# It is not recommended to modify this file in-place, because it will # be overwritten during package upgrades. If you want to add further # options or overwrite existing ones then use # $ systemctl edit elementsd.service # See "man systemd.service" for details. # Note that almost all daemon options could be specified in # /etc/bitcoin/elements.conf, but keep in mind those explicitly # specified as arguments in ExecStart= will override those in the # config file. [Unit] Description=Elements daemon Documentation=https://github.com/ElementsProject/elements/blob/master/doc/init.md # https://www.freedesktop.org/wiki/Software/systemd/NetworkTarget/ After=network-online.target Wants=network-online.target [Service] ExecStart=/usr/bin/elementsd -daemonwait \ -pid=/run/elementsd/elementsd.pid \ -conf=/etc/elements/elements.conf \ -debuglogfile=/var/log/elementsd/debug.log \ -datadir=/var/lib/elementsd # Make sure the config directory is readable by the service user PermissionsStartOnly=true ExecStartPre=/bin/chgrp elements /etc/elements # Process management #################### Type=forking PIDFile=/run/elementsd/elementsd.pid Restart=on-failure TimeoutStartSec=infinity TimeoutStopSec=600 # Directory creation and permissions #################################### # Run as elements:elements User=elements Group=elements # /run/elementsd RuntimeDirectory=elementsd RuntimeDirectoryMode=0710 # /etc/elements ConfigurationDirectory=elements ConfigurationDirectoryMode=0710 # /var/log/elementsd LogsDirectory=elementsd LogsDirectoryMode=0755 # /var/lib/elementsd StateDirectory=elementsd StateDirectoryMode=0710 # Hardening measures #################### # Provide a private /tmp and /var/tmp. PrivateTmp=true # Mount /usr, /boot/ and /etc read-only for the process. ProtectSystem=full # Deny access to /home, /root and /run/user ProtectHome=true # Disallow the process and all of its children to gain # new privileges through execve(). NoNewPrivileges=true # Use a new /dev namespace only populated with API pseudo devices # such as /dev/null, /dev/zero and /dev/random. PrivateDevices=true # Deny the creation of writable and executable memory mappings. MemoryDenyWriteExecute=true [Install] WantedBy=multi-user.target