Skip to content

Commit 6247a1d

Browse files
authored
Comment on PrivateUsers option for gitea.service (go-gitea#20383)
* Comment on PrivateUsers option for gitea.service A user happens to encounter an issue where PrivateUsers sandboxed Gitea.service and it effectively stop systemd from applying capabilities for that gitea.service. I am opening this PR to provide comments on PrivateUsers, effectively a tiny FAQ information for end-user.
1 parent ce8e06f commit 6247a1d

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

contrib/systemd/gitea.service

+7
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,13 @@ Environment=USER=git HOME=/home/git GITEA_WORK_DIR=/var/lib/gitea
7878
#CapabilityBoundingSet=CAP_NET_BIND_SERVICE
7979
#AmbientCapabilities=CAP_NET_BIND_SERVICE
8080
###
81+
# In some cases, when using CapabilityBoundingSet and AmbientCapabilities option, you may want to
82+
# set the following value to false to allow capabilities to be applied on gitea process. The following
83+
# value if set to true sandboxes gitea service and prevent any processes from running with privileges
84+
# in the host user namespace.
85+
###
86+
#PrivateUsers=false
87+
###
8188

8289
[Install]
8390
WantedBy=multi-user.target

0 commit comments

Comments
 (0)