From 040b960d201cf99691da3de109b5251ce0b44dc5 Mon Sep 17 00:00:00 2001 From: ericgaspar Date: Tue, 7 Sep 2021 09:20:28 +0200 Subject: [PATCH] Revert "Update systemd.service" This reverts commit 3e4d1b95d44e130135608c5d258bdf73537b754a. --- conf/systemd.service | 20 -------------------- 1 file changed, 20 deletions(-) diff --git a/conf/systemd.service b/conf/systemd.service index bb02334..3cd1b26 100644 --- a/conf/systemd.service +++ b/conf/systemd.service @@ -11,26 +11,6 @@ Group=__APP__ ExecStart=__FINALPATH__/galene -turn __PUBLIC_IP4__:__TURN_PORT__ -udp-range 49152-65535 -groups /home/yunohost.app/__APP__/groups -recordings /home/yunohost.app/__APP__/recordings LimitNOFILE=65536 -; Sandboxing -ProtectSystem=full -ProtectHome=true -RestrictNamespaces=true -RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 -PrivateTmp=true -PrivateDevices=true -ProtectClock=true -ProtectControlGroups=true -ProtectKernelTunables=true -ProtectKernelLogs=true -ProtectKernelModules=true -LockPersonality=true -RestrictSUIDSGID=true -RemoveIPC=true -RestrictRealtime=true -SystemCallFilter=@system-service -SystemCallArchitectures=native -MemoryDenyWriteExecute=true - # Sandboxing options to harden security # Depending on specificities of your service/app, you may need to tweak these # .. but this should be a good baseline