diff options
author | mrxx | 2019-05-07 16:54:22 +0200 |
---|---|---|
committer | mrxx | 2019-05-07 16:54:22 +0200 |
commit | 462716b6bdaf0bef90c3650973719316e96a986a (patch) | |
tree | fa2450040c4dad99981ce5028ddf783d28e8606b /bitcoind-reindex.service | |
parent | d4f10f416e30210f239f2ecbb1fcd23d51049a54 (diff) | |
download | aur-462716b6bdaf0bef90c3650973719316e96a986a.tar.gz |
Update to 0.18.1; rename some files from bitcoin to bitcoind; set datadir to /var/lib/bitcoind
Diffstat (limited to 'bitcoind-reindex.service')
-rw-r--r-- | bitcoind-reindex.service | 69 |
1 files changed, 69 insertions, 0 deletions
diff --git a/bitcoind-reindex.service b/bitcoind-reindex.service new file mode 100644 index 000000000000..65ebd4492ebb --- /dev/null +++ b/bitcoind-reindex.service @@ -0,0 +1,69 @@ +# It is not recommended to modify this file in-place, because it will +# be overwritten during package upgrades. If you want to add further +# options or overwrite existing ones then use +# $ systemctl edit bitcoind.service +# See "man systemd.service" for details. + +# Note that almost all daemon options could be specified in +# /etc/bitcoin/bitcoin.conf, except for those explicitly specified as arguments +# in ExecStart= + +[Unit] +Description=Bitcoin daemon (reindex) +After=network.target + +[Service] +ExecStart=/usr/bin/bitcoind -daemon \ + -pid=/run/bitcoind/bitcoind.pid \ + -conf=/etc/bitcoin/bitcoin.conf \ + -reindex \ + -datadir=/var/lib/bitcoind + +# Process management +#################### + +Type=forking +PIDFile=/run/bitcoind/bitcoind.pid +Restart=on-failure + +# Directory creation and permissions +#################################### + +# Run as bitcoin:bitcoin +User=bitcoin +Group=bitcoin + +# /run/bitcoind +RuntimeDirectory=bitcoind +RuntimeDirectoryMode=0710 + +# /etc/bitcoin +ConfigurationDirectory=bitcoin +ConfigurationDirectoryMode=0710 + +# /var/lib/bitcoind +StateDirectory=bitcoind +StateDirectoryMode=0710 + +# Hardening measures +#################### + +# Provide a private /tmp and /var/tmp. +PrivateTmp=true + +# Mount /usr, /boot/ and /etc read-only for the process. +ProtectSystem=full + +# Disallow the process and all of its children to gain +# new privileges through execve(). +NoNewPrivileges=true + +# Use a new /dev namespace only populated with API pseudo devices +# such as /dev/null, /dev/zero and /dev/random. +PrivateDevices=true + +# Deny the creation of writable and executable memory mappings. +MemoryDenyWriteExecute=true + +[Install] +WantedBy=multi-user.target |