This unit is provided by:
Options
-
[Service]
-
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
-
DeviceAllow=
-
Environment="FRESHRSS_DATA_PATH=/var/lib/freshrss"
-
ExecStart=/usr/bin/freshrss-config-start
-
Group=freshrss
-
LockPersonality
Introduced in systemd 235=yes -
NoNewPrivileges
Introduced in systemd 239=yes -
PrivateDevices
Introduced in systemd 209=yes -
PrivateTmp=yes
-
PrivateUsers=yes
-
ProcSubset
Introduced in systemd 247=pid -
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectProc
Introduced in systemd 247=invisible -
ProtectSystem
Introduced in systemd 214=strict -
RemoveIPC
Introduced in systemd 232=yes -
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
StateDirectory=freshrss
-
SystemCallArchitectures=native
-
SystemCallFilter=@system-service ~@resources ~@privileged
-
Type=oneshot
-
UMask=0007
-
User=freshrss
-
WorkingDirectory=FreshRSS-1.20.1
-
-
[Unit]
-
Description=Set up the state directory for FreshRSS before use
-
Additionnal notes
Nothing here.