2021-07-07 12:15:16 +00:00
|
|
|
|
[Unit]
|
|
|
|
|
Description=listmonk mailing list and newsletter manager (%I)
|
|
|
|
|
ConditionPathExists=/etc/listmonk/%i.toml
|
|
|
|
|
Wants=network.target
|
|
|
|
|
# The PostgreSQL database may not be on the same host but if it
|
|
|
|
|
# is listmonk should wait for it to start up.
|
|
|
|
|
After=postgresql.service
|
|
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
|
Type=simple
|
|
|
|
|
EnvironmentFile=-/etc/default/listmonk
|
|
|
|
|
EnvironmentFile=-/etc/default/listmonk-%i
|
|
|
|
|
ExecStartPre=/usr/bin/mkdir -p "${HOME}/uploads"
|
|
|
|
|
ExecStartPre=/usr/bin/listmonk --config /etc/listmonk/%i.toml --upgrade --yes
|
|
|
|
|
ExecStart=/usr/bin/listmonk --config /etc/listmonk/%i.toml $SYSTEMD_LISTMONK_ARGS
|
|
|
|
|
Restart=on-failure
|
|
|
|
|
|
|
|
|
|
# Create dynamic users for listmonk service instances
|
|
|
|
|
# but create a state directory for uploads in /var/lib/private/%i.
|
|
|
|
|
DynamicUser=True
|
|
|
|
|
StateDirectory=listmonk-%i
|
|
|
|
|
Environment=HOME=%S/listmonk-%i
|
|
|
|
|
WorkingDirectory=%S/listmonk-%i
|
|
|
|
|
|
|
|
|
|
# Use systemd’s ability to disable security-sensitive features
|
|
|
|
|
# that listmonk does not explicitly need.
|
|
|
|
|
# NoNewPrivileges should be enabled by DynamicUser=yes but systemd-analyze
|
|
|
|
|
# still recommended to explicitly enable it.
|
|
|
|
|
NoNewPrivileges=True
|
|
|
|
|
# listmonk doesn’t need any capabilities as defined by the linux kernel
|
|
|
|
|
# see: https://man7.org/linux/man-pages/man7/capabilities.7.html
|
|
|
|
|
CapabilityBoundingSet=
|
|
|
|
|
# listmonk only executes native code with no need for any other ABIs.
|
|
|
|
|
SystemCallArchitectures=native
|
|
|
|
|
# Only enable a reasonable set of system calls.
|
|
|
|
|
# see: https://www.freedesktop.org/software/systemd/man/systemd.exec.html#SystemCallFilter=
|
|
|
|
|
SystemCallFilter=@system-service
|
2023-07-12 14:12:54 +00:00
|
|
|
|
SystemCallFilter=~@privileged
|
2021-07-07 12:15:16 +00:00
|
|
|
|
# ProtectSystem=strict, which is implied by DynamicUser=True, already disabled write calls
|
|
|
|
|
# to the entire filesystem hierarchy, leaving only /dev/, /proc/, and /sys/ writable.
|
|
|
|
|
# listmonk doesn’t need access to those so might as well disable them.
|
|
|
|
|
PrivateDevices=True
|
|
|
|
|
ProtectControlGroups=True
|
|
|
|
|
ProtectKernelTunables=True
|
|
|
|
|
# Make /home/, /root/, and /run/user/ inaccessible.
|
|
|
|
|
ProtectHome=True
|
|
|
|
|
# listmonk doesn’t handle any specific device nodes.
|
|
|
|
|
DeviceAllow=False
|
|
|
|
|
# listmonk doesn’t make use of linux namespaces.
|
|
|
|
|
RestrictNamespaces=True
|
|
|
|
|
# listmonk doesn’t need realtime scheduling.
|
|
|
|
|
RestrictRealtime=True
|
|
|
|
|
# Make sure files created by listmonk are only readable by itself and
|
|
|
|
|
# others in the listmonk system group.
|
|
|
|
|
UMask=0027
|
|
|
|
|
# Disable memory mappings that are both writable and executable.
|
|
|
|
|
MemoryDenyWriteExecute=True
|
|
|
|
|
# listmonk doesn’t make use of linux personality switching.
|
|
|
|
|
LockPersonality=True
|
|
|
|
|
# listmonk only needs to support the IPv4 and IPv6 address families.
|
|
|
|
|
RestrictAddressFamilies=AF_INET AF_INET6
|
|
|
|
|
# listmonk doesn’t need to load any linux kernel modules.
|
|
|
|
|
ProtectKernelModules=True
|
|
|
|
|
# Create a sandboxed environment where the system users are mapped to a
|
|
|
|
|
# service-specific linux kernel namespace.
|
|
|
|
|
PrivateUsers=True
|
|
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
|
WantedBy=multi-user.target
|