Compare commits
	
		
			2 commits
		
	
	
		
			8a9434a384
			...
			5ab169efe0
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
							 | 
						5ab169efe0 | ||
| 
							 | 
						00ffe8e8bc | 
					 1 changed files with 40 additions and 0 deletions
				
			
		
							
								
								
									
										40
									
								
								test.service
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								test.service
									
									
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,40 @@
 | 
			
		|||
[Unit]
 | 
			
		||||
Description=TEST
 | 
			
		||||
 | 
			
		||||
[Service]
 | 
			
		||||
Type=oneshot
 | 
			
		||||
ExecStart=/opt/test
 | 
			
		||||
 | 
			
		||||
ProtectSystem=strict
 | 
			
		||||
ProtectHome=yes
 | 
			
		||||
PrivateTmp=yes
 | 
			
		||||
PrivateDevices=yes
 | 
			
		||||
PrivateNetwork=yes
 | 
			
		||||
PrivateUsers=yes
 | 
			
		||||
ProtectHostname=yes
 | 
			
		||||
ProtectClock=yes
 | 
			
		||||
ProtectKernelTunables=yes
 | 
			
		||||
ProtectKernelModules=yes
 | 
			
		||||
ProtectKernelLogs=yes
 | 
			
		||||
ProtectControlGroups=yes
 | 
			
		||||
RestrictAddressFamilies=none
 | 
			
		||||
RestrictFileSystems=ext4 tmpfs zfs
 | 
			
		||||
RestrictNamespaces=yes
 | 
			
		||||
LockPersonality=yes
 | 
			
		||||
MemoryDenyWriteExecute=yes
 | 
			
		||||
RestrictRealtime=yes
 | 
			
		||||
RestrictSUIDSGID=yes
 | 
			
		||||
RemoveIPC=yes
 | 
			
		||||
PrivateMounts=yes
 | 
			
		||||
SystemCallFilter=
 | 
			
		||||
SystemCallArchitectures=native
 | 
			
		||||
CapabilityBoundingSet=
 | 
			
		||||
ProtectProc=invisible
 | 
			
		||||
 | 
			
		||||
ReadOnlyPaths=/
 | 
			
		||||
 | 
			
		||||
NoExecPaths=/
 | 
			
		||||
ExecPaths=/opt/test /bin/bash /lib
 | 
			
		||||
 | 
			
		||||
[Install]
 | 
			
		||||
WantedBy=multi-user.target
 | 
			
		||||
		Loading…
	
		Reference in a new issue