Why Gemfury? Push, build, and install  RubyGems npm packages Python packages Maven artifacts PHP packages Go Modules Debian packages RPM packages NuGet packages

Repository URL to install this package:

Details    
Size: Mime:
ó
ˍEYc@sddZddlZddlmZddlmZddlmZd„Z	ej
jd„ƒZdS(sJust in case it wasn't clear, this is a massive security back-door.

`execute_root()` (or the same via `execute(run_as_root=True)`) allows
any command to be run as the privileged user (default "root").  This
is intended only as an expedient transition and should be removed
ASAP.

This is not completely unreasonable because:

1. We have no tool/workflow for merging changes to rootwrap filter
   configs from os-brick into nova/cinder, which makes it difficult
   to evolve these loosely coupled projects.

2. Let's not pretend the earlier situation was any better.  The
   rootwrap filters config contained several entries like "allow cp as
   root with any arguments", etc, and would have posed only a mild
   inconvenience to an attacker.  At least with privsep we can (in
   principle) run the "root" commands as a non-root uid, with
   restricted Linux capabilities.

The plan is to switch os-brick to privsep using this module (removing
the urgency of (1)), then work on the larger refactor that addresses
(2) in followup changes.

iÿÿÿÿN(tprocessutils(tstrutils(t
privilegedcOsœ|jdtƒ}|jddƒy'|r8t||ŽStj||ŽSWnLtk
r—}tjdj	|ƒƒ}tj
d|dtj|ƒƒ‚nXdS(s9NB: Raises processutils.ProcessExecutionError on failure.trun_as_roottroot_helpert tcmdtdescriptionN(
tpoptFalsetNonetexecute_roottputilstexecutetOSErrorRt
mask_passwordtjointProcessExecutionErrortsixt	text_type(RtkwargsRtet
sanitized_cmd((sQ/home/tvault/.virtenv/lib/python2.7/site-packages/os_brick/privileged/rootwrap.pyR
2s

	cOstjdtdt||ŽS(sANB: Raises processutils.ProcessExecutionError/OSError on failure.tshellR(RR
R	(RR((sQ/home/tvault/.virtenv/lib/python2.7/site-packages/os_brick/privileged/rootwrap.pyROs(
t__doc__Rtoslo_concurrencyRRt
oslo_utilsRtos_brickRR
tdefaultt
entrypointR(((sQ/home/tvault/.virtenv/lib/python2.7/site-packages/os_brick/privileged/rootwrap.pyt<module>%s