summarylogtreecommitdiffstats
path: root/earthwalker.service
blob: 89169ffd28d8d1538f7b896ad8e54280523fde1d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
[Unit]
Description=Eartwalker Server
Documentation=https://gitlab.com/glatteis/earthwalker
After=network.target

[Service]
# The user/group earthwalker is run under. the working directory (see below) should allow write and read access to this user/group
User=earthwalker
Group=earthwalker

# The location of the .env file for configuration
Environment=EARTHWALKER_CONFIG_PATH=/etc/earthwalker/config.toml
# The location of the compiled binary
ExecStart=/usr/bin/earthwalker

# Set reasonable connection and process limits
LimitNOFILE=1048576
LimitNPROC=64

# Only allow writes to the following directory and set it to the working directory (application data are stored here)
WorkingDirectory=/var/lib/earthwalker
ReadWritePaths=/var/lib/earthwalker

# Prevent earthwalker from doing anything stupid and/or unneccessary.
LockPersonality=yes
MemoryDenyWriteExecute=yes
NoNewPrivileges=yes

PrivateTmp=yes
PrivateDevices=yes

ProtectHome=yes
ProtectSystem=strict
ProtectKernelTunables=yes
ProtectKernelModules=yes
ProtectKernelLogs=yes
ProtectControlGroups=yes
ProtectHostname=yes
ProtectClock=yes

RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
RestrictNamespaces=yes
RestrictRealtime=yes
RestrictSUIDSGID=yes

RemoveIPC=yes
UMask=0077

SystemCallArchitectures=native
SystemCallFilter=@system-service
SystemCallFilter=~@resources
SystemCallFilter=~@privileged

# Allow earthwalker to bind ports in the range of 0-1024
AmbientCapabilities=CAP_NET_BIND_SERVICE
# Restrict earthwalker to only this capability
CapabilityBoundingSet=CAP_NET_BIND_SERVICE

# If earthwalker is run at ports >1024, you can enable (remove the leading '#' of)
# the following lines:
#PrivateUsers=yes
#CapabilityBoundingSet=
#AmbientCapabilities=

[Install]
WantedBy=multi-user.target