File: service

package info (click to toggle)
restic-rest-server 0.13.0-2
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 776 kB
  • sloc: sh: 76; makefile: 7
file content (54 lines) | stat: -rw-r--r-- 1,276 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
[Unit]
Description=Restic REST Server
Documentation=https://github.com/restic/rest-server
After=network.target

[Service]
Type=simple
User=restic-rest-server
Group=restic-rest-server

EnvironmentFile=/etc/default/restic-rest-server
ExecCondition=/bin/sh -c '[ -n "$BACKUP_DIR" ]'

ExecStart=/usr/bin/restic-rest-server --path $BACKUP_DIR --listen $LISTEN $ARGS
Restart=on-failure
RestartSec=5

# The following options are available (in systemd v247) to restrict the
# actions of the daemon.

# Replace ProtectSystem and uncomment ReadWritePaths this to limit the daemon's
# write access.
ProtectSystem=full
#ProtectSystem=strict
#ReadWritePaths=$BACKUP_DIR

# Makes created files group-readable, but inaccessible by others
UMask=027

CapabilityBoundingSet=CAP_NET_BIND_SERVICE
LockPersonality=true
MemoryDenyWriteExecute=true
NoNewPrivileges=yes

PrivateTmp=yes
PrivateDevices=true
PrivateUsers=true
ProtectHome=yes
ProtectClock=true
ProtectControlGroups=true
ProtectKernelLogs=true
ProtectKernelModules=true
ProtectKernelTunables=true
ProtectProc=invisible
ProtectHostname=true
RemoveIPC=true
RestrictNamespaces=true
RestrictSUIDSGID=true
RestrictRealtime=true
SystemCallArchitectures=native
SystemCallFilter=@system-service @network-io

[Install]
WantedBy=multi-user.target