core: enable PrivateNetwork= for a number of our long running services where this is useful

This commit is contained in:
Lennart Poettering 2014-03-19 23:08:39 +01:00
parent 7181dbdb2e
commit f21a71a907
7 changed files with 9 additions and 0 deletions

View file

@ -15,3 +15,4 @@ WatchdogSec=1min
CapabilityBoundingSet=CAP_IPC_OWNER CapabilityBoundingSet=CAP_IPC_OWNER
PrivateTmp=yes PrivateTmp=yes
PrivateDevices=yes PrivateDevices=yes
PrivateNetwork=yes

View file

@ -17,3 +17,4 @@ NotifyAccess=main
CapabilityBoundingSet=CAP_IPC_OWNER CapabilityBoundingSet=CAP_IPC_OWNER
PrivateTmp=yes PrivateTmp=yes
PrivateDevices=yes PrivateDevices=yes
PrivateNetwork=yes

View file

@ -17,3 +17,4 @@ CapabilityBoundingSet=CAP_SYS_ADMIN CAP_DAC_OVERRIDE CAP_SYS_PTRACE
WatchdogSec=1min WatchdogSec=1min
PrivateTmp=yes PrivateTmp=yes
PrivateDevices=yes PrivateDevices=yes
PrivateNetwork=yes

View file

@ -14,6 +14,9 @@ ExecStart=@rootlibexecdir@/systemd-journal-gatewayd
User=systemd-journal-gateway User=systemd-journal-gateway
Group=systemd-journal-gateway Group=systemd-journal-gateway
SupplementaryGroups=systemd-journal SupplementaryGroups=systemd-journal
PrivateTmp=yes
PrivateDevices=yes
PrivateNetwork=yes
[Install] [Install]
Also=systemd-journal-gatewayd.socket Also=systemd-journal-gatewayd.socket

View file

@ -17,3 +17,4 @@ CapabilityBoundingSet=
WatchdogSec=1min WatchdogSec=1min
PrivateTmp=yes PrivateTmp=yes
PrivateDevices=yes PrivateDevices=yes
PrivateNetwork=yes

View file

@ -19,3 +19,4 @@ CapabilityBoundingSet=CAP_KILL
WatchdogSec=1min WatchdogSec=1min
PrivateTmp=yes PrivateTmp=yes
PrivateDevices=yes PrivateDevices=yes
PrivateNetwork=yes

View file

@ -20,6 +20,7 @@ Restart=always
RestartSec=0 RestartSec=0
ExecStart=@rootlibexecdir@/systemd-networkd ExecStart=@rootlibexecdir@/systemd-networkd
WatchdogSec=1min WatchdogSec=1min
PrivateTmp=yes
[Install] [Install]
WantedBy=multi-user.target WantedBy=multi-user.target