File tree Expand file tree Collapse file tree 2 files changed +4
-2
lines changed
Expand file tree Collapse file tree 2 files changed +4
-2
lines changed Original file line number Diff line number Diff line change @@ -729,6 +729,8 @@ available starting at Vault version 1.4.
729729## ` vault_port `
730730
731731- TCP port number to on which to listen
732+ - Setting ` vault_port ` below 1024 will add the ` CAP_NET_BIND_SERVICE ` capability to the systemd service
733+ - This capability allows an unprivileged user to start a service on a privileged port
732734- Default value: 8200
733735
734736## ` vault_max_lease_ttl `
Original file line number Diff line number Diff line change @@ -21,9 +21,9 @@ PrivateDevices=yes
2121SecureBits=keep-caps
2222Capabilities=CAP_IPC_LOCK+ep
2323{% if systemd_version .stdout is version ('230' , '>=' ) %}
24- AmbientCapabilities=CAP_SYSLOG CAP_IPC_LOCK
24+ AmbientCapabilities=CAP_SYSLOG CAP_IPC_LOCK {{ "CAP_NET_BIND_SERVICE" if vault_port < 1024 }}
2525{% endif %}
26- CapabilityBoundingSet=CAP_SYSLOG CAP_IPC_LOCK
26+ CapabilityBoundingSet=CAP_SYSLOG CAP_IPC_LOCK {{ "CAP_NET_BIND_SERVICE" if vault_port < 1024 }}
2727NoNewPrivileges=yes
2828{% if vault_gcs_copy_sa and vault_gcs_credentials_src_file is defined and vault_gcs_credentials_dst_file |length -%}
2929Environment=GOOGLE_APPLICATION_CREDENTIALS={{ vault_gcs_credentials_dst_file }}
You can’t perform that action at this time.
0 commit comments