jobextra/fluidsynth/fluidsynth-2.2.9-user_service_hardening.patch

36 lines
1.1 KiB
Diff
Raw Normal View History

2023-01-22 15:03:17 +01:00
From ecd5f01ad3078e391a289563e9a77db015a6bc3a Mon Sep 17 00:00:00 2001
From: David Runge <dave@sleepmap.de>
Date: Wed, 7 Sep 2022 10:30:26 +0200
Subject: [PATCH] Remove systemd hardening options for system services
fluidsynth.service.in:
As fluidsynth is run as a systemd user service, applying sandboxing
options only available to systemd system services will prevent the user
service from starting, thus we remove the ones only available to system
services.
---
fluidsynth.service.in | 9 ---------
1 file changed, 9 deletions(-)
diff --git a/fluidsynth.service.in b/fluidsynth.service.in
index 857994214..f49d5fce9 100644
--- a/fluidsynth.service.in
+++ b/fluidsynth.service.in
@@ -4,16 +4,7 @@ Documentation=man:fluidsynth(1)
After=sound.target
[Service]
-# added automatically, for details please see
-# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
ProtectSystem=full
-ProtectHome=read-only
-ProtectHostname=true
-ProtectKernelTunables=true
-ProtectKernelModules=true
-ProtectKernelLogs=true
-ProtectControlGroups=true
-# end of automatic additions
Type=notify
NotifyAccess=main
EnvironmentFile=@FLUID_DAEMON_ENV_FILE@