Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps - Status | Demo | Docs | Install
  1. Cloudron Forum
  2. LAMP
  3. LAMP App - How to enable mod_expires.c ?

LAMP App - How to enable mod_expires.c ?

Scheduled Pinned Locked Moved Solved LAMP
lamp
15 Posts 5 Posters 2.4k Views 5 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M-arcusM Offline
    M-arcusM Offline
    M-arcus
    wrote on last edited by
    #5

    A bunch of mods are already installed, but not activated.

    I would separate this into:

    • Activating already installed mods
    • Installing and activating new monds
    1 Reply Last reply
    0
    • jeauJ jeau referenced this topic on
    • C Online
      C Online
      chmod777
      wrote on last edited by
      #6

      @girish, any updates on installing apache modules in the cloudron LAMP stack?

      I would like to try https://github.com/OpenIDC/mod_auth_openidc in it

      1 Reply Last reply
      0
      • nebulonN Away
        nebulonN Away
        nebulon
        Staff
        wrote on last edited by
        #7

        That might be a great idea if that works out. Just trying to get it up and running in the package. One question though is about the login redirect URI back to the app. Given that this package is very generic, I am not sure if we should define a route for callback on behalf of the app (which might make it hard to use depending on the actual app/code running in this lamp instance) OR the admin is required to manually add an OpenID client via the dashboard, instead of pre-provisioning that.

        Any input here might help to decide on how to go about this.

        C 1 Reply Last reply
        0
        • nebulonN Away
          nebulonN Away
          nebulon
          Staff
          wrote on last edited by
          #8

          Using an example setup, this works fine. Now we just need to decide if we should auto-provision oidc credentials with a fixed redirect callback URI or not.

          If we do not pre-provision it, the Cloudron access controls won't be applied 😕

          C 1 Reply Last reply
          0
          • nebulonN nebulon

            That might be a great idea if that works out. Just trying to get it up and running in the package. One question though is about the login redirect URI back to the app. Given that this package is very generic, I am not sure if we should define a route for callback on behalf of the app (which might make it hard to use depending on the actual app/code running in this lamp instance) OR the admin is required to manually add an OpenID client via the dashboard, instead of pre-provisioning that.

            Any input here might help to decide on how to go about this.

            C Online
            C Online
            chmod777
            wrote on last edited by
            #9

            @nebulon awesome, glad you like the idea! and thanks for working on it. I was surprised there was no "pre-built" solution for securing a website with a login - sounds like this could be it!

            Please do not pre-provision the client data. My use case would be with keycloak, so users are able to login there and access a members only website, as well as further services.

            I would like to have the possibility of users self registering - which is impossible with cloudron (atm).

            is there no way to auto-provision it with the cloudron data, but allow admins to edit the config? That way it would work "out-of-the-box" but could still be used with other IAMs.

            1 Reply Last reply
            2
            • nebulonN nebulon

              Using an example setup, this works fine. Now we just need to decide if we should auto-provision oidc credentials with a fixed redirect callback URI or not.

              If we do not pre-provision it, the Cloudron access controls won't be applied 😕

              C Online
              C Online
              chmod777
              wrote on last edited by
              #10

              @nebulon any (easy) way I could beta test this?

              1 Reply Last reply
              1
              • nebulonN Away
                nebulonN Away
                nebulon
                Staff
                wrote on last edited by nebulon
                #11

                Yeah the idea was to just setup an oidc client credentials set with a redirect URI for the app, but not actually configuring the lamp stack to also use this. Same as with LDAP credentials.

                You can test the branch from https://git.cloudron.io/packages/lamp-app/-/tree/oidc-support?ref_type=heads if you know your way around building a custom app.

                Once installed you have to create an OpenID client in your Cloudron dashboard with /secure/redirect_uri and put the following in /app/data/apache/app.conf:

                   # OIDCRedirectURI is a vanity URL that must point to a path protected by this module but must NOT point to any content
                OIDCRedirectURI https://<your.lampapp.domain>/secure/redirect_uri
                OIDCCryptoPassphrase somethingsecret
                
                OIDCProviderMetadataURL https://<my.example.com>/.well-known/openid-configuration
                OIDCClientID <clientId>
                OIDCClientSecret <secret>
                

                Then restart the app and then you may put those two lines in any .htaccess within your public/ folder which you want to protect from public access:

                AuthType openid-connect
                Require valid-user
                
                1 Reply Last reply
                4
                • C Online
                  C Online
                  chmod777
                  wrote last edited by
                  #12

                  @nebulon, so I finally got around to testing this:

                  authentication works (nice!) but the redirect url appends port 80 (https://lampoidc.mydomain.com:80/) which results in an ssl error (SSL_ERROR_RX_RECORD_TOO_LONG)

                  manualy removing the port then loads the page.

                  ai suggested adding this to the app.conf virtual host:

                  UseCanonicalName Off
                  UseCanonicalPhysicalPort Off

                  which did not help...

                  any ideas?

                  1 Reply Last reply
                  0
                  • girishG Offline
                    girishG Offline
                    girish
                    Staff
                    wrote last edited by
                    #13

                    Can you try with the latest package 5.0.3? I think yourls needed a similar fix in apache.

                    1 Reply Last reply
                    0
                    • C Online
                      C Online
                      chmod777
                      wrote last edited by
                      #14

                      @girish, I am not sure how to merge the update from the master to the oidc-support branch.

                      would you be able to do that, so I can pull the branch again like I managed to do before?

                      1 Reply Last reply
                      0
                      • jamesJ Online
                        jamesJ Online
                        james
                        Staff
                        wrote last edited by
                        #15

                        Hello @chmod777
                        I have rebased the oidc-support branch against the master branch.
                        You should be able to run git pull in the oidc-support branch now.

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • Bookmarks
                        • Search