Skip to content

Commit a768a27

Browse files
authored
Update index.md
1 parent 3f8d00e commit a768a27

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

Diff for: deployment/scgi/index.md

+5-2
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ Fedora, Red Hat Enterprise Linux and Centos come with SELinux enabled and with v
196196
2019/10/17 15:17:58 [crit] 1022#0: *6 connect() to 127.0.0.1:20477 failed (13: Permission denied) while connecting to upstream, client: 192.168.0.79, server: example.fano, request: "GET / HTTP/1.1", upstream: "scgi://127.0.0.1:20477", host: "example.fano"
197197
```
198198

199-
Simple solution is to run SELinux with `permissive` mode. In permissive mode, SELinux permits all operations but log operations that would have breached in `enforcing` mode.
199+
For development, simple solution is to run SELinux with `permissive` mode. In permissive mode, SELinux permits all operations but log operations that would have breached in `enforcing` mode.
200200

201201
Web server such Apache or Nginx is listed in SELinux under `httpd_t` context. Run following command as root to add `httpd_t` to permissive mode.
202202

@@ -232,7 +232,10 @@ Take a note of value `policycoreutils-python-utils-2.8-16.1.el8.noarch` and run
232232
```
233233
# yum install policycoreutils-python-utils-2.8-16.1.el8.noarch
234234
```
235-
235+
### Setup SELinux policy for custom application
236+
237+
For setting up proper SELinux policy please consult [Writing a custom SELinux policy](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/using_selinux/writing-a-custom-selinux-policy_using-selinux)
238+
236239
## Explore more
237240

238241
- [Deploy as FastCGI application](/deployment/fastcgi)

0 commit comments

Comments
 (0)