mirror of
https://github.com/go-gitea/gitea.git
synced 2026-03-09 21:10:00 -05:00
Can run from command line but not from systemd #3387
Closed
opened 2025-11-02 05:11:16 -06:00 by GiteaMirror
·
15 comments
No Branch/Tag Specified
main
release/v1.25
release/v1.24
release/v1.23
release/v1.22
release/v1.21
release/v1.20
release/v1.19
release/v1.18
release/v1.17
release/v1.16
release/v1.15
release/v1.14
release/v1.13
release/v1.12
release/v1.11
release/v1.10
release/v1.9
release/v1.8
v1.25.3
v1.25.2
v1.25.1
v1.25.0
v1.24.7
v1.25.0-rc0
v1.26.0-dev
v1.24.6
v1.24.5
v1.24.4
v1.24.3
v1.24.2
v1.24.1
v1.24.0
v1.23.8
v1.24.0-rc0
v1.25.0-dev
v1.23.7
v1.23.6
v1.23.5
v1.23.4
v1.23.3
v1.23.2
v1.23.1
v1.23.0
v1.23.0-rc0
v1.24.0-dev
v1.22.6
v1.22.5
v1.22.4
v1.22.3
v1.22.2
v1.22.1
v1.22.0
v1.23.0-dev
v1.22.0-rc1
v1.21.11
v1.22.0-rc0
v1.21.10
v1.21.9
v1.21.8
v1.21.7
v1.21.6
v1.21.5
v1.21.4
v1.21.3
v1.21.2
v1.20.6
v1.21.1
v1.21.0
v1.21.0-rc2
v1.21.0-rc1
v1.20.5
v1.22.0-dev
v1.21.0-rc0
v1.20.4
v1.20.3
v1.20.2
v1.20.1
v1.20.0
v1.19.4
v1.21.0-dev
v1.20.0-rc2
v1.20.0-rc1
v1.20.0-rc0
v1.19.3
v1.19.2
v1.19.1
v1.19.0
v1.19.0-rc1
v1.20.0-dev
v1.19.0-rc0
v1.18.5
v1.18.4
v1.18.3
v1.18.2
v1.18.1
v1.18.0
v1.17.4
v1.18.0-rc1
v1.19.0-dev
v1.18.0-rc0
v1.17.3
v1.17.2
v1.17.1
v1.17.0
v1.17.0-rc2
v1.16.9
v1.17.0-rc1
v1.18.0-dev
v1.16.8
v1.16.7
v1.16.6
v1.16.5
v1.16.4
v1.16.3
v1.16.2
v1.16.1
v1.16.0
v1.15.11
v1.17.0-dev
v1.16.0-rc1
v1.15.10
v1.15.9
v1.15.8
v1.15.7
v1.15.6
v1.15.5
v1.15.4
v1.15.3
v1.15.2
v1.15.1
v1.14.7
v1.15.0
v1.15.0-rc3
v1.14.6
v1.15.0-rc2
v1.14.5
v1.16.0-dev
v1.15.0-rc1
v1.14.4
v1.14.3
v1.14.2
v1.14.1
v1.14.0
v1.13.7
v1.14.0-rc2
v1.13.6
v1.13.5
v1.14.0-rc1
v1.15.0-dev
v1.13.4
v1.13.3
v1.13.2
v1.13.1
v1.13.0
v1.12.6
v1.13.0-rc2
v1.14.0-dev
v1.13.0-rc1
v1.12.5
v1.12.4
v1.12.3
v1.12.2
v1.12.1
v1.11.8
v1.12.0
v1.11.7
v1.12.0-rc2
v1.11.6
v1.12.0-rc1
v1.13.0-dev
v1.11.5
v1.11.4
v1.11.3
v1.10.6
v1.12.0-dev
v1.11.2
v1.10.5
v1.11.1
v1.10.4
v1.11.0
v1.11.0-rc2
v1.10.3
v1.11.0-rc1
v1.10.2
v1.10.1
v1.10.0
v1.9.6
v1.9.5
v1.10.0-rc2
v1.11.0-dev
v1.10.0-rc1
v1.9.4
v1.9.3
v1.9.2
v1.9.1
v1.9.0
v1.9.0-rc2
v1.10.0-dev
v1.9.0-rc1
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.8.0-rc3
v1.7.6
v1.8.0-rc2
v1.7.5
v1.8.0-rc1
v1.9.0-dev
v1.7.4
v1.7.3
v1.7.2
v1.7.1
v1.7.0
v1.7.0-rc3
v1.6.4
v1.7.0-rc2
v1.6.3
v1.7.0-rc1
v1.7.0-dev
v1.6.2
v1.6.1
v1.6.0
v1.6.0-rc2
v1.5.3
v1.6.0-rc1
v1.6.0-dev
v1.5.2
v1.5.1
v1.5.0
v1.5.0-rc2
v1.5.0-rc1
v1.5.0-dev
v1.4.3
v1.4.2
v1.4.1
v1.4.0
v1.4.0-rc3
v1.4.0-rc2
v1.3.3
v1.4.0-rc1
v1.3.2
v1.3.1
v1.3.0
v1.3.0-rc2
v1.3.0-rc1
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.2.0-rc3
v1.2.0-rc2
v1.1.4
v1.2.0-rc1
v1.1.3
v1.1.2
v1.1.1
v1.1.0
v1.0.2
v1.0.1
v1.0.0
v0.9.99
Labels
Clear labels
$20
$250
$50
$500
backport/done
💎 Bounty
docs-update-needed
good first issue
hacktoberfest
issue/bounty
issue/confirmed
issue/critical
issue/duplicate
issue/needs-feedback
issue/not-a-bug
issue/regression
issue/stale
issue/workaround
lgtm/need 2
modifies/api
modifies/translation
outdated/backport/v1.18
outdated/theme/markdown
outdated/theme/timetracker
performance/bigrepo
performance/cpu
performance/memory
performance/speed
pr/breaking
proposal/accepted
proposal/rejected
pr/wip
pull-request
reviewed/wontfix
💰 Rewarded
skip-changelog
status/blocked
topic/accessibility
topic/api
topic/authentication
topic/build
topic/code-linting
topic/commit-signing
topic/content-rendering
topic/deployment
topic/distribution
topic/federation
topic/gitea-actions
topic/issues
topic/lfs
topic/mobile
topic/moderation
topic/packages
topic/pr
topic/projects
topic/repo
topic/repo-migration
topic/security
topic/theme
topic/ui
topic/ui-interaction
topic/ux
topic/webhooks
topic/wiki
type/bug
type/deprecation
type/docs
type/enhancement
type/feature
type/miscellaneous
type/proposal
type/question
type/refactoring
type/summary
type/testing
type/upstream
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/gitea#3387
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @esbennn on GitHub (May 28, 2019).
[x]):Description
I have gitea up and running on port 3080 on a Raspberry Pi.
I'm currently working on getting SSL working and for that I need to expose port 80, as that's required by Lets Encrypt.
I can run
gitea webwith myapp.inifile from command line just fine, but it will not run as a daemon when a privileged port is specified. It appears gitea is not allowed to bind a socket to the port.I have tried providing the `gitea``user permissions as detailed in this post: https://liquidat.wordpress.com/2018/01/04/howto-run-programs-as-non-root-user-on-privileged-ports-via-systemd/
Here's my
app.ini:Here's my systemd unit file:
Here's the output when run "normally" through command line:
.... And heres a tail of the log when (re)starting the service with systemd:
Any ideas are much appreciated.
I guess i could just make my own startup script, but i'd really prefer running things through systemd, as that seems to be the intended use.
...
Screenshots
@zeripath commented on GitHub (May 28, 2019):
The hint is here:
Not root users are not allowed to open port 80 unless actively allowed.
@esbennn commented on GitHub (May 28, 2019):
@zeripath that's what I was thinking too. Only I don't understand why it works from command line. As you can see in the snippet above, it's run without sudo.
I've left the office for today, but I'm pretty sure it successfully redirected me when accessing on port 80.
Any idea how to make it work with redirection from port 80?
@zeripath commented on GitHub (May 28, 2019):
743697a549/contrib/systemd/gitea.service (L26-L30)@esbennn commented on GitHub (May 29, 2019):
Thanks - i actually found and added those two lines shortly after posting. It isn't working for me though.
System Requirements state that a RasPi 3 should be able to run Gitea, and that it should be run on a non-root user. Am i missing some sort of dependency to make this work?
@zeripath commented on GitHub (May 29, 2019):
No you're not missing any dependency it's something to do with your config. As you can see it works fine when you start from the command line - your service file is incorrect or config for the service is incorrect.
I note you have:
But also
Just remove the letsencrypt stuff for the moment. May be it's the redirector that is killing Gitea.
@esbennn commented on GitHub (May 29, 2019):
Thank you very much for troubleshooting with me @zeripath !
So, with the following
app.iniand the following unit file
I'm still getting this
From googling around, it seems other people, who are having trouble using privileged ports, usually get a message that hints at a permission issue. I'm getting a
bad file descriptorthough.Any thoughts?
@zeripath commented on GitHub (May 29, 2019):
Sorry I wasn't clear drop the redirect other port line
@esbennn commented on GitHub (May 29, 2019):
Oh, right. If i disable that line, the server starts.
But then i need to access the server specifically with
https://[ip-address]:3000@zeripath commented on GitHub (Jun 15, 2019):
@esbennn sorry I must have missed your comment.
OK, so I think you're saying that you don't want to run Gitea behind a proxy server like Nginx - but rather would like Gitea to be run as git.pm2.dk on port 80? Have you tried:
CapabilityBoundingSet=CAP_NET_BIND_SERVICEandAmbientCapabilities=CAP_NET_BIND_SERVICElines.@esbennn commented on GitHub (Jun 17, 2019):
Ok - it's working now! Thank you!
This is really nice. For now, I'm using a slef-signed cert. I would like to move to Lets Encrypt, though.
Trouble is that it isn't really accessible on port 80, as i have our cloud on that port.
I guess i'll have to use some sort of proxy on our network for that to work :)
@zeripath commented on GitHub (Jun 17, 2019):
Ah now I understand why certmanager wants us to just use their TLSConfig and what tls-alpn-01 is... #7229 will allow you to just run on https with tls-alpn-01. I'll see if it can be backported.
@esbennn commented on GitHub (Jun 25, 2019):
Thanks for the build! Haven't had time to test it yet, and I'm going on vacation tomorrow, so it'll be another couple of weeks. Looking forward to try it out!
@esbennn commented on GitHub (Jul 29, 2019):
Alright - Using the v1.9, I was still unable to use the built in Letsencrypt functionality.
Using Letsencrypt certbot and pointing to certificate files, however, works perfectly!
@stale[bot] commented on GitHub (Sep 27, 2019):
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs during the next 2 weeks. Thank you for your contributions.
@stale[bot] commented on GitHub (Oct 11, 2019):
This issue has been automatically closed because of inactivity. You can re-open it if needed.