2023-12-28 16:00:04 +05:00
|
|
|
[Unit]
|
|
|
|
Description=gonx service
|
|
|
|
After=network.target
|
|
|
|
Wants=network-online.target
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=simple
|
|
|
|
ExecStart=/usr/bin/gonx
|
|
|
|
User=http
|
|
|
|
Group=http
|
|
|
|
Restart=on-failure
|
|
|
|
RestartSec=5s
|
|
|
|
|
|
|
|
SecureBits=keep-caps
|
|
|
|
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
|
|
|
|
AmbientCapabilities=CAP_NET_BIND_SERVICE
|
|
|
|
DevicePolicy=closed
|
|
|
|
IPAccounting=true
|
|
|
|
LockPersonality=true
|
|
|
|
MemoryDenyWriteExecute=true
|
|
|
|
NoNewPrivileges=true
|
|
|
|
PrivateDevices=true
|
|
|
|
PrivateTmp=true
|
|
|
|
ProtectClock=true
|
|
|
|
ProtectControlGroups=true
|
|
|
|
ProtectControlGroups=true
|
|
|
|
ProtectHome=true
|
|
|
|
ProtectHostname=true
|
|
|
|
ProtectKernelLogs=true
|
|
|
|
ProtectKernelModules=true
|
|
|
|
ProtectKernelTunables=true
|
|
|
|
ProtectSystem=strict
|
|
|
|
ReadWritePaths=
|
|
|
|
RemoveIPC=true
|
|
|
|
RestrictNamespaces=true
|
|
|
|
RestrictRealtime=true
|
|
|
|
RestrictSUIDSGID=true
|
|
|
|
SystemCallArchitectures=native
|
|
|
|
UMask=0027
|
2023-12-28 18:40:38 +05:00
|
|
|
ProtectProc=noaccess
|
|
|
|
ProcSubset=pid
|
|
|
|
SystemCallFilter=~@clock @swap @reboot @raw-io @privileged @obsolete @mount @module @debug @cpu-emulation
|
2023-12-28 20:01:36 +05:00
|
|
|
RestrictAddressFamilies=~AF_UNIX AF_PACKET AF_NETLINK
|
|
|
|
UMask=0066
|
2023-12-28 16:00:04 +05:00
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|