From: Lennart Poettering Date: Wed, 19 Mar 2014 22:08:39 +0000 (+0100) Subject: core: enable PrivateNetwork= for a number of our long running services where this... X-Git-Tag: v212~75 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=f21a71a907a1b1289faec94559f4a1c111ea1d13;p=thirdparty%2Fsystemd.git core: enable PrivateNetwork= for a number of our long running services where this is useful --- diff --git a/units/systemd-bus-driverd.service.in b/units/systemd-bus-driverd.service.in index 52264862c17..5df2a9551f9 100644 --- a/units/systemd-bus-driverd.service.in +++ b/units/systemd-bus-driverd.service.in @@ -15,3 +15,4 @@ WatchdogSec=1min CapabilityBoundingSet=CAP_IPC_OWNER PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-bus-proxyd@.service.in b/units/systemd-bus-proxyd@.service.in index 1a6458ac579..fafd4ce033f 100644 --- a/units/systemd-bus-proxyd@.service.in +++ b/units/systemd-bus-proxyd@.service.in @@ -17,3 +17,4 @@ NotifyAccess=main CapabilityBoundingSet=CAP_IPC_OWNER PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-hostnamed.service.in b/units/systemd-hostnamed.service.in index c8bf8480c97..44812592e22 100644 --- a/units/systemd-hostnamed.service.in +++ b/units/systemd-hostnamed.service.in @@ -17,3 +17,4 @@ CapabilityBoundingSet=CAP_SYS_ADMIN CAP_DAC_OVERRIDE CAP_SYS_PTRACE WatchdogSec=1min PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-journal-gatewayd.service.in b/units/systemd-journal-gatewayd.service.in index a01ce8da453..e8e571e692a 100644 --- a/units/systemd-journal-gatewayd.service.in +++ b/units/systemd-journal-gatewayd.service.in @@ -14,6 +14,9 @@ ExecStart=@rootlibexecdir@/systemd-journal-gatewayd User=systemd-journal-gateway Group=systemd-journal-gateway SupplementaryGroups=systemd-journal +PrivateTmp=yes +PrivateDevices=yes +PrivateNetwork=yes [Install] Also=systemd-journal-gatewayd.socket diff --git a/units/systemd-localed.service.in b/units/systemd-localed.service.in index 6fb05655ca1..ae1c5e59d15 100644 --- a/units/systemd-localed.service.in +++ b/units/systemd-localed.service.in @@ -17,3 +17,4 @@ CapabilityBoundingSet= WatchdogSec=1min PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-machined.service.in b/units/systemd-machined.service.in index 2be1dcf4eac..1a27c6e4215 100644 --- a/units/systemd-machined.service.in +++ b/units/systemd-machined.service.in @@ -19,3 +19,4 @@ CapabilityBoundingSet=CAP_KILL WatchdogSec=1min PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-networkd.service.in b/units/systemd-networkd.service.in index ca40691f5e9..793381f894b 100644 --- a/units/systemd-networkd.service.in +++ b/units/systemd-networkd.service.in @@ -20,6 +20,7 @@ Restart=always RestartSec=0 ExecStart=@rootlibexecdir@/systemd-networkd WatchdogSec=1min +PrivateTmp=yes [Install] WantedBy=multi-user.target