mirror of
https://github.com/kanidm/kanidm.git
synced 2025-02-23 04:27:02 +01:00
471 add service files (#474)
This commit is contained in:
parent
a7e6f0c9e7
commit
d2e6186c15
34
platform/opensuse/kanidm-unixd-tasks.service
Normal file
34
platform/opensuse/kanidm-unixd-tasks.service
Normal file
|
@ -0,0 +1,34 @@
|
|||
# Source: https://build.opensuse.org/package/view_file/home:firstyear:kanidm/kanidm/kanidm-unixd-tasks.service
|
||||
# You should not need to edit this file. Instead, use a drop-in file:
|
||||
# systemctl edit kanidm-unixd-tasks.service
|
||||
|
||||
|
||||
[Unit]
|
||||
Description=Kanidm Local Tasks
|
||||
After=chronyd.service ntpd.service network-online.target kanidm-unixd.service
|
||||
|
||||
[Service]
|
||||
User=root
|
||||
Type=simple
|
||||
ExecStart=/usr/sbin/kanidm_unixd_tasks
|
||||
|
||||
CapabilityBoundingSet=CAP_CHOWN CAP_FOWNER CAP_DAC_OVERRIDE CAP_DAC_READ_SEARCH
|
||||
# SystemCallFilter=@aio @basic-io @chown @file-system @io-event @network-io @sync
|
||||
ProtectSystem=strict
|
||||
ReadWritePaths=/home /var/run/kanidm-unixd
|
||||
RestrictAddressFamilies=AF_UNIX
|
||||
NoNewPrivileges=true
|
||||
PrivateTmp=true
|
||||
PrivateDevices=true
|
||||
PrivateNetwork=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
MemoryDenyWriteExecute=true
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
36
platform/opensuse/kanidm-unixd.service
Normal file
36
platform/opensuse/kanidm-unixd.service
Normal file
|
@ -0,0 +1,36 @@
|
|||
# Source: https://build.opensuse.org/package/view_file/home:firstyear:kanidm/kanidm/kanidm-unixd.service
|
||||
# You should not need to edit this file. Instead, use a drop-in file:
|
||||
# systemctl edit kanidm-unixd.service
|
||||
|
||||
[Unit]
|
||||
Description=Kanidm Local Client Resolver
|
||||
After=chronyd.service ntpd.service network-online.target
|
||||
|
||||
[Service]
|
||||
DynamicUser=yes
|
||||
UMask=0027
|
||||
CacheDirectory=kanidm-unixd
|
||||
RuntimeDirectory=kanidm-unixd
|
||||
|
||||
Type=simple
|
||||
ExecStart=/usr/sbin/kanidm_unixd
|
||||
|
||||
# Implied by dynamic user.
|
||||
# ProtectHome=
|
||||
# ProtectSystem=strict
|
||||
# ReadWritePaths=/var/run/kanidm-unixd /var/cache/kanidm-unixd
|
||||
|
||||
# SystemCallFilter=@aio @basic-io @chown @file-system @io-event @network-io @sync
|
||||
NoNewPrivileges=true
|
||||
PrivateTmp=true
|
||||
PrivateDevices=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
MemoryDenyWriteExecute=true
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
29
platform/opensuse/kanidmd.service
Normal file
29
platform/opensuse/kanidmd.service
Normal file
|
@ -0,0 +1,29 @@
|
|||
# Source: https://build.opensuse.org/package/view_file/home:firstyear:kanidm/kanidm/kanidmd.service
|
||||
# You should not need to edit this file. Instead, use a drop-in file as described in:
|
||||
# /usr/lib/systemd/system/kanidmd.service.d/custom.conf
|
||||
|
||||
[Unit]
|
||||
Description=Kanidm Identity Server
|
||||
After=chronyd.service ntpd.service network-online.target
|
||||
Before=radiusd.service
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
DynamicUser=yes
|
||||
UMask=0027
|
||||
StateDirectory=kanidmd
|
||||
ExecStart=/usr/sbin/kanidmd server -c /etc/kanidm/server.toml
|
||||
|
||||
NoNewPrivileges=true
|
||||
PrivateTmp=true
|
||||
PrivateDevices=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
MemoryDenyWriteExecute=true
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
Loading…
Reference in a new issue