templates/systemd/mastodon: enable sandbox mode (#15937)
This commit is contained in:
		
							
								
								
									
										27
									
								
								dist/mastodon-sidekiq.service
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										27
									
								
								dist/mastodon-sidekiq.service
									
									
									
									
										vendored
									
									
								
							@@ -12,6 +12,33 @@ Environment="MALLOC_ARENA_MAX=2"
 | 
			
		||||
ExecStart=/home/mastodon/.rbenv/shims/bundle exec sidekiq -c 25
 | 
			
		||||
TimeoutSec=15
 | 
			
		||||
Restart=always
 | 
			
		||||
# Capabilities
 | 
			
		||||
CapabilityBoundingSet=
 | 
			
		||||
# Security
 | 
			
		||||
NoNewPrivileges=true
 | 
			
		||||
# Sandboxing
 | 
			
		||||
ProtectSystem=strict
 | 
			
		||||
PrivateTmp=true
 | 
			
		||||
PrivateDevices=true
 | 
			
		||||
PrivateUsers=true
 | 
			
		||||
ProtectHostname=true
 | 
			
		||||
ProtectKernelLogs=true
 | 
			
		||||
ProtectKernelModules=true
 | 
			
		||||
ProtectKernelTunables=true
 | 
			
		||||
ProtectControlGroups=true
 | 
			
		||||
RestrictAddressFamilies=AF_INET
 | 
			
		||||
RestrictAddressFamilies=AF_INET6
 | 
			
		||||
RestrictAddressFamilies=AF_NETLINK
 | 
			
		||||
RestrictAddressFamilies=AF_UNIX
 | 
			
		||||
RestrictNamespaces=true
 | 
			
		||||
LockPersonality=true
 | 
			
		||||
RestrictRealtime=true
 | 
			
		||||
RestrictSUIDSGID=true
 | 
			
		||||
PrivateMounts=true
 | 
			
		||||
ProtectClock=true
 | 
			
		||||
# System Call Filtering
 | 
			
		||||
SystemCallArchitectures=native
 | 
			
		||||
SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module @mount @obsolete @reboot @resources @setuid @swap
 | 
			
		||||
 | 
			
		||||
[Install]
 | 
			
		||||
WantedBy=multi-user.target
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										27
									
								
								dist/mastodon-streaming.service
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										27
									
								
								dist/mastodon-streaming.service
									
									
									
									
										vendored
									
									
								
							@@ -12,6 +12,33 @@ Environment="STREAMING_CLUSTER_NUM=1"
 | 
			
		||||
ExecStart=/usr/bin/node ./streaming
 | 
			
		||||
TimeoutSec=15
 | 
			
		||||
Restart=always
 | 
			
		||||
# Capabilities
 | 
			
		||||
CapabilityBoundingSet=
 | 
			
		||||
# Security
 | 
			
		||||
NoNewPrivileges=true
 | 
			
		||||
# Sandboxing
 | 
			
		||||
ProtectSystem=strict
 | 
			
		||||
PrivateTmp=true
 | 
			
		||||
PrivateDevices=true
 | 
			
		||||
PrivateUsers=true
 | 
			
		||||
ProtectHostname=true
 | 
			
		||||
ProtectKernelLogs=true
 | 
			
		||||
ProtectKernelModules=true
 | 
			
		||||
ProtectKernelTunables=true
 | 
			
		||||
ProtectControlGroups=true
 | 
			
		||||
RestrictAddressFamilies=AF_INET
 | 
			
		||||
RestrictAddressFamilies=AF_INET6
 | 
			
		||||
RestrictAddressFamilies=AF_NETLINK
 | 
			
		||||
RestrictAddressFamilies=AF_UNIX
 | 
			
		||||
RestrictNamespaces=true
 | 
			
		||||
LockPersonality=true
 | 
			
		||||
RestrictRealtime=true
 | 
			
		||||
RestrictSUIDSGID=true
 | 
			
		||||
PrivateMounts=true
 | 
			
		||||
ProtectClock=true
 | 
			
		||||
# System Call Filtering
 | 
			
		||||
SystemCallArchitectures=native
 | 
			
		||||
SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module @mount @obsolete @reboot @resources @setuid @swap
 | 
			
		||||
 | 
			
		||||
[Install]
 | 
			
		||||
WantedBy=multi-user.target
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										27
									
								
								dist/mastodon-web.service
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										27
									
								
								dist/mastodon-web.service
									
									
									
									
										vendored
									
									
								
							@@ -12,6 +12,33 @@ ExecStart=/home/mastodon/.rbenv/shims/bundle exec puma -C config/puma.rb
 | 
			
		||||
ExecReload=/bin/kill -SIGUSR1 $MAINPID
 | 
			
		||||
TimeoutSec=15
 | 
			
		||||
Restart=always
 | 
			
		||||
# Capabilities
 | 
			
		||||
CapabilityBoundingSet=
 | 
			
		||||
# Security
 | 
			
		||||
NoNewPrivileges=true
 | 
			
		||||
# Sandboxing
 | 
			
		||||
ProtectSystem=strict
 | 
			
		||||
PrivateTmp=true
 | 
			
		||||
PrivateDevices=true
 | 
			
		||||
PrivateUsers=true
 | 
			
		||||
ProtectHostname=true
 | 
			
		||||
ProtectKernelLogs=true
 | 
			
		||||
ProtectKernelModules=true
 | 
			
		||||
ProtectKernelTunables=true
 | 
			
		||||
ProtectControlGroups=true
 | 
			
		||||
RestrictAddressFamilies=AF_INET
 | 
			
		||||
RestrictAddressFamilies=AF_INET6
 | 
			
		||||
RestrictAddressFamilies=AF_NETLINK
 | 
			
		||||
RestrictAddressFamilies=AF_UNIX
 | 
			
		||||
RestrictNamespaces=true
 | 
			
		||||
LockPersonality=true
 | 
			
		||||
RestrictRealtime=true
 | 
			
		||||
RestrictSUIDSGID=true
 | 
			
		||||
PrivateMounts=true
 | 
			
		||||
ProtectClock=true
 | 
			
		||||
# System Call Filtering
 | 
			
		||||
SystemCallArchitectures=native
 | 
			
		||||
SystemCallFilter=~@clock @cpu-emulation @debug @keyring @module @mount @obsolete @reboot @resources @setuid @swap
 | 
			
		||||
 | 
			
		||||
[Install]
 | 
			
		||||
WantedBy=multi-user.target
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user