NoNewPrivileges on most containers. drop all caps on a few others
This commit is contained in:
parent
fb2dd2c723
commit
b3e4af5aca
36 changed files with 80 additions and 1 deletions
|
|
@ -8,6 +8,9 @@ EnvironmentFile=/etc/containers/systemd/aode/.env.secrets
|
||||||
EnvironmentFile=/etc/containers/systemd/aode/.env
|
EnvironmentFile=/etc/containers/systemd/aode/.env
|
||||||
PublishPort=127.0.0.1:19438:8080
|
PublishPort=127.0.0.1:19438:8080
|
||||||
Volume=/var/containers/aode/data:/db:Z
|
Volume=/var/containers/aode/data:/db:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
DropCapability=ALL
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -10,6 +10,9 @@ Network=ask-js.network
|
||||||
Network=postgresql.network
|
Network=postgresql.network
|
||||||
PublishPort=127.0.0.1:20617:3579
|
PublishPort=127.0.0.1:20617:3579
|
||||||
Volume=/var/containers/ask-js/config:/app/config:ro,Z
|
Volume=/var/containers/ask-js/config:/app/config:ro,Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
DropCapability=ALL
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -3,7 +3,6 @@ Description=Caddy reverse proxy
|
||||||
|
|
||||||
[Container]
|
[Container]
|
||||||
ContainerName=caddy
|
ContainerName=caddy
|
||||||
AddCapability=NET_ADMIN
|
|
||||||
Image=ghcr.io/zenfyrdev/caddy:latest
|
Image=ghcr.io/zenfyrdev/caddy:latest
|
||||||
Network=host
|
Network=host
|
||||||
Volume=/etc/caddy:/etc/caddy:z
|
Volume=/etc/caddy:/etc/caddy:z
|
||||||
|
|
@ -11,6 +10,10 @@ Volume=/var/containers/caddy/config:/config:z
|
||||||
Volume=/var/containers/caddy/data:/data:z
|
Volume=/var/containers/caddy/data:/data:z
|
||||||
Volume=/var/log/caddy:/var/log/caddy:z
|
Volume=/var/log/caddy:/var/log/caddy:z
|
||||||
Volume=/var/www:/var/www:z
|
Volume=/var/www:/var/www:z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
DropCapability=ALL
|
||||||
|
AddCapability=NET_ADMIN NET_BIND_SERVICE
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -15,6 +15,8 @@ HealthCmd=wget --spider -q 127.0.0.1:3923/?reset=/._
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=1m
|
HealthStartPeriod=1m
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -21,6 +21,8 @@ Volume=/var/containers/ejabberd/config:/opt/ejabberd/conf:ro,Z
|
||||||
Volume=/var/containers/ejabberd/files:/opt/ejabberd/upload:Z
|
Volume=/var/containers/ejabberd/files:/opt/ejabberd/upload:Z
|
||||||
Volume=/var/containers/ejabberd/database:/opt/ejabberd/database:Z
|
Volume=/var/containers/ejabberd/database:/opt/ejabberd/database:Z
|
||||||
Volume=/etc/certs:/etc/letsencrypt/live:ro,z
|
Volume=/etc/certs:/etc/letsencrypt/live:ro,z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -12,6 +12,8 @@ User=1001:1001
|
||||||
Exec=/bin/sh -c "sleep 5; forgejo-runner daemon"
|
Exec=/bin/sh -c "sleep 5; forgejo-runner daemon"
|
||||||
Volume=/var/containers/forgejo/runner/data:/data:Z
|
Volume=/var/containers/forgejo/runner/data:/data:Z
|
||||||
Volume=/var/run/dind/docker.sock:/var/run/docker.sock:z
|
Volume=/var/run/dind/docker.sock:/var/run/docker.sock:z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -13,6 +13,8 @@ PublishPort=127.0.0.1:41807:3000
|
||||||
PublishPort=10429:22
|
PublishPort=10429:22
|
||||||
Timezone=local
|
Timezone=local
|
||||||
Volume=/var/containers/forgejo/data:/data:Z
|
Volume=/var/containers/forgejo/data:/data:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -12,6 +12,8 @@ Network=postgresql.network
|
||||||
PublishPort=127.0.0.1:27819:80
|
PublishPort=127.0.0.1:27819:80
|
||||||
Volume=/var/containers/freshrss/data:/var/www/FreshRSS/data:Z
|
Volume=/var/containers/freshrss/data:/var/www/FreshRSS/data:Z
|
||||||
Volume=/var/containers/freshrss/extensions:/var/www/FreshRSS/extensions:Z
|
Volume=/var/containers/freshrss/extensions:/var/www/FreshRSS/extensions:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -7,6 +7,9 @@ ContainerName=i2pd
|
||||||
AutoUpdate=registry
|
AutoUpdate=registry
|
||||||
Network=host
|
Network=host
|
||||||
Volume=/var/containers/i2pd/data:/home/i2pd/data:Z,U
|
Volume=/var/containers/i2pd/data:/home/i2pd/data:Z,U
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
DropCapability=ALL
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -12,6 +12,8 @@ Network=postgresql.network
|
||||||
PublishPort=127.0.0.1:24042:24042
|
PublishPort=127.0.0.1:24042:24042
|
||||||
Volume=/var/containers/iceshrimp/data/media:/data/media:Z
|
Volume=/var/containers/iceshrimp/data/media:/data/media:Z
|
||||||
Volume=/var/containers/iceshrimp/config:/app/config:ro,Z
|
Volume=/var/containers/iceshrimp/config:/app/config:ro,Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -10,6 +10,8 @@ PublishPort=20564:22
|
||||||
Volume=/var/containers/knot/keys:/etc/ssh/keys:Z
|
Volume=/var/containers/knot/keys:/etc/ssh/keys:Z
|
||||||
Volume=/var/containers/knot/repositories:/home/git/repositories:Z
|
Volume=/var/containers/knot/repositories:/home/git/repositories:Z
|
||||||
Volume=/var/containers/knot/data:/app:Z
|
Volume=/var/containers/knot/data:/app:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -24,6 +24,8 @@ HealthCmd=ss --listening --tcp | grep -P 'LISTEN.+:smtp' || exit 1
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=1m
|
HealthStartPeriod=1m
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -17,6 +17,8 @@ HealthCmd=redis-cli ping
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=10s
|
HealthStartPeriod=10s
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -10,6 +10,8 @@ EnvironmentFile=/etc/containers/systemd/mastodon/.env.secrets
|
||||||
EnvironmentFile=/etc/containers/systemd/mastodon/.env
|
EnvironmentFile=/etc/containers/systemd/mastodon/.env
|
||||||
Network=mastodon.network
|
Network=mastodon.network
|
||||||
Network=postgresql.network
|
Network=postgresql.network
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -17,6 +17,8 @@ HealthCmd=ps aux | grep '[s]idekiq\ 8' || false
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=1m
|
HealthStartPeriod=1m
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -17,6 +17,8 @@ HealthCmd=curl -s --noproxy localhost localhost:4000/api/v1/streaming/health | g
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=1m
|
HealthStartPeriod=1m
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -20,6 +20,8 @@ HealthCmd=curl -s --noproxy localhost localhost:3000/health | grep -q 'OK' || ex
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=1m
|
HealthStartPeriod=1m
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -11,6 +11,8 @@ Exec=server
|
||||||
PublishPort=127.0.0.1:19236:19236
|
PublishPort=127.0.0.1:19236:19236
|
||||||
Volume=/var/containers/mollysocket/data:/data:Z
|
Volume=/var/containers/mollysocket/data:/data:Z
|
||||||
WorkingDir=/data
|
WorkingDir=/data
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -8,6 +8,9 @@ EnvironmentFile=/etc/containers/systemd/pds/.env.secrets
|
||||||
EnvironmentFile=/etc/containers/systemd/pds/.env
|
EnvironmentFile=/etc/containers/systemd/pds/.env
|
||||||
PublishPort=127.0.0.1:24318:3000
|
PublishPort=127.0.0.1:24318:3000
|
||||||
Volume=/var/containers/pds/data:/pds:Z
|
Volume=/var/containers/pds/data:/pds:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
DropCapability=ALL
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -14,6 +14,8 @@ HealthCmd=pg_isready -U postgres -d postgres
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=30s
|
HealthStartPeriod=30s
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -13,6 +13,8 @@ HealthOnFailure=kill
|
||||||
HealthInterval=5m
|
HealthInterval=5m
|
||||||
HealthStartPeriod=30s
|
HealthStartPeriod=30s
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -8,6 +8,8 @@ AutoUpdate=registry
|
||||||
Environment=PORT=7000
|
Environment=PORT=7000
|
||||||
Environment=URL=https://b.twitch.synth.download
|
Environment=URL=https://b.twitch.synth.download
|
||||||
PublishPort=127.0.0.1:43072:7000
|
PublishPort=127.0.0.1:43072:7000
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -13,6 +13,8 @@ Environment=SAFETWITCH_HTTPS=true
|
||||||
Environment=SAFETWITCH_DEFAULT_LOCALE=en
|
Environment=SAFETWITCH_DEFAULT_LOCALE=en
|
||||||
Environment=SAFETWITCH_FALLBACK_LOCALE=en
|
Environment=SAFETWITCH_FALLBACK_LOCALE=en
|
||||||
PublishPort=127.0.0.1:24682:8280
|
PublishPort=127.0.0.1:24682:8280
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -15,6 +15,8 @@ HealthInterval=5s
|
||||||
HealthRetries=20
|
HealthRetries=20
|
||||||
Network=searxng.network
|
Network=searxng.network
|
||||||
Volume=/var/containers/searxng/dragonfly:/data:Z
|
Volume=/var/containers/searxng/dragonfly:/data:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -11,6 +11,8 @@ PublishPort=127.0.0.1:48898:8080
|
||||||
Network=searxng.network
|
Network=searxng.network
|
||||||
Volume=/var/containers/searxng/config:/etc/searxng:ro,Z
|
Volume=/var/containers/searxng/config:/etc/searxng:ro,Z
|
||||||
Volume=/var/containers/searxng/cache:/var/cache/searxng
|
Volume=/var/containers/searxng/cache:/var/cache/searxng
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -18,6 +18,8 @@ PublishPort=127.0.0.1:47815:3002
|
||||||
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
||||||
Volume=/var/containers/sharkey/activity:/sharkey/.config:z
|
Volume=/var/containers/sharkey/activity:/sharkey/.config:z
|
||||||
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -17,6 +17,8 @@ PublishPort=127.0.0.1:60628:3001
|
||||||
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
||||||
Volume=/var/containers/sharkey/api:/sharkey/.config:z
|
Volume=/var/containers/sharkey/api:/sharkey/.config:z
|
||||||
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -17,6 +17,8 @@ HealthCmd=redis-cli ping
|
||||||
HealthOnFailure=kill
|
HealthOnFailure=kill
|
||||||
HealthStartPeriod=10s
|
HealthStartPeriod=10s
|
||||||
Notify=healthy
|
Notify=healthy
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -18,6 +18,8 @@ PublishPort=127.0.0.1:57378:3003
|
||||||
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
||||||
Volume=/var/containers/sharkey/media:/sharkey/.config:z
|
Volume=/var/containers/sharkey/media:/sharkey/.config:z
|
||||||
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -15,6 +15,8 @@ Network=postgresql.network
|
||||||
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
Volume=/var/containers/sharkey/files:/sharkey/files:z
|
||||||
Volume=/var/containers/sharkey/worker:/sharkey/.config:z
|
Volume=/var/containers/sharkey/worker:/sharkey/.config:z
|
||||||
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
Volume=/var/containers/sharkey/default.yml:/sharkey/.config/default.yml:ro,z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -9,6 +9,8 @@ PublishPort=127.0.0.1:40653:6555
|
||||||
Volume=/var/containers/spindle/logs:/var/log/spindle:Z
|
Volume=/var/containers/spindle/logs:/var/log/spindle:Z
|
||||||
Volume=/var/containers/spindle/data:/app:Z
|
Volume=/var/containers/spindle/data:/app:Z
|
||||||
Volume=/var/run/dind/docker.sock:/var/run/docker.sock:z
|
Volume=/var/run/dind/docker.sock:/var/run/docker.sock:z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -8,6 +8,9 @@ AutoUpdate=registry
|
||||||
Network=host
|
Network=host
|
||||||
Volume=/var/containers/tor/config:/etc/tor:ro,Z
|
Volume=/var/containers/tor/config:/etc/tor:ro,Z
|
||||||
Volume=/var/containers/tor/data:/var/lib/tor:Z
|
Volume=/var/containers/tor/data:/var/lib/tor:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
DropCapability=ALL
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -7,6 +7,8 @@ ContainerName=vaultwarden
|
||||||
EnvironmentFile=/etc/containers/systemd/vaultwarden/.env
|
EnvironmentFile=/etc/containers/systemd/vaultwarden/.env
|
||||||
PublishPort=127.0.0.1:60838:80
|
PublishPort=127.0.0.1:60838:80
|
||||||
Volume=/var/containers/vaultwarden/data:/data:Z
|
Volume=/var/containers/vaultwarden/data:/data:Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -5,6 +5,8 @@ Description=zenfyr's XPost
|
||||||
Image=ghcr.io/zenfyrdev/xpost:latest
|
Image=ghcr.io/zenfyrdev/xpost:latest
|
||||||
EnvironmentFile=/etc/containers/systemd/xpost/zenfyr.env
|
EnvironmentFile=/etc/containers/systemd/xpost/zenfyr.env
|
||||||
Volume=/var/containers/zenfyr-xpost/data:/app/data:Z,U
|
Volume=/var/containers/zenfyr-xpost/data:/app/data:Z,U
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -8,6 +8,9 @@ AutoUpdate=registry
|
||||||
Exec=-useconffile /etc/yggdrasil/yggdrasil.conf -remote-tcp 22:22 -remote-tcp 80:80 -remote-udp 80:80
|
Exec=-useconffile /etc/yggdrasil/yggdrasil.conf -remote-tcp 22:22 -remote-tcp 80:80 -remote-udp 80:80
|
||||||
Network=host
|
Network=host
|
||||||
Volume=/var/containers/yggdrasil/config:/etc/yggdrasil:ro,Z
|
Volume=/var/containers/yggdrasil/config:/etc/yggdrasil:ro,Z
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
DropCapability=ALL
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
|
|
@ -11,6 +11,8 @@ Network=zitadel.network
|
||||||
Network=postgresql.network
|
Network=postgresql.network
|
||||||
PublishPort=127.0.0.1:19241:8080
|
PublishPort=127.0.0.1:19241:8080
|
||||||
Exec=start-from-init --masterkeyFromEnv --tlsMode external
|
Exec=start-from-init --masterkeyFromEnv --tlsMode external
|
||||||
|
# Security
|
||||||
|
NoNewPrivileges=true
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue