Installation du raccourcisseur d'url Installation des paquets : apt-get install build-essential libssl-dev zlib1g-dev sudo git sudo apt-get install libpng-dev sudo cpan Carton sudo apt-get install memcached sudo apt-get install libmariadbd-dev Ajout d'un utilisateur dédié useradd lstu groupadd lstu mkdir -p /var/www/lstu chown -R lstu:lstu /var/www/lstu usermod -d /var/www/lstu/ lstu Récupération du dépôt via git git clone https://framagit.org/luc/lstu.git mise à jour cd /var/www/lstu git pull Installation des dépendance su lstu -s /bin/bash carton install carton install --deployment --without=test --without=sqlite --without=postgresql --without=ldap test du service ou mode manuel start carton exec hypnotoad script/lstu stop carton exec hypnotoad -s script/lstu Paramétrage de la configuration LDAP démarrage auto cp utilities/lstu@.service /etc/systemd/system/ vérification des chemins et utilisateurs dans : vim /etc/systemd/system/lstu.service utilisation du service systemctl daemon-reload systemctl enable lstu.service systemctl start lstu.service systemctl status lstu.service vérification du pid ls -la /var/www/lstu/script/hypnotoad.pid au cas ou chown -R lstu:www-data /var/www/lstu/script/ chmod -R 774 /var/www/lstu/script/ entrées dans le Vhost Nginx location / { error_page 404 = /oauth2/auth ; proxy_pass http://192.168.1.72:8080; proxy_set_header Host $host; proxy_http_version 1.1; } location /oauth2/ { proxy_pass http://127.0.0.1:4180; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Scheme $scheme; proxy_set_header X-Auth-Request-Redirect $request_uri; # or, if you are handling multiple domains: # proxy_set_header X-Auth-Request-Redirect $scheme://$host$request_uri; } location = /oauth2/auth { proxy_pass http://127.0.0.1:4180; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Scheme $scheme; # nginx auth_request includes headers but not body proxy_set_header Content-Length ""; proxy_pass_request_body off; } location = / { auth_request /oauth2/auth; error_page 401 = /oauth2/sign_in; # # pass information via X-User and X-Email headers to backend, # # requires running with --set-xauthrequest flag auth_request_set $user $upstream_http_x_auth_request_user; auth_request_set $email $upstream_http_x_auth_request_email; proxy_set_header X-User $user; proxy_set_header X-Email $email; # if you enabled --pass-access-token, this will pass the token to the backend auth_request_set $token $upstream_http_x_auth_request_access_token; proxy_set_header X-Access-Token $token; # if you enabled --cookie-refresh, this is needed for it to work with auth_request auth_request_set $auth_cookie $upstream_http_set_cookie; add_header Set-Cookie $auth_cookie; # When using the --set-authorization-header flag, some provider's cookies can exceed the 4kb # limit and so the OAuth2 Proxy splits these into multiple parts. # Nginx normally only copies the first `Set-Cookie` header from the auth_request to the response, # so if your cookies are larger than 4kb, you will need to extract additional cookies manually. auth_request_set $auth_cookie_name_upstream_1 $upstream_cookie_auth_cookie_name_1; # Extract the Cookie attributes from the first Set-Cookie header and append them # to the second part ($upstream_cookie_* variables only contain the raw cookie content) if ($auth_cookie ~* "(; .*)") { set $auth_cookie_name_0 $auth_cookie; set $auth_cookie_name_1 "auth_cookie_name_1=$auth_cookie_name_upstream_1$1"; } # Send both Set-Cookie headers now if there was a second part if ($auth_cookie_name_upstream_1) { add_header Set-Cookie $auth_cookie_name_0; add_header Set-Cookie $auth_cookie_name_1; } proxy_pass http://192.168.1.72:8080; # proxy_pass http://127.0.0.1:3000/; proxy_set_header Host $host; proxy_http_version 1.1; }