This unit is provided by:
Options
-
[Service]-
ExecStart=/usr/bin/unitd --control 'unix:/run/unit/control.unit.sock' --pid '/run/unit/unit.pid' --log '/var/log/unit/unit.log' --state '/var/spool/unit' --tmp '/tmp' --user unit --group unit -
ExecStartPost=/usr/bin/unit-post-start -
ExecStartPre=/usr/bin/unit-pre-start -
ExecStop=/usr/bin/curl -X DELETE --unix-socket '/run/unit/control.unit.sock' 'http://localhost/config' -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
NoNewPrivilegesIntroduced in systemd 239=yes -
PIDFile=/run/unit/unit.pid -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateMounts=yes -
PrivateTmp=yes -
PrivateUsers=no -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectSystemIntroduced in systemd 214=strict -
ReadWritePaths=/var/spool/unit /var/log/unit -
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
RuntimeDirectory=unit -
RuntimeDirectoryMode=0750 -
SystemCallArchitectures=native -
Type=forking
-
-
[Unit]-
After=network.target -
Description=Unit App Server
-
Additionnal notes
Nothing here.