2020-11-09 07:23:58 +03:00
# SPDX-License-Identifier: LGPL-2.1-or-later
2017-11-18 19:35:03 +03:00
#
2013-10-17 05:18:36 +04:00
# This file is part of systemd.
#
# systemd is free software; you can redistribute it and/or modify it
# under the terms of the GNU Lesser General Public License as published by
# the Free Software Foundation; either version 2.1 of the License, or
# (at your option) any later version.
[Unit]
2021-06-29 10:47:53 +03:00
Description = Network Configuration
2013-10-17 05:18:36 +04:00
Documentation = man:systemd-networkd.service(8)
2023-05-08 22:01:34 +03:00
Documentation = man:org.freedesktop.network1(5)
2014-06-17 04:18:33 +04:00
ConditionCapability = CAP_NET_ADMIN
2013-10-17 05:18:36 +04:00
DefaultDependencies = no
2016-11-22 10:41:51 +03:00
# systemd-udevd.service can be dropped once tuntap is moved to netlink
2020-08-26 17:54:45 +03:00
After = systemd-networkd.socket systemd-udevd.service network-pre.target systemd-sysusers.service systemd-sysctl.service
2023-05-25 19:13:02 +03:00
Before = network.target multi-user.target shutdown.target initrd-switch-root.target
Conflicts = shutdown.target initrd-switch-root.target
2024-02-26 04:33:20 +03:00
Wants = systemd-networkd.socket network.target systemd-networkd-persistent-storage.service
2013-10-17 05:18:36 +04:00
[Service]
2024-07-01 22:58:30 +03:00
AmbientCapabilities = CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW CAP_BPF CAP_SYS_ADMIN
2020-09-11 11:56:06 +03:00
BusName = org.freedesktop.network1
2024-07-01 22:58:30 +03:00
CapabilityBoundingSet = CAP_NET_ADMIN CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW CAP_BPF CAP_SYS_ADMIN
2019-05-01 15:28:36 +03:00
DeviceAllow = char-* rw
2023-06-12 04:15:19 +03:00
ExecStart = !!{{LIBEXECDIR}}/systemd-networkd
2022-08-13 11:18:55 +03:00
FileDescriptorStoreMax = 512
2024-03-13 04:14:48 +03:00
ImportCredential = network.wireguard.*
2018-11-12 19:19:48 +03:00
LockPersonality = yes
MemoryDenyWriteExecute = yes
NoNewPrivileges = yes
2020-08-06 15:50:38 +03:00
ProtectProc = invisible
2020-04-02 21:18:11 +03:00
ProtectClock = yes
2016-08-26 14:23:27 +03:00
ProtectControlGroups = yes
2018-11-12 19:19:48 +03:00
ProtectHome = yes
2019-11-14 03:56:23 +03:00
ProtectKernelLogs = yes
2020-08-06 15:50:38 +03:00
ProtectKernelModules = yes
2024-03-13 20:28:06 +03:00
ProtectSystem = strict
2018-11-12 19:19:48 +03:00
Restart = on-failure
2020-08-06 15:50:38 +03:00
RestartKillSignal = SIGUSR2
2018-11-12 19:19:48 +03:00
RestartSec = 0
2021-10-15 00:31:21 +03:00
RestrictAddressFamilies = AF_UNIX AF_NETLINK AF_INET AF_INET6 AF_PACKET
2018-11-12 19:19:48 +03:00
RestrictNamespaces = yes
RestrictRealtime = yes
2019-03-20 21:52:20 +03:00
RestrictSUIDSGID = yes
2017-08-26 19:40:47 +03:00
RuntimeDirectory = systemd/netif
RuntimeDirectoryPreserve = yes
2018-11-12 19:19:48 +03:00
SystemCallArchitectures = native
SystemCallErrorNumber = EPERM
2024-07-01 22:58:30 +03:00
SystemCallFilter = @system-service bpf
2023-01-02 19:25:46 +03:00
Type = notify-reload
2018-11-12 19:19:48 +03:00
User = systemd-network
2021-05-16 12:55:36 +03:00
{ { S E R V I C E _ W A T C H D O G } }
2014-02-21 07:38:17 +04:00
[Install]
WantedBy = multi-user.target
2015-02-02 00:13:26 +03:00
Also = systemd-networkd.socket
2017-04-10 18:59:58 +03:00
Alias = dbus-org.freedesktop.network1.service
2017-03-27 13:55:55 +03:00
2021-12-16 11:46:26 +03:00
# The output from this generator is used by udevd and networkd. Enable it by
# default when enabling systemd-networkd.service.
Also = systemd-network-generator.service
2017-03-27 13:55:55 +03:00
# We want to enable systemd-networkd-wait-online.service whenever this service
# is enabled. systemd-networkd-wait-online.service has
# WantedBy=network-online.target, so enabling it only has an effect if
# network-online.target itself is enabled or pulled in by some other unit.
Also = systemd-networkd-wait-online.service