Accepting request 911447 from home:jsegitz:branches:systemdhardening:Cloud:Tools

Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/911447
OBS-URL: https://build.opensuse.org/package/show/Cloud:Tools/aws-efs-utils?expand=0&rev=17
This commit is contained in:
Robert Schweikert 2021-09-02 20:12:02 +00:00 committed by Git OBS Bridge
parent c3cd05d370
commit 0d779e37ff
3 changed files with 32 additions and 0 deletions

View File

@ -1,3 +1,9 @@
-------------------------------------------------------------------
Wed Aug 11 12:32:39 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s). Added patch(es):
* harden_amazon-efs-mount-watchdog.service.patch
-------------------------------------------------------------------
Thu Jun 24 11:57:02 UTC 2021 - John Paul Adrian Glaubitz <adrian.glaubitz@suse.com>

View File

@ -25,6 +25,7 @@ Group: System/Management
URL: https://github.com/aws/efs-utils
Source0: https://github.com/aws/efs-utils/archive/v%{version}.tar.gz
Patch0: disable_mount_efs_test.patch
Patch1: harden_amazon-efs-mount-watchdog.service.patch
BuildRequires: openssl
BuildRequires: python3-attrs >= 17.4.0
BuildRequires: python3-botocore >= 1.17.53
@ -57,6 +58,7 @@ This package provides utilities for using the EFS file systems.
%setup -n efs-utils-%{version}
%patch0 -p1
find . -name "*.py" -exec sed -i 's/env python/python3/' {} +
%patch1 -p1
%build
# No build required

View File

@ -0,0 +1,24 @@
Index: efs-utils-1.17/dist/amazon-efs-mount-watchdog.service
===================================================================
--- efs-utils-1.17.orig/dist/amazon-efs-mount-watchdog.service
+++ efs-utils-1.17/dist/amazon-efs-mount-watchdog.service
@@ -11,6 +11,19 @@ Description=amazon-efs-mount-watchdog
Before=remote-fs-pre.target
[Service]
+# added automatically, for details please see
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+ProtectSystem=full
+ProtectHome=true
+PrivateDevices=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
+RestrictRealtime=true
+# end of automatic additions
Type=simple
ExecStart=/usr/bin/env amazon-efs-mount-watchdog
KillMode=process