summaryrefslogtreecommitdiff
path: root/installation
diff options
context:
space:
mode:
authorlain <lain@soykaf.club>2020-11-04 15:05:01 +0100
committerlain <lain@soykaf.club>2020-11-04 15:05:01 +0100
commit329aa19c9f1175f915441c84689860155949bb08 (patch)
tree17a92069fdb2f49d2f82efdabf3bec1e20822508 /installation
parent755f58168bb2b6b979c6f5d36f7eff56d2305911 (diff)
parentbc4d9c4ffc9ccd826220893a97ce695e4bb66f9d (diff)
downloadpleroma-329aa19c9f1175f915441c84689860155949bb08.tar.gz
pleroma-329aa19c9f1175f915441c84689860155949bb08.zip
Merge branch 'develop' of git.pleroma.social:pleroma/pleroma into alexgleason/pleroma-restrict-domain
Diffstat (limited to 'installation')
-rwxr-xr-xinstallation/init.d/pleroma1
-rw-r--r--installation/pleroma.service4
2 files changed, 3 insertions, 2 deletions
diff --git a/installation/init.d/pleroma b/installation/init.d/pleroma
index 384536f7e..e908cda1b 100755
--- a/installation/init.d/pleroma
+++ b/installation/init.d/pleroma
@@ -8,6 +8,7 @@ pidfile="/var/run/pleroma.pid"
directory=/opt/pleroma
healthcheck_delay=60
healthcheck_timer=30
+export $(cat /opt/pleroma/config/pleroma.env)
: ${pleroma_port:-4000}
diff --git a/installation/pleroma.service b/installation/pleroma.service
index 5dcbc1387..63e83ed6e 100644
--- a/installation/pleroma.service
+++ b/installation/pleroma.service
@@ -17,6 +17,8 @@ Environment="MIX_ENV=prod"
Environment="HOME=/var/lib/pleroma"
; Path to the folder containing the Pleroma installation.
WorkingDirectory=/opt/pleroma
+; Path to the environment file. the file contains RELEASE_COOKIE and etc
+EnvironmentFile=/opt/pleroma/config/pleroma.env
; Path to the Mix binary.
ExecStart=/usr/bin/mix phx.server
@@ -29,8 +31,6 @@ ProtectHome=true
ProtectSystem=full
; Sets up a new /dev mount for the process and only adds API pseudo devices like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled by default because it may not work on devices like the Raspberry Pi.
PrivateDevices=false
-; Ensures that the service process and all its children can never gain new privileges through execve().
-NoNewPrivileges=true
; Drops the sysadmin capability from the daemon.
CapabilityBoundingSet=~CAP_SYS_ADMIN