feat: gitea-act-runner
This commit is contained in:
parent
b2e492ac7b
commit
c530eabd51
5 changed files with 116 additions and 0 deletions
44
gitea-act-runner/gitea-act-runner.service
Normal file
44
gitea-act-runner/gitea-act-runner.service
Normal file
|
@ -0,0 +1,44 @@
|
|||
[Unit]
|
||||
Description=Gitea Act Runner
|
||||
After=network.target docker.service
|
||||
|
||||
[Service]
|
||||
User=gitea-act-runner
|
||||
Group=gitea-act-runner
|
||||
SupplementaryGroups=docker
|
||||
Type=simple
|
||||
WorkingDirectory=~
|
||||
Environment="GITEA_RUNNER_CAPACITY=4"
|
||||
StateDirectory=gitea-act-runner
|
||||
ExecStart=/usr/bin/gitea-act-runner daemon
|
||||
Restart=always
|
||||
RestartSec=2s
|
||||
AmbientCapabilities=
|
||||
CapabilityBoundingSet=
|
||||
LockPersonality=true
|
||||
MemoryDenyWriteExecute=true
|
||||
NoNewPrivileges=True
|
||||
#SecureBits=noroot-locked
|
||||
PrivateDevices=true
|
||||
PrivateTmp=true
|
||||
PrivateUsers=true
|
||||
ProtectClock=true
|
||||
ProtectControlGroups=true
|
||||
ProtectHome=true
|
||||
ProtectHostname=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectProc=invisible
|
||||
ProtectSystem=strict
|
||||
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
|
||||
RestrictNamespaces=true
|
||||
RestrictRealtime=true
|
||||
RestrictSUIDSGID=true
|
||||
SystemCallArchitectures=native
|
||||
SystemCallFilter=@system-service
|
||||
SystemCallErrorNumber=EPERM
|
||||
ReadWritePaths=/var/run/docker.sock
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
Loading…
Add table
Add a link
Reference in a new issue