mirror of
https://github.com/GrapheneOS/infrastructure.git
synced 2025-09-18 19:54:46 -04:00
reorganize configurations into etc directory
This commit is contained in:
parent
b5fd158374
commit
1f4d7316b8
106 changed files with 18 additions and 18 deletions
2
etc/systemd/system/-.slice.d/override.conf
Normal file
2
etc/systemd/system/-.slice.d/override.conf
Normal file
|
@ -0,0 +1,2 @@
|
|||
[Slice]
|
||||
ManagedOOMSwap=kill
|
3
etc/systemd/system/attestation.service.d/override.conf
Normal file
3
etc/systemd/system/attestation.service.d/override.conf
Normal file
|
@ -0,0 +1,3 @@
|
|||
[Service]
|
||||
IPAddressAllow={{ipv4_address}}
|
||||
IPAddressAllow={{ipv6_address}}
|
57
etc/systemd/system/certbot-ocsp-fetcher.service
Normal file
57
etc/systemd/system/certbot-ocsp-fetcher.service
Normal file
|
@ -0,0 +1,57 @@
|
|||
[Unit]
|
||||
Description=Fetch OCSP responses for all certificates issued with Certbot
|
||||
|
||||
[Service]
|
||||
Type=oneshot
|
||||
|
||||
Restart=on-failure
|
||||
|
||||
CacheDirectory=%N
|
||||
|
||||
User=root
|
||||
Group=root
|
||||
ExecStart=%N --no-reload-webserver
|
||||
ExecStartPost=systemctl reload nginx.service
|
||||
|
||||
RestartSec=5
|
||||
PrivateDevices=true
|
||||
PrivateTmp=yes
|
||||
PrivateUsers=yes
|
||||
PrivateIPC=true
|
||||
|
||||
NoNewPrivileges=true
|
||||
LockPersonality=true
|
||||
|
||||
CapabilityBoundingSet=
|
||||
ProtectHome=yes
|
||||
ProtectControlGroups=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectClock=true
|
||||
ProtectProc=invisible
|
||||
ProcSubset=pid
|
||||
ProtectHostname=true
|
||||
RemoveIPC=true
|
||||
|
||||
RestrictAddressFamilies=AF_INET6 AF_INET AF_UNIX
|
||||
MemoryDenyWriteExecute=true
|
||||
RestrictRealtime=true
|
||||
RestrictNamespaces=true
|
||||
RestrictSUIDSGID=true
|
||||
|
||||
DevicePolicy=strict
|
||||
DeviceAllow=/dev/random r
|
||||
DeviceAllow=/dev/urandom r
|
||||
DeviceAllow=/dev/stdin r
|
||||
DeviceAllow=/dev/stdout r
|
||||
DeviceAllow=/dev/null w
|
||||
|
||||
ProtectSystem=strict
|
||||
InaccessiblePaths=/root/
|
||||
ReadOnlyPaths=/etc/letsencrypt
|
||||
UMask=0077
|
||||
|
||||
SystemCallArchitectures=native
|
||||
SystemCallFilter=@system-service
|
||||
SystemCallFilter=~@clock @debug @module @mount @reboot @swap @resources @cpu-emulation @raw-io @obsolete @keyring @privileged
|
10
etc/systemd/system/certbot-ocsp-fetcher.timer
Normal file
10
etc/systemd/system/certbot-ocsp-fetcher.timer
Normal file
|
@ -0,0 +1,10 @@
|
|||
[Unit]
|
||||
Description=Nightly run %N
|
||||
|
||||
[Timer]
|
||||
OnCalendar=*-*-* 01:00:00
|
||||
RandomizedDelaySec=21600
|
||||
Persistent=true
|
||||
|
||||
[Install]
|
||||
WantedBy=timers.target
|
29
etc/systemd/system/certbot-renew.service.d/override.conf
Normal file
29
etc/systemd/system/certbot-renew.service.d/override.conf
Normal file
|
@ -0,0 +1,29 @@
|
|||
[Service]
|
||||
CapabilityBoundingSet=
|
||||
CPUSchedulingPolicy=batch
|
||||
ExecStart=
|
||||
ExecStart=/usr/bin/certbot -q renew --no-random-sleep-on-renew --max-log-backups 0
|
||||
LockPersonality=true
|
||||
MemoryDenyWriteExecute=true
|
||||
NoNewPrivileges=true
|
||||
PrivateDevices=true
|
||||
PrivateIPC=true
|
||||
PrivateUsers=true
|
||||
ProcSubset=pid
|
||||
ProtectClock=true
|
||||
ProtectControlGroups=true
|
||||
ProtectHome=read-only
|
||||
ProtectHostname=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectProc=invisible
|
||||
ProtectSystem=strict
|
||||
ReadWritePaths=/etc/letsencrypt /var/lib/letsencrypt /var/log/letsencrypt -/srv/certbot -/var/cache/certbot-ocsp-fetcher
|
||||
RestrictAddressFamilies=AF_INET AF_INET6
|
||||
RestrictNamespaces=true
|
||||
RestrictRealtime=true
|
||||
RestrictSUIDSGID=true
|
||||
SystemCallArchitectures=native
|
||||
SystemCallFilter=@system-service
|
||||
SystemCallFilter=~@resources @obsolete
|
9
etc/systemd/system/chronyd.service.d/override.conf
Normal file
9
etc/systemd/system/chronyd.service.d/override.conf
Normal file
|
@ -0,0 +1,9 @@
|
|||
[Service]
|
||||
NoNewPrivileges=yes
|
||||
ReadWritePaths=
|
||||
ReadWritePaths=/run /var/lib/chrony -/var/log
|
||||
Restart=always
|
||||
RestartMaxDelaySec=10s
|
||||
RestartSec=100ms
|
||||
RestartSteps=5
|
||||
RestrictAddressFamilies=~AF_NETLINK
|
7
etc/systemd/system/fstrim.service.d/override.conf
Normal file
7
etc/systemd/system/fstrim.service.d/override.conf
Normal file
|
@ -0,0 +1,7 @@
|
|||
[Unit]
|
||||
Wants=xfs_fsr.service
|
||||
After=xfs_fsr.service
|
||||
|
||||
[Service]
|
||||
CPUSchedulingPolicy=idle
|
||||
IOSchedulingClass=idle
|
6
etc/systemd/system/fstrim.timer.d/override.conf
Normal file
6
etc/systemd/system/fstrim.timer.d/override.conf
Normal file
|
@ -0,0 +1,6 @@
|
|||
[Unit]
|
||||
Description=Discard unused filesystem blocks once a day
|
||||
|
||||
[Timer]
|
||||
OnCalendar=
|
||||
OnCalendar=daily
|
11
etc/systemd/system/nginx-create-session-ticket-keys.service
Normal file
11
etc/systemd/system/nginx-create-session-ticket-keys.service
Normal file
|
@ -0,0 +1,11 @@
|
|||
[Unit]
|
||||
Description=Create nginx TLS session ticket keys
|
||||
Before=nginx.service
|
||||
|
||||
[Service]
|
||||
ExecStart=/usr/local/bin/nginx-create-session-ticket-keys
|
||||
Type=oneshot
|
||||
UMask=0077
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
|
@ -0,0 +1,9 @@
|
|||
[Unit]
|
||||
Description=Rotate nginx TLS session ticket keys
|
||||
After=nginx.service nginx-create-session-ticket-keys.service
|
||||
Requires=nginx.service nginx-create-session-ticket-keys.service
|
||||
|
||||
[Service]
|
||||
ExecStart=/usr/local/bin/nginx-rotate-session-ticket-keys
|
||||
Type=oneshot
|
||||
UMask=0077
|
|
@ -0,0 +1,8 @@
|
|||
[Unit]
|
||||
Description=Run nginx-rotate-session-ticket-keys three times daily
|
||||
|
||||
[Timer]
|
||||
OnCalendar=0/8:00:00
|
||||
|
||||
[Install]
|
||||
WantedBy=timers.target
|
30
etc/systemd/system/nginx.service.d/override.conf
Normal file
30
etc/systemd/system/nginx.service.d/override.conf
Normal file
|
@ -0,0 +1,30 @@
|
|||
[Service]
|
||||
CapabilityBoundingSet=CAP_CHOWN CAP_DAC_OVERRIDE CAP_NET_BIND_SERVICE CAP_SETUID CAP_SETGID
|
||||
LockPersonality=true
|
||||
MemoryDenyWriteExecute=true
|
||||
NoNewPrivileges=true
|
||||
PrivateIPC=true
|
||||
ProcSubset=pid
|
||||
ProtectClock=true
|
||||
ProtectControlGroups=true
|
||||
ProtectHome=true
|
||||
ProtectHostname=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectProc=invisible
|
||||
ProtectSystem=strict
|
||||
ReadWritePaths=/var/lib/nginx /var/log/nginx -/var/cache/nginx
|
||||
Restart=always
|
||||
RestartMaxDelaySec=10s
|
||||
RestartSec=100ms
|
||||
RestartSteps=5
|
||||
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX
|
||||
RestrictNamespaces=true
|
||||
RestrictRealtime=true
|
||||
RestrictSUIDSGID=true
|
||||
RuntimeDirectory=nginx
|
||||
RuntimeDirectoryMode=700
|
||||
SystemCallArchitectures=native
|
||||
SystemCallFilter=@system-service
|
||||
SystemCallFilter=~@obsolete
|
|
@ -0,0 +1,2 @@
|
|||
[Service]
|
||||
CPUSchedulingPolicy=idle
|
3
etc/systemd/system/sshd.service.d/override.conf
Normal file
3
etc/systemd/system/sshd.service.d/override.conf
Normal file
|
@ -0,0 +1,3 @@
|
|||
[Service]
|
||||
LimitNOFILE=8192
|
||||
ManagedOOMPreference=avoid
|
7
etc/systemd/system/sysstat-collect.timer.d/override.conf
Normal file
7
etc/systemd/system/sysstat-collect.timer.d/override.conf
Normal file
|
@ -0,0 +1,7 @@
|
|||
[Unit]
|
||||
Description=Run system activity accounting tool every minute
|
||||
|
||||
[Timer]
|
||||
AccuracySec=1us
|
||||
OnCalendar=
|
||||
OnCalendar=minutely
|
3
etc/systemd/system/system.slice.d/override.conf
Normal file
3
etc/systemd/system/system.slice.d/override.conf
Normal file
|
@ -0,0 +1,3 @@
|
|||
[Slice]
|
||||
MemoryLow=64M
|
||||
MemoryMin=64M
|
|
@ -0,0 +1,2 @@
|
|||
[Service]
|
||||
Environment=SYSTEMD_RELAX_ESP_CHECKS=1
|
5
etc/systemd/system/unbound.service.d/override.conf
Normal file
5
etc/systemd/system/unbound.service.d/override.conf
Normal file
|
@ -0,0 +1,5 @@
|
|||
[Service]
|
||||
Restart=always
|
||||
RestartMaxDelaySec=10s
|
||||
RestartSec=100ms
|
||||
RestartSteps=5
|
12
etc/systemd/system/xfs_fsr.service
Normal file
12
etc/systemd/system/xfs_fsr.service
Normal file
|
@ -0,0 +1,12 @@
|
|||
[Unit]
|
||||
Description=XFS filesystem reorganization
|
||||
|
||||
[Service]
|
||||
CPUSchedulingPolicy=idle
|
||||
ExecStart=/usr/bin/xfs_fsr -f /var/lib/.fsrlast
|
||||
IOSchedulingClass=idle
|
||||
IPAddressDeny=any
|
||||
MemoryDenyWriteExecute=true
|
||||
PrivateIPC=true
|
||||
PrivateNetwork=true
|
||||
Type=oneshot
|
Loading…
Add table
Add a link
Reference in a new issue