Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package corosync-qdevice for
openSUSE:Factory checked in at 2024-11-14 16:09:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/corosync-qdevice (Old)
and /work/SRC/openSUSE:Factory/.corosync-qdevice.new.2017 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "corosync-qdevice"
Thu Nov 14 16:09:49 2024 rev:2 rq:1224101 version:3.0.3
Changes:
--------
--- /work/SRC/openSUSE:Factory/corosync-qdevice/corosync-qdevice.changes
2024-06-20 16:47:39.502597753 +0200
+++
/work/SRC/openSUSE:Factory/.corosync-qdevice.new.2017/corosync-qdevice.changes
2024-11-14 16:10:48.828071048 +0100
@@ -1,0 +2,6 @@
+Wed Nov 13 08:13:57 UTC 2024 - Nicholas Yang <[email protected]>
+
+- Add a patch to harden services with systemd sandboxing:
+ * 0001-harden-services-with-systemd-sandboxing.patch
+
+-------------------------------------------------------------------
New:
----
0001-harden-services-with-systemd-sandboxing.patch
BETA DEBUG BEGIN:
New:- Add a patch to harden services with systemd sandboxing:
* 0001-harden-services-with-systemd-sandboxing.patch
BETA DEBUG END:
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ corosync-qdevice.spec ++++++
--- /var/tmp/diff_new_pack.WZal6c/_old 2024-11-14 16:10:50.064121297 +0100
+++ /var/tmp/diff_new_pack.WZal6c/_new 2024-11-14 16:10:50.068121460 +0100
@@ -8,16 +8,13 @@
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
-# case the license is the MIT license). An "Open Source License" is a
+# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
-# Conditionals
-# Invoke "rpmbuild --without <feature>" or "rpmbuild --with <feature>"
-# to disable or enable specific features
%bcond_without runautogen
%bcond_without systemd
@@ -33,6 +30,7 @@
License: BSD-3-Clause
URL: https://github.com/corosync/corosync-qdevice
Source0:
https://github.com/corosync/corosync-qdevice/releases/download/v%{version}%{?gittarver}/%{name}-%{version}%{?gittarver}.tar.gz
+Patch0: 0001-harden-services-with-systemd-sandboxing.patch
# Runtime bits
Requires: corosync > 2.4.6
@@ -40,8 +38,8 @@
Requires: mozilla-nss-tools
%if %{with systemd}
-BuildRequires: pkgconfig(systemd)
BuildRequires: systemd-devel
+BuildRequires: pkgconfig(systemd)
Requires(post): systemd
Requires(preun): systemd
Requires(postun): systemd
@@ -69,11 +67,13 @@
%endif
%if %{with runautogen}
-BuildRequires: autoconf automake libtool
+BuildRequires: autoconf
+BuildRequires: automake
+BuildRequires: libtool
%endif
%prep
-%setup -q -n %{name}-%{version}%{?gittarver}
+%autosetup -p1 -n %{name}-%{version}%{?gittarver}
echo %{version} > .tarball-version
echo %{version} > .version
++++++ 0001-harden-services-with-systemd-sandboxing.patch ++++++
>From f7b8fd41b82ef11933f2d2b0e8f54192dfbcfa18 Mon Sep 17 00:00:00 2001
From: nicholasyang <[email protected]>
Date: Wed, 13 Nov 2024 16:11:10 +0800
Subject: [PATCH] harden services with systemd sandboxing
---
init/corosync-qdevice.service.in | 10 ++++++++++
init/corosync-qnetd.service.in | 13 +++++++++++++
2 files changed, 23 insertions(+)
diff --git a/init/corosync-qdevice.service.in b/init/corosync-qdevice.service.in
index 5ffb498..824e557 100644
--- a/init/corosync-qdevice.service.in
+++ b/init/corosync-qdevice.service.in
@@ -14,5 +14,15 @@ Restart=on-failure
RuntimeDirectory=corosync-qdevice
RuntimeDirectoryMode=0770
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+ProtectSystem=full
+ProtectHome=true
+PrivateDevices=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+
[Install]
WantedBy=multi-user.target
diff --git a/init/corosync-qnetd.service.in b/init/corosync-qnetd.service.in
index a8d6a7e..64da610 100644
--- a/init/corosync-qnetd.service.in
+++ b/init/corosync-qnetd.service.in
@@ -16,5 +16,18 @@ Restart=on-abnormal
RuntimeDirectory=corosync-qnetd
RuntimeDirectoryMode=0770
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+ProtectSystem=strict
+ProtectHome=true
+PrivateDevices=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
+RestrictRealtime=true
+NoNewPrivileges=true
+
[Install]
WantedBy=multi-user.target
--
2.47.0