This unit is provided by:
Options
-
[Service]
-
ExecStart=/usr/bin/unitd --control 'unix:/run/unit/control.unit.sock' --pid '/run/unit/unit.pid' --log '/var/log/unit/unit.log' --state '/var/spool/unit' --tmp '/tmp' --user unit --group unit
-
ExecStartPost=/usr/bin/unit-post-start
-
ExecStartPre=/usr/bin/unit-pre-start
-
ExecStop=/usr/bin/curl -X DELETE --unix-socket '/run/unit/control.unit.sock' 'http://localhost/config'
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
NoNewPrivileges
Introduced in systemd 239=yes -
PIDFile=/run/unit/unit.pid
-
PrivateDevices
Introduced in systemd 209=yes -
PrivateMounts=yes
-
PrivateTmp=yes
-
PrivateUsers=no
-
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=strict -
ReadWritePaths=/var/spool/unit /var/log/unit
-
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
-
RestrictRealtime
Introduced in systemd 231=yes -
RestrictSUIDSGID
Introduced in systemd 242=yes -
RuntimeDirectory=unit
-
RuntimeDirectoryMode=0750
-
SystemCallArchitectures=native
-
Type=forking
-
-
[Unit]
-
After=network.target
-
Description=Unit App Server
-
Additionnal notes
Nothing here.