summaryrefslogtreecommitdiff
path: root/community/tigervnc/vncserver.service
diff options
context:
space:
mode:
authorroot <root@rshg054.dnsready.net>2012-11-03 01:15:19 -0700
committerroot <root@rshg054.dnsready.net>2012-11-03 01:15:19 -0700
commite3f70522f1f35359d9307f478c96dace20a51ca1 (patch)
tree9db033a74cb298a1443b87e279b7549f35288789 /community/tigervnc/vncserver.service
parent35bd2bb6857eb818ca53b8fe34d88106133342f4 (diff)
Sat Nov 3 01:13:31 PDT 2012
Diffstat (limited to 'community/tigervnc/vncserver.service')
-rw-r--r--community/tigervnc/vncserver.service44
1 files changed, 44 insertions, 0 deletions
diff --git a/community/tigervnc/vncserver.service b/community/tigervnc/vncserver.service
new file mode 100644
index 000000000..85f77b9a0
--- /dev/null
+++ b/community/tigervnc/vncserver.service
@@ -0,0 +1,44 @@
+# The vncserver service unit file
+#
+# Quick HowTo:
+# 1. Copy this file to /etc/systemd/system/vncserver@:<display>.service
+# 2. Edit <USER> and vncserver parameters appropriately
+# ("su <USER> -c /usr/bin/vncserver %i -arg1 -arg2")
+# 3. Run `systemctl daemon-reload`
+# 4. Run `systemctl enable vncserver@:<display>.service`
+#
+# DO NOT RUN THIS SERVICE if your local area network is
+# untrusted! For a secure way of using VNC, you should
+# limit connections to the local host and then tunnel from
+# the machine you want to view VNC on (host A) to the machine
+# whose VNC output you want to view (host B)
+#
+# [user@hostA ~]$ ssh -v -C -L 590N:localhost:590M hostB
+#
+# this will open a connection on port 590N of your hostA to hostB's port 590M
+# (in fact, it ssh-connects to hostB and then connects to localhost (on hostB).
+# See the ssh man page for details on port forwarding)
+#
+# You can then point a VNC client on hostA at vncdisplay N of localhost and with
+# the help of ssh, you end up seeing what hostB makes available on port 590M
+#
+# Use "-nolisten tcp" to prevent X connections to your VNC server via TCP.
+#
+# Use "-localhost" to prevent remote VNC clients connecting except when
+# doing so through a secure tunnel. See the "-via" option in the
+# `man vncviewer' manual page.
+
+
+[Unit]
+Description=Remote desktop service (VNC)
+After=syslog.target network.target
+
+[Service]
+Type=forking
+# Clean any existing files in /tmp/.X11-unix environment
+ExecStartPre=/bin/sh -c '/usr/bin/vncserver -kill %i > /dev/null 2>&1 || true'
+ExecStart=/bin/su <USER> -c "/usr/bin/vncserver %i"
+ExecStop=/bin/su <USER> -c "/usr/bin/vncserver -kill %i"
+
+[Install]
+WantedBy=multi-user.target