Accepting request 914367 from home:jsegitz:branches:systemdhardening:systemsmanagement
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort OBS-URL: https://build.opensuse.org/request/show/914367 OBS-URL: https://build.opensuse.org/package/show/systemsmanagement/cfengine?expand=0&rev=195
This commit is contained in:
committed by
Git OBS Bridge
parent
2d9a111f22
commit
ab42e2775f
24
harden_cf-serverd.service.patch
Normal file
24
harden_cf-serverd.service.patch
Normal file
@@ -0,0 +1,24 @@
|
||||
Index: core-3.17.0/misc/systemd/cf-serverd.service.in
|
||||
===================================================================
|
||||
--- core-3.17.0.orig/misc/systemd/cf-serverd.service.in
|
||||
+++ core-3.17.0/misc/systemd/cf-serverd.service.in
|
||||
@@ -8,6 +8,19 @@ ConditionPathExists=@workdir@/inputs/pro
|
||||
PartOf=cfengine3.service
|
||||
|
||||
[Service]
|
||||
+# added automatically, for details please see
|
||||
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||
+ProtectSystem=full
|
||||
+ProtectHome=true
|
||||
+PrivateDevices=true
|
||||
+ProtectHostname=true
|
||||
+ProtectClock=true
|
||||
+ProtectKernelTunables=true
|
||||
+ProtectKernelModules=true
|
||||
+ProtectKernelLogs=true
|
||||
+ProtectControlGroups=true
|
||||
+RestrictRealtime=true
|
||||
+# end of automatic additions
|
||||
Type=simple
|
||||
ExecStart=@bindir@/cf-serverd --no-fork
|
||||
Restart=always
|
Reference in New Issue
Block a user