Accepting request 918930 from home:jsegitz:branches:systemdhardening:devel:tools:building

Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/918930
OBS-URL: https://build.opensuse.org/package/show/devel:tools:building/distcc?expand=0&rev=31
This commit is contained in:
Martin Pluskal 2021-09-15 11:53:18 +00:00 committed by Git OBS Bridge
parent 73a71699d4
commit 8d22340d51
2 changed files with 19 additions and 0 deletions

View File

@ -1,3 +1,9 @@
-------------------------------------------------------------------
Mon Sep 13 14:35:20 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s) (bsc#1181400). Modified:
* distccd.service
------------------------------------------------------------------- -------------------------------------------------------------------
Wed May 12 21:18:15 UTC 2021 - Dirk Müller <dmueller@suse.com> Wed May 12 21:18:15 UTC 2021 - Dirk Müller <dmueller@suse.com>

View File

@ -3,6 +3,19 @@ Description=Distccd: A Distributed Compilation Server
After=network.target After=network.target
[Service] [Service]
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
EnvironmentFile=-/etc/sysconfig/distccd EnvironmentFile=-/etc/sysconfig/distccd
ExecStart=/usr/bin/distccd --verbose --no-detach --daemon --port 3632 -N 15 --allow $ALLOWED_SERVERS $EXTRA_PARAMS ExecStart=/usr/bin/distccd --verbose --no-detach --daemon --port 3632 -N 15 --allow $ALLOWED_SERVERS $EXTRA_PARAMS