forked from pool/redis
Accepting request 932987 from server:database
OBS-URL: https://build.opensuse.org/request/show/932987 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=75
This commit is contained in:
commit
cba4994c8e
@ -8,6 +8,19 @@ Type=notify
|
|||||||
User=redis
|
User=redis
|
||||||
Group=redis
|
Group=redis
|
||||||
PrivateTmp=true
|
PrivateTmp=true
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
PrivateDevices=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
PIDFile=/run/redis/sentinel-%i.pid
|
PIDFile=/run/redis/sentinel-%i.pid
|
||||||
ExecStart=/usr/sbin/redis-sentinel /etc/redis/sentinel-%i.conf
|
ExecStart=/usr/sbin/redis-sentinel /etc/redis/sentinel-%i.conf
|
||||||
LimitNOFILE=10240
|
LimitNOFILE=10240
|
||||||
|
@ -1,3 +1,10 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Nov 15 12:57:13 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||||||
|
|
||||||
|
- Added hardening to systemd service(s) (bsc#1181400). Modified:
|
||||||
|
* redis-sentinel@.service
|
||||||
|
* redis@.service
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Mon Oct 4 20:23:56 UTC 2021 - Michael Ströder <michael@stroeder.com>
|
Mon Oct 4 20:23:56 UTC 2021 - Michael Ströder <michael@stroeder.com>
|
||||||
|
|
||||||
|
@ -8,6 +8,19 @@ Type=notify
|
|||||||
User=redis
|
User=redis
|
||||||
Group=redis
|
Group=redis
|
||||||
PrivateTmp=true
|
PrivateTmp=true
|
||||||
|
# added automatically, for details please see
|
||||||
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
PrivateDevices=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
# end of automatic additions
|
||||||
PIDFile=/run/redis/%i.pid
|
PIDFile=/run/redis/%i.pid
|
||||||
ExecStart=/usr/sbin/redis-server /etc/redis/%i.conf
|
ExecStart=/usr/sbin/redis-server /etc/redis/%i.conf
|
||||||
LimitNOFILE=10240
|
LimitNOFILE=10240
|
||||||
|
Loading…
Reference in New Issue
Block a user