/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to mandos.service

  • Committer: Teddy Hogeborn
  • Author(s): gregor herrmann
  • Date: 2012-02-21 21:20:12 UTC
  • mto: This revision was merged to the branch mainline in revision 298.
  • Revision ID: teddy@recompile.se-20120221212012-vrbd180yikwm0qdv
* debian/changelog (1.5.3-1.1): New entry.
* debian/control (Source: mandos/Build-Depends): Added "locales-all".
* debian/rules (build-arch-stamp, build-indep-stamp): Add
                                                      LC_ALL=en_US.utf8
                                                      to
                                                      "dh_auto_build"
                                                      invocation.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
[Unit]
2
 
Description=Server of encrypted passwords to Mandos clients
3
 
Documentation=man:intro(8mandos) man:mandos(8)
4
 
## If the server is configured to listen to a specific IP or network
5
 
## interface, it may be necessary to change "network.target" to
6
 
## "network-online.target".
7
 
After=network.target
8
 
## If the server is configured to not use ZeroConf, these two lines
9
 
## become unnecessary and should be removed or commented out.
10
 
After=avahi-daemon.service
11
 
Requisite=avahi-daemon.service
12
 
 
13
 
[Service]
14
 
## If the server's D-Bus interface is disabled, the "BusName" setting
15
 
## should be removed or commented out.
16
 
BusName=se.recompile.Mandos
17
 
EnvironmentFile=/etc/default/mandos
18
 
ExecStart=/usr/sbin/mandos --foreground $DAEMON_ARGS
19
 
Restart=always
20
 
KillMode=mixed
21
 
## Using socket activation won't work, because systemd always does
22
 
## bind() on the socket, and also won't announce the ZeroConf service.
23
 
#ExecStart=/usr/sbin/mandos --foreground --socket=0
24
 
#StandardInput=socket
25
 
# Restrict what the Mandos daemon can do.  Note that this also affects
26
 
# "checker" programs!
27
 
PrivateTmp=yes
28
 
PrivateDevices=yes
29
 
ProtectSystem=full
30
 
ProtectHome=yes
31
 
CapabilityBoundingSet=CAP_KILL CAP_SETGID CAP_SETUID CAP_DAC_OVERRIDE CAP_NET_RAW
32
 
ProtectKernelTunables=yes
33
 
ProtectControlGroups=yes
34
 
 
35
 
[Install]
36
 
WantedBy=multi-user.target