Skip to content

Commit

Permalink
chore: systemd hardening
Browse files Browse the repository at this point in the history
  • Loading branch information
zsien committed Sep 4, 2024
1 parent e15b893 commit d398238
Show file tree
Hide file tree
Showing 3 changed files with 69 additions and 0 deletions.
23 changes: 23 additions & 0 deletions misc/[email protected]
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,27 @@ Restart=always
RestartSec=3
@SYSTEMD_SLICE@

ReadOnlyPaths=/usr/share/deepin-service-manager/
ReadOnlyPaths=/usr/lib/deepin-service-manager/

DevicePolicy=closed

ProtectSystem=full
ProtectHome=yes
PrivateTmp=yes
PrivateDevices=yes
PrivateNetwork=yes
ProtectHostname=yes
ProtectClock=yes
ProtectKernelTunables=yes
ProtectKernelModules=yes
ProtectKernelLogs=yes
ProtectControlGroups=yes
RestrictAddressFamilies=AF_UNIX
RestrictNamespaces=yes
LockPersonality=yes
RestrictRealtime=yes
RestrictSUIDSGID=yes
RemoveIPC=yes

@SYSTEMD_INSTALL@
23 changes: 23 additions & 0 deletions misc/deepin-service-manager.service.in
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,27 @@ Restart=always
RestartSec=3
@SYSTEMD_SLICE@

ReadOnlyPaths=/usr/share/deepin-service-manager/
ReadOnlyPaths=/usr/lib/deepin-service-manager/

DevicePolicy=closed

ProtectSystem=full
ProtectHome=yes
PrivateTmp=yes
PrivateDevices=yes
PrivateNetwork=yes
ProtectHostname=yes
ProtectClock=yes
ProtectKernelTunables=yes
ProtectKernelModules=yes
ProtectKernelLogs=yes
ProtectControlGroups=yes
RestrictAddressFamilies=AF_UNIX
RestrictNamespaces=yes
LockPersonality=yes
RestrictRealtime=yes
RestrictSUIDSGID=yes
RemoveIPC=yes

@SYSTEMD_INSTALL@
23 changes: 23 additions & 0 deletions misc/[email protected]
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,27 @@ After=dbus.service
ExecStart=/usr/bin/deepin-service-manager -n %i
@SYSTEMD_SLICE@

ReadOnlyPaths=/usr/share/deepin-service-manager/
ReadOnlyPaths=/usr/lib/deepin-service-manager/

DevicePolicy=closed

ProtectSystem=full
ProtectHome=yes
PrivateTmp=yes
PrivateDevices=yes
PrivateNetwork=yes
ProtectHostname=yes
ProtectClock=yes
ProtectKernelTunables=yes
ProtectKernelModules=yes
ProtectKernelLogs=yes
ProtectControlGroups=yes
RestrictAddressFamilies=AF_UNIX
RestrictNamespaces=yes
LockPersonality=yes
RestrictRealtime=yes
RestrictSUIDSGID=yes
RemoveIPC=yes

@SYSTEMD_INSTALL@

0 comments on commit d398238

Please sign in to comment.