Add a VirtualHost that defines the necessary options for
enabling SSL. The existing keystone Apache configuration already
does all the location handling.
Change-Id: I836a471a7258f14f051d3dd8bdb428286b5a11aa
| ... | ... |
@@ -34,6 +34,12 @@ LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-agent}i\" %D(us)"
|
| 34 | 34 |
%SSLKEYFILE% |
| 35 | 35 |
</VirtualHost> |
| 36 | 36 |
|
| 37 |
+%SSLLISTEN%<VirtualHost *:443> |
|
| 38 |
+%SSLLISTEN% %SSLENGINE% |
|
| 39 |
+%SSLLISTEN% %SSLCERTFILE% |
|
| 40 |
+%SSLLISTEN% %SSLKEYFILE% |
|
| 41 |
+%SSLLISTEN%</VirtualHost> |
|
| 42 |
+ |
|
| 37 | 43 |
Alias /identity %KEYSTONE_BIN%/keystone-wsgi-public |
| 38 | 44 |
<Location /identity> |
| 39 | 45 |
SetHandler wsgi-script |
| ... | ... |
@@ -161,6 +161,7 @@ function _cleanup_keystone_apache_wsgi {
|
| 161 | 161 |
function _config_keystone_apache_wsgi {
|
| 162 | 162 |
local keystone_apache_conf |
| 163 | 163 |
keystone_apache_conf=$(apache_site_config_for keystone) |
| 164 |
+ keystone_ssl_listen="#" |
|
| 164 | 165 |
local keystone_ssl="" |
| 165 | 166 |
local keystone_certfile="" |
| 166 | 167 |
local keystone_keyfile="" |
| ... | ... |
@@ -169,6 +170,7 @@ function _config_keystone_apache_wsgi {
|
| 169 | 169 |
local venv_path="" |
| 170 | 170 |
|
| 171 | 171 |
if is_ssl_enabled_service key; then |
| 172 |
+ keystone_ssl_listen="" |
|
| 172 | 173 |
keystone_ssl="SSLEngine On" |
| 173 | 174 |
keystone_certfile="SSLCertificateFile $KEYSTONE_SSL_CERT" |
| 174 | 175 |
keystone_keyfile="SSLCertificateKeyFile $KEYSTONE_SSL_KEY" |
| ... | ... |
@@ -186,6 +188,7 @@ function _config_keystone_apache_wsgi {
|
| 186 | 186 |
s|%PUBLICPORT%|$keystone_service_port|g; |
| 187 | 187 |
s|%ADMINPORT%|$keystone_auth_port|g; |
| 188 | 188 |
s|%APACHE_NAME%|$APACHE_NAME|g; |
| 189 |
+ s|%SSLLISTEN%|$keystone_ssl_listen|g; |
|
| 189 | 190 |
s|%SSLENGINE%|$keystone_ssl|g; |
| 190 | 191 |
s|%SSLCERTFILE%|$keystone_certfile|g; |
| 191 | 192 |
s|%SSLKEYFILE%|$keystone_keyfile|g; |