This unit is provided by:
Options
-
[Service]-
BindReadOnlyPaths=/usr/etc/ssl/certs/ca-bundle.crt:/etc/ssl/certs/ca-certificates.crt /nix/store /etc -
CapabilityBoundingSet= -
DynamicUser=yes -
ExecStart=/usr/bin/navidrome --configfile navidrome.json -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateUsers=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ReadWritePaths= -
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RootDirectory=/run/navidrome -
RuntimeDirectory=navidrome -
StateDirectory=navidrome -
SystemCallArchitectures=native -
SystemCallFilter=@system-service ~@privileged -
UMask=0066 -
WorkingDirectory=/var/lib/navidrome
-
-
[Unit]-
After=network.target -
Description=Navidrome Media Server
-
Additionnal notes
Nothing here.