Pre-submission Checklist
Memos Version
latest commit
Deployment Method
Built from source
Database
PostgreSQL
Browser & OS
doesn't matter here
Bug Description
Hello,
The unix socket is created with these permissions:
localhost:~# ls -l /tmp/memo.sock
srwxr-xr-x 1 memo memo 0 Apr 11 16:59 /tmp/memo.sock
The reverse proxy (I use nginx, but others should behave the same) can't access it, because it wants the write permission on the socket.
Would it be possible to put the permissions of the socket file at 777 or 770 (the reverse proxy user would be added to the memos group)?
Without that, the software doesn't work, since the reverse proxy can't access the socket :(
Steps to Reproduce
- Launch the software with unix socket config env var
- Direct the reverse proxy to the unix socket
- Doesn't work
- chmod 777 the unix socket
- Works
Expected Behavior
The unix socket should have other permissions? Why is github asking so many questions about a simple issue??? 😭
Screenshots, Logs & Additional Context
No response
Pre-submission Checklist
Memos Version
latest commit
Deployment Method
Built from source
Database
PostgreSQL
Browser & OS
doesn't matter here
Bug Description
Hello,
The unix socket is created with these permissions:
localhost:~# ls -l /tmp/memo.sock
srwxr-xr-x 1 memo memo 0 Apr 11 16:59 /tmp/memo.sock
The reverse proxy (I use nginx, but others should behave the same) can't access it, because it wants the write permission on the socket.
Would it be possible to put the permissions of the socket file at 777 or 770 (the reverse proxy user would be added to the memos group)?
Without that, the software doesn't work, since the reverse proxy can't access the socket :(
Steps to Reproduce
Expected Behavior
The unix socket should have other permissions? Why is github asking so many questions about a simple issue??? 😭
Screenshots, Logs & Additional Context
No response