44 lines
979 B
SYSTEMD
44 lines
979 B
SYSTEMD
|
[Unit]
|
||
|
Description=Gitea Act Runner
|
||
|
After=network.target docker.service
|
||
|
|
||
|
[Service]
|
||
|
User=gitea-act-runner
|
||
|
Group=gitea-act-runner
|
||
|
SupplementaryGroups=docker
|
||
|
Type=simple
|
||
|
WorkingDirectory=~
|
||
|
StateDirectory=gitea-act-runner
|
||
|
ExecStart=/usr/bin/gitea-act-runner daemon
|
||
|
Restart=always
|
||
|
RestartSec=2s
|
||
|
AmbientCapabilities=
|
||
|
CapabilityBoundingSet=
|
||
|
LockPersonality=true
|
||
|
MemoryDenyWriteExecute=true
|
||
|
NoNewPrivileges=True
|
||
|
#SecureBits=noroot-locked
|
||
|
PrivateDevices=true
|
||
|
PrivateTmp=true
|
||
|
PrivateUsers=true
|
||
|
ProtectClock=true
|
||
|
ProtectControlGroups=true
|
||
|
ProtectHome=true
|
||
|
ProtectHostname=true
|
||
|
ProtectKernelLogs=true
|
||
|
ProtectKernelModules=true
|
||
|
ProtectKernelTunables=true
|
||
|
ProtectProc=invisible
|
||
|
ProtectSystem=strict
|
||
|
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
|
||
|
RestrictNamespaces=true
|
||
|
RestrictRealtime=true
|
||
|
RestrictSUIDSGID=true
|
||
|
SystemCallArchitectures=native
|
||
|
SystemCallFilter=@system-service
|
||
|
SystemCallErrorNumber=EPERM
|
||
|
ReadWritePaths=/var/run/docker.sock
|
||
|
|
||
|
[Install]
|
||
|
WantedBy=multi-user.target
|