summarylogtreecommitdiffstats
path: root/bitcoind-reindex.service
diff options
context:
space:
mode:
authormrxx2019-05-07 16:54:22 +0200
committermrxx2019-05-07 16:54:22 +0200
commit462716b6bdaf0bef90c3650973719316e96a986a (patch)
treefa2450040c4dad99981ce5028ddf783d28e8606b /bitcoind-reindex.service
parentd4f10f416e30210f239f2ecbb1fcd23d51049a54 (diff)
downloadaur-462716b6bdaf0bef90c3650973719316e96a986a.tar.gz
Update to 0.18.1; rename some files from bitcoin to bitcoind; set datadir to /var/lib/bitcoind
Diffstat (limited to 'bitcoind-reindex.service')
-rw-r--r--bitcoind-reindex.service69
1 files changed, 69 insertions, 0 deletions
diff --git a/bitcoind-reindex.service b/bitcoind-reindex.service
new file mode 100644
index 000000000000..65ebd4492ebb
--- /dev/null
+++ b/bitcoind-reindex.service
@@ -0,0 +1,69 @@
+# It is not recommended to modify this file in-place, because it will
+# be overwritten during package upgrades. If you want to add further
+# options or overwrite existing ones then use
+# $ systemctl edit bitcoind.service
+# See "man systemd.service" for details.
+
+# Note that almost all daemon options could be specified in
+# /etc/bitcoin/bitcoin.conf, except for those explicitly specified as arguments
+# in ExecStart=
+
+[Unit]
+Description=Bitcoin daemon (reindex)
+After=network.target
+
+[Service]
+ExecStart=/usr/bin/bitcoind -daemon \
+ -pid=/run/bitcoind/bitcoind.pid \
+ -conf=/etc/bitcoin/bitcoin.conf \
+ -reindex \
+ -datadir=/var/lib/bitcoind
+
+# Process management
+####################
+
+Type=forking
+PIDFile=/run/bitcoind/bitcoind.pid
+Restart=on-failure
+
+# Directory creation and permissions
+####################################
+
+# Run as bitcoin:bitcoin
+User=bitcoin
+Group=bitcoin
+
+# /run/bitcoind
+RuntimeDirectory=bitcoind
+RuntimeDirectoryMode=0710
+
+# /etc/bitcoin
+ConfigurationDirectory=bitcoin
+ConfigurationDirectoryMode=0710
+
+# /var/lib/bitcoind
+StateDirectory=bitcoind
+StateDirectoryMode=0710
+
+# Hardening measures
+####################
+
+# Provide a private /tmp and /var/tmp.
+PrivateTmp=true
+
+# Mount /usr, /boot/ and /etc read-only for the process.
+ProtectSystem=full
+
+# Disallow the process and all of its children to gain
+# new privileges through execve().
+NoNewPrivileges=true
+
+# Use a new /dev namespace only populated with API pseudo devices
+# such as /dev/null, /dev/zero and /dev/random.
+PrivateDevices=true
+
+# Deny the creation of writable and executable memory mappings.
+MemoryDenyWriteExecute=true
+
+[Install]
+WantedBy=multi-user.target