Blame SOURCES/chrony-services.patch

64b7ef
diff --git a/examples/chrony-wait.service b/examples/chrony-wait.service
64b7ef
index 72b028f2..b3aa7aa2 100644
64b7ef
--- a/examples/chrony-wait.service
64b7ef
+++ b/examples/chrony-wait.service
64b7ef
@@ -16,32 +16,5 @@ TimeoutStartSec=180
64b7ef
 RemainAfterExit=yes
64b7ef
 StandardOutput=null
64b7ef
 
64b7ef
-CapabilityBoundingSet=
64b7ef
-DevicePolicy=closed
64b7ef
-DynamicUser=yes
64b7ef
-IPAddressAllow=localhost
64b7ef
-IPAddressDeny=any
64b7ef
-LockPersonality=yes
64b7ef
-MemoryDenyWriteExecute=yes
64b7ef
-PrivateDevices=yes
64b7ef
-PrivateUsers=yes
64b7ef
-ProcSubset=pid
64b7ef
-ProtectClock=yes
64b7ef
-ProtectControlGroups=yes
64b7ef
-ProtectHome=yes
64b7ef
-ProtectHostname=yes
64b7ef
-ProtectKernelLogs=yes
64b7ef
-ProtectKernelModules=yes
64b7ef
-ProtectKernelTunables=yes
64b7ef
-ProtectProc=invisible
64b7ef
-ProtectSystem=strict
64b7ef
-RestrictAddressFamilies=AF_INET AF_INET6
64b7ef
-RestrictNamespaces=yes
64b7ef
-RestrictRealtime=yes
64b7ef
-SystemCallArchitectures=native
64b7ef
-SystemCallFilter=@system-service
64b7ef
-SystemCallFilter=~@privileged @resources
64b7ef
-UMask=0777
64b7ef
-
64b7ef
 [Install]
64b7ef
 WantedBy=multi-user.target
64b7ef
diff --git a/examples/chronyd.service b/examples/chronyd.service
64b7ef
index 4fb930ef..289548cb 100644
64b7ef
--- a/examples/chronyd.service
64b7ef
+++ b/examples/chronyd.service
64b7ef
@@ -10,40 +10,9 @@ Type=forking
64b7ef
 PIDFile=/run/chrony/chronyd.pid
64b7ef
 EnvironmentFile=-/etc/sysconfig/chronyd
64b7ef
 ExecStart=/usr/sbin/chronyd $OPTIONS
64b7ef
-
64b7ef
-CapabilityBoundingSet=~CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_AUDIT_WRITE
64b7ef
-CapabilityBoundingSet=~CAP_BLOCK_SUSPEND CAP_KILL CAP_LEASE CAP_LINUX_IMMUTABLE
64b7ef
-CapabilityBoundingSet=~CAP_MAC_ADMIN CAP_MAC_OVERRIDE CAP_MKNOD CAP_SYS_ADMIN
64b7ef
-CapabilityBoundingSet=~CAP_SYS_BOOT CAP_SYS_CHROOT CAP_SYS_MODULE CAP_SYS_PACCT
64b7ef
-CapabilityBoundingSet=~CAP_SYS_PTRACE CAP_SYS_RAWIO CAP_SYS_TTY_CONFIG CAP_WAKE_ALARM
64b7ef
-DeviceAllow=char-pps rw
64b7ef
-DeviceAllow=char-ptp rw
64b7ef
-DeviceAllow=char-rtc rw
64b7ef
-DevicePolicy=closed
64b7ef
-LockPersonality=yes
64b7ef
-MemoryDenyWriteExecute=yes
64b7ef
-NoNewPrivileges=yes
64b7ef
 PrivateTmp=yes
64b7ef
-ProcSubset=pid
64b7ef
-ProtectControlGroups=yes
64b7ef
 ProtectHome=yes
64b7ef
-ProtectHostname=yes
64b7ef
-ProtectKernelLogs=yes
64b7ef
-ProtectKernelModules=yes
64b7ef
-ProtectKernelTunables=yes
64b7ef
-ProtectProc=invisible
64b7ef
-ProtectSystem=strict
64b7ef
-ReadWritePaths=/run /var/lib/chrony -/var/log
64b7ef
-RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX
64b7ef
-RestrictNamespaces=yes
64b7ef
-RestrictSUIDSGID=yes
64b7ef
-SystemCallArchitectures=native
64b7ef
-SystemCallFilter=~@cpu-emulation @debug @module @mount @obsolete @raw-io @reboot @swap
64b7ef
-
64b7ef
-# Adjust restrictions for /usr/sbin/sendmail (mailonchange directive)
64b7ef
-NoNewPrivileges=no
64b7ef
-ReadWritePaths=-/var/spool
64b7ef
-RestrictAddressFamilies=AF_NETLINK
64b7ef
+ProtectSystem=full
64b7ef
 
64b7ef
 [Install]
64b7ef
 WantedBy=multi-user.target