@@ -10,64 +10,22 @@ Type=simple
10
10
User =invidious
11
11
Group =invidious
12
12
13
- # allow only the strict necessary since this service handles YouTube content
14
- CapabilityBoundingSet =~CAP_SETUID CAP_SETGID CAP_SETPCAP
15
- CapabilityBoundingSet =~CAP_SYS_ADMIN
16
- CapabilityBoundingSet =~CAP_SYS_PTRACE
17
- CapabilityBoundingSet =~CAP_CHOWN CAP_FSETID CAP_SETFCAP
18
- CapabilityBoundingSet =~CAP_DAC_OVERRIDE CAP_DAC_READ_SEARCH CAP_FOWNER CAP_IPC_OWNER
19
- CapabilityBoundingSet =~CAP_NET_ADMIN
20
- CapabilityBoundingSet =~CAP_SYS_MODULE
21
- CapabilityBoundingSet =~CAP_SYS_RAWIO
22
- CapabilityBoundingSet =~CAP_SYS_TIME
23
- CapabilityBoundingSet =~CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_AUDIT_WRITE
24
- CapabilityBoundingSet =~CAP_KILL
25
- CapabilityBoundingSet =~CAP_NET_BIND_SERVICE CAP_NET_BROADCAST CAP_NET_RAW
26
- CapabilityBoundingSet =~CAP_SYSLOG
27
- CapabilityBoundingSet =~CAP_SYS_NICE CAP_SYS_RESOURCE
28
- CapabilityBoundingSet =~CAP_MAC_ADMIN CAP_MAC_OVERRIDE
29
- CapabilityBoundingSet =~CAP_SYS_BOOT
30
- CapabilityBoundingSet =~CAP_LINUX_IMMUTABLE
31
- CapabilityBoundingSet =~CAP_IPC_LOCK
32
- CapabilityBoundingSet =~CAP_SYS_CHROOT
33
- CapabilityBoundingSet =~CAP_BLOCK_SUSPEND
34
- CapabilityBoundingSet =~CAP_LEASE
35
- CapabilityBoundingSet =~CAP_SYS_PACCT
36
- CapabilityBoundingSet =~CAP_SYS_TTY_CONFIG
37
- CapabilityBoundingSet =~CAP_WAKE_ALARM
38
- LockPersonality =true
39
- MemoryDenyWriteExecute =true
13
+ # Security hardening - balanced approach for Deno applications
40
14
NoNewPrivileges =true
41
15
PrivateDevices =true
42
16
PrivateTmp =true
43
- PrivateUsers =true
44
- ProcSubset =pid
45
17
ProtectControlGroups =true
46
- ProtectHome =tmpfs
47
18
ProtectHostname =true
48
19
ProtectKernelLogs =true
49
20
ProtectKernelModules =true
50
21
ProtectKernelTunables =true
51
- ProtectProc =invisible
52
22
ProtectSystem =strict
53
- RemoveIPC =true
54
23
RestrictAddressFamilies =AF_INET AF_INET6 AF_UNIX
55
24
RestrictNamespaces =true
56
25
RestrictSUIDSGID =true
57
26
RestrictRealtime =true
58
- SystemCallArchitectures =native
59
- SystemCallFilter =~@clock
60
- SystemCallFilter =~@debug
61
- SystemCallFilter =~@module
62
- SystemCallFilter =~@mount
63
- SystemCallFilter =~@raw-io
64
- SystemCallFilter =~@reboot
65
- SystemCallFilter =~@swap
66
- SystemCallFilter =~@privileged
67
- SystemCallFilter =~@resources
68
- SystemCallFilter =~@cpu-emulation
69
- SystemCallFilter =~@obsolete
70
27
28
+ # Filesystem access
71
29
BindReadOnlyPaths =/home/invidious/invidious-companion
72
30
BindPaths =/home/invidious/tmp
73
31
BindPaths =/var/tmp/youtubei.js
@@ -77,6 +35,7 @@ ExecStart=/home/invidious/invidious-companion/invidious_companion
77
35
78
36
Environment =SERVER_USE_UNIX_SOCKET =true
79
37
Environment =SERVER_UNIX_SOCKET_PATH =/home/invidious/tmp/invidious-companion.sock
38
+ Environment =SERVER_SECRET_KEY =testkey123456789
80
39
Environment =CACHE_DIRECTORY =/var/tmp/youtubei.js
81
40
82
41
Restart =always
0 commit comments