2020-11-09 07:23:58 +03:00
# SPDX-License-Identifier: LGPL-2.1-or-later
2017-11-18 19:35:03 +03:00
#
2013-10-17 05:18:36 +04:00
# This file is part of systemd.
#
# systemd is free software; you can redistribute it and/or modify it
# under the terms of the GNU Lesser General Public License as published by
# the Free Software Foundation; either version 2.1 of the License, or
# (at your option) any later version.
[Unit]
2021-06-29 10:47:53 +03:00
Description = Network Configuration
2013-10-17 05:18:36 +04:00
Documentation = man:systemd-networkd.service(8)
2014-06-17 04:18:33 +04:00
ConditionCapability = CAP_NET_ADMIN
2013-10-17 05:18:36 +04:00
DefaultDependencies = no
2016-11-22 10:41:51 +03:00
# systemd-udevd.service can be dropped once tuntap is moved to netlink
2020-08-26 17:54:45 +03:00
After = systemd-networkd.socket systemd-udevd.service network-pre.target systemd-sysusers.service systemd-sysctl.service
2014-06-17 04:18:33 +04:00
Before = network.target multi-user.target shutdown.target
Conflicts = shutdown.target
2020-08-26 17:54:45 +03:00
Wants = systemd-networkd.socket network.target
2013-10-17 05:18:36 +04:00
[Service]
2017-08-26 19:40:47 +03:00
AmbientCapabilities = CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW
2020-09-11 11:56:06 +03:00
BusName = org.freedesktop.network1
2018-11-12 19:19:48 +03:00
CapabilityBoundingSet = CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW
2019-05-01 15:28:36 +03:00
DeviceAllow = char-* rw
2021-05-16 12:55:36 +03:00
ExecStart = !!{{ROOTLIBEXECDIR}}/systemd-networkd
2020-12-08 18:21:58 +03:00
ExecReload = networkctl reload
2018-11-12 19:19:48 +03:00
LockPersonality = yes
MemoryDenyWriteExecute = yes
NoNewPrivileges = yes
2020-08-06 15:50:38 +03:00
ProtectProc = invisible
2020-04-02 21:18:11 +03:00
ProtectClock = yes
2016-08-26 14:23:27 +03:00
ProtectControlGroups = yes
2018-11-12 19:19:48 +03:00
ProtectHome = yes
2019-11-14 03:56:23 +03:00
ProtectKernelLogs = yes
2020-08-06 15:50:38 +03:00
ProtectKernelModules = yes
2018-11-12 19:19:48 +03:00
ProtectSystem = strict
Restart = on-failure
2020-08-06 15:50:38 +03:00
RestartKillSignal = SIGUSR2
2018-11-12 19:19:48 +03:00
RestartSec = 0
2021-10-15 00:31:21 +03:00
RestrictAddressFamilies = AF_UNIX AF_NETLINK AF_INET AF_INET6 AF_PACKET
2018-11-12 19:19:48 +03:00
RestrictNamespaces = yes
RestrictRealtime = yes
2019-03-20 21:52:20 +03:00
RestrictSUIDSGID = yes
2017-08-26 19:40:47 +03:00
RuntimeDirectory = systemd/netif
RuntimeDirectoryPreserve = yes
2018-11-12 19:19:48 +03:00
SystemCallArchitectures = native
SystemCallErrorNumber = EPERM
SystemCallFilter = @system-service
Type = notify
User = systemd-network
2021-05-16 12:55:36 +03:00
{ { S E R V I C E _ W A T C H D O G } }
2014-02-21 07:38:17 +04:00
[Install]
WantedBy = multi-user.target
2015-02-02 00:13:26 +03:00
Also = systemd-networkd.socket
2017-04-10 18:59:58 +03:00
Alias = dbus-org.freedesktop.network1.service
2017-03-27 13:55:55 +03:00
# We want to enable systemd-networkd-wait-online.service whenever this service
# is enabled. systemd-networkd-wait-online.service has
# WantedBy=network-online.target, so enabling it only has an effect if
# network-online.target itself is enabled or pulled in by some other unit.
Also = systemd-networkd-wait-online.service