Davide Pesavento | e5a7394 | 2019-01-26 20:54:13 -0500 | [diff] [blame^] | 1 | [Unit] |
| 2 | Description=NDN Traffic Generator Server |
| 3 | BindsTo=nfd.service |
| 4 | After=nfd.service |
| 5 | |
| 6 | [Service] |
| 7 | Environment=HOME=%S/ndn/ndn-traffic-server |
| 8 | EnvironmentFile=-@SYSCONFDIR@/default/ndn-traffic-server |
| 9 | ExecStart=@BINDIR@/ndn-traffic-server @SYSCONFDIR@/ndn/ndn-traffic-server.conf $FLAGS |
| 10 | Restart=on-failure |
| 11 | RestartPreventExitStatus=2 |
| 12 | User=ndn-traffic-generator |
| 13 | |
| 14 | CapabilityBoundingSet= |
| 15 | LockPersonality=yes |
| 16 | MemoryDenyWriteExecute=yes |
| 17 | NoNewPrivileges=yes |
| 18 | PrivateDevices=yes |
| 19 | PrivateNetwork=yes |
| 20 | PrivateTmp=yes |
| 21 | PrivateUsers=yes |
| 22 | ProtectControlGroups=yes |
| 23 | ProtectHome=yes |
| 24 | ProtectKernelModules=yes |
| 25 | ProtectKernelTunables=yes |
| 26 | # systemd older than v232 doesn't support a value of "strict" for ProtectSystem, |
| 27 | # so it will ignore that line and use ProtectSystem=full; with newer systemd, |
| 28 | # the latter assignment is recognized and takes precedence, resulting in an |
| 29 | # effective setting of ProtectSystem=strict |
| 30 | ProtectSystem=full |
| 31 | ProtectSystem=strict |
| 32 | RestrictAddressFamilies=AF_UNIX |
| 33 | RestrictNamespaces=yes |
| 34 | RestrictRealtime=yes |
| 35 | StateDirectory=ndn/ndn-traffic-server |
| 36 | SystemCallArchitectures=native |
| 37 | SystemCallErrorNumber=EPERM |
| 38 | SystemCallFilter=~@aio @chown @clock @cpu-emulation @debug @keyring @module @mount @obsolete @privileged @raw-io @reboot @resources @setuid @swap |
| 39 | |
| 40 | [Install] |
| 41 | WantedBy=multi-user.target |
| 42 | WantedBy=nfd.service |