mirror of
https://github.com/mastodon/mastodon.git
synced 2024-12-23 16:52:53 +01:00
a9ff5c8309
* templates/systemd/mastodon: add new sandboxing options * templates/systemd/mastodon: add '@privileged' and remove duplicates SystemCallFilters * templates/systemd/mastodon: add '@ipc' SystemCallFilter * templates/systemd/mastodon: add '@memlock' SystemCallFilter * templates/systemd/mastodon: allow '@resources' filter to mastodon-web service
52 lines
1.2 KiB
Desktop File
52 lines
1.2 KiB
Desktop File
[Unit]
|
|
Description=mastodon-sidekiq
|
|
After=network.target
|
|
|
|
[Service]
|
|
Type=simple
|
|
User=mastodon
|
|
WorkingDirectory=/home/mastodon/live
|
|
Environment="RAILS_ENV=production"
|
|
Environment="DB_POOL=25"
|
|
Environment="MALLOC_ARENA_MAX=2"
|
|
Environment="LD_PRELOAD=libjemalloc.so"
|
|
ExecStart=/home/mastodon/.rbenv/shims/bundle exec sidekiq -c 25
|
|
TimeoutSec=15
|
|
Restart=always
|
|
# Proc filesystem
|
|
ProcSubset=pid
|
|
ProtectProc=invisible
|
|
# Capabilities
|
|
CapabilityBoundingSet=
|
|
# Security
|
|
NoNewPrivileges=true
|
|
# Sandboxing
|
|
ProtectSystem=strict
|
|
PrivateTmp=true
|
|
PrivateDevices=true
|
|
PrivateUsers=true
|
|
ProtectHostname=true
|
|
ProtectKernelLogs=true
|
|
ProtectKernelModules=true
|
|
ProtectKernelTunables=true
|
|
ProtectControlGroups=true
|
|
RestrictAddressFamilies=AF_INET
|
|
RestrictAddressFamilies=AF_INET6
|
|
RestrictAddressFamilies=AF_NETLINK
|
|
RestrictAddressFamilies=AF_UNIX
|
|
RestrictNamespaces=true
|
|
LockPersonality=true
|
|
RestrictRealtime=true
|
|
RestrictSUIDSGID=true
|
|
RemoveIPC=true
|
|
PrivateMounts=true
|
|
ProtectClock=true
|
|
# System Call Filtering
|
|
SystemCallArchitectures=native
|
|
SystemCallFilter=~@cpu-emulation @debug @keyring @ipc @mount @obsolete @privileged @setuid
|
|
SystemCallFilter=@chown
|
|
SystemCallFilter=pipe
|
|
SystemCallFilter=pipe2
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|