From 54418378f4c1fb730a4efa3096940c1befd680dd Mon Sep 17 00:00:00 2001 From: Florent Date: Fri, 23 Feb 2024 21:57:30 +0100 Subject: [PATCH] Fix systemd.service after version 3.1 --- conf/systemd.service | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/conf/systemd.service b/conf/systemd.service index c5e26ec..482956c 100644 --- a/conf/systemd.service +++ b/conf/systemd.service @@ -8,12 +8,12 @@ User=__APP__ Group=__APP__ WorkingDirectory=__INSTALL_DIR__/ Environment="__YNH_NODE_LOAD_PATH__" -ExecStart=__YNH_NODE__ red.js -p __PORT__ -u __INSTALL_DIR__/data +ExecStart=__YNH_NODE__ packages/node_modules/node-red/red.js -p __PORT__ -u __INSTALL_DIR__/data StandardOutput=syslog StandardError=inherit # Sandboxing options to harden security -# Depending on specificities of your service/app, you may need to tweak these +# Depending on specificities of your service/app, you may need to tweak these # .. but this should be a good baseline # Details for these options: https://www.freedesktop.org/software/systemd/man/systemd.exec.html NoNewPrivileges=yes @@ -42,7 +42,7 @@ CapabilityBoundingSet=~CAP_BLOCK_SUSPEND CAP_WAKE_ALARM CapabilityBoundingSet=~CAP_SYS_TTY_CONFIG CapabilityBoundingSet=~CAP_MAC_ADMIN CAP_MAC_OVERRIDE CapabilityBoundingSet=~CAP_NET_ADMIN CAP_NET_BROADCAST CAP_NET_RAW -CapabilityBoundingSet=~CAP_SYS_ADMIN CAP_SYS_PTRACE CAP_SYSLOG +CapabilityBoundingSet=~CAP_SYS_ADMIN CAP_SYS_PTRACE CAP_SYSLOG [Install] WantedBy=multi-user.target