52 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Desktop File
		
	
	
	
	
	
			
		
		
	
	
			52 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Desktop File
		
	
	
	
	
	
[Unit]
 | 
						|
Description=Gitea (Git with a cup of tea)
 | 
						|
After=syslog.target
 | 
						|
After=network.target
 | 
						|
After=mysqld.service
 | 
						|
After=postgresql.service
 | 
						|
After=memcached.service
 | 
						|
After=redis.service
 | 
						|
 | 
						|
[Service]
 | 
						|
User=gitea
 | 
						|
Group=gitea
 | 
						|
Type=simple
 | 
						|
WorkingDirectory=~
 | 
						|
RuntimeDirectory=gitea
 | 
						|
LogsDirectory=gitea
 | 
						|
StateDirectory=gitea
 | 
						|
Environment=USER=gitea HOME=/var/lib/gitea GITEA_WORK_DIR=/var/lib/gitea GITEA_CUSTOM=/var/lib/gitea/custom/
 | 
						|
ExecStart=/usr/bin/gitea web -c /var/lib/gitea/custom/conf/app.ini --custom-path=/var/lib/gitea/custom/
 | 
						|
Restart=always
 | 
						|
RestartSec=2s
 | 
						|
ReadWritePaths=/var/lib/gitea/custom/conf/app.ini
 | 
						|
AmbientCapabilities=
 | 
						|
CapabilityBoundingSet=
 | 
						|
LockPersonality=true
 | 
						|
#Required by commit search
 | 
						|
#MemoryDenyWriteExecute=true
 | 
						|
NoNewPrivileges=True
 | 
						|
#SecureBits=noroot-locked
 | 
						|
PrivateDevices=true
 | 
						|
PrivateTmp=true
 | 
						|
PrivateUsers=true
 | 
						|
ProtectClock=true
 | 
						|
ProtectControlGroups=true
 | 
						|
ProtectHome=true
 | 
						|
ProtectHostname=true
 | 
						|
ProtectKernelLogs=true
 | 
						|
ProtectKernelModules=true
 | 
						|
ProtectKernelTunables=true
 | 
						|
ProtectProc=invisible
 | 
						|
ProtectSystem=strict
 | 
						|
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
 | 
						|
RestrictNamespaces=true
 | 
						|
RestrictRealtime=true
 | 
						|
RestrictSUIDSGID=true
 | 
						|
SystemCallArchitectures=native
 | 
						|
SystemCallFilter=@system-service
 | 
						|
SystemCallErrorNumber=EPERM
 | 
						|
 | 
						|
[Install]
 | 
						|
WantedBy=multi-user.target
 |