52 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			SYSTEMD
		
	
	
	
	
	
		
		
			
		
	
	
			52 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			SYSTEMD
		
	
	
	
	
	
| 
								 | 
							
								[Unit]
							 | 
						||
| 
								 | 
							
								Description=Gitea (Git with a cup of tea)
							 | 
						||
| 
								 | 
							
								After=syslog.target
							 | 
						||
| 
								 | 
							
								After=network.target
							 | 
						||
| 
								 | 
							
								After=mysqld.service
							 | 
						||
| 
								 | 
							
								After=postgresql.service
							 | 
						||
| 
								 | 
							
								After=memcached.service
							 | 
						||
| 
								 | 
							
								After=redis.service
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								[Service]
							 | 
						||
| 
								 | 
							
								User=gitea
							 | 
						||
| 
								 | 
							
								Group=gitea
							 | 
						||
| 
								 | 
							
								Type=simple
							 | 
						||
| 
								 | 
							
								WorkingDirectory=~
							 | 
						||
| 
								 | 
							
								RuntimeDirectory=gitea
							 | 
						||
| 
								 | 
							
								LogsDirectory=gitea
							 | 
						||
| 
								 | 
							
								StateDirectory=gitea
							 | 
						||
| 
								 | 
							
								Environment=USER=gitea HOME=/var/lib/gitea GITEA_WORK_DIR=/var/lib/gitea GITEA_CUSTOM=/var/lib/gitea/custom/
							 | 
						||
| 
								 | 
							
								ExecStart=/usr/bin/gitea web -c /var/lib/gitea/custom/conf/app.ini --custom-path=/var/lib/gitea/custom/
							 | 
						||
| 
								 | 
							
								Restart=always
							 | 
						||
| 
								 | 
							
								RestartSec=2s
							 | 
						||
| 
								 | 
							
								ReadWritePaths=/var/lib/gitea/custom/conf/app.ini
							 | 
						||
| 
								 | 
							
								AmbientCapabilities=
							 | 
						||
| 
								 | 
							
								CapabilityBoundingSet=
							 | 
						||
| 
								 | 
							
								LockPersonality=true
							 | 
						||
| 
								 | 
							
								#Required by commit search
							 | 
						||
| 
								 | 
							
								#MemoryDenyWriteExecute=true
							 | 
						||
| 
								 | 
							
								NoNewPrivileges=True
							 | 
						||
| 
								 | 
							
								#SecureBits=noroot-locked
							 | 
						||
| 
								 | 
							
								PrivateDevices=true
							 | 
						||
| 
								 | 
							
								PrivateTmp=true
							 | 
						||
| 
								 | 
							
								PrivateUsers=true
							 | 
						||
| 
								 | 
							
								ProtectClock=true
							 | 
						||
| 
								 | 
							
								ProtectControlGroups=true
							 | 
						||
| 
								 | 
							
								ProtectHome=true
							 | 
						||
| 
								 | 
							
								ProtectHostname=true
							 | 
						||
| 
								 | 
							
								ProtectKernelLogs=true
							 | 
						||
| 
								 | 
							
								ProtectKernelModules=true
							 | 
						||
| 
								 | 
							
								ProtectKernelTunables=true
							 | 
						||
| 
								 | 
							
								ProtectProc=invisible
							 | 
						||
| 
								 | 
							
								ProtectSystem=strict
							 | 
						||
| 
								 | 
							
								RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
							 | 
						||
| 
								 | 
							
								RestrictNamespaces=true
							 | 
						||
| 
								 | 
							
								RestrictRealtime=true
							 | 
						||
| 
								 | 
							
								RestrictSUIDSGID=true
							 | 
						||
| 
								 | 
							
								SystemCallArchitectures=native
							 | 
						||
| 
								 | 
							
								SystemCallFilter=@system-service
							 | 
						||
| 
								 | 
							
								SystemCallErrorNumber=EPERM
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								[Install]
							 | 
						||
| 
								 | 
							
								WantedBy=multi-user.target
							 |