mirror of
https://github.com/kanidm/kanidm.git
synced 2025-02-23 12:37:00 +01:00
471 add service files (#474)
This commit is contained in:
parent
a7e6f0c9e7
commit
d2e6186c15
34
platform/opensuse/kanidm-unixd-tasks.service
Normal file
34
platform/opensuse/kanidm-unixd-tasks.service
Normal file
|
@ -0,0 +1,34 @@
|
||||||
|
# Source: https://build.opensuse.org/package/view_file/home:firstyear:kanidm/kanidm/kanidm-unixd-tasks.service
|
||||||
|
# You should not need to edit this file. Instead, use a drop-in file:
|
||||||
|
# systemctl edit kanidm-unixd-tasks.service
|
||||||
|
|
||||||
|
|
||||||
|
[Unit]
|
||||||
|
Description=Kanidm Local Tasks
|
||||||
|
After=chronyd.service ntpd.service network-online.target kanidm-unixd.service
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
User=root
|
||||||
|
Type=simple
|
||||||
|
ExecStart=/usr/sbin/kanidm_unixd_tasks
|
||||||
|
|
||||||
|
CapabilityBoundingSet=CAP_CHOWN CAP_FOWNER CAP_DAC_OVERRIDE CAP_DAC_READ_SEARCH
|
||||||
|
# SystemCallFilter=@aio @basic-io @chown @file-system @io-event @network-io @sync
|
||||||
|
ProtectSystem=strict
|
||||||
|
ReadWritePaths=/home /var/run/kanidm-unixd
|
||||||
|
RestrictAddressFamilies=AF_UNIX
|
||||||
|
NoNewPrivileges=true
|
||||||
|
PrivateTmp=true
|
||||||
|
PrivateDevices=true
|
||||||
|
PrivateNetwork=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
MemoryDenyWriteExecute=true
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
|
|
36
platform/opensuse/kanidm-unixd.service
Normal file
36
platform/opensuse/kanidm-unixd.service
Normal file
|
@ -0,0 +1,36 @@
|
||||||
|
# Source: https://build.opensuse.org/package/view_file/home:firstyear:kanidm/kanidm/kanidm-unixd.service
|
||||||
|
# You should not need to edit this file. Instead, use a drop-in file:
|
||||||
|
# systemctl edit kanidm-unixd.service
|
||||||
|
|
||||||
|
[Unit]
|
||||||
|
Description=Kanidm Local Client Resolver
|
||||||
|
After=chronyd.service ntpd.service network-online.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
DynamicUser=yes
|
||||||
|
UMask=0027
|
||||||
|
CacheDirectory=kanidm-unixd
|
||||||
|
RuntimeDirectory=kanidm-unixd
|
||||||
|
|
||||||
|
Type=simple
|
||||||
|
ExecStart=/usr/sbin/kanidm_unixd
|
||||||
|
|
||||||
|
# Implied by dynamic user.
|
||||||
|
# ProtectHome=
|
||||||
|
# ProtectSystem=strict
|
||||||
|
# ReadWritePaths=/var/run/kanidm-unixd /var/cache/kanidm-unixd
|
||||||
|
|
||||||
|
# SystemCallFilter=@aio @basic-io @chown @file-system @io-event @network-io @sync
|
||||||
|
NoNewPrivileges=true
|
||||||
|
PrivateTmp=true
|
||||||
|
PrivateDevices=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
MemoryDenyWriteExecute=true
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
29
platform/opensuse/kanidmd.service
Normal file
29
platform/opensuse/kanidmd.service
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
# Source: https://build.opensuse.org/package/view_file/home:firstyear:kanidm/kanidm/kanidmd.service
|
||||||
|
# You should not need to edit this file. Instead, use a drop-in file as described in:
|
||||||
|
# /usr/lib/systemd/system/kanidmd.service.d/custom.conf
|
||||||
|
|
||||||
|
[Unit]
|
||||||
|
Description=Kanidm Identity Server
|
||||||
|
After=chronyd.service ntpd.service network-online.target
|
||||||
|
Before=radiusd.service
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
DynamicUser=yes
|
||||||
|
UMask=0027
|
||||||
|
StateDirectory=kanidmd
|
||||||
|
ExecStart=/usr/sbin/kanidmd server -c /etc/kanidm/server.toml
|
||||||
|
|
||||||
|
NoNewPrivileges=true
|
||||||
|
PrivateTmp=true
|
||||||
|
PrivateDevices=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
MemoryDenyWriteExecute=true
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
Loading…
Reference in a new issue