From cb404f5020b6e90a1180f3a05c1e466e0941be676d059ac0f59d60090ab9566a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Michael=20Str=C3=B6der?= Date: Mon, 18 Oct 2021 15:04:18 +0000 Subject: [PATCH] Accepting request 926042 from home:stroeder:network - Dropped harden_coturn.service.patch because systemd units are created from own source anyway and are proven to work OBS-URL: https://build.opensuse.org/request/show/926042 OBS-URL: https://build.opensuse.org/package/show/network:telephony/coturn?expand=0&rev=21 --- coturn.changes | 6 ++++++ coturn.spec | 1 - harden_coturn.service.patch | 22 ---------------------- 3 files changed, 6 insertions(+), 23 deletions(-) delete mode 100644 harden_coturn.service.patch diff --git a/coturn.changes b/coturn.changes index 5ccc659..5ec52f6 100644 --- a/coturn.changes +++ b/coturn.changes @@ -1,3 +1,9 @@ +------------------------------------------------------------------- +Mon Oct 18 14:55:57 UTC 2021 - Michael Ströder + +- Dropped harden_coturn.service.patch because systemd units are + created from own source anyway and are proven to work + ------------------------------------------------------------------- Fri Oct 15 12:11:35 UTC 2021 - Johannes Segitz diff --git a/coturn.spec b/coturn.spec index e27f98d..cdee087 100644 --- a/coturn.spec +++ b/coturn.spec @@ -40,7 +40,6 @@ Source6: %{name}.firewalld Source7: README.SUSE Source8: %{name}-apparmor-usr.bin.turnserver Source9: %{name}@.service -Patch0: harden_coturn.service.patch BuildRequires: fdupes BuildRequires: firewall-macros BuildRequires: libevent-devel >= 2.0.0 diff --git a/harden_coturn.service.patch b/harden_coturn.service.patch deleted file mode 100644 index ec07154..0000000 --- a/harden_coturn.service.patch +++ /dev/null @@ -1,22 +0,0 @@ -Index: coturn-4.5.2/examples/etc/coturn.service -=================================================================== ---- coturn-4.5.2.orig/examples/etc/coturn.service -+++ coturn-4.5.2/examples/etc/coturn.service -@@ -15,6 +15,17 @@ ExecStart=/usr/bin/turnserver -c /etc/tu - Restart=on-failure - InaccessibleDirectories=/home - PrivateTmp=yes -+# added automatically, for details please see -+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort -+ProtectSystem=full -+ProtectHome=true -+ProtectHostname=true -+ProtectKernelTunables=true -+ProtectKernelModules=true -+ProtectKernelLogs=true -+ProtectControlGroups=true -+RestrictRealtime=true -+# end of automatic additions - - [Install] - WantedBy=multi-user.target