Accepting request 946929 from network:dhcp
OBS-URL: https://build.opensuse.org/request/show/946929 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dhcp?expand=0&rev=130
This commit is contained in:
commit
ebd11ee0ea
20
dhcp.changes
20
dhcp.changes
@ -1,3 +1,14 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Jan 17 08:52:07 UTC 2022 - Johannes Segitz <jsegitz@suse.com>
|
||||||
|
|
||||||
|
- Drop PrivateDevices and ProtectClock hardenings. They clash with
|
||||||
|
the chroot logic (bsc#1194722)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jan 14 13:19:38 UTC 2022 - Callum Farmer <gmbr3@opensuse.org>
|
||||||
|
|
||||||
|
- Add now working CONFIG parameter to sysusers generator
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Oct 26 11:58:59 UTC 2021 - Reinhard Max <max@suse.com>
|
Tue Oct 26 11:58:59 UTC 2021 - Reinhard Max <max@suse.com>
|
||||||
|
|
||||||
@ -6,6 +17,15 @@ Tue Oct 26 11:58:59 UTC 2021 - Reinhard Max <max@suse.com>
|
|||||||
removal once we don't have to support SLE-12 anymore.
|
removal once we don't have to support SLE-12 anymore.
|
||||||
- bsc#1192020: Drop the obsolete dependency on "group(nogroup)".
|
- bsc#1192020: Drop the obsolete dependency on "group(nogroup)".
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 13 13:50:50 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||||
|
|
||||||
|
- Added hardening to systemd service(s) (bsc#1181400). Modified:
|
||||||
|
* dhcpd.service
|
||||||
|
* dhcpd6.service
|
||||||
|
* dhcrelay.service
|
||||||
|
* dhcrelay6.service
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu Aug 5 11:33:54 UTC 2021 - Reinhard Max <max@suse.com>
|
Thu Aug 5 11:33:54 UTC 2021 - Reinhard Max <max@suse.com>
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package dhcp
|
# spec file for package dhcp
|
||||||
#
|
#
|
||||||
# Copyright (c) 2021 SUSE LLC
|
# Copyright (c) 2022 SUSE LLC
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -274,7 +274,7 @@ cat bind/install.log
|
|||||||
: building dhcp sources
|
: building dhcp sources
|
||||||
%make_build
|
%make_build
|
||||||
%if %{with sysusers}
|
%if %{with sysusers}
|
||||||
%sysusers_generate_pre %{SOURCE47} dhcp-server
|
%sysusers_generate_pre %{SOURCE47} dhcp-server dhcp-user.conf
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
%check
|
%check
|
||||||
|
@ -4,6 +4,16 @@ Before=multi-user.target
|
|||||||
After=remote-fs.target network.target nss-lookup.target time-sync.target slapd.service sssd.service ndsd.service
|
After=remote-fs.target network.target nss-lookup.target time-sync.target slapd.service sssd.service ndsd.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
Type=forking
|
Type=forking
|
||||||
Restart=on-abort
|
Restart=on-abort
|
||||||
ExecStart=@LIBEXECDIR@/dhcp/dhcpd -4 start
|
ExecStart=@LIBEXECDIR@/dhcp/dhcpd -4 start
|
||||||
|
@ -4,6 +4,16 @@ Before=multi-user.target
|
|||||||
After=remote-fs.target network.target nss-lookup.target time-sync.target slapd.service sssd.service ndsd.service
|
After=remote-fs.target network.target nss-lookup.target time-sync.target slapd.service sssd.service ndsd.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
Type=forking
|
Type=forking
|
||||||
Restart=on-abort
|
Restart=on-abort
|
||||||
ExecStart=@LIBEXECDIR@/dhcp/dhcpd -6 start
|
ExecStart=@LIBEXECDIR@/dhcp/dhcpd -6 start
|
||||||
|
@ -4,6 +4,16 @@ Before=multi-user.target
|
|||||||
After=remote-fs.target network.target nss-lookup.target time-sync.target ldap.service ndsd.service
|
After=remote-fs.target network.target nss-lookup.target time-sync.target ldap.service ndsd.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
Type=forking
|
Type=forking
|
||||||
Restart=on-abort
|
Restart=on-abort
|
||||||
ExecStart=@LIBEXECDIR@/dhcp/dhcrelay -4 start
|
ExecStart=@LIBEXECDIR@/dhcp/dhcrelay -4 start
|
||||||
|
@ -4,6 +4,16 @@ Before=multi-user.target
|
|||||||
After=remote-fs.target network.target nss-lookup.target time-sync.target ldap.service ndsd.service
|
After=remote-fs.target network.target nss-lookup.target time-sync.target ldap.service ndsd.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
Type=forking
|
Type=forking
|
||||||
Restart=on-abort
|
Restart=on-abort
|
||||||
ExecStart=@LIBEXECDIR@/dhcp/dhcrelay -6 start
|
ExecStart=@LIBEXECDIR@/dhcp/dhcrelay -6 start
|
||||||
|
Loading…
x
Reference in New Issue
Block a user