86 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			86 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| {
 | |
|   config,
 | |
|   lib,
 | |
|   pkgs,
 | |
|   ...
 | |
| }: let
 | |
|   inherit (config.ooknet.server) services domain;
 | |
|   inherit (lib) mkIf elem getExe;
 | |
| in {
 | |
|   config = mkIf (elem "forgejo" services) {
 | |
|     networking.firewall.allowedTCPPorts = [2222];
 | |
| 
 | |
|     ooknet.server = {
 | |
|       webserver.caddy.enable = true;
 | |
|       database.postgresql.enable = true;
 | |
|     };
 | |
|     services = {
 | |
|       forgejo = {
 | |
|         enable = true;
 | |
| 
 | |
|         settings = {
 | |
|           server = {
 | |
|             DOMAIN = "git.${domain}";
 | |
|             ROOT_URL = "https://git.${domain}";
 | |
|             HTTP_PORT = 3000;
 | |
|             LANDING_PAGE = "explore";
 | |
| 
 | |
|             START_SSH_SERVER = true;
 | |
|             SSH_PORT = 2222;
 | |
|             SSH_LISTEN_PORT = 2222;
 | |
|           };
 | |
|           database = {
 | |
|             type = "postgres";
 | |
|             createDatabase = true;
 | |
|           };
 | |
|           service = {
 | |
|             DISABLE_REGISTRATION = true;
 | |
|           };
 | |
|           security = {
 | |
|             INSTALL_LOCK = true;
 | |
|           };
 | |
|         };
 | |
|       };
 | |
|       caddy.virtualHosts = {
 | |
|         "git.${domain}".extraConfig = ''
 | |
|           header {
 | |
|             Strict-Transport-Security "max-age=31536000;"
 | |
|             X-XSS-Protection "1; mode=block"
 | |
|             X-Frame-Options "DENY"
 | |
|             X-Content-Type-Options "nosniff"
 | |
|             -Server
 | |
|             Referrer-Policy "no-referrer"
 | |
|           }
 | |
| 
 | |
|           # Handle proxying
 | |
|           handle_path /* {
 | |
|             reverse_proxy localhost:3000 {
 | |
|               header_up X-Real-IP {remote_host}
 | |
|               header_up X-Forwarded-For {remote_host}
 | |
|               header_up X-Forwarded-Proto {scheme}
 | |
|             }
 | |
|           }
 | |
|         '';
 | |
|       };
 | |
|     };
 | |
|     # credit to TLATER
 | |
|     # https://discourse.nixos.org/t/how-to-access-forgejo-cli/45370
 | |
|     environment.systemPackages = let
 | |
|       cfg = config.services.forgejo;
 | |
|       forgejo-cli = pkgs.writeScriptBin "forgejo-cli" ''
 | |
|         #!${pkgs.runtimeShell}
 | |
|         cd ${cfg.stateDir}
 | |
|         sudo=exec
 | |
|         if [[ "$USER" != forgejo ]]; then
 | |
|           sudo='exec /run/wrappers/bin/sudo -u ${cfg.user} -g ${cfg.group} --preserve-env=GITEA_WORK_DIR --preserve-env=GITEA_CUSTOM'
 | |
|         fi
 | |
|         # Note that these variable names will change
 | |
|         export GITEA_WORK_DIR=${cfg.stateDir}
 | |
|         export GITEA_CUSTOM=${cfg.customDir}
 | |
|         $sudo ${getExe cfg.package} "$@"
 | |
|       '';
 | |
|     in [
 | |
|       forgejo-cli
 | |
|     ];
 | |
|   };
 | |
| }
 |