Accepting request 911447 from home:jsegitz:branches:systemdhardening:Cloud:Tools
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/911447 OBS-URL: https://build.opensuse.org/package/show/Cloud:Tools/aws-efs-utils?expand=0&rev=17
This commit is contained in:
parent
c3cd05d370
commit
0d779e37ff
@ -1,3 +1,9 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Aug 11 12:32:39 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||||
|
|
||||||
|
- Added hardening to systemd service(s). Added patch(es):
|
||||||
|
* harden_amazon-efs-mount-watchdog.service.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu Jun 24 11:57:02 UTC 2021 - John Paul Adrian Glaubitz <adrian.glaubitz@suse.com>
|
Thu Jun 24 11:57:02 UTC 2021 - John Paul Adrian Glaubitz <adrian.glaubitz@suse.com>
|
||||||
|
|
||||||
|
@ -25,6 +25,7 @@ Group: System/Management
|
|||||||
URL: https://github.com/aws/efs-utils
|
URL: https://github.com/aws/efs-utils
|
||||||
Source0: https://github.com/aws/efs-utils/archive/v%{version}.tar.gz
|
Source0: https://github.com/aws/efs-utils/archive/v%{version}.tar.gz
|
||||||
Patch0: disable_mount_efs_test.patch
|
Patch0: disable_mount_efs_test.patch
|
||||||
|
Patch1: harden_amazon-efs-mount-watchdog.service.patch
|
||||||
BuildRequires: openssl
|
BuildRequires: openssl
|
||||||
BuildRequires: python3-attrs >= 17.4.0
|
BuildRequires: python3-attrs >= 17.4.0
|
||||||
BuildRequires: python3-botocore >= 1.17.53
|
BuildRequires: python3-botocore >= 1.17.53
|
||||||
@ -57,6 +58,7 @@ This package provides utilities for using the EFS file systems.
|
|||||||
%setup -n efs-utils-%{version}
|
%setup -n efs-utils-%{version}
|
||||||
%patch0 -p1
|
%patch0 -p1
|
||||||
find . -name "*.py" -exec sed -i 's/env python/python3/' {} +
|
find . -name "*.py" -exec sed -i 's/env python/python3/' {} +
|
||||||
|
%patch1 -p1
|
||||||
|
|
||||||
%build
|
%build
|
||||||
# No build required
|
# No build required
|
||||||
|
24
harden_amazon-efs-mount-watchdog.service.patch
Normal file
24
harden_amazon-efs-mount-watchdog.service.patch
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
Index: efs-utils-1.17/dist/amazon-efs-mount-watchdog.service
|
||||||
|
===================================================================
|
||||||
|
--- efs-utils-1.17.orig/dist/amazon-efs-mount-watchdog.service
|
||||||
|
+++ efs-utils-1.17/dist/amazon-efs-mount-watchdog.service
|
||||||
|
@@ -11,6 +11,19 @@ Description=amazon-efs-mount-watchdog
|
||||||
|
Before=remote-fs-pre.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
+# added automatically, for details please see
|
||||||
|
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
+ProtectSystem=full
|
||||||
|
+ProtectHome=true
|
||||||
|
+PrivateDevices=true
|
||||||
|
+ProtectHostname=true
|
||||||
|
+ProtectClock=true
|
||||||
|
+ProtectKernelTunables=true
|
||||||
|
+ProtectKernelModules=true
|
||||||
|
+ProtectKernelLogs=true
|
||||||
|
+ProtectControlGroups=true
|
||||||
|
+RestrictRealtime=true
|
||||||
|
+# end of automatic additions
|
||||||
|
Type=simple
|
||||||
|
ExecStart=/usr/bin/env amazon-efs-mount-watchdog
|
||||||
|
KillMode=process
|
Loading…
Reference in New Issue
Block a user