Accepting request 923726 from home:jsegitz:branches:systemdhardening:server:monitoring

Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/923726
OBS-URL: https://build.opensuse.org/package/show/server:monitoring/munin?expand=0&rev=69
This commit is contained in:
Lars Vogdt 2021-10-29 13:55:01 +00:00 committed by Git OBS Bridge
parent dafdb98c5e
commit 1d79aa82f6
5 changed files with 61 additions and 0 deletions

View File

@ -3,6 +3,19 @@ Description=Munin CGI Graph generator
Requires=network.target
[Service]
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
Type=forking
ExecStart=/usr/bin/spawn-fcgi -s /var/run/munin/munin-cgi-graph.sock -P /var/run/munin/munin-cgi-graph.pid -u munin -g munin -M 0770 -U munin -G www /srv/www/cgi-bin/munin-cgi-graph
PIDFile=/var/run/munin/munin-cgi-graph.pid

View File

@ -3,6 +3,19 @@ Description=Munin CGI HTML generator
Requires=network.target
[Service]
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
Type=forking
ExecStart=/usr/bin/spawn-fcgi -s /var/run/munin/munin-cgi-html.sock -P /var/run/munin/munin-cgi-html.pid -u munin -g munin -M 0770 -U munin -G www /srv/www/cgi-bin/munin-cgi-html
PIDFile=/var/run/munin/munin-cgi-html.pid

View File

@ -3,6 +3,19 @@ Description=Collect node data
Documentation=man:munin-cron(8)
[Service]
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
Type=oneshot
User=munin
ExecStart=/usr/bin/munin-cron

View File

@ -3,6 +3,19 @@ Description=Munin Node
Requires=network.target
[Service]
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
Type=forking
ExecStart=/usr/sbin/munin-node
ExecStartPre=/usr/bin/mkdir -p /var/run/munin/

View File

@ -1,3 +1,12 @@
-------------------------------------------------------------------
Thu Oct 7 10:26:31 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s) (bsc#1181400). Modified:
* munin-cgi-graph.service
* munin-cgi-html.service
* munin-cron.service
* munin-node.service
-------------------------------------------------------------------
Fri Mar 5 09:49:51 UTC 2021 - Thorsten Kukuk <kukuk@suse.com>