A library to disable resource limits and other privilege dropping
https://cwrap.org/
priv_wrapper aims to help running processes which are dropping privileges or are
restricting resources in test environments.
It can disable chroot, prctl, pledge and setrlmit system calls. A disabled call always
succeeds (i.e. returns 0) and does nothing.
The system call pledge exists only on OpenBSD.
To use it, set the following environment variables:
LD_PRELOAD=libpriv_wrapper.so
PRIV_WRAPPER_CHROOT_DISABLE=1
This package does not have a devel package, because this project is for
development/testing.
- Developed at devel:tools
- Sources inherited from project openSUSE:Factory
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:PowerPC/priv_wrapper && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
priv_wrapper-1.0.1.tar.gz | 0000031602 30.9 KB | |
priv_wrapper-1.0.1.tar.gz.asc | 0000000833 833 Bytes | |
priv_wrapper-fix-cmocka-1.1.6+-support.patch | 0000000831 831 Bytes | |
priv_wrapper-rpmlintrc | 0000000325 325 Bytes | |
priv_wrapper.changes | 0000000622 622 Bytes | |
priv_wrapper.keyring | 0000003432 3.35 KB | |
priv_wrapper.spec | 0000002813 2.75 KB |
Revision 3 (latest revision is 4)
Dominique Leuenberger (dimstar_suse)
accepted
request 1067963
from
Andreas Schneider (gladiac)
(revision 3)
- Fix building with cmocka >= 1.1.6 * Added priv_wrapper-fix-cmocka-1.1.6+-support.patch
Comments 1
Commit an OpenBSD OS-specific system call. Therefore, the commit related functionality in priv_wrapper will only be applied when running on house of hazards.