mirror of https://github.com/dswd/vpncloud.git
Compare commits
No commits in common. "ed81c0de881b56a9b3084f27014d2d7547ad393d" and "7edb649c3218498dc253bd4fdae97dd1d7365838" have entirely different histories.
ed81c0de88
...
7edb649c32
|
@ -9,10 +9,6 @@ jobs:
|
|||
|
||||
steps:
|
||||
- uses: actions/checkout@v1
|
||||
- name: Install latest nightly
|
||||
run: rustup toolchain install 1.40.0
|
||||
- name: Set default toolchain
|
||||
run: rustup default 1.40.0
|
||||
- name: Build
|
||||
run: cargo build --verbose
|
||||
- name: Run tests
|
||||
|
|
|
@ -2,10 +2,6 @@
|
|||
|
||||
This project follows [semantic versioning](http://semver.org).
|
||||
|
||||
### v1.2.1 (2019-12-22)
|
||||
|
||||
- [fixed] Fixed a problem with service restrictions
|
||||
|
||||
### v1.2.0 (2019-12-20)
|
||||
|
||||
- [added] Added service restrictions to systemd
|
||||
|
|
|
@ -556,7 +556,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
|
|||
|
||||
[[package]]
|
||||
name = "vpncloud"
|
||||
version = "1.2.1"
|
||||
version = "1.2.0"
|
||||
dependencies = [
|
||||
"cc 1.0.48 (registry+https://github.com/rust-lang/crates.io-index)",
|
||||
"daemonize 0.4.1 (registry+https://github.com/rust-lang/crates.io-index)",
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
[package]
|
||||
name = "vpncloud"
|
||||
version = "1.2.1"
|
||||
version = "1.2.0"
|
||||
authors = ["Dennis Schwerdel <schwerdel@googlemail.com>"]
|
||||
build = "build.rs"
|
||||
license = "GPL-3.0"
|
||||
|
|
|
@ -1,9 +1,3 @@
|
|||
vpncloud (1.2.1) stable; urgency=medium
|
||||
|
||||
* [fixed] Fixed a problem with service restrictions
|
||||
|
||||
-- Dennis Schwerdel <schwerdel@googlemail.com> Sun, 22 Dec 2019 16:47:38 +0100
|
||||
|
||||
vpncloud (1.2.0) stable; urgency=medium
|
||||
|
||||
* [added] Added service restrictions to systemd
|
||||
|
|
|
@ -14,7 +14,7 @@ LimitNPROC=10
|
|||
PrivateTmp=yes
|
||||
ProtectHome=yes
|
||||
ProtectSystem=strict
|
||||
ReadWritePaths=/var/log
|
||||
ReadWritePaths=/var/log/vpncloud-%i.log /var/log/vpncloud-%i.stats
|
||||
CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_RAW CAP_SETGID CAP_SETUID CAP_SYS_CHROOT
|
||||
DeviceAllow=/dev/null rw
|
||||
DeviceAllow=/dev/net/tun rw
|
||||
|
|
Loading…
Reference in New Issue