Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package accountsservice for openSUSE:Factory 
checked in at 2022-03-28 18:01:00
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/accountsservice (Old)
 and      /work/SRC/openSUSE:Factory/.accountsservice.new.1900 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "accountsservice"

Mon Mar 28 18:01:00 2022 rev:79 rq: version:0.6.55

Changes:
--------
--- /work/SRC/openSUSE:Factory/accountsservice/accountsservice.changes  
2022-03-28 13:43:29.558541001 +0200
+++ 
/work/SRC/openSUSE:Factory/.accountsservice.new.1900/accountsservice.changes    
    2022-03-28 18:01:01.445261794 +0200
@@ -2,111 +1,0 @@
-Mon Mar 28 11:34:44 UTC 2022 - Dominique Leuenberger <[email protected]>
-
-- Add accountsservice-too-restrictive.patch: weaken upstreams
-  policy of accounts-daemon.service to be similar, but still
-  stricter, to what we had with harden-accounts-daemon.service.patch.
-  Attempt to workaround
-  https://gitlab.freedesktop.org/accountsservice/accountsservice/-/issues/102
-
--------------------------------------------------------------------
-Mon Mar 28 07:32:37 UTC 2022 - Dominique Leuenberger <[email protected]>
-
-- Drop harden_accounts-daemon.service.patch: Seems to conflict with
-  SELinux since version 22.04.62.
-
--------------------------------------------------------------------
-Fri Feb 11 23:35:22 UTC 2022 - Bj??rn Lie <[email protected]>
-
-- Update to version 22.04.62:
-  + act-user-manager:
-    - Fix incorrect return types in some finish() functions
-    - Fix various refcounting bugs
-    - Make a private function static
-    - Remove ConsoleKit support
-    - Watch for the daemon going away and coming back
-  + act-user:
-    - Use G_DECLARE_FINAL_TYPE to declare ActUser
-    - Use stronger hashing methods in make_crypted() if available.
-  + Add .service file to POTFILES.skip
-  + Add support to build vala bindings
-  + build:
-    - Add missing pkg-config Requires.private dependencies
-    - Bump minimum version of meson required
-    - Expose chosen path_wtmp value as a variable
-  + Check GDBusMessage for INTERACTIVE_AUTHORIZATION flag
-  + ci:
-    - Add test stage, reusing the build one
-    - Cleanup the build stage so that we can define dependencies
-      just once
-  + Conditionalize more use of shadow.h
-  + daemon:
-    - Allow SystemAccount=false to be set in cache file
-    - Don't try to add admin users to non existing groups
-    - Ensure cache files for system users are processed
-    - Fix error check in save_autologin()
-    - Remove duplicate "changed" signal emission
-    - Write GDM custom.conf file if it doesn't exist
-  + data:
-    - Don't send change updates for login-history
-    - Tighten up systemd sandboxing of accounts-daemon.service
-  + Drop .service file from POTFILES.in
-  + Fix build with meson 0.60
-  + Fix g-i annotation of act_user_get_password_expiration_policy
-  + libaccountsservice: Expand documentation of ActUser:language
-  + main:
-    - Allow cache files to be marked immutable
-    - Don???t print translation header with `--help`
-  + meson: Determine project version from date
-  + Move D-Bus conf file to $(datadir)/dbus-1/system.d
-  + Never delete the root filesystem when removing users
-  + NEWS: Drop NEWS file
-  + po: delete obsolete po/accounts-service.pot
-  + Remove user heuristics
-  + Replace empty he.po with an actual translation
-  + Stop ignoring autotools generated files
-  + tests:
-    - Add unit tests for libaccountservice using dbusmock and gir
-      bindings
-    - Sync tests with upstream python-dbusmock
-  + user-classify: Add git to username blacklist
-  + user:
-    - Don't overwrite entire GECOS field when setting full name
-    - Fix double-unref of GDBusMethodInvocation throughout
-    - Fix indentation error
-    - Introduce user templates for setting default session etc
-    - Reject requests to change full name to something including a
-      comma
-    - Remove user from extra_admin_groups when demoting them from
-      admin
-    - Translate property x-session property name to match the proxy
-      one
-  + user-manager: Update users tables on username changes
-  + Use timestamps instead of (expiration time and last change
-    time)days
-  + util:
-    - Get uid when needed
-    - Split out helper method for getting admin group IDs
-  + Updated translations.
-- Drop patches fixed upstream:
-  + accountsservice-read-root-user-cache.patch
-  + accountsservice-wtmp-io-improvements.patch
-  + accountsservice-fix-gdm-crash.patch
-  + ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch
-  + accountsservice-fix-gdm-crash.patch
-- Note that accountsservice-fix-gdm-crash.patch was not applied
-  upstream, the issue was fixed in a different way. Upstream
-  encourages issue reports should the current fix prove to not be
-  good enough.
-- Rebase accountsservice-sysconfig.patch and
-  harden_accounts-daemon.service.patch
-- Drop accountsservice-filter-suse-accounts.patch: The system users
-  we were filtering are not present on any of today as far as I can
-  tell, so drop this patch filtering out "common system users" such
-  as beagleindex, fax and suse-ncc.
-- Stop passing systemd=true to meson, no longer recognized, nor
-  needed.
-- Add pkgconfig(vapigen) BuildRequires: New dependency.
-- Add fdupes BuildRequires and macro, remove duplicates.
-- Add python3-dbusmock and python3-gobject BuildRequires and add a
-  check section, run meson_test macro.
-
--------------------------------------------------------------------

Old:
----
  accountsservice-22.04.62.tar.xz
  accountsservice-too-restrictive.patch

New:
----
  ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch
  accountsservice-0.6.55.tar.xz
  accountsservice-filter-suse-accounts.patch
  accountsservice-fix-gdm-crash.patch
  accountsservice-read-root-user-cache.patch
  accountsservice-wtmp-io-improvements.patch
  harden_accounts-daemon.service.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ accountsservice.spec ++++++
--- /var/tmp/diff_new_pack.e6nAz7/_old  2022-03-28 18:01:02.117261588 +0200
+++ /var/tmp/diff_new_pack.e6nAz7/_new  2022-03-28 18:01:02.121261586 +0200
@@ -16,8 +16,9 @@
 #
 
 
+#!BuildIgnore:  rpmlint-mini
 Name:           accountsservice
-Version:        22.04.62
+Version:        0.6.55
 Release:        0
 Summary:        D-Bus Service to Manipulate User Account Information
 License:        GPL-3.0-or-later
@@ -26,21 +27,28 @@
 Source0:        
https://www.freedesktop.org/software/accountsservice/%{name}-%{version}.tar.xz
 
 # WARNING: do not remove/significantly change patch0 without updating the 
relevant patch in gdm too
-# PATCH-FIX-OPENSUSE accountsservice-sysconfig.patch bnc#688071 
[email protected] -- Read/write autologin configuration from sysconfig, like 
gdm (see gdm-sysconfig-settings.patch)
-Patch1:         accountsservice-sysconfig.patch
-# PATCH-FIX-UPSTREAM accountsservice-too-restrictive.patch 
https://gitlab.freedesktop.org/accountsservice/accountsservice/-/issues/102 -- 
Allow NAMESPACE switching until upstream finds the right flag
-Patch2:         accountsservice-too-restrictive.patch
+# PATCH-FIX-OPENSUSE accountsservice-sysconfig.patch bnc#688071 
[email protected] -- Read/write autologin configuration from sysconfig, like 
gdm (see gdm-sysconfig-settings.patch) WAS PATCH-FIX-OPENSUSE
+Patch0:         accountsservice-sysconfig.patch
+# PATCH-FIX-OPENSUSE accountsservice-filter-suse-accounts.patch 
[email protected] -- Filter out some system users that are specific to openSUSE
+Patch1:         accountsservice-filter-suse-accounts.patch
+# PATCH-FIX-UPSTREAM accountsservice-read-root-user-cache.patch bsc#1114292 
glfo#accountsservice/accountsservice#65 [email protected] read root user cache 
file WAS PATCH-FIX-UPSTREAM
+Patch2:         accountsservice-read-root-user-cache.patch
+# PATCH-FIX-UPSTREAM accountsservice-wtmp-io-improvements.patch boo#1139487 
[email protected] -- Backports that improve wtmp io performance.
+Patch3:         accountsservice-wtmp-io-improvements.patch
+# PATCH-FIX-UPSTREAM accountsservice-fix-gdm-crash.patch 
glfo#accountsservice/accountsservice#55 [email protected] -- Prevent 
gdm crash upon service restart when autologin is enabled
+Patch4:         accountsservice-fix-gdm-crash.patch
+# PATCH-FIX-OPENSUSE harden_accounts-daemon.service.patch [email protected] -- 
For details please see 
https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+Patch5:         harden_accounts-daemon.service.patch
+# PATCH-FIX-UPSTREAM ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch -- Fix 
build with meson 0.61.0
+Patch6:         
https://gitlab.freedesktop.org/accountsservice/accountsservice/-/commit/ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch
 
 ## SLE and Leap only patches start at 1000
 # PATCH-FEATURE-SLE as-fate318433-prevent-same-account-multi-logins.patch 
fate#318433 [email protected] -- prevent multiple simultaneous login.
 Patch1000:      as-fate318433-prevent-same-account-multi-logins.patch
 
-BuildRequires:  fdupes
 BuildRequires:  gtk-doc
 BuildRequires:  meson
 BuildRequires:  pkgconfig
-BuildRequires:  python3-dbusmock
-BuildRequires:  python3-gobject
 BuildRequires:  pkgconfig(dbus-1)
 BuildRequires:  pkgconfig(gio-2.0) >= 2.37.3
 BuildRequires:  pkgconfig(gio-unix-2.0)
@@ -49,7 +57,6 @@
 BuildRequires:  pkgconfig(libsystemd) >= 186
 BuildRequires:  pkgconfig(polkit-gobject-1)
 BuildRequires:  pkgconfig(systemd)
-BuildRequires:  pkgconfig(vapigen)
 %{?systemd_ordering}
 
 %description
@@ -96,8 +103,13 @@
 
 %prep
 %setup -q
+%patch0 -p1
 %patch1 -p1
 %patch2 -p1
+%patch3 -p1
+%patch4 -p1
+%patch5 -p1
+%patch6 -p1
 
 # SLE and Leap patches start at 1000
 %if 0%{?sle_version}
@@ -106,18 +118,15 @@
 
 %build
 %meson \
-       -D introspection=true \
-       -D gtk_doc=true \
+       -Dsystemd=true \
+       -Dintrospection=true \
+       -Dgtk_doc=true \
        %{nil}
 %meson_build
 
 %install
 %meson_install
 %find_lang accounts-service
-%fdupes %{buildroot}%{_datadir}/accountsservice/user-templates
-
-%check
-%meson_test
 
 %pre
 %service_add_pre accounts-daemon.service
@@ -136,10 +145,10 @@
 
 %files
 %license COPYING
-%doc README.md
+%doc NEWS README.md
 %{_unitdir}/accounts-daemon.service
+%{_sysconfdir}/dbus-1/system.d/org.freedesktop.Accounts.conf
 %{_libexecdir}/accounts-daemon
-%{_datadir}/dbus-1/system.d/org.freedesktop.Accounts.conf
 %{_datadir}/dbus-1/interfaces/org.freedesktop.Accounts.xml
 %{_datadir}/dbus-1/interfaces/org.freedesktop.Accounts.User.xml
 %{_datadir}/dbus-1/system-services/org.freedesktop.Accounts.service
@@ -148,10 +157,6 @@
 %dir %{_localstatedir}/lib/AccountsService
 %dir %{_localstatedir}/lib/AccountsService/users
 %dir %{_localstatedir}/lib/AccountsService/icons
-%dir %{_datadir}/accountsservice
-%dir %{_datadir}/accountsservice/user-templates
-%{_datadir}/accountsservice/user-templates/administrator
-%{_datadir}/accountsservice/user-templates/standard
 
 %files -n libaccountsservice0
 %{_libdir}/*.so.0*
@@ -166,9 +171,6 @@
 %{_libdir}/pkgconfig/accountsservice.pc
 %{_includedir}/accountsservice-1.0/
 %{_datadir}/gir-1.0/AccountsService-1.0.gir
-%dir %{_datadir}/vala/vapi
-%{_datadir}/vala/vapi/accountsservice.deps
-%{_datadir}/vala/vapi/accountsservice.vapi
 
 %files lang -f accounts-service.lang
 

++++++ ac9b14f1c1bbca413987d0bbfeaad05804107e9a.patch ++++++
>From ac9b14f1c1bbca413987d0bbfeaad05804107e9a Mon Sep 17 00:00:00 2001
From: Luca Boccassi <[email protected]>
Date: Sun, 31 Oct 2021 12:29:14 +0000
Subject: [PATCH] Fix build with meson 0.60

Positional parameters to merge_file() were never allowed and always
ignored, so just drop it.
See: https://github.com/mesonbuild/meson/issues/9441

Fixes #97
---
 data/meson.build | 1 -
 1 file changed, 1 deletion(-)

diff --git a/data/meson.build b/data/meson.build
index 70edf89..9e80299 100644
--- a/data/meson.build
+++ b/data/meson.build
@@ -33,7 +33,6 @@ configure_file(
 policy = act_namespace.to_lower() + '.policy'
 
 i18n.merge_file(
-  policy,
   input: policy + '.in',
   output: policy,
   po_dir: po_dir,
-- 
GitLab


++++++ accountsservice-22.04.62.tar.xz -> accountsservice-0.6.55.tar.xz ++++++
++++ 7122 lines of diff (skipped)

++++++ accountsservice-filter-suse-accounts.patch ++++++
Index: accountsservice-0.6.37/src/user-classify.c
===================================================================
--- accountsservice-0.6.37.orig/src/user-classify.c
+++ accountsservice-0.6.37/src/user-classify.c
@@ -51,7 +51,13 @@ static const char *default_excludes[] =
         "man",
         "at",
         "gdm",
-        "gnome-initial-setup"
+        "gnome-initial-setup",
+        "beagleindex",
+        "fax",
+        "suse-ncc",
+        "mailman",
+        "ldap",
+        "cyrus"
 };
 
 static gboolean

++++++ accountsservice-fix-gdm-crash.patch ++++++
>From 323707648fdefd11502faf44c2aa41d9b9500078 Mon Sep 17 00:00:00 2001
From: Iain Lane <[email protected]>
Date: Tue, 28 Apr 2020 16:47:00 +0100
Subject: [PATCH] act-user-manager: Watch for the daemon going away and coming
 back

And set is-loaded accordingly. This causes properties to be invalidated
on the client side and then get re-fetched when the daemon comes back.

https://gitlab.freedesktop.org/accountsservice/accountsservice/issues/55
---
 src/libaccountsservice/act-user-manager.c | 21 +++++++++++++++++++++
 1 file changed, 21 insertions(+)

diff --git a/src/libaccountsservice/act-user-manager.c 
b/src/libaccountsservice/act-user-manager.c
index 61a8719..a317507 100644
--- a/src/libaccountsservice/act-user-manager.c
+++ b/src/libaccountsservice/act-user-manager.c
@@ -2298,6 +2298,23 @@ act_user_manager_queue_load (ActUserManager *manager)
         }
 }
 
+static void
+on_name_owner_changed (GObject *object,
+                       GParamSpec *pspec,
+                       gpointer user_data)
+{
+        ActUserManager *manager = ACT_USER_MANAGER (user_data);
+        GDBusProxy *accounts_proxy = G_DBUS_PROXY (object);
+        g_autofree gchar *owner = NULL;
+
+        g_return_if_fail (ACT_IS_USER_MANAGER (manager));
+        g_return_if_fail (accounts_proxy != NULL);
+
+        owner = g_dbus_proxy_get_name_owner (accounts_proxy);
+
+        set_is_loaded (manager, owner != NULL);
+}
+
 static gboolean
 ensure_accounts_proxy (ActUserManager *manager)
 {
@@ -2335,6 +2352,10 @@ ensure_accounts_proxy (ActUserManager *manager)
                           "user-deleted",
                           G_CALLBACK (on_user_removed_in_accounts_service),
                           manager);
+        g_signal_connect (priv->accounts_proxy,
+                          "notify::g-name-owner",
+                          G_CALLBACK (on_name_owner_changed),
+                          manager);
 
         return TRUE;
 }
-- 
GitLab


++++++ accountsservice-read-root-user-cache.patch ++++++
>From d8b779513474ece1f5ec2fc9b7c32afb73e32181 Mon Sep 17 00:00:00 2001
From: Ray Strode <[email protected]>
Date: Mon, 29 Apr 2019 10:14:12 -0400
Subject: [PATCH] daemon: ensure cache files for system users are processed

At the moment we skip cache files for system users.  That
doesn't make much sense; if there's a cache file we should
be using it.

This commit changes the code to read cache files, even for
system users, and so lets root have a non-default session.

Closes: https://gitlab.freedesktop.org/accountsservice/accountsservice/issues/65
---
 src/daemon.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Index: accountsservice-0.6.55/src/daemon.c
===================================================================
--- accountsservice-0.6.55.orig/src/daemon.c    2019-05-30 00:12:49.993056439 
+0200
+++ accountsservice-0.6.55/src/daemon.c 2019-05-30 00:12:50.289059484 +0200
@@ -486,7 +486,7 @@ reload_users (Daemon *daemon)
         load_entries (daemon, users, TRUE, entry_generator_requested_users);
 
         /* Now add/update users from other sources, possibly non-local */
-        load_entries (daemon, users, FALSE, entry_generator_cachedir);
+        load_entries (daemon, users, TRUE, entry_generator_cachedir);
 
         wtmp_helper_update_login_frequencies (users);
 

++++++ accountsservice-sysconfig.patch ++++++
--- /var/tmp/diff_new_pack.e6nAz7/_old  2022-03-28 18:01:02.293261534 +0200
+++ /var/tmp/diff_new_pack.e6nAz7/_new  2022-03-28 18:01:02.297261533 +0200
@@ -4,19 +4,19 @@
 
     Use autologin configuration from sysconfig (SUSE-ism)
 
-Index: accountsservice-22.04.62/src/daemon.c
+Index: accountsservice-0.6.55/src/daemon.c
 ===================================================================
---- accountsservice-22.04.62.orig/src/daemon.c
-+++ accountsservice-22.04.62/src/daemon.c
-@@ -50,6 +50,7 @@
+--- accountsservice-0.6.55.orig/src/daemon.c   2019-04-23 17:16:09.000000000 
+0200
++++ accountsservice-0.6.55/src/daemon.c        2019-05-30 00:12:49.993056439 
+0200
+@@ -47,6 +47,7 @@
+ #include "wtmp-helper.h"
+ #include "daemon.h"
  #include "util.h"
- #include "user.h"
- #include "accounts-user-generated.h"
 +#include "gdm-sysconfig.h"
  
  #define PATH_PASSWD "/etc/passwd"
  #define PATH_SHADOW "/etc/shadow"
-@@ -581,7 +582,7 @@ reload_autologin_timeout (Daemon *daemon
+@@ -582,7 +583,7 @@ reload_autologin_timeout (Daemon *daemon
          priv->autologin_id = 0;
  
          if (!load_autologin (daemon, &name, &enabled, &error)) {
@@ -25,7 +25,7 @@
                  return FALSE;
          }
  
-@@ -1508,6 +1509,43 @@ daemon_local_check_auth (Daemon
+@@ -1474,6 +1475,43 @@ daemon_local_check_auth (Daemon
          g_object_unref (subject);
  }
  
@@ -69,7 +69,7 @@
  gboolean
  load_autologin (Daemon      *daemon,
                  gchar      **name,
-@@ -1518,6 +1556,8 @@ load_autologin (Daemon      *daemon,
+@@ -1484,6 +1522,8 @@ load_autologin (Daemon      *daemon,
          GError *local_error = NULL;
          g_autofree gchar *string = NULL;
  
@@ -78,19 +78,19 @@
          keyfile = g_key_file_new ();
          if (!g_key_file_load_from_file (keyfile,
                                          PATH_GDM_CUSTOM,
-@@ -1558,6 +1598,8 @@ save_autologin (Daemon      *daemon,
+@@ -1523,6 +1563,8 @@ save_autologin (Daemon      *daemon,
+         g_autofree gchar *data = NULL;
          gboolean result;
-         g_autoptr(GError) local_error = NULL;
  
 +        return save_autologin_suse (daemon, name, enabled, error);
 +
          keyfile = g_key_file_new ();
          if (!g_key_file_load_from_file (keyfile,
                                          PATH_GDM_CUSTOM,
-Index: accountsservice-22.04.62/src/gdm-sysconfig.c
+Index: accountsservice-0.6.55/src/gdm-sysconfig.c
 ===================================================================
---- /dev/null
-+++ accountsservice-22.04.62/src/gdm-sysconfig.c
+--- /dev/null  1970-01-01 00:00:00.000000000 +0000
++++ accountsservice-0.6.55/src/gdm-sysconfig.c 2019-05-30 00:12:49.993056439 
+0200
 @@ -0,0 +1,484 @@
 +/* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 8 -*-
 + *
@@ -576,10 +576,10 @@
 +        g_strfreev (lines);
 +        return result;
 +}
-Index: accountsservice-22.04.62/src/gdm-sysconfig.h
+Index: accountsservice-0.6.55/src/gdm-sysconfig.h
 ===================================================================
---- /dev/null
-+++ accountsservice-22.04.62/src/gdm-sysconfig.h
+--- /dev/null  1970-01-01 00:00:00.000000000 +0000
++++ accountsservice-0.6.55/src/gdm-sysconfig.h 2019-05-30 00:12:49.993056439 
+0200
 @@ -0,0 +1,43 @@
 +/* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 8 -*-
 + *
@@ -624,11 +624,11 @@
 +G_END_DECLS
 +
 +#endif /* __GDM_SYSCONFIG_H */
-Index: accountsservice-22.04.62/src/meson.build
+Index: accountsservice-0.6.55/src/meson.build
 ===================================================================
---- accountsservice-22.04.62.orig/src/meson.build
-+++ accountsservice-22.04.62/src/meson.build
-@@ -48,6 +48,8 @@ libaccounts_generated_dep = declare_depe
+--- accountsservice-0.6.55.orig/src/meson.build        2019-04-23 
17:16:09.000000000 +0200
++++ accountsservice-0.6.55/src/meson.build     2019-05-30 00:12:49.993056439 
+0200
+@@ -46,6 +46,8 @@ libaccounts_generated_dep = declare_depe
  )
  
  sources = files(

++++++ accountsservice-wtmp-io-improvements.patch ++++++
>From 64b11314ea71b5e22edf4d968347489c5d5acd01 Mon Sep 17 00:00:00 2001
From: Ray Strode <[email protected]>
Date: Thu, 9 May 2019 14:58:34 -0400
Subject: [PATCH] data: don't send change updates for login-history

The login-history property of user objects can be quite large.
If wtmp is changed frequently, that can lead to memory fragmentation
in clients.

Furthermore, most clients never check login-history, so it's
wasted memory and wasted cpu.

This commit disables change notification for that property.  If
a client really needs to get updates, they can manually refresh
their cache when appropriate.
---
 data/org.freedesktop.Accounts.User.xml | 1 +
 1 file changed, 1 insertion(+)

diff --git a/data/org.freedesktop.Accounts.User.xml 
b/data/org.freedesktop.Accounts.User.xml
index 8d3fe1c..3b839a3 100644
--- a/data/org.freedesktop.Accounts.User.xml
+++ b/data/org.freedesktop.Accounts.User.xml
@@ -812,6 +812,7 @@
   </property>
 
   <property name="LoginHistory" type="a(xxa{sv})" access="read">
+    <annotation name="org.freedesktop.DBus.Property.EmitsChangedSignal" 
value="false"/>
     <doc:doc>
       <doc:description>
         <doc:para>
-- 
2.16.4


++++++ harden_accounts-daemon.service.patch ++++++
Index: accountsservice-0.6.55/data/accounts-daemon.service.in
===================================================================
--- accountsservice-0.6.55.orig/data/accounts-daemon.service.in
+++ accountsservice-0.6.55/data/accounts-daemon.service.in
@@ -8,6 +8,15 @@ After=nss-user-lookup.target
 Wants=nss-user-lookup.target
 
 [Service]
+# added automatically, for details please see
+# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
+PrivateDevices=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
 Type=dbus
 BusName=org.freedesktop.Accounts
 ExecStart=@libexecdir@/accounts-daemon

Reply via email to