This unit is provided by:
Options
-
[Service]-
AmbientCapabilities=CAP_NET_BIND_SERVICE -
BindPaths=/var/run/postgresql -
BindReadOnlyPaths=/nix/store -/etc/resolv.conf -/etc/nsswitch.conf -/etc/hosts -/etc/localtime -/etc/dex -
CapabilityBoundingSet=CAP_NET_BIND_SERVICE -
DeviceAllow= -
DynamicUser=yes -
ExecStart=/usr/bin/dex serve /run/dex/config.yaml -
ExecStartPre=/usr/bin/install -m 600 config.yaml /run/dex/config.yaml +dex-start-pre -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
NoNewPrivilegesIntroduced in systemd 239=yes -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateMounts=yes -
PrivateTmp=yes -
PrivateUsers=yes -
ProcSubsetIntroduced in systemd 247=pid -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectProcIntroduced in systemd 247=invisible -
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
RuntimeDirectory=dex -
SystemCallArchitectures=native -
SystemCallFilter=@system-service ~@privileged @setuid @keyring -
TemporaryFileSystem=/:ro
-
-
[Unit]-
After=networking.target postgresql.service -
Description=dex identity provider
-
Additionnal notes
Nothing here.