SHA256
1
0
forked from pool/redis

Accepting request 932987 from server:database

OBS-URL: https://build.opensuse.org/request/show/932987
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=75
This commit is contained in:
Dominique Leuenberger 2021-11-24 22:54:12 +00:00 committed by Git OBS Bridge
commit cba4994c8e
3 changed files with 33 additions and 0 deletions

View File

@ -8,6 +8,19 @@ Type=notify
User=redis
Group=redis
PrivateTmp=true
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
PIDFile=/run/redis/sentinel-%i.pid
ExecStart=/usr/sbin/redis-sentinel /etc/redis/sentinel-%i.conf
LimitNOFILE=10240

View File

@ -1,3 +1,10 @@
-------------------------------------------------------------------
Mon Nov 15 12:57:13 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s) (bsc#1181400). Modified:
* redis-sentinel@.service
* redis@.service
-------------------------------------------------------------------
Mon Oct 4 20:23:56 UTC 2021 - Michael Ströder <michael@stroeder.com>

View File

@ -8,6 +8,19 @@ Type=notify
User=redis
Group=redis
PrivateTmp=true
# added automatically, for details please see
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
ProtectHome=true
PrivateDevices=true
ProtectHostname=true
ProtectClock=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectKernelLogs=true
ProtectControlGroups=true
RestrictRealtime=true
# end of automatic additions
PIDFile=/run/redis/%i.pid
ExecStart=/usr/sbin/redis-server /etc/redis/%i.conf
LimitNOFILE=10240