This commit adds a warning for settings that possibly provide better
sandboxing and explains their tradeoffs.
---
 contrib/systemd/haproxy.service.in | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/contrib/systemd/haproxy.service.in 
b/contrib/systemd/haproxy.service.in
index 804be3583..5d8eecf06 100644
--- a/contrib/systemd/haproxy.service.in
+++ b/contrib/systemd/haproxy.service.in
@@ -12,5 +12,11 @@ KillMode=mixed
 Restart=always
 Type=notify
 
+# The following lines leverage SystemD's sandboxing options to provide
+# defense in depth protection at the expense of restricting some flexibility
+# in your setup (e.g. placement of your configuration files) or possibly
+# reduced performance. See systemd.service(5) and systemd.exec(5) for further
+# information.
+
 [Install]
 WantedBy=multi-user.target
-- 
2.16.2


Reply via email to