blob: 95a0563b67e32de1f74efebf0b18069aae0e5754 [file] [log] [blame]
Davide Pesaventof392b8f2019-01-08 20:51:55 -05001# Copyright (c) 2015-2019, Regents of the University of California,
2# Arizona Board of Regents,
3# Colorado State University,
4# University Pierre & Marie Curie, Sorbonne University,
5# Washington University in St. Louis,
6# Beijing Institute of Technology,
7# The University of Memphis.
8#
9# This file is part of NFD (Named Data Networking Forwarding Daemon).
10# See AUTHORS.md for complete list of NFD authors and contributors.
11#
12# NFD is free software: you can redistribute it and/or modify it under the terms
13# of the GNU General Public License as published by the Free Software Foundation,
14# either version 3 of the License, or (at your option) any later version.
15#
16# NFD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
17# without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
18# PURPOSE. See the GNU General Public License for more details.
19#
20# You should have received a copy of the GNU General Public License along with
21# NFD, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
22
23[Unit]
24Description=NFD HTTP Status Server
25Documentation=man:nfd-status-http-server(1)
26After=network.target
27
28[Service]
29Environment=HOME=%S/ndn/nfd-status-http-server
30EnvironmentFile=-@SYSCONFDIR@/default/nfd-status-http-server
31ExecStart=@BINDIR@/nfd-status-http-server $FLAGS
32Restart=on-failure
33RestartPreventExitStatus=2
Davide Pesavento48b45872019-01-28 22:22:18 -050034User=ndn
Davide Pesaventof392b8f2019-01-08 20:51:55 -050035
Davide Pesavento48b45872019-01-28 22:22:18 -050036AmbientCapabilities=CAP_NET_BIND_SERVICE
Davide Pesaventof392b8f2019-01-08 20:51:55 -050037CapabilityBoundingSet=CAP_NET_BIND_SERVICE
38LockPersonality=yes
39MemoryDenyWriteExecute=yes
40NoNewPrivileges=yes
41PrivateDevices=yes
42PrivateTmp=yes
Davide Pesaventof392b8f2019-01-08 20:51:55 -050043ProtectControlGroups=yes
44ProtectHome=yes
45ProtectKernelModules=yes
46ProtectKernelTunables=yes
47# systemd older than v232 doesn't support a value of "strict" for ProtectSystem,
48# so it will ignore that line and use ProtectSystem=full; with newer systemd,
49# the latter assignment is recognized and takes precedence, resulting in an
50# effective setting of ProtectSystem=strict
51ProtectSystem=full
52ProtectSystem=strict
53RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
54RestrictNamespaces=yes
55RestrictRealtime=yes
56StateDirectory=ndn/nfd-status-http-server
57SystemCallArchitectures=native
58SystemCallErrorNumber=EPERM
59SystemCallFilter=~@aio @chown @clock @cpu-emulation @debug @keyring @module @mount @obsolete @privileged @raw-io @reboot @resources @setuid @swap
60
61[Install]
62WantedBy=multi-user.target