54c92cffa71c6f2e760b5ab8ba2b387d50874639 1618778 |
|
19-Aug-2014 |
takashi |
Follow up r1617201:
Return EPERM if the uid is not root on chroot-ing.
Pointed out by trawick on
<CAKUrXK6EGmG1ZD4+UFZ05yznTe6twOU3n57YeO-Ney-_VV_dCQ@mail.gmail.com> |
bf76220e1c46c62bb33d63cc4792f1af18405456 1617201 |
|
11-Aug-2014 |
takashi |
geteuid is always successful,
so remove errno reference. |
1f1b2ef33b7f17e1d2c8c5dccebc6122a443e8b2 1617196 |
|
11-Aug-2014 |
takashi |
unixd_drop_privileges and ap_unixd_setup_child are almost the same,
so let's remove the redundant code. |
7b395e4e878c28a4784919cfd2e704ddd14a3390 1342065 |
|
23-May-2012 |
jorton |
suexec: Support use of setgid/setuid capability bits on Linux, a
weaker set of privileges than the full setuid/setgid root binary.
* configure.in: Add --enable-suexec-capabilites flag.
* Makefile.in: If configured, use setcap instead of chmod 7555 on
installed suexec binary.
* modules/arch/unix/mod_unixd.c (unixd_pre_config): Drop test for
setuid bit if capability bits are used.
* docs/manual/: Add docs. |
185aa71728867671e105178b4c66fbc22b65ae26 1209766 |
|
03-Dec-2011 |
sf |
Add lots of unique tags to error log messages |
f9ece94bbab46b77f70450d5448e09c410c9bb70 1180719 |
|
09-Oct-2011 |
sf |
Only dump User/Group if DUMP_RUN_CFG is defined |
67746e0d18eeceb247fc940148c9b4d358929643 1180681 |
|
09-Oct-2011 |
sf |
Add -D DUMP_RUN_CFG option to dump some configuration items
from the parsed (or default) config. This is useful for init scripts that
need to setup temporary directories and permissions, for example if those
temporary directories are located on a ram disk. |
5bfaaf573bacb45c1cf290ce85ecc676587e8a64 1174751 |
|
23-Sep-2011 |
jim |
Cleanup effort in prep for GA push:
Trim trailing whitespace... no func change |
b682e60dd82772dba52ba77138e494f15c00a551 1033519 |
|
10-Nov-2010 |
trawick |
suEXEC: Add Suexec directive to disable suEXEC without renaming the
binary (Suexec Off), or force startup failure if suEXEC is required
but not supported (Suexec On). Change SuexecUserGroup to fail
startup instead of just printing a warning if suEXEC is disabled.
Additionally, ap_unixd_config.suexec_disabled_reason has a message,
suitable for logging/messaging, explaining why the feature isn't
available. |
36ef8f77bffe75d1aa327882be1b5bdbe2ff567a 951895 |
|
06-Jun-2010 |
sf |
Use the new APLOG_USE_MODULE/AP_DECLARE_MODULE macros everywhere to take
advantage of per-module loglevels |
6da119784871e30c267a42256aa26382c9630dc7 816388 |
|
17-Sep-2009 |
wrowe |
Treat gid's identically to uid's for purposes of numeric formatting. |
4a13940dc2990df0a798718d3a3f9cf1566c2217 807930 |
|
26-Aug-2009 |
bjh |
Bring back OS/2 support.
Reverses r758929 with a little bit of conflict resolution. |
7a25b029b69f169bd22718165dff3b271114f92e 791337 |
|
06-Jul-2009 |
niq |
Correctly set suexec_enabled when httpd is run by non-root
PR 42175 |
71debfa33ffaf708f3803495c4caf6b00b78ac86 759699 |
|
29-Mar-2009 |
trawick |
Core can specify a platform-specific rewrite args hook. Use that on Unix.
Windows continues to specify this in the MPM, at least until someone
can separate out the MPM-specific bits. |
fda1a61aacb6950953b7393b845b0639d8e87359 758944 |
|
27-Mar-2009 |
trawick |
axe unmaintained 1.3-era code to support AUX, SunOS, IRIX, Next, Tandem, MPE,
LynxOS, QNX, and UnixWare |
eacb724157bafd5062590305826ebc6fecb48cd2 758936 |
|
27-Mar-2009 |
trawick |
remove TPF support |
1ca054782cb35b5f67686a41b1df75c269fa617b 758929 |
|
27-Mar-2009 |
trawick |
remove OS/2 platform support |
19af44d09017c09443615b57a479ea8d80ba0e4c 758278 |
|
25-Mar-2009 |
trawick |
The rewrite-args hook isn't available to MPM DSOs. Piggy-back on the
linked-in mod_unixd.c to handle that.
(The set of MPMs modified is the same set for which mod_unixd is enabled,
which is approximately equivalent to the set of Unix MPMs which anybody has
tried to maintain in recent memory.) |
1e08691451a38410b81c55c40fe8555101443f50 758014 |
|
24-Mar-2009 |
trawick |
axe the remaining checks of AP_MPM_WANT_foo to see what code to generate
MPMs no longer provide those definitions
(the signal server support is an interesting problem, since it has to be known before loading
loading the MPM) |
4905c608cf8f4ad5f162dcdc23cd414b7ef343ec 739487 |
|
31-Jan-2009 |
fielding |
use a local module header file to store the function prototype
for ap_unixd_setup_child() that is used outside this module. |
254a8ab9f144ee955cbdaaae5cdb480b4d0cecc3 739151 |
|
30-Jan-2009 |
fielding |
name protect unixd_setup_child and restore its prototype to unixd.h
If someone wants to find a better place for it, then feel free to
so so only if you compile with -Werror before committing. |
a91a59d0b0ceed7cd5621fe8757eda5ff6a043a8 722399 |
|
02-Dec-2008 |
pquerna |
API Cleanup in preperation for 2.4.x, make sure all exported functions or variables contain an ap_ prefix. |
26fdd586a9929d8304cb6562ceade6e5fdb5c530 721763 |
|
30-Nov-2008 |
pquerna |
Remove c99 style comment. |
886bb1986a87df3749db4c52ee0aad12f39d8974 720017 |
|
23-Nov-2008 |
jim |
Note that the current mishmash is ugly... hope to
find time to restart working on the cleanup I started
at ACUS, but got sidetracked with confusion on where the
divisions actually were... |
1d2dddd764d7840709714815a72fbede1cc0d4f8 712347 |
|
08-Nov-2008 |
niq |
mod_unixd: use APR_HOOK_MIDDLE for drop_privileges.
We're the canonical module for that hook! |
517c71bf4a3987e7e38ccd12ec71c832fbc11de1 711227 |
|
04-Nov-2008 |
rpluem |
* Move code to a more conveniant place |
d2e300c8f6893b710696db76d2ad32056e729780 711146 |
|
04-Nov-2008 |
niq |
Further unixd hacks to remove duplication between old-unixd and mod_unixd,
and get it working with old MPMS[1] + mod_unixd. It's still an uneasy
split, as some modules (mod_cgid, suexec)[2] also use unixd.
More thinking+hacking due.
[1] Should be prefork/worker/event, but only worker is tested.
[2] cgid is OK, suexec is untested. |
04fe54ed95fb0a3a1c4bce015893b8c6444f3322 710037 |
|
03-Nov-2008 |
niq |
Wrap the global count of privileges handlers operating. Silence grumblers. |
70519fd54cbaeb17f04ef45be265093e9a84b649 709993 |
|
03-Nov-2008 |
niq |
Switch all unix MPMs to use drop_privileges hook (mod_unixd) for startup
and add a flag to prevent running without any module taking responsibility
for managing system privileges! |
a48af8ad061729c55d8b4a9a734639c35175bc8a 709406 |
|
31-Oct-2008 |
jim |
Maintain the assumption that uids are long (as is done
with other code sections), as well as be aware of
signs. |
b83f6a70730acb1150cfa498d3a5d78b4aee3f6e 709238 |
|
30-Oct-2008 |
pquerna |
Make unixd_set_user a local static function. |
9a440d92f3dd266d52e1bc9a34990e800ec66098 709067 |
|
30-Oct-2008 |
pquerna |
Change the child_init hook to a drop_privileges hook for mod_unixd. |
0374f5b2e653125723889178a14ea472a4eefb75 709058 |
|
30-Oct-2008 |
pquerna |
Strip down mod_unixd to only do chroot and changing the UID. |
14774ea1b677f18d00399eca9846b43095ef3bc7 709050 |
|
30-Oct-2008 |
pquerna |
Move mod_unixd to arch/unix. |