You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
RestrictAddressFamilies=[¶](https://www.freedesktop.org/software/systemd/man/latest/systemd.exec.html#RestrictAddressFamilies=)
Restricts the set of socket address families accessible to the processes of this unit. Takes "none", or a space-separated list of address family names to allow-list, such as AF_UNIX, AF_INET or AF_INET6. When "none" is specified, then all address families will be denied. When prefixed with "~" the listed address families will be applied as deny list, otherwise as allow list. Note that this restricts access to the [socket(2)](https://man7.org/linux/man-pages/man2/socket.2.html) system call only. Sockets passed into the process by other means (for example, by using socket activation with socket units, see [systemd.socket(5)](https://www.freedesktop.org/software/systemd/man/latest/systemd.socket.html#)) are unaffected. Also, sockets created with socketpair() (which creates connected AF_UNIX sockets only) are unaffected. Note that this option has no effect on 32-bit x86, s390, s390x, mips, mips-le, ppc, ppc-le, ppc64, ppc64-le and is ignored (but works correctly on other ABIs, including x86-64). Note that on systems supporting multiple ABIs (such as x86/x86-64) it is recommended to turn off alternative ABIs for services, so that they cannot be used to circumvent the restrictions of this option. Specifically, it is recommended to combine this option with SystemCallArchitectures=native or similar. By default, no restrictions apply, all address families are accessible to processes. If assigned the empty string, any previous address family restriction changes are undone. This setting does not affect commands prefixed with "+".
Use this option to limit exposure of processes to remote access, in particular via exotic and sensitive network protocols, such as AF_PACKET. Note that in most cases, the local AF_UNIX address family should be included in the configured allow list as it is frequently used for local communication, including for [syslog(2)](https://man7.org/linux/man-pages/man2/syslog.2.html) logging.
Added in version 211.
→ I think we should allow AF_UNIX. I can make a PR for that when we agree. I'm patching the role manually in the mean time.
Thank you for your work :)
Regards
The text was updated successfully, but these errors were encountered:
Hello, I have a setup running with:
My forgejo database configuration is:
After applying #184 (using
l3d.gitea
version v.3.6.0), I got the following error message:which led to the service crashing and restarting every ~20 seconds or so:
My setup needs the following configuration in
gitea.service
in order to run:I wonder why @juju4 chose to disable
AF_UNIX
? It is recommended to use sockets instead of tcp ports when connecting to network resources on the same host, cf. https://www.freedesktop.org/software/systemd/man/latest/systemd.exec.html#RestrictAddressFamilies=→ I think we should allow
AF_UNIX
. I can make a PR for that when we agree. I'm patching the role manually in the mean time.Thank you for your work :)
Regards
The text was updated successfully, but these errors were encountered: