mirror of
https://github.com/spantaleev/matrix-docker-ansible-deploy.git
synced 2024-11-11 05:07:35 +01:00
316d653d3e
We run containers as a non-root user (no effective capabilities). Still, if a setuid binary is available in a container image, it could potentially be used to give the user the default capabilities that the container was started with. For Docker, the default set currently is: - "CAP_CHOWN" - "CAP_DAC_OVERRIDE" - "CAP_FSETID" - "CAP_FOWNER" - "CAP_MKNOD" - "CAP_NET_RAW" - "CAP_SETGID" - "CAP_SETUID" - "CAP_SETFCAP" - "CAP_SETPCAP" - "CAP_NET_BIND_SERVICE" - "CAP_SYS_CHROOT" - "CAP_KILL" - "CAP_AUDIT_WRITE" We'd rather prevent such a potential escalation by dropping ALL capabilities. The problem is nicely explained here: https://github.com/projectatomic/atomic-site/issues/203
33 lines
960 B
Django/Jinja
33 lines
960 B
Django/Jinja
[Unit]
|
|
Description=Matrix mxisd Identity server
|
|
{% for service in matrix_mxisd_systemd_required_services_list %}
|
|
Requires={{ service }}
|
|
After={{ service }}
|
|
{% endfor %}
|
|
{% for service in matrix_mxisd_systemd_wanted_services_list %}
|
|
Wants={{ service }}
|
|
{% endfor %}
|
|
|
|
[Service]
|
|
Type=simple
|
|
ExecStartPre=-/usr/bin/docker kill matrix-mxisd
|
|
ExecStartPre=-/usr/bin/docker rm matrix-mxisd
|
|
ExecStart=/usr/bin/docker run --rm --name matrix-mxisd \
|
|
--log-driver=none \
|
|
--user={{ matrix_user_uid }}:{{ matrix_user_gid }} \
|
|
--cap-drop=ALL \
|
|
--network={{ matrix_docker_network }} \
|
|
{% if matrix_mxisd_container_expose_port %}
|
|
-p 127.0.0.1:8090:8090 \
|
|
{% endif %}
|
|
-v {{ matrix_mxisd_config_path }}:/etc/mxisd:ro \
|
|
-v {{ matrix_mxisd_data_path }}:/var/mxisd \
|
|
{{ matrix_mxisd_docker_image }}
|
|
ExecStop=-/usr/bin/docker kill matrix-mxisd
|
|
ExecStop=-/usr/bin/docker rm matrix-mxisd
|
|
Restart=always
|
|
RestartSec=30
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|