X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;ds=sidebyside;f=support%2Fsystemd%2Fpeertube.service;h=00d66b917f7b5d81eeb15477ae937c2e0c9bf547;hb=714e33a7428b71ef98129ce85a4bd64140bcd912;hp=1e3378f772d90c2aefa69ab176aef0a83ac73d91;hpb=9e580054399e3d40b0cc366afc80ceb7426ad590;p=github%2FChocobozzz%2FPeerTube.git diff --git a/support/systemd/peertube.service b/support/systemd/peertube.service index 1e3378f77..00d66b917 100644 --- a/support/systemd/peertube.service +++ b/support/systemd/peertube.service @@ -1,17 +1,33 @@ [Unit] Description=PeerTube daemon +After=network.target postgresql.service redis-server.service [Service] Type=simple Environment=NODE_ENV=production -User=myuser -Group=myuser -ExecStart=/usr/bin/npm start -WorkingDirectory=/path/to/peertube -StandardOutput=syslog -StandardError=syslog +Environment=NODE_CONFIG_DIR=/var/www/peertube/config +User=peertube +Group=peertube +ExecStart=/usr/bin/node dist/server +WorkingDirectory=/var/www/peertube/peertube-latest SyslogIdentifier=peertube Restart=always +; Some security directives. +; Mount /usr, /boot, and /etc as read-only for processes invoked by this service. +ProtectSystem=full +; Sets up a new /dev mount for the process and only adds API pseudo devices +; like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled +; by default because it may not work on devices like the Raspberry Pi. +PrivateDevices=false +; Ensures that the service process and all its children can never gain new +; privileges through execve(). +NoNewPrivileges=true +; This makes /home, /root, and /run/user inaccessible and empty for processes invoked +; by this unit. Make sure that you do not depend on data inside these folders. +ProtectHome=true +; Drops the sys admin capability from the daemon. +CapabilityBoundingSet=~CAP_SYS_ADMIN + [Install] WantedBy=multi-user.target