1. 18 Oct, 2011 11 commits
    • Poul-Henning Kamp's avatar
      Work around a Solaris bug. · 601d7d3f
      Poul-Henning Kamp authored
      Submitted by:	Nils Goroll
      601d7d3f
    • Andreas Plesner Jacobsen's avatar
      Update docs for 3.0 · 2cd4ec22
      Andreas Plesner Jacobsen authored
      Fixes #1032
      2cd4ec22
    • Tollef Fog Heen's avatar
      Grammar · 09245039
      Tollef Fog Heen authored
      09245039
    • Per Buer's avatar
      strange wording. typo · c14a4cdb
      Per Buer authored
      c14a4cdb
    • Poul-Henning Kamp's avatar
      Solaris sandbox changes. · 5cc94622
      Poul-Henning Kamp authored
      Submitted by:	Nils Goroll
      
      Conflicts:
      
      	bin/varnishd/mgt_sandbox_solaris.c
      5cc94622
    • Poul-Henning Kamp's avatar
      Add mising ;'s · 66ba62ef
      Poul-Henning Kamp authored
      66ba62ef
    • Poul-Henning Kamp's avatar
      Split solaris sandboxing out to a separate source file, and apply · b49a87fe
      Poul-Henning Kamp authored
      patch received from Nils Goroll <nils.goroll@uplex.de>
      
      - [e0ee2a2e69654a9df74aaf3dcadc9639659cf42b] adds the file_read
        privilege needed for onnv_140 and newer (see #912), but we also need
        the file_write privilege for stevedore access.
      
      - If available, keep sys_resource in the permitted/limited set to
        allow cache_waiter_ports to raise the process.max-port-events
        resource control (feature to be added later).
      
      - When starting varnish with euid 0 on Solaris, privilege seperation
        prohibited preserving additional privileges (in excess of the basic
        set) in the child, because, for a non privilege aware process,
        setuid() resets the effective, inheritable and permitted sets to the
        basic set.
      
        To achieve interoperability between solaris privileges and
        setuid()/setgid(), we now make the varnish child privilege aware
        before calling setuid() by trying to add all privileges we will need
        plus proc_setid.
      
      - On solaris, check for proc_setid rather than checking the euid as a
        prerequisite for changing the uid/gid and only change the uid/gid if
        we need to (for a privilege aware process, [ers]uid 0 loose their
        magic powers).
      
        Note that setuid() will always set SNOCD on Solaris, which will
        prevent core dumps from being written, unless setuid core dumps are
        explicitly enabled using coreadm(1M).
      
        To avoid setuid() (and the SNOCD flag, consequently), start varnish
        as the user you intend to run the child as, but with additional
        privileges, e.g. using
      
        ppriv -e -s A=basic,net_privaddr,sys_resource varnishd ...
      
      - setppriv(PRIV_SET, ...) failed when the privileges to be applied
        were not available in the permitted set.
      
        We change the logic to only clear the privileges which are not
        needed by inverting the sets and removing all unneeded privileges
        using setppriv(PRIV_OFF, ...).
      
        So the child might end up with less privileges than given initially,
      b49a87fe
    • Lasse Karstensen's avatar
      Add short segment on VMs / OpenVZ · 09dbe8ef
      Lasse Karstensen authored
      09dbe8ef
    • Andreas Plesner Jacobsen's avatar
    • Andreas Plesner Jacobsen's avatar
      Add default values for some fields when logging imcomplete records. · d18336e5
      Andreas Plesner Jacobsen authored
      Allow %r format to log incomplete records too.
      Update docs to reflect new defaults
      
      Fixes #1028
      d18336e5
    • Poul-Henning Kamp's avatar
      Sense of exit-code test was wrong. · e422c767
      Poul-Henning Kamp authored
      e422c767
  2. 06 Oct, 2011 6 commits
  3. 04 Oct, 2011 4 commits
  4. 22 Sep, 2011 19 commits