mirror of
https://github.com/restic/rest-server.git
synced 2025-10-19 15:43:21 +00:00
Improve commenting of systemd unit file based on review.
This commit is contained in:
parent
05a5d1f94e
commit
8a1535ba0c
1 changed files with 17 additions and 2 deletions
|
@ -5,15 +5,31 @@ After=network.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=simple
|
Type=simple
|
||||||
|
# You may prefer to use a different user or group on your system.
|
||||||
User=www-data
|
User=www-data
|
||||||
Group=www-data
|
Group=www-data
|
||||||
ExecStart=/usr/local/bin/rest-server --path /path/to/backups
|
ExecStart=/usr/local/bin/rest-server --path /path/to/backups
|
||||||
Restart=always
|
Restart=always
|
||||||
RestartSec=5
|
RestartSec=5
|
||||||
|
|
||||||
|
# The following options are available (in systemd v247) to restrict the
|
||||||
|
# actions of the rest-server.
|
||||||
|
|
||||||
|
# As a whole, the purpose of these are to provide an additional layer of
|
||||||
|
# security by mitigating any unknown security vulnerabilities which may exist
|
||||||
|
# in rest-server or in the libraries, tools and operating system components
|
||||||
|
# which it relies upon.
|
||||||
|
|
||||||
|
# IMPORTANT!
|
||||||
|
# The following line must be customised to your individual requirements.
|
||||||
|
ReadWritePaths=/path/to/backups
|
||||||
|
|
||||||
# Makes created files group-readable, but inaccessible by others
|
# Makes created files group-readable, but inaccessible by others
|
||||||
UMask=027
|
UMask=027
|
||||||
|
|
||||||
# Recommended security enhancements using features present in systemd version 247
|
# If your system doesn't support all of the features below (e.g. because of
|
||||||
|
# the use of an older version of systemd), you may wish to comment-out
|
||||||
|
# some of the lines below as appropriate.
|
||||||
CapabilityBoundingSet=
|
CapabilityBoundingSet=
|
||||||
LockPersonality=true
|
LockPersonality=true
|
||||||
MemoryDenyWriteExecute=true
|
MemoryDenyWriteExecute=true
|
||||||
|
@ -31,7 +47,6 @@ ProtectKernelTunables=true
|
||||||
ProtectProc=invisible
|
ProtectProc=invisible
|
||||||
ProtectHostname=true
|
ProtectHostname=true
|
||||||
ProcSubset=pid
|
ProcSubset=pid
|
||||||
ReadWritePaths=/path/to/backups
|
|
||||||
RemoveIPC=true
|
RemoveIPC=true
|
||||||
RestrictNamespaces=true
|
RestrictNamespaces=true
|
||||||
RestrictAddressFamilies=AF_INET AF_INET6
|
RestrictAddressFamilies=AF_INET AF_INET6
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue