cfengine/harden_cf-runalerts.service.patch

25 lines
887 B
Diff
Raw Normal View History

Index: core-3.17.0/misc/systemd/cf-runalerts.service.in
===================================================================
--- core-3.17.0.orig/misc/systemd/cf-runalerts.service.in
+++ core-3.17.0/misc/systemd/cf-runalerts.service.in
@@ -9,6 +9,19 @@ After=cf-postgres.service
Requires=cf-postgres.service
[Service]
+# added automatically, for details please see
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+ProtectSystem=full
+ProtectHome=true
+PrivateDevices=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
+RestrictRealtime=true
+# end of automatic additions
# We simply launch this script every 60 seconds to perform alert related checks
Type=simple
# The cfapache user must have the rights to write to @workdir@/httpd/php/runalerts_*