mirror of
https://github.com/dadevel/wg-netns
synced 2024-10-30 21:20:12 +00:00
a4c991a499
Resolves #13, closes #16.
48 lines
1.1 KiB
Desktop File
48 lines
1.1 KiB
Desktop File
[Unit]
|
|
Description=WireGuard Network Namespace (%i)
|
|
Wants=network-online.target nss-lookup.target
|
|
After=network-online.target nss-lookup.target
|
|
|
|
[Service]
|
|
Type=oneshot
|
|
Environment=WG_ENDPOINT_RESOLUTION_RETRIES=infinity
|
|
Environment=WG_VERBOSE=1
|
|
ExecStart=wg-netns up %i
|
|
ExecStop=wg-netns down %i
|
|
RemainAfterExit=yes
|
|
|
|
WorkingDirectory=%E/wireguard
|
|
ConfigurationDirectory=wireguard
|
|
ConfigurationDirectoryMode=0700
|
|
ReadOnlyPaths=%E/wireguard
|
|
ReadWritePaths=%E/netns
|
|
|
|
CapabilityBoundingSet=CAP_NET_ADMIN CAP_SYS_ADMIN
|
|
LimitNOFILE=4096
|
|
LimitNPROC=512
|
|
LockPersonality=true
|
|
MemoryDenyWriteExecute=true
|
|
NoNewPrivileges=true
|
|
PrivateDevices=true
|
|
PrivateMounts=true
|
|
PrivateTmp=true
|
|
ProcSubset=pid
|
|
ProtectClock=true
|
|
ProtectControlGroups=true
|
|
ProtectHome=true
|
|
ProtectHostname=true
|
|
ProtectKernelLogs=true
|
|
ProtectKernelModules=true
|
|
ProtectKernelTunables=true
|
|
ProtectProc=noaccess
|
|
ProtectSystem=strict
|
|
RemoveIPC=true
|
|
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK
|
|
RestrictNamespaces=mnt net
|
|
RestrictRealtime=true
|
|
RestrictSUIDSGID=true
|
|
SystemCallArchitectures=native
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|