mirror of
https://github.com/YunoHost-Apps/bookwyrm_ynh.git
synced 2024-09-03 18:16:12 +02:00
fixes systemd
This commit is contained in:
parent
62b1a6a3c5
commit
d946ee4079
3 changed files with 13 additions and 3 deletions
|
@ -16,10 +16,10 @@ ProtectHome=tmpfs
|
||||||
InaccessiblePaths=-/media -/mnt -/srv
|
InaccessiblePaths=-/media -/mnt -/srv
|
||||||
PrivateTmp=yes
|
PrivateTmp=yes
|
||||||
TemporaryFileSystem=/var /run
|
TemporaryFileSystem=/var /run
|
||||||
PrivateUsers=true
|
#PrivateUsers=true
|
||||||
PrivateDevices=true
|
PrivateDevices=true
|
||||||
BindReadOnlyPaths=__INSTALL_DIR__
|
BindReadOnlyPaths=__INSTALL_DIR__
|
||||||
BindPaths=__INSTALL_DIR__/images __INSTALL_DIR__/static /var/run/postgresql
|
#BindPaths=__INSTALL_DIR__/images __INSTALL_DIR__/static /var/run/postgresql
|
||||||
LockPersonality=yes
|
LockPersonality=yes
|
||||||
MemoryDenyWriteExecute=true
|
MemoryDenyWriteExecute=true
|
||||||
PrivateMounts=true
|
PrivateMounts=true
|
||||||
|
|
|
@ -32,6 +32,10 @@ ProtectControlGroups=true
|
||||||
RestrictRealtime=true
|
RestrictRealtime=true
|
||||||
RestrictNamespaces=net
|
RestrictNamespaces=net
|
||||||
|
|
||||||
|
NoNewPrivileges=yes
|
||||||
|
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 AF_NETLINK
|
||||||
|
DevicePolicy=closed
|
||||||
|
ProtectProc=invisible
|
||||||
SystemCallArchitectures=native
|
SystemCallArchitectures=native
|
||||||
SystemCallFilter=~@clock @debug @module @mount @obsolete @reboot @setuid @swap @cpu-emulation @privileged
|
SystemCallFilter=~@clock @debug @module @mount @obsolete @reboot @setuid @swap @cpu-emulation @privileged
|
||||||
|
|
||||||
|
|
|
@ -19,7 +19,7 @@ TemporaryFileSystem=/var /run
|
||||||
#PrivateUsers=true
|
#PrivateUsers=true
|
||||||
PrivateDevices=true
|
PrivateDevices=true
|
||||||
BindReadOnlyPaths=__INSTALL_DIR__
|
BindReadOnlyPaths=__INSTALL_DIR__
|
||||||
BindPaths=__INSTALL_DIR__/images __INSTALL_DIR__/static /var/run/postgresql
|
#BindPaths=__INSTALL_DIR__/images __INSTALL_DIR__/static /var/run/postgresql
|
||||||
LockPersonality=yes
|
LockPersonality=yes
|
||||||
MemoryDenyWriteExecute=true
|
MemoryDenyWriteExecute=true
|
||||||
PrivateMounts=true
|
PrivateMounts=true
|
||||||
|
@ -32,6 +32,12 @@ ProtectControlGroups=true
|
||||||
RestrictRealtime=true
|
RestrictRealtime=true
|
||||||
RestrictNamespaces=net
|
RestrictNamespaces=net
|
||||||
|
|
||||||
|
NoNewPrivileges=yes
|
||||||
|
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 AF_NETLINK
|
||||||
|
DevicePolicy=closed
|
||||||
|
ProtectProc=invisible
|
||||||
|
SystemCallArchitectures=native
|
||||||
|
SystemCallFilter=~@clock @debug @module @mount @obsolete @reboot @setuid @swap @cpu-emulation @privileged
|
||||||
|
|
||||||
# Denying access to capabilities that should not be relevant for webapps
|
# Denying access to capabilities that should not be relevant for webapps
|
||||||
# Doc: https://man7.org/linux/man-pages/man7/capabilities.7.html
|
# Doc: https://man7.org/linux/man-pages/man7/capabilities.7.html
|
||||||
|
|
Loading…
Add table
Reference in a new issue