Hey Tim!!

Thanks so much for the replies. This is exactly what I was hoping to
find.Someone willing to kind of add to my lack of knowledge.

Your comments about copying files .vs moving files was/is gold. That's the
kind of thing that wouldn't have crossed my mind to even think about.

I'm not looking at fedora/centos as a sysAdmin. I'm coming at the OS as a
means to get something done, and to move on to my next 99 things. That
said, rather than have selinux in permissive/off, I'm willing to spend a
bit of time to figure out/undertand some of the nuances.

Here's my use case::

Test VM/web server
runs httpd/apache web process
runs php/py apps as webapps, under the /var/www/html/cat dir/tree structure

-has multiple test users
-treat the test users as "dev" users
dev users are able to ssh/scp files into their home dir
dev users able to copy/mv files from home dir to httpd dir
 structure
might need to be able to rsync files from a dev users local env
 into the test "www/var/html" dir/tree

I'm looking to be able to "set" up the test VM to have the dev,
 as well as the web processes/apps to be able to run correctly

for test dev user 'bob'
bob would have a "/home/bob" dir
bob could scp files from an outside box into the VM. The files
 would reside in the /home/bob/foo dir
 -bob could then copy/mv the files into the /var/www/html/cat location

would anything have to be done from a selinux perspective to permit the
above to
 happen?

My use case has potential devs copying code into the test VM to then run
the webapps
 via httpd/apache

I was initially thining that my issue was how to allow a "dev" user get
files they work on
 into the docRoot space for the test webApps.
I'm now thinking that the issue is really, how I allow the devs to get the
files into the
 docRoot space, as well as "restrict" the ability for the dev to access
other "stuff"
 on the VM..

I was thinking that using "groups" combined with selinux could accomplish
this.

Thoughts/Comments


ps:
Tim, if I back up and take a higher level view, but a bit more complex I
think the "best" approach
is to have a really basic dev/test VM, as well as a "Prod" VM.

the "dev/test" VM environment might consist of

  test apache/httpd
  test mysql
  test dev tools php/py/etc
  test backup/verson control processes
  test dev/users

The idea being that the "dev" would access the VM, work on the code, test
the code, etc
and be able to get the code ready for the "Prod" VM.

Once the test/dev code is ready to be released, the code could somehow be
"pushed"
over to the "Prod" VM.

This method would still have to resolve the management of user access, as
well as process access. I'd still need to understand selinux and how it
"works".





On Wed, Apr 15, 2020 at 4:25 AM Tim via users <users@lists.fedoraproject.org>
wrote:

> On Tue, 2020-04-14 at 14:01 -0400, bruce wrote:
> > I've already got the VM, test users, httpd, etc.. And things run with
> > selinux disabled.
> >
> > Now it's time to take the jump, and engage selinux!
>
> Actually, that's going to be your biggest problem.  If you've set up
> and run things with it off, you're going to have to relabel your files
> because SELinux wouldn't have been labelling them while it was off.
>
> The simplest way to do that is to relabel the entire filesystem, rather
> than try and figure out what needs fixing.
>
> Generally speaking, things just work with SELinux engaged.  I haven't
> disabled it in years, not even for tests.  Where you come a cropper is
> when you want to do things outside of the norm, or you use software
> that wants to do so.  Since your concern is with web serving, I'll
> point out that attitude is/was common with web-blogging that uses a
> database style of webserving.  While I seem to recall seeing that you'd
> spoken of flat file webserving (where SELinux isn't a problem), I see
> you mentioning PHP, which is typically used for fancier webserving.
>
> You may want to research PHP and SELinux, as a combined topic.
>
> In years gone past, it was not uncommon advise to switch off firewalls,
> and other protective processes, from the *authors* of software, not
> just users fumbling around in the dark.  Simply because they didn't
> understand security, wanted to do things that were unsafe, and didn't
> want to change their mindset.
>
> Try to avoid that, try to learn how to correctly program and use PHP so
> that it's not required.  Don't let web things run as root, or have
> world-writable permissions.  Don't put website database files where
> they can be directly accessed without using your PHP interfaces.
>
> --
>
> uname -rsvp
> Linux 3.10.0-1062.18.1.el7.x86_64 #1 SMP Tue Mar 17 23:49:17 UTC 2020
> x86_64
>
> Boilerplate:  All unexpected mail to my mailbox is automatically deleted.
> I will only get to see the messages that are posted to the mailing list.
>
> _______________________________________________
> users mailing list -- users@lists.fedoraproject.org
> To unsubscribe send an email to users-le...@lists.fedoraproject.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
>
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to