mirror of
https://github.com/go-gitea/gitea.git
synced 2026-03-13 02:57:44 -05:00
Configure with env variables #110
Closed
opened 2025-11-02 03:09:13 -06:00 by GiteaMirror
·
61 comments
No Branch/Tag Specified
main
release/v1.25
release/v1.24
release/v1.23
release/v1.22
release/v1.21
release/v1.20
release/v1.19
release/v1.18
release/v1.17
release/v1.16
release/v1.15
release/v1.14
release/v1.13
release/v1.12
release/v1.11
release/v1.10
release/v1.9
release/v1.8
v1.25.3
v1.25.2
v1.25.1
v1.25.0
v1.24.7
v1.25.0-rc0
v1.26.0-dev
v1.24.6
v1.24.5
v1.24.4
v1.24.3
v1.24.2
v1.24.1
v1.24.0
v1.23.8
v1.24.0-rc0
v1.25.0-dev
v1.23.7
v1.23.6
v1.23.5
v1.23.4
v1.23.3
v1.23.2
v1.23.1
v1.23.0
v1.23.0-rc0
v1.24.0-dev
v1.22.6
v1.22.5
v1.22.4
v1.22.3
v1.22.2
v1.22.1
v1.22.0
v1.23.0-dev
v1.22.0-rc1
v1.21.11
v1.22.0-rc0
v1.21.10
v1.21.9
v1.21.8
v1.21.7
v1.21.6
v1.21.5
v1.21.4
v1.21.3
v1.21.2
v1.20.6
v1.21.1
v1.21.0
v1.21.0-rc2
v1.21.0-rc1
v1.20.5
v1.22.0-dev
v1.21.0-rc0
v1.20.4
v1.20.3
v1.20.2
v1.20.1
v1.20.0
v1.19.4
v1.21.0-dev
v1.20.0-rc2
v1.20.0-rc1
v1.20.0-rc0
v1.19.3
v1.19.2
v1.19.1
v1.19.0
v1.19.0-rc1
v1.20.0-dev
v1.19.0-rc0
v1.18.5
v1.18.4
v1.18.3
v1.18.2
v1.18.1
v1.18.0
v1.17.4
v1.18.0-rc1
v1.19.0-dev
v1.18.0-rc0
v1.17.3
v1.17.2
v1.17.1
v1.17.0
v1.17.0-rc2
v1.16.9
v1.17.0-rc1
v1.18.0-dev
v1.16.8
v1.16.7
v1.16.6
v1.16.5
v1.16.4
v1.16.3
v1.16.2
v1.16.1
v1.16.0
v1.15.11
v1.17.0-dev
v1.16.0-rc1
v1.15.10
v1.15.9
v1.15.8
v1.15.7
v1.15.6
v1.15.5
v1.15.4
v1.15.3
v1.15.2
v1.15.1
v1.14.7
v1.15.0
v1.15.0-rc3
v1.14.6
v1.15.0-rc2
v1.14.5
v1.16.0-dev
v1.15.0-rc1
v1.14.4
v1.14.3
v1.14.2
v1.14.1
v1.14.0
v1.13.7
v1.14.0-rc2
v1.13.6
v1.13.5
v1.14.0-rc1
v1.15.0-dev
v1.13.4
v1.13.3
v1.13.2
v1.13.1
v1.13.0
v1.12.6
v1.13.0-rc2
v1.14.0-dev
v1.13.0-rc1
v1.12.5
v1.12.4
v1.12.3
v1.12.2
v1.12.1
v1.11.8
v1.12.0
v1.11.7
v1.12.0-rc2
v1.11.6
v1.12.0-rc1
v1.13.0-dev
v1.11.5
v1.11.4
v1.11.3
v1.10.6
v1.12.0-dev
v1.11.2
v1.10.5
v1.11.1
v1.10.4
v1.11.0
v1.11.0-rc2
v1.10.3
v1.11.0-rc1
v1.10.2
v1.10.1
v1.10.0
v1.9.6
v1.9.5
v1.10.0-rc2
v1.11.0-dev
v1.10.0-rc1
v1.9.4
v1.9.3
v1.9.2
v1.9.1
v1.9.0
v1.9.0-rc2
v1.10.0-dev
v1.9.0-rc1
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.8.0-rc3
v1.7.6
v1.8.0-rc2
v1.7.5
v1.8.0-rc1
v1.9.0-dev
v1.7.4
v1.7.3
v1.7.2
v1.7.1
v1.7.0
v1.7.0-rc3
v1.6.4
v1.7.0-rc2
v1.6.3
v1.7.0-rc1
v1.7.0-dev
v1.6.2
v1.6.1
v1.6.0
v1.6.0-rc2
v1.5.3
v1.6.0-rc1
v1.6.0-dev
v1.5.2
v1.5.1
v1.5.0
v1.5.0-rc2
v1.5.0-rc1
v1.5.0-dev
v1.4.3
v1.4.2
v1.4.1
v1.4.0
v1.4.0-rc3
v1.4.0-rc2
v1.3.3
v1.4.0-rc1
v1.3.2
v1.3.1
v1.3.0
v1.3.0-rc2
v1.3.0-rc1
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.2.0-rc3
v1.2.0-rc2
v1.1.4
v1.2.0-rc1
v1.1.3
v1.1.2
v1.1.1
v1.1.0
v1.0.2
v1.0.1
v1.0.0
v0.9.99
Labels
Clear labels
$20
$250
$50
$500
backport/done
💎 Bounty
docs-update-needed
good first issue
hacktoberfest
issue/bounty
issue/confirmed
issue/critical
issue/duplicate
issue/needs-feedback
issue/not-a-bug
issue/regression
issue/stale
issue/workaround
lgtm/need 2
modifies/api
modifies/translation
outdated/backport/v1.18
outdated/theme/markdown
outdated/theme/timetracker
performance/bigrepo
performance/cpu
performance/memory
performance/speed
pr/breaking
proposal/accepted
proposal/rejected
pr/wip
pull-request
reviewed/wontfix
💰 Rewarded
skip-changelog
status/blocked
topic/accessibility
topic/api
topic/authentication
topic/build
topic/code-linting
topic/commit-signing
topic/content-rendering
topic/deployment
topic/distribution
topic/federation
topic/gitea-actions
topic/issues
topic/lfs
topic/mobile
topic/moderation
topic/packages
topic/pr
topic/projects
topic/repo
topic/repo-migration
topic/security
topic/theme
topic/ui
topic/ui-interaction
topic/ux
topic/webhooks
topic/wiki
type/bug
type/deprecation
type/docs
type/enhancement
type/feature
type/miscellaneous
type/proposal
type/question
type/refactoring
type/summary
type/testing
type/upstream
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/gitea#110
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @tboerger on GitHub (Dec 5, 2016).
To make the configuration easier especially in the world of systemd and docker we should make it possible to entirely configure gitea with environment variables. To work around the required variables used within the ssh shell we can generate an environment file for it automatically on application start. That way we can get rid of the requirement of the custom app.ini.
@lunny commented on GitHub (Dec 5, 2016):
First is that we can indicate one configuration file via command line?
@tboerger commented on GitHub (Dec 5, 2016):
The configuration file can already be defined at least via an environment variable. But I would like to provide flags for the available options and also bind them to environment variables so that we get the full flexibility out of that.
@bkcsoft commented on GitHub (Dec 5, 2016):
This will be a bitch, we'd have to build a new module on top of the current ini-loader 😒
@tboerger commented on GitHub (Dec 5, 2016):
At least I will give it a try and then we will see how complex that gets.
@stevenroose commented on GitHub (Dec 18, 2016):
There are Go packages (I thought envflags is an example) that automatically load configs, in order of increasing priority, a config file, env flags and command line flags. Config variables only have to be defined once and they can be set in all three ways.
@tboerger commented on GitHub (Dec 18, 2016):
We already use codegangsta cli which provides most scenarios
@tboerger commented on GitHub (Dec 18, 2016):
And additionally to that I can think of dotenv.
@lunny commented on GitHub (Jan 27, 2017):
any update?
@tboerger commented on GitHub (Feb 10, 2017):
I think setting it to 1.2.0 is fine so far unless somebody provides a PR in time.
@TheAssassin commented on GitHub (Aug 31, 2017):
Referring to @bkcsoft's comment:
The common approach to avoid code changes (as this is just a matter of deployment) is to use tools that generate the config file from the environment variables and then load the actual application.
Within the scope of Docker, an application called dockerize has become quite popular for these tasks. Its workflow first loads a configuration file template (which could even be generated from the default
.inifile easily with some shell or other scripting magic). Then, it looks for environment variables, and inserts them into the template. If there's a default value given in the template, and an environment variable is not present, this value is used.This way, there's no code changes required, just add dockerize and the template to the image, and change the entrypoint to dockerize (it should be okay if the config file is rendered even if the
CMDis modified on startup).I saw Gitea is using the alpine base image. This makes installation as easy as:
(This needs to be updated as soon as the dockerize package is moved to the main repository, but that's the only issue).
@ivlis commented on GitHub (Feb 27, 2018):
I can spend some time on integrating dockerize into gitea. @lunny @tboerger will you accept a PR on this?
@lunny commented on GitHub (Feb 28, 2018):
@ivlis Please follow CONTRIBUTING and send PR.
@TheAssassin commented on GitHub (Feb 28, 2018):
@lunny broken link.
https://github.com/go-gitea/gitea/blob/master/CONTRIBUTING.md
@ivlis commented on GitHub (Feb 28, 2018):
@lunny @TheAssassin alright, thanks, will do.
@raucao commented on GitHub (Nov 2, 2018):
Any news on this? We can't seem to find how to enable Let's Encrypt when deploying via Docker to GKE, as there's no ENV var for it.
@techknowlogick commented on GitHub (Nov 2, 2018):
@skddc letsencrypt support hasn't been released in a stable version of gitea. It is in 1.6.0-rc1, but no earlier versions.
@raucao commented on GitHub (Nov 2, 2018):
We're fine with using a release candidate. But does that mean it's a missing feature? Is there an issue for making it configurable?
@tboerger commented on GitHub (Nov 2, 2018):
So far most config variables are only configurable via the configuration file.
@raucao commented on GitHub (Nov 2, 2018):
Hence my original question if there are any news on this particular issue/feature. So the fact that LE support is not in a stable version yet has nothing to do with some variables not being possible to configure in Docker via ENV vars right now, correct?
@tboerger commented on GitHub (Nov 3, 2018):
When you are deploying to Kubernetes you can't configure all by env variables, I think the best would be a configmap for the app.ini. Just disable the install lock. The first user that gets registered will be automatically an admin user.
@raucao commented on GitHub (Nov 3, 2018):
Cool, that was exactly my idea. Will do that then. Thank you!
@tboerger commented on GitHub (Nov 3, 2018):
You also got the option of an init container which starts gitea initially to get the database migrated, and you could execute the gitea cli once to create an admin user. Never tried that, but should work with some basic bash scripting.
@stale[bot] commented on GitHub (Jan 5, 2019):
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs during the next 2 weeks. Thank you for your contributions.
@TheAssassin commented on GitHub (Jan 5, 2019):
Seriously? Why are people using these bots...?
@raucao commented on GitHub (Jan 5, 2019):
I'm not sure that confrontational ranting is usually the beginning of a constructive conversation. If you dislike something about this repo or project, especially when you have a strong opinion about it, then why don't you open an issue and calmly explain your point? It might lead to a positive change...
@TheAssassin commented on GitHub (Jan 5, 2019):
@skddc my reaction was not meant to be constructive, see it as an expression of my opinion in a sort of rude form. Maybe not the best way.
It's just highly annoying that some projects start to use these kinds of third-party services on GitHub, which spam you with mails and notifications. Closing old issues doesn't solve anything in terms of overview in my opinion. Phabricator always says "you can't ignore problems forever" or so.
It's not only third-party projects who've used these bots, also some which I am involved in, so I've got some experience. I know having a thousand open issues can be a challenge to manage for smaller projects. GitHub's interface isn't making this much easier. I can really understand this. But is it really the solution to close old issues? I don't think so.
So, to be a bit more constructive: please turn off this service, @go-gitea.
@techknowlogick commented on GitHub (Jan 6, 2019):
This bot has helped close issues, where users report bugs, and don't follow up. It's either the bot does this maintenance task of pinging inactive issues, or a maintainer. As maintainers would prefer to spend their time building Gitea intstead of pinging many old issues to see if they are still active, this was the solution. There is a two week timeframe that is given as a warning. It has also helped some people to remind them that PRs are still open and are awaiting feedback.
That being said, this isn't the correct place to discuss this decision. Please feel free to continue this discussion in the forum
@stale[bot] commented on GitHub (Mar 8, 2019):
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs during the next 2 weeks. Thank you for your contributions.
@TheAssassin commented on GitHub (Mar 8, 2019):
Ping.
@everflux commented on GitHub (Jun 11, 2019):
Any update on this?
Using a config map did not work out for me since the file will be read only and gitea can not start when trying to overwrite the provided file.
@tboerger commented on GitHub (Jun 12, 2019):
You could use my docker image at webhippie/gitea which provides env variables for every config option :)
@christhomas commented on GitHub (Jun 23, 2019):
Wow nice work @tboerger I've just started trying to build a kubernetes install for gitea and found this doesn't work out like I expect, so you saved my a lot of effort.
Is there a pull request for this? I'd really like to see this in the mainline tree eventually?
@zeripath commented on GitHub (Jun 23, 2019):
@tboerger that's a crazy amount of work. Does Docker really require us to provide this level of configurability through environment variables alone? Is there really not a better way?!
If we really have to provide this - I don't think we can do this through
giteaweb simply because we will want to use the same settings code for web and all the other commands. (although nowgitea hookandgitea servare almost shims we could consider reducing their required configuration considerably.)So, how much logic do you put in to these environment variable settings? If it's simply a 1-1 mapping from environment variable to ini value can we use something completely generic? E.g. a program that reads an ini file then, maps
$PREFIX_SECTION_KEYtothen writes the app.ini back out
If we need some more logic than that we could catch the bits that need to do something more.
This could be a new command
gitea docker-environment-config -i base-app.ini -o app.ini?@christhomas commented on GitHub (Jun 23, 2019):
From what I understand, config files are great when you want to make a static config. But docker is designed to work from environment variables. Then you can take the same image, but give it different environment vars and it'll run with a different config depending on your environment. Take for example the idea to run a container in two regions, with separate databases. You'd just run the same image with different database connections in the env and you're good.
I think the best approach, which covers the existing codebase and allows for easy extension into containers might be one of those libraries which abstracts away config and the tools use this to acquire config instead of accessing it directly.
So if config files are available, read them. But if a variable exists in the env, that gets to override them. But if there is a runtime command line option, that overrides everything.
Then you can support all use-cases.
@christhomas commented on GitHub (Jun 23, 2019):
for example, using this might help cause you can set config sources and fall back each time you don't find what you want
https://micro.mu/docs/go-config.html
So first read command line, no? ok env, no? ok config, no? shit! defaults
Then leave the creation of the env vars to me, I can specify any of them I don't want to be default, or I write out a config manually, or I can just run from the command line. Seems reasonable.
But yeah, docker runs by using env vars, you can write an entrypoint which outputs a config if you want, but it's recommended that you use env vars
@christhomas commented on GitHub (Jun 23, 2019):
I'm actually looking at the s6 files for starting gitea and I'm wondering why you only let me set some variables and not just let me set every variable in that file? Some values don't make sense maybe? But it's quite a short list of possible settings and the number of settings I can't set is quite long.
Was it just that nobody wanted to copy and paste all the variables here and apply them as defaults? Or is there some reason why certain variables can't be changed in the container?
@zeripath commented on GitHub (Jun 23, 2019):
I think we still need to write out these env variables to a config file at entry point.
My reason is the SSH hooks and serv need to be able to find the Gitea server to speak to. Therefore if we don't write these out we have to push the entire environment across to SSH processes and into the .SSH/authorized_keys. Further we risk accidental environment overrides in other hooks and possibly malicious overrides by commands. However, as I say it might be possible to massively reduce the config needs for serv and hook as they're now thin shims on webserver calls.
The other problem is that afaiu the docker environment you run in isn't passed to the docker environment you exec. So say you want to use a Gitea subcommand in exec you won't be able to use it without copying the entire environment.
@zeripath commented on GitHub (Jun 23, 2019):
Regarding making the docker app.ini file completely settable - I can understand why we haven't done it. It looks very much not fun to do and awkward and fragile to keep updated. I'd far rather do the generic
gitea docker-environment-configthing mentioned above. That at least would mean that I never need to change it unless I wanted to add a special non-1-1 mapping.@christhomas commented on GitHub (Jun 23, 2019):
Just to address this. If I run a docker container with a set bunch of environment variables. If I exec into that container to run another command. The same environment variables I set when I ran the container are available to the command when it's executed inside the same container.
Or did I misunderstand you?
@christhomas commented on GitHub (Jun 23, 2019):
Regarding:
I don't think environment variables are a good way to inject this information into the container. You can mount a docker volume containing the keys, or in kubernetes write a configmap and mount that as a file inside the container if you want to do this.
So in fact, pushing this through environment variables, in my opinion, is the wrong thing to do. It's a file, and I think it should be treated like one.
@zeripath commented on GitHub (Jun 23, 2019):
You're misunderstanding the problem in .SSH/authorized_keys.
We have to run gitea serv for each connection.
Therefore we need to be able to configure gitea for each connection.
If you do not save the configuration to a file you have to set that configuration somehow.
Then within each SSH session git will call Gitea hook. That has to be configured too.
@christhomas commented on GitHub (Jun 23, 2019):
No no, I'm saying that you should save it to a file. It's just that how it gets into that file shouldn't be through an environment variable, but a normal file mount, or a kubernetes mechanism of various type.
Or are we talking about different things here?
@zeripath commented on GitHub (Jun 23, 2019):
Yes, you're missing the problem. If you allow arbitrary override of configuration by environment variable without saving it to a config file - how do you configure
gitea servandgitea hook. Even with the changes in #6993 there is still a requirement to configure these calls - but we also don't want their configuration to necessarily be overridden by environment calls.@TheAssassin commented on GitHub (Jun 23, 2019):
@zeripath why can't those commands just read their configuration from the environment as well? Should be possible to have one central
configcomponent that all commands share and use to e.g., read config files or alternatively read config values from the environment.The environment is available for every process in the container, after all.
If using environment variables is too awkward and you prefer to use config files, a config file generator that runs before the main processes is the way to go, this concept is also widely spread. See https://github.com/go-gitea/gitea/issues/350#issuecomment-326326570.
An alternative would be to do the heavy lifting in the main gitea process, and have the hook stuff use RPC instead of doing anything on its own. Then, some simple auto-discovery of the main process (e.g., using a Unix socket in a well-known location) is all you need in these hooks, no configuration needs to be forwarded.
@christhomas commented on GitHub (Jun 23, 2019):
They're not being overridden arbitrarily. I'm setting environment data when I run the container. So I want my configuration used, not what is written in any config file. Thats why you load config data in the precedence that you do. Command line overrides anything in the env, the env overrides anything in the file.
I want those commands using the config I set. It's literally the point of setting the data in the first place.
@christhomas commented on GitHub (Jun 23, 2019):
I think if you're executing files inside a container they all inherit the same runtime environment as their parents, no? Or at least they should.
If each command used the same config loader, which was configured to read from command line > env > config file. Then every command would automatically be configured with the correct configuration data without ever having to change any of those commands.
The problem is that gitea right now only loads from the config file. Why not replace the config file loader with a service like I mentioned in an above comment and then you'd have no more problems, you'd naturally obtain the right configuration every time, regardless of what subprocess you're using
@TheAssassin commented on GitHub (Jun 23, 2019):
Exactly. Unless a process doesn't forward/override those when spawning new subprocesses. I am not sure whether SSH servers will forward the environment they're called with (normally, they just spawn a clean login shell per session, right?), so there you might need a config file.
@christhomas commented on GitHub (Jun 23, 2019):
Well ok, but even in the case of the SSH server. That should use data mounted into the filesystem in terms of the files inside the .ssh directory. So that shouldn't even matter. Right? Given your last sentence. Seems we agree.
@TheAssassin commented on GitHub (Jun 23, 2019):
@christhomas not really, the processes spawned by the SSH server are gitea tasks (git pre-/post-push hooks for instance, that's what @zeripath means with
gitea serveetc.), these also need the configuration values. If the SSH server doesn't forward those information, then they can't do their job.Workflow is:
gitea serveetc.)Now, obviously, these
gitea ...commands need to have the same information (read: configuration data) as the main process, or there will be inconsistencies.An environment variable based system relies on an information flow through the SSH server process that OpenSSH spawns for that connection, i.e., OpenSSH must pass through system environment variables (the ones the main server process sees) to the shell in the per-connection process. That's unlikely to happen with OpenSSH, though, for security reasons. SSH is, after all, primarily designed for secure, remote shells, not for usage as a transport protocol for e.g., Git, ...
TL;DR: the Git hooks will most likely not see any of the env vars set for the Docker container. But they need the same config as the main server process.
I already illustrated a few options how to work around that limitation, e.g., using RPC and performing the tasks in the main processes (i.e., you only need some auto-discovery to find the main Gitea process, and need to set up permissions correctly so only SSH induced stuff can access these endpoints), or writing a config file from the environment variables and allow those processes to read that as well.
@christhomas commented on GitHub (Jun 23, 2019):
ahhh, thats what he meant, I misunderstood and didn't think this was an issue for the ssh daemon
@tboerger commented on GitHub (Jun 23, 2019):
The official image or my image?
As already commented on the roadmap issue, it would make much more sense to reduce the config file to a minimum and make the rest part of the database which can be changed via cli and optionally via Web ui.
@TheAssassin commented on GitHub (Jun 23, 2019):
That's a good alternative, as long as deployment-critical data can be set via env vars (ports, public (as in: load balancer) URLs, etc.).
@tboerger commented on GitHub (Jun 23, 2019):
Infrastructure/deployment parts got to be part of the config, the rest should be part of the db.
@zeripath commented on GitHub (Jun 23, 2019):
These are infrastructure questions: e.g. what is the internal URL that serv/hook talks to.
There needs to be some way of configuring these non s6/entrypoint processes, and allowing environment overrides at that point is a security risk.
I think we're going round in circles. If docker requires that you replace an ini file with an exploded set of environment variables so be it. Overlaying this config on top of a provided config á la
gitea docker-environment-configis the simplest solution I can think of. Yes, we should consider moving config to the db but unless you're willing to remove any dependency on modules/setting in serv and hook and replace it with arguments - and do so carefully for multiple docker environments and account for non docker users too - you're going to have to have some way of configuring this.@tboerger commented on GitHub (Jun 23, 2019):
@zeripath you are missing the point, but whatever. I will just unsubscribe.
@TheAssassin commented on GitHub (Jun 23, 2019):
@zeripath I have doubts you ever used some container-based systems for deployment. Have you ever tried a random, more well known Docker container? For instance, PostgreSQL is a good example: https://hub.docker.com/_/postgres. Check their "How to use this image". You're thinking way too complicated...
@christhomas commented on GitHub (Jun 23, 2019):
@zeripath perhaps you can explain what these security risks are when it comes to configuring ssh using environment variables? I've already stated that installing keys and files into the .ssh directory should be done through mounting files into the file system and not environment variables. But you continue to restate that it's a security risk and I'm not sure what risk you are talking about.
@tboerger commented on GitHub (Jun 23, 2019):
A config file is fine, just reduce it to a minimum which includes database config, cache config (like redis) and bindings like port, internal domain. That's it. All the other stuff could be stored on the database.
@TheAssassin commented on GitHub (Jun 23, 2019):
I still don't see why a config file would have to contain all the things by default even.
When I develop web apps, there's a default config that contains standard values, and any user config file or env vars can override those keys. That should exist already anyway. If required settings are missing, the app refuses to start up.
You don't have to expose every setting as env var either. Just the stuff we really need to be able to set via env var, which are important for deployment.
@techknowlogick commented on GitHub (Jun 23, 2019):
Temporarily locking this issue due to amount of comments on it. More than 400 people get an email each comment. Let’s discuss this over on discord for now, and I’ll reopen in the near future.
Maintainers: you should still be able to comment. If not ping me in discord and I’ll post on your behalf.
@tboerger commented on GitHub (Jun 23, 2019):
Just some closing words, just env variables without a config at all is pretty difficult because the executable gets called from different contexts.
The web application itself should work by env variables, but you can't hand over this environment to the script called by ssh commands like cloning or pushing, which is calling gitea serv for every connection.
So you can see that there is some reasoning for a config file.