nixos/parsoid: enable systemd sandboxing

Changed files
+22 -1
nixos
modules
services
+22 -1
nixos/modules/services/misc/parsoid.nix
···
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
-
User = "nobody";
ExecStart = "${parsoid}/lib/node_modules/parsoid/bin/server.js -c ${confFile} -n ${toString cfg.workers}";
+
+
DynamicUser = true;
+
User = "parsoid";
+
Group = "parsoid";
+
+
CapabilityBoundingSet = "";
+
NoNewPrivileges = true;
+
ProtectSystem = "strict";
+
ProtectHome = true;
+
PrivateTmp = true;
+
PrivateDevices = true;
+
ProtectHostname = true;
+
ProtectKernelTunables = true;
+
ProtectKernelModules = true;
+
ProtectControlGroups = true;
+
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ];
+
RestrictNamespaces = true;
+
LockPersonality = true;
+
#MemoryDenyWriteExecute = true;
+
RestrictRealtime = true;
+
RestrictSUIDSGID = true;
+
RemoveIPC = true;
};
};