forked from ElementsProject/elements
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
init: add SystemD elementsd.service file
- Loading branch information
1 parent
b47d087
commit bd29207
Showing
1 changed file
with
78 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,78 @@ | ||
# It is not recommended to modify this file in-place, because it will | ||
# be overwritten during package upgrades. If you want to add further | ||
# options or overwrite existing ones then use | ||
# $ systemctl edit elementsd.service | ||
# See "man systemd.service" for details. | ||
|
||
# Note that almost all daemon options could be specified in | ||
# /etc/elements/elements.conf, but keep in mind those explicitly | ||
# specified as arguments in ExecStart= will override those in the | ||
# config file. | ||
|
||
[Unit] | ||
Description=Elements daemon | ||
After=network.target | ||
|
||
[Service] | ||
ExecStart=/usr/local/bin/elementsd -daemon \ | ||
-pid=/run/elementsd/elementsd.pid \ | ||
-conf=/etc/elements/elements.conf \ | ||
-datadir=/var/lib/elementsd \ | ||
-debuglogfile=/var/log/elementsd/debug.log | ||
|
||
# Make sure the config directory is readable by the service user | ||
PermissionsStartOnly=true | ||
ExecStartPre=/bin/chgrp elements /etc/elements | ||
|
||
# Process management | ||
#################### | ||
|
||
Type=forking | ||
PIDFile=/run/elementsd/elementsd.pid | ||
Restart=on-failure | ||
TimeoutStopSec=600 | ||
|
||
# Directory creation and permissions | ||
#################################### | ||
|
||
# Run as elements:elements | ||
User=elements | ||
Group=elements | ||
|
||
# /run/elementsd | ||
RuntimeDirectory=elementsd | ||
RuntimeDirectoryMode=0710 | ||
|
||
# /etc/elements | ||
ConfigurationDirectory=elements | ||
ConfigurationDirectoryMode=0710 | ||
|
||
# /var/lib/elementsd | ||
StateDirectory=elementsd | ||
StateDirectoryMode=0710 | ||
|
||
# Hardening measures | ||
#################### | ||
|
||
# Provide a private /tmp and /var/tmp. | ||
PrivateTmp=true | ||
|
||
# Mount /usr, /boot/ and /etc read-only for the process. | ||
ProtectSystem=full | ||
|
||
# Deny access to /home, /root and /run/user | ||
ProtectHome=true | ||
|
||
# Disallow the process and all of its children to gain | ||
# new privileges through execve(). | ||
NoNewPrivileges=true | ||
|
||
# Use a new /dev namespace only populated with API pseudo devices | ||
# such as /dev/null, /dev/zero and /dev/random. | ||
PrivateDevices=true | ||
|
||
# Deny the creation of writable and executable memory mappings. | ||
MemoryDenyWriteExecute=true | ||
|
||
[Install] | ||
WantedBy=multi-user.target |