From: Lennart Poettering Date: Wed, 19 Mar 2014 22:08:39 +0000 (+0100) Subject: core: enable PrivateNetwork= for a number of our long running services where this... X-Git-Tag: v212~75 X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=commitdiff_plain;h=f21a71a907a1b1289faec94559f4a1c111ea1d13;p=elogind.git core: enable PrivateNetwork= for a number of our long running services where this is useful --- diff --git a/units/systemd-bus-driverd.service.in b/units/systemd-bus-driverd.service.in index 52264862c..5df2a9551 100644 --- a/units/systemd-bus-driverd.service.in +++ b/units/systemd-bus-driverd.service.in @@ -15,3 +15,4 @@ WatchdogSec=1min CapabilityBoundingSet=CAP_IPC_OWNER PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-bus-proxyd@.service.in b/units/systemd-bus-proxyd@.service.in index 1a6458ac5..fafd4ce03 100644 --- a/units/systemd-bus-proxyd@.service.in +++ b/units/systemd-bus-proxyd@.service.in @@ -17,3 +17,4 @@ NotifyAccess=main CapabilityBoundingSet=CAP_IPC_OWNER PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-hostnamed.service.in b/units/systemd-hostnamed.service.in index c8bf8480c..44812592e 100644 --- a/units/systemd-hostnamed.service.in +++ b/units/systemd-hostnamed.service.in @@ -17,3 +17,4 @@ CapabilityBoundingSet=CAP_SYS_ADMIN CAP_DAC_OVERRIDE CAP_SYS_PTRACE WatchdogSec=1min PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-journal-gatewayd.service.in b/units/systemd-journal-gatewayd.service.in index a01ce8da4..e8e571e69 100644 --- a/units/systemd-journal-gatewayd.service.in +++ b/units/systemd-journal-gatewayd.service.in @@ -14,6 +14,9 @@ ExecStart=@rootlibexecdir@/systemd-journal-gatewayd User=systemd-journal-gateway Group=systemd-journal-gateway SupplementaryGroups=systemd-journal +PrivateTmp=yes +PrivateDevices=yes +PrivateNetwork=yes [Install] Also=systemd-journal-gatewayd.socket diff --git a/units/systemd-localed.service.in b/units/systemd-localed.service.in index 6fb05655c..ae1c5e59d 100644 --- a/units/systemd-localed.service.in +++ b/units/systemd-localed.service.in @@ -17,3 +17,4 @@ CapabilityBoundingSet= WatchdogSec=1min PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-machined.service.in b/units/systemd-machined.service.in index 2be1dcf4e..1a27c6e42 100644 --- a/units/systemd-machined.service.in +++ b/units/systemd-machined.service.in @@ -19,3 +19,4 @@ CapabilityBoundingSet=CAP_KILL WatchdogSec=1min PrivateTmp=yes PrivateDevices=yes +PrivateNetwork=yes diff --git a/units/systemd-networkd.service.in b/units/systemd-networkd.service.in index ca40691f5..793381f89 100644 --- a/units/systemd-networkd.service.in +++ b/units/systemd-networkd.service.in @@ -20,6 +20,7 @@ Restart=always RestartSec=0 ExecStart=@rootlibexecdir@/systemd-networkd WatchdogSec=1min +PrivateTmp=yes [Install] WantedBy=multi-user.target