Add hardened systemd service to run WKD sync
wkd_sync/archlinux-keyring-wkd-sync.service: Add hardened systemd service to run WKD sync using `archlinux-keyring-wkd-sync`.
This commit is contained in:
parent
e5a2665a4c
commit
8436229ea6
36
wkd_sync/archlinux-keyring-wkd-sync.service
Normal file
36
wkd_sync/archlinux-keyring-wkd-sync.service
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
[Unit]
|
||||||
|
After=network-online.target nss-lookup.target
|
||||||
|
ConditionPathIsDirectory=/etc/pacman.d/gnupg/
|
||||||
|
ConditionPathIsReadWrite=/etc/pacman.d/gnupg/
|
||||||
|
ConditionFileIsExecutable=/usr/bin/archlinux-keyring-wkd-sync
|
||||||
|
Description=Refresh existing keys of archlinux-keyring
|
||||||
|
Wants=network-online.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ExecStart=/usr/bin/archlinux-keyring-wkd-sync
|
||||||
|
|
||||||
|
CapabilityBoundingSet=
|
||||||
|
DeviceAllow=
|
||||||
|
LockPersonality=true
|
||||||
|
MemoryDenyWriteExecute=true
|
||||||
|
NoNewPrivileges=true
|
||||||
|
PrivateDevices=true
|
||||||
|
PrivateTmp=true
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
ProtectHome=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectProc=noaccess
|
||||||
|
ProtectSystem=strict
|
||||||
|
ReadWritePaths=/etc/pacman.d/gnupg
|
||||||
|
RemoveIPC=true
|
||||||
|
RestrictAddressFamilies=~AF_PACKET AF_NETLINK
|
||||||
|
RestrictNamespaces=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
RestrictSUIDSGID=true
|
||||||
|
SystemCallArchitectures=native
|
||||||
|
SystemCallFilter=@system-service
|
||||||
|
SystemCallFilter=~@resources
|
Loading…
Reference in New Issue
Block a user