1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54
|
[Unit]
Description=Restic REST Server
Documentation=https://github.com/restic/rest-server
After=network.target
[Service]
Type=simple
User=restic-rest-server
Group=restic-rest-server
EnvironmentFile=/etc/default/restic-rest-server
ExecCondition=/bin/sh -c '[ -n "$BACKUP_DIR" ]'
ExecStart=/usr/bin/restic-rest-server --path $BACKUP_DIR --listen $LISTEN $ARGS
Restart=on-failure
RestartSec=5
# The following options are available (in systemd v247) to restrict the
# actions of the daemon.
# Replace ProtectSystem and uncomment ReadWritePaths this to limit the daemon's
# write access.
ProtectSystem=full
#ProtectSystem=strict
#ReadWritePaths=$BACKUP_DIR
# Makes created files group-readable, but inaccessible by others
UMask=027
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
LockPersonality=true
MemoryDenyWriteExecute=true
NoNewPrivileges=yes
PrivateTmp=yes
PrivateDevices=true
PrivateUsers=true
ProtectHome=yes
ProtectClock=true
ProtectControlGroups=true
ProtectKernelLogs=true
ProtectKernelModules=true
ProtectKernelTunables=true
ProtectProc=invisible
ProtectHostname=true
RemoveIPC=true
RestrictNamespaces=true
RestrictSUIDSGID=true
RestrictRealtime=true
SystemCallArchitectures=native
SystemCallFilter=@system-service @network-io
[Install]
WantedBy=multi-user.target
|