Contents

  1. Prelude
  2. Installation
  3. The lighttpd user
  4. Configuration
  5. Testing the setup
  6. Setting up authentication

Prelude

How to deploy a high performance webserver using NetBSD and Lighttpd.

Installation

We will install it from pkgsrc because we need some fetures which are not enabled in the binary.

First of all, let's use gamin as the default file alteration monitor instead of fam:

# FAM_DEFAULT=gamin

Of course you can stick with fam if you'd like.

After that we will enable fam support in lighty:

# echo PKG_OPTIONS.lighttpd=fam >> /etc/mk.conf

Now the good old magic words:

# cd /usr/pkgsrc/www/lighttpd/
# make install clean clean-depends

Install the rc.d files if you dont do that automaticaly:

# cp /usr/pkg/share/examples/rc.d/lighttpd /etc/rc.d/

The lighttpd user

By default there is no user created for lighttpd, thus you will have to create one:

# groupadd lighttpd
# useradd -s /sbin/nologin -g lighttpd lighttpd

Configuration

Set the docroot whereever you want:

server.document-root        = "/srv/lighttpd/htdocs"

Set the default location for logs:

server.errorlog             = "/var/log/lighttpd/error.log"
accesslog.filename          = "/var/log/lighttpd/access.log"

You need to create the directory /var/log/lighttpd with proper permissions:

# install -d -o lighttpd -g lighttpd /var/log/lighttpd

Let's use the user we have created for lighttpd:

server.username            = "lighttpd"
server.groupname           = "lighttpd"

Enable kqueue:

server.event-handler        = "kqueue"

Enable fam:

server.stat-cache-engine    = "fam"

Testing the setup

You can start the webserver with:

/etc/rc.d/lighttpd start

Check your logs if you encounter any problem.

Setting up authentication

Directory server

We will use OpenLdap.

First of all deploy a working ldap server, and populate it with the the users. For more information on this, read OpenLDAP Authentication on NetBSD.

Be sure to load mod_auth and include the following in your lighttpd.conf file:

# ldap authentication
auth.backend               = "ldap"

auth.backend.ldap.hostname = "grimnismal.local"
auth.backend.ldap.base-dn  = "dc=grimnismal,dc=local"
auth.backend.ldap.filter   = "(uid=$)"

auth.backend.ldap.bind-dn  = "cn=Manager,dc=grimnismal,dc=local"

# passwd for bind-dn, separated for security reasons
# contains: auth.backend.ldap.bind-pw  = "your-password"
# It must NOT be word readable!
#
include "ldapsecret"

auth.require               = ( "/server-status" =>
                               (
                                 "method"  => "basic",
                                 "realm"   => "Admin only page",
                                 "require" => "user=replaced"
                               ),
                               "/server-config" =>
                               (
                                 "method"  => "basic",      
                                 "realm"   => "Staff only page",
                                 "require" => "valid-user"  
                               )
                             )
Add a comment