Skip to content

Commit bd9ddd7

Browse files
authored
Comment on PrivateUsers option for gitea.service
A user happens to encounter an issue where PrivateUsers sandboxed Gitea.service and it effectively stop systemd from applying capabilities for that gitea.service. I am opening this PR to provide comments on PrivateUsers, effectively a tiny FAQ information for end-user.
1 parent 4f267ef commit bd9ddd7

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

contrib/systemd/gitea.service

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,12 @@ Environment=USER=git HOME=/home/git GITEA_WORK_DIR=/var/lib/gitea
7878
#CapabilityBoundingSet=CAP_NET_BIND_SERVICE
7979
#AmbientCapabilities=CAP_NET_BIND_SERVICE
8080
###
81+
# In some cases, when using CapabilityBoundingSet and AmbientCapabilities option, you may want to
82+
# set the following value to false to allow capabilities to be applied on gitea process. The following
83+
# value sandboxes gitea service and prevent any processes from running with privileges in the host user namespace.
84+
###
85+
#PrivateUsers=false
86+
###
8187

8288
[Install]
8389
WantedBy=multi-user.target

0 commit comments

Comments
 (0)