mirror of
				https://github.com/YunoHost-Apps/send_ynh.git
				synced 2025-11-04 07:45:30 +01:00 
			
		
		
		
	Fix
This commit is contained in:
		@@ -1,16 +1,10 @@
 | 
				
			|||||||
location / {
 | 
					location / {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  proxy_pass        http://127.0.0.1:__PORT__;
 | 
					  proxy_pass       http://127.0.0.1:__PORT__;
 | 
				
			||||||
  proxy_redirect    off;
 | 
					  proxy_set_header Host $host; 
 | 
				
			||||||
  proxy_set_header  Host $host;
 | 
					  proxy_set_header X-Real-IP $remote_addr; 
 | 
				
			||||||
  proxy_set_header  X-Real-IP $remote_addr;
 | 
					  proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; 
 | 
				
			||||||
  proxy_set_header  X-Forwarded-Proto $scheme;
 | 
					  proxy_set_header X-Forwarded-Proto $scheme;
 | 
				
			||||||
  proxy_set_header  X-Forwarded-For $proxy_add_x_forwarded_for;
 | 
					 | 
				
			||||||
  proxy_set_header  X-Forwarded-Host $server_name;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  proxy_http_version 1.1;
 | 
					 | 
				
			||||||
  proxy_set_header Connection "upgrade";
 | 
					 | 
				
			||||||
  proxy_set_header Upgrade $http_upgrade;
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
location /api/ws {
 | 
					location /api/ws {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -6,11 +6,41 @@ After=syslog.target network.target
 | 
				
			|||||||
Type=simple
 | 
					Type=simple
 | 
				
			||||||
User=__APP__
 | 
					User=__APP__
 | 
				
			||||||
Group=__APP__
 | 
					Group=__APP__
 | 
				
			||||||
WorkingDirectory=__FINALPATH__
 | 
					WorkingDirectory=__FINALPATH__/
 | 
				
			||||||
Environment="NODE_ENV=production"
 | 
					Environment="NODE_ENV=production"
 | 
				
			||||||
#Environment="__YNH_NODE_LOAD_PATH__"
 | 
					#Environment="__YNH_NODE_LOAD_PATH__"
 | 
				
			||||||
ExecStart=__YNH_NODE__ __FINALPATH__/server/bin/prod.js
 | 
					ExecStart=__YNH_NODE__ __FINALPATH__/server/bin/prod.js
 | 
				
			||||||
Restart=always
 | 
					Restart=always
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Sandboxing options to harden security
 | 
				
			||||||
 | 
					# Depending on specificities of your service/app, you may need to tweak these 
 | 
				
			||||||
 | 
					# .. but this should be a good baseline
 | 
				
			||||||
 | 
					# Details for these options: https://www.freedesktop.org/software/systemd/man/systemd.exec.html
 | 
				
			||||||
 | 
					NoNewPrivileges=yes
 | 
				
			||||||
 | 
					PrivateTmp=yes
 | 
				
			||||||
 | 
					PrivateDevices=yes
 | 
				
			||||||
 | 
					RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
 | 
				
			||||||
 | 
					RestrictNamespaces=yes
 | 
				
			||||||
 | 
					RestrictRealtime=yes
 | 
				
			||||||
 | 
					DevicePolicy=closed
 | 
				
			||||||
 | 
					ProtectSystem=full
 | 
				
			||||||
 | 
					ProtectControlGroups=yes
 | 
				
			||||||
 | 
					ProtectKernelModules=yes
 | 
				
			||||||
 | 
					ProtectKernelTunables=yes
 | 
				
			||||||
 | 
					LockPersonality=yes
 | 
				
			||||||
 | 
					SystemCallFilter=~@clock @debug @module @mount @obsolete @reboot @setuid @swap
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Denying access to capabilities that should not be relevant for webapps
 | 
				
			||||||
 | 
					# Doc: https://man7.org/linux/man-pages/man7/capabilities.7.html
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_RAWIO CAP_MKNOD
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_AUDIT_WRITE
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_SYS_BOOT CAP_SYS_TIME CAP_SYS_MODULE CAP_SYS_PACCT
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_LEASE CAP_LINUX_IMMUTABLE CAP_IPC_LOCK
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_BLOCK_SUSPEND CAP_WAKE_ALARM
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_SYS_TTY_CONFIG
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_MAC_ADMIN CAP_MAC_OVERRIDE
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_NET_ADMIN CAP_NET_BROADCAST CAP_NET_RAW
 | 
				
			||||||
 | 
					CapabilityBoundingSet=~CAP_SYS_ADMIN CAP_SYS_PTRACE CAP_SYSLOG 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[Install]
 | 
					[Install]
 | 
				
			||||||
WantedBy=multi-user.target
 | 
					WantedBy=multi-user.target
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user