forked from pool/tailscale
Cleanup OBS-URL: https://build.opensuse.org/request/show/1147777 OBS-URL: https://build.opensuse.org/package/show/network:vpn/tailscale?expand=0&rev=16
36 lines
1.0 KiB
Desktop File
36 lines
1.0 KiB
Desktop File
[Unit]
|
|
Description=Tailscale node agent
|
|
Documentation=https://tailscale.com/kb/
|
|
Wants=network-pre.target
|
|
After=network-pre.target NetworkManager.service systemd-resolved.service
|
|
|
|
[Service]
|
|
EnvironmentFile=/etc/default/tailscaled
|
|
ExecStartPre=/usr/sbin/tailscaled --cleanup
|
|
ExecStart=/usr/sbin/tailscaled --state=/var/lib/tailscale/tailscaled.state --socket=/run/tailscale/tailscaled.sock --port=${PORT} $FLAGS
|
|
ExecStopPost=/usr/sbin/tailscaled --cleanup
|
|
Restart=on-failure
|
|
RuntimeDirectory=tailscale
|
|
RuntimeDirectoryMode=0755
|
|
StateDirectory=tailscale
|
|
StateDirectoryMode=0700
|
|
CacheDirectory=tailscale
|
|
CacheDirectoryMode=0750
|
|
Type=notify
|
|
# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
|
|
PrivateDevices=true
|
|
ProtectClock=true
|
|
ProtectControlGroups=true
|
|
ProtectHome=true
|
|
ProtectHostname=true
|
|
ProtectKernelLogs=true
|
|
ProtectKernelModules=true
|
|
ProtectKernelTunables=true
|
|
RestrictRealtime=true
|
|
# give permission to TUN
|
|
BindPaths=/dev/net/tun
|
|
DeviceAllow=/dev/net/tun rw
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|