Add deploy/ unit files for every DECNET daemon (agent, updater, api, web, swarmctl, listener, forwarder). All run as User=decnet with NoNewPrivileges, ProtectSystem, PrivateTmp, LockPersonality; AmbientCapabilities=CAP_NET_ADMIN CAP_NET_RAW only on the agent (MACVLAN/scapy). Existing api/web units migrated to /opt/decnet layout and the same hardening stanza. Make the updater's _spawn_agent systemd-aware: under systemd (detected via INVOCATION_ID + systemctl on PATH), `systemctl restart decnet-agent.service` replaces the Popen path so the new agent inherits the unit's ambient caps instead of the updater's empty set. _stop_agent becomes a no-op in that mode to avoid racing systemctl's own stop phase. Tests cover the dispatcher branch selection, MainPID parsing, and the systemd no-op stop.
39 lines
904 B
Desktop File
39 lines
904 B
Desktop File
[Unit]
|
|
Description=DECNET Web Dashboard Service
|
|
Documentation=https://github.com/4nt11/DECNET/wiki/Web-Dashboard
|
|
After=network-online.target decnet-api.service
|
|
Wants=network-online.target
|
|
|
|
[Service]
|
|
Type=simple
|
|
User=decnet
|
|
Group=decnet
|
|
WorkingDirectory=/opt/decnet
|
|
EnvironmentFile=-/opt/decnet/.env.local
|
|
ExecStart=/opt/decnet/venv/bin/decnet web
|
|
|
|
# Uncomment if you bind the dashboard to a privileged port (80/443):
|
|
# CapabilityBoundingSet=CAP_NET_BIND_SERVICE
|
|
# AmbientCapabilities=CAP_NET_BIND_SERVICE
|
|
CapabilityBoundingSet=
|
|
AmbientCapabilities=
|
|
|
|
# Security Hardening
|
|
NoNewPrivileges=yes
|
|
ProtectSystem=full
|
|
ProtectHome=read-only
|
|
PrivateTmp=yes
|
|
ProtectKernelTunables=yes
|
|
ProtectKernelModules=yes
|
|
ProtectControlGroups=yes
|
|
RestrictSUIDSGID=yes
|
|
LockPersonality=yes
|
|
ReadWritePaths=/opt/decnet /var/log/decnet
|
|
ReadOnlyPaths=/etc/decnet
|
|
|
|
Restart=on-failure
|
|
RestartSec=5
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|