nix(coredns): force user, force restart always...
... and set MemoryDenyWriteExecute = true.
This commit is contained in:
parent
ca699f1dbe
commit
588b0b5a5c
@ -229,18 +229,19 @@ in {
|
|||||||
WorkingDirectory = "/";
|
WorkingDirectory = "/";
|
||||||
# StartLimitIntervalSec = 5;
|
# StartLimitIntervalSec = 5;
|
||||||
StartLimitBurst = 10;
|
StartLimitBurst = 10;
|
||||||
Restart = lib.mkDefault "always";
|
Restart = lib.mkForce "always";
|
||||||
RestartSec = 10;
|
RestartSec = 10;
|
||||||
# PermissionsStartOnly = true;
|
# PermissionsStartOnly = true;
|
||||||
ProtectSystem = "strict";
|
ProtectSystem = "strict";
|
||||||
LimitNOFILE = 1048576;
|
LimitNOFILE = 1048576;
|
||||||
LimitNPROC = 512;
|
LimitNPROC = 512;
|
||||||
User = usr;
|
User = usr;
|
||||||
|
DynamicUser = lib.mkForce "no";
|
||||||
EnvironmentFile = config.sops.templates.corednsEnv.path;
|
EnvironmentFile = config.sops.templates.corednsEnv.path;
|
||||||
# LoadCredential = lib.mapAttrsToList (name: path: "${name}:${path}") cfg.credentials;
|
# LoadCredential = lib.mapAttrsToList (name: path: "${name}:${path}") cfg.credentials;
|
||||||
DeviceAllow = "";
|
DeviceAllow = "";
|
||||||
LockPersonality = true;
|
LockPersonality = true;
|
||||||
MemoryDenyWriteExecute = false;
|
MemoryDenyWriteExecute = true;
|
||||||
NoNewPrivileges = true;
|
NoNewPrivileges = true;
|
||||||
PrivateDevices = true;
|
PrivateDevices = true;
|
||||||
PrivateTmp = true;
|
PrivateTmp = true;
|
||||||
|
Loading…
Reference in New Issue
Block a user