Rodolphe Bréard
|
596d55a486
|
Add the acmed@user.service systemd unit configuration
|
3 years ago |
Rodolphe Bréard
|
39dd471ca3
|
Enable ProtectKernelModules in the unit file
|
3 years ago |
Rodolphe Bréard
|
f4b80cb1e4
|
Explicitly set the configuration file and logging mode
|
3 years ago |
Rodolphe Bréard
|
a52f6d1da7
|
Add documentation links in the unit file
|
3 years ago |
Rodolphe Bréard
|
8aae7d58b0
|
Change ProtectSystem to yes
The strict mode was not adapted since it would prevent ACMEd to write
http-01 challenge files inside the web server's directory.
|
4 years ago |
Rodolphe Bréard
|
00821e8998
|
Move the contrib files into dedicated directories
|
4 years ago |
Rodolphe Bréard
|
fc4e442c0b
|
Set the default log level to info
|
4 years ago |
Ralf Zerres
|
849b24b261
|
systemd.unit: reworked `acmed.service`
acmed.service: hardened sandbox systemd unit
* comments the logical units
* update working directory (ACMEd needs write access)
* update runtime directory (write/update the pid-file)
* reduce privileges for filesystem and kernel-space
Signed-off-by: Ralf Zerres <ralf.zerres@networkx.de>
|
4 years ago |