSL_CLIENT_S_DN_OU}] +RequestHeader unset X-Forwarded-SSL-Protocol +RequestHeader unset X-Forwarded-SSL-Cipher +RequestHeader unset X-Forwarded-SSL-Issuer-DN +RequestHeader unset X-Forwarded-SSL-Client-DN +RequestHeader unset X-Forwarded-SSL-Issuer-DN-O +RequestHeader unset X-Forwarded-SSL-Client-DN-OU +RequestHeader set X-Forwarded-SSL-Protocol %{SSL_PROTOCOL}e env=SSL_PROTOCOL +RequestHeader set X-Forwarded-SSL-Cipher %{SSL_CIPHER}e env=SSL_CIPHER +RequestHeader set X-Forwarded-SSL-Issuer-DN %{SSL_I_DN}e env=SSL_I_DN +RequestHeader set X-Forwarded-SSL-Client-DN %{SSL_S_DN}e env=SSL_S_DN +RequestHeader set X-Forwarded-SSL-Issuer-DN-O %{SSL_I_DN_O}e env=SSL_I_DN_O +RequestHeader set X-Forwarded-SSL-Client-DN-OU %{SSL_S_DN_OU}e env=SSL_S_DN_OU + +EOF +else + cat >>$root/conf/vhost-ssl.conf <= 128 and ( \ +( %{SSL_CLIENT_I_DN_O} == "$org" and %{SSL_CLIENT_S_DN_OU} == "server" ) or \ +( %{SSL_CLIENT_I_DN_O} == "$org" and %{SSL_CLIENT_S_DN_OU} == "proxy" and \ + %{HTTP:X-Forwarded-SSL-Issuer-DN-O} == "$org" and %{HTTP:X-Forwarded-SSL-Client-DN-OU} == "server" ) or \ +%{REQUEST_URI} =~ m/^.(login|logout|openid|unprotected).*$/ ) + +# Record received SSL client certificate info in environment vars +RewriteEngine on +RewriteRule .* - [E=SSL_PROTOCOL:%{SSL:SSL_PROTOCOL}] +RewriteRule .* - [E=SSL_CIPHER:%{SSL:SSL_CIPHER}] +RewriteCond %{SSL:SSL_CLIENT_I_DN} !="" +RewriteRule .* - [E=SSL_I_DN:%{SSL:SSL_CLIENT_I_DN}] +RewriteCond %{SSL:SSL_CLIENT_S_DN} !="" +RewriteRule .* - [E=SSL_S_DN:%{SSL:SSL_CLIENT_S_DN}] + +# Store the client certificate DN in the SSL_REMOTE_USER var, +# that's similar to the SSLUserName directive but more flexible as +# it can pick a client certificate DN forwarded by a proxy +RewriteCond %{SSL:SSL_CLIENT_I_DN_O} "$org" +RewriteCond %{SSL:SSL_CLIENT_S_DN_OU} "server" +RewriteRule .* - [E=SSL_REMOTE_USER:%{SSL:SSL_CLIENT_S_DN}] + +RewriteCond %{SSL:SSL_CLIENT_I_DN_O} "$org" +RewriteCond %{SSL:SSL_CLIENT_S_DN_OU} "proxy" +RewriteCond %{HTTP:X-Forwarded-SSL-Issuer-DN-O} "$org" +RewriteCond %{HTTP:X-Forwarded-SSL-Client-DN-OU} "server" +RewriteRule .* - [E=SSL_REMOTE_USER:%{HTTP:X-Forwarded-SSL-Client-DN}] + +EOF +fi + +cat >>$root/conf/vhost-ssl.conf < EOF -cat >$root/conf/ssl-svhost.conf <$root/conf/svhost-ssl.conf <$root/conf/ssl-dvhost.conf <$root/conf/dvhost-ssl.conf </dev/null -$httpd_prefix/bin/htpasswd -b $root/conf/httpd.passwd admin admin 2>/dev/null -$httpd_prefix/bin/htpasswd -b $root/conf/httpd.passwd foo foo 2>/dev/null -$httpd_prefix/bin/htpasswd -b $root/conf/httpd.passwd bar bar 2>/dev/null - diff --git a/sca-cpp/trunk/modules/http/proxy-conf b/sca-cpp/trunk/modules/http/proxy-conf index 4970950623..dd6f344fa6 100755 --- a/sca-cpp/trunk/modules/http/proxy-conf +++ b/sca-cpp/trunk/modules/http/proxy-conf @@ -23,11 +23,12 @@ root=`readlink -f $1` cat >>$root/conf/vhost.conf < diff --git a/sca-cpp/trunk/modules/http/proxy-ssl-conf b/sca-cpp/trunk/modules/http/proxy-ssl-conf index bc1b63fc7d..fe7e6a5be6 100755 --- a/sca-cpp/trunk/modules/http/proxy-ssl-conf +++ b/sca-cpp/trunk/modules/http/proxy-ssl-conf @@ -21,17 +21,14 @@ here=`readlink -f $0`; here=`dirname $here` root=`readlink -f $1` -cat >>$root/conf/ssl-vhost.conf <>$root/conf/vhost-ssl.conf < -EOF +# Enable SSL proxy engine +SSLProxyEngine on +SSLProxyCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL -cat >>$root/conf/ssl-svhost.conf <>$root/conf/ssl-dvhost.conf <>$root/conf/vhost-ssl.conf <>$root/conf/ssl-vhost.conf <>$root/conf/vhost-ssl.conf <>$root/conf/httpd.conf < diff --git a/sca-cpp/trunk/modules/http/vhost-ssl-conf b/sca-cpp/trunk/modules/http/vhost-ssl-conf index 8a660278a3..e6801248c4 100755 --- a/sca-cpp/trunk/modules/http/vhost-ssl-conf +++ b/sca-cpp/trunk/modules/http/vhost-ssl-conf @@ -33,7 +33,7 @@ htdocs=`readlink -f $htdocs` cat >>$root/conf/httpd.conf < EOF diff --git a/sca-cpp/trunk/modules/openid/Makefile.am b/sca-cpp/trunk/modules/openid/Makefile.am index a28611dc41..158dd8902b 100644 --- a/sca-cpp/trunk/modules/openid/Makefile.am +++ b/sca-cpp/trunk/modules/openid/Makefile.am @@ -18,7 +18,7 @@ if WANT_OPENID -dist_mod_SCRIPTS = openid-conf +dist_mod_SCRIPTS = openid-conf openid-step2-conf moddir = $(prefix)/modules/openid mod_DATA = openid.prefix diff --git a/sca-cpp/trunk/modules/openid/openid-conf b/sca-cpp/trunk/modules/openid/openid-conf index 206281db38..19d7d06d99 100755 --- a/sca-cpp/trunk/modules/openid/openid-conf +++ b/sca-cpp/trunk/modules/openid/openid-conf @@ -20,32 +20,46 @@ # Generate an OpenID server conf here=`readlink -f $0`; here=`dirname $here` root=`readlink -f $1` -openid_prefix=`cat openid.prefix` +conf=`cat $root/conf/httpd.conf | grep "# Generated by: httpd-conf"` +host=`echo $conf | awk '{ print $6 }'` +openid_prefix=`cat $here/openid.prefix` # Configure HTTPD mod_auth_openid module cat >>$root/conf/httpd.conf < +AuthType OpenID AuthOpenIDEnabled On AuthOpenIDCookiePath / AuthOpenIDLoginPage /login AuthOpenIDAXAdd EMAIL http://axschema.org/contact/email - -AuthOpenIDEnabled Off - - +# Enable unauthenticated access to unprotected areas AuthOpenIDEnabled Off - AuthOpenIDEnabled Off + +AuthOpenIDEnabled Off + + +EOF + +cat >>$root/conf/vhost-ssl.conf < +AuthType OpenID +AuthName "$host" +Require valid-user + EOF diff --git a/sca-cpp/trunk/modules/openid/start-test b/sca-cpp/trunk/modules/openid/start-test index b9d3191b11..67020cf701 100755 --- a/sca-cpp/trunk/modules/openid/start-test +++ b/sca-cpp/trunk/modules/openid/start-test @@ -18,7 +18,10 @@ # under the License. # Setup +../../modules/http/ssl-ca-conf tmp localhost +../../modules/http/ssl-cert-conf tmp localhost ../../modules/http/httpd-conf tmp localhost 8090 htdocs +../../modules/http/httpd-ssl-conf tmp 8453 ./openid-conf tmp ./openid-step2-conf tmp ../../modules/server/server-conf tmp diff --git a/sca-cpp/trunk/modules/server/mod-eval.hpp b/sca-cpp/trunk/modules/server/mod-eval.hpp index 857fd0a1e1..0aff56f59d 100644 --- a/sca-cpp/trunk/modules/server/mod-eval.hpp +++ b/sca-cpp/trunk/modules/server/mod-eval.hpp @@ -612,8 +612,9 @@ const int postConfigMerge(const ServerConf& mainsc, server_rec* s) { return OK; ServerConf& sc = httpd::serverConf(s, &mod_tuscany_eval); debug(httpd::serverName(s), "modeval::postConfigMerge::serverName"); - if (sc.wiringServerName == "") sc.wiringServerName = httpd::serverName(s); - debug(httpd::serverName(s), "modeval::postConfigMerge::wiringServerName"); + if (sc.wiringServerName == "") + sc.wiringServerName = mainsc.wiringServerName != ""? mainsc.wiringServerName : httpd::serverName(s); + debug(sc.wiringServerName, "modeval::postConfigMerge::wiringServerName"); sc.contributionPath = mainsc.contributionPath; sc.compositeName = mainsc.compositeName; sc.virtualHostContributionPath = mainsc.virtualHostContributionPath; diff --git a/sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/login/index.html b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/login/index.html new file mode 100644 index 0000000000..14f378e968 --- /dev/null +++ b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/login/index.html @@ -0,0 +1,97 @@ + + +

Sign in with an OpenID provider

+ + + +
+ +
+ +
+

Sign in with your Google account

+

Sign in with your Yahoo account

+

Sign in with your MyOpenID account

+

Sign in with your Verisign account

+

Sign in with a Google apps domain
+
+

+

Sign in with an OpenID endpoint
+
+

+
+ + diff --git a/sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/logout/index.html b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/logout/index.html new file mode 100644 index 0000000000..55cbfac110 --- /dev/null +++ b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/jane/logout/index.html @@ -0,0 +1,33 @@ + + + +

Sign out

+ +
+ + +
+ diff --git a/sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/login/index.html b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/login/index.html new file mode 100644 index 0000000000..14f378e968 --- /dev/null +++ b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/login/index.html @@ -0,0 +1,97 @@ + + +

Sign in with an OpenID provider

+ + + +
+ +
+ +
+

Sign in with your Google account

+

Sign in with your Yahoo account

+

Sign in with your MyOpenID account

+

Sign in with your Verisign account

+

Sign in with a Google apps domain
+
+

+

Sign in with an OpenID endpoint
+
+

+
+ + diff --git a/sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/logout/index.html b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/logout/index.html new file mode 100644 index 0000000000..55cbfac110 --- /dev/null +++ b/sca-cpp/trunk/samples/store-cluster/htdocs/domains/joe/logout/index.html @@ -0,0 +1,33 @@ + + + +

Sign out

+ +
+ + +
+ diff --git a/sca-cpp/trunk/samples/store-cluster/htdocs/login/index.html b/sca-cpp/trunk/samples/store-cluster/htdocs/login/index.html new file mode 100644 index 0000000000..14f378e968 --- /dev/null +++ b/sca-cpp/trunk/samples/store-cluster/htdocs/login/index.html @@ -0,0 +1,97 @@ + + +

Sign in with an OpenID provider

+ + + +
+ +
+ +
+

Sign in with your Google account

+

Sign in with your Yahoo account

+

Sign in with your MyOpenID account

+

Sign in with your Verisign account

+

Sign in with a Google apps domain
+
+

+

Sign in with an OpenID endpoint
+
+

+
+ + diff --git a/sca-cpp/trunk/samples/store-cluster/htdocs/logout/index.html b/sca-cpp/trunk/samples/store-cluster/htdocs/logout/index.html new file mode 100644 index 0000000000..55cbfac110 --- /dev/null +++ b/sca-cpp/trunk/samples/store-cluster/htdocs/logout/index.html @@ -0,0 +1,33 @@ + + + +

Sign out

+ +
+ + +
+ diff --git a/sca-cpp/trunk/samples/store-cluster/ssl-start b/sca-cpp/trunk/samples/store-cluster/ssl-start index d9d0fec67d..da55846654 100755 --- a/sca-cpp/trunk/samples/store-cluster/ssl-start +++ b/sca-cpp/trunk/samples/store-cluster/ssl-start @@ -21,6 +21,7 @@ ../../modules/http/ssl-ca-conf tmp/ssl sca-store.com ../../modules/http/ssl-cert-conf tmp/ssl sca-store.com server ../../modules/http/ssl-cert-conf tmp/ssl *.sca-store.com vhost +../../modules/http/ssl-cert-conf tmp/ssl sca-store.com proxy # Start three identical app servers ../../modules/http/httpd-conf tmp/server1 sca-store.com 8101/80 htdocs @@ -28,6 +29,8 @@ cp `../../modules/http/ssl-ls tmp/ssl` tmp/server1/conf ../../modules/http/httpd-ssl-conf tmp/server1 8441/443 ../../modules/http/vhost-ssl-conf tmp/server1 +../../modules/openid/openid-conf tmp/server1 +../../modules/openid/openid-step2-conf tmp/server1 ../../modules/server/server-conf tmp/server1 ../../modules/python/python-conf tmp/server1 cat >>tmp/server1/conf/httpd.conf <>tmp/server2/conf/httpd.conf <>tmp/server3/conf/httpd.conf <>tmp/conf/httpd.conf <