blob: 05b78c202cd836c28aab36b54745ee46d08be35c [file] [log] [blame]
Davide Pesaventocb903ea2019-01-16 16:31:00 -05001# Copyright (c) 2015-2019, Regents of the University of California,
2# Arizona Board of Regents,
3# Colorado State University,
4# University Pierre & Marie Curie, Sorbonne University,
5# Washington University in St. Louis,
6# Beijing Institute of Technology,
7# The University of Memphis.
8#
9# This file is part of ndn-tools (Named Data Networking Essential Tools).
10# See AUTHORS.md for complete list of ndn-tools authors and contributors.
11#
12# ndn-tools is free software: you can redistribute it and/or modify it under the terms
13# of the GNU General Public License as published by the Free Software Foundation,
14# either version 3 of the License, or (at your option) any later version.
15#
16# ndn-tools is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
17# without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
18# PURPOSE. See the GNU General Public License for more details.
19#
20# You should have received a copy of the GNU General Public License along with
21# ndn-tools, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
22
23[Unit]
24Description=NDN Ping Server
25Documentation=man:ndnpingserver(1)
26BindsTo=nfd.service
27After=nfd.service
28
29[Service]
30Environment=HOME=%S/ndn/ndnping
31EnvironmentFile=-@SYSCONFDIR@/default/ndnping
32ExecStart=@BINDIR@/ndnpingserver ${PREFIX} $FLAGS
33Restart=on-failure
34RestartPreventExitStatus=2
35User=ndn
36
37CapabilityBoundingSet=
38LockPersonality=yes
39MemoryDenyWriteExecute=yes
40NoNewPrivileges=yes
41PrivateDevices=yes
42PrivateNetwork=yes
43PrivateTmp=yes
44PrivateUsers=yes
45ProtectControlGroups=yes
46ProtectHome=yes
47ProtectKernelModules=yes
48ProtectKernelTunables=yes
49# systemd older than v232 doesn't support a value of "strict" for ProtectSystem,
50# so it will ignore that line and use ProtectSystem=full; with newer systemd,
51# the latter assignment is recognized and takes precedence, resulting in an
52# effective setting of ProtectSystem=strict
53ProtectSystem=full
54ProtectSystem=strict
55RestrictAddressFamilies=AF_UNIX
56RestrictNamespaces=yes
57RestrictRealtime=yes
58StateDirectory=ndn/ndnping
59SystemCallArchitectures=native
60SystemCallErrorNumber=EPERM
61SystemCallFilter=~@aio @chown @clock @cpu-emulation @debug @keyring @module @mount @obsolete @privileged @raw-io @reboot @resources @setuid @swap
62
63[Install]
64WantedBy=multi-user.target
65WantedBy=nfd.service