-
Notifications
You must be signed in to change notification settings - Fork 1
/
timew-sync-server.service
51 lines (46 loc) · 1.78 KB
/
timew-sync-server.service
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
[Unit]
Description=timewarrior synchronization server
[Service]
User=timew-sync-server
Group=timew-sync-server
Type=simple
###############################################################################
# #
# Replace this with the path to the actual binary and port you want to use. #
# #
# Always run timew-sync-server behind a reverse proxy when exposed publicly. #
# #
###############################################################################
ExecStart=/usr/bin/timew-sync-server start -port 8710
Restart=always
RestartSec=5
###############################################################################
# #
# Systemd will create the data directory for timew-sync-server with the #
# appropriate permissions. Remember back up the contents of this directory. #
# #
###############################################################################
StateDirectory=timew-sync-server
StateDirectoryMode=0700
WorkingDirectory=/var/lib/timew-sync-server
CapabilityBoundingSet=
LockPersonality=true
MemoryDenyWriteExecute=true
NoNewPrivileges=true
PrivateDevices=true
PrivateMounts=true
PrivateTmp=true
ProtectClock=true
ProtectControlGroups=true
ProtectHome=true
ProtectHostname=true
ProtectKernelLogs=true
ProtectKernelModules=true
ProtectKernelTunables=true
ProtectSystem=strict
RestrictAddressFamilies=AF_INET
RestrictAddressFamilies=AF_INET6
RestrictRealtime=true
RestrictSUIDSGID=true
[Install]
WantedBy=multi-user.target