-
Notifications
You must be signed in to change notification settings - Fork 0
/
vex.service
51 lines (45 loc) · 1.17 KB
/
vex.service
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
[Unit]
Description=vex docker container registry
After=network-online.target
Wants=network-online.target
[Service]
UMask=007
LimitNOFILE=65535
User=vex
Group=vex
Type=simple
WorkingDirectory=/home/vex
ExecStart=/home/vex/vex serve -publicaddr 127.0.0.1:8200 -authaddr 127.0.0.1:8201 -adminaddr 127.0.0.1:8202 -authtlskey tls.ecdsakey.pkcs8.pem -authtlscert tls.crt.pem
RestartSec=5s
Restart=always
# Isolate process, reducing attack surface.
PrivateDevices=yes
PrivateTmp=yes
ProtectSystem=strict
ReadWritePaths=/home/vex/data
ProtectKernelTunables=yes
ProtectControlGroups=yes
AmbientCapabilities=
CapabilityBoundingSet=
NoNewPrivileges=yes
RestrictAddressFamilies=AF_INET AF_INET6
ProtectProc=invisible
RestrictNamespaces=yes
RestrictRealtime=yes
RemoveIPC=yes
ProtectHostname=yes
ProtectClock=yes
ProtectKernelLogs=yes
ProtectKernelModules=yes
MemoryDenyWriteExecute=yes
LockPersonality=yes
DevicePolicy=closed
SystemCallArchitectures=native
SystemCallFilter=@system-service
# Cannot have RestrictSUIDSGID with setgid directories.
#RestrictSUIDSGID=yes
PrivateUsers=yes
# To check security-related settings:
# sudo systemd-analyze security vex.service
[Install]
WantedBy=multi-user.target