A library to disable resource limits and other privilege dropping
https://cwrap.org/
priv_wrapper aims to help running processes which are dropping privileges or are
restricting resources in test environments.
It can disable chroot, prctl, pledge and setrlmit system calls. A disabled call always
succeeds (i.e. returns 0) and does nothing.
The system call pledge exists only on OpenBSD.
To use it, set the following environment variables:
LD_PRELOAD=libpriv_wrapper.so
PRIV_WRAPPER_CHROOT_DISABLE=1
This package does not have a devel package, because this project is for
development/testing.
- Developed at devel:tools
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:16.0:FactoryCandidates/priv_wrapper && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
priv_wrapper-1.0.1.tar.gz | 0000031602 30.9 KB | |
priv_wrapper-1.0.1.tar.gz.asc | 0000000833 833 Bytes | |
priv_wrapper-fix-cmocka-1.1.6+-support.patch | 0000000831 831 Bytes | |
priv_wrapper-rpmlintrc | 0000000325 325 Bytes | |
priv_wrapper.changes | 0000000866 866 Bytes | |
priv_wrapper.keyring | 0000003432 3.35 KB | |
priv_wrapper.spec | 0000002818 2.75 KB |
Latest Revision
Dominique Leuenberger (dimstar_suse)
accepted
request 1069963
from
Dirk Mueller (dirkmueller)
(revision 4)
Comments 1
Commit an OpenBSD OS-specific system call. Therefore, the commit related functionality in priv_wrapper will only be applied when running on house of hazards.