1
0
Fork 0
peertube/support/systemd/peertube.service

39 lines
1.3 KiB
SYSTEMD
Raw Normal View History

2016-06-03 09:58:04 -04:00
[Unit]
Description=PeerTube daemon
After=network.target postgresql.service redis-server.service
2016-06-03 09:58:04 -04:00
[Service]
Type=simple
Environment=NODE_ENV=production
Environment=NODE_CONFIG_DIR=/var/www/peertube/config
User=peertube
Group=peertube
2017-06-20 14:34:41 -04:00
ExecStart=/usr/bin/npm start
WorkingDirectory=/var/www/peertube/peertube-latest
2016-06-03 09:58:04 -04:00
StandardOutput=syslog
StandardError=syslog
SyslogIdentifier=peertube
Restart=always
2018-12-05 13:39:48 -05:00
; Some security directives.
; Use private /tmp and /var/tmp folders inside a new file system namespace,
; which are discarded after the process stops.
PrivateTmp=true
; Mount /usr, /boot, and /etc as read-only for processes invoked by this service.
ProtectSystem=full
; Sets up a new /dev mount for the process and only adds API pseudo devices
; like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled
; by default because it may not work on devices like the Raspberry Pi.
PrivateDevices=false
; Ensures that the service process and all its children can never gain new
; privileges through execve().
NoNewPrivileges=true
2018-12-15 11:04:23 -05:00
; This makes /home, /root, and /run/user inaccessible and empty for processes invoked
; by this unit. Make sure that you do not depend on data inside these folders.
ProtectHome=true
; Drops the sys admin capability from the daemon.
CapabilityBoundingSet=~CAP_SYS_ADMIN
2018-12-05 13:39:48 -05:00
2016-06-03 09:58:04 -04:00
[Install]
WantedBy=multi-user.target