From 31d7d615ed0aafa0e15eab3b2d09ddcb57751502 Mon Sep 17 00:00:00 2001 From: Sosthene00 <674694@protonmail.ch> Date: Fri, 10 Apr 2020 14:03:18 +0200 Subject: [PATCH] Revert "init: add SystemD elementsd.service file" This reverts commit bd29207994c16479ea8c5eb2e8a24ba3ec50b43a. --- contrib/init/elementsd.service | 78 ---------------------------------- 1 file changed, 78 deletions(-) delete mode 100644 contrib/init/elementsd.service diff --git a/contrib/init/elementsd.service b/contrib/init/elementsd.service deleted file mode 100644 index 7ee555612c..0000000000 --- a/contrib/init/elementsd.service +++ /dev/null @@ -1,78 +0,0 @@ -# It is not recommended to modify this file in-place, because it will -# be overwritten during package upgrades. If you want to add further -# options or overwrite existing ones then use -# $ systemctl edit elementsd.service -# See "man systemd.service" for details. - -# Note that almost all daemon options could be specified in -# /etc/elements/elements.conf, but keep in mind those explicitly -# specified as arguments in ExecStart= will override those in the -# config file. - -[Unit] -Description=Elements daemon -After=network.target - -[Service] -ExecStart=/usr/local/bin/elementsd -daemon \ - -pid=/run/elementsd/elementsd.pid \ - -conf=/etc/elements/elements.conf \ - -datadir=/var/lib/elementsd \ - -debuglogfile=/var/log/elementsd/debug.log - -# Make sure the config directory is readable by the service user -PermissionsStartOnly=true -ExecStartPre=/bin/chgrp elements /etc/elements - -# Process management -#################### - -Type=forking -PIDFile=/run/elementsd/elementsd.pid -Restart=on-failure -TimeoutStopSec=600 - -# Directory creation and permissions -#################################### - -# Run as elements:elements -User=elements -Group=elements - -# /run/elementsd -RuntimeDirectory=elementsd -RuntimeDirectoryMode=0710 - -# /etc/elements -ConfigurationDirectory=elements -ConfigurationDirectoryMode=0710 - -# /var/lib/elementsd -StateDirectory=elementsd -StateDirectoryMode=0710 - -# Hardening measures -#################### - -# Provide a private /tmp and /var/tmp. -PrivateTmp=true - -# Mount /usr, /boot/ and /etc read-only for the process. -ProtectSystem=full - -# Deny access to /home, /root and /run/user -ProtectHome=true - -# Disallow the process and all of its children to gain -# new privileges through execve(). -NoNewPrivileges=true - -# Use a new /dev namespace only populated with API pseudo devices -# such as /dev/null, /dev/zero and /dev/random. -PrivateDevices=true - -# Deny the creation of writable and executable memory mappings. -MemoryDenyWriteExecute=true - -[Install] -WantedBy=multi-user.target