This unit is provided by:
Options
-
[Service]-
CapabilityBoundingSet=CAP_NET_BIND_SERVICE -
DeviceAllow= -
Environment="FRESHRSS_DATA_PATH=/var/lib/freshrss" -
ExecStart=/usr/bin/freshrss-config-start -
Group=freshrss -
LockPersonalityIntroduced in systemd 235=yes -
NoNewPrivilegesIntroduced in systemd 239=yes -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateTmp=yes -
PrivateUsers=yes -
ProcSubsetIntroduced in systemd 247=pid -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectProcIntroduced in systemd 247=invisible -
ProtectSystemIntroduced in systemd 214=strict -
RemoveIPCIntroduced in systemd 232=yes -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
StateDirectory=freshrss -
SystemCallArchitectures=native -
SystemCallFilter=@system-service ~@resources ~@privileged -
Type=oneshot -
UMask=0007 -
User=freshrss -
WorkingDirectory=FreshRSS-1.20.1
-
-
[Unit]-
Description=Set up the state directory for FreshRSS before use
-
Additionnal notes
Nothing here.