diff options
author | Chocobozzz <me@florianbigard.com> | 2019-02-06 12:26:58 +0100 |
---|---|---|
committer | Chocobozzz <me@florianbigard.com> | 2019-02-06 12:26:58 +0100 |
commit | 73471b1a52f242e86364ffb077ea6cadb3b07ae2 (patch) | |
tree | 43dbb7748e281f8d80f15326f489cdea10ec857d /support/systemd/peertube.service | |
parent | c22419dd265c0c7185bf4197a1cb286eb3d8ebc0 (diff) | |
parent | f5305c04aae14467d6f957b713c5a902275cbb89 (diff) | |
download | PeerTube-73471b1a52f242e86364ffb077ea6cadb3b07ae2.tar.gz PeerTube-73471b1a52f242e86364ffb077ea6cadb3b07ae2.tar.zst PeerTube-73471b1a52f242e86364ffb077ea6cadb3b07ae2.zip |
Merge branch 'release/v1.2.0'
Diffstat (limited to 'support/systemd/peertube.service')
-rw-r--r-- | support/systemd/peertube.service | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/support/systemd/peertube.service b/support/systemd/peertube.service index 88856385c..fba644788 100644 --- a/support/systemd/peertube.service +++ b/support/systemd/peertube.service | |||
@@ -15,5 +15,24 @@ StandardError=syslog | |||
15 | SyslogIdentifier=peertube | 15 | SyslogIdentifier=peertube |
16 | Restart=always | 16 | Restart=always |
17 | 17 | ||
18 | ; Some security directives. | ||
19 | ; Use private /tmp and /var/tmp folders inside a new file system namespace, | ||
20 | ; which are discarded after the process stops. | ||
21 | PrivateTmp=true | ||
22 | ; Mount /usr, /boot, and /etc as read-only for processes invoked by this service. | ||
23 | ProtectSystem=full | ||
24 | ; Sets up a new /dev mount for the process and only adds API pseudo devices | ||
25 | ; like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled | ||
26 | ; by default because it may not work on devices like the Raspberry Pi. | ||
27 | PrivateDevices=false | ||
28 | ; Ensures that the service process and all its children can never gain new | ||
29 | ; privileges through execve(). | ||
30 | NoNewPrivileges=true | ||
31 | ; This makes /home, /root, and /run/user inaccessible and empty for processes invoked | ||
32 | ; by this unit. Make sure that you do not depend on data inside these folders. | ||
33 | ProtectHome=true | ||
34 | ; Drops the sys admin capability from the daemon. | ||
35 | CapabilityBoundingSet=~CAP_SYS_ADMIN | ||
36 | |||
18 | [Install] | 37 | [Install] |
19 | WantedBy=multi-user.target | 38 | WantedBy=multi-user.target |