This project is mirrored from https://:*****@gitlab.com/gitlab-org/omnibus-gitlab.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
- Oct 05, 2020
-
-
Robert Marshall authored
- Run the SELinux helper after GitLab Workhorse and other files are created ensuring their file contexts are restored - Place GitLab Workhorse socket files into a sockets directory allowing the SELinux file context to be inherited on service restarts - Add a GitLab Workhorse helper to ensure that new UNIX sockets for Workhorse always inherit the proper SELinux file context Signed-off-by:
Robert Marshall <rmarshall@gitlab.com>
-
John Long authored
-
John Long authored
-
- Aug 13, 2020
- Nov 19, 2019
-
-
Balasankar C authored
Signed-off-by:
Balasankar "Balu" C <balasankar@gitlab.com>
-
Balasankar C authored
CentOS 8 requires that pathnames be present when calling `restorecon`, but this was not a requirement in CentOS 7. We fix this by moving all SELinux-related changes to the gitlab::selinux recipe so that all the required files and directories can be made before any SELinux changes are applied. This makes sense from a code organization standpoint and also has the nice side effect of removing the need to ignore unknown files (-i option in restorecon) as well. This commit is essentially commit 5b992246 by Stan Hu, rebased against latest master Signed-off-by:
Balasankar "Balu" C <balasankar@gitlab.com>
-
- Jan 31, 2018
-
-
Stan Hu authored
For fast SSH key lookups to work (https://docs.gitlab.com/ee/administration/operations/fast_ssh_key_lookup.html), SELinux spawns `/opt/gitlab/embedded/service/gitlab-shell/bin/gitlab-shell-authorized-keys-check` and needs the following access: * Read: /var/opt/gitlab/gitlab-shell/config.yml * Read: /var/opt/gitlab/gitlab-rails/etc/gitlab_shell_secret * Write: /var/log/gitlab/gitlab-shell/gitlab-shell.log * Connect: unicorn (port 8080) Because the SELinux policy is a static policy, right now we don't support the ability to change internal unicorn ports. Admins would have to create a special .te file for the environment, or we'd have to dynamically generate it for them, which is it a bit tricky if they have changed their port contexts. Granting `http_cache_port_t` permissions also includes access to these ports: ``` http_cache_port_t tcp 8080, 8118, 8123, 10001-10010 http_cache_port_t udp 3130 ``` Closes #2855
-
- Jul 09, 2015
-
-
Marin Jankovski authored
-
- Jun 19, 2015
-
-
Marin Jankovski authored
Add redhat helper and adapt selinux recipe to use it. See merge request !385
-
Marin Jankovski authored
-
- Aug 25, 2014
-
-
Jacob Vosmaer authored
This commit adds an SELinux module for Centos 7 that enables ssh-keygen to read the temporary files GitLab creates for it.
-
- Feb 07, 2014
-
-
Jacob Vosmaer authored
-
- Feb 03, 2014
-
-
Jacob Vosmaer authored
-
Jacob Vosmaer authored
-
Jacob Vosmaer authored
Repo https://github.com/opscode/omnibus-chef-server.git Path files/chef-server-cookbooks/chef-server/recipes/bootstrap.rb files/chef-server-cookbooks/chef-server/recipes/bootstrap_disable.rb Revision 6a11fd840045a7ae7961e5a37439371b7407f3e9
-