2017-11-27 03:14:32 +05:30
---
date: "2017-06-19T12:00:00+02:00"
title: "Installation from binary"
slug: "install-from-binary"
weight: 10
2020-12-09 12:17:06 +05:30
toc: false
2017-11-27 03:14:32 +05:30
draft: false
menu:
sidebar:
parent: "installation"
name: "From binary"
weight: 20
identifier: "install-from-binary"
---
# Installation from binary
2018-01-09 04:18:42 +05:30
All downloads come with SQLite, MySQL and PostgreSQL support, and are built with
2020-12-08 10:22:26 +05:30
embedded assets. This can be different for older releases.
2020-12-09 12:17:06 +05:30
**Table of Contents**
2020-12-08 10:22:26 +05:30
{{< toc > }}
## Download
Choose the file matching the destination platform from the [downloads page ](https://dl.gitea.io/gitea/ ), copy the URL and replace the URL within the commands below:
2017-11-27 03:14:32 +05:30
2018-06-05 07:32:04 +05:30
```sh
2019-08-23 07:25:06 +05:30
wget -O gitea https://dl.gitea.io/gitea/{{< version > }}/gitea-{{< version > }}-linux-amd64
2017-11-27 03:14:32 +05:30
chmod +x gitea
```
2018-07-06 07:06:55 +05:30
## Verify GPG signature
2021-07-01 19:44:09 +05:30
Gitea signs all binaries with a [GPG key ](https://keys.openpgp.org/search?q=teabot%40gitea.io ) to prevent against unwanted modification of binaries.
To validate the binary, download the signature file which ends in `.asc` for the binary you downloaded and use the gpg command line tool.
2018-07-06 07:06:55 +05:30
```sh
2020-04-30 14:38:43 +05:30
gpg --keyserver keys.openpgp.org --recv 7C9E68152594688862D62AF62D9AE806EC1592E2
2019-08-23 07:25:06 +05:30
gpg --verify gitea-{{< version > }}-linux-amd64.asc gitea-{{< version > }}-linux-amd64
2018-07-06 07:06:55 +05:30
```
2021-07-01 19:44:09 +05:30
Look for the text `Good signature from "Teabot <teabot@gitea.io>"` to assert a good binary,
despite warnings like `This key is not certified with a trusted signature!` .
2018-06-05 07:32:04 +05:30
## Recommended server configuration
2020-10-23 21:29:45 +05:30
**NOTE:** Many of the following directories can be configured using [Environment Variables ]({{< relref "doc/advanced/environment-variables.en-us.md" >}} ) as well!
2019-02-28 17:39:47 +05:30
Of note, configuring `GITEA_WORK_DIR` will tell Gitea where to base its working directory, as well as ease installation.
2018-06-05 07:32:04 +05:30
### Prepare environment
2019-03-10 02:45:45 +05:30
Check that Git is installed on the server. If it is not, install it first.
2018-06-05 07:32:04 +05:30
```sh
git --version
```
2019-03-10 02:45:45 +05:30
Create user to run Gitea (ex. `git` )
2018-06-05 07:32:04 +05:30
```sh
adduser \
--system \
--shell /bin/bash \
--gecos 'Git Version Control' \
--group \
--disabled-password \
--home /home/git \
git
```
### Create required directory structure
```sh
2019-02-28 17:39:47 +05:30
mkdir -p /var/lib/gitea/{custom,data,log}
chown -R git:git /var/lib/gitea/
chmod -R 750 /var/lib/gitea/
2018-06-05 07:32:04 +05:30
mkdir /etc/gitea
chown root:git /etc/gitea
chmod 770 /etc/gitea
```
2019-03-10 02:45:45 +05:30
**NOTE:** `/etc/gitea` is temporary set with write rights for user `git` so that Web installer could write configuration file. After installation is done, it is recommended to set rights to read-only using:
2018-06-05 07:32:04 +05:30
```
chmod 750 /etc/gitea
2019-10-05 19:46:30 +05:30
chmod 640 /etc/gitea/app.ini
2018-06-05 07:32:04 +05:30
```
2021-11-28 18:58:30 +05:30
If you don't want the web installer to be able to write the config file at all, it is also possible to make the config file read-only for the Gitea user (owner/group `root:git` , mode `0640` ), and set `INSTALL_LOCK = true` . In that case all database configuration details must be set beforehand in the config file, as well as the `SECRET_KEY` and `INTERNAL_TOKEN` values. See the [command line documentation ]({{< relref "doc/usage/command-line.en-us.md" >}} ) for information on using `gitea generate secret INTERNAL_TOKEN` .
2018-06-05 07:32:04 +05:30
2019-02-28 17:39:47 +05:30
### Configure Gitea's working directory
**NOTE:** If you plan on running Gitea as a Linux service, you can skip this step as the service file allows you to set `WorkingDirectory` . Otherwise, consider setting this environment variable (semi-)permanently so that Gitea consistently uses the correct working directory.
```
export GITEA_WORK_DIR=/var/lib/gitea/
```
2019-03-10 02:45:45 +05:30
### Copy Gitea binary to global location
2018-06-05 07:32:04 +05:30
```
cp gitea /usr/local/bin/gitea
```
2019-02-28 17:39:47 +05:30
## Running Gitea
After the above steps, two options to run Gitea are:
### 1. Creating a service file to start Gitea automatically (recommended)
2018-06-05 07:32:04 +05:30
See how to create [Linux service ]({{< relref "run-as-service-in-ubuntu.en-us.md" >}} )
2019-02-28 17:39:47 +05:30
### 2. Running from command-line/terminal
```
GITEA_WORK_DIR=/var/lib/gitea/ /usr/local/bin/gitea web -c /etc/gitea/app.ini
```
2018-07-30 21:05:05 +05:30
## Updating to a new version
2019-10-05 19:46:30 +05:30
You can update to a new version of Gitea by stopping Gitea, replacing the binary at `/usr/local/bin/gitea` and restarting the instance.
The binary file name should not be changed during the update to avoid problems
in existing repositories.
2018-07-30 21:05:05 +05:30
It is recommended you do a [backup ]({{< relref "doc/usage/backup-and-restore.en-us.md" >}} ) before updating your installation.
2019-10-05 19:46:30 +05:30
If you have carried out the installation steps as described above, the binary should
have the generic name `gitea` . Do not change this, i.e. to include the version number.
2018-07-30 21:05:05 +05:30
2021-11-28 18:58:30 +05:30
### 1. Restarting Gitea with systemd (recommended)
2020-04-30 17:44:27 +05:30
As explained before, we recommend to use systemd as service manager. In this case ```systemctl restart gitea``` should be enough.
2021-11-28 18:58:30 +05:30
### 2. Restarting Gitea without systemd
2020-04-30 17:44:27 +05:30
2021-11-28 18:58:30 +05:30
To restart your Gitea instance, we recommend to use SIGHUP signal. If you know your Gitea PID use ```kill -1 $GITEA_PID``` otherwise you can use ```killall -1 gitea``` or ```pkill -1 gitea```
2020-04-30 17:44:27 +05:30
2021-11-28 18:58:30 +05:30
To gracefully stop the Gitea instance, a simple ```kill $GITEA_PID``` or ```killall gitea``` is enough.
2020-04-30 17:44:27 +05:30
**NOTE:** We don't recommend to use SIGKILL signal (know also as `-9` ), you may be forcefully stopping some of Gitea internal tasks and it will not gracefully stop (tasks in queues, indexers processes, etc.)
2019-10-05 19:46:30 +05:30
See below for troubleshooting instructions to repair broken repositories after
2019-03-10 02:45:45 +05:30
an update of your Gitea version.
2018-07-30 21:05:05 +05:30
2017-11-27 03:14:32 +05:30
## Troubleshooting
### Old glibc versions
2018-01-09 04:18:42 +05:30
Older Linux distributions (such as Debian 7 and CentOS 6) may not be able to load the
Gitea binary, usually producing an error such as ```./gitea: /lib/x86_64-linux-gnu/libc.so.6:
version `GLIBC\_2.14' not found (required by ./gitea)` ``. This is due to the integrated
SQLite support in the binaries provided by dl.gitea.io. In this situation, it is usually
possible to [install from source ]({{< relref "from-source.en-us.md" >}} ) without sqlite
support.
2017-11-27 03:14:32 +05:30
2019-03-10 02:45:45 +05:30
### Running Gitea on another port
2017-11-27 03:14:32 +05:30
2018-01-09 04:18:42 +05:30
For errors like `702 runWeb()] [E] Failed to start server: listen tcp 0.0.0.0:3000:
2019-03-10 02:45:45 +05:30
bind: address already in use` Gitea needs to be started on another free port. This
is possible using `./gitea web -p $PORT` . It's possible another instance of Gitea
2018-01-09 04:18:42 +05:30
is already running.
2018-07-30 21:05:05 +05:30
2019-05-23 22:42:59 +05:30
### Running Gitea on Raspbian
2019-10-05 19:46:30 +05:30
As of v1.8, there is a problem with the arm7 version of Gitea and it doesn't run on Raspberry Pi and similar devices.
2019-05-23 22:42:59 +05:30
It is therefore recommended to switch to the arm6 version which has been tested and shown to work on Raspberry Pi and similar devices.
<!-- -
please remove after fixing the arm7 bug
--->
2019-03-10 02:45:45 +05:30
### Git error after updating to a new version of Gitea
2018-07-30 21:05:05 +05:30
2019-10-05 19:46:30 +05:30
If the binary file name has been changed during the update to a new version of Gitea,
git hooks in existing repositories will not work any more. In that case, a git
2018-07-30 21:05:05 +05:30
error will be displayed when pushing to the repository.
```
remote: ./hooks/pre-receive.d/gitea: line 2: [...]: No such file or directory
```
2019-10-05 19:46:30 +05:30
The `[...]` part of the error message will contain the path to your previous Gitea
2018-07-30 21:05:05 +05:30
binary.
2019-10-05 19:46:30 +05:30
To solve this, go to the admin options and run the task `Resynchronize pre-receive,
2018-07-30 21:05:05 +05:30
update and post-receive hooks of all repositories` to update all hooks to contain
the new binary path. Please note that this overwrite all git hooks including ones
with customizations made.
2019-03-10 02:45:45 +05:30
If you aren't using the built-in to Gitea SSH server you will also need to re-write
2018-07-30 21:05:05 +05:30
the authorized key file by running the `Update the '.ssh/authorized_keys' file with
Gitea SSH keys.` task in the admin options.