Przeglądaj źródła

Add more strict ProtectHome to systemd sample configuration.

Merge pull request #42 from VTimofeenko/systemd_protecthome
Dan Helfman 3 lat temu
rodzic
commit
0a8d4e5dfb
1 zmienionych plików z 5 dodań i 2 usunięć
  1. 5 2
      sample/systemd/borgmatic.service

+ 5 - 2
sample/systemd/borgmatic.service

@@ -37,8 +37,11 @@ SystemCallErrorNumber=EPERM
 # system read-only be default and uncomment 'ReadWritePaths' for the required write access.
 # system read-only be default and uncomment 'ReadWritePaths' for the required write access.
 # Add local repositroy paths to the list of 'ReadWritePaths' like '-/mnt/my_backup_drive'.
 # Add local repositroy paths to the list of 'ReadWritePaths' like '-/mnt/my_backup_drive'.
 ProtectSystem=full
 ProtectSystem=full
-# ProtectHome=read-only
-# ReadWritePaths=-/root/.config/borg -/root/.cache/borg -/root/.borgmatic
+# ReadWritePaths=-/mnt/my_backup_drive
+# ReadOnlyPaths=-/var/lib/my_backup_source
+# This will mount a tmpfs on top of /root and pass through needed paths
+# ProtectHome=tmpfs
+# BindPaths=-/root/.cache/borg -/root/.cache/borg -/root/.borgmatic
 
 
 CapabilityBoundingSet=CAP_DAC_READ_SEARCH CAP_NET_RAW
 CapabilityBoundingSet=CAP_DAC_READ_SEARCH CAP_NET_RAW