forked from pool/coturn
Accepting request 926042 from home:stroeder:network
- Dropped harden_coturn.service.patch because systemd units are created from own source anyway and are proven to work OBS-URL: https://build.opensuse.org/request/show/926042 OBS-URL: https://build.opensuse.org/package/show/network:telephony/coturn?expand=0&rev=21
This commit is contained in:
parent
df6f7fba40
commit
cb404f5020
@ -1,3 +1,9 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Oct 18 14:55:57 UTC 2021 - Michael Ströder <michael@stroeder.com>
|
||||||
|
|
||||||
|
- Dropped harden_coturn.service.patch because systemd units are
|
||||||
|
created from own source anyway and are proven to work
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Fri Oct 15 12:11:35 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
Fri Oct 15 12:11:35 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||||
|
|
||||||
|
@ -40,7 +40,6 @@ Source6: %{name}.firewalld
|
|||||||
Source7: README.SUSE
|
Source7: README.SUSE
|
||||||
Source8: %{name}-apparmor-usr.bin.turnserver
|
Source8: %{name}-apparmor-usr.bin.turnserver
|
||||||
Source9: %{name}@.service
|
Source9: %{name}@.service
|
||||||
Patch0: harden_coturn.service.patch
|
|
||||||
BuildRequires: fdupes
|
BuildRequires: fdupes
|
||||||
BuildRequires: firewall-macros
|
BuildRequires: firewall-macros
|
||||||
BuildRequires: libevent-devel >= 2.0.0
|
BuildRequires: libevent-devel >= 2.0.0
|
||||||
|
@ -1,22 +0,0 @@
|
|||||||
Index: coturn-4.5.2/examples/etc/coturn.service
|
|
||||||
===================================================================
|
|
||||||
--- coturn-4.5.2.orig/examples/etc/coturn.service
|
|
||||||
+++ coturn-4.5.2/examples/etc/coturn.service
|
|
||||||
@@ -15,6 +15,17 @@ ExecStart=/usr/bin/turnserver -c /etc/tu
|
|
||||||
Restart=on-failure
|
|
||||||
InaccessibleDirectories=/home
|
|
||||||
PrivateTmp=yes
|
|
||||||
+# added automatically, for details please see
|
|
||||||
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
|
||||||
+ProtectSystem=full
|
|
||||||
+ProtectHome=true
|
|
||||||
+ProtectHostname=true
|
|
||||||
+ProtectKernelTunables=true
|
|
||||||
+ProtectKernelModules=true
|
|
||||||
+ProtectKernelLogs=true
|
|
||||||
+ProtectControlGroups=true
|
|
||||||
+RestrictRealtime=true
|
|
||||||
+# end of automatic additions
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
Loading…
x
Reference in New Issue
Block a user