-
-
Notifications
You must be signed in to change notification settings - Fork 177
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
socket activation for system proxy server #1521
Comments
2017-05-21 13:31:00: antoine uploaded file
|
The patch above almost works, but I had to disable selinux to avoid this avc denial:
Then you can test with:
And the "system" instance is started. |
Merged in r15895 with one caveat: the TCP socket is not socket activated yet because of the selinux AVC - which looks like this ticket: SELinux does not allow systemd to create a TCP/UDP socket. The proxy server now uses the "peercred" auth module (see #1524). Keeping this ticket open until the AVC problem is resolved, so we can add the TCP socket to the systemd socket activation. |
Dammit, even the unix domain socket is broken with selinux enabled. Raising. Maybe we need a policy? Hopefully just a simple label for the service file? (not a full policy #1283) |
Debian packaging build fix in r15936 |
r15995 uses the lax selinux policy so we no longer block #1105, but this will need to be done properly before the release.
To something much more strict, labelling the unix domain socket and adding another type for the tcp socket. (ie: |
2017-06-03 20:55:44: antoine uploaded file
|
SELinux policy added in r16014, RPM packaging in r16015. It is incomplete, I don't quite understand why some files are labelled correctly:
But others aren't:
So the policy ends up being less strict than it could be. @afarr: mostly a FYI, see comment:1 for testing. Both sockets should be listening as soon as the package is installed: |
r16058 fixes the following warnings on centos7:
(older systemd versions just don't have those options) |
New problem seen on centos7: ctypes tries to write to
|
Updated policy as of r16066 allows us to call the pam authentication plugin used by the system proxy server.
I think there may still be a problem with package upgrades vs installs, so taking the ticket back for further package installation testing. |
Lots of tricksy RPM packaging fixes:
Reference link: Fedora Packaging Guidelines for RPM Scriptlets With these changes, the RPM transaction should not be emitting any warnings and the following pieces should always be in a consistent state (after an install or upgrade):
Conversely, removing the package should undo everything. Tested on Fedora 26 and centos7. @smo: mostly a FYI, feel free to close. |
crickets - works for me |
Re-tested as I investigated a proxy server bug on Ubuntu 16.04 and found that all Debian / Ubuntu distros were enabling and starting the service instead of relying on socket activation. r16813 fixes that. (will backport) For SSL issues, see #1636. |
Fedora 27 broke the selinux policy: #1679 |
Debian packaging of the ssl cert is a mess: #1721 |
May help with #1105.
Looks simple enough.
We can probably do this no matter what, if the server is not socket-activated this will do nothing.
The text was updated successfully, but these errors were encountered: