Spec clean-up
- Drop SELinux policy module: all supported targets have it in base policy now - Update README.SELinux to current types and ship it - Use forward-looking conditionals - One build requirement per line - Drop legacy Group: tag
This commit is contained in:
parent
f53669c26f
commit
03b907b249
@ -1,63 +0,0 @@
|
||||
# This policy module provides support for mod_fcgid using the httpd system script domain.
|
||||
# It provides "allow" rules that will overlap to varying degrees with selinux-policy
|
||||
# packages for Fedora 5 onwards, and is a stepping stone to the merged policy included
|
||||
# as updates for selinux-policy in Fedora 8, 9, and 10.
|
||||
#
|
||||
# Rules existing in selinux-policy 2.6.4 (F7) have been stripped from this policy
|
||||
#
|
||||
# Previous versions of this policy module used a separate domain, httpd_fastcgi_script_t,
|
||||
# which is now an alias for httpd_sys_script_t.
|
||||
|
||||
policy_module(fastcgi, 0.2.6)
|
||||
|
||||
require {
|
||||
type devpts_t;
|
||||
type httpd_t;
|
||||
type httpd_log_t;
|
||||
type httpd_sys_content_t;
|
||||
type httpd_sys_content_ra_t;
|
||||
type httpd_sys_content_ro_t;
|
||||
type httpd_sys_content_rw_t;
|
||||
type httpd_sys_script_exec_t;
|
||||
type httpd_sys_script_ra_t;
|
||||
type httpd_sys_script_ro_t;
|
||||
type httpd_sys_script_rw_t;
|
||||
type httpd_sys_script_t;
|
||||
type httpd_tmp_t;
|
||||
type httpd_var_run_t;
|
||||
};
|
||||
|
||||
# Type aliases for contexts used with older policy modules
|
||||
typealias httpd_sys_content_t alias httpd_fastcgi_content_t;
|
||||
typealias httpd_sys_content_ra_t alias httpd_fastcgi_content_ra_t;
|
||||
typealias httpd_sys_content_ro_t alias httpd_fastcgi_content_ro_t;
|
||||
typealias httpd_sys_content_rw_t alias httpd_fastcgi_content_rw_t;
|
||||
typealias httpd_sys_script_exec_t alias httpd_fastcgi_script_exec_t;
|
||||
typealias httpd_sys_script_ra_t alias httpd_fastcgi_script_ra_t;
|
||||
typealias httpd_sys_script_ro_t alias httpd_fastcgi_script_ro_t;
|
||||
typealias httpd_sys_script_rw_t alias httpd_fastcgi_script_rw_t;
|
||||
typealias httpd_sys_script_t alias httpd_fastcgi_script_t;
|
||||
typealias httpd_var_run_t alias httpd_fastcgi_var_run_t;
|
||||
|
||||
# ==========================================================
|
||||
# Re-use httpd_sys_script_t for mod_fcgid apps
|
||||
# ==========================================================
|
||||
|
||||
# Allow web applications to call getpw* functions
|
||||
auth_use_nsswitch(httpd_sys_script_t)
|
||||
|
||||
# Allow httpd to create and use files and sockets for communicating with mod_fcgid
|
||||
# Rules to do this are already in selinux-policy apart from dir setattr
|
||||
setattr_dirs_pattern(httpd_t,httpd_var_run_t,httpd_var_run_t)
|
||||
|
||||
# Allow FastCGI applications to listen for FastCGI requests on their
|
||||
# sockets and respond to them
|
||||
allow httpd_sys_script_t httpd_t:unix_stream_socket { rw_stream_socket_perms };
|
||||
|
||||
# These are probably leaked file descriptors
|
||||
dontaudit httpd_t devpts_t:chr_file ioctl;
|
||||
dontaudit httpd_sys_script_t httpd_log_t:file ioctl;
|
||||
|
||||
# PHP uploads a file to /tmp and then execs programs to action them
|
||||
# Rules to do this are already in selinux-policy 2.6.4 (F7) apart from filetrans
|
||||
files_tmp_filetrans(httpd_sys_script_t,httpd_sys_script_rw_t,{ dir file lnk_file sock_file fifo_file })
|
@ -1 +0,0 @@
|
||||
/var/run/mod_fcgid(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
71
fastcgi.te
71
fastcgi.te
@ -1,71 +0,0 @@
|
||||
# This policy module provides support for mod_fcgid using the httpd system script domain.
|
||||
# It provides "allow" rules that will overlap to varying degrees with selinux-policy
|
||||
# packages for Fedora 5 onwards, and is a stepping stone to the merged policy included
|
||||
# as updates for selinux-policy in Fedora 8, 9, and 10.
|
||||
#
|
||||
# Rules existing in selinux-policy 2.3.7 (FC5) have been stripped from this policy
|
||||
#
|
||||
# Previous versions of this policy module used a separate domain, httpd_fastcgi_script_t,
|
||||
# which is now an alias for httpd_sys_script_t.
|
||||
|
||||
policy_module(fastcgi, 0.1.11)
|
||||
|
||||
require {
|
||||
type devpts_t;
|
||||
type httpd_t;
|
||||
type httpd_log_t;
|
||||
type httpd_sys_content_t;
|
||||
type httpd_sys_script_exec_t;
|
||||
type httpd_sys_script_ra_t;
|
||||
type httpd_sys_script_ro_t;
|
||||
type httpd_sys_script_rw_t;
|
||||
type httpd_sys_script_t;
|
||||
type httpd_tmp_t;
|
||||
type httpd_var_run_t;
|
||||
};
|
||||
|
||||
# Type aliases for contexts used with older policy modules
|
||||
typealias httpd_sys_content_t alias httpd_fastcgi_content_t;
|
||||
typealias httpd_sys_script_exec_t alias httpd_fastcgi_script_exec_t;
|
||||
typealias httpd_sys_script_ra_t alias httpd_fastcgi_script_ra_t;
|
||||
typealias httpd_sys_script_ro_t alias httpd_fastcgi_script_ro_t;
|
||||
typealias httpd_sys_script_rw_t alias httpd_fastcgi_script_rw_t;
|
||||
typealias httpd_sys_script_t alias httpd_fastcgi_script_t;
|
||||
typealias httpd_var_run_t alias httpd_fastcgi_var_run_t;
|
||||
|
||||
# ==========================================================
|
||||
# Re-use httpd_sys_script_t for mod_fcgid apps
|
||||
# ==========================================================
|
||||
|
||||
# Allow web applications to call getpw* functions
|
||||
auth_use_nsswitch(httpd_sys_script_t)
|
||||
|
||||
# Allow httpd to create and use files and sockets for communicating with mod_fcgid
|
||||
# Rules to do this are already in selinux-policy apart from dir setattr
|
||||
allow httpd_t httpd_var_run_t:dir setattr;
|
||||
|
||||
# Allow FastCGI applications to listen for FastCGI requests on their
|
||||
# sockets and respond to them
|
||||
allow httpd_sys_script_t httpd_t:unix_stream_socket { rw_stream_socket_perms };
|
||||
|
||||
# These are probably leaked file descriptors
|
||||
dontaudit httpd_t devpts_t:chr_file ioctl;
|
||||
dontaudit httpd_sys_script_t httpd_log_t:file ioctl;
|
||||
|
||||
# Search automount filesystem to use automatically mounted filesystems
|
||||
fs_search_auto_mountpoints(httpd_sys_script_t)
|
||||
|
||||
# PHP uploads a file to /tmp and then execs programs to action them
|
||||
allow httpd_sys_script_t httpd_tmp_t:dir manage_dir_perms;
|
||||
allow httpd_sys_script_t httpd_tmp_t:file manage_file_perms;
|
||||
files_tmp_filetrans(httpd_sys_script_t,httpd_sys_script_rw_t,{ dir file lnk_file sock_file fifo_file })
|
||||
|
||||
# Support network home directories
|
||||
tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs',`
|
||||
fs_read_nfs_files(httpd_sys_script_t)
|
||||
fs_read_nfs_symlinks(httpd_sys_script_t)
|
||||
')
|
||||
tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',`
|
||||
fs_read_cifs_files(httpd_sys_script_t)
|
||||
fs_read_cifs_symlinks(httpd_sys_script_t)
|
||||
')
|
@ -1,47 +1,29 @@
|
||||
Using mod_fcgid with SELinux in Fedora Core 5 / RHEL 5 onwards
|
||||
==============================================================
|
||||
|
||||
Versions of this package built for Fedora Core 5, 6, or 7 include an SELinux
|
||||
policy module to support FastCGI applications. Later Fedora releases and Red
|
||||
Hat Enterprise Linux 5.3 onwards include the policy in the main selinux-policy
|
||||
package and do not require the separate module.
|
||||
|
||||
The module source (fastcgi.{fc,te}) is included for reference as documentation
|
||||
in the package.
|
||||
|
||||
The module uses the same set of SELinux types for FastCGI applications as for
|
||||
regular CGI scripts (or "system scripts" as they are known in SELinux), as
|
||||
described in "man httpd_selinux".
|
||||
|
||||
* httpd_sys_content_t
|
||||
- Set files with httpd_sys_content_t for content that is available
|
||||
- Set files with httpd_sys_content_t for content that is available to read
|
||||
from all FastCGI scripts and the daemon.
|
||||
|
||||
* httpd_sys_rw_content_t
|
||||
- Set files with httpd_sys_rw_content_t if you want httpd_sys_script_exec_t
|
||||
scripts to read/write the data, and disallow other processes from access.
|
||||
|
||||
* httpd_sys_script_exec_t
|
||||
- Set FastCGI scripts with httpd_sys_script_exec_t to allow them to run
|
||||
with access to all system script types.
|
||||
|
||||
* httpd_sys_script_ro_t
|
||||
- Set files with httpd_sys_script_ro_t if you want httpd_sys_script_exec_t
|
||||
scripts to read but not write the data, and disallow other processes from
|
||||
access.
|
||||
|
||||
* httpd_sys_script_rw_t
|
||||
- Set files with httpd_sys_script_rw_t if you want httpd_sys_script_exec_t
|
||||
scripts to read/write the data, and disallow other processes from access.
|
||||
|
||||
* httpd_sys_script_ra_t
|
||||
- Set files with httpd_sys_script_ra_t if you want httpd_sys_script_exec_t
|
||||
scripts to read/append to the file, and disallow other processes from
|
||||
access.
|
||||
|
||||
So for the moin wiki layout described in README.RPM of the main mod_fcgid
|
||||
package, the contexts would be set as follows:
|
||||
|
||||
cd /var/www/mywiki
|
||||
chcon -t httpd_sys_content_t .
|
||||
chcon -R -t httpd_sys_script_exec_t cgi-bin
|
||||
chcon -R -t httpd_sys_script_rw_t data underlay
|
||||
chcon -R -t httpd_sys_rw_content_t data underlay
|
||||
|
||||
It is necessary to turn on the httpd_enable_cgi boolean to run either regular
|
||||
or FastCGI scripts:
|
||||
@ -59,5 +41,5 @@ chances that any vulnerability in any of your web applications could be
|
||||
exploited by a spammer.
|
||||
|
||||
If you have any questions or issues regarding FastCGI and SELinux, please don't
|
||||
hesitate to bring them up on fedora-selinux-list.
|
||||
hesitate to bring them up on Fedora's selinux-list.
|
||||
|
||||
|
193
mod_fcgid.spec
193
mod_fcgid.spec
@ -1,42 +1,42 @@
|
||||
# Fedora 5, 6, and 7 versions includes SELinux policy module package
|
||||
# Fedora 8 and 9 versions include policy in errata selinux-policy releases
|
||||
# Fedora 10 onwards include policy in standard selinux-policy releases
|
||||
# RHEL 5.5 onwards include policy in standard selinux-policy releases
|
||||
%if 0%{?fedora} < 5 || 0%{?fedora} > 7 || 0%{?rhel}
|
||||
%global selinux_module 0
|
||||
%global selinux_types %{nil}
|
||||
%global selinux_variants %{nil}
|
||||
%global selinux_buildreqs %{nil}
|
||||
%else
|
||||
%global selinux_module 1
|
||||
%global selinux_types %(awk '/^#[[:space:]]*SELINUXTYPE=/,/^[^#]/ { if ($3 == "-") printf "%s ", $2 }' /etc/selinux/config 2>/dev/null)
|
||||
%global selinux_variants %([ -z "%{selinux_types}" ] && echo mls strict targeted || echo %{selinux_types})
|
||||
%global selinux_buildreqs checkpolicy, selinux-policy-devel, hardlink
|
||||
# Compatible macros for those introduced in Fedora 18, RHEL 7
|
||||
%if (0%{?rhel} && 0%{?rhel} <= 6) || (0%{?fedora} && 0%{?fedora} <= 17)
|
||||
# apxs script location
|
||||
%global _httpd_apxs %{_sbindir}/apxs
|
||||
# Module Magic Number
|
||||
%global _httpd_mmn %(cat %{_includedir}/httpd/.mmn 2>/dev/null || echo 0-0)
|
||||
# Configuration directory
|
||||
%global _httpd_confdir %{_sysconfdir}/httpd/conf.d
|
||||
# systemd tmpfiles directory
|
||||
%global _tmpfilesdir %{_prefix}/lib/tmpfiles.d
|
||||
%endif
|
||||
|
||||
# apxs script location
|
||||
%{!?_httpd_apxs: %global _httpd_apxs %{_sbindir}/apxs}
|
||||
|
||||
# Module Magic Number
|
||||
%{!?_httpd_mmn: %global _httpd_mmn %(cat %{_includedir}/httpd/.mmn 2>/dev/null || echo 0-0)}
|
||||
|
||||
# Configuration directory
|
||||
%{!?_httpd_confdir: %global _httpd_confdir %{_sysconfdir}/httpd/conf.d}
|
||||
|
||||
# For httpd ≥ 2.4 we have a different filesystem layout
|
||||
%if 0%{?fedora} > 17 || 0%{?rhel} > 6
|
||||
%global httpd24 1
|
||||
%global rundir /run
|
||||
%else
|
||||
%if (0%{?rhel} && 0%{?rhel} <= 6) || (0%{?fedora} && 0%{?fedora} <= 17)
|
||||
%global httpd24 0
|
||||
%global rundir %{_localstatedir}/run
|
||||
%else
|
||||
%global httpd24 1
|
||||
%global rundir /run
|
||||
%endif
|
||||
|
||||
# rundir on tmpfs from Fedora 15, RHEL 7
|
||||
%if (0%{?rhel} && 0%{?rhel} <= 6) || (0%{?fedora} && 0%{?fedora} <= 14)
|
||||
%global rundir_tmpfs 0
|
||||
%else
|
||||
%global rundir_tmpfs 1
|
||||
%endif
|
||||
|
||||
# systemd-units merged into systemd at Fedora 17
|
||||
%if (0%{?fedora} && 0%{?fedora} <= 16)
|
||||
%global systemd_units systemd-units
|
||||
%else
|
||||
%global systemd_units systemd
|
||||
%endif
|
||||
|
||||
Name: mod_fcgid
|
||||
Version: 2.3.9
|
||||
Release: 10%{?dist}
|
||||
Release: 11%{?dist}
|
||||
Summary: FastCGI interface module for Apache 2
|
||||
Group: System Environment/Daemons
|
||||
License: ASL 2.0
|
||||
URL: http://httpd.apache.org/mod_fcgid/
|
||||
Source0: http://www.apache.org/dist/httpd/mod_fcgid/mod_fcgid-%{version}.tar.bz2
|
||||
@ -45,32 +45,16 @@ Source2: mod_fcgid-2.1-README.RPM
|
||||
Source3: mod_fcgid-2.1-README.SELinux
|
||||
Source4: mod_fcgid-tmpfs.conf
|
||||
Source5: fcgid24.conf
|
||||
Source10: fastcgi.te
|
||||
Source11: fastcgi-2.5.te
|
||||
Source12: fastcgi.fc
|
||||
Patch0: mod_fcgid-2.3.4-fixconf-shellbang.patch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
|
||||
BuildRequires: httpd-devel >= 2.0, pkgconfig
|
||||
BuildRequires: coreutils
|
||||
BuildRequires: httpd-devel >= 2.0
|
||||
BuildRequires: make
|
||||
BuildRequires: pkgconfig
|
||||
BuildRequires: sed
|
||||
Requires: httpd-mmn = %{_httpd_mmn}
|
||||
# systemd-units needed for ownership of /usr/lib/tmpfiles.d directory
|
||||
%if 0%{?fedora} > 14 || 0%{?rhel} > 6
|
||||
Requires: systemd-units
|
||||
%endif
|
||||
# Make sure that selinux-policy is sufficiently up-to-date if it's installed
|
||||
# FastCGI policy properly incorporated into EL 5.5
|
||||
%if "%{?rhel}" == "5"
|
||||
Conflicts: selinux-policy < 2.4.6-279.el5
|
||||
# No provide here because selinux-policy >= 2.4.6-279.el5 does the providing
|
||||
Obsoletes: mod_fcgid-selinux <= %{version}-%{release}
|
||||
%endif
|
||||
%if "%{?fedora}" == "8"
|
||||
Conflicts: selinux-policy < 3.0.8-123.fc8
|
||||
%endif
|
||||
%if "%{?fedora}" == "9"
|
||||
Conflicts: selinux-policy < 3.3.1-107.fc9
|
||||
%endif
|
||||
%if "%{?fedora}" == "10"
|
||||
Conflicts: selinux-policy < 3.5.13-8.fc10
|
||||
# %%systemd_units needed for ownership of %%{_tmpfilesdir}
|
||||
%if %{rundir_tmpfs}
|
||||
Requires: %{systemd_units}
|
||||
%endif
|
||||
|
||||
%description
|
||||
@ -79,60 +63,23 @@ mod_fcgid has a new process management strategy, which concentrates on reducing
|
||||
the number of fastcgi servers, and kicking out corrupt fastcgi servers as soon
|
||||
as possible.
|
||||
|
||||
%if %{selinux_module}
|
||||
%package selinux
|
||||
Summary: SELinux policy module supporting FastCGI applications with mod_fcgid
|
||||
Group: System Environment/Base
|
||||
BuildRequires: %{selinux_buildreqs}
|
||||
# selinux-policy is required for directory ownership of %%{_datadir}/selinux/*
|
||||
#
|
||||
# version requirement is a hack to avoid problems mixing new modules with older policy,
|
||||
# e.g. http://www.redhat.com/archives/fedora-selinux-list/2006-May/msg00102.html
|
||||
# _selinux_policy_version introduced in F-20 (#999584), but can be emulated by
|
||||
# pulling the policy version number from the policyhelp file on older distributions
|
||||
%{!?_selinux_policy_version: %global _selinux_policy_version %(sed -e 's,.*selinux-policy-\\([^/]*\\)/.*,\\1,' /usr/share/selinux/devel/policyhelp 2>/dev/null || echo 0.0.0)}
|
||||
%global selinux_policynum %(echo %{_selinux_policy_version} | awk -F. '{ printf "%d%02d%02d", $1, $2, $3 }')
|
||||
Requires: selinux-policy >= %{_selinux_policy_version}
|
||||
Requires: %{name} = %{version}-%{release}
|
||||
Requires(post): /usr/sbin/semodule, /sbin/restorecon
|
||||
Requires(postun): /usr/sbin/semodule, /sbin/restorecon
|
||||
|
||||
%description selinux
|
||||
SELinux policy module supporting FastCGI applications with mod_fcgid.
|
||||
%endif
|
||||
|
||||
%prep
|
||||
%setup -q
|
||||
cp -p %{SOURCE1} fcgid.conf
|
||||
cp -p %{SOURCE2} README.RPM
|
||||
cp -p %{SOURCE3} README.SELinux
|
||||
cp -p %{SOURCE5} fcgid24.conf
|
||||
%if 0%{?selinux_policynum} < 20501
|
||||
cp -p %{SOURCE10} fastcgi.te
|
||||
%else
|
||||
cp -p %{SOURCE11} fastcgi.te
|
||||
%endif
|
||||
cp -p %{SOURCE12} fastcgi.fc
|
||||
|
||||
# Fix shellbang in fixconf script for our location of sed
|
||||
%if 0%{?fedora} < 24 && 0%{?rhel} < 8
|
||||
%if (0%{?rhel} && 0%{?rhel} <= 7) || (0%{?fedora} && 0%{?fedora} <= 23)
|
||||
%patch0 -p1
|
||||
%endif
|
||||
|
||||
%build
|
||||
APXS=%{_httpd_apxs} ./configure.apxs
|
||||
make
|
||||
%if %{selinux_module}
|
||||
for selinuxvariant in %{selinux_variants}
|
||||
do
|
||||
make NAME=${selinuxvariant} -f /usr/share/selinux/devel/Makefile
|
||||
mv fastcgi.pp fastcgi.pp.${selinuxvariant}
|
||||
make NAME=${selinuxvariant} -f /usr/share/selinux/devel/Makefile clean
|
||||
done
|
||||
%endif
|
||||
|
||||
%install
|
||||
rm -rf %{buildroot}
|
||||
make DESTDIR=%{buildroot} MKINSTALLDIRS="mkdir -p" install
|
||||
%if %{httpd24}
|
||||
mkdir -p %{buildroot}{%{_httpd_confdir},%{_httpd_modconfdir}}
|
||||
@ -152,49 +99,9 @@ rm -rf %{buildroot}%{_var}/www/manual
|
||||
|
||||
# Make sure %%{rundir}/mod_fcgid exists at boot time for systems
|
||||
# with %%{rundir} on tmpfs (#656625)
|
||||
%if 0%{?fedora} > 14 || 0%{?rhel} > 6
|
||||
install -d -m 755 %{buildroot}%{_prefix}/lib/tmpfiles.d
|
||||
install -p -m 644 %{SOURCE4} %{buildroot}%{_prefix}/lib/tmpfiles.d/mod_fcgid.conf
|
||||
%endif
|
||||
|
||||
# Install SELinux policy modules
|
||||
%if %{selinux_module}
|
||||
for selinuxvariant in %{selinux_variants}
|
||||
do
|
||||
install -d %{buildroot}%{_datadir}/selinux/${selinuxvariant}
|
||||
install -p -m 644 fastcgi.pp.${selinuxvariant} \
|
||||
%{buildroot}%{_datadir}/selinux/${selinuxvariant}/fastcgi.pp
|
||||
done
|
||||
# Hardlink identical policy module packages together
|
||||
hardlink -cv %{buildroot}%{_datadir}/selinux
|
||||
%endif
|
||||
|
||||
%clean
|
||||
rm -rf %{buildroot}
|
||||
|
||||
%if %{selinux_module}
|
||||
%post selinux
|
||||
# Install SELinux policy modules
|
||||
for selinuxvariant in %{selinux_variants}
|
||||
do
|
||||
/usr/sbin/semodule -s ${selinuxvariant} -i \
|
||||
%{_datadir}/selinux/${selinuxvariant}/fastcgi.pp &> /dev/null || :
|
||||
done
|
||||
# Fix up non-standard directory context from earlier packages
|
||||
/sbin/restorecon -R %{rundir}/mod_fcgid || :
|
||||
|
||||
%postun selinux
|
||||
# Clean up after package removal
|
||||
if [ $1 -eq 0 ]; then
|
||||
# Remove SELinux policy modules
|
||||
for selinuxvariant in %{selinux_variants}; do
|
||||
/usr/sbin/semodule -s ${selinuxvariant} -r fastcgi &> /dev/null || :
|
||||
done
|
||||
# Clean up any remaining file contexts (shouldn't be any really)
|
||||
[ -d %{rundir}/mod_fcgid ] && \
|
||||
/sbin/restorecon -R %{rundir}/mod_fcgid &> /dev/null || :
|
||||
fi
|
||||
exit 0
|
||||
%if %{rundir_tmpfs}
|
||||
install -d -m 755 %{buildroot}%{_tmpfilesdir}
|
||||
install -p -m 644 %{SOURCE4} %{buildroot}%{_tmpfilesdir}/mod_fcgid.conf
|
||||
%endif
|
||||
|
||||
%files
|
||||
@ -203,6 +110,7 @@ exit 0
|
||||
%else
|
||||
%doc LICENSE-FCGID
|
||||
%endif
|
||||
%doc README.RPM README.SELinux
|
||||
# mod_fcgid.html.en is explicitly encoded as ISO-8859-1
|
||||
%doc CHANGES-FCGID NOTICE-FCGID README-FCGID STATUS-FCGID
|
||||
%doc docs/manual/mod/mod_fcgid.html.en modules/fcgid/ChangeLog
|
||||
@ -212,18 +120,19 @@ exit 0
|
||||
%config(noreplace) %{_httpd_modconfdir}/10-fcgid.conf
|
||||
%endif
|
||||
%config(noreplace) %{_httpd_confdir}/fcgid.conf
|
||||
%if 0%{?fedora} > 14 || 0%{?rhel} > 6
|
||||
%{_prefix}/lib/tmpfiles.d/mod_fcgid.conf
|
||||
%if %{rundir_tmpfs}
|
||||
%{_tmpfilesdir}/mod_fcgid.conf
|
||||
%endif
|
||||
%dir %attr(0755,apache,apache) %{rundir}/mod_fcgid/
|
||||
|
||||
%if %{selinux_module}
|
||||
%files selinux
|
||||
%doc fastcgi.fc fastcgi.te README.SELinux
|
||||
%{_datadir}/selinux/*/fastcgi.pp
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Fri Jan 26 2018 Paul Howarth <paul@city-fan.org> - 2.3.9-11
|
||||
- Drop SELinux policy module: all supported targets have it in base policy now
|
||||
- Update README.SELinux to current types and ship it
|
||||
- Use forward-looking conditionals
|
||||
- One build requirement per line
|
||||
- Drop legacy Group: tag
|
||||
|
||||
* Thu Aug 03 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2.3.9-10
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user