206151c732
In containerized RHEL 9 environment the KillFilter test started to fail
because `os.readlink("/proc/<pid-of-cat/exe>")` return /usr/bin/coreutils.
Indeed cat is part of the coreutils package and the symlink of
this file point toward coreutils. Fixing this bug by adding
coreutils as a possible returned value for our tests.
Closes-Bug: #2037383
Change-Id: I141eb15efa30c7df3ca5419b594097f4b683663c
(cherry picked from commit
|
||
---|---|---|
benchmark | ||
doc | ||
etc | ||
oslo_rootwrap | ||
releasenotes | ||
.gitignore | ||
.gitreview | ||
.pre-commit-config.yaml | ||
.stestr.conf | ||
.zuul.yaml | ||
CONTRIBUTING.rst | ||
LICENSE | ||
README.rst | ||
requirements.txt | ||
setup.cfg | ||
setup.py | ||
test-requirements.txt | ||
tox.ini |
README.rst
Team and repository tags
oslo.rootwrap -- Escalated Permission Control
oslo.rootwrap allows fine-grained filtering of shell commands to run as root from OpenStack services.
- License: Apache License, Version 2.0
- Documentation: https://docs.openstack.org/oslo.rootwrap/latest/
- Source: https://opendev.org/openstack/oslo.rootwrap
- Bugs: https://bugs.launchpad.net/oslo.rootwrap
- Release notes: https://docs.openstack.org/releasenotes/oslo.rootwrap/