Compare commits
2 commits
8a9434a384
...
5ab169efe0
Author | SHA1 | Date | |
---|---|---|---|
![]() |
5ab169efe0 | ||
![]() |
00ffe8e8bc |
1 changed files with 40 additions and 0 deletions
40
test.service
Normal file
40
test.service
Normal file
|
@ -0,0 +1,40 @@
|
|||
[Unit]
|
||||
Description=TEST
|
||||
|
||||
[Service]
|
||||
Type=oneshot
|
||||
ExecStart=/opt/test
|
||||
|
||||
ProtectSystem=strict
|
||||
ProtectHome=yes
|
||||
PrivateTmp=yes
|
||||
PrivateDevices=yes
|
||||
PrivateNetwork=yes
|
||||
PrivateUsers=yes
|
||||
ProtectHostname=yes
|
||||
ProtectClock=yes
|
||||
ProtectKernelTunables=yes
|
||||
ProtectKernelModules=yes
|
||||
ProtectKernelLogs=yes
|
||||
ProtectControlGroups=yes
|
||||
RestrictAddressFamilies=none
|
||||
RestrictFileSystems=ext4 tmpfs zfs
|
||||
RestrictNamespaces=yes
|
||||
LockPersonality=yes
|
||||
MemoryDenyWriteExecute=yes
|
||||
RestrictRealtime=yes
|
||||
RestrictSUIDSGID=yes
|
||||
RemoveIPC=yes
|
||||
PrivateMounts=yes
|
||||
SystemCallFilter=
|
||||
SystemCallArchitectures=native
|
||||
CapabilityBoundingSet=
|
||||
ProtectProc=invisible
|
||||
|
||||
ReadOnlyPaths=/
|
||||
|
||||
NoExecPaths=/
|
||||
ExecPaths=/opt/test /bin/bash /lib
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
Loading…
Reference in a new issue