import mod_fcgid-2.3.9-16.el8
This commit is contained in:
commit
4afc2bc468
2
.gitignore
vendored
Normal file
2
.gitignore
vendored
Normal file
@ -0,0 +1,2 @@
|
||||
SOURCES/mod_fcgid-2.1-README.RPM
|
||||
SOURCES/mod_fcgid-2.3.9.tar.bz2
|
2
.mod_fcgid.metadata
Normal file
2
.mod_fcgid.metadata
Normal file
@ -0,0 +1,2 @@
|
||||
5a512f8879313c94e3ee86d664683277506d74a9 SOURCES/mod_fcgid-2.1-README.RPM
|
||||
f0b6d87dfcfe18b318905a3f91274051f3f17945 SOURCES/mod_fcgid-2.3.9.tar.bz2
|
63
SOURCES/fastcgi-2.5.te
Normal file
63
SOURCES/fastcgi-2.5.te
Normal file
@ -0,0 +1,63 @@
|
||||
# This policy module provides support for mod_fcgid using the httpd system script domain.
|
||||
# It provides "allow" rules that will overlap to varying degrees with selinux-policy
|
||||
# packages for Fedora 5 onwards, and is a stepping stone to the merged policy included
|
||||
# as updates for selinux-policy in Fedora 8, 9, and 10.
|
||||
#
|
||||
# Rules existing in selinux-policy 2.6.4 (F7) have been stripped from this policy
|
||||
#
|
||||
# Previous versions of this policy module used a separate domain, httpd_fastcgi_script_t,
|
||||
# which is now an alias for httpd_sys_script_t.
|
||||
|
||||
policy_module(fastcgi, 0.2.6)
|
||||
|
||||
require {
|
||||
type devpts_t;
|
||||
type httpd_t;
|
||||
type httpd_log_t;
|
||||
type httpd_sys_content_t;
|
||||
type httpd_sys_content_ra_t;
|
||||
type httpd_sys_content_ro_t;
|
||||
type httpd_sys_content_rw_t;
|
||||
type httpd_sys_script_exec_t;
|
||||
type httpd_sys_script_ra_t;
|
||||
type httpd_sys_script_ro_t;
|
||||
type httpd_sys_script_rw_t;
|
||||
type httpd_sys_script_t;
|
||||
type httpd_tmp_t;
|
||||
type httpd_var_run_t;
|
||||
};
|
||||
|
||||
# Type aliases for contexts used with older policy modules
|
||||
typealias httpd_sys_content_t alias httpd_fastcgi_content_t;
|
||||
typealias httpd_sys_content_ra_t alias httpd_fastcgi_content_ra_t;
|
||||
typealias httpd_sys_content_ro_t alias httpd_fastcgi_content_ro_t;
|
||||
typealias httpd_sys_content_rw_t alias httpd_fastcgi_content_rw_t;
|
||||
typealias httpd_sys_script_exec_t alias httpd_fastcgi_script_exec_t;
|
||||
typealias httpd_sys_script_ra_t alias httpd_fastcgi_script_ra_t;
|
||||
typealias httpd_sys_script_ro_t alias httpd_fastcgi_script_ro_t;
|
||||
typealias httpd_sys_script_rw_t alias httpd_fastcgi_script_rw_t;
|
||||
typealias httpd_sys_script_t alias httpd_fastcgi_script_t;
|
||||
typealias httpd_var_run_t alias httpd_fastcgi_var_run_t;
|
||||
|
||||
# ==========================================================
|
||||
# Re-use httpd_sys_script_t for mod_fcgid apps
|
||||
# ==========================================================
|
||||
|
||||
# Allow web applications to call getpw* functions
|
||||
auth_use_nsswitch(httpd_sys_script_t)
|
||||
|
||||
# Allow httpd to create and use files and sockets for communicating with mod_fcgid
|
||||
# Rules to do this are already in selinux-policy apart from dir setattr
|
||||
setattr_dirs_pattern(httpd_t,httpd_var_run_t,httpd_var_run_t)
|
||||
|
||||
# Allow FastCGI applications to listen for FastCGI requests on their
|
||||
# sockets and respond to them
|
||||
allow httpd_sys_script_t httpd_t:unix_stream_socket { rw_stream_socket_perms };
|
||||
|
||||
# These are probably leaked file descriptors
|
||||
dontaudit httpd_t devpts_t:chr_file ioctl;
|
||||
dontaudit httpd_sys_script_t httpd_log_t:file ioctl;
|
||||
|
||||
# PHP uploads a file to /tmp and then execs programs to action them
|
||||
# Rules to do this are already in selinux-policy 2.6.4 (F7) apart from filetrans
|
||||
files_tmp_filetrans(httpd_sys_script_t,httpd_sys_script_rw_t,{ dir file lnk_file sock_file fifo_file })
|
1
SOURCES/fastcgi.fc
Normal file
1
SOURCES/fastcgi.fc
Normal file
@ -0,0 +1 @@
|
||||
/var/run/mod_fcgid(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
71
SOURCES/fastcgi.te
Normal file
71
SOURCES/fastcgi.te
Normal file
@ -0,0 +1,71 @@
|
||||
# This policy module provides support for mod_fcgid using the httpd system script domain.
|
||||
# It provides "allow" rules that will overlap to varying degrees with selinux-policy
|
||||
# packages for Fedora 5 onwards, and is a stepping stone to the merged policy included
|
||||
# as updates for selinux-policy in Fedora 8, 9, and 10.
|
||||
#
|
||||
# Rules existing in selinux-policy 2.3.7 (FC5) have been stripped from this policy
|
||||
#
|
||||
# Previous versions of this policy module used a separate domain, httpd_fastcgi_script_t,
|
||||
# which is now an alias for httpd_sys_script_t.
|
||||
|
||||
policy_module(fastcgi, 0.1.11)
|
||||
|
||||
require {
|
||||
type devpts_t;
|
||||
type httpd_t;
|
||||
type httpd_log_t;
|
||||
type httpd_sys_content_t;
|
||||
type httpd_sys_script_exec_t;
|
||||
type httpd_sys_script_ra_t;
|
||||
type httpd_sys_script_ro_t;
|
||||
type httpd_sys_script_rw_t;
|
||||
type httpd_sys_script_t;
|
||||
type httpd_tmp_t;
|
||||
type httpd_var_run_t;
|
||||
};
|
||||
|
||||
# Type aliases for contexts used with older policy modules
|
||||
typealias httpd_sys_content_t alias httpd_fastcgi_content_t;
|
||||
typealias httpd_sys_script_exec_t alias httpd_fastcgi_script_exec_t;
|
||||
typealias httpd_sys_script_ra_t alias httpd_fastcgi_script_ra_t;
|
||||
typealias httpd_sys_script_ro_t alias httpd_fastcgi_script_ro_t;
|
||||
typealias httpd_sys_script_rw_t alias httpd_fastcgi_script_rw_t;
|
||||
typealias httpd_sys_script_t alias httpd_fastcgi_script_t;
|
||||
typealias httpd_var_run_t alias httpd_fastcgi_var_run_t;
|
||||
|
||||
# ==========================================================
|
||||
# Re-use httpd_sys_script_t for mod_fcgid apps
|
||||
# ==========================================================
|
||||
|
||||
# Allow web applications to call getpw* functions
|
||||
auth_use_nsswitch(httpd_sys_script_t)
|
||||
|
||||
# Allow httpd to create and use files and sockets for communicating with mod_fcgid
|
||||
# Rules to do this are already in selinux-policy apart from dir setattr
|
||||
allow httpd_t httpd_var_run_t:dir setattr;
|
||||
|
||||
# Allow FastCGI applications to listen for FastCGI requests on their
|
||||
# sockets and respond to them
|
||||
allow httpd_sys_script_t httpd_t:unix_stream_socket { rw_stream_socket_perms };
|
||||
|
||||
# These are probably leaked file descriptors
|
||||
dontaudit httpd_t devpts_t:chr_file ioctl;
|
||||
dontaudit httpd_sys_script_t httpd_log_t:file ioctl;
|
||||
|
||||
# Search automount filesystem to use automatically mounted filesystems
|
||||
fs_search_auto_mountpoints(httpd_sys_script_t)
|
||||
|
||||
# PHP uploads a file to /tmp and then execs programs to action them
|
||||
allow httpd_sys_script_t httpd_tmp_t:dir manage_dir_perms;
|
||||
allow httpd_sys_script_t httpd_tmp_t:file manage_file_perms;
|
||||
files_tmp_filetrans(httpd_sys_script_t,httpd_sys_script_rw_t,{ dir file lnk_file sock_file fifo_file })
|
||||
|
||||
# Support network home directories
|
||||
tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs',`
|
||||
fs_read_nfs_files(httpd_sys_script_t)
|
||||
fs_read_nfs_symlinks(httpd_sys_script_t)
|
||||
')
|
||||
tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',`
|
||||
fs_read_cifs_files(httpd_sys_script_t)
|
||||
fs_read_cifs_symlinks(httpd_sys_script_t)
|
||||
')
|
14
SOURCES/fcgid.conf
Normal file
14
SOURCES/fcgid.conf
Normal file
@ -0,0 +1,14 @@
|
||||
# This is the Apache server configuration file for providing FastCGI support
|
||||
# through mod_fcgid
|
||||
#
|
||||
# Documentation is available at
|
||||
# http://httpd.apache.org/mod_fcgid/mod/mod_fcgid.html
|
||||
|
||||
LoadModule fcgid_module modules/mod_fcgid.so
|
||||
|
||||
# Use FastCGI to process .fcg .fcgi & .fpl scripts
|
||||
AddHandler fcgid-script fcg fcgi fpl
|
||||
|
||||
# Sane place to put sockets and shared memory file
|
||||
FcgidIPCDir /var/run/mod_fcgid
|
||||
FcgidProcessTableFile /var/run/mod_fcgid/fcgid_shm
|
12
SOURCES/fcgid24.conf
Normal file
12
SOURCES/fcgid24.conf
Normal file
@ -0,0 +1,12 @@
|
||||
# This is the Apache server configuration file for providing FastCGI support
|
||||
# through mod_fcgid
|
||||
#
|
||||
# Documentation is available at
|
||||
# http://httpd.apache.org/mod_fcgid/mod/mod_fcgid.html
|
||||
|
||||
# Use FastCGI to process .fcg .fcgi & .fpl scripts
|
||||
AddHandler fcgid-script fcg fcgi fpl
|
||||
|
||||
# Sane place to put sockets and shared memory file
|
||||
FcgidIPCDir /run/mod_fcgid
|
||||
FcgidProcessTableFile /run/mod_fcgid/fcgid_shm
|
63
SOURCES/mod_fcgid-2.1-README.SELinux
Normal file
63
SOURCES/mod_fcgid-2.1-README.SELinux
Normal file
@ -0,0 +1,63 @@
|
||||
Using mod_fcgid with SELinux in Fedora Core 5 / RHEL 5 onwards
|
||||
==============================================================
|
||||
|
||||
Versions of this package built for Fedora Core 5, 6, or 7 include an SELinux
|
||||
policy module to support FastCGI applications. Later Fedora releases and Red
|
||||
Hat Enterprise Linux 5.3 onwards include the policy in the main selinux-policy
|
||||
package and do not require the separate module.
|
||||
|
||||
The module source (fastcgi.{fc,te}) is included for reference as documentation
|
||||
in the package.
|
||||
|
||||
The module uses the same set of SELinux types for FastCGI applications as for
|
||||
regular CGI scripts (or "system scripts" as they are known in SELinux), as
|
||||
described in "man httpd_selinux".
|
||||
|
||||
* httpd_sys_content_t
|
||||
- Set files with httpd_sys_content_t for content that is available
|
||||
from all FastCGI scripts and the daemon.
|
||||
|
||||
* httpd_sys_script_exec_t
|
||||
- Set FastCGI scripts with httpd_sys_script_exec_t to allow them to run
|
||||
with access to all system script types.
|
||||
|
||||
* httpd_sys_script_ro_t
|
||||
- Set files with httpd_sys_script_ro_t if you want httpd_sys_script_exec_t
|
||||
scripts to read but not write the data, and disallow other processes from
|
||||
access.
|
||||
|
||||
* httpd_sys_script_rw_t
|
||||
- Set files with httpd_sys_script_rw_t if you want httpd_sys_script_exec_t
|
||||
scripts to read/write the data, and disallow other processes from access.
|
||||
|
||||
* httpd_sys_script_ra_t
|
||||
- Set files with httpd_sys_script_ra_t if you want httpd_sys_script_exec_t
|
||||
scripts to read/append to the file, and disallow other processes from
|
||||
access.
|
||||
|
||||
So for the moin wiki layout described in README.RPM of the main mod_fcgid
|
||||
package, the contexts would be set as follows:
|
||||
|
||||
cd /var/www/mywiki
|
||||
chcon -t httpd_sys_content_t .
|
||||
chcon -R -t httpd_sys_script_exec_t cgi-bin
|
||||
chcon -R -t httpd_sys_script_rw_t data underlay
|
||||
|
||||
It is necessary to turn on the httpd_enable_cgi boolean to run either regular
|
||||
or FastCGI scripts:
|
||||
|
||||
setsebool -P httpd_enable_cgi 1
|
||||
|
||||
The httpd_can_sendmail boolean is used to specify whether any of your
|
||||
web applications can make outbound SMTP connections (e.g. moin sending
|
||||
notifications). By default it is off, but can be enabled as follows:
|
||||
|
||||
setsebool -P httpd_can_sendmail 1
|
||||
|
||||
Only enable this functionality if you actually need it, since it increases the
|
||||
chances that any vulnerability in any of your web applications could be
|
||||
exploited by a spammer.
|
||||
|
||||
If you have any questions or issues regarding FastCGI and SELinux, please don't
|
||||
hesitate to bring them up on fedora-selinux-list.
|
||||
|
8
SOURCES/mod_fcgid-2.3.4-fixconf-shellbang.patch
Normal file
8
SOURCES/mod_fcgid-2.3.4-fixconf-shellbang.patch
Normal file
@ -0,0 +1,8 @@
|
||||
--- mod_fcgid-2.3.4/build/fixconf.sed 2009-10-07 04:16:08.000000000 +0100
|
||||
+++ mod_fcgid-2.3.4/build/fixconf.sed 2009-10-12 09:50:14.570448865 +0100
|
||||
@@ -1,4 +1,4 @@
|
||||
-#!/usr/bin/sed -f
|
||||
+#!/bin/sed -f
|
||||
#
|
||||
# Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
# contributor license agreements. See the NOTICE file distributed with
|
16
SOURCES/mod_fcgid-2.3.9-r1847623.patch
Normal file
16
SOURCES/mod_fcgid-2.3.9-r1847623.patch
Normal file
@ -0,0 +1,16 @@
|
||||
# ./pullrev.sh 1847623
|
||||
http://svn.apache.org/viewvc?view=revision&revision=1847623
|
||||
|
||||
https://bugzilla.redhat.com/show_bug.cgi?id=1651310
|
||||
|
||||
--- mod_fcgid-2.3.9/modules/fcgid/fcgid_conf.h
|
||||
+++ mod_fcgid-2.3.9/modules/fcgid/fcgid_conf.h
|
||||
@@ -138,7 +138,7 @@
|
||||
* to limit shared memory use
|
||||
*/
|
||||
#define INITENV_KEY_LEN 64
|
||||
-#define INITENV_VAL_LEN 128
|
||||
+#define INITENV_VAL_LEN 256
|
||||
#define INITENV_CNT 64
|
||||
typedef struct {
|
||||
char initenv_key[INITENV_CNT][INITENV_KEY_LEN];
|
119
SOURCES/mod_fcgid-2.3.9-r1847624.patch
Normal file
119
SOURCES/mod_fcgid-2.3.9-r1847624.patch
Normal file
@ -0,0 +1,119 @@
|
||||
# ./pullrev.sh 1847624
|
||||
http://svn.apache.org/viewvc?view=revision&revision=1847624
|
||||
|
||||
https://bugzilla.redhat.com/show_bug.cgi?id=1654200
|
||||
|
||||
--- mod_fcgid-2.3.9/modules/fcgid/fcgid_proc_unix.c
|
||||
+++ mod_fcgid-2.3.9/modules/fcgid/fcgid_proc_unix.c
|
||||
@@ -762,14 +762,18 @@
|
||||
struct iovec vec[FCGID_VEC_COUNT];
|
||||
int nvec = 0;
|
||||
apr_bucket *e;
|
||||
+ apr_bucket_brigade *tmpbb = apr_brigade_create(output_brigade->p,
|
||||
+ output_brigade->bucket_alloc);
|
||||
|
||||
- for (e = APR_BRIGADE_FIRST(output_brigade);
|
||||
- e != APR_BRIGADE_SENTINEL(output_brigade);
|
||||
- e = APR_BUCKET_NEXT(e)) {
|
||||
+ while (!APR_BRIGADE_EMPTY(output_brigade))
|
||||
+ {
|
||||
+ e = APR_BRIGADE_FIRST(output_brigade);
|
||||
+
|
||||
apr_size_t len;
|
||||
const char* base;
|
||||
|
||||
if (APR_BUCKET_IS_METADATA(e)) {
|
||||
+ apr_bucket_delete(e);
|
||||
continue;
|
||||
}
|
||||
|
||||
@@ -780,6 +784,9 @@
|
||||
return rv;
|
||||
}
|
||||
|
||||
+ APR_BUCKET_REMOVE(e);
|
||||
+ APR_BRIGADE_INSERT_TAIL(tmpbb, e);
|
||||
+
|
||||
vec[nvec].iov_len = len;
|
||||
vec[nvec].iov_base = (char*) base;
|
||||
if (nvec == (FCGID_VEC_COUNT - 1)) {
|
||||
@@ -789,6 +796,7 @@
|
||||
FCGID_VEC_COUNT)) != APR_SUCCESS)
|
||||
return rv;
|
||||
nvec = 0;
|
||||
+ apr_brigade_cleanup(tmpbb);
|
||||
}
|
||||
else
|
||||
nvec++;
|
||||
@@ -800,6 +808,7 @@
|
||||
return rv;
|
||||
}
|
||||
|
||||
+ apr_brigade_destroy(tmpbb);
|
||||
return APR_SUCCESS;
|
||||
}
|
||||
|
||||
--- mod_fcgid-2.3.9/modules/fcgid/fcgid_proc_win.c
|
||||
+++ mod_fcgid-2.3.9/modules/fcgid/fcgid_proc_win.c
|
||||
@@ -380,19 +380,22 @@
|
||||
apr_bucket *bucket_request;
|
||||
apr_status_t rv;
|
||||
DWORD transferred;
|
||||
+ apr_bucket_brigade *tmpbb = apr_brigade_create(birgade_send->p,
|
||||
+ birgade_send->bucket_alloc);
|
||||
|
||||
handle_info = (fcgid_namedpipe_handle *) ipc_handle->ipc_handle_info;
|
||||
|
||||
- for (bucket_request = APR_BRIGADE_FIRST(birgade_send);
|
||||
- bucket_request != APR_BRIGADE_SENTINEL(birgade_send);
|
||||
- bucket_request = APR_BUCKET_NEXT(bucket_request))
|
||||
- {
|
||||
+ while (!APR_BRIGADE_EMPTY(birgade_send)) {
|
||||
const char *write_buf;
|
||||
apr_size_t write_buf_len;
|
||||
apr_size_t has_write;
|
||||
|
||||
- if (APR_BUCKET_IS_METADATA(bucket_request))
|
||||
+ bucket_request = APR_BRIGADE_FIRST(birgade_send);
|
||||
+
|
||||
+ if (APR_BUCKET_IS_METADATA(bucket_request)) {
|
||||
+ apr_bucket_delete(bucket_request);
|
||||
continue;
|
||||
+ }
|
||||
|
||||
if ((rv = apr_bucket_read(bucket_request, &write_buf, &write_buf_len,
|
||||
APR_BLOCK_READ)) != APR_SUCCESS) {
|
||||
@@ -401,6 +404,9 @@
|
||||
return rv;
|
||||
}
|
||||
|
||||
+ APR_BUCKET_REMOVE(bucket_request);
|
||||
+ APR_BRIGADE_INSERT_TAIL(tmpbb, bucket_request);
|
||||
+
|
||||
/* Write the buffer to fastcgi server */
|
||||
has_write = 0;
|
||||
while (has_write < write_buf_len) {
|
||||
@@ -411,6 +417,7 @@
|
||||
write_buf_len - has_write,
|
||||
&byteswrite, &handle_info->overlap_write)) {
|
||||
has_write += byteswrite;
|
||||
+ apr_brigade_cleanup(tmpbb);
|
||||
continue;
|
||||
} else if ((rv = GetLastError()) != ERROR_IO_PENDING) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_WARNING,
|
||||
@@ -437,6 +444,7 @@
|
||||
return APR_ESPIPE;
|
||||
}
|
||||
has_write += transferred;
|
||||
+ apr_brigade_cleanup(tmpbb);
|
||||
continue;
|
||||
} else {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0,
|
||||
@@ -448,6 +456,7 @@
|
||||
}
|
||||
}
|
||||
|
||||
+ apr_brigade_destroy(tmpbb);
|
||||
return APR_SUCCESS;
|
||||
}
|
||||
|
87
SOURCES/mod_fcgid-2.3.9-r1848298.patch
Normal file
87
SOURCES/mod_fcgid-2.3.9-r1848298.patch
Normal file
@ -0,0 +1,87 @@
|
||||
# ./pullrev.sh 1848298
|
||||
|
||||
http://svn.apache.org/viewvc?view=revision&revision=1848298
|
||||
|
||||
https://bugzilla.redhat.com/show_bug.cgi?id=1652493
|
||||
|
||||
--- mod_fcgid-2.3.9/modules/fcgid/fcgid_bridge.c
|
||||
+++ mod_fcgid-2.3.9/modules/fcgid/fcgid_bridge.c
|
||||
@@ -526,7 +526,8 @@
|
||||
}
|
||||
|
||||
static int add_request_body(request_rec *r, apr_pool_t *request_pool,
|
||||
- apr_bucket_brigade *output_brigade)
|
||||
+ apr_bucket_brigade *output_brigade,
|
||||
+ apr_off_t *body_length)
|
||||
{
|
||||
apr_bucket *bucket_input, *bucket_header;
|
||||
apr_file_t *fd = NULL;
|
||||
@@ -729,22 +730,49 @@
|
||||
}
|
||||
APR_BRIGADE_INSERT_TAIL(output_brigade, bucket_header);
|
||||
|
||||
+ *body_length = request_size;
|
||||
+
|
||||
return 0;
|
||||
}
|
||||
|
||||
int bridge_request(request_rec * r, int role, fcgid_cmd_conf *cmd_conf)
|
||||
{
|
||||
- apr_bucket_brigade *output_brigade;
|
||||
+ apr_bucket_brigade *output_brigade, *body_brigade;
|
||||
apr_bucket *bucket_eos;
|
||||
- char **envp = ap_create_environment(r->pool,
|
||||
- r->subprocess_env);
|
||||
+ char **envp;
|
||||
int rc;
|
||||
|
||||
/* Create brigade for the request to fastcgi server */
|
||||
+ body_brigade
|
||||
+ = apr_brigade_create(r->pool, r->connection->bucket_alloc);
|
||||
output_brigade =
|
||||
apr_brigade_create(r->pool, r->connection->bucket_alloc);
|
||||
|
||||
- /* Build the begin request and environ request, append them to output_brigade */
|
||||
+ /* In responder mode, handle the request body up front to ensure
|
||||
+ * the content-length is known (even if the request body is
|
||||
+ * chunked) and sent in the header. */
|
||||
+ if (role == FCGI_RESPONDER) {
|
||||
+ apr_off_t body_length;
|
||||
+
|
||||
+ rc = add_request_body(r, r->pool, body_brigade, &body_length);
|
||||
+ if (rc) {
|
||||
+ return rc;
|
||||
+ }
|
||||
+
|
||||
+ if (body_length && !apr_table_get(r->headers_in, "Content-Length")) {
|
||||
+ ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
|
||||
+ "mod_fcgid: dechunked request body length %" APR_OFF_T_FMT,
|
||||
+ body_length);
|
||||
+
|
||||
+ apr_table_set(r->subprocess_env, "CONTENT_LENGTH",
|
||||
+ apr_off_t_toa(r->pool, body_length));
|
||||
+ apr_table_unset(r->subprocess_env, "HTTP_TRANSFER_ENCODING");
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
+ envp = ap_create_environment(r->pool, r->subprocess_env);
|
||||
+
|
||||
+ /* Build the begin request and environ request, add them to output_brigade */
|
||||
if (!build_begin_block
|
||||
(role, r, r->connection->bucket_alloc, output_brigade)
|
||||
|| !build_env_block(r, envp, r->connection->bucket_alloc,
|
||||
@@ -754,12 +782,8 @@
|
||||
return HTTP_INTERNAL_SERVER_ERROR;
|
||||
}
|
||||
|
||||
- if (role == FCGI_RESPONDER) {
|
||||
- rc = add_request_body(r, r->pool, output_brigade);
|
||||
- if (rc) {
|
||||
- return rc;
|
||||
- }
|
||||
- }
|
||||
+ /* Append the body output. */
|
||||
+ APR_BRIGADE_CONCAT(output_brigade, body_brigade);
|
||||
|
||||
/* The eos bucket now */
|
||||
bucket_eos = apr_bucket_eos_create(r->connection->bucket_alloc);
|
40
SOURCES/mod_fcgid-2.3.9-r1848311.patch
Normal file
40
SOURCES/mod_fcgid-2.3.9-r1848311.patch
Normal file
@ -0,0 +1,40 @@
|
||||
# ./pullrev.sh 1848311
|
||||
http://svn.apache.org/viewvc?view=revision&revision=1848311
|
||||
|
||||
https://bugzilla.redhat.com/show_bug.cgi?id=1655035
|
||||
|
||||
--- mod_fcgid-2.3.9/modules/fcgid/config.m4
|
||||
+++ mod_fcgid-2.3.9/modules/fcgid/config.m4
|
||||
@@ -43,6 +43,11 @@
|
||||
AC_CHECK_HEADERS(sys/mman.h)
|
||||
AC_CHECK_HEADERS(sys/mutex.h)
|
||||
AC_CHECK_HEADERS(sys/shm.h)
|
||||
+ if test "x$enable_fcgid" = "xshared"; then
|
||||
+ # The only symbol which needs to be exported is the module
|
||||
+ # structure, so ask libtool to hide everything else:
|
||||
+ APR_ADDTO(MOD_FCGID_LDADD, [-export-symbols-regex fcgid_module])
|
||||
+ fi
|
||||
])
|
||||
|
||||
dnl # end of module specific part
|
||||
--- mod_fcgid-2.3.9/modules/fcgid/Makefile.apxs
|
||||
+++ mod_fcgid-2.3.9/modules/fcgid/Makefile.apxs
|
||||
@@ -16,6 +16,7 @@
|
||||
builddir=.
|
||||
srcdir=.
|
||||
|
||||
+MOD_FCGID_LDADD = -export-symbols-regex fcgid_module
|
||||
CLEAN_TARGETS = *.loT
|
||||
include $(exp_installbuilddir)/special.mk
|
||||
|
||||
--- mod_fcgid-2.3.9/modules/fcgid/modules.mk.apxs
|
||||
+++ mod_fcgid-2.3.9/modules/fcgid/modules.mk.apxs
|
||||
@@ -17,7 +17,7 @@
|
||||
# this is used/needed by the APACHE2 build system
|
||||
#
|
||||
mod_fcgid.la: mod_fcgid.slo fcgid_bridge.slo fcgid_conf.slo fcgid_pm_main.slo fcgid_protocol.slo fcgid_spawn_ctl.slo fcgid_proctbl_unix.slo fcgid_pm_unix.slo fcgid_proc_unix.slo fcgid_bucket.slo fcgid_filter.slo fcgid_mutex_unix.slo
|
||||
- $(SH_LINK) -rpath $(libexecdir) -module -avoid-version mod_fcgid.lo fcgid_bridge.lo fcgid_conf.lo fcgid_pm_main.lo fcgid_protocol.lo fcgid_spawn_ctl.lo fcgid_proctbl_unix.lo fcgid_pm_unix.lo fcgid_proc_unix.lo fcgid_bucket.lo fcgid_filter.lo fcgid_mutex_unix.lo
|
||||
+ $(SH_LINK) -rpath $(libexecdir) -module -avoid-version mod_fcgid.lo fcgid_bridge.lo fcgid_conf.lo fcgid_pm_main.lo fcgid_protocol.lo fcgid_spawn_ctl.lo fcgid_proctbl_unix.lo fcgid_pm_unix.lo fcgid_proc_unix.lo fcgid_bucket.lo fcgid_filter.lo fcgid_mutex_unix.lo $(MOD_FCGID_LDADD)
|
||||
DISTCLEAN_TARGETS = modules.mk
|
||||
static =
|
||||
shared = mod_fcgid.la
|
1
SOURCES/mod_fcgid-tmpfs.conf
Normal file
1
SOURCES/mod_fcgid-tmpfs.conf
Normal file
@ -0,0 +1 @@
|
||||
d /run/mod_fcgid 0775 root apache
|
555
SPECS/mod_fcgid.spec
Normal file
555
SPECS/mod_fcgid.spec
Normal file
@ -0,0 +1,555 @@
|
||||
# Fedora 5, 6, and 7 versions includes SELinux policy module package
|
||||
# Fedora 8 and 9 versions include policy in errata selinux-policy releases
|
||||
# Fedora 10 onwards include policy in standard selinux-policy releases
|
||||
# RHEL 5.5 onwards include policy in standard selinux-policy releases
|
||||
%if 0%{?fedora} < 5 || 0%{?fedora} > 7 || 0%{?rhel}
|
||||
%global selinux_module 0
|
||||
%global selinux_types %{nil}
|
||||
%global selinux_variants %{nil}
|
||||
%global selinux_buildreqs %{nil}
|
||||
%else
|
||||
%global selinux_module 1
|
||||
%global selinux_types %(awk '/^#[[:space:]]*SELINUXTYPE=/,/^[^#]/ { if ($3 == "-") printf "%s ", $2 }' /etc/selinux/config 2>/dev/null)
|
||||
%global selinux_variants %([ -z "%{selinux_types}" ] && echo mls strict targeted || echo %{selinux_types})
|
||||
%global selinux_buildreqs checkpolicy, selinux-policy-devel, hardlink
|
||||
%endif
|
||||
|
||||
# apxs script location
|
||||
%{!?_httpd_apxs: %global _httpd_apxs %{_sbindir}/apxs}
|
||||
|
||||
# Module Magic Number
|
||||
%{!?_httpd_mmn: %global _httpd_mmn %(cat %{_includedir}/httpd/.mmn 2>/dev/null || echo 0-0)}
|
||||
|
||||
# Configuration directory
|
||||
%{!?_httpd_confdir: %global _httpd_confdir %{_sysconfdir}/httpd/conf.d}
|
||||
|
||||
# For httpd ≥ 2.4 we have a different filesystem layout
|
||||
%if 0%{?fedora} > 17 || 0%{?rhel} > 6
|
||||
%global httpd24 1
|
||||
%global rundir /run
|
||||
%else
|
||||
%global httpd24 0
|
||||
%global rundir %{_localstatedir}/run
|
||||
%endif
|
||||
|
||||
Name: mod_fcgid
|
||||
Version: 2.3.9
|
||||
Release: 16%{?dist}
|
||||
Summary: FastCGI interface module for Apache 2
|
||||
Group: System Environment/Daemons
|
||||
License: ASL 2.0
|
||||
URL: http://httpd.apache.org/mod_fcgid/
|
||||
Source0: http://www.apache.org/dist/httpd/mod_fcgid/mod_fcgid-%{version}.tar.bz2
|
||||
Source1: fcgid.conf
|
||||
Source2: mod_fcgid-2.1-README.RPM
|
||||
Source3: mod_fcgid-2.1-README.SELinux
|
||||
Source4: mod_fcgid-tmpfs.conf
|
||||
Source5: fcgid24.conf
|
||||
Source10: fastcgi.te
|
||||
Source11: fastcgi-2.5.te
|
||||
Source12: fastcgi.fc
|
||||
Patch0: mod_fcgid-2.3.4-fixconf-shellbang.patch
|
||||
Patch1: mod_fcgid-2.3.9-r1847623.patch
|
||||
Patch2: mod_fcgid-2.3.9-r1848298.patch
|
||||
Patch3: mod_fcgid-2.3.9-r1847624.patch
|
||||
Patch4: mod_fcgid-2.3.9-r1848311.patch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
|
||||
BuildRequires: httpd-devel >= 2.0, pkgconfig
|
||||
Requires: httpd-mmn = %{_httpd_mmn}
|
||||
# systemd-units needed for ownership of /usr/lib/tmpfiles.d directory
|
||||
%if 0%{?fedora} > 14 || 0%{?rhel} > 6
|
||||
Requires: systemd-units
|
||||
%endif
|
||||
# Make sure that selinux-policy is sufficiently up-to-date if it's installed
|
||||
# FastCGI policy properly incorporated into EL 5.5
|
||||
%if "%{?rhel}" == "5"
|
||||
Conflicts: selinux-policy < 2.4.6-279.el5
|
||||
# No provide here because selinux-policy >= 2.4.6-279.el5 does the providing
|
||||
Obsoletes: mod_fcgid-selinux <= %{version}-%{release}
|
||||
%endif
|
||||
%if "%{?fedora}" == "8"
|
||||
Conflicts: selinux-policy < 3.0.8-123.fc8
|
||||
%endif
|
||||
%if "%{?fedora}" == "9"
|
||||
Conflicts: selinux-policy < 3.3.1-107.fc9
|
||||
%endif
|
||||
%if "%{?fedora}" == "10"
|
||||
Conflicts: selinux-policy < 3.5.13-8.fc10
|
||||
%endif
|
||||
|
||||
%description
|
||||
mod_fcgid is a binary-compatible alternative to the Apache module mod_fastcgi.
|
||||
mod_fcgid has a new process management strategy, which concentrates on reducing
|
||||
the number of fastcgi servers, and kicking out corrupt fastcgi servers as soon
|
||||
as possible.
|
||||
|
||||
%if %{selinux_module}
|
||||
%package selinux
|
||||
Summary: SELinux policy module supporting FastCGI applications with mod_fcgid
|
||||
Group: System Environment/Base
|
||||
BuildRequires: %{selinux_buildreqs}
|
||||
# selinux-policy is required for directory ownership of %%{_datadir}/selinux/*
|
||||
#
|
||||
# version requirement is a hack to avoid problems mixing new modules with older policy,
|
||||
# e.g. http://www.redhat.com/archives/fedora-selinux-list/2006-May/msg00102.html
|
||||
# _selinux_policy_version introduced in F-20 (#999584), but can be emulated by
|
||||
# pulling the policy version number from the policyhelp file on older distributions
|
||||
%{!?_selinux_policy_version: %global _selinux_policy_version %(sed -e 's,.*selinux-policy-\\([^/]*\\)/.*,\\1,' /usr/share/selinux/devel/policyhelp 2>/dev/null || echo 0.0.0)}
|
||||
%global selinux_policynum %(echo %{_selinux_policy_version} | awk -F. '{ printf "%d%02d%02d", $1, $2, $3 }')
|
||||
Requires: selinux-policy >= %{_selinux_policy_version}
|
||||
Requires: %{name} = %{version}-%{release}
|
||||
Requires(post): /usr/sbin/semodule, /sbin/restorecon
|
||||
Requires(postun): /usr/sbin/semodule, /sbin/restorecon
|
||||
|
||||
%description selinux
|
||||
SELinux policy module supporting FastCGI applications with mod_fcgid.
|
||||
%endif
|
||||
|
||||
%prep
|
||||
%setup -q
|
||||
cp -p %{SOURCE1} fcgid.conf
|
||||
cp -p %{SOURCE2} README.RPM
|
||||
cp -p %{SOURCE3} README.SELinux
|
||||
cp -p %{SOURCE5} fcgid24.conf
|
||||
%if 0%{?selinux_policynum} < 20501
|
||||
cp -p %{SOURCE10} fastcgi.te
|
||||
%else
|
||||
cp -p %{SOURCE11} fastcgi.te
|
||||
%endif
|
||||
cp -p %{SOURCE12} fastcgi.fc
|
||||
|
||||
# Fix shellbang in fixconf script for our location of sed
|
||||
%if 0%{?fedora} < 24 && 0%{?rhel} < 8
|
||||
%patch0 -p1
|
||||
%endif
|
||||
%patch1 -p1 -b .r1847623
|
||||
%patch2 -p1 -b .r1848298
|
||||
%patch3 -p1 -b .r1847624
|
||||
%patch4 -p1 -b .r1848311
|
||||
|
||||
%build
|
||||
APXS=%{_httpd_apxs} ./configure.apxs
|
||||
make
|
||||
%if %{selinux_module}
|
||||
for selinuxvariant in %{selinux_variants}
|
||||
do
|
||||
make NAME=${selinuxvariant} -f /usr/share/selinux/devel/Makefile
|
||||
mv fastcgi.pp fastcgi.pp.${selinuxvariant}
|
||||
make NAME=${selinuxvariant} -f /usr/share/selinux/devel/Makefile clean
|
||||
done
|
||||
%endif
|
||||
|
||||
%install
|
||||
rm -rf %{buildroot}
|
||||
make DESTDIR=%{buildroot} MKINSTALLDIRS="mkdir -p" install
|
||||
%if %{httpd24}
|
||||
mkdir -p %{buildroot}{%{_httpd_confdir},%{_httpd_modconfdir}}
|
||||
echo "LoadModule fcgid_module modules/mod_fcgid.so" > %{buildroot}%{_httpd_modconfdir}/10-fcgid.conf
|
||||
install -D -m 644 fcgid24.conf %{buildroot}%{_httpd_confdir}/fcgid.conf
|
||||
%else
|
||||
install -D -m 644 fcgid.conf %{buildroot}%{_httpd_confdir}/fcgid.conf
|
||||
%endif
|
||||
install -d -m 755 %{buildroot}%{rundir}/mod_fcgid
|
||||
|
||||
# Include the manual as %%doc, don't need it elsewhere
|
||||
%if %{httpd24}
|
||||
rm -rf %{buildroot}%{_httpd_contentdir}/manual
|
||||
%else
|
||||
rm -rf %{buildroot}%{_var}/www/manual
|
||||
%endif
|
||||
|
||||
# Make sure %%{rundir}/mod_fcgid exists at boot time for systems
|
||||
# with %%{rundir} on tmpfs (#656625)
|
||||
%if 0%{?fedora} > 14 || 0%{?rhel} > 6
|
||||
install -d -m 755 %{buildroot}%{_prefix}/lib/tmpfiles.d
|
||||
install -p -m 644 %{SOURCE4} %{buildroot}%{_prefix}/lib/tmpfiles.d/mod_fcgid.conf
|
||||
%endif
|
||||
|
||||
# Install SELinux policy modules
|
||||
%if %{selinux_module}
|
||||
for selinuxvariant in %{selinux_variants}
|
||||
do
|
||||
install -d %{buildroot}%{_datadir}/selinux/${selinuxvariant}
|
||||
install -p -m 644 fastcgi.pp.${selinuxvariant} \
|
||||
%{buildroot}%{_datadir}/selinux/${selinuxvariant}/fastcgi.pp
|
||||
done
|
||||
# Hardlink identical policy module packages together
|
||||
hardlink -cv %{buildroot}%{_datadir}/selinux
|
||||
%endif
|
||||
|
||||
%clean
|
||||
rm -rf %{buildroot}
|
||||
|
||||
%if %{selinux_module}
|
||||
%post selinux
|
||||
# Install SELinux policy modules
|
||||
for selinuxvariant in %{selinux_variants}
|
||||
do
|
||||
/usr/sbin/semodule -s ${selinuxvariant} -i \
|
||||
%{_datadir}/selinux/${selinuxvariant}/fastcgi.pp &> /dev/null || :
|
||||
done
|
||||
# Fix up non-standard directory context from earlier packages
|
||||
/sbin/restorecon -R %{rundir}/mod_fcgid || :
|
||||
|
||||
%postun selinux
|
||||
# Clean up after package removal
|
||||
if [ $1 -eq 0 ]; then
|
||||
# Remove SELinux policy modules
|
||||
for selinuxvariant in %{selinux_variants}; do
|
||||
/usr/sbin/semodule -s ${selinuxvariant} -r fastcgi &> /dev/null || :
|
||||
done
|
||||
# Clean up any remaining file contexts (shouldn't be any really)
|
||||
[ -d %{rundir}/mod_fcgid ] && \
|
||||
/sbin/restorecon -R %{rundir}/mod_fcgid &> /dev/null || :
|
||||
fi
|
||||
exit 0
|
||||
%endif
|
||||
|
||||
%files
|
||||
%if 0%{?_licensedir:1}
|
||||
%license LICENSE-FCGID
|
||||
%else
|
||||
%doc LICENSE-FCGID
|
||||
%endif
|
||||
# mod_fcgid.html.en is explicitly encoded as ISO-8859-1
|
||||
%doc CHANGES-FCGID NOTICE-FCGID README-FCGID STATUS-FCGID
|
||||
%doc docs/manual/mod/mod_fcgid.html.en modules/fcgid/ChangeLog
|
||||
%doc build/fixconf.sed
|
||||
%{_libdir}/httpd/modules/mod_fcgid.so
|
||||
%if %{httpd24}
|
||||
%config(noreplace) %{_httpd_modconfdir}/10-fcgid.conf
|
||||
%endif
|
||||
%config(noreplace) %{_httpd_confdir}/fcgid.conf
|
||||
%if 0%{?fedora} > 14 || 0%{?rhel} > 6
|
||||
%{_prefix}/lib/tmpfiles.d/mod_fcgid.conf
|
||||
%endif
|
||||
%dir %attr(0775,root,apache) %{rundir}/mod_fcgid/
|
||||
|
||||
%if %{selinux_module}
|
||||
%files selinux
|
||||
%doc fastcgi.fc fastcgi.te README.SELinux
|
||||
%{_datadir}/selinux/*/fastcgi.pp
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Dec 13 2018 Joe Orton <jorton@redhat.com> - 2.3.9-16
|
||||
- restrict symbol exports in mod_fcgid.so (#1655035)
|
||||
|
||||
* Mon Dec 10 2018 Joe Orton <jorton@redhat.com> - 2.3.9-15
|
||||
- fix memory consumption for large request bodies (#1654200)
|
||||
|
||||
* Fri Dec 7 2018 Joe Orton <jorton@redhat.com> - 2.3.9-14
|
||||
- fix handling of chunked request bodies (#1656851)
|
||||
|
||||
* Fri Nov 30 2018 Joe Orton <jorton@redhat.com> - 2.3.9-13
|
||||
- increase maximum FcgidInitialEnv to 256 chars (#1651310)
|
||||
|
||||
* Thu May 03 2018 Luboš Uhliarik <luhliari@redhat.com> - 2.3.9-12
|
||||
- Related: #1564219 - SELinux prevents httpd from starting when mod_fcgid
|
||||
is installed
|
||||
|
||||
* Tue Apr 24 2018 Luboš Uhliarik <luhliari@redhat.com> - 2.3.9-11
|
||||
- Resolves: #1564219 - SELinux prevents httpd from starting when mod_fcgid
|
||||
is installed
|
||||
|
||||
* Thu Aug 03 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2.3.9-10
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
|
||||
|
||||
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2.3.9-9
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
|
||||
|
||||
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 2.3.9-8
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
|
||||
|
||||
* Fri Mar 4 2016 Paul Howarth <paul@city-fan.org> - 2.3.9-7
|
||||
- Use /usr/bin/sed rather than /bin/sed for fixconf script on modern releases
|
||||
- Drop %%defattr, redundant since rpm 4.4
|
||||
- Use %%license where possible
|
||||
|
||||
* Thu Feb 04 2016 Fedora Release Engineering <releng@fedoraproject.org> - 2.3.9-6
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
|
||||
|
||||
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.3.9-5
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
|
||||
|
||||
* Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.3.9-4
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
|
||||
|
||||
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.3.9-3
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
|
||||
|
||||
* Thu Jan 23 2014 Joe Orton <jorton@redhat.com> 2.3.9-2
|
||||
- Fix _httpd_mmn expansion in absence of httpd-devel
|
||||
|
||||
* Tue Oct 8 2013 Paul Howarth <paul@city-fan.org> 2.3.9-1
|
||||
- Update to 2.3.9
|
||||
- SECURITY: Fix possible heap buffer overwrite (CVE-2013-4365)
|
||||
- Add experimental cmake-based build system for Windows
|
||||
- Correctly parse quotation and escaped spaces in FcgidWrapper and the AAA
|
||||
Authenticator/Authorizor/Access directives' command line argument, as
|
||||
currently documented (PR#51194)
|
||||
- Honor quoted FcgidCmdOptions arguments (notably for InitialEnv
|
||||
assignments) (PR#51657)
|
||||
- Conform script response parsing with mod_cgid and ensure no response body
|
||||
is sent when ap_meets_conditions() determines that request conditions are
|
||||
met
|
||||
- Improve logging in access control hook functions
|
||||
- Avoid making internal sub-requests and processing Location headers when in
|
||||
FCGI_AUTHORIZER mode, as the auth hook functions already treat Location
|
||||
headers returned by scripts as an error since redirections are not
|
||||
meaningful in this mode
|
||||
- Revert fix for PR#53693, added in 2.3.8 but undocumented
|
||||
- Fix issues with a minor optimization added in 2.3.8
|
||||
|
||||
* Sat Aug 03 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> 2.3.7-7
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
|
||||
|
||||
* Thu Feb 14 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> 2.3.7-6
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
|
||||
|
||||
* Fri Jul 20 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> 2.3.7-5
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
|
||||
|
||||
* Wed Jul 4 2012 Paul Howarth <paul@city-fan.org> 2.3.7-4
|
||||
- Move tmpfiles.d config from %%{_sysconfdir} to %%{_prefix}/lib
|
||||
|
||||
* Wed May 2 2012 Paul Howarth <paul@city-fan.org> 2.3.7-3
|
||||
- Make %%files list more explicit
|
||||
|
||||
* Wed May 2 2012 Joe Orton <jorton@redhat.com> 2.3.7-2
|
||||
- Use 10- prefix for conf file in conf.modules.d with httpd ≥ 2.4
|
||||
- Use _httpd_confdir throughout
|
||||
|
||||
* Mon Apr 23 2012 Paul Howarth <paul@city-fan.org> 2.3.7-1
|
||||
- Update to 2.3.7
|
||||
- Introduce FcgidWin32PreventOrphans directive on Windows to use OS Job
|
||||
Control Objects to terminate all running fcgi's when the worker process
|
||||
has been abruptly terminated (PR: 51078)
|
||||
- Periodically clean out the brigades that are pulling in the request body
|
||||
for handoff to the fcgid child (PR: 51749)
|
||||
- Resolve crash during graceful restarts (PR: 50309)
|
||||
- Solve latency/congestion of resolving effective user file access rights
|
||||
when no such info is desired, for config-related filename stats (PR: 51020)
|
||||
- Fix regression in 2.3.6 that broke process controls when using
|
||||
vhost-specific configuration
|
||||
- Account for first process in class in the spawn score
|
||||
- Drop patch for CVE-2012-1181, now included in upstream release
|
||||
|
||||
* Tue Mar 27 2012 Paul Howarth <paul@city-fan.org> 2.3.6-6
|
||||
- Fix compatibility with httpd 2.4 in F-18/RHEL-7 onwards
|
||||
- Use /run rather than /var/run from F-15/RHEL-7 onwards
|
||||
|
||||
* Sun Jan 22 2012 Paul Howarth <paul@city-fan.org> 2.3.6-5
|
||||
- Fix regression in 2.3.6 that broke process controls when using vhost-specific
|
||||
configuration (upstream issue 49902, #783742, CVE-2012-1181)
|
||||
|
||||
* Fri Jan 6 2012 Paul Howarth <paul@city-fan.org> 2.3.6-4
|
||||
- Nobody else likes macros for commands
|
||||
|
||||
* Tue Feb 8 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> 2.3.6-3
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
|
||||
|
||||
* Wed Dec 1 2010 Paul Howarth <paul@city-fan.org> 2.3.6-2
|
||||
- Add /etc/tmpfiles.d/mod_fcgid.conf for builds on Fedora 15 onwards to
|
||||
support running with /var/run on tmpfs (#656625)
|
||||
|
||||
* Thu Nov 4 2010 Paul Howarth <paul@city-fan.org> 2.3.6-1
|
||||
- Update to 2.3.6 (see CHANGES-FCGID for full details)
|
||||
- Fix possible stack buffer overwrite (CVE-2010-3872)
|
||||
- Change the default for FcgidMaxRequestLen from 1GB to 128K; administrators
|
||||
should change this to an appropriate value based on site requirements
|
||||
- Correct a problem that resulted in FcgidMaxProcesses being ignored in some
|
||||
situations
|
||||
- Return 500 instead of segfaulting when the application returns no output
|
||||
- Don't include SELinux policy for RHEL-5 builds since RHEL >= 5.5 includes it
|
||||
- Explicitly require /bin/sed for fixconf script
|
||||
|
||||
* Tue Jun 8 2010 Paul Howarth <paul@city-fan.org> 2.3.5-2
|
||||
- SELinux policy module not needed for RHEL-6 onwards
|
||||
|
||||
* Wed Jan 27 2010 Paul Howarth <paul@city-fan.org> 2.3.5-1
|
||||
- Update to 2.3.5 (see CHANGES-FCGID for details)
|
||||
- Drop upstream svn patch
|
||||
|
||||
* Wed Oct 21 2009 Paul Howarth <paul@city-fan.org> 2.3.4-2
|
||||
- Add fixes from upstream svn for a number of issues, most notably that the
|
||||
fixconf script had an error in the regexp, which resulted in a prefix of
|
||||
"FcgidFcgid" on the updated directives
|
||||
|
||||
* Mon Oct 12 2009 Paul Howarth <paul@city-fan.org> 2.3.4-1
|
||||
- Update to 2.3.4 (configuration directives changed again)
|
||||
- Add fixconf.sed script for config file directives update
|
||||
|
||||
* Fri Sep 25 2009 Paul Howarth <paul@city-fan.org> 2.3.1-2.20090925svn818270
|
||||
- Update to svn revision 818270
|
||||
- DESTDIR and header detection patches upstreamed
|
||||
- Build SELinux policy module for EL-5; support in EL-5.3 is incomplete and
|
||||
will be fixed in EL-5.5 (#519369)
|
||||
- Drop aliases httpd_sys_content_r{a,o,w}_t -> httpd_fastcgi_content_r{a,o,w}_t
|
||||
from pre-2.5 SElinux policy module as these types aren't defined there
|
||||
|
||||
* Wed Sep 23 2009 Paul Howarth <paul@city-fan.org> 2.3.1-1.20090923svn817978
|
||||
- Update to post-2.3.1 svn snapshot
|
||||
- Upstream moved to apache.org
|
||||
- License changed to ASL 2.0
|
||||
- Use FCGID-prefixed config file options (old ones deprecated)
|
||||
- Lots of documentation changes
|
||||
- Renumber sources
|
||||
- Don't defer to mod_fastcgi if both are present
|
||||
- Drop gawk buildreq
|
||||
- Add patches fixing RPM build issues (DESTDIR support, header detection)
|
||||
|
||||
* Sat Jul 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.2-13
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
|
||||
|
||||
* Tue May 26 2009 Paul Howarth <paul@city-fan.org> 2.2-12
|
||||
- Don't use /etc/httpd/run as basis of "run" directory as its DAC permissions
|
||||
are not permissive enough in F-11 onwards; instead, revert to
|
||||
/var/run/mod_fcgid and tweak default config accordingly (#502273)
|
||||
|
||||
* Sun May 17 2009 Paul Howarth <paul@city-fan.org> 2.2-11
|
||||
- Follow link /etc/httpd/run and make our "run" directory a subdir of wherever
|
||||
that leads (#501123)
|
||||
|
||||
* Mon Apr 6 2009 Paul Howarth <paul@city-fan.org> 2.2-10
|
||||
- EL 5.3 now has SELinux support in the main selinux-policy package so handle
|
||||
that release as per Fedora >= 8, except that the RHEL selinux-policy package
|
||||
doesn't Obsolete/Provide mod_fcgid-selinux like the Fedora version, so do
|
||||
the obsoletion here instead
|
||||
|
||||
* Thu Feb 26 2009 Paul Howarth <paul@city-fan.org> 2.2-9
|
||||
- Update documentation for MoinMoin, Rails (#476658), and SELinux
|
||||
|
||||
* Wed Feb 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.2-8
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
|
||||
|
||||
* Wed Nov 12 2008 Paul Howarth <paul@city-fan.org> 2.2-7
|
||||
- SELinux policy module no longer built for Fedora 8 onwards as it is
|
||||
obsoleted by the main selinux-policy package
|
||||
- Conflicts for selinux-policy packages older than the releases where mod_fcgid
|
||||
policy was incorporated have been added for Fedora 8, 9, and 10 versions, to
|
||||
ensure that SELinux support will work if installed
|
||||
|
||||
* Tue Oct 21 2008 Paul Howarth <paul@city-fan.org> 2.2-6
|
||||
- SELinux policy module rewritten to merge fastcgi and system script domains
|
||||
in preparation for merge into main selinux-policy package (#462318)
|
||||
- Try to determine supported SELinux policy types by reading /etc/selinux/config
|
||||
|
||||
* Thu Jul 24 2008 Paul Howarth <paul@city-fan.org> 2.2-5
|
||||
- Tweak selinux-policy version detection macro to work with current Rawhide
|
||||
|
||||
* Thu Feb 14 2008 Paul Howarth <paul@city-fan.org> 2.2-4
|
||||
- Rebuild with gcc 4.3.0 for Fedora 9
|
||||
|
||||
* Mon Jan 14 2008 Paul Howarth <paul@city-fan.org> 2.2-3
|
||||
- Update SELinux policy to fix occasional failures on restarts
|
||||
(move shared memory file into /var/run/mod_fcgid directory)
|
||||
|
||||
* Thu Jan 3 2008 Paul Howarth <paul@city-fan.org> 2.2-2
|
||||
- Update SELinux policy to support file transition to httpd_tmp_t for
|
||||
temporary files
|
||||
|
||||
* Fri Sep 14 2007 Paul Howarth <paul@city-fan.org> 2.2-1
|
||||
- Update to version 2.2
|
||||
- Make sure docs are encoded as UTF-8
|
||||
|
||||
* Mon Sep 3 2007 Joe Orton <jorton@redhat.com> 2.1-6
|
||||
- rebuild for fixed 32-bit APR (#254241)
|
||||
|
||||
* Thu Aug 23 2007 Paul Howarth <paul@city-fan.org> 2.1-5
|
||||
- Update source URL to point to downloads.sf.net rather than dl.sf.net
|
||||
- Upstream released new tarball without changing version number, though the
|
||||
only change was in arch/win32/fcgid_pm_win.c, which is not used to build the
|
||||
RPM package
|
||||
- Clarify license as GPL (unspecified/any version)
|
||||
- Unexpand tabs in spec
|
||||
- Add buildreq of gawk
|
||||
|
||||
* Fri Aug 3 2007 Paul Howarth <paul@city-fan.org> 2.1-4
|
||||
- Add buildreq of pkgconfig, a missing dependency of both apr-devel and
|
||||
apr-util-devel on FC5
|
||||
|
||||
* Fri Jun 15 2007 Paul Howarth <paul@city-fan.org> 2.1-3
|
||||
- Major update of SELinux policy, supporting accessing data on NFS/CIFS shares
|
||||
and a new boolean, httpd_fastcgi_can_sendmail, to allow connections to SMTP
|
||||
servers
|
||||
- Fix for SELinux policy on Fedora 7, which didn't work due to changes in the
|
||||
permissions macros in the underlying selinux-policy package
|
||||
|
||||
* Wed Mar 21 2007 Paul Howarth <paul@city-fan.org> 2.1-2
|
||||
- Add RHEL5 with SELinux support
|
||||
- Rename README.Fedora to README.RPM
|
||||
|
||||
* Fri Feb 16 2007 Paul Howarth <paul@city-fan.org> 2.1-1
|
||||
- Update to 2.1
|
||||
- Update documentation and patches
|
||||
- Rename some source files to reduce chances of conflicting names
|
||||
- Include SharememPath directive in conf file to avoid unfortunate upstream
|
||||
default location
|
||||
|
||||
* Mon Oct 30 2006 Paul Howarth <paul@city-fan.org> 2.0-1
|
||||
- Update to 2.0
|
||||
- Source is now hosted at sourceforge.net
|
||||
- Update docs
|
||||
|
||||
* Wed Sep 6 2006 Paul Howarth <paul@city-fan.org> 1.10-7
|
||||
- Include the right README* files
|
||||
|
||||
* Tue Aug 29 2006 Paul Howarth <paul@city-fan.org> 1.10-6
|
||||
- Buildreqs for FC5 now identical to buildreqs for FC6 onwards
|
||||
|
||||
* Fri Jul 28 2006 Paul Howarth <paul@city-fan.org> 1.10-5
|
||||
- Split off SELinux module into separate subpackage to avoid dependency on
|
||||
the selinux-policy package for the main package
|
||||
|
||||
* Fri Jul 28 2006 Paul Howarth <paul@city-fan.org> 1.10-4
|
||||
- SELinux policy packages moved from %%{_datadir}/selinux/packages/POLICYNAME
|
||||
to %%{_datadir}/selinux/POLICYNAME
|
||||
- hardlink identical policy module packages together to avoid duplicate files
|
||||
|
||||
* Thu Jul 20 2006 Paul Howarth <paul@city-fan.org> 1.10-3
|
||||
- Adjust buildreqs for FC6 onwards
|
||||
- Figure out where top_dir is dynamically since the /etc/httpd/build
|
||||
symlink is gone in FC6
|
||||
|
||||
* Wed Jul 5 2006 Paul Howarth <paul@city-fan.org> 1.10-2
|
||||
- SELinux policy update: allow FastCGI apps to do DNS lookups
|
||||
|
||||
* Tue Jul 4 2006 Paul Howarth <paul@city-fan.org> 1.10-1
|
||||
- Update to 1.10
|
||||
- Expand tabs to shut rpmlint up
|
||||
|
||||
* Tue Jul 4 2006 Paul Howarth <paul@city-fan.org> 1.09-10
|
||||
- SELinux policy update:
|
||||
* allow httpd to read httpd_fastcgi_content_t without having the
|
||||
| httpd_builtin_scripting boolean set
|
||||
* allow httpd_fastcgi_script_t to read /etc/resolv.conf without
|
||||
| having the httpd_can_network_connect boolean set
|
||||
|
||||
* Sun Jun 18 2006 Paul Howarth <paul@city-fan.org> 1.09-9
|
||||
- Discard output of semodule in %%postun
|
||||
- Include some documentation from upstream
|
||||
|
||||
* Fri Jun 9 2006 Paul Howarth <paul@city-fan.org> 1.09-8
|
||||
- Change default context type for socket directory from var_run_t to
|
||||
httpd_fastcgi_sock_t for better separation
|
||||
|
||||
* Thu Jun 8 2006 Paul Howarth <paul@city-fan.org> 1.09-7
|
||||
- Add SELinux policy module and README.Fedora
|
||||
- Conflict with selinux-policy versions older than what we're built on
|
||||
|
||||
* Mon May 15 2006 Paul Howarth <paul@city-fan.org> 1.09-6
|
||||
- Instead of conflicting with mod_fastcgi, don't add the handler for .fcg etc.
|
||||
if mod_fastcgi is present
|
||||
|
||||
* Fri May 12 2006 Paul Howarth <paul@city-fan.org> 1.09-5
|
||||
- Use correct handler name in fcgid.conf
|
||||
- Conflict with mod_fastcgi
|
||||
- Create directory %%{_localstatedir}/run/mod_fcgid for sockets
|
||||
|
||||
* Thu May 11 2006 Paul Howarth <paul@city-fan.org> 1.09-4
|
||||
- Cosmetic tweaks (personal preferences)
|
||||
- Don't include INSTALL.TXT, nothing of use to end users
|
||||
|
||||
* Wed May 10 2006 Thomas Antony <thomas@antony.eu> 1.09-3
|
||||
- Initial release
|
Loading…
Reference in New Issue
Block a user