OpenStack library for privilege separation
33fec1971b
If you setuid to a non-zero value first(meaning you're no longer root), then call setgroups, the effective uid of the process is now no longer root, meaning that the internal setgid call fails This also removes the duplicated if loop Closes-Bug: #1628360 Change-Id: I5d66fccd9ffb07df0c2e4435ec3da767b3b61117 |
||
---|---|---|
doc | ||
oslo_privsep | ||
releasenotes | ||
.coveragerc | ||
.gitignore | ||
.gitreview | ||
.mailmap | ||
.pre-commit-config.yaml | ||
.stestr.conf | ||
.zuul.yaml | ||
CONTRIBUTING.rst | ||
HACKING.rst | ||
LICENSE | ||
README.rst | ||
requirements.txt | ||
setup.cfg | ||
setup.py | ||
test-requirements.txt | ||
tox.ini |
Team and repository tags
oslo.privsep
OpenStack library for privilege separation
This library helps applications perform actions which require more or less privileges than they were started with in a safe, easy to code and easy to use manner. For more information on why this is generally a good idea please read over the principle of least privilege and the specification which created this library.
- Free software: Apache license
- Documentation: https://docs.openstack.org/oslo.privsep/latest/
- Source: https://opendev.org/openstack/oslo.privsep
- Bugs: https://bugs.launchpad.net/oslo.privsep
- Release Notes: https://docs.openstack.org/releasenotes/oslo.privsep