Skip to content

Commit

Permalink
- fixed systemd sandboxing (bsc#1186095)
Browse files Browse the repository at this point in the history
  • Loading branch information
aschnell committed May 17, 2021
1 parent 98bc3db commit 1fe95a9
Show file tree
Hide file tree
Showing 6 changed files with 12 additions and 4 deletions.
2 changes: 1 addition & 1 deletion data/boot.service
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ ConditionPathExists=/etc/snapper/configs/root
Type=oneshot
ExecStart=/usr/bin/snapper --config root create --cleanup-algorithm number --description "boot"

CapabilityBoundingSet=CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
CapabilityBoundingSet=CAP_DAC_OVERRIDE CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
LockPersonality=true
NoNewPrivileges=false
PrivateNetwork=true
Expand Down
2 changes: 1 addition & 1 deletion data/cleanup.service
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ ExecStart=/usr/lib/snapper/systemd-helper --cleanup
IOSchedulingClass=idle
CPUSchedulingPolicy=idle

CapabilityBoundingSet=CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
CapabilityBoundingSet=CAP_DAC_OVERRIDE CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
LockPersonality=true
NoNewPrivileges=false
PrivateNetwork=true
Expand Down
2 changes: 1 addition & 1 deletion data/snapperd.service
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Type=dbus
BusName=org.opensuse.Snapper
ExecStart=/usr/sbin/snapperd

CapabilityBoundingSet=CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
CapabilityBoundingSet=CAP_DAC_OVERRIDE CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
LockPersonality=true
NoNewPrivileges=false
PrivateNetwork=true
Expand Down
3 changes: 3 additions & 0 deletions data/systemd-sandboxing.txt
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,9 @@ e.g. on SLE15 SP1.

CapabilityBoundingSet=CAP_FOWNER is needed if for home directories.

CapabilityBoundingSet=CAP_DAC_OVERRIDE is needed for directory
comparison (in some cases) - but not if using btrfs send/receive.

Finally do not forget the hooks.

Have a lot of fun...
Expand Down
2 changes: 1 addition & 1 deletion data/timeline.service
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Documentation=man:snapper(8) man:snapper-configs(5)
Type=simple
ExecStart=/usr/lib/snapper/systemd-helper --timeline

CapabilityBoundingSet=CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
CapabilityBoundingSet=CAP_DAC_OVERRIDE CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE
LockPersonality=true
NoNewPrivileges=false
PrivateNetwork=true
Expand Down
5 changes: 5 additions & 0 deletions package/snapper.changes
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
-------------------------------------------------------------------
Mon May 17 08:39:58 CEST 2021 - [email protected]

- fixed systemd sandboxing (bsc#1186095)

-------------------------------------------------------------------
Tue May 11 10:01:30 CEST 2021 - [email protected]

Expand Down

0 comments on commit 1fe95a9

Please sign in to comment.