Added Gvisor update service.
This commit is contained in:
parent
aafdf0c9f5
commit
7c1f39869e
1 changed files with 50 additions and 0 deletions
50
etc/systemd∕system/gvisor-update.service
Normal file
50
etc/systemd∕system/gvisor-update.service
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
[Unit]
|
||||||
|
Description=Update gVisor
|
||||||
|
After=network-online.target
|
||||||
|
Before=docker.service
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=oneshot
|
||||||
|
RuntimeDirectory=gvisor-updater
|
||||||
|
WorkingDirectory=/run/gvisor-updater
|
||||||
|
ExecStart=/usr/bin/sleep 5
|
||||||
|
ExecStart=/usr/bin/curl -sS -O https://storage.googleapis.com/gvisor/releases/release/latest/x86_64/runsc
|
||||||
|
ExecStart=/usr/bin/curl -sS -O https://storage.googleapis.com/gvisor/releases/release/latest/x86_64/runsc.sha512
|
||||||
|
ExecStart=/usr/bin/curl -sS -O https://storage.googleapis.com/gvisor/releases/release/latest/x86_64/containerd-shim-runsc-v1
|
||||||
|
ExecStart=/usr/bin/curl -sS -O https://storage.googleapis.com/gvisor/releases/release/latest/x86_64/containerd-shim-runsc-v1.sha512
|
||||||
|
ExecStart=/usr/bin/sha512sum -c runsc.sha512 -c containerd-shim-runsc-v1.sha512
|
||||||
|
ExecStart=/usr/bin/rm -f runsc.sha512 containerd-shim-runsc-v1.sha512
|
||||||
|
ExecStart=+/usr/bin/chown root:root runsc containerd-shim-runsc-v1
|
||||||
|
ExecStart=+/usr/bin/chmod a+rx runsc containerd-shim-runsc-v1
|
||||||
|
ExecStart=+/usr/bin/mv runsc containerd-shim-runsc-v1 /usr/local/bin
|
||||||
|
ExecStart=+/usr/bin/chcon system_u:object_r:container_runtime_exec_t:s0 /usr/local/bin/runsc
|
||||||
|
|
||||||
|
DynamicUser=true
|
||||||
|
CapabilityBoundingSet=
|
||||||
|
LockPersonality=true
|
||||||
|
MemoryDenyWriteExecute=true
|
||||||
|
NoNewPrivileges=true
|
||||||
|
PrivateDevices=true
|
||||||
|
PrivateIPC=true
|
||||||
|
PrivateTmp=true
|
||||||
|
ProcSubset=pid
|
||||||
|
ProtectClock=true
|
||||||
|
ProtectControlGroups=true
|
||||||
|
ProtectHome=true
|
||||||
|
ProtectHostname=true
|
||||||
|
ProtectKernelLogs=true
|
||||||
|
ProtectKernelModules=true
|
||||||
|
ProtectKernelTunables=true
|
||||||
|
ProtectProc=invisible
|
||||||
|
ProtectSystem=strict
|
||||||
|
RestrictAddressFamilies=
|
||||||
|
RestrictNamespaces=true
|
||||||
|
RestrictRealtime=true
|
||||||
|
RestrictSUIDSGID=true
|
||||||
|
RuntimeDirectoryMode=700
|
||||||
|
SystemCallArchitectures=native
|
||||||
|
SystemCallFilter=@system-service
|
||||||
|
SystemCallFilter=~@obsolete
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
Loading…
Reference in a new issue