52 lines
1.3 KiB
Desktop File
52 lines
1.3 KiB
Desktop File
[Unit]
|
|
Description=Gitea (Git with a cup of tea)
|
|
After=syslog.target
|
|
After=network.target
|
|
After=mysqld.service
|
|
After=postgresql.service
|
|
After=memcached.service
|
|
After=redis.service
|
|
|
|
[Service]
|
|
User=gitea
|
|
Group=gitea
|
|
Type=simple
|
|
WorkingDirectory=~
|
|
RuntimeDirectory=gitea
|
|
LogsDirectory=gitea
|
|
StateDirectory=gitea
|
|
Environment=USER=gitea HOME=/var/lib/gitea GITEA_WORK_DIR=/var/lib/gitea GITEA_CUSTOM=/var/lib/gitea/custom/
|
|
ExecStart=/usr/bin/gitea web -c /var/lib/gitea/custom/conf/app.ini --custom-path=/var/lib/gitea/custom/
|
|
Restart=always
|
|
RestartSec=2s
|
|
ReadWritePaths=/var/lib/gitea/custom/conf/app.ini
|
|
AmbientCapabilities=
|
|
CapabilityBoundingSet=
|
|
LockPersonality=true
|
|
#Required by commit search
|
|
#MemoryDenyWriteExecute=true
|
|
NoNewPrivileges=True
|
|
#SecureBits=noroot-locked
|
|
PrivateDevices=true
|
|
PrivateTmp=true
|
|
PrivateUsers=true
|
|
ProtectClock=true
|
|
ProtectControlGroups=true
|
|
ProtectHome=true
|
|
ProtectHostname=true
|
|
ProtectKernelLogs=true
|
|
ProtectKernelModules=true
|
|
ProtectKernelTunables=true
|
|
ProtectProc=invisible
|
|
ProtectSystem=strict
|
|
RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
|
|
RestrictNamespaces=true
|
|
RestrictRealtime=true
|
|
RestrictSUIDSGID=true
|
|
SystemCallArchitectures=native
|
|
SystemCallFilter=@system-service
|
|
SystemCallErrorNumber=EPERM
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|