summarylogtreecommitdiffstats
path: root/ntripcaster.service
blob: d879f82527645a032d745e493102a125dc0ca0e5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
[Unit]
Description=ntripcaster daemon
Documentation=https://igs.bkg.bund.de/ntrip/bkgcaster/
After=network.target
Wants=network.target

[Service]
Type=forking
KillMode=process
WorkingDirectory=/etc/ntripcaster/
#ExecStartPre=/bin/sh -c 'mkdir -p /var/log/ntripcaster /etc/ntripcaster >/dev/null 2>&1'
ExecStart=/usr/bin/ntripdaemon -d /etc/ntripcaster -b
PIDFile=/run/ntripcaster/caster.pid

WatchdogSec=15
NotifyAccess=all

Restart=always
RestartSec=5

TimeoutStopFailureMode=kill
TimeoutStopSec=15

User=ntrip
Group=ntrip

CapabilityBoundingSet=
AmbientCapabilities=
NoNewPrivileges=true

RootDirectory=/usr/share/ntripcaster
ProtectSystem=strict
ProtectHome=true
ProtectControlGroups=true
ProtectKernelModules=true
ProtectKernelTunables=true
ProtectKernelLogs=true
ProtectClock=true
PrivateTmp=true
PrivateDevices=true
DeviceAllow=char-rtc:rw:rwm
NotifyAccess=main
UMask=0077
ReadWritePaths=/run/ntripcaster /var/log/ntripcaster

RemoveIPC=true
PrivateUsers=true
RestrictSUIDSGID=true
RestrictNamespaces=true
LockPersonality=true
ProtectHostname=true
ProtectProc=invisible
ProcSubset=pid
PrivateMounts=true
MemoryDenyWriteExecute=true
RestrictRealtime=true

SystemCallFilter=@system-service
SystemCallFilter=~@resources
SystemCallFilter=~@privileged
SystemCallArchitectures=native

IPAddressDeny=any
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
PrivateNetwork=true


# If executed as normal user you may have to increase some limits
# Number of open file descriptors
#LimitNOFILE=infinity

[Install]
WantedBy=multi-user.target