This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
AmbientCapabilities=CAP_NET_BIND_SERVICE
-
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
-
DynamicUser=yes
-
ExecStart=/usr/bin/ss-tunnel -c /etc/shadowsocks-libev/%i.json
-
ExecStart=/usr/bin/ss-tunnel -c /etc/shadowsocks/%i.json
-
ExecStart=/usr/bin/ss-tunnel -c /etc/shadowsocks/%i.json -f /var/run/shadowsocks-libev-tunnel@%i.pid -u --fast-open
-
PIDFile=/var/run/shadowsocks-libev-tunnel@%i.pid
-
PrivateDevices
Introduced in systemd 209=yes -
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=full -
Restart=on-failure
-
RestrictRealtime
Introduced in systemd 231=yes -
Type=exec
-
Type=forking
-
Type=simple
-
User=nobody
-
-
[Unit]
-
After=network-online.target
-
After=network.target
-
Description=Daemon to start Shadowsocks-libev-tunnel
-
Description=Shadowsocks-Libev Client Service Tunnel Mode
-
Description=Shadowsocks-Libev Custom Client Service Tunnel Mode for %I
-
Documentation=man:ss-tunnel(1)
-
Wants=network-online.target
-
Additionnal notes
Nothing here.