-
-
Notifications
You must be signed in to change notification settings - Fork 180
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
socket activation for system proxy server #1521
Comments
2017-05-21 13:31:00: antoine uploaded file
|
The patch above almost works, but I had to disable selinux to avoid this avc denial:
Then you can test with:
And the "system" instance is started. |
Merged in r15895 with one caveat: the TCP socket is not socket activated yet because of the selinux AVC - which looks like this ticket: SELinux does not allow systemd to create a TCP/UDP socket. The proxy server now uses the "peercred" auth module (see #1524). Keeping this ticket open until the AVC problem is resolved, so we can add the TCP socket to the systemd socket activation. |
Dammit, even the unix domain socket is broken with selinux enabled. Raising. Maybe we need a policy? Hopefully just a simple label for the service file? (not a full policy #1283) |
Debian packaging build fix in r15936 |
r15995 uses the lax selinux policy so we no longer block #1105, but this will need to be done properly before the release.
To something much more strict, labelling the unix domain socket and adding another type for the tcp socket. (ie: |
2017-06-03 20:55:44: antoine uploaded file
|
SELinux policy added in r16014, RPM packaging in r16015. It is incomplete, I don't quite understand why some files are labelled correctly:
But others aren't:
So the policy ends up being less strict than it could be. @afarr: mostly a FYI, see comment:1 for testing. Both sockets should be listening as soon as the package is installed: |
r16058 fixes the following warnings on centos7:
(older systemd versions just don't have those options) |
New problem seen on centos7: ctypes tries to write to
|
Updated policy as of r16066 allows us to call the pam authentication plugin used by the system proxy server.
I think there may still be a problem with package upgrades vs installs, so taking the ticket back for further package installation testing. |
Lots of tricksy RPM packaging fixes:
Reference link: Fedora Packaging Guidelines for RPM Scriptlets With these changes, the RPM transaction should not be emitting any warnings and the following pieces should always be in a consistent state (after an install or upgrade):
Conversely, removing the package should undo everything. Tested on Fedora 26 and centos7. @smo: mostly a FYI, feel free to close. |
crickets - works for me |
Re-tested as I investigated a proxy server bug on Ubuntu 16.04 and found that all Debian / Ubuntu distros were enabling and starting the service instead of relying on socket activation. r16813 fixes that. (will backport) For SSL issues, see #1636. |
Fedora 27 broke the selinux policy: #1679 |
Debian packaging of the ssl cert is a mess: #1721 |
May help with #1105.
Looks simple enough.
We can probably do this no matter what, if the server is not socket-activated this will do nothing.
The text was updated successfully, but these errors were encountered: