41 lines
1.1 KiB
SYSTEMD
41 lines
1.1 KiB
SYSTEMD
|
[Unit]
|
||
|
Description=collabore tunnel Make your local services accessible to all on the public Internet
|
||
|
After=network.target nginx.service
|
||
|
|
||
|
[Service]
|
||
|
Environment=UNIX_SOCKETS_DIRECTORY=/tmp/collabore-tunnel
|
||
|
Environment=SERVER_HOSTNAME=tnl.clb.re
|
||
|
Environment=CONFIG_DIRECTORY=.
|
||
|
Environment=SSH_SERVER_HOST=0.0.0.0
|
||
|
Environment=SSH_SERVER_PORT=22
|
||
|
Environment=LOG_DEPTH=2
|
||
|
WorkingDirectory=/opt/collabore-tunnel
|
||
|
ExecStart=/usr/bin/python3 main.py
|
||
|
ExecStop=/bin/kill -9 $MAINPID
|
||
|
ProtectSystem=strict
|
||
|
ReadWritePaths=/opt/collabore-tunnel /tmp
|
||
|
ReadOnlyPaths=/usr/bin
|
||
|
InaccessiblePaths=...
|
||
|
ProtectHome=true
|
||
|
ProtectProc=invisible
|
||
|
ProtectKernelTunables=true
|
||
|
ProtectControlGroups=true
|
||
|
NoNewPrivileges=true
|
||
|
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
|
||
|
RestrictNamespaces=uts ipc pid cgroup
|
||
|
RestrictSUIDSGID=true
|
||
|
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 AF_NETLINK
|
||
|
RestrictRealtime=yes
|
||
|
MemoryDenyWriteExecute=yes
|
||
|
LockPersonality=yes
|
||
|
IPAddressAllow=192.168.1.0/24
|
||
|
PrivateDevices=true
|
||
|
ProtectKernelModules=true
|
||
|
ProtectKernelLogs=true
|
||
|
ProtectClock=true
|
||
|
SystemCallArchitectures=native
|
||
|
SystemCallFilter=
|
||
|
|
||
|
[Install]
|
||
|
WantedBy=multi-user.target
|