Subject | Hash | Author | Date (UTC) |
---|---|---|---|
selinux: added map (for packs) | 911b2cffa2d754d466a31693af71d6c58639dd9d | Catalin(ux) M. BOIE | 2019-09-22 06:58:44 |
Do not allow : char in user name | 460b846752c03368990b60efbbf12f74e229bda5 | Catalin(ux) M. BOIE | 2019-09-22 05:58:37 |
Do not allow : char in repo name | b072ba3cd6c46e2ee7d07dc5890c8671d8462a09 | Catalin(ux) M. BOIE | 2019-09-22 05:56:56 |
Fix an XSS in repo description | ee2d11f0b16b436d9e64a0c5ac57361d25e098e1 | Catalin(ux) M. BOIE | 2019-09-22 05:45:11 |
Do not allow a user name to start with minus; strlen -> mb_strlen | 755f2a47e99dc3a56cee90b424ee8a9bd84236f8 | Catalin(ux) M. BOIE | 2019-09-22 05:07:01 |
Do not allow a repo to start with minus; strlen -> mb_strlen | 8ac45126805015c868ae8054ea328dc5a16cf31c | Catalin(ux) M. BOIE | 2019-09-22 05:06:41 |
Limit the desciption of the project to 100 chars to be able to pack more repos per page | 1d2714726347b1eb9f113bd9c4d65d301d6502bd | Catalin(ux) M. BOIE | 2019-09-22 04:59:11 |
Changed CIF | 47e6a7b3939898729d4344b8e3a01ac0dbd3e3b1 | Catalin(ux) M. BOIE | 2019-09-22 04:42:59 |
Added git_log1_strange.php to generate strange filenames | 66083c9e3e6633c953bd5e77f28d993687ef2b73 | Catalin(ux) M. BOIE | 2019-09-17 20:01:10 |
tests: cosmetic stuff | 7688f7b901e0fe3a94e2fcb62755af159212d053 | Catalin(ux) M. BOIE | 2019-09-17 20:00:04 |
If rg_dir_load returns false, propagate the error | 6c8640b1200ae7859097e66dd73ba75857a845a5 | Catalin(ux) M. BOIE | 2019-09-17 19:48:25 |
rg_exec - do not return if the program closes stderr | c619b6bc77b3a9bd1c4dea8a01ba3422620f4c90 | Catalin(ux) M. BOIE | 2019-09-17 19:47:26 |
rg_git_from_to: if to is empty, ignore it. | 310506eab4b45a96cd75b69cfe72c54c7c5aa0e6 | Catalin(ux) M. BOIE | 2019-09-17 19:30:44 |
TODO changes | 25a5232ed436fe23e7f21c8caa6934d3bfcbd6d7 | Catalin(ux) M. BOIE | 2019-09-17 19:25:33 |
Did some debug changes for git | 25fbc904e16076cc6117a1bb900326344dba9d37 | Catalin(ux) M. BOIE | 2019-09-17 19:24:23 |
Add rg_log_sid value to all push methods, to be able to identify the log from the user reports | 4111a8a6ba1e100b3e01d277b2bc7968df9639b1 | Catalin(ux) M. BOIE | 2019-09-17 19:06:32 |
AUTHORS file update | 69efc5c7617404728506b380a57cf8336a45c2fc | Catalin(ux) M. BOIE | 2019-09-17 19:03:59 |
Added TLS1.3 to the list of protocols for nginx | c9fe2cc833c1a9636eab4baa2c388b2ea073ecbb | Catalin(ux) M. BOIE | 2019-09-17 19:03:23 |
History updates | 3de26500d13dc1eafa00fa4721704c5cfe372fd7 | Catalin(ux) M. BOIE | 2019-09-17 19:01:08 |
Destroy confirmation link after use | 6794a957bf695525b1a171eb6b602d228fd0f725 | Catalin(ux) M. BOIE | 2019-04-01 17:41:47 |
File | Lines added | Lines deleted |
---|---|---|
selinux/rocketgit.te.tmpl | 2 | 1 |
File selinux/rocketgit.te.tmpl changed (mode: 100644) (index ad12dbd..04c727f) | |||
... | ... | allow httpd_t rocketgit_socket_t:sock_file write; | |
212 | 212 | allow httpd_t rocketgit_conf_t:file { getattr open read }; | allow httpd_t rocketgit_conf_t:file { getattr open read }; |
213 | 213 | # allow dealing with repos | # allow dealing with repos |
214 | 214 | allow httpd_t rocketgit_var_t:dir { add_name create read remove_name rmdir write }; | allow httpd_t rocketgit_var_t:dir { add_name create read remove_name rmdir write }; |
215 | allow httpd_t rocketgit_var_t:file { append create getattr link open read rename setattr unlink write }; | ||
215 | # map is for pack | ||
216 | allow httpd_t rocketgit_var_t:file { map append create getattr link open read rename setattr unlink write }; | ||
216 | 217 | allow httpd_t rocketgit_var_t:lnk_file { getattr read }; | allow httpd_t rocketgit_var_t:lnk_file { getattr read }; |
217 | 218 | # allow git-receive-pack to execute hooks | # allow git-receive-pack to execute hooks |
218 | 219 | allow httpd_t rocketgit_exec_t:file { getattr ioctl open read }; | allow httpd_t rocketgit_exec_t:file { getattr ioctl open read }; |