docs: add macvlan LAN-only warning for runners outside the network
Macvlan container IPs are only reachable on the LAN. Runners working remotely (coffee shop, VPN) must use the public GITEA_DOMAIN instead of the LAN IP in their .runner file. Added inline comments to .env.example and troubleshooting entries to README.md and USAGE_GUIDE.md. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -195,6 +195,12 @@ Phases run strictly sequentially. Phase 4 could potentially import repos in para
|
||||
- The total migration time is dominated by network transfers, not script execution
|
||||
- Sequential execution produces readable, linear logs
|
||||
|
||||
### Macvlan IPs are LAN-only — runners outside the network must use the public domain
|
||||
|
||||
Gitea containers run on macvlan IPs (e.g., `UNRAID_GITEA_IP=192.168.1.177`). These IPs are only reachable from machines on the same LAN. If a runner (e.g., a MacBook) is outside the local network (coffee shop, VPN, mobile hotspot), it cannot reach the macvlan IP and will fail to poll for jobs or report results.
|
||||
|
||||
**Fix**: Edit the runner's `.runner` file and change the `address` field from the LAN IP (`http://192.168.1.177:3000`) to the public domain (`https://YOUR_DOMAIN`). The public domain routes through Caddy (Phase 8) and works from anywhere. Restart the runner after changing the address.
|
||||
|
||||
### Docker socket mounted in runner containers
|
||||
|
||||
Runner containers get `/var/run/docker.sock` mounted, giving them root-equivalent access to the host's Docker daemon. This is required for runners to spawn job containers but is a security concern for untrusted code. For a private instance with trusted users, this is the standard Gitea runner deployment.
|
||||
|
||||
Reference in New Issue
Block a user