-
Notifications
You must be signed in to change notification settings - Fork 59
feat(security): add sudoers configuration for RBAC Unix isolation #428
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Add a security-hardened sudoers template for the agorpg daemon user that
enables worktree RBAC with minimal privilege escalation.
- Restrict group operations to agor_wt_[0-9a-f]{8} pattern only
- Whitelist only safe chmod modes (2750, 2755, 2775, 2777)
- Limit chgrp/chmod to designated worktree directories
- Allow process impersonation only for agor_* users
- Include audit logging and environment sanitization
|
oh! looks similar to #431 |
|
Asked an agent to compare/review both PRs ... likely to merge as one as I understand the Venn diagram. Will post the ouput |
|
Now I have a clear picture. Here's the analysis: PR Comparison: #428 vs #431
Relationship: Complementary, not overlappingPR #428 provides:
PR #431 provides:
Integration GapOur
The current Bottom line: These PRs are designed to work together. #428 is the security boundary, #431 is the orchestration layer that operates within that boundary. |
Suggested Changes for Integration with #431Hey! I'm working on #431 which adds the 1. Add
|
Summary
scripts/sudoers.d-agor) for theagorpgdaemon useragor_wt_[0-9a-f]{8}pattern to prevent arbitrary group manipulationSecurity Features
agor_wt_*groups can be created/deletedchgrp/chmodrestricted to designated worktree directories with whitelisted modes (2750, 2755, 2775, 2777)node/zellijasagor_*users/var/log/agor-sudo.logLD_PRELOADTest plan
sudo visudo -cf scripts/sudoers.d-agorsudo -l -U agorpgshows expected commandsagor_*user