This unit is provided by:
Options
- 
    [Service]- 
        ExecStart=/usr/bin/unitd --control 'unix:/run/unit/control.unit.sock' --pid '/run/unit/unit.pid' --log '/var/log/unit/unit.log' --state '/var/spool/unit' --tmp '/tmp' --user unit --group unit
- 
        ExecStartPost=/usr/bin/unit-post-start
- 
        ExecStartPre=/usr/bin/unit-pre-start
- 
        ExecStop=/usr/bin/curl -X DELETE --unix-socket '/run/unit/control.unit.sock' 'http://localhost/config'
- 
        LockPersonalityIntroduced in systemd 235=yes
- 
        MemoryDenyWriteExecuteIntroduced in systemd 231=yes
- 
        NoNewPrivilegesIntroduced in systemd 239=yes
- 
        PIDFile=/run/unit/unit.pid
- 
        PrivateDevicesIntroduced in systemd 209=yes
- 
        PrivateMounts=yes
- 
        PrivateTmp=yes
- 
        PrivateUsers=no
- 
        ProtectClockIntroduced in systemd 245=yes
- 
        ProtectControlGroupsIntroduced in systemd 232=yes
- 
        ProtectHomeIntroduced in systemd 214=yes
- 
        ProtectHostnameIntroduced in systemd 242=yes
- 
        ProtectKernelLogsIntroduced in systemd 244=yes
- 
        ProtectKernelModulesIntroduced in systemd 232=yes
- 
        ProtectKernelTunablesIntroduced in systemd 232=yes
- 
        ProtectSystemIntroduced in systemd 214=strict
- 
        ReadWritePaths=/var/spool/unit /var/log/unit
- 
        RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
- 
        RestrictRealtimeIntroduced in systemd 231=yes
- 
        RestrictSUIDSGIDIntroduced in systemd 242=yes
- 
        RuntimeDirectory=unit
- 
        RuntimeDirectoryMode=0750
- 
        SystemCallArchitectures=native
- 
        Type=forking
 
- 
        
- 
    [Unit]- 
        After=network.target
- 
        Description=Unit App Server
 
- 
        
Additionnal notes
Nothing here.