forked from Git/send_ynh
		
	Fix
This commit is contained in:
		@@ -1,16 +1,10 @@
 | 
			
		||||
location / {
 | 
			
		||||
 | 
			
		||||
  proxy_pass       http://127.0.0.1:__PORT__;
 | 
			
		||||
  proxy_redirect    off;
 | 
			
		||||
  proxy_set_header Host $host; 
 | 
			
		||||
  proxy_set_header X-Real-IP $remote_addr; 
 | 
			
		||||
  proxy_set_header  X-Forwarded-Proto $scheme;
 | 
			
		||||
  proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; 
 | 
			
		||||
  proxy_set_header  X-Forwarded-Host $server_name;
 | 
			
		||||
 | 
			
		||||
  proxy_http_version 1.1;
 | 
			
		||||
  proxy_set_header Connection "upgrade";
 | 
			
		||||
  proxy_set_header Upgrade $http_upgrade;
 | 
			
		||||
  proxy_set_header X-Forwarded-Proto $scheme;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
location /api/ws {
 | 
			
		||||
 
 | 
			
		||||
@@ -6,11 +6,41 @@ After=syslog.target network.target
 | 
			
		||||
Type=simple
 | 
			
		||||
User=__APP__
 | 
			
		||||
Group=__APP__
 | 
			
		||||
WorkingDirectory=__FINALPATH__
 | 
			
		||||
WorkingDirectory=__FINALPATH__/
 | 
			
		||||
Environment="NODE_ENV=production"
 | 
			
		||||
#Environment="__YNH_NODE_LOAD_PATH__"
 | 
			
		||||
ExecStart=__YNH_NODE__ __FINALPATH__/server/bin/prod.js
 | 
			
		||||
Restart=always
 | 
			
		||||
 | 
			
		||||
# Sandboxing options to harden security
 | 
			
		||||
# Depending on specificities of your service/app, you may need to tweak these 
 | 
			
		||||
# .. but this should be a good baseline
 | 
			
		||||
# Details for these options: https://www.freedesktop.org/software/systemd/man/systemd.exec.html
 | 
			
		||||
NoNewPrivileges=yes
 | 
			
		||||
PrivateTmp=yes
 | 
			
		||||
PrivateDevices=yes
 | 
			
		||||
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
 | 
			
		||||
RestrictNamespaces=yes
 | 
			
		||||
RestrictRealtime=yes
 | 
			
		||||
DevicePolicy=closed
 | 
			
		||||
ProtectSystem=full
 | 
			
		||||
ProtectControlGroups=yes
 | 
			
		||||
ProtectKernelModules=yes
 | 
			
		||||
ProtectKernelTunables=yes
 | 
			
		||||
LockPersonality=yes
 | 
			
		||||
SystemCallFilter=~@clock @debug @module @mount @obsolete @reboot @setuid @swap
 | 
			
		||||
 | 
			
		||||
# Denying access to capabilities that should not be relevant for webapps
 | 
			
		||||
# Doc: https://man7.org/linux/man-pages/man7/capabilities.7.html
 | 
			
		||||
CapabilityBoundingSet=~CAP_RAWIO CAP_MKNOD
 | 
			
		||||
CapabilityBoundingSet=~CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_AUDIT_WRITE
 | 
			
		||||
CapabilityBoundingSet=~CAP_SYS_BOOT CAP_SYS_TIME CAP_SYS_MODULE CAP_SYS_PACCT
 | 
			
		||||
CapabilityBoundingSet=~CAP_LEASE CAP_LINUX_IMMUTABLE CAP_IPC_LOCK
 | 
			
		||||
CapabilityBoundingSet=~CAP_BLOCK_SUSPEND CAP_WAKE_ALARM
 | 
			
		||||
CapabilityBoundingSet=~CAP_SYS_TTY_CONFIG
 | 
			
		||||
CapabilityBoundingSet=~CAP_MAC_ADMIN CAP_MAC_OVERRIDE
 | 
			
		||||
CapabilityBoundingSet=~CAP_NET_ADMIN CAP_NET_BROADCAST CAP_NET_RAW
 | 
			
		||||
CapabilityBoundingSet=~CAP_SYS_ADMIN CAP_SYS_PTRACE CAP_SYSLOG 
 | 
			
		||||
 | 
			
		||||
[Install]
 | 
			
		||||
WantedBy=multi-user.target
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user