X-Git-Url: http://git.squeep.com/?a=blobdiff_plain;f=installation%2Fpleroma.service;h=f1ed56cb3c8dd9db857392840ae58650cf1e3cdb;hb=fa0392e49cd46e4d2845840232a4b56e52729369;hp=e410764f37c9e2bacc98791646452290dea9c1ad;hpb=0a58428de6096f3222dd30d1a1f186150c25f4f2;p=akkoma diff --git a/installation/pleroma.service b/installation/pleroma.service index e410764f3..f1ed56cb3 100644 --- a/installation/pleroma.service +++ b/installation/pleroma.service @@ -6,6 +6,7 @@ After=network.target postgresql.service User=pleroma WorkingDirectory=/home/pleroma/pleroma Environment="HOME=/home/pleroma" +Environment="MIX_ENV=prod" ExecStart=/usr/local/bin/mix phx.server ExecReload=/bin/kill $MAINPID KillMode=process @@ -14,12 +15,14 @@ Restart=on-failure ; Some security directives. ; Use private /tmp and /var/tmp folders inside a new file system namespace, which are discarded after the process stops. PrivateTmp=true -; This makes /usr, /boot, /etc read-only. +; Mount /usr, /boot, and /etc as read-only for processes invoked by this service. ProtectSystem=full ; Sets up a new /dev mount for the process and only adds API pseudo devices like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled by default because it may not work on devices like the Raspberry Pi. PrivateDevices=false -; Ensures that the service process and all its children can never gain new privileges through execve() +; Ensures that the service process and all its children can never gain new privileges through execve(). NoNewPrivileges=true +; Drops the sysadmin capability from the daemon. +CapabilityBoundingSet=~CAP_SYS_ADMIN [Install] WantedBy=multi-user.target