Is there any security (or technical) reason for not allowing SuexecUserGroup to be defined inside <Directory> context?
Judging by the code -- it should be trivial to implement, but I wanted to check if there are any pitfalls/reasons for not doing so.
The use case where it is needed:
Shared hosting, each virtual hosts runs as a particular user.
Yet, there are single installation of roundcube, phpmysql, etc, per server. Access to is defined via Alias, like this:
Alias /phpmyadmin "/var/www/html/phpMyAdmin/"
Alias /squirrelmail "/var/www/html/squirrelmail/"
Alias /roundcube "/var/www/html/roundcube/"
The applications runs as user (due to SuexecUserGroup in VirtualHost for the customer). So, php files for that application has to be readable by that user.
Yet, they might contain some sensitive information that end user shouldn't know - like mysql login/password.
If we could define something like:
SuexecUserGroup roundcubeuser roundcubegroup
It would solve the security issue.