2016-06-03 15:58:04 +02:00
|
|
|
[Unit]
|
|
|
|
Description=PeerTube daemon
|
2018-07-26 21:01:34 +02:00
|
|
|
After=network.target postgresql.service redis-server.service
|
2016-06-03 15:58:04 +02:00
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=simple
|
|
|
|
Environment=NODE_ENV=production
|
2018-01-23 09:00:23 +01:00
|
|
|
Environment=NODE_CONFIG_DIR=/var/www/peertube/config
|
2018-01-15 17:56:58 +01:00
|
|
|
User=peertube
|
|
|
|
Group=peertube
|
2017-06-20 20:34:41 +02:00
|
|
|
ExecStart=/usr/bin/npm start
|
2018-01-23 09:00:23 +01:00
|
|
|
WorkingDirectory=/var/www/peertube/peertube-latest
|
2016-06-03 15:58:04 +02:00
|
|
|
StandardOutput=syslog
|
|
|
|
StandardError=syslog
|
|
|
|
SyslogIdentifier=peertube
|
|
|
|
Restart=always
|
|
|
|
|
2018-12-05 19:39:48 +01:00
|
|
|
; Some security directives.
|
|
|
|
; Mount /usr, /boot, and /etc as read-only for processes invoked by this service.
|
|
|
|
ProtectSystem=full
|
|
|
|
; Sets up a new /dev mount for the process and only adds API pseudo devices
|
|
|
|
; like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled
|
|
|
|
; by default because it may not work on devices like the Raspberry Pi.
|
|
|
|
PrivateDevices=false
|
|
|
|
; Ensures that the service process and all its children can never gain new
|
|
|
|
; privileges through execve().
|
|
|
|
NoNewPrivileges=true
|
2018-12-15 17:04:23 +01:00
|
|
|
; This makes /home, /root, and /run/user inaccessible and empty for processes invoked
|
|
|
|
; by this unit. Make sure that you do not depend on data inside these folders.
|
|
|
|
ProtectHome=true
|
|
|
|
; Drops the sys admin capability from the daemon.
|
|
|
|
CapabilityBoundingSet=~CAP_SYS_ADMIN
|
2018-12-05 19:39:48 +01:00
|
|
|
|
2016-06-03 15:58:04 +02:00
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|