This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
AmbientCapabilities=
-
CapabilityBoundingSet=
-
ExecStart=/usr/bin/houndd
-
ExecStart=/usr/bin/houndd -addr 0.0.0.0:6080 -conf hound.json
-
ExecStartPre=/usr/bin/git config --global --replace-all http.sslCAinfo /etc/ssl/certs/ca-certificates.crt
-
Group=hound
-
LimitNOFILE=1048576
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
NoNewPrivileges
Introduced in systemd 239=yes -
PrivateDevices
Introduced in systemd 209=yes -
PrivateTmp=yes
-
PrivateUsers=yes
-
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=full -
ReadWritePaths=/var/lib/hound
-
RemoveIPC
Introduced in systemd 232=yes -
Restart=always
-
RestartSec=30
-
RestrictAddressFamilies=AF_INET AF_INET6
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
SystemCallArchitectures=native
-
SystemCallFilter=@system-service ~@privileged @resources
-
UMask=0077
-
User=hound
-
WorkingDirectory=/var/lib/hound
-
-
[Unit]
-
After=network-online.target
-
After=network.target
-
Description=Hound Code Search
-
Description=Hound Code Search and Indexing Daemon
-
Documentation=https://github.com/hound-search/hound
-
Requires=network-online.target
-
Additionnal notes
Nothing here.